/base/startup/init/ueventd/ |
D | ueventd.c | 175 static void HandleRequiredBlockDeviceNodes(const struct Uevent *uevent, char **devices, int num) in HandleRequiredBlockDeviceNodes() argument 179 if (strstr(devices[i], uevent->deviceName) != NULL) { in HandleRequiredBlockDeviceNodes() 180 …INIT_LOGI("%s match with required partition %s success, now handle it", devices[i], uevent->device… in HandleRequiredBlockDeviceNodes() 184 } else if (strstr(devices[i], uevent->partitionName) != NULL || in HandleRequiredBlockDeviceNodes() 199 static void HandleUeventRequired(const struct Uevent *uevent, char **devices, int num) in HandleUeventRequired() argument 201 INIT_ERROR_CHECK(devices != NULL && num > 0, return, "Fault parameters"); in HandleUeventRequired() 207 HandleRequiredBlockDeviceNodes(uevent, devices, num); in HandleUeventRequired() 288 void ProcessUevent(int sockFd, char **devices, int num) in ProcessUevent() argument 300 if (devices != NULL && num > 0) { in ProcessUevent() 301 HandleUeventRequired(&uevent, devices, num); in ProcessUevent() [all …]
|
D | ueventd_main.c | 112 char *devices[] = { in UeventdEarlyBoot() local 117 RetriggerUevent(ueventSockFd, devices, 2); in UeventdEarlyBoot()
|
/base/startup/init/services/init/standard/ |
D | init.c | 146 char **devices = (char **)calloc(num, sizeof(char *)); in GetRequiredDevices() local 147 INIT_ERROR_CHECK(devices != NULL, return NULL, "Failed calloc err=%d", errno); in GetRequiredDevices() 153 devices[i] = strdup(item->deviceName); in GetRequiredDevices() 154 INIT_ERROR_CHECK(devices[i] != NULL, FreeStringVector(devices, num); return NULL, in GetRequiredDevices() 161 return devices; in GetRequiredDevices() 181 char **devices = (fstab != NULL) ? GetRequiredDevices(*fstab, &requiredNum) : NULL; in StartInitSecondStage() local 182 if (devices != NULL && requiredNum > 0) { in StartInitSecondStage() 183 int ret = StartUeventd(devices, requiredNum); in StartInitSecondStage() 187 FreeStringVector(devices, requiredNum); in StartInitSecondStage() 188 devices = NULL; in StartInitSecondStage()
|
/base/security/device_security_level/ |
D | README.md | 7 …devices to form a Super Device. Poor security capabilities of any device may threaten the security… 15 …devices are classified into five levels from SL1 to SL5, based on the industry standard security c… 19 …devices. Usually equipped with a lightweight operating system and low-end microprocessors, such de… 21 …nHarmony devices of SL2 can label their own data and define access control rules to implement disc… 23 - OpenHarmony devices of SL3 have comprehensive security protection capabilities, and their operati… 25 - SL4: OpenHarmony devices of SL4 must have simplified trusted computing base (TCB) and come with a… 27 - SL5: SL5 indicates the highest security protection capabilities for OpenHarmony devices. The syst… 51 - The default security level of OpenHarmony devices is SL1. Device vendors can [customize](https://… 57 …cessed in OpenHarmony distributed devices, the DSLM APIs can be called to obtain the security leve…
|
/base/security/device_auth/ |
D | README.md | 12 …devices, including establishment, maintenance, use, and cancellation, and implements authenticatio… 16 …ablishment, maintenance, and cancellation of trust relationships between devices in a unified mann… 17 …ips between devices, allows trusted devices to exchange secure session keys with each other, and s… 28 …devices created by different services in a unified manner, create trust relationships between devi… 29 - Device group authentication: allows devices to authenticate the trust relationships that have b… 30 - Account-irrelevant P2P device authentication: allows two devices to establish a trust relations… 53 … abstracts trust relationships established by different services between devices into trust groups… 76 …455765"><a name="p2431455765"></a><a name="p2431455765"></a>Creates a group of trusted devices.</p> 81 …17"><a name="p126575774517"></a><a name="p126575774517"></a>Deletes a group of trusted devices.</p> 101 …183411"></a><a name="p12701049183411"></a>Obtains information about a trusted group of devices.</p>
|
/base/notification/distributed_notification_service/frameworks/ans/src/ |
D | notification_distributed_options.cpp | 36 …d NotificationDistributedOptions::SetDevicesSupportDisplay(const std::vector<std::string> &devices) in SetDevicesSupportDisplay() argument 38 devicesSupportDisplay_ = devices; in SetDevicesSupportDisplay() 46 …d NotificationDistributedOptions::SetDevicesSupportOperate(const std::vector<std::string> &devices) in SetDevicesSupportOperate() argument 48 devicesSupportOperate_ = devices; in SetDevicesSupportOperate()
|
/base/security/device_auth/services/data_manager/src/ |
D | data_manager.c | 75 TlvDeviceVec devices; member 108 TLV_MEMBER(TlvDeviceVec, devices, 0x6003) 117 DeviceEntryVec devices; member 191 newInfo.devices = CreateDeviceEntryVec(); in GetTrustedInfoByOsAccountId() 196 DestroyDeviceEntryVec(&newInfo.devices); in GetTrustedInfoByOsAccountId() 387 FOR_EACH_HC_VECTOR(db->devices.data, index, device) { in LoadDevices() 419 if (!LoadDevices(&dbv1, &info->devices)) { in ReadInfoFromParcel() 482 info.devices = CreateDeviceEntryVec(); in LoadOsAccountDb() 485 DestroyDeviceEntryVec(&info.devices); in LoadOsAccountDb() 493 ClearDeviceEntryVec(&info.devices); in LoadOsAccountDb() [all …]
|
/base/startup/init/ueventd/include/ |
D | ueventd.h | 76 void RetriggerUevent(int sockFd, char **devices, int num); 78 void ProcessUevent(int sockFd, char **devices, int num);
|
/base/security/selinux_adapter/sepolicy/base/system/ |
D | virtfs_contexts | 68 genfscon sysfs /devices/system/cpu u:object_r:sysfs_devices_system_cpu:s0 79 genfscon sysfs /devices/virtual/android_usb u:object_r:sysfs_android_usb:s0 80 genfscon sysfs /devices/virtual/block/ u:object_r:sysfs_block_file:s0 81 genfscon sysfs /devices/virtual/block/loop u:object_r:sysfs_block_loop:s0 82 genfscon sysfs /devices/virtual/block/zram0 u:object_r:sysfs_block_zram:s0 83 genfscon sysfs /devices/virtual/block/zram1 u:object_r:sysfs_block_zram:s0 84 genfscon sysfs /devices/virtual/net u:object_r:sysfs_net:s0 85 genfscon sysfs /devices/virtual/wakeup u:object_r:sysfs_wakeup:s0 97 genfscon sysfs /devices/platform/fdd40000.i2c/i2c-0/0-0020/rk808-rtc/rtc/rtc0/hctosys u:objec… 98 genfscon sysfs /devices/platform/fe5e0000.i2c/i2c-5/5-0051/rtc/rtc1/hctosys u:object_r:sysfs_hct…
|
/base/notification/distributed_notification_service/interfaces/inner_api/ |
D | notification_distributed_options.h | 59 void SetDevicesSupportDisplay(const std::vector<std::string> &devices); 73 void SetDevicesSupportOperate(const std::vector<std::string> &devices);
|
/base/security/access_token/services/tokensyncmanager/src/service/ |
D | token_sync_manager_service.cpp | 119 std::vector<DeviceInfo> devices = DeviceInfoRepository::GetInstance().ListDeviceInfo(); in DeleteRemoteHapTokenInfo() local 121 for (const DeviceInfo& device : devices) { in DeleteRemoteHapTokenInfo() 144 std::vector<DeviceInfo> devices = DeviceInfoRepository::GetInstance().ListDeviceInfo(); in UpdateRemoteHapTokenInfo() local 146 for (const DeviceInfo& device : devices) { in UpdateRemoteHapTokenInfo()
|
/base/iothardware/peripheral/ |
D | README.md | 9 The Internet of Things \(IoT\) hardware subsystem provides APIs for operating IoT devices, includin… 16 └── inner_api # APIs for operating IoT devices
|
/base/location/ |
D | README.en.md | 14 …devices wherever they go. Mobile devices have become a necessity in people's daily routines, wheth… 16 With the location awareness capability offered by OpenHarmony, mobile devices will be able to obtai… 38 …devices that can be discovered by the device. The location accuracy of this technology depends on …
|
/base/telephony/ril_adapter/services/hril_hdf/src/ |
D | hril_hdf.c | 86 struct udev_list_entry *devices, *devListEntry; in GetUsbDeviceInfo() local 102 devices = udev_enumerate_get_list_entry(enumerate); in GetUsbDeviceInfo() 103 udev_list_entry_foreach(devListEntry, devices) { in GetUsbDeviceInfo()
|
/base/usb/usb_manager/services/native/include/ |
D | usb_host_manager.h | 35 void GetDevices(MAP_STR_DEVICE &devices);
|
D | usb_right_manager.h | 46 int32_t CleanUpRightExpired(std::vector<std::string> &devices);
|
/base/usb/usb_manager/services/native/src/ |
D | usb_host_manager.cpp | 37 void UsbHostManager::GetDevices(MAP_STR_DEVICE &devices) in GetDevices() argument 39 devices = devices_; in GetDevices()
|
D | usb_service.cpp | 374 std::map<std::string, UsbDevice *> devices; in GetDevices() local 381 usbHostManger_->GetDevices(devices); in GetDevices() 382 USB_HILOGI(MODULE_USB_SERVICE, "list size %{public}zu", devices.size()); in GetDevices() 383 for (auto it = devices.begin(); it != devices.end(); ++it) { in GetDevices() 955 std::vector<std::string> devices; in InitUsbRight() local 957 devices.push_back(it->second); in InitUsbRight() 959 …USB_HILOGI(MODULE_USBD, "clean: %{public}zu/%{public}zu", devices.size(), deviceVidPidMap_.size()); in InitUsbRight() 960 ret = usbRightManager_->CleanUpRightExpired(devices); in InitUsbRight() 1195 std::map<std::string, UsbDevice *> devices; in UnLoadSelf() local 1196 usbHostManger_->GetDevices(devices); in UnLoadSelf() [all …]
|
D | usb_right_manager.cpp | 408 int32_t UsbRightManager::CleanUpRightExpired(std::vector<std::string> &devices) in CleanUpRightExpired() argument 410 USB_HILOGD(MODULE_USB_SERVICE, "clean up expired right: size=%{public}zu", devices.size()); in CleanUpRightExpired() 411 size_t len = devices.size(); in CleanUpRightExpired() 414 std::string dev = devices.at(i); in CleanUpRightExpired()
|
/base/sensors/miscdevice_lite/ |
D | README.md | 8 Misc devices, including vibrators and LED lights, are used to send signals externally. You can call…
|
/base/update/sys_installer_lite/ |
D | README.md | 11 Over the Air \(OTA\) provides the remote device update capability. Your devices will be able to sup… 31 …300, and Hi3861 development boards are supported. If you want to support devices that use other ch…
|
/base/security/selinux_adapter/sepolicy/ohos_policy/drivers/external_device_manager/system/ |
D | appspawn.te | 24 # avc: denied { getattr } for pid=246 comm="appspawn" path="/sys/devices/system/cpu/online" dev=… 25 # avc: denied { open } for pid=246 comm="appspawn" path="/sys/devices/system/cpu/online" dev="sy…
|
/base/security/selinux_adapter/sepolicy/ohos_policy/filemanagement/user_file_service/system/ |
D | system_core_hap.te | 18 # avc: denied { open } for pid=1406 comm="RSRenderThread" path="/sys/devices/system/cpu" dev="sy…
|
/base/startup/bootstrap_lite/ |
D | README.md | 23 Currently, the bootstrap\_lite module applies only to mini-system devices \(reference memory ≥ 128 …
|
/base/notification/distributed_notification_service/frameworks/ans/test/unittest/ |
D | notification_request_test.cpp | 438 std::vector<std::string> devices; in HWTEST_F() local 439 notificationRequest.SetDevicesSupportDisplay(devices); in HWTEST_F() 440 notificationRequest.SetDevicesSupportOperate(devices); in HWTEST_F()
|