/base/update/updateservice/services/startup/access/src/ |
D | access_manager.cpp | 42 for (auto &[type, access] : accessMap_) { in IsIdle() 43 if (access != nullptr && !access->IsIdle()) { in IsIdle() 55 for (auto &[type, access] : accessMap_) { in GetScheduleTasks() 56 if (access != nullptr) { in GetScheduleTasks() 57 std::vector<ScheduleTask> tasks = access->GetScheduleTasks(); in GetScheduleTasks() 68 for (auto &[type, access] : accessMap_) { in Exit() 69 if (access != nullptr && !access->Exit()) { in Exit() 76 bool AccessManager::Register(AccessType type, const std::shared_ptr<IAccess> &access) in Register() argument 78 if (access == nullptr) { in Register() 84 accessMap_[type] = access; in Register()
|
/base/update/updateservice/services/startup/ |
D | startup.gni | 23 "$startup_root_path/access/include", 28 "$startup_root_path/access/src/access_factory.cpp", 29 "$startup_root_path/access/src/access_manager.cpp", 30 "$startup_root_path/access/src/default_access.cpp", 31 "$startup_root_path/access/src/firmware_access.cpp",
|
/base/security/access_token/ |
D | README.md | 6 AccessTokenManager (ATM) implements unified app permission management based on access tokens on Ope… 8 …access token information of an app includes the app identifier (**APPID**), user ID, app twin inde… 12 - Obtaining access token information (for example, APL) based on the token ID. 25 │ └── tokensync # Code of the access token synchronization framework. 28 │ │ ├── accesstoken # Code of the internal access token interfaces. 33 │ │ └── tokensync # Code of the internal access token synchronization interfaces. 35 │ │ ├── accesstoken # Code of the external access token interfaces. 41 └── tokensyncmanager # Code of the access token synchronization service. 54 | int GetTokenType(AccessTokenID tokenID); | Obtains the type of an access token.| 56 | int GetTokenType(FullTokenID tokenID); | Obtains the type of an access token.| [all …]
|
/base/startup/init/services/init/standard/ |
D | init_mount.c | 42 INIT_CHECK(access(fstabFile, F_OK) == 0, fstabFile = "/system/etc/fstab.required"); in LoadRequiredFstab() 43 INIT_ERROR_CHECK(access(fstabFile, F_OK) == 0, return NULL, "Failed get fstab.required"); in LoadRequiredFstab()
|
/base/security/permission_lite/ |
D | README.md | 5 …he sandboxes provide some APIs to implement specific functionalities. To access these APIs across … 9 …services and apps to define new permissions for their sensitive APIs. To access these APIs, other … 11 …stem or other applications. Upon obtaining the permissions, the apps can access the sensitive APIs… 47 … char *permissionName) | Checks whether an app has the permission to access system service API… 48 …rmissionName) | Checks whether the caller has the permission to access system service API… 62 …s params, PolicyTrans **policies, unsigned int *policyNum) | Obtains the access policies for a ser… 63 … params) | Checks whether a process has the permission to access an API of another … 180 …access policy in the header file **base/security/permission\_lite/services/ipc\_auth/include/polic… 182 …- **RANGE**: allows access from the processes with UIDs in the specified range. **uidMin** and **u… 183 …- **FIXED**: allows access from the processes with the specified UIDs. **fixedUid** must be specif… [all …]
|
/base/security/selinux_adapter/test/unittest/common/ |
D | test_common.cpp | 36 if (access(subPath.c_str(), F_OK) != 0) { in CreateDirectory() 43 return access(path.c_str(), F_OK) == 0; in CreateDirectory() 54 if (access(path.c_str(), F_OK) != 0) { in RemoveDirectory() 100 if (access(path.c_str(), F_OK) != 0) { in CreateFile() 108 return access(path.c_str(), F_OK) == 0; in CreateFile()
|
/base/security/selinux_adapter/interfaces/policycoreutils/src/ |
D | load_policy.cpp | 58 if (access(file.c_str(), R_OK) != 0) { in ReadFileFirstLine() 84 if ((policyFile == COMPILE_OUTPUT_POLICY) && (access(policyFile.c_str(), R_OK) == 0)) { in DeleteTmpPolicyFile() 211 if (access(path.c_str(), F_OK) == 0) { in GetVersionPolicy() 221 if (access(PUBLIC_CIL, F_OK) == 0) { in GetPublicPolicy() 341 if (access(SYSTEM_CIL, R_OK) != 0) { // no system.cil file in GetPolicyFile() 349 if (access(PRECOMPILED_POLICY, R_OK) == 0) { in GetPolicyFile() 354 if (access(BACKUP_PRECOMPILED_POLICY, R_OK) == 0) { in GetPolicyFile()
|
D | selinux_restorecon.c | 40 if (access(SYSTEM_FILE_CONTEXTS, R_OK) == 0) { in SetFileContextsHandle() 44 if (access(VENDOR_FILE_CONTEXTS, R_OK) == 0) { in SetFileContextsHandle()
|
/base/update/updateservice/services/startup/access/include/ |
D | access_manager.h | 37 virtual bool Register(AccessType type, const std::shared_ptr<IAccess> &access) = 0; 50 bool Register(AccessType type, const std::shared_ptr<IAccess> &access) final;
|
/base/update/updater/services/ui/driver/ |
D | surface_dev.cpp | 53 if (access(DRM_DEV_PATH, 0) == 0) { in GetDevType() 55 } else if (access(FB_DEV_PATH, 0) == 0) { in GetDevType()
|
/base/powermgr/thermal_manager/test/systemtest/src/ |
D | thermal_mgr_system_test.cpp | 211 if (access(VENDOR_CONFIG.c_str(), 0) != 0) { 250 if (access(VENDOR_CONFIG.c_str(), 0) != 0) { 289 if (access(VENDOR_CONFIG.c_str(), 0) != 0) { 328 if (access(VENDOR_CONFIG.c_str(), 0) != 0) { 369 if (access(VENDOR_CONFIG.c_str(), 0) != 0) { 390 if (access(VENDOR_CONFIG.c_str(), 0) != 0) { 428 if (access(VENDOR_CONFIG.c_str(), 0) != 0) { 448 if (access(VENDOR_CONFIG.c_str(), 0) != 0) { 486 if (access(VENDOR_CONFIG.c_str(), 0) != 0) { 507 if (access(VENDOR_CONFIG.c_str(), 0) != 0) { [all …]
|
/base/update/updater/services/ |
D | updater_utils.cpp | 137 if (!access(COMMAND_FILE, 0) && unlink(COMMAND_FILE) != 0) { in PostUpdater() 142 …if (access(UPDATER_PATH, 0) == 0 && access(SDCARD_CARD_PATH, 0) != 0 && !DeleteUpdaterPath(UPDATER… in PostUpdater() 145 if (access(SDCARD_CARD_PATH, 0) == 0 && !DeleteUpdaterPath(SDCARD_CARD_PATH)) { in PostUpdater() 148 if (access(Flashd::FLASHD_FILE_PATH, 0) == 0 && !DeleteUpdaterPath(Flashd::FLASHD_FILE_PATH)) { in PostUpdater()
|
/base/powermgr/battery_manager/charger/src/ |
D | power_supply_provider.cpp | 144 if (access(path.c_str(), F_OK) == 0) { in CreateFile() 161 if (access(sysLowercaseBatteryPath.c_str(), F_OK) == 0) { in InitBatteryPath() 166 if (access(sysCapitalBatteryPath.c_str(), F_OK) == 0) { in InitBatteryPath() 358 if (access(mockBatteryPath.c_str(), 0) == -1) { in InitDefaultSysfs() 363 if (access(mockChargerPath.c_str(), 0) == -1) { in InitDefaultSysfs() 368 if (access(mockTechPath.c_str(), 0) == -1) { in InitDefaultSysfs()
|
/base/startup/init/test/unittest/init/ |
D | cmds_unittest.cpp | 92 return access(mkdirFile, F_OK); in __anon529af18f0102() 151 int ret = access(testFile2, F_OK); 188 int ret = access(testFile1, F_OK); 193 ret = access(testFile1, F_OK); 227 int ret = access("/data/init_ut/test_cmd_dir0", F_OK);
|
/base/security/security_component_manager/interfaces/inner_api/enhance_kits/test/unittest/src/ |
D | sec_comp_enhance_test.cpp | 41 if (access(ENHANCE_INPUT_INTERFACE_LIB.c_str(), F_OK) == 0) { in SetUpTestCase() 45 if (access(ENHANCE_SRV_INTERFACE_LIB.c_str(), F_OK) == 0) { in SetUpTestCase()
|
/base/update/updater/services/ui/ |
D | updater_ui_env.cpp | 98 if (access(brightnessFile, R_OK | W_OK) != 0 || access(maxBrightnessFile, R_OK) != 0) { in InitBrightness()
|
/base/powermgr/thermal_manager/utils/native/src/ |
D | file_operation.cpp | 34 if (access(dir.c_str(), 0) != ERR_OK) { in CreateNodeDir() 50 if (access(filePath.c_str(), 0) != 0) { in CreateNodeFile()
|
/base/web/webview/test/unittest/ohos_adapter/ohos_resource_adapter_test/ |
D | ohos_resource_adapter_test.cpp | 132 if (access(NWEB_HAP_PATH.c_str(), F_OK) == 0) { 135 if (access(NWEB_HAP_PATH_1.c_str(), F_OK) == 0) { 176 if (access(NWEB_HAP_PATH.c_str(), F_OK) == 0) { 179 if (access(NWEB_HAP_PATH_1.c_str(), F_OK) == 0) {
|
/base/location/ |
D | README.en.md | 34 …base stations. This technology provides only a low accuracy and requires access to the cellular ne… 38 …access points \(APs\) and Bluetooth devices around the device. A high density of WLAN APs and Blue… 62 …access permission from the user even if the user has turned on the location function. The system w…
|
/base/security/selinux_adapter/sepolicy/base/public/ |
D | hap_domain.te | 85 #limit hap access vendor. 88 #hap never access blk_file. 91 #limit hap access dev file. 135 #limit access to system_core_hap_data_file 140 #limit access to system_basic_hap_data_file 145 #limit access to normal_hap_data_file_attr 173 # limit access to /data/(*)? first level.todo
|
/base/telephony/cellular_data/test/unit_test/ |
D | cellular_data_code_test.cpp | 329 if (access("/data/iface_tx_p", F_OK) == 0) { in TestDataPackageUp() 333 if (access("/data/iface_tx_p", F_OK) != 0) { in TestDataPackageUp() 342 if (access("/data/iface_rx_p", F_OK) == 0) { in TestDataPackageDown() 346 if (access("/data/iface_tx_p", F_OK) != 0) { in TestDataPackageDown() 355 if (access("/data/iface_tx_p", F_OK) == 0 || access("/data/iface_rx_p", F_OK) == 0) { in TestDataPackageUpDown()
|
/base/update/updater/services/package/pkg_manager/ |
D | pkg_utils.cpp | 104 if (access(path.c_str(), F_OK) == -1) { in GetFileSize() 113 ret = access(path.c_str(), R_OK ); in GetFileSize() 115 ret = access(path.c_str(), R_OK | W_OK); in GetFileSize() 138 if (access(path.c_str(), 0) != 0) { in GetFileSize()
|
/base/hiviewdfx/hitrace/test/unittest/hitrace_dump/ |
D | hitrace_dump_test.cpp | 99 if (access((debugfsDir + "trace_marker").c_str(), F_OK) != -1) { in SetUpTestCase() 101 } else if (access((tracefsDir + "trace_marker").c_str(), F_OK) != -1) { in SetUpTestCase() 323 ASSERT_TRUE(access(DEFAULT_OUTPUT_DIR.c_str(), F_OK) == 0) << "/data/log/hitrace not exists."; 353 ASSERT_TRUE(access(DEFAULT_OUTPUT_DIR.c_str(), F_OK) == 0) << "/data/log/hitrace not exists."; 370 …ASSERT_TRUE(access(outputFileName.c_str(), F_OK) < 0) << "The file was not deleted half an hour ag…
|
/base/hiviewdfx/hiview/service/unified_collection/ |
D | xcollect_service.cpp | 133 if (access(dirName.c_str(), F_OK) != 0) { in RemoveDir() 169 if (access(defaultParentDir.c_str(), F_OK) != 0) { in DumpTraceToDir() 170 if (access(logDir.c_str(), F_OK) != 0) { in DumpTraceToDir()
|
/base/security/selinux_adapter/ |
D | README-en.md | 5 … a set of kernel modifications and user-space tools supporting mandatory access control (MAC) base… 7 The flow of access control shown in following figure: 79 …missive is set to 0, the SELinux is running in enforcing mode and denies access based on SELinux p… 85 Obtain the access information based on the AVC message.
|