Home
last modified time | relevance | path

Searched refs:access (Results 1 – 25 of 141) sorted by relevance

123456

/base/update/updateservice/services/startup/access/src/
Daccess_manager.cpp42 for (auto &[type, access] : accessMap_) { in IsIdle()
43 if (access != nullptr && !access->IsIdle()) { in IsIdle()
55 for (auto &[type, access] : accessMap_) { in GetScheduleTasks()
56 if (access != nullptr) { in GetScheduleTasks()
57 std::vector<ScheduleTask> tasks = access->GetScheduleTasks(); in GetScheduleTasks()
68 for (auto &[type, access] : accessMap_) { in Exit()
69 if (access != nullptr && !access->Exit()) { in Exit()
76 bool AccessManager::Register(AccessType type, const std::shared_ptr<IAccess> &access) in Register() argument
78 if (access == nullptr) { in Register()
84 accessMap_[type] = access; in Register()
/base/update/updateservice/services/startup/
Dstartup.gni23 "$startup_root_path/access/include",
28 "$startup_root_path/access/src/access_factory.cpp",
29 "$startup_root_path/access/src/access_manager.cpp",
30 "$startup_root_path/access/src/default_access.cpp",
31 "$startup_root_path/access/src/firmware_access.cpp",
/base/security/access_token/
DREADME.md6 AccessTokenManager (ATM) implements unified app permission management based on access tokens on Ope…
8access token information of an app includes the app identifier (**APPID**), user ID, app twin inde…
12 - Obtaining access token information (for example, APL) based on the token ID.
25 │ └── tokensync # Code of the access token synchronization framework.
28 │ │ ├── accesstoken # Code of the internal access token interfaces.
33 │ │ └── tokensync # Code of the internal access token synchronization interfaces.
35 │ │ ├── accesstoken # Code of the external access token interfaces.
41 └── tokensyncmanager # Code of the access token synchronization service.
54 | int GetTokenType(AccessTokenID tokenID); | Obtains the type of an access token.|
56 | int GetTokenType(FullTokenID tokenID); | Obtains the type of an access token.|
[all …]
/base/startup/init/services/init/standard/
Dinit_mount.c42 INIT_CHECK(access(fstabFile, F_OK) == 0, fstabFile = "/system/etc/fstab.required"); in LoadRequiredFstab()
43 INIT_ERROR_CHECK(access(fstabFile, F_OK) == 0, return NULL, "Failed get fstab.required"); in LoadRequiredFstab()
/base/security/permission_lite/
DREADME.md5 …he sandboxes provide some APIs to implement specific functionalities. To access these APIs across …
9 …services and apps to define new permissions for their sensitive APIs. To access these APIs, other …
11 …stem or other applications. Upon obtaining the permissions, the apps can access the sensitive APIs…
47 … char *permissionName) | Checks whether an app has the permission to access system service API…
48 …rmissionName) | Checks whether the caller has the permission to access system service API…
62 …s params, PolicyTrans **policies, unsigned int *policyNum) | Obtains the access policies for a ser…
63 … params) | Checks whether a process has the permission to access an API of another …
180access policy in the header file **base/security/permission\_lite/services/ipc\_auth/include/polic…
182 …- **RANGE**: allows access from the processes with UIDs in the specified range. **uidMin** and **u…
183 …- **FIXED**: allows access from the processes with the specified UIDs. **fixedUid** must be specif…
[all …]
/base/security/selinux_adapter/test/unittest/common/
Dtest_common.cpp36 if (access(subPath.c_str(), F_OK) != 0) { in CreateDirectory()
43 return access(path.c_str(), F_OK) == 0; in CreateDirectory()
54 if (access(path.c_str(), F_OK) != 0) { in RemoveDirectory()
100 if (access(path.c_str(), F_OK) != 0) { in CreateFile()
108 return access(path.c_str(), F_OK) == 0; in CreateFile()
/base/security/selinux_adapter/interfaces/policycoreutils/src/
Dload_policy.cpp58 if (access(file.c_str(), R_OK) != 0) { in ReadFileFirstLine()
84 if ((policyFile == COMPILE_OUTPUT_POLICY) && (access(policyFile.c_str(), R_OK) == 0)) { in DeleteTmpPolicyFile()
211 if (access(path.c_str(), F_OK) == 0) { in GetVersionPolicy()
221 if (access(PUBLIC_CIL, F_OK) == 0) { in GetPublicPolicy()
341 if (access(SYSTEM_CIL, R_OK) != 0) { // no system.cil file in GetPolicyFile()
349 if (access(PRECOMPILED_POLICY, R_OK) == 0) { in GetPolicyFile()
354 if (access(BACKUP_PRECOMPILED_POLICY, R_OK) == 0) { in GetPolicyFile()
Dselinux_restorecon.c40 if (access(SYSTEM_FILE_CONTEXTS, R_OK) == 0) { in SetFileContextsHandle()
44 if (access(VENDOR_FILE_CONTEXTS, R_OK) == 0) { in SetFileContextsHandle()
/base/update/updateservice/services/startup/access/include/
Daccess_manager.h37 virtual bool Register(AccessType type, const std::shared_ptr<IAccess> &access) = 0;
50 bool Register(AccessType type, const std::shared_ptr<IAccess> &access) final;
/base/update/updater/services/ui/driver/
Dsurface_dev.cpp53 if (access(DRM_DEV_PATH, 0) == 0) { in GetDevType()
55 } else if (access(FB_DEV_PATH, 0) == 0) { in GetDevType()
/base/powermgr/thermal_manager/test/systemtest/src/
Dthermal_mgr_system_test.cpp211 if (access(VENDOR_CONFIG.c_str(), 0) != 0) {
250 if (access(VENDOR_CONFIG.c_str(), 0) != 0) {
289 if (access(VENDOR_CONFIG.c_str(), 0) != 0) {
328 if (access(VENDOR_CONFIG.c_str(), 0) != 0) {
369 if (access(VENDOR_CONFIG.c_str(), 0) != 0) {
390 if (access(VENDOR_CONFIG.c_str(), 0) != 0) {
428 if (access(VENDOR_CONFIG.c_str(), 0) != 0) {
448 if (access(VENDOR_CONFIG.c_str(), 0) != 0) {
486 if (access(VENDOR_CONFIG.c_str(), 0) != 0) {
507 if (access(VENDOR_CONFIG.c_str(), 0) != 0) {
[all …]
/base/update/updater/services/
Dupdater_utils.cpp137 if (!access(COMMAND_FILE, 0) && unlink(COMMAND_FILE) != 0) { in PostUpdater()
142 …if (access(UPDATER_PATH, 0) == 0 && access(SDCARD_CARD_PATH, 0) != 0 && !DeleteUpdaterPath(UPDATER… in PostUpdater()
145 if (access(SDCARD_CARD_PATH, 0) == 0 && !DeleteUpdaterPath(SDCARD_CARD_PATH)) { in PostUpdater()
148 if (access(Flashd::FLASHD_FILE_PATH, 0) == 0 && !DeleteUpdaterPath(Flashd::FLASHD_FILE_PATH)) { in PostUpdater()
/base/powermgr/battery_manager/charger/src/
Dpower_supply_provider.cpp144 if (access(path.c_str(), F_OK) == 0) { in CreateFile()
161 if (access(sysLowercaseBatteryPath.c_str(), F_OK) == 0) { in InitBatteryPath()
166 if (access(sysCapitalBatteryPath.c_str(), F_OK) == 0) { in InitBatteryPath()
358 if (access(mockBatteryPath.c_str(), 0) == -1) { in InitDefaultSysfs()
363 if (access(mockChargerPath.c_str(), 0) == -1) { in InitDefaultSysfs()
368 if (access(mockTechPath.c_str(), 0) == -1) { in InitDefaultSysfs()
/base/startup/init/test/unittest/init/
Dcmds_unittest.cpp92 return access(mkdirFile, F_OK); in __anon529af18f0102()
151 int ret = access(testFile2, F_OK);
188 int ret = access(testFile1, F_OK);
193 ret = access(testFile1, F_OK);
227 int ret = access("/data/init_ut/test_cmd_dir0", F_OK);
/base/security/security_component_manager/interfaces/inner_api/enhance_kits/test/unittest/src/
Dsec_comp_enhance_test.cpp41 if (access(ENHANCE_INPUT_INTERFACE_LIB.c_str(), F_OK) == 0) { in SetUpTestCase()
45 if (access(ENHANCE_SRV_INTERFACE_LIB.c_str(), F_OK) == 0) { in SetUpTestCase()
/base/update/updater/services/ui/
Dupdater_ui_env.cpp98 if (access(brightnessFile, R_OK | W_OK) != 0 || access(maxBrightnessFile, R_OK) != 0) { in InitBrightness()
/base/powermgr/thermal_manager/utils/native/src/
Dfile_operation.cpp34 if (access(dir.c_str(), 0) != ERR_OK) { in CreateNodeDir()
50 if (access(filePath.c_str(), 0) != 0) { in CreateNodeFile()
/base/web/webview/test/unittest/ohos_adapter/ohos_resource_adapter_test/
Dohos_resource_adapter_test.cpp132 if (access(NWEB_HAP_PATH.c_str(), F_OK) == 0) {
135 if (access(NWEB_HAP_PATH_1.c_str(), F_OK) == 0) {
176 if (access(NWEB_HAP_PATH.c_str(), F_OK) == 0) {
179 if (access(NWEB_HAP_PATH_1.c_str(), F_OK) == 0) {
/base/location/
DREADME.en.md34 …base stations. This technology provides only a low accuracy and requires access to the cellular ne…
38access points \(APs\) and Bluetooth devices around the device. A high density of WLAN APs and Blue…
62access permission from the user even if the user has turned on the location function. The system w…
/base/security/selinux_adapter/sepolicy/base/public/
Dhap_domain.te85 #limit hap access vendor.
88 #hap never access blk_file.
91 #limit hap access dev file.
135 #limit access to system_core_hap_data_file
140 #limit access to system_basic_hap_data_file
145 #limit access to normal_hap_data_file_attr
173 # limit access to /data/(*)? first level.todo
/base/telephony/cellular_data/test/unit_test/
Dcellular_data_code_test.cpp329 if (access("/data/iface_tx_p", F_OK) == 0) { in TestDataPackageUp()
333 if (access("/data/iface_tx_p", F_OK) != 0) { in TestDataPackageUp()
342 if (access("/data/iface_rx_p", F_OK) == 0) { in TestDataPackageDown()
346 if (access("/data/iface_tx_p", F_OK) != 0) { in TestDataPackageDown()
355 if (access("/data/iface_tx_p", F_OK) == 0 || access("/data/iface_rx_p", F_OK) == 0) { in TestDataPackageUpDown()
/base/update/updater/services/package/pkg_manager/
Dpkg_utils.cpp104 if (access(path.c_str(), F_OK) == -1) { in GetFileSize()
113 ret = access(path.c_str(), R_OK ); in GetFileSize()
115 ret = access(path.c_str(), R_OK | W_OK); in GetFileSize()
138 if (access(path.c_str(), 0) != 0) { in GetFileSize()
/base/hiviewdfx/hitrace/test/unittest/hitrace_dump/
Dhitrace_dump_test.cpp99 if (access((debugfsDir + "trace_marker").c_str(), F_OK) != -1) { in SetUpTestCase()
101 } else if (access((tracefsDir + "trace_marker").c_str(), F_OK) != -1) { in SetUpTestCase()
323 ASSERT_TRUE(access(DEFAULT_OUTPUT_DIR.c_str(), F_OK) == 0) << "/data/log/hitrace not exists.";
353 ASSERT_TRUE(access(DEFAULT_OUTPUT_DIR.c_str(), F_OK) == 0) << "/data/log/hitrace not exists.";
370 …ASSERT_TRUE(access(outputFileName.c_str(), F_OK) < 0) << "The file was not deleted half an hour ag…
/base/hiviewdfx/hiview/service/unified_collection/
Dxcollect_service.cpp133 if (access(dirName.c_str(), F_OK) != 0) { in RemoveDir()
169 if (access(defaultParentDir.c_str(), F_OK) != 0) { in DumpTraceToDir()
170 if (access(logDir.c_str(), F_OK) != 0) { in DumpTraceToDir()
/base/security/selinux_adapter/
DREADME-en.md5 … a set of kernel modifications and user-space tools supporting mandatory access control (MAC) base…
7 The flow of access control shown in following figure:
79 …missive is set to 0, the SELinux is running in enforcing mode and denies access based on SELinux p…
85 Obtain the access information based on the AVC message.

123456