/base/security/access_token/interfaces/innerkits/accesstoken/test/unittest/src/ |
D | security_component_grant_test.cpp | 91 AccessTokenID tokenID = AccessTokenKit::GetHapTokenID(g_infoManagerTestInfoParms.userID, in SetUpTestCase() local 94 AccessTokenKit::DeleteToken(tokenID); in SetUpTestCase() 96 tokenID = AccessTokenKit::GetHapTokenID(TEST_USER_ID, TEST_BUNDLE_NAME, 0); in SetUpTestCase() 97 AccessTokenKit::DeleteToken(tokenID); in SetUpTestCase() 125 return tokenIdEx.tokenIdExStruct.tokenID; in AllocTestToken() 136 AccessTokenID tokenID = AllocTestToken(); variable 137 ASSERT_NE(tokenID, INVALID_TOKENID); 138 int32_t status = AccessTokenKit::VerifyAccessToken(tokenID, TEST_PERMISSION); 140 … int32_t res = AccessTokenKit::GrantPermission(tokenID, TEST_PERMISSION, PERMISSION_COMPONENT_SET); 143 res = AccessTokenKit::GetPermissionFlag(tokenID, TEST_PERMISSION, flag); [all …]
|
D | accesstoken_kit_test.cpp | 187 AccessTokenID tokenID = AccessTokenKit::GetHapTokenID(g_infoManagerTestInfoParms.userID, in SetUpTestCase() local 190 AccessTokenKit::DeleteToken(tokenID); in SetUpTestCase() 192 tokenID = AccessTokenKit::GetHapTokenID(g_infoManagerTestNormalInfoParms.userID, in SetUpTestCase() 195 AccessTokenKit::DeleteToken(tokenID); in SetUpTestCase() 197 tokenID = AccessTokenKit::GetHapTokenID(g_infoManagerTestSystemInfoParms.userID, in SetUpTestCase() 200 AccessTokenKit::DeleteToken(tokenID); in SetUpTestCase() 202 tokenID = AccessTokenKit::GetHapTokenID(TEST_USER_ID, TEST_BUNDLE_NAME, 0); in SetUpTestCase() 203 AccessTokenKit::DeleteToken(tokenID); in SetUpTestCase() 348 AccessTokenID tokenID = AccessTokenKit::GetHapTokenID(g_infoManagerTestInfoParms.userID, in SetUp() local 351 AccessTokenKit::DeleteToken(tokenID); in SetUp() [all …]
|
D | accesstoken_kit_extension_test.cpp | 287 AccessTokenID tokenID = AccessTokenKit::GetHapTokenID(g_infoManagerTestInfoParms.userID, in SetUpTestCase() local 290 AccessTokenKit::DeleteToken(tokenID); in SetUpTestCase() 292 tokenID = AccessTokenKit::GetHapTokenID(g_infoManagerTestNormalInfoParms.userID, in SetUpTestCase() 295 AccessTokenKit::DeleteToken(tokenID); in SetUpTestCase() 297 tokenID = AccessTokenKit::GetHapTokenID(g_infoManagerTestSystemInfoParms.userID, in SetUpTestCase() 300 AccessTokenKit::DeleteToken(tokenID); in SetUpTestCase() 302 tokenID = AccessTokenKit::GetHapTokenID(TEST_USER_ID, TEST_BUNDLE_NAME, 0); in SetUpTestCase() 303 AccessTokenKit::DeleteToken(tokenID); in SetUpTestCase() 448 AccessTokenID tokenID = AccessTokenKit::GetHapTokenID(g_infoManagerTestInfoParms.userID, in SetUp() local 451 AccessTokenKit::DeleteToken(tokenID); in SetUp() [all …]
|
/base/security/access_token/interfaces/innerkits/accesstoken/src/ |
D | accesstoken_kit.cpp | 74 …if ((tokenIdEx.tokenIdExStruct.tokenID == INVALID_TOKENID) || (!DataValidator::IsAppIDDescValid(ap… in UpdateHapToken() 83 int AccessTokenKit::DeleteToken(AccessTokenID tokenID) in DeleteToken() argument 85 ACCESSTOKEN_LOG_DEBUG(LABEL, "called, tokenID=%{public}d", tokenID); in DeleteToken() 86 if (tokenID == INVALID_TOKENID) { in DeleteToken() 90 return AccessTokenManagerClient::GetInstance().DeleteToken(tokenID); in DeleteToken() 93 ATokenTypeEnum AccessTokenKit::GetTokenType(AccessTokenID tokenID) in GetTokenType() argument 95 ACCESSTOKEN_LOG_DEBUG(LABEL, "called, tokenID=%{public}d", tokenID); in GetTokenType() 96 if (tokenID == INVALID_TOKENID) { in GetTokenType() 100 return AccessTokenManagerClient::GetInstance().GetTokenType(tokenID); in GetTokenType() 103 ATokenTypeEnum AccessTokenKit::GetTokenTypeFlag(AccessTokenID tokenID) in GetTokenTypeFlag() argument [all …]
|
D | accesstoken_manager_proxy.h | 43 int VerifyAccessToken(AccessTokenID tokenID, const std::string& permissionName) override; 45 … int GetDefPermissions(AccessTokenID tokenID, std::vector<PermissionDefParcel>& permList) override; 47 …AccessTokenID tokenID, std::vector<PermissionStateFullParcel>& reqPermList, bool isSystemGrant) ov… 48 …int GetPermissionFlag(AccessTokenID tokenID, const std::string& permissionName, int& flag) overrid… 49 … int GrantPermission(AccessTokenID tokenID, const std::string& permissionName, int flag) override; 50 … int RevokePermission(AccessTokenID tokenID, const std::string& permissionName, int flag) override; 52 int ClearUserGrantedPermissionState(AccessTokenID tokenID) override; 53 int GetTokenType(AccessTokenID tokenID) override; 54 int CheckNativeDCap(AccessTokenID tokenID, const std::string& dcap) override; 58 int DeleteToken(AccessTokenID tokenID) override; [all …]
|
D | accesstoken_manager_client.h | 46 int VerifyAccessToken(AccessTokenID tokenID, const std::string& permissionName); 48 int GetDefPermissions(AccessTokenID tokenID, std::vector<PermissionDef>& permList); 50 AccessTokenID tokenID, std::vector<PermissionStateFull>& reqPermList, bool isSystemGrant); 51 int GetPermissionFlag(AccessTokenID tokenID, const std::string& permissionName, int& flag); 53 int GrantPermission(AccessTokenID tokenID, const std::string& permissionName, int flag); 54 int RevokePermission(AccessTokenID tokenID, const std::string& permissionName, int flag); 55 int ClearUserGrantedPermissionState(AccessTokenID tokenID); 57 int DeleteToken(AccessTokenID tokenID); 58 ATokenTypeEnum GetTokenType(AccessTokenID tokenID); 59 int CheckNativeDCap(AccessTokenID tokenID, const std::string& dcap); [all …]
|
D | accesstoken_manager_client.cpp | 50 int AccessTokenManagerClient::VerifyAccessToken(AccessTokenID tokenID, const std::string& permissio… in VerifyAccessToken() argument 57 return proxy->VerifyAccessToken(tokenID, permissionName); in VerifyAccessToken() 74 int AccessTokenManagerClient::GetDefPermissions(AccessTokenID tokenID, std::vector<PermissionDef>& … in GetDefPermissions() argument 82 int result = proxy->GetDefPermissions(tokenID, parcelList); in GetDefPermissions() 91 AccessTokenID tokenID, std::vector<PermissionStateFull>& reqPermList, bool isSystemGrant) in GetReqPermissions() argument 99 int result = proxy->GetReqPermissions(tokenID, parcelList, isSystemGrant); in GetReqPermissions() 107 int AccessTokenManagerClient::GetPermissionFlag(AccessTokenID tokenID, const std::string& permissio… in GetPermissionFlag() argument 114 return proxy->GetPermissionFlag(tokenID, permissionName, flag); in GetPermissionFlag() 147 int AccessTokenManagerClient::GrantPermission(AccessTokenID tokenID, const std::string& permissionN… in GrantPermission() argument 154 return proxy->GrantPermission(tokenID, permissionName, flag); in GrantPermission() [all …]
|
/base/security/access_token/ |
D | README_zh.md | 58 …nIDEx AllocHapToken(const HapInfoParams& info, const HapPolicyParams& policy); | 为应用进程分配一个tokenID | 59 …okenID(const std::string& remoteDeviceID, AccessTokenID remoteTokenID); | 为远端设备的应用进程分配一个本地tokenID | 61 | int DeleteToken(AccessTokenID tokenID); | 删除应用tokenID及其对应的tokenInfo信息 | 62 | int GetTokenType(AccessTokenID tokenID); | 查询指定tokenID的类型 | 63 | int GetTokenTypeFlag(AccessTokenID tokenID); | 查询指定可信tokenID的类型 | 64 | int GetTokenType(FullTokenID tokenID); | 查询指定tokenID的类型 | 65 | int GetTokenTypeFlag(FullTokenID tokenID); | 查询指定可信tokenID的类型 | 66 | int CheckNativeDCap(AccessTokenID tokenID, const std::string& dcap); | 检测指定tokenID对应的native进程是否具有… 69 | int GetHapTokenInfo(AccessTokenID tokenID, HapTokenInfo& hapTokenInfoRes); | 查询指定tokenID对应的hap包的t… 70 | int GetNativeTokenInfo(AccessTokenID tokenID, NativeTokenInfo& nativeTokenInfoRes); | 查询指定tokenID… [all …]
|
/base/security/access_token/interfaces/innerkits/accesstoken/include/ |
D | accesstoken_kit.h | 93 static int DeleteToken(AccessTokenID tokenID); 99 static ATokenTypeEnum GetTokenType(AccessTokenID tokenID); 105 static ATokenTypeEnum GetTokenTypeFlag(AccessTokenID tokenID); 111 static ATokenTypeEnum GetTokenType(FullTokenID tokenID); 118 static ATokenTypeEnum GetTokenTypeFlag(FullTokenID tokenID); 125 static int CheckNativeDCap(AccessTokenID tokenID, const std::string& dcap); 148 static int GetHapTokenInfo(AccessTokenID tokenID, HapTokenInfo& hapTokenInfoRes); 155 static int GetNativeTokenInfo(AccessTokenID tokenID, NativeTokenInfo& nativeTokenInfoRes); 162 static int VerifyAccessToken(AccessTokenID tokenID, const std::string& permissionName); 185 static int GetDefPermissions(AccessTokenID tokenID, std::vector<PermissionDef>& permList); [all …]
|
/base/security/access_token/interfaces/innerkits/privacy/src/ |
D | privacy_kit.cpp | 34 int32_t PrivacyKit::AddPermissionUsedRecord(AccessTokenID tokenID, const std::string& permissionNam… in AddPermissionUsedRecord() argument 38 tokenID, permissionName.c_str()); in AddPermissionUsedRecord() 39 …if (!DataValidator::IsTokenIDValid(tokenID) || !DataValidator::IsPermissionNameValid(permissionNam… in AddPermissionUsedRecord() 45 tokenID, permissionName, successCount, failCount, asyncMode); in AddPermissionUsedRecord() 48 int32_t PrivacyKit::StartUsingPermission(AccessTokenID tokenID, const std::string& permissionName) in StartUsingPermission() argument 51 tokenID, permissionName.c_str()); in StartUsingPermission() 52 …if (!DataValidator::IsTokenIDValid(tokenID) || !DataValidator::IsPermissionNameValid(permissionNam… in StartUsingPermission() 56 return PrivacyManagerClient::GetInstance().StartUsingPermission(tokenID, permissionName); in StartUsingPermission() 59 int32_t PrivacyKit::StartUsingPermission(AccessTokenID tokenID, const std::string& permissionName, in StartUsingPermission() argument 63 tokenID, permissionName.c_str()); in StartUsingPermission() [all …]
|
/base/security/access_token/services/accesstokenmanager/main/cpp/src/service/ |
D | accesstoken_manager_service.cpp | 107 int AccessTokenManagerService::VerifyAccessToken(AccessTokenID tokenID, const std::string& permissi… in VerifyAccessToken() argument 112 int32_t res = PermissionManager::GetInstance().VerifyAccessToken(tokenID, permissionName); in VerifyAccessToken() 114 tokenID, permissionName.c_str(), res); in VerifyAccessToken() 128 int AccessTokenManagerService::GetDefPermissions(AccessTokenID tokenID, std::vector<PermissionDefPa… in GetDefPermissions() argument 130 ACCESSTOKEN_LOG_INFO(LABEL, "tokenID: 0x%{public}x", tokenID); in GetDefPermissions() 132 int ret = PermissionManager::GetInstance().GetDefPermissions(tokenID, permVec); in GetDefPermissions() 142 AccessTokenID tokenID, std::vector<PermissionStateFullParcel>& reqPermList, bool isSystemGrant) in GetReqPermissions() argument 144 …ACCESSTOKEN_LOG_INFO(LABEL, "tokenID: 0x%{public}x, isSystemGrant: %{public}d", tokenID, isSystemG… in GetReqPermissions() 147 int ret = PermissionManager::GetInstance().GetReqPermissions(tokenID, permList, isSystemGrant); in GetReqPermissions() 216 int AccessTokenManagerService::GetPermissionFlag(AccessTokenID tokenID, const std::string& permissi… in GetPermissionFlag() argument [all …]
|
/base/security/access_token/frameworks/accesstoken/include/ |
D | i_accesstoken_manager.h | 47 virtual int VerifyAccessToken(AccessTokenID tokenID, const std::string& permissionName) = 0; 49 …virtual int GetDefPermissions(AccessTokenID tokenID, std::vector<PermissionDefParcel>& permList) =… 51 …AccessTokenID tokenID, std::vector<PermissionStateFullParcel>& reqPermList, bool isSystemGrant) = … 52 …virtual int GetPermissionFlag(AccessTokenID tokenID, const std::string& permissionName, int& flag)… 55 …virtual int GrantPermission(AccessTokenID tokenID, const std::string& permissionName, int flag) = … 56 …virtual int RevokePermission(AccessTokenID tokenID, const std::string& permissionName, int flag) =… 57 virtual int ClearUserGrantedPermissionState(AccessTokenID tokenID) = 0; 59 virtual int DeleteToken(AccessTokenID tokenID) = 0; 60 virtual int GetTokenType(AccessTokenID tokenID) = 0; 61 virtual int CheckNativeDCap(AccessTokenID tokenID, const std::string& dcap) = 0; [all …]
|
/base/security/access_token/interfaces/innerkits/tokensync/src/ |
D | token_sync_kit.cpp | 34 int TokenSyncKit::GetRemoteHapTokenInfo(const std::string& deviceID, AccessTokenID tokenID) in GetRemoteHapTokenInfo() argument 37 __func__, ConstantCommon::EncryptDevId(deviceID).c_str(), tokenID); in GetRemoteHapTokenInfo() 38 return TokenSyncManagerClient::GetInstance().GetRemoteHapTokenInfo(deviceID, tokenID); in GetRemoteHapTokenInfo() 41 int TokenSyncKit::DeleteRemoteHapTokenInfo(AccessTokenID tokenID) in DeleteRemoteHapTokenInfo() argument 43 ACCESSTOKEN_LOG_INFO(LABEL, "%{public}s called, tokenID=%{public}d", __func__, tokenID); in DeleteRemoteHapTokenInfo() 44 return TokenSyncManagerClient::GetInstance().DeleteRemoteHapTokenInfo(tokenID); in DeleteRemoteHapTokenInfo() 49 …OKEN_LOG_INFO(LABEL, "%{public}s called tokenID=%{public}d", __func__, tokenInfo.baseInfo.tokenID); in UpdateRemoteHapTokenInfo()
|
/base/security/access_token/services/accesstokenmanager/main/cpp/include/service/ |
D | accesstoken_manager_service.h | 44 int VerifyAccessToken(AccessTokenID tokenID, const std::string& permissionName) override; 46 … int GetDefPermissions(AccessTokenID tokenID, std::vector<PermissionDefParcel>& permList) override; 48 …AccessTokenID tokenID, std::vector<PermissionStateFullParcel>& reqPermList, bool isSystemGrant) ov… 51 …int GetPermissionFlag(AccessTokenID tokenID, const std::string& permissionName, int& flag) overrid… 52 … int GrantPermission(AccessTokenID tokenID, const std::string& permissionName, int flag) override; 53 … int RevokePermission(AccessTokenID tokenID, const std::string& permissionName, int flag) override; 54 int ClearUserGrantedPermissionState(AccessTokenID tokenID) override; 55 int DeleteToken(AccessTokenID tokenID) override; 56 int GetTokenType(AccessTokenID tokenID) override; 57 int CheckNativeDCap(AccessTokenID tokenID, const std::string& dcap) override; [all …]
|
/base/security/access_token/services/accesstokenmanager/main/cpp/src/token/ |
D | token_modify_notifier.cpp | 36 void TokenModifyNotifier::AddHapTokenObservation(AccessTokenID tokenID) in AddHapTokenObservation() argument 38 if (AccessTokenIDManager::GetInstance().GetTokenIdType(tokenID) != TOKEN_HAP) { in AddHapTokenObservation() 43 if (observationSet_.count(tokenID) <= 0) { in AddHapTokenObservation() 44 observationSet_.insert(tokenID); in AddHapTokenObservation() 48 void TokenModifyNotifier::NotifyTokenDelete(AccessTokenID tokenID) in NotifyTokenDelete() argument 51 if (observationSet_.count(tokenID) <= 0) { in NotifyTokenDelete() 55 observationSet_.erase(tokenID); in NotifyTokenDelete() 56 deleteTokenList_.emplace_back(tokenID); in NotifyTokenDelete() 60 void TokenModifyNotifier::NotifyTokenModify(AccessTokenID tokenID) in NotifyTokenModify() argument 63 if (observationSet_.count(tokenID) <= 0) { in NotifyTokenModify() [all …]
|
/base/security/access_token/services/accesstokenmanager/main/cpp/include/permission/ |
D | permission_manager.h | 51 void RemoveDefPermissions(AccessTokenID tokenID); 52 int VerifyNativeAccessToken(AccessTokenID tokenID, const std::string& permissionName); 53 int VerifyHapAccessToken(AccessTokenID tokenID, const std::string& permissionName); 54 virtual int VerifyAccessToken(AccessTokenID tokenID, const std::string& permissionName); 56 int GetDefPermissions(AccessTokenID tokenID, std::vector<PermissionDef>& permList); 58 AccessTokenID tokenID, std::vector<PermissionStateFull>& reqPermList, bool isSystemGrant); 59 int GetPermissionFlag(AccessTokenID tokenID, const std::string& permissionName, int& flag); 60 int32_t GrantPermission(AccessTokenID tokenID, const std::string& permissionName, int flag); 61 int32_t RevokePermission(AccessTokenID tokenID, const std::string& permissionName, int flag); 62 void ClearUserGrantedPermissionState(AccessTokenID tokenID); [all …]
|
/base/notification/distributed_notification_service/services/ans/test/unittest/access_token_helper_test/ |
D | access_token_helper_test.cpp | 69 AccessTokenID tokenID = 0; variable 71 EXPECT_TRUE(stub_->VerifyCallerPermission(tokenID, permission)); 81 AccessTokenID tokenID = 0; variable 83 EXPECT_TRUE(stub_->VerifyNativeToken(tokenID)); 115 AccessTokenID tokenID = 0; variable 118 EXPECT_TRUE(stub_->IsDlpHap(tokenID)); 128 AccessTokenID tokenID = 0; variable 131 EXPECT_FALSE(stub_->IsDlpHap(tokenID));
|
/base/security/security_component_manager/services/security_component_service/sa/test/mock/include/ |
D | accesstoken_kit.h | 29 static int RevokePermission(AccessTokenID tokenID, const std::string& permissionName, int flag) in RevokePermission() argument 34 static int GrantPermission(AccessTokenID tokenID, const std::string& permissionName, int flag) in GrantPermission() argument 39 static int GetHapTokenInfo(AccessTokenID tokenID, HapTokenInfo& hapTokenInfoRes) in GetHapTokenInfo() argument 49 static ATokenTypeEnum GetTokenTypeFlag(AccessTokenID tokenID) in GetTokenTypeFlag() argument 51 AccessTokenIDInner *idInner = reinterpret_cast<AccessTokenIDInner *>(&tokenID); in GetTokenTypeFlag()
|
/base/security/access_token/services/accesstokenmanager/test/unittest/cpp/src/ |
D | permission_manager_test.cpp | 323 AccessTokenID tokenID = tokenIdEx.tokenIdExStruct.tokenID; variable 325 tokenID, "ohos.permission.CAPTURE_SCREEN"); 328 tokenID, "ohos.permission.CHANGE_ABILITY_ENABLED_STATE"); 331 tokenID, "ohos.permission.CLEAN_APPLICATION_DATA"); 334 tokenID, "ohos.permission.COMMONEVENT_STICKY"); 337 ret = AccessTokenInfoManager::GetInstance().RemoveHapTokenInfo(tokenID); 377 AccessTokenID tokenID = tokenIdEx.tokenIdExStruct.tokenID; variable 379 tokenID, "ohos.permission.CAPTURE_SCREEN"); 382 tokenID, "ohos.permission.CHANGE_ABILITY_ENABLED_STATE"); 385 tokenID, "ohos.permission.CLEAN_APPLICATION_DATA"); [all …]
|
D | native_token_receptor_test.cpp | 271 .tokenID = 0x28100000, 280 int ret = AccessTokenInfoManager::GetInstance().GetNativeTokenInfo(info.tokenID, findInfo); 285 ASSERT_EQ(findInfo.tokenID, info.tokenID); 299 if (tokenId != info.tokenID) { 307 ASSERT_EQ(native->GetTokenID(), info.tokenID); 312 ret = AccessTokenInfoManager::GetInstance().RemoveNativeTokenInfo(info.tokenID); 336 .tokenID = 0x28100000, 344 int ret = AccessTokenInfoManager::GetInstance().GetNativeTokenInfo(info.tokenID, findInfo); 349 ASSERT_EQ(findInfo.tokenID, info.tokenID); 354 …ASSERT_EQ(AccessTokenInfoManager::GetInstance().CheckNativeDCap(findInfo.tokenID, dcap), RET_SUCCE… [all …]
|
D | permission_grant_event_test.cpp | 53 AccessTokenID tokenID = 0x100000; variable 58 eventHandler.AddEvent(tokenID, permissionName, time); 75 AccessTokenID tokenID = 0x100000; variable 80 eventHandler.AddEvent(tokenID, permissionName, time); 97 AccessTokenID tokenID = 0x100000; variable 102 eventHandler.AddEvent(tokenID, permissionName, time);
|
/base/inputmethod/imf/services/src/ |
D | bundle_checker.cpp | 53 bool BundleChecker::IsCurrentIme(uint32_t tokenID, const std::string ¤tIme) in IsCurrentIme() argument 55 std::string bundleName = GetBundleNameByToken(tokenID); in IsCurrentIme() 68 bool BundleChecker::CheckPermission(uint32_t tokenID, const std::string &permission) in CheckPermission() argument 70 if (AccessTokenKit::VerifyAccessToken(tokenID, permission) != PERMISSION_GRANTED) { in CheckPermission() 78 std::string BundleChecker::GetBundleNameByToken(uint32_t tokenID) in GetBundleNameByToken() argument 80 auto tokenType = AccessTokenKit::GetTokenTypeFlag(tokenID); in GetBundleNameByToken() 86 int ret = AccessTokenKit::GetHapTokenInfo(tokenID, info); in GetBundleNameByToken()
|
/base/security/access_token/interfaces/innerkits/privacy/include/ |
D | privacy_kit.h | 66 static int32_t AddPermissionUsedRecord(AccessTokenID tokenID, const std::string& permissionName, 74 static int32_t StartUsingPermission(AccessTokenID tokenID, const std::string& permissionName); 84 static int32_t StartUsingPermission(AccessTokenID tokenID, const std::string& permissionName, 92 static int32_t StopUsingPermission(AccessTokenID tokenID, const std::string& permissionName); 99 static int32_t RemovePermissionUsedRecords(AccessTokenID tokenID, const std::string& deviceID); 133 static bool IsAllowedUsingPermission(AccessTokenID tokenID, const std::string& permissionName);
|
/base/security/access_token/frameworks/privacy/include/ |
D | i_privacy_manager.h | 43 … virtual int32_t AddPermissionUsedRecord(AccessTokenID tokenID, const std::string& permissionName, 45 …virtual int32_t StartUsingPermission(AccessTokenID tokenID, const std::string& permissionName) = 0; 46 virtual int32_t StartUsingPermission(AccessTokenID tokenID, const std::string& permissionName, 48 … virtual int32_t StopUsingPermission(AccessTokenID tokenID, const std::string& permissionName) = 0; 49 …virtual int32_t RemovePermissionUsedRecords(AccessTokenID tokenID, const std::string& deviceID) = … 57 …virtual bool IsAllowedUsingPermission(AccessTokenID tokenID, const std::string& permissionName) = …
|
/base/security/access_token/services/accesstokenmanager/main/cpp/src/permission/ |
D | permission_manager.cpp | 132 void PermissionManager::RemoveDefPermissions(AccessTokenID tokenID) in RemoveDefPermissions() argument 134 ACCESSTOKEN_LOG_INFO(LABEL, "%{public}s called, tokenID: %{public}u", __func__, tokenID); in RemoveDefPermissions() 136 AccessTokenInfoManager::GetInstance().GetHapTokenInfoInner(tokenID); in RemoveDefPermissions() 138 ACCESSTOKEN_LOG_ERROR(LABEL, "invalid params(tokenID: %{public}u)!", tokenID); in RemoveDefPermissions() 145 int PermissionManager::VerifyHapAccessToken(AccessTokenID tokenID, const std::string& permissionNam… in VerifyHapAccessToken() argument 148 AccessTokenInfoManager::GetInstance().GetHapTokenInfoInner(tokenID); in VerifyHapAccessToken() 162 int PermissionManager::VerifyNativeAccessToken(AccessTokenID tokenID, const std::string& permission… in VerifyNativeAccessToken() argument 165 AccessTokenInfoManager::GetInstance().GetNativeTokenInfoInner(tokenID); in VerifyNativeAccessToken() 187 AccessTokenInfoManager::GetInstance().GetNativePermissionPolicySet(tokenID); in VerifyNativeAccessToken() 196 int PermissionManager::VerifyAccessToken(AccessTokenID tokenID, const std::string& permissionName) in VerifyAccessToken() argument [all …]
|