| /base/powermgr/power_manager/utils/permission/src/ |
| D | permission.cpp | 82 bool Permission::IsPermissionGranted(const std::string& perm) in IsPermissionGranted() argument 88 …POWER_HILOGD(COMP_UTILS, "checking permission, perm=%{public}s type=%{public}d, pid=%{public}d, ui… in IsPermissionGranted() 89 perm.c_str(), static_cast<int32_t>(type), pid, uid); in IsPermissionGranted() 93 result = AccessTokenKit::VerifyAccessToken(tokenId, perm); in IsPermissionGranted() 106 …POWER_HILOGW(COMP_UTILS, "permission denied, perm=%{public}s type=%{public}d, pid=%{public}d, uid=… in IsPermissionGranted() 107 perm.c_str(), static_cast<int32_t>(type), pid, uid); in IsPermissionGranted() 113 bool Permission::IsNativePermissionGranted(const std::string& perm) in IsNativePermissionGranted() argument 119 …POWER_HILOGD(COMP_UTILS, "checking permission, perm=%{public}s type=%{public}d, pid=%{public}d, ui… in IsNativePermissionGranted() 120 perm.c_str(), static_cast<int32_t>(type), pid, uid); in IsNativePermissionGranted() 128 result = AccessTokenKit::VerifyAccessToken(tokenId, perm); in IsNativePermissionGranted() [all …]
|
| /base/security/access_token/tools/accesstoken/src/ |
| D | to_string.cpp | 53 for (const auto& perm : permissionRecords) { in PermissionUsedRecordToString() local 56 infos.append(R"( "permissionName": ")" + perm.permissionName + R"(")" + ",\n"); in PermissionUsedRecordToString() 57 … infos.append(R"( "accessCount": ")" + std::to_string(perm.accessCount) + R"(")" + ",\n"); in PermissionUsedRecordToString() 58 …infos.append(R"( "secAccessCount": ")" + std::to_string(perm.secAccessCount) + R"(")" + "… in PermissionUsedRecordToString() 59 infos.append(R"( "rejectCount": )" + std::to_string(perm.rejectCount) + ",\n"); in PermissionUsedRecordToString() 60 … infos.append(R"( "lastAccessTime": )" + std::to_string(perm.lastAccessTime) + ",\n"); in PermissionUsedRecordToString() 61 … infos.append(R"( "lastRejectTime": )" + std::to_string(perm.lastRejectTime) + ",\n"); in PermissionUsedRecordToString() 62 …infos.append(R"( "lastAccessDuration": )" + std::to_string(perm.lastAccessDuration) + ",\… in PermissionUsedRecordToString() 63 ToString::DetailUsedRecordToString(true, perm.accessRecords, infos); in PermissionUsedRecordToString() 64 ToString::DetailUsedRecordToString(false, perm.rejectRecords, infos); in PermissionUsedRecordToString()
|
| /base/security/access_token/frameworks/common/ |
| D | permission_definition_parser.py | 152 for perm in data["systemGrantPermissions"]: 153 permission_list.append(PermissionDef(perm, index)) 156 for perm in data["userGrantPermissions"]: 157 permission_list.append(PermissionDef(perm, index)) 168 for perm in permission_list: 169 f.write(perm.dump_permission_name()) 171 for perm in permission_list: 172 f.write(perm.dump_struct())
|
| /base/security/access_token/frameworks/privacy/src/ |
| D | permission_used_request_parcel.cpp | 30 for (const auto& perm : this->request.permissionList) { in Marshalling() 31 RETURN_IF_FALSE(out.WriteString(perm)); in Marshalling() 55 std::string perm; in Unmarshalling() local 56 RELEASE_IF_FALSE(in.ReadString(perm), requestParcel); in Unmarshalling() 57 requestParcel->request.permissionList.emplace_back(perm); in Unmarshalling()
|
| /base/security/access_token/interfaces/innerkits/accesstoken/test/unittest/PermissionsTest/ |
| D | check_permission_map_test.cpp | 210 for (const auto& perm : permDefList) { variable 212 bool isExsit = TransferPermissionToOpcode(perm.permissionName, opCode); 214 GTEST_LOG_(INFO) << "permission name is " << perm.permissionName; 218 if (perm.grantMode == AccessToken::GrantMode::USER_GRANT) { 219 EXPECT_TRUE(IsUserGrantPermission(perm.permissionName)); 220 } else if (perm.grantMode == AccessToken::GrantMode::SYSTEM_GRANT) { 221 EXPECT_FALSE(IsUserGrantPermission(perm.permissionName));
|
| /base/security/selinux_adapter/scripts/selinux_check/ |
| D | check_perm_group.py | 56 perm = elem_list[4:] 60 allow_map[(scontext, scontext)][tclass] += perm 64 allow_map[(scontext, tcon)][tclass] += perm 67 allow_map[(scontext, tcontext)][tclass] += perm 73 allow_map[(scon, scon)][tclass] += perm 77 allow_map[(scon, tcon)][tclass] += perm 80 allow_map[(scon, tcontext)][tclass] += perm 158 check_perms = perm_group.get('perm').split(' ')
|
| D | check_baseline.py | 58 perm = elem_list[4:] 62 allow_map[scontext][(scontext, tclass)] += perm 66 allow_map[scontext][(tcon, tclass)] += perm 69 allow_map[scontext][(tcontext, tclass)] += perm 75 allow_map[scon][(scon, tclass)] += perm 79 allow_map[scon][(tcon, tclass)] += perm 82 allow_map[scon][(tcontext, tclass)] += perm
|
| /base/hiviewdfx/hidumper/utils/native/src/ |
| D | permission.cpp | 19 bool Permission::CheckSelfPermission(const string& perm __attribute__((__unused__))) in CheckSelfPermission() argument 24 bool Permission::CheckCallingPermission(const string& perm __attribute__((__unused__))) in CheckCallingPermission() argument
|
| /base/hiviewdfx/hidumper/utils/native/include/ |
| D | permission.h | 22 static bool CheckSelfPermission(const std::string& perm); 23 static bool CheckCallingPermission(const std::string& perm);
|
| /base/powermgr/power_manager/utils/permission/include/ |
| D | permission.h | 27 static bool IsPermissionGranted(const std::string& perm); 28 static bool IsNativePermissionGranted(const std::string& perm);
|
| /base/security/dlp_permission_service/frameworks/common/src/ |
| D | permission_policy.cpp | 58 static bool CheckPerm(uint32_t perm) in CheckPerm() argument 60 if (perm <= NO_PERMISSION || perm > FULL_CONTROL) { in CheckPerm() 61 DLP_LOG_ERROR(LABEL, "Auth Perm invalid, perm=%{public}u", perm); in CheckPerm() 72 …DLP_LOG_ERROR(LABEL, "Perm expiry time is earlier than current time, cur=%{public}s, set=%{public}… in CheckTime()
|
| /base/security/access_token/services/accesstokenmanager/main/cpp/src/database/ |
| D | data_translator.cpp | 125 const GenericValues& inGenericValues, PermissionWithValue& perm) in TranslationIntoExtendedPermission() argument 127 perm.permissionName = inGenericValues.GetString(TokenFiledConst::FIELD_PERMISSION_NAME); in TranslationIntoExtendedPermission() 128 if (!DataValidator::IsPermissionNameValid(perm.permissionName)) { in TranslationIntoExtendedPermission() 135 perm.value = inGenericValues.GetString(TokenFiledConst::FIELD_VALUE); in TranslationIntoExtendedPermission() 136 if (perm.value.empty()) { in TranslationIntoExtendedPermission()
|
| /base/security/access_token/interfaces/innerkits/accesstoken/src/ |
| D | accesstoken_manager_client.cpp | 130 PermissionStateFull perm; in GetReqPermissions() local 131 perm.permissionName = permParcel.permState.permissionName; in GetReqPermissions() 132 perm.isGeneral = true; in GetReqPermissions() 133 perm.resDeviceID.emplace_back("PHONE-001"); in GetReqPermissions() 134 perm.grantStatus.emplace_back(permParcel.permState.grantStatus); in GetReqPermissions() 135 perm.grantFlags.emplace_back(permParcel.permState.grantFlag); in GetReqPermissions() 136 reqPermList.emplace_back(perm); in GetReqPermissions() 169 for (const auto& perm : permList) { in GetSelfPermissionsState() local 171 permParcel.permsState = perm; in GetSelfPermissionsState() 178 PermissionListState perm = parcelList[i].permsState; in GetSelfPermissionsState() local [all …]
|
| /base/startup/init/services/init/ |
| D | init_service_file.c | 42 INIT_LOGV("File path =%s . file flags =%d, file perm =%u ", path, file->flags, file->perm); in CreateFile() 47 int fd = open(path, file->flags | O_CREAT, file->perm); in CreateFile() 50 INIT_CHECK_ONLY_ELOG(chmod(path, file->perm) >= 0, "Failed chmod err=%d", errno); in CreateFile()
|
| /base/security/access_token/services/accesstokenmanager/main/cpp/src/callback/ |
| D | callback_manager.cpp | 136 [permName](const std::string& perm) { return perm == permName; }); in CalledAccordingToPermLlist() argument 147 … LOGI(ATM_DOMAIN, ATM_TAG, "Callback execute, id=%{public}u perm=%{public}s changeType=%{public}d", in ExecuteAllCallback() 155 … "id=%{public}u perm=%{public}s changeType=%{public}d", tokenID, permName.c_str(), changeType); in ExecuteAllCallback() 202 LOGI(ATM_DOMAIN, ATM_TAG, "Entry, id=%{public}u perm=%{public}s changeType=%{public}d", in ExecuteCallbackAsync() 205 … LOGI(ATM_DOMAIN, ATM_TAG, "CallbackStart, id=%{public}u perm=%{public}s changeType=%{public}d", in ExecuteCallbackAsync()
|
| /base/security/permission_lite/services/pms/src/ |
| D | pms_server_internal.c | 135 …HILOG_INFO(HILOG_MODULE_APP, "check permission, [uid: %lld][perm: %s][ret: %d]", uid, permName, re… in ReplyCheckPermission() 149 …HILOG_INFO(HILOG_MODULE_APP, "grant permission, [id: %s][perm: %s][ret: %d]", identifier, permName… in ReplyGrantPermission() 163 …HILOG_INFO(HILOG_MODULE_APP, "revoke permission, [id: %s][perm: %s][ret: %d]", identifier, permNam… in ReplyRevokePermission() 177 …HILOG_INFO(HILOG_MODULE_APP, "grant runtime permission, [uid: %lld][perm: %s][ret: %d]", uid, perm… in ReplyGrantRuntimePermission() 191 …HILOG_INFO(HILOG_MODULE_APP, "revoke runtime permission, [uid: %lld][perm: %s][ret: %d]", uid, per… in ReplyRevokeRuntimePermission() 207 …HILOG_INFO(HILOG_MODULE_APP, "update runtime permission flags, [identifier: %s][perm: %s][flags:%d… in ReplyUpdatePermissionFlags()
|
| /base/hiviewdfx/hidumper/frameworks/native/src/executor/memory/ |
| D | memory_util.cpp | 160 memInfo.perm = ""; in InitMemSmapsInfo() 220 uint64_t MemoryUtil::PermToInt(const string& perm) in PermToInt() argument 223 for (size_t i = 0; i < perm.size(); i++) { in PermToInt() 224 if (perm[i] != '-' && perm[i] != 's') { in PermToInt()
|
| /base/security/access_token/interfaces/innerkits/token_setproc/src/ |
| D | perm_setproc.cpp | 30 uint32_t perm[MAX_PERM_SIZE] = { 0 }; member 66 data.perm[idx] |= static_cast<uint32_t>(0x01) << bitIdx; in AddPermissionToKernel() 68 data.perm[idx] &= ~(static_cast<uint32_t>(0x01) << bitIdx); in AddPermissionToKernel()
|
| /base/security/access_token/test/fuzztest/services/accesstoken/getselfpermissionsstatestub_fuzzer/ |
| D | getselfpermissionsstatestub_fuzzer.cpp | 37 PermissionListState perm = { in GetSelfPermissionsStateStubFuzzTest() local 42 permParcel.permsState = perm; in GetSelfPermissionsStateStubFuzzTest()
|
| /base/security/access_token/services/accesstokenmanager/main/cpp/src/permission/ |
| D | permission_manager.cpp | 137 for (const auto& perm : tmpList) { in GetReqPermissions() local 139 if (!GetPermissionBriefDef(perm.permissionName, briefDef)) { in GetReqPermissions() 144 reqPermList.emplace_back(perm); in GetReqPermissions() 159 …ter = std::find_if(permsList.begin(), permsList.end(), [permission](const PermissionStatus& perm) { in IsPermissionRequestedInHap() argument 160 return permission == perm.permissionName; in IsPermissionRequestedInHap() 364 "PERM", permission, "BUNDLE_NAME", infoPtr->GetBundleName(), "INT_VAL1", ret, in UpdateTokenPermissionState() 370 // To notify kill process when perm is revoke in UpdateTokenPermissionState() 409 … HiviewDFX::HiSysEvent::EventType::FAULT, "ERROR_CODE", DLP_CHECK_FAILED, "TOKENID", id, "PERM", in UpdateTokenPermissionStateCheck() 458 // To kill process when perm is revoke in CheckAndUpdatePermission() 460 LOGI(ATM_DOMAIN, ATM_TAG, "Perm(%{public}s) is revoked, kill process(%{public}u).", in CheckAndUpdatePermission() [all …]
|
| D | permission_data_brief.cpp | 319 PermissionWithValue perm; in TranslationIntoAclExtendedMap() local 320 int ret = DataTranslator::TranslationIntoExtendedPermission(permValue, perm); in TranslationIntoAclExtendedMap() 324 aclExtendedMap[perm.permissionName] = perm.value; in TranslationIntoAclExtendedMap() 445 // The data included in requested perm list. in UpdateSecCompGrantedPermList() 447 … // Permission has been granted, there is no need to add perm state in security component permList. in UpdateSecCompGrantedPermList() 496 for (auto& perm : iter->second) { in ResetUserGrantPermissionStatus() local 497 uint32_t oldFlag = static_cast<uint32_t>(perm.flag); in ResetUserGrantPermissionStatus() 504 perm.status = PERMISSION_GRANTED; in ResetUserGrantPermissionStatus() 505 perm.flag = PERMISSION_GRANTED_BY_POLICY; in ResetUserGrantPermissionStatus() 508 perm.status = PERMISSION_DENIED; in ResetUserGrantPermissionStatus() [all …]
|
| /base/security/selinux_adapter/scripts/selinux_check/config/ |
| D | perm_group.json | 9 "perm": "execute execute_no_trans" string
|
| /base/security/access_token/interfaces/innerkits/token_callback/src/ |
| D | token_callback_stub.cpp | 55 std::string perm = to_utf8(u16Perm); in OnRemoteRequest() local 56 permList.emplace_back(perm); in OnRemoteRequest()
|
| /base/security/dlp_permission_service/frameworks/dlp_permission/src/ |
| D | auth_user_info_parcel.cpp | 33 DLP_LOG_ERROR(LABEL, "Write auth user perm fail"); in Marshalling() 63 DLP_LOG_ERROR(LABEL, "Read auth user perm fail"); in Unmarshalling()
|
| /base/security/access_token/frameworks/accesstoken/src/ |
| D | hap_policy_parcel.cpp | 134 std::string perm; in Unmarshalling() local 136 RELEASE_IF_FALSE(in.ReadString(perm), hapPolicyParcel); in Unmarshalling() 138 hapPolicyParcel->hapPolicy.aclExtendedMap[perm] = value; in Unmarshalling()
|