/ohos5.0/base/accesscontrol/sandbox_manager/interfaces/innerkits/sandbox_manager/test/unittest/src/ |
H A D | sandbox_manager_kit_test.cpp | 178 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::PersistPolicy(policy, policyResult)); 252 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::PersistPolicy(policy, result1)); 260 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::PersistPolicy(policy, result2)); 392 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::PersistPolicy(policy, persistResult)); 490 ASSERT_EQ(SANDBOX_MANAGER_OK, 629 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::PersistPolicy(policy, persistResult)); 815 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::PersistPolicy(policy, policyResult)); 1920 EXPECT_EQ(SANDBOX_MANAGER_OK, macAdapter.QuerySandboxPolicy(100, policy, boolRes)); 1922 EXPECT_EQ(SANDBOX_MANAGER_OK, macAdapter.QuerySandboxPolicy(101, policy, boolRes)); 1925 EXPECT_EQ(SANDBOX_MANAGER_OK, macAdapter.QuerySandboxPolicy(100, policy, boolRes)); [all …]
|
/ohos5.0/base/accesscontrol/sandbox_manager/services/sandbox_manager/main/cpp/src/service/ |
H A D | policy_info_manager.cpp | 141 return SANDBOX_MANAGER_OK; in CleanPersistPolicyByPath() 185 return SANDBOX_MANAGER_OK; in AddPolicy() 232 return SANDBOX_MANAGER_OK; in AddToDatabaseIfNotDuplicate() 302 return SANDBOX_MANAGER_OK; in MatchSinglePolicy() 318 return SANDBOX_MANAGER_OK; in MatchPolicy() 362 return SANDBOX_MANAGER_OK; in RemovePolicy() 418 return SANDBOX_MANAGER_OK; in SetPolicy() 466 return SANDBOX_MANAGER_OK; in CheckPolicy() 523 return SANDBOX_MANAGER_OK; in StartAccessingByTokenId() 573 return SANDBOX_MANAGER_OK; in StartAccessingPolicy() [all …]
|
H A D | sandbox_manager_stub.cpp | 92 return SANDBOX_MANAGER_OK; in CleanPersistPolicyByPathInner() 122 return SANDBOX_MANAGER_OK; in PersistPolicyInner() 153 return SANDBOX_MANAGER_OK; in UnPersistPolicyInner() 187 return SANDBOX_MANAGER_OK; in PersistPolicyByTokenIdInner() 222 return SANDBOX_MANAGER_OK; in UnPersistPolicyByTokenIdInner() 254 return SANDBOX_MANAGER_OK; in ReadSetPolicyParcel() 281 return SANDBOX_MANAGER_OK; in SetPolicyInner() 317 return SANDBOX_MANAGER_OK; in ReadUnSetPolicyParcel() 334 return SANDBOX_MANAGER_OK; in UnSetPolicyInner() 375 return SANDBOX_MANAGER_OK; in CheckPolicyInner() [all …]
|
H A D | sandbox_manager_service.cpp | 315 if (ret != SANDBOX_MANAGER_OK) { in CheckPersistPolicy() 322 return SANDBOX_MANAGER_OK; in CheckPersistPolicy()
|
/ohos5.0/base/accesscontrol/sandbox_manager/services/sandbox_manager/test/unittest/ |
H A D | policy_info_manager_test.cpp | 128 …EXPECT_EQ(SANDBOX_MANAGER_OK, PolicyInfoManager::GetInstance().AddPolicy(selfTokenId_, policy, res… 137 …EXPECT_EQ(SANDBOX_MANAGER_OK, PolicyInfoManager::GetInstance().AddPolicy(selfTokenId_, policy, res… 146 …EXPECT_EQ(SANDBOX_MANAGER_OK, PolicyInfoManager::GetInstance().AddPolicy(selfTokenId_, policy, res… 342 EXPECT_EQ(SANDBOX_MANAGER_OK, PolicyInfoManager::GetInstance().CleanPersistPolicyByPath(paths)); 400 EXPECT_EQ(SANDBOX_MANAGER_OK, 405 EXPECT_EQ(SANDBOX_MANAGER_OK, 409 EXPECT_EQ(SANDBOX_MANAGER_OK, 414 …EXPECT_EQ(SANDBOX_MANAGER_OK, PolicyInfoManager::GetInstance().StartAccessingByTokenId(selfTokenId… 417 EXPECT_EQ(SANDBOX_MANAGER_OK, 423 EXPECT_EQ(SANDBOX_MANAGER_OK, [all …]
|
H A D | sandbox_manager_service_test.cpp | 263 EXPECT_EQ(SANDBOX_MANAGER_OK, sandboxManagerService_->PersistPolicy(policy, result)); 264 EXPECT_EQ(SANDBOX_MANAGER_OK, sandboxManagerService_->UnPersistPolicy(policy, result)); 310 EXPECT_EQ(SANDBOX_MANAGER_OK, sandboxManagerService_->StartAccessingPolicy(policy, result)); 311 EXPECT_EQ(SANDBOX_MANAGER_OK, sandboxManagerService_->StopAccessingPolicy(policy, result)); 512 EXPECT_EQ(SANDBOX_MANAGER_OK, sandboxManagerService_->PersistPolicyInner(data, reply)); 539 EXPECT_EQ(SANDBOX_MANAGER_OK, sandboxManagerService_->UnPersistPolicyInner(data, reply)); 797 EXPECT_EQ(SANDBOX_MANAGER_OK, sandboxManagerService_->SetPolicyInner(data, reply)); 848 EXPECT_EQ(SANDBOX_MANAGER_OK, sandboxManagerService_->SetPolicyAsyncInner(data, reply)); 871 EXPECT_EQ(SANDBOX_MANAGER_OK, sandboxManagerService_->UnSetPolicyInner(data, reply)); 894 EXPECT_EQ(SANDBOX_MANAGER_OK, sandboxManagerService_->UnSetPolicyAsyncInner(data, reply)); [all …]
|
/ohos5.0/base/accesscontrol/sandbox_manager/interfaces/innerkits/sandbox_manager/src/ |
H A D | sandbox_manager_proxy.cpp | 62 if (requestResult != SANDBOX_MANAGER_OK) { in SendRequest() 103 if (requestRet != SANDBOX_MANAGER_OK) { in PersistPolicy() 138 if (requestRet != SANDBOX_MANAGER_OK) { in UnPersistPolicy() 178 if (requestRet != SANDBOX_MANAGER_OK) { in PersistPolicyByTokenId() 217 if (requestRet != SANDBOX_MANAGER_OK) { in UnPersistPolicyByTokenId() 275 if (requestRet != SANDBOX_MANAGER_OK) { in SetPolicy() 285 if (remoteRet != SANDBOX_MANAGER_OK) { in SetPolicy() 337 if (requestRet != SANDBOX_MANAGER_OK) { in UnSetPolicy() 393 if (remoteRet != SANDBOX_MANAGER_OK) { in CheckPolicy() 553 return SANDBOX_MANAGER_OK; in StartAccessingByTokenId() [all …]
|
/ohos5.0/foundation/filemanagement/app_file_service/test/unittest/file_permission_native/src/ |
H A D | file_permission_test.cpp | 161 EXPECT_CALL(*sandboxMock_, PersistPolicy(_, _)).WillOnce(Return(SANDBOX_MANAGER_OK)); 187 .WillOnce(DoAll(SetArgReferee<1>(resultCodes), Return(SANDBOX_MANAGER_OK))); 213 EXPECT_CALL(*sandboxMock_, PersistPolicy(_, _)).WillOnce(Return(SANDBOX_MANAGER_OK)); 240 EXPECT_CALL(*upmsMock_, Active(_, _)).WillOnce(Return(SANDBOX_MANAGER_OK)); 291 EXPECT_CALL(*upmsMock_, Active(_, _)).WillOnce(Return(SANDBOX_MANAGER_OK)); 344 .WillOnce(DoAll(SetArgReferee<1>(resultCodes), Return(SANDBOX_MANAGER_OK))); 397 EXPECT_CALL(*sandboxMock_, UnPersistPolicy(_, _)).WillOnce(Return(SANDBOX_MANAGER_OK)); 420 .WillOnce(DoAll(SetArgReferee<1>(resultCodes), Return(SANDBOX_MANAGER_OK))); 446 EXPECT_CALL(*sandboxMock_, UnPersistPolicy(_, _)).WillOnce(Return(SANDBOX_MANAGER_OK)); 563 EXPECT_CALL(*sandboxMock_, PersistPolicy(_, _)).WillOnce(Return(SANDBOX_MANAGER_OK)); [all …]
|
/ohos5.0/base/accesscontrol/sandbox_manager/services/sandbox_manager/main/cpp/src/mac/ |
H A D | mac_adapter.cpp | 138 result[offset + i] = info.pathInfos[i].result ? SANDBOX_MANAGER_OK : POLICY_MAC_FAIL; in SetSandboxPolicy() 142 …d::count_if(result.begin(), result.end(), [](uint32_t res) { return res != SANDBOX_MANAGER_OK; })); in SetSandboxPolicy() 146 return SANDBOX_MANAGER_OK; in SetSandboxPolicy() 188 return SANDBOX_MANAGER_OK; in QuerySandboxPolicy() 230 return SANDBOX_MANAGER_OK; in CheckSandboxPolicy() 276 return SANDBOX_MANAGER_OK; in UnSetSandboxPolicy() 322 return SANDBOX_MANAGER_OK; in UnSetSandboxPolicyByUser() 347 return SANDBOX_MANAGER_OK; in UnSetSandboxPolicy() 368 return SANDBOX_MANAGER_OK; in DestroySandboxPolicy()
|
/ohos5.0/foundation/ability/ability_runtime/services/uripermmgr/src/ |
H A D | file_permission_manager.cpp | 28 constexpr const uint32_t SANDBOX_MANAGER_OK = 0; variable 113 if (ret == SANDBOX_MANAGER_OK && persistResultCodes.size() == resultIndex.size()) { in CheckUriPersistentPermission()
|
/ohos5.0/base/accesscontrol/sandbox_manager/interfaces/innerkits/sandbox_manager/include/ |
H A D | sandbox_manager_err_code.h | 23 SANDBOX_MANAGER_OK = 0, enumerator
|
/ohos5.0/foundation/filemanagement/app_file_service/interfaces/innerkits/native/file_share/src/ |
H A D | file_permission.cpp | 102 if (sandboxManagerErrorCode == SANDBOX_MANAGER_OK) { in ErrorCodeConversion() 110 if (sandboxManagerErrorCode == SANDBOX_MANAGER_OK) { in ErrorCodeConversion()
|