/ohos5.0/docs/zh-cn/device-dev/subsystems/ |
H A D | subsys-security-communicationverify.md | 6 系统服务通过IPC跨进程方式开放的接口,需要对接口调用者进行鉴权操作。在Samgr中注册的系统服务,可以通过进程间通信的方式暴露接口给其他进程访问,同时需要配置相应的访问策略,当其他进程访问这些接口… 8 当开发一个系统服务时,如果需要对外开放某些接口,开发者可以通过IPC通信鉴权组件配置这些接口的访问策略。当其他服务通过IPC方式访问这些接口时,会触发Samgr服务调用IPC通信鉴权组件的接口检查调… 13 IPC通信鉴权提供的API,仅供Samgr调用,开发者在开发服务时需要配置对应的访问策略,Samgr会调用如下接口获取和检查调用者是否具有正确的访问权限,提供的API列表如下。 20 | int IsCommunicationAllowed(AuthParams params) | 检查访问主体进程是否有权限调用受访客体进程的接口,仅供Samgr调用 | 25 本部分以BMS服务通过IPC通信方式对外开放接口为例,讲解如何通过IPC通信鉴权组件配置对应接口的访问策略。这里BMS在Samgr中注册的service为bundlems,为开放的接口注册的Feat… 82 3. 将步骤1中定义的BmsFeature注册到Samgr; 93 // 注册服务到Samgr 102 完成以上开发步骤后,开发者在Samgr注册服务时,Samgr会调用IPC通信鉴权组件的GetCommunicationStrategy接口获取服务的访问策略;当其他服务或应用通过IPC方式访问这些服… 107 - 开发新服务后,在Samgr注册失败问题 110 开发完新服务后,在启动时出现服务在Samgr注册失败问题。 [all …]
|
H A D | subsys-security-overview.md | 17 …系统服务通过IPC跨进程方式开放的接口,需要对接口调用者进行鉴权操作。在Samgr中注册的系统服务,可以通过进程间通信的方式暴露接口给其他进程访问,同时需要配置相应的访问策略,当其他进程访问这些接… 36 - Samgr 38 Samgr(System Ability Manager)系统能力管理,在OpenHarmony上作为一个管理系统能力的模块,详见系统服务框架子系统。
|
/ohos5.0/foundation/systemabilitymgr/samgr/test/fuzztest/samgr_fuzzer/src/ |
H A D | loadremotesystemability_fuzzer.cpp | 21 namespace Samgr { namespace 52 if (size < OHOS::Samgr::THRESHOLD) { in LLVMFuzzerTestOneInput() 55 OHOS::Samgr::FuzzLoadSystemAbility(data, size); in LLVMFuzzerTestOneInput() 56 OHOS::Samgr::FuzzLoadRemoteSystemAbility(data, size); in LLVMFuzzerTestOneInput()
|
H A D | unsubscribesystemprocess_fuzzer.cpp | 21 namespace Samgr { namespace 57 if (size < OHOS::Samgr::THRESHOLD) { in LLVMFuzzerTestOneInput() 60 OHOS::Samgr::FuzzSubscribeSystemProcess(data, size); in LLVMFuzzerTestOneInput() 61 OHOS::Samgr::FuzzUnSubscribeSystemProcess(data, size); in LLVMFuzzerTestOneInput()
|
H A D | unsubscribesystemability_fuzzer.cpp | 21 namespace Samgr { namespace 61 if (size < OHOS::Samgr::THRESHOLD) { in LLVMFuzzerTestOneInput() 64 OHOS::Samgr::FuzzSubscribeSystemAbility(data, size); in LLVMFuzzerTestOneInput() 65 OHOS::Samgr::FuzzUnSubscribeSystemAbility(data, size); in LLVMFuzzerTestOneInput()
|
H A D | addsystemprocess_fuzzer.cpp | 23 namespace Samgr { namespace 47 if (size < OHOS::Samgr::THRESHOLD) { in LLVMFuzzerTestOneInput() 50 OHOS::Samgr::FuzzAddSystemProcess(data, size); in LLVMFuzzerTestOneInput()
|
H A D | addsystemability_fuzzer.cpp | 23 namespace Samgr { namespace 55 if (size < OHOS::Samgr::THRESHOLD) { in LLVMFuzzerTestOneInput() 58 OHOS::Samgr::FuzzAddSystemAbility(data, size); in LLVMFuzzerTestOneInput()
|
H A D | cancelunloadsystemability_fuzzer.cpp | 30 OHOS::Samgr::FuzzTestUtils::FuzzTestRemoteRequest(data, size, OHOS::CODE); in LLVMFuzzerTestOneInput()
|
H A D | checkremotesystemability_fuzzer.cpp | 30 OHOS::Samgr::FuzzTestUtils::FuzzTestRemoteRequest(data, size, OHOS::CODE); in LLVMFuzzerTestOneInput()
|
H A D | getextensionsaids_fuzzer.cpp | 30 OHOS::Samgr::FuzzTestUtils::FuzzTestRemoteRequest(data, size, OHOS::CODE); in LLVMFuzzerTestOneInput()
|
H A D | getextensionsalist_fuzzer.cpp | 30 OHOS::Samgr::FuzzTestUtils::FuzzTestRemoteRequest(data, size, OHOS::CODE); in LLVMFuzzerTestOneInput()
|
H A D | getondemandpolicy_fuzzer.cpp | 30 OHOS::Samgr::FuzzTestUtils::FuzzTestRemoteRequest(data, size, OHOS::CODE); in LLVMFuzzerTestOneInput()
|
H A D | getsaextensioninfo_fuzzer.cpp | 30 OHOS::Samgr::FuzzTestUtils::FuzzTestRemoteRequest(data, size, OHOS::CODE); in LLVMFuzzerTestOneInput()
|
H A D | getsystemability_fuzzer.cpp | 30 OHOS::Samgr::FuzzTestUtils::FuzzTestRemoteRequest(data, size, OHOS::CODE); in LLVMFuzzerTestOneInput()
|
/ohos5.0/docs/en/device-dev/subsystems/ |
H A D | subsys-security-communicationverify.md | 5 System services registered with Samgr can be accessed by other processes through IPC APIs. When a p… 7 …r APIs of the service. When other services access these APIs through IPC, Samgr calls APIs of the … 11 The following table lists the APIs provided by IPC authentication \(intended for Samgr only\). 37 …entication component. In this example, the service registered by BMS with Samgr is **bundlems**, … 95 3. Register the **BmsFeature** defined in [Step 1](#li15901515152517) with Samgr. 106 // Register the BmsFeature with Samgr. 116 …Samgr, Samgr calls the **GetCommunicationStrategy** function of the IPC authentication component… 120 - Registering a service with Samgr failed 124 … new service, a message is displayed indicating that the service fails to be registered with Samgr.
|
H A D | subsys-security-overview.md | 17 …ated. The system ability (SA) registered with the System Ability Manager (Samgr) can expose APIs t… 36 - Samgr 38 Samgr manages SAs. For details, see the SA Framework development guidelines.
|
/ohos5.0/foundation/systemabilitymgr/samgr/ |
H A D | README.md | 1 # Samgr chapter 4 The System Ability Manager (Samgr) component is a core component of OpenHarmony. It provides functi… 8 Figure 1 Architecture of Samgr 18 │ ├── bundle.json # Description and build file of Samgr 21 │ ├── services # Directory for the Samgr service 28 1. Upon receiving a registration message from the system ability framework, the Samgr service save… 75 2. If the system service requested by the system ability framework is a local service, the Samgr s… 96 3. The Samgr service dynamically loads the system service process and system ability. Instead of st… 120 …ity(int32_t systemAbilityId, const sptr<ISystemAbilityLoadCallback>& callback)** provided by Samgr. 160 Samgr
|
/ohos5.0/foundation/systemabilitymgr/safwk/test/fuzztest/systemabilityfwk_fuzzer/ |
H A D | systemabilityfwk_fuzzer.cpp | 32 namespace Samgr { namespace 167 if (size < OHOS::Samgr::THRESHOLD) { in LLVMFuzzerTestOneInput() 171 OHOS::Samgr::FuzzSystemAbilityFwk(data, size); in LLVMFuzzerTestOneInput() 172 OHOS::Samgr::FuzzIpcStatCmdProc(data, size); in LLVMFuzzerTestOneInput() 173 OHOS::Samgr::FuzzLocalAbilityManager(data, size); in LLVMFuzzerTestOneInput()
|
/ohos5.0/foundation/systemabilitymgr/samgr/test/fuzztest/samgrcoverage_fuzzer/ |
H A D | samgrcoverage_fuzzer.cpp | 36 namespace Samgr { namespace 174 if (size < OHOS::Samgr::THRESHOLD) { in LLVMFuzzerTestOneInput() 177 OHOS::Samgr::FuzzOndemandLoad(data, size); in LLVMFuzzerTestOneInput() 178 OHOS::Samgr::FuzzRemoveSystemProcess(data, size); in LLVMFuzzerTestOneInput() 179 OHOS::Samgr::FuzzNotifySystemAbilityLoaded(data, size); in LLVMFuzzerTestOneInput()
|
/ohos5.0/foundation/systemabilitymgr/samgr/test/fuzztest/samgrdumper_fuzzer/ |
H A D | samgrdumper_fuzzer.cpp | 25 namespace Samgr { namespace 91 if (size < OHOS::Samgr::THRESHOLD) { in LLVMFuzzerTestOneInput() 95 OHOS::Samgr::SamgrDumperFuzzTest(data, size); in LLVMFuzzerTestOneInput()
|
/ohos5.0/base/security/permission_lite/ |
H A D | README_zh.md | 106 …2195510"><a name="p749582195510"></a><a name="p749582195510"></a>服务注册过程中查询调用接口对应的访问策略,仅供Samgr调用</p> 111 …a name="p134951921115511"></a><a name="p134951921115511"></a>检查访问主体进程是否有权限调用受访客体进程的接口,仅供Samgr调用</p> 228 使用说明:以BMS服务通过IPC通信方式对外开放接口为例,讲解如何通过IPC通信鉴权组件配置对应接口的访问策略。这里BMS在Samgr中注册的service为bundlems,为开放的接口注册的Fe… 286 3. 将步骤1中定义的BmsFeature注册到Samgr; 297 // 注册服务到Samgr 307 完成以上开发步骤后,开发者在Samgr注册服务时,Samgr会调用IPC通信鉴权组件的GetCommunicationStrategy接口获取服务的访问策略;当其他服务或应用通过IPC方式访问这些服…
|
/ohos5.0/foundation/systemabilitymgr/samgr/test/fuzztest/systemabilitymanager_fuzzer/ |
H A D | systemabilitymanager_fuzzer.cpp | 32 namespace Samgr { namespace 158 if (size < OHOS::Samgr::THRESHOLD) { in LLVMFuzzerTestOneInput() 162 OHOS::Samgr::FuzzSystemAbilityManager(data, size); in LLVMFuzzerTestOneInput()
|
/ohos5.0/base/startup/bootstrap_lite/ |
H A D | README.md | 11 …odule provides entry identifiers for starting services and features. When Samgr starts, it will ca… 27 When Samgr starts, the bootstrap\_lite module is automatically invoked to start system services, wi…
|
/ohos5.0/foundation/systemabilitymgr/safwk_lite/ |
H A D | README.md | 16 - Samgr: an agency that manages capabilities provided by providers and helps consumers discover p… 61 Samgr
|
/ohos5.0/foundation/systemabilitymgr/samgr/services/samgr/native/include/ |
H A D | memory_guard.h | 19 namespace Samgr {
|