| /base/security/asset/frameworks/os_dependency/file/src/ |
| D | ce_operator.rs | 23 fn construct_ce_db_dir(user_id: i32) -> String { in construct_ce_db_dir() 24 format!("data/service/el2/{}/asset_service", user_id) in construct_ce_db_dir() 27 fn construct_db_key_cipher_path(user_id: i32) -> String { in construct_db_key_cipher_path() 28 format!("data/service/el2/{}/asset_service/{}", user_id, DB_KEY) in construct_db_key_cipher_path() 32 pub fn is_db_key_cipher_file_exist(user_id: i32) -> Result<bool> { in is_db_key_cipher_file_exist() 33 let path_str = construct_db_key_cipher_path(user_id); in is_db_key_cipher_file_exist() 38 pub fn read_db_key_cipher(user_id: i32) -> Result<Vec<u8>> { in read_db_key_cipher() 39 let path_str = construct_db_key_cipher_path(user_id); in read_db_key_cipher() 54 pub fn write_db_key_cipher(user_id: i32, db_key_cipher: &Vec<u8>) -> Result<()> { in write_db_key_cipher() 55 let path_str = construct_db_key_cipher_path(user_id); in write_db_key_cipher() [all …]
|
| D | de_operator.rs | 24 fn construct_user_de_path(user_id: i32) -> String { in construct_user_de_path() 25 format!("data/service/el1/public/asset_service/{}", user_id) in construct_user_de_path() 28 fn is_user_de_dir_exist(user_id: i32) -> Result<bool> { in is_user_de_dir_exist() 29 let path_str = construct_user_de_path(user_id); in is_user_de_dir_exist() 34 pub fn create_user_de_dir(user_id: i32) -> Result<()> { in create_user_de_dir() 35 if is_user_de_dir_exist(user_id)? { in create_user_de_dir() 40 let path_str = construct_user_de_path(user_id); in create_user_de_dir() 56 pub fn delete_user_de_dir(user_id: i32) -> Result<()> { in delete_user_de_dir() 57 if !is_user_de_dir_exist(user_id)? { in delete_user_de_dir() 61 let path_str = construct_user_de_path(user_id); in delete_user_de_dir() [all …]
|
| /base/security/asset/services/common/src/ |
| D | calling_info.rs | 35 user_id: i32, field 48 pub fn new_part_info(user_id: i32) -> Self { in new_part_info() 49 Self::new(user_id, OwnerType::Native, "asset_service_8100".as_bytes().to_vec(), None) in new_part_info() 53 …pub fn new(user_id: i32, owner_type: OwnerType, owner_info: Vec<u8>, group: Option<Group>) -> Self… in new() 54 Self { user_id, owner_type, owner_info, group } in new() 59 let mut user_id = process_info.user_id; in build() localVariable 61 user_id = specific_user_id; in build() 76 … CallingInfo { user_id: user_id as i32, owner_type: process_info.owner_type, owner_info, group } in build() 82 …CallingInfo { user_id: user_id as i32, owner_type: process_info.owner_type, owner_info, group: Non… in build() 103 pub fn user_id(&self) -> i32 { in user_id() method [all …]
|
| D | process_info.rs | 41 user_id: u32, field 66 user_id: 0, in build() 120 pub user_id: u32, field 136 let user_id = get_user_id(uid)?; in build() localVariable 144 match unsafe { GetCallingProcessInfo(user_id, uid, &mut process_info_ffi) } { in build() 169 user_id: process_info_ffi.user_id, in build()
|
| D | lib.rs | 103 let mut user_id = 0; in get_user_id() localVariable 104 if GetUserIdByUid(uid, &mut user_id) { in get_user_id() 105 Ok(user_id) in get_user_id() 113 pub fn is_user_id_exist(user_id: i32) -> Result<bool> { in is_user_id_exist() 116 if IsUserIdExist(user_id, &mut exist) { in is_user_id_exist()
|
| /base/security/asset/services/db_key_operator/src/ |
| D | lib.rs | 29 fn build_db_key_secret_key(user_id: i32) -> Result<SecretKey> { in build_db_key_secret_key() 35 SecretKey::new_with_alias(user_id, auth_type, access_type, require_password_set, alias) in build_db_key_secret_key() 68 fn decrypt_db_key_cipher(user_id: i32, db_key_cipher: &Vec<u8>) -> Result<DbKey> { in decrypt_db_key_cipher() 69 let secret_key = build_db_key_secret_key(user_id)?; in decrypt_db_key_cipher() 85 fn encrypt_db_key(&self, user_id: i32) -> Result<Vec<u8>> { in encrypt_db_key() 86 let secret_key = build_db_key_secret_key(user_id)?; in encrypt_db_key() 95 pub fn check_existance(user_id: i32) -> Result<bool> { in check_existance() 96 is_db_key_cipher_file_exist(user_id) in check_existance() 100 pub fn get_db_key(user_id: i32) -> Result<DbKey> { in get_db_key() 101 match is_db_key_cipher_file_exist(user_id) { in get_db_key() [all …]
|
| /base/security/asset/services/db_operator/src/ |
| D | database_file_upgrade.rs | 40 pub(crate) fn fmt_old_de_db_path(user_id: i32) -> String { in fmt_old_de_db_path() 41 format!("{}/{}/asset.db", DE_ROOT_PATH, user_id) in fmt_old_de_db_path() 44 fn check_old_db_exist(user_id: i32) -> bool { in check_old_db_exist() 45 let path_str = fmt_old_de_db_path(user_id); in check_old_db_exist() 93 fn get_db_before_split(user_id: i32) -> Result<Database> { in get_db_before_split() 94 let db_path = fmt_de_db_path_with_name(user_id, OLD_DB_NAME); in get_db_before_split() 95 get_db_by_type(user_id, OLD_DB_NAME, db_path, DB_UPGRADE_VERSION_V3, None) in get_db_before_split() 105 fn remove_old_db(user_id: i32) -> Result<()> { in remove_old_db() 107 let path = fmt_de_db_path_with_name(user_id, OLD_DB_NAME); in remove_old_db() 116 fn get_new_db(user_id: i32, info_map: &DbMap) -> Result<Database> { in get_new_db() [all …]
|
| D | database.rs | 60 pub(crate) fn get_split_db_lock_by_user_id(user_id: i32) -> &'static UserDbLock { in get_split_db_lock_by_user_id() 62 if let Some(&lock) = map.get(&user_id) { in get_split_db_lock_by_user_id() 66 let nf = Box::new(UserDbLock { mtx: Mutex::new(user_id) }); in get_split_db_lock_by_user_id() 70 map.insert(user_id, nf); in get_split_db_lock_by_user_id() 76 pub(crate) fn get_file_lock_by_user_id_db_file_name(user_id: i32, db_file_name: String) -> &'static… in get_file_lock_by_user_id_db_file_name() 79 if let Some(&lock) = map.get(&(user_id, db_file_name.clone())) { in get_file_lock_by_user_id_db_file_name() 83 let nf = Box::new(UserDbLock { mtx: Mutex::new(user_id) }); in get_file_lock_by_user_id_db_file_name() 87 map.insert((user_id, db_file_name), nf); in get_file_lock_by_user_id_db_file_name() 124 pub(crate) fn fmt_ce_db_path_with_name(user_id: i32, db_name: &str) -> String { in fmt_ce_db_path_with_name() 125 format!("data/service/el2/{}/asset_service/{}.db", user_id, db_name) in fmt_ce_db_path_with_name() [all …]
|
| /base/inputmethod/imf/test/unittest/cpp_test/src/ |
| D | enable_ime_data_parse_test.cpp | 38 static constexpr int32_t USER_ID = 100; member in OHOS::MiscServices::EnableImeDataParseTest 51 EnableImeDataParser::GetInstance()->Initialize(USER_ID); in SetUpTestCase() 66 ImeInfoInquirer::GetInstance().GetCurrentInputMethod(USER_ID)->name = "defaultImeName"; in SetUp() 67 ImeInfoInquirer::GetInstance().GetCurrentInputMethod(USER_ID)->id = "defaultImeId"; in SetUp() 85 …leImeDataParser::GetInstance()->GetEnableData(IME_KEY, enableVec, EnableImeDataParseTest::USER_ID); 127 …leImeDataParser::GetInstance()->GetEnableData(IME_KEY, enableVec, EnableImeDataParseTest::USER_ID); 145 …meDataParser::GetInstance()->CheckNeedSwitch(IME_KEY, switchInfo, EnableImeDataParseTest::USER_ID); 159 ImeInfoInquirer::GetInstance().GetCurrentInputMethod(USER_ID)->name = "xiaoyiIme"; 160 ImeInfoInquirer::GetInstance().GetCurrentInputMethod(USER_ID)->id = "xiaoyiImeId"; 166 bool ret = EnableImeDataParser::GetInstance()->CheckNeedSwitch(IME_KEY, switchInfo, USER_ID); [all …]
|
| D | security_mode_parser_test.cpp | 43 static constexpr int32_t USER_ID = 100; member in OHOS::MiscServices::SecurityModeParserTest 56 SecurityModeParser::GetInstance()->Initialize(USER_ID); in SetUpTestCase() 64 service_->userId_ = USER_ID; in SetUpTestCase() 115 …t32_t ret = SecurityModeParser::GetInstance()->UpdateFullModeList(SecurityModeParserTest::USER_ID); 135 …t32_t ret = SecurityModeParser::GetInstance()->UpdateFullModeList(SecurityModeParserTest::USER_ID); 138 … SecurityModeParser::GetInstance()->GetSecurityMode("xiaoyiIme", SecurityModeParserTest::USER_ID); 152 …t32_t ret = SecurityModeParser::GetInstance()->UpdateFullModeList(SecurityModeParserTest::USER_ID); 154 …rity = SecurityModeParser::GetInstance()->GetSecurityMode("test", SecurityModeParserTest::USER_ID); 200 auto ret = SecurityModeParser::GetInstance()->Initialize(SecurityModeParserTest::USER_ID); 253 …to ret = SecurityModeParser::GetInstance()->ParseSecurityMode("", SecurityModeParserTest::USER_ID); [all …]
|
| /base/security/asset/services/plugin/src/ |
| D | asset_plugin.rs | 108 pub user_id: i32, field 111 fn get_db_name(user_id: i32, attributes: &ExtDbMap, is_ce: bool) -> std::result::Result<String, u32… in get_db_name() 119 … CallingInfo::new(user_id, owner_type, owner_info.to_vec(), Some(Group { developer_id, group_id })) in get_db_name() 121 _ => CallingInfo::new(user_id, owner_type, owner_info.to_vec(), None), in get_db_name() 144 fn init(&mut self, user_id: i32) -> std::result::Result<(), u32> { in init() 145 create_user_de_dir(user_id).map_err(|e| e.code as u32)?; in init() 146 self.user_id = user_id; in init() 152 let db_name = get_db_name(self.user_id, attributes, false)?; in add() 153 …let mut db = Database::build_with_file_name(self.user_id, &db_name, false).map_err(|e| e.code as u… in add() 159 let db_name = get_db_name(self.user_id, attributes, true)?; in ce_add() [all …]
|
| /base/security/asset/services/core_service/src/common_event/ |
| D | listener.rs | 92 … remove_db(&format!("{}/{}", DE_ROOT_PATH, calling_info.user_id()), calling_info, false)?; in delete_in_de_db_on_package_removed() 101 … remove_db(&format!("{}/{}", DE_ROOT_PATH, calling_info.user_id()), calling_info, false)?; in delete_in_de_db_on_package_removed() 118 …remove_db(&format!("{}/{}/asset_service", CE_ROOT_PATH, calling_info.user_id()), calling_info, tru… in delete_in_ce_db_on_package_removed() 127 …remove_db(&format!("{}/{}/asset_service", CE_ROOT_PATH, calling_info.user_id()), calling_info, tru… in delete_in_ce_db_on_package_removed() 139 if is_db_key_cipher_file_exist(calling_info.user_id())? { in delete_on_package_removed() 161 user_id: i32, in construct_calling_infos() 166 let mut calling_infos = vec![CallingInfo::new(user_id, OwnerType::Hap, owner.clone(), None)]; in construct_calling_infos() 173 user_id, in construct_calling_infos() 184 user_id: i32, in delete_data_by_owner() 193 for calling_info in construct_calling_infos(user_id, owner.clone(), developer_id, group_ids) { in delete_data_by_owner() [all …]
|
| D | start_event.rs | 31 const USER_ID: &str = "userId"; constant 44 let Some(user_id) = self.0.get(USER_ID) else { in parse() 47 let user_id = match user_id.parse::<i32>() { in parse() localVariable 48 Ok(user_id) => user_id, in parse() 90 Ok(PackageInfo { user_id, app_index, app_id, developer_id, group_ids, bundle_name }) in parse() 115 user_id: package_info.user_id, in handle_package_removed() 138 let user_id = match want.get(USER_ID) { in handle_common_event() localVariable 142 loge!("[FATIL]Get restore app info failed, failed to parse user_id"); in handle_common_event() 170 listener::on_app_restore(user_id, bundle_name.as_ptr(), app_index); in handle_common_event()
|
| /base/notification/common_event_service/ |
| D | hisysevent.yaml | 19 USER_ID: {type: INT32, desc: userId} 27 USER_ID: {type: INT32, desc: userId} 34 USER_ID: {type: INT32, desc: userId} 40 USER_ID: {type: INT32, desc: userId} 49 USER_ID: {type: INT32, desc: userId} 57 USER_ID: {type: INT32, desc: userId} 65 USER_ID: {type: INT32, desc: userId} 73 USER_ID: {type: INT32, desc: userId} 82 USER_ID: {type: INT32, desc: userId}
|
| /base/security/asset/services/crypto_manager/src/ |
| D | secret_key.rs | 32 user_id: i32, field 73 alias.extend_from_slice(&calling_info.user_id().to_le_bytes()); in calculate_key_alias() 98 user_id: calling_info.user_id(), in get_existing_key_alias() 110 user_id: calling_info.user_id(), in get_existing_key_alias() 123 user_id: calling_info.user_id(), in get_existing_key_alias() 147 let key_id = KeyId::new(calling_info.user_id(), alias_blob, access_type); in huks_rename_key_alias() 195 user_id: i32, in new_with_alias() 201 Ok(Self { user_id, auth_type, access_type, require_password_set, alias }) in new_with_alias() 214 user_id: calling_info.user_id(), in new_without_alias() 226 let key_id = KeyId::new(self.user_id, key_alias, self.access_type); in exists() [all …]
|
| D | lib.rs | 38 user_id: i32, field 44 fn new(user_id: i32, alias: HksBlob, accessibility: Accessibility) -> Self { in new() 45 Self { user_id, alias, accessibility } in new()
|
| /base/useriam/user_auth_framework/test/unittest/services/src/ |
| D | user_idm_database_test.cpp | 47 constexpr int32_t USER_ID = 100; variable 49 database.GetSecUserInfo(USER_ID, secUserInfo); 56 constexpr int32_t USER_ID = 100; variable 68 EXPECT_CALL(*mock, GetUserInfo(USER_ID, _, _, _)) 73 database.GetSecUserInfo(USER_ID, secUserInfo); 81 constexpr int32_t USER_ID = 100; variable 88 EXPECT_CALL(*mock, GetUserInfo(USER_ID, _, _, _)) 92 UserIdmDatabase::Instance().GetSecUserInfo(USER_ID, secUserInfo); 101 constexpr int32_t USER_ID = 100; variable 119 EXPECT_CALL(*mock, GetUserInfo(USER_ID, _, _, _)) [all …]
|
| /base/security/asset/services/core_service/src/ |
| D | sys_event.rs | 42 pub(crate) const USER_ID: &str = "USER_ID"; constant 115 .set_param(build_number_param!(SysEvent::USER_ID, calling_info.user_id())) in upload_statistic_system_event() 130 "[INFO]Calling fun:[{}], user_id:[{}], caller:[{}], start_time:[{:?}], run_time:[{}]", in upload_statistic_system_event() 132 calling_info.user_id(), in upload_statistic_system_event() 148 .set_param(build_number_param!(SysEvent::USER_ID, calling_info.user_id())) in upload_fault_system_event() 154 …"[ERROR]Calling fun:[{}], user_id:[{}], caller:[{}], start_time:[{:?}], error_code:[{}], error_msg… in upload_fault_system_event() 156 calling_info.user_id(), in upload_fault_system_event()
|
| D | lib.rs | 58 user_id: i32, field 68 user_id: i32, field 146 if let Ok(user_id) = entry.file_name().to_string_lossy().parse::<i32>() { in upgrade_process() 148 check_and_split_db(user_id)?; in upgrade_process() 158 let _tr = loader.init(Box::new(AssetContext { user_id: 0 })); in start_service() 196 create_user_de_dir($calling_info.user_id())?; 204 create_user_de_dir($calling_info.user_id())?;
|
| /base/security/asset/services/core_service/src/operations/common/ |
| D | permission_check.rs | 42 let user_id = get_user_id(uid)?; in check_system_permission() localVariable 43 if user_id > ROOT_USER_UPPERBOUND { in check_system_permission() 46 "[FATAL]The caller user_id is: {}. Not in range[0, 99]", in check_system_permission() 47 user_id in check_system_permission()
|
| /base/security/dlp_permission_service/ |
| D | hisysevent.yaml | 24 USER_ID: {type: INT32, desc: current user id} 30 USER_ID: {type: INT32, desc: current user id} 35 USER_ID: {type: INT32, desc: current user id} 43 USER_ID: {type: INT32, desc: current user id}
|
| /base/customization/enterprise_device_management/test/unittest/common/external/ |
| D | edm_bundle_manager_impl_test.cpp | 29 const int32_t USER_ID = 1; variable 74 want, AppExecFwk::ExtensionAbilityType::BACKUP, FLAGS, USER_ID, extensionInfos), false); 87 EMPTY_BUNDLE_NAME, AppExecFwk::BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 91 … INVALID_BUNDLE_NAME, AppExecFwk::BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 105 BUNDLE_NAME, AppExecFwk::BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
|
| /base/account/os_account/services/accountmgr/test/moduletest/common/ |
| D | bundle_manager_adapter_module_test.cpp | 51 const int32_t USER_ID = 1; variable 84 INVALID_BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 89 …result = g_bundleManagerAdapterProxyRemoteNull->QueryAbilityInfos(want, FLAGS, USER_ID, abilityInf… 93 …result = g_bundleManagerAdapterProxyRemoteNull->QueryExtensionAbilityInfos(want, FLAGS, USER_ID, e… 115 INVALID_BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 137 EMPTY_BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 157 int32_t result = bundleManagerAdapterProxy->GetUidByBundleName(EMPTY_BUNDLE_NAME, USER_ID); 179 bool result = bundleManagerAdapterProxy->QueryAbilityInfos(want, FLAGS, USER_ID, abilityInfos); 201 …bool result = bundleManagerAdapterProxy->QueryExtensionAbilityInfos(want, FLAGS, USER_ID, extensio… 215 BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); [all …]
|
| /base/security/dlp_permission_service/services/dlp_permission/sa/test/unittest/src/ |
| D | dlp_bundle_adapter_test.cpp | 31 const int32_t USER_ID = 1; variable 52 BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 66 BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
|
| /base/notification/distributed_notification_service/ |
| D | hisysevent.yaml | 21 USER_ID: {type: INT32, desc: subscribe notification published from this userId} 45 USER_ID: {type: INT32, desc: userId of notification creater} 65 USER_ID: {type: INT32, desc: subscribe notification published from this userId} 72 USER_ID: {type: INT32, desc: unsubscribe notification published from this userId} 94 USER_ID: {type: INT32, desc: userId of notification creater}
|