| /base/security/asset/services/db_operator/src/ |
| D | database_file_upgrade.rs | 71 pub(crate) fn fmt_old_de_db_path(user_id: i32) -> String { in fmt_old_de_db_path() 72 format!("{}/{}/asset.db", DE_ROOT_PATH, user_id) in fmt_old_de_db_path() 75 fn check_old_db_exist(user_id: i32) -> bool { in check_old_db_exist() 76 let path_str = fmt_old_de_db_path(user_id); in check_old_db_exist() 124 fn get_db_before_split(user_id: i32) -> Result<Database> { in get_db_before_split() 125 let db_path = fmt_de_db_path_with_name(user_id, OLD_DB_NAME); in get_db_before_split() 126 get_db_by_type(user_id, OLD_DB_NAME, db_path, None) in get_db_before_split() 136 fn remove_old_db(user_id: i32) -> Result<()> { in remove_old_db() 138 let path = fmt_de_db_path_with_name(user_id, OLD_DB_NAME); in remove_old_db() 147 fn get_new_db(user_id: i32, info_map: &DbMap) -> Result<Database> { in get_new_db() [all …]
|
| D | database.rs | 60 pub(crate) fn get_split_db_lock_by_user_id(user_id: i32) -> &'static UserDbLock { in get_split_db_lock_by_user_id() 62 if let Some(&lock) = map.get(&user_id) { in get_split_db_lock_by_user_id() 66 let nf = Box::new(UserDbLock { mtx: Arc::new(Mutex::new(user_id)) }); in get_split_db_lock_by_user_id() 70 map.insert(user_id, nf); in get_split_db_lock_by_user_id() 76 pub(crate) fn get_file_lock_by_user_id_db_file_name(user_id: i32, db_file_name: String) -> &'static… in get_file_lock_by_user_id_db_file_name() 79 if let Some(&lock) = map.get(&(user_id, db_file_name.clone())) { in get_file_lock_by_user_id_db_file_name() 83 let nf = Box::new(UserDbLock { mtx: Arc::new(Mutex::new(user_id)) }); in get_file_lock_by_user_id_db_file_name() 87 map.insert((user_id, db_file_name), nf); in get_file_lock_by_user_id_db_file_name() 125 pub(crate) fn fmt_ce_db_path_with_name(user_id: i32, db_name: &str) -> String { in fmt_ce_db_path_with_name() 126 format!("data/service/el2/{}/asset_service/{}.db", user_id, db_name) in fmt_ce_db_path_with_name() [all …]
|
| /base/security/asset/frameworks/os_dependency/file/src/ |
| D | ce_operator.rs | 23 fn construct_ce_db_dir(user_id: i32) -> String { in construct_ce_db_dir() 24 format!("data/service/el2/{}/asset_service", user_id) in construct_ce_db_dir() 27 fn construct_db_key_cipher_path(user_id: i32) -> String { in construct_db_key_cipher_path() 28 format!("data/service/el2/{}/asset_service/{}", user_id, DB_KEY) in construct_db_key_cipher_path() 32 pub fn is_db_key_cipher_file_exist(user_id: i32) -> Result<bool> { in is_db_key_cipher_file_exist() 33 let path_str = construct_db_key_cipher_path(user_id); in is_db_key_cipher_file_exist() 38 pub fn read_db_key_cipher(user_id: i32) -> Result<Vec<u8>> { in read_db_key_cipher() 39 let path_str = construct_db_key_cipher_path(user_id); in read_db_key_cipher() 54 pub fn write_db_key_cipher(user_id: i32, db_key_cipher: &Vec<u8>) -> Result<()> { in write_db_key_cipher() 55 let path_str = construct_db_key_cipher_path(user_id); in write_db_key_cipher() [all …]
|
| D | de_operator.rs | 24 fn construct_user_de_path(user_id: i32) -> String { in construct_user_de_path() 25 format!("data/service/el1/public/asset_service/{}", user_id) in construct_user_de_path() 28 fn is_user_de_dir_exist(user_id: i32) -> Result<bool> { in is_user_de_dir_exist() 29 let path_str = construct_user_de_path(user_id); in is_user_de_dir_exist() 34 pub fn create_user_de_dir(user_id: i32) -> Result<()> { in create_user_de_dir() 35 if is_user_de_dir_exist(user_id)? { in create_user_de_dir() 40 let path_str = construct_user_de_path(user_id); in create_user_de_dir() 56 pub fn delete_user_de_dir(user_id: i32) -> Result<()> { in delete_user_de_dir() 57 if !is_user_de_dir_exist(user_id)? { in delete_user_de_dir() 61 let path_str = construct_user_de_path(user_id); in delete_user_de_dir() [all …]
|
| /base/security/asset/services/core_service/src/ |
| D | upgrade_operator.rs | 59 pub fn upgrade_clone_app_data(user_id: i32) -> Result<()> { in upgrade_clone_app_data() 60 let upgrade_data = get_file_content(user_id)?; in upgrade_clone_app_data() 61 upgrade(user_id, upgrade_data) in upgrade_clone_app_data() 65 pub fn upgrade_single_clone_app_data(user_id: i32, hap_info: String) -> Result<()> { in upgrade_single_clone_app_data() 66 if user_id == 0 { in upgrade_single_clone_app_data() 81 let version = get_upgrade_version(user_id)?; in upgrade_single_clone_app_data() 85 upgrade_single(user_id, version, parts[INIT_INDEX..parts.len() - 1].join("_")); in upgrade_single_clone_app_data() 89 fn upgrade(user_id: i32, upgrade_data: UpgradeData) -> Result<()> { in upgrade() 97 upgrade_single(user_id, version, info.to_owned()); in upgrade() 102 fn is_hap_in_upgrade_list(user_id: i32, info: &str) -> bool { in is_hap_in_upgrade_list() [all …]
|
| D | sys_event.rs | 56 pub(crate) const USER_ID: &str = "USER_ID"; constant 129 .set_param(build_number_param!(SysEvent::USER_ID, calling_info.user_id())) in upload_statistic_system_event() 143 …"[INFO]Calling fun:[{}], user_id:[{}], caller:[{}], start_time:[{:?}], run_time:[{}], ext_info=[{}… in upload_statistic_system_event() 145 calling_info.user_id(), in upload_statistic_system_event() 162 .set_param(build_number_param!(SysEvent::USER_ID, calling_info.user_id())) in upload_fault_system_event() 168 …"[ERROR]Calling fun:[{}], user_id:[{}], caller:[{}], start_time:[{:?}], error_code:[{}], error_msg… in upload_fault_system_event() 170 calling_info.user_id(), in upload_fault_system_event()
|
| /base/security/asset/services/db_key_operator/src/ |
| D | lib.rs | 29 fn build_db_key_secret_key(user_id: i32) -> Result<SecretKey> { in build_db_key_secret_key() 35 SecretKey::new_with_alias(user_id, auth_type, access_type, require_password_set, alias) in build_db_key_secret_key() 68 fn decrypt_db_key_cipher(user_id: i32, db_key_cipher: &Vec<u8>) -> Result<DbKey> { in decrypt_db_key_cipher() 69 let secret_key = build_db_key_secret_key(user_id)?; in decrypt_db_key_cipher() 85 fn encrypt_db_key(&self, user_id: i32) -> Result<Vec<u8>> { in encrypt_db_key() 86 let secret_key = build_db_key_secret_key(user_id)?; in encrypt_db_key() 95 pub fn check_existance(user_id: i32) -> Result<bool> { in check_existance() 96 is_db_key_cipher_file_exist(user_id) in check_existance() 100 pub fn get_db_key(user_id: i32) -> Result<DbKey> { in get_db_key() 101 match is_db_key_cipher_file_exist(user_id) { in get_db_key() [all …]
|
| /base/security/asset/services/common/src/ |
| D | calling_info.rs | 35 user_id: i32, field 53 …pub fn new(user_id: i32, owner_type: OwnerType, owner_info: Vec<u8>, group: Option<Group>) -> Self… in new() 54 Self { user_id, owner_type, owner_info, group } in new() 59 let mut user_id = process_info.user_id; in build() localVariable 61 user_id = specific_user_id; in build() 76 … CallingInfo { user_id: user_id as i32, owner_type: process_info.owner_type, owner_info, group } in build() 82 …CallingInfo { user_id: user_id as i32, owner_type: process_info.owner_type, owner_info, group: Non… in build() 103 pub fn user_id(&self) -> i32 { in user_id() method 104 self.user_id in user_id() 165 user_id: 0, in test_build_callig_info_specific_and_hap() [all …]
|
| D | process_info.rs | 41 user_id: u32, field 66 user_id: 0, in build() 120 pub user_id: u32, field 136 let user_id = get_user_id(uid)?; in build() localVariable 144 match unsafe { GetCallingProcessInfo(user_id, uid, &mut process_info_ffi) } { in build() 169 user_id: process_info_ffi.user_id, in build()
|
| D | lib.rs | 126 let mut user_id = 0; in get_user_id() localVariable 127 if GetUserIdByUid(uid, &mut user_id) { in get_user_id() 128 Ok(user_id) in get_user_id() 136 pub fn is_user_id_exist(user_id: i32) -> Result<bool> { in is_user_id_exist() 139 if IsUserIdExist(user_id, &mut exist) { in is_user_id_exist()
|
| /base/security/asset/services/plugin/src/ |
| D | asset_plugin.rs | 110 pub user_id: i32, field 123 fn get_db_name(user_id: i32, attributes: &ExtDbMap, is_ce: bool) -> std::result::Result<String, Ass… in get_db_name() 131 … CallingInfo::new(user_id, owner_type, owner_info.to_vec(), Some(Group { developer_id, group_id })) in get_db_name() 133 _ => CallingInfo::new(user_id, owner_type, owner_info.to_vec(), None), in get_db_name() 157 fn init(&mut self, user_id: i32) -> std::result::Result<(), u32> { in init() 158 create_user_de_dir(user_id).map_err(|e| e.code as u32)?; in init() 159 self.user_id = user_id; in init() 169 let db_name = get_db_name(self.user_id, db_info, is_ce).map_err(|e| e.code as u32)?; in create_adapt_cloud_table_for_specific_db() 170 …let mut db = Database::build_with_file_name(self.user_id, &db_name, is_ce).map_err(|e| e.code as u… in create_adapt_cloud_table_for_specific_db() 176 let db_name = get_db_name(self.user_id, attributes, false).map_err(|e| e.code as u32)?; in add() [all …]
|
| /base/security/asset/services/core_service/src/common_event/ |
| D | listener.rs | 100 … remove_db(&format!("{}/{}", DE_ROOT_PATH, calling_info.user_id()), calling_info, false)?; in delete_in_de_db_on_package_removed() 109 … remove_db(&format!("{}/{}", DE_ROOT_PATH, calling_info.user_id()), calling_info, false)?; in delete_in_de_db_on_package_removed() 125 …remove_db(&format!("{}/{}/asset_service", CE_ROOT_PATH, calling_info.user_id()), calling_info, tru… in delete_in_ce_db_on_package_removed() 134 …remove_db(&format!("{}/{}/asset_service", CE_ROOT_PATH, calling_info.user_id()), calling_info, tru… in delete_in_ce_db_on_package_removed() 146 if is_db_key_cipher_file_exist(calling_info.user_id())? { in delete_on_package_removed() 168 user_id: i32, in construct_calling_infos() 173 let mut calling_infos = vec![CallingInfo::new(user_id, OwnerType::Hap, owner.clone(), None)]; in construct_calling_infos() 188 match unsafe { GetUninstallGroups(user_id, &developer_id, &mut the_group_ids) } { in construct_calling_infos() 211 user_id, in construct_calling_infos() 222 user_id: i32, in delete_data_by_owner() [all …]
|
| D | start_event.rs | 28 const USER_ID: &str = "userId"; constant 41 let Some(user_id) = self.0.get(USER_ID) else { in parse() 44 let user_id = match user_id.parse::<i32>() { in parse() localVariable 45 Ok(user_id) => user_id, in parse() 87 Ok(PackageInfo { user_id, app_index, app_id, developer_id, group_ids, bundle_name }) in parse() 112 user_id: package_info.user_id, in handle_package_removed() 136 let user_id = match want.get(USER_ID) { in process_common_event_async() localVariable 140 loge!("[FATIL]Get restore app info failed, failed to parse user_id"); in process_common_event_async() 168 listener::on_app_restore(user_id, bundle_name.as_ptr(), app_index); in process_common_event_async()
|
| /base/notification/common_event_service/ |
| D | hisysevent.yaml | 19 USER_ID: {type: INT32, desc: userId} 27 USER_ID: {type: INT32, desc: userId} 34 USER_ID: {type: INT32, desc: userId} 40 USER_ID: {type: INT32, desc: userId} 49 USER_ID: {type: INT32, desc: userId} 57 USER_ID: {type: INT32, desc: userId} 65 USER_ID: {type: INT32, desc: userId} 73 USER_ID: {type: INT32, desc: userId} 82 USER_ID: {type: INT32, desc: userId}
|
| /base/useriam/user_auth_framework/test/unittest/services/src/ |
| D | user_idm_database_test.cpp | 47 constexpr int32_t USER_ID = 100; variable 49 database.GetSecUserInfo(USER_ID, secUserInfo); 56 constexpr int32_t USER_ID = 100; variable 68 EXPECT_CALL(*mock, GetUserInfo(USER_ID, _, _, _)) 73 database.GetSecUserInfo(USER_ID, secUserInfo); 81 constexpr int32_t USER_ID = 100; variable 88 EXPECT_CALL(*mock, GetUserInfo(USER_ID, _, _, _)) 92 UserIdmDatabase::Instance().GetSecUserInfo(USER_ID, secUserInfo); 101 constexpr int32_t USER_ID = 100; variable 119 EXPECT_CALL(*mock, GetUserInfo(USER_ID, _, _, _)) [all …]
|
| /base/security/asset/services/crypto_manager/src/ |
| D | secret_key.rs | 32 user_id: i32, field 73 alias.extend_from_slice(&calling_info.user_id().to_le_bytes()); in calculate_key_alias() 98 user_id: calling_info.user_id(), in get_existing_key_alias() 110 user_id: calling_info.user_id(), in get_existing_key_alias() 123 user_id: calling_info.user_id(), in get_existing_key_alias() 147 let key_id = KeyId::new(calling_info.user_id(), alias_blob, access_type); in huks_rename_key_alias() 195 user_id: i32, in new_with_alias() 201 Ok(Self { user_id, auth_type, access_type, require_password_set, alias }) in new_with_alias() 214 user_id: calling_info.user_id(), in new_without_alias() 226 let key_id = KeyId::new(self.user_id, key_alias, self.access_type); in exists() [all …]
|
| D | lib.rs | 38 user_id: i32, field 44 fn new(user_id: i32, alias: HksBlob, accessibility: Accessibility) -> Self { in new() 45 Self { user_id, alias, accessibility } in new()
|
| /base/tee/tee_dev_kit/sdk/build/script/ |
| D | generate_signature.py | 39 user_id = env.get("ONLINE_USERNAME") 41 if user_id == "" or user_id is None: 43 user_id = input("Please input your account:") 49 return (user_id, password) 68 (user_id, password) = gen_identity() 75 % (add_opens_flag, jar_path, cfg.server_ip, user_id, password, \ 82 % (add_opens_flag, jar_path, uuid_str, cfg.server_ip, user_id, password, \ 88 % (add_opens_flag, jar_path, uuid_str, cfg.server_ip, user_id, password, \
|
| /base/security/asset/services/core_service/src/operations/common/ |
| D | permission_check.rs | 42 let user_id = get_user_id(uid)?; in check_system_permission() localVariable 43 if user_id > ROOT_USER_UPPERBOUND { in check_system_permission() 46 "[FATAL]The caller user_id is: {}. Not in range[0, 99]", in check_system_permission() 47 user_id in check_system_permission()
|
| /base/security/dlp_permission_service/ |
| D | hisysevent.yaml | 24 USER_ID: {type: INT32, desc: current user id} 30 USER_ID: {type: INT32, desc: current user id} 35 USER_ID: {type: INT32, desc: current user id} 43 USER_ID: {type: INT32, desc: current user id}
|
| /base/tee/tee_os_framework/lib/teelib/libpermission_service/src/ |
| D | permsrv_api.c | 18 void tee_ext_register_ta(const TEE_UUID *uuid, uint32_t task_id, uint32_t user_id) in tee_ext_register_ta() argument 25 permsrv_registerta(uuid, task_id, user_id, REGISTER_TA); in tee_ext_register_ta() 28 void tee_ext_unregister_ta(const TEE_UUID *uuid, uint32_t task_id, uint32_t user_id) in tee_ext_unregister_ta() argument 35 permsrv_registerta(uuid, task_id, user_id, UNREGISTER_TA); in tee_ext_unregister_ta()
|
| /base/customization/enterprise_device_management/test/unittest/common/external/ |
| D | edm_bundle_manager_impl_test.cpp | 29 const int32_t USER_ID = 1; variable 74 want, AppExecFwk::ExtensionAbilityType::BACKUP, FLAGS, USER_ID, extensionInfos), false); 87 EMPTY_BUNDLE_NAME, AppExecFwk::BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 91 … INVALID_BUNDLE_NAME, AppExecFwk::BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 105 BUNDLE_NAME, AppExecFwk::BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
|
| /base/security/dlp_permission_service/services/dlp_permission/sa/test/unittest/src/ |
| D | dlp_bundle_adapter_test.cpp | 31 const int32_t USER_ID = 1; variable 52 BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 66 BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
|
| /base/account/os_account/services/accountmgr/test/moduletest/common/ |
| D | bundle_manager_adapter_module_test.cpp | 50 const int32_t USER_ID = 1; variable 83 INVALID_BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 88 …result = g_bundleManagerAdapterProxyRemoteNull->QueryAbilityInfos(want, FLAGS, USER_ID, abilityInf… 92 …result = g_bundleManagerAdapterProxyRemoteNull->QueryExtensionAbilityInfos(want, FLAGS, USER_ID, e… 114 INVALID_BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 136 EMPTY_BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 156 int32_t result = bundleManagerAdapterProxy->GetUidByBundleName(EMPTY_BUNDLE_NAME, USER_ID); 178 bool result = bundleManagerAdapterProxy->QueryAbilityInfos(want, FLAGS, USER_ID, abilityInfos); 200 …bool result = bundleManagerAdapterProxy->QueryExtensionAbilityInfos(want, FLAGS, USER_ID, extensio… 214 BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); [all …]
|
| /base/tee/tee_os_framework/lib/teelib/libpermission_service/include/ |
| D | permsrv_api.h | 23 void tee_ext_register_ta(const TEE_UUID *uuid, uint32_t task_id, uint32_t user_id); 24 void tee_ext_unregister_ta(const TEE_UUID *uuid, uint32_t task_id, uint32_t user_id);
|