Home
last modified time | relevance | path

Searched full:user_id (Results 1 – 25 of 176) sorted by relevance

12345678

/base/security/asset/services/db_operator/src/
Ddatabase_file_upgrade.rs71 pub(crate) fn fmt_old_de_db_path(user_id: i32) -> String { in fmt_old_de_db_path()
72 format!("{}/{}/asset.db", DE_ROOT_PATH, user_id) in fmt_old_de_db_path()
75 fn check_old_db_exist(user_id: i32) -> bool { in check_old_db_exist()
76 let path_str = fmt_old_de_db_path(user_id); in check_old_db_exist()
124 fn get_db_before_split(user_id: i32) -> Result<Database> { in get_db_before_split()
125 let db_path = fmt_de_db_path_with_name(user_id, OLD_DB_NAME); in get_db_before_split()
126 get_db_by_type(user_id, OLD_DB_NAME, db_path, None) in get_db_before_split()
136 fn remove_old_db(user_id: i32) -> Result<()> { in remove_old_db()
138 let path = fmt_de_db_path_with_name(user_id, OLD_DB_NAME); in remove_old_db()
147 fn get_new_db(user_id: i32, info_map: &DbMap) -> Result<Database> { in get_new_db()
[all …]
Ddatabase.rs60 pub(crate) fn get_split_db_lock_by_user_id(user_id: i32) -> &'static UserDbLock { in get_split_db_lock_by_user_id()
62 if let Some(&lock) = map.get(&user_id) { in get_split_db_lock_by_user_id()
66 let nf = Box::new(UserDbLock { mtx: Arc::new(Mutex::new(user_id)) }); in get_split_db_lock_by_user_id()
70 map.insert(user_id, nf); in get_split_db_lock_by_user_id()
76 pub(crate) fn get_file_lock_by_user_id_db_file_name(user_id: i32, db_file_name: String) -> &'static… in get_file_lock_by_user_id_db_file_name()
79 if let Some(&lock) = map.get(&(user_id, db_file_name.clone())) { in get_file_lock_by_user_id_db_file_name()
83 let nf = Box::new(UserDbLock { mtx: Arc::new(Mutex::new(user_id)) }); in get_file_lock_by_user_id_db_file_name()
87 map.insert((user_id, db_file_name), nf); in get_file_lock_by_user_id_db_file_name()
125 pub(crate) fn fmt_ce_db_path_with_name(user_id: i32, db_name: &str) -> String { in fmt_ce_db_path_with_name()
126 format!("data/service/el2/{}/asset_service/{}.db", user_id, db_name) in fmt_ce_db_path_with_name()
[all …]
/base/security/asset/frameworks/os_dependency/file/src/
Dce_operator.rs23 fn construct_ce_db_dir(user_id: i32) -> String { in construct_ce_db_dir()
24 format!("data/service/el2/{}/asset_service", user_id) in construct_ce_db_dir()
27 fn construct_db_key_cipher_path(user_id: i32) -> String { in construct_db_key_cipher_path()
28 format!("data/service/el2/{}/asset_service/{}", user_id, DB_KEY) in construct_db_key_cipher_path()
32 pub fn is_db_key_cipher_file_exist(user_id: i32) -> Result<bool> { in is_db_key_cipher_file_exist()
33 let path_str = construct_db_key_cipher_path(user_id); in is_db_key_cipher_file_exist()
38 pub fn read_db_key_cipher(user_id: i32) -> Result<Vec<u8>> { in read_db_key_cipher()
39 let path_str = construct_db_key_cipher_path(user_id); in read_db_key_cipher()
54 pub fn write_db_key_cipher(user_id: i32, db_key_cipher: &Vec<u8>) -> Result<()> { in write_db_key_cipher()
55 let path_str = construct_db_key_cipher_path(user_id); in write_db_key_cipher()
[all …]
Dde_operator.rs24 fn construct_user_de_path(user_id: i32) -> String { in construct_user_de_path()
25 format!("data/service/el1/public/asset_service/{}", user_id) in construct_user_de_path()
28 fn is_user_de_dir_exist(user_id: i32) -> Result<bool> { in is_user_de_dir_exist()
29 let path_str = construct_user_de_path(user_id); in is_user_de_dir_exist()
34 pub fn create_user_de_dir(user_id: i32) -> Result<()> { in create_user_de_dir()
35 if is_user_de_dir_exist(user_id)? { in create_user_de_dir()
40 let path_str = construct_user_de_path(user_id); in create_user_de_dir()
56 pub fn delete_user_de_dir(user_id: i32) -> Result<()> { in delete_user_de_dir()
57 if !is_user_de_dir_exist(user_id)? { in delete_user_de_dir()
61 let path_str = construct_user_de_path(user_id); in delete_user_de_dir()
[all …]
/base/security/asset/services/core_service/src/
Dupgrade_operator.rs59 pub fn upgrade_clone_app_data(user_id: i32) -> Result<()> { in upgrade_clone_app_data()
60 let upgrade_data = get_file_content(user_id)?; in upgrade_clone_app_data()
61 upgrade(user_id, upgrade_data) in upgrade_clone_app_data()
65 pub fn upgrade_single_clone_app_data(user_id: i32, hap_info: String) -> Result<()> { in upgrade_single_clone_app_data()
66 if user_id == 0 { in upgrade_single_clone_app_data()
81 let version = get_upgrade_version(user_id)?; in upgrade_single_clone_app_data()
85 upgrade_single(user_id, version, parts[INIT_INDEX..parts.len() - 1].join("_")); in upgrade_single_clone_app_data()
89 fn upgrade(user_id: i32, upgrade_data: UpgradeData) -> Result<()> { in upgrade()
97 upgrade_single(user_id, version, info.to_owned()); in upgrade()
102 fn is_hap_in_upgrade_list(user_id: i32, info: &str) -> bool { in is_hap_in_upgrade_list()
[all …]
Dsys_event.rs56 pub(crate) const USER_ID: &str = "USER_ID"; constant
129 .set_param(build_number_param!(SysEvent::USER_ID, calling_info.user_id())) in upload_statistic_system_event()
143 …"[INFO]Calling fun:[{}], user_id:[{}], caller:[{}], start_time:[{:?}], run_time:[{}], ext_info=[{}… in upload_statistic_system_event()
145 calling_info.user_id(), in upload_statistic_system_event()
162 .set_param(build_number_param!(SysEvent::USER_ID, calling_info.user_id())) in upload_fault_system_event()
168 …"[ERROR]Calling fun:[{}], user_id:[{}], caller:[{}], start_time:[{:?}], error_code:[{}], error_msg… in upload_fault_system_event()
170 calling_info.user_id(), in upload_fault_system_event()
/base/security/asset/services/db_key_operator/src/
Dlib.rs29 fn build_db_key_secret_key(user_id: i32) -> Result<SecretKey> { in build_db_key_secret_key()
35 SecretKey::new_with_alias(user_id, auth_type, access_type, require_password_set, alias) in build_db_key_secret_key()
68 fn decrypt_db_key_cipher(user_id: i32, db_key_cipher: &Vec<u8>) -> Result<DbKey> { in decrypt_db_key_cipher()
69 let secret_key = build_db_key_secret_key(user_id)?; in decrypt_db_key_cipher()
85 fn encrypt_db_key(&self, user_id: i32) -> Result<Vec<u8>> { in encrypt_db_key()
86 let secret_key = build_db_key_secret_key(user_id)?; in encrypt_db_key()
95 pub fn check_existance(user_id: i32) -> Result<bool> { in check_existance()
96 is_db_key_cipher_file_exist(user_id) in check_existance()
100 pub fn get_db_key(user_id: i32) -> Result<DbKey> { in get_db_key()
101 match is_db_key_cipher_file_exist(user_id) { in get_db_key()
[all …]
/base/security/asset/services/common/src/
Dcalling_info.rs35 user_id: i32, field
53 …pub fn new(user_id: i32, owner_type: OwnerType, owner_info: Vec<u8>, group: Option<Group>) -> Self… in new()
54 Self { user_id, owner_type, owner_info, group } in new()
59 let mut user_id = process_info.user_id; in build() localVariable
61 user_id = specific_user_id; in build()
76 … CallingInfo { user_id: user_id as i32, owner_type: process_info.owner_type, owner_info, group } in build()
82 …CallingInfo { user_id: user_id as i32, owner_type: process_info.owner_type, owner_info, group: Non… in build()
103 pub fn user_id(&self) -> i32 { in user_id() method
104 self.user_id in user_id()
165 user_id: 0, in test_build_callig_info_specific_and_hap()
[all …]
Dprocess_info.rs41 user_id: u32, field
66 user_id: 0, in build()
120 pub user_id: u32, field
136 let user_id = get_user_id(uid)?; in build() localVariable
144 match unsafe { GetCallingProcessInfo(user_id, uid, &mut process_info_ffi) } { in build()
169 user_id: process_info_ffi.user_id, in build()
Dlib.rs126 let mut user_id = 0; in get_user_id() localVariable
127 if GetUserIdByUid(uid, &mut user_id) { in get_user_id()
128 Ok(user_id) in get_user_id()
136 pub fn is_user_id_exist(user_id: i32) -> Result<bool> { in is_user_id_exist()
139 if IsUserIdExist(user_id, &mut exist) { in is_user_id_exist()
/base/security/asset/services/plugin/src/
Dasset_plugin.rs110 pub user_id: i32, field
123 fn get_db_name(user_id: i32, attributes: &ExtDbMap, is_ce: bool) -> std::result::Result<String, Ass… in get_db_name()
131 … CallingInfo::new(user_id, owner_type, owner_info.to_vec(), Some(Group { developer_id, group_id })) in get_db_name()
133 _ => CallingInfo::new(user_id, owner_type, owner_info.to_vec(), None), in get_db_name()
157 fn init(&mut self, user_id: i32) -> std::result::Result<(), u32> { in init()
158 create_user_de_dir(user_id).map_err(|e| e.code as u32)?; in init()
159 self.user_id = user_id; in init()
169 let db_name = get_db_name(self.user_id, db_info, is_ce).map_err(|e| e.code as u32)?; in create_adapt_cloud_table_for_specific_db()
170 …let mut db = Database::build_with_file_name(self.user_id, &db_name, is_ce).map_err(|e| e.code as u… in create_adapt_cloud_table_for_specific_db()
176 let db_name = get_db_name(self.user_id, attributes, false).map_err(|e| e.code as u32)?; in add()
[all …]
/base/security/asset/services/core_service/src/common_event/
Dlistener.rs100 … remove_db(&format!("{}/{}", DE_ROOT_PATH, calling_info.user_id()), calling_info, false)?; in delete_in_de_db_on_package_removed()
109 … remove_db(&format!("{}/{}", DE_ROOT_PATH, calling_info.user_id()), calling_info, false)?; in delete_in_de_db_on_package_removed()
125 …remove_db(&format!("{}/{}/asset_service", CE_ROOT_PATH, calling_info.user_id()), calling_info, tru… in delete_in_ce_db_on_package_removed()
134 …remove_db(&format!("{}/{}/asset_service", CE_ROOT_PATH, calling_info.user_id()), calling_info, tru… in delete_in_ce_db_on_package_removed()
146 if is_db_key_cipher_file_exist(calling_info.user_id())? { in delete_on_package_removed()
168 user_id: i32, in construct_calling_infos()
173 let mut calling_infos = vec![CallingInfo::new(user_id, OwnerType::Hap, owner.clone(), None)]; in construct_calling_infos()
188 match unsafe { GetUninstallGroups(user_id, &developer_id, &mut the_group_ids) } { in construct_calling_infos()
211 user_id, in construct_calling_infos()
222 user_id: i32, in delete_data_by_owner()
[all …]
Dstart_event.rs28 const USER_ID: &str = "userId"; constant
41 let Some(user_id) = self.0.get(USER_ID) else { in parse()
44 let user_id = match user_id.parse::<i32>() { in parse() localVariable
45 Ok(user_id) => user_id, in parse()
87 Ok(PackageInfo { user_id, app_index, app_id, developer_id, group_ids, bundle_name }) in parse()
112 user_id: package_info.user_id, in handle_package_removed()
136 let user_id = match want.get(USER_ID) { in process_common_event_async() localVariable
140 loge!("[FATIL]Get restore app info failed, failed to parse user_id"); in process_common_event_async()
168 listener::on_app_restore(user_id, bundle_name.as_ptr(), app_index); in process_common_event_async()
/base/notification/common_event_service/
Dhisysevent.yaml19 USER_ID: {type: INT32, desc: userId}
27 USER_ID: {type: INT32, desc: userId}
34 USER_ID: {type: INT32, desc: userId}
40 USER_ID: {type: INT32, desc: userId}
49 USER_ID: {type: INT32, desc: userId}
57 USER_ID: {type: INT32, desc: userId}
65 USER_ID: {type: INT32, desc: userId}
73 USER_ID: {type: INT32, desc: userId}
82 USER_ID: {type: INT32, desc: userId}
/base/useriam/user_auth_framework/test/unittest/services/src/
Duser_idm_database_test.cpp47 constexpr int32_t USER_ID = 100; variable
49 database.GetSecUserInfo(USER_ID, secUserInfo);
56 constexpr int32_t USER_ID = 100; variable
68 EXPECT_CALL(*mock, GetUserInfo(USER_ID, _, _, _))
73 database.GetSecUserInfo(USER_ID, secUserInfo);
81 constexpr int32_t USER_ID = 100; variable
88 EXPECT_CALL(*mock, GetUserInfo(USER_ID, _, _, _))
92 UserIdmDatabase::Instance().GetSecUserInfo(USER_ID, secUserInfo);
101 constexpr int32_t USER_ID = 100; variable
119 EXPECT_CALL(*mock, GetUserInfo(USER_ID, _, _, _))
[all …]
/base/security/asset/services/crypto_manager/src/
Dsecret_key.rs32 user_id: i32, field
73 alias.extend_from_slice(&calling_info.user_id().to_le_bytes()); in calculate_key_alias()
98 user_id: calling_info.user_id(), in get_existing_key_alias()
110 user_id: calling_info.user_id(), in get_existing_key_alias()
123 user_id: calling_info.user_id(), in get_existing_key_alias()
147 let key_id = KeyId::new(calling_info.user_id(), alias_blob, access_type); in huks_rename_key_alias()
195 user_id: i32, in new_with_alias()
201 Ok(Self { user_id, auth_type, access_type, require_password_set, alias }) in new_with_alias()
214 user_id: calling_info.user_id(), in new_without_alias()
226 let key_id = KeyId::new(self.user_id, key_alias, self.access_type); in exists()
[all …]
Dlib.rs38 user_id: i32, field
44 fn new(user_id: i32, alias: HksBlob, accessibility: Accessibility) -> Self { in new()
45 Self { user_id, alias, accessibility } in new()
/base/tee/tee_dev_kit/sdk/build/script/
Dgenerate_signature.py39 user_id = env.get("ONLINE_USERNAME")
41 if user_id == "" or user_id is None:
43 user_id = input("Please input your account:")
49 return (user_id, password)
68 (user_id, password) = gen_identity()
75 % (add_opens_flag, jar_path, cfg.server_ip, user_id, password, \
82 % (add_opens_flag, jar_path, uuid_str, cfg.server_ip, user_id, password, \
88 % (add_opens_flag, jar_path, uuid_str, cfg.server_ip, user_id, password, \
/base/security/asset/services/core_service/src/operations/common/
Dpermission_check.rs42 let user_id = get_user_id(uid)?; in check_system_permission() localVariable
43 if user_id > ROOT_USER_UPPERBOUND { in check_system_permission()
46 "[FATAL]The caller user_id is: {}. Not in range[0, 99]", in check_system_permission()
47 user_id in check_system_permission()
/base/security/dlp_permission_service/
Dhisysevent.yaml24 USER_ID: {type: INT32, desc: current user id}
30 USER_ID: {type: INT32, desc: current user id}
35 USER_ID: {type: INT32, desc: current user id}
43 USER_ID: {type: INT32, desc: current user id}
/base/tee/tee_os_framework/lib/teelib/libpermission_service/src/
Dpermsrv_api.c18 void tee_ext_register_ta(const TEE_UUID *uuid, uint32_t task_id, uint32_t user_id) in tee_ext_register_ta() argument
25 permsrv_registerta(uuid, task_id, user_id, REGISTER_TA); in tee_ext_register_ta()
28 void tee_ext_unregister_ta(const TEE_UUID *uuid, uint32_t task_id, uint32_t user_id) in tee_ext_unregister_ta() argument
35 permsrv_registerta(uuid, task_id, user_id, UNREGISTER_TA); in tee_ext_unregister_ta()
/base/customization/enterprise_device_management/test/unittest/common/external/
Dedm_bundle_manager_impl_test.cpp29 const int32_t USER_ID = 1; variable
74 want, AppExecFwk::ExtensionAbilityType::BACKUP, FLAGS, USER_ID, extensionInfos), false);
87 EMPTY_BUNDLE_NAME, AppExecFwk::BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
91 … INVALID_BUNDLE_NAME, AppExecFwk::BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
105 BUNDLE_NAME, AppExecFwk::BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
/base/security/dlp_permission_service/services/dlp_permission/sa/test/unittest/src/
Ddlp_bundle_adapter_test.cpp31 const int32_t USER_ID = 1; variable
52 BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
66 BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
/base/account/os_account/services/accountmgr/test/moduletest/common/
Dbundle_manager_adapter_module_test.cpp50 const int32_t USER_ID = 1; variable
83 INVALID_BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
88 …result = g_bundleManagerAdapterProxyRemoteNull->QueryAbilityInfos(want, FLAGS, USER_ID, abilityInf…
92 …result = g_bundleManagerAdapterProxyRemoteNull->QueryExtensionAbilityInfos(want, FLAGS, USER_ID, e…
114 INVALID_BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
136 EMPTY_BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
156 int32_t result = bundleManagerAdapterProxy->GetUidByBundleName(EMPTY_BUNDLE_NAME, USER_ID);
178 bool result = bundleManagerAdapterProxy->QueryAbilityInfos(want, FLAGS, USER_ID, abilityInfos);
200 …bool result = bundleManagerAdapterProxy->QueryExtensionAbilityInfos(want, FLAGS, USER_ID, extensio…
214 BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
[all …]
/base/tee/tee_os_framework/lib/teelib/libpermission_service/include/
Dpermsrv_api.h23 void tee_ext_register_ta(const TEE_UUID *uuid, uint32_t task_id, uint32_t user_id);
24 void tee_ext_unregister_ta(const TEE_UUID *uuid, uint32_t task_id, uint32_t user_id);

12345678