Home
last modified time | relevance | path

Searched full:user_id (Results 1 – 25 of 145) sorted by relevance

123456

/base/security/asset/services/common/src/
Dcalling_info.rs26 user_id: i32, field
38 pub fn new(user_id: i32, owner_type: OwnerType, owner_info: Vec<u8>) -> Self { in new()
39 Self { user_id, owner_type, owner_info } in new()
57 let mut user_id = process_info.user_id; in build() localVariable
59 user_id = specific_user_id; in build()
62 CallingInfo { user_id: user_id as i32, owner_type: process_info.owner_type, owner_info } in build()
76 pub fn user_id(&self) -> i32 { in user_id() method
77 self.user_id in user_id()
91 user_id: 0, in test_build_callig_info_specific_and_hap()
98 assert_eq!(calling_info.user_id(), specific_user_id as i32); in test_build_callig_info_specific_and_hap()
[all …]
Dprocess_info.rs38 user_id: u32, field
49 fn init(user_id: u32, uid: u32, process_name: &mut Vec<u8>, app_id: &mut Vec<u8>) -> Self { in init()
51 user_id, in init()
100 pub user_id: u32, field
116 let user_id = get_user_id(uid)?; in build() localVariable
119 …let mut process_info_ffi = ProcessInfoFfi::init(user_id, uid as u32, &mut process_name, &mut app_i… in build()
120 match unsafe { GetCallingProcessInfo(user_id, uid, &mut process_info_ffi) } { in build()
139 user_id, in build()
Dlib.rs70 let mut user_id = 0; in get_user_id() localVariable
71 if GetUserIdByUid(uid, &mut user_id) { in get_user_id()
72 Ok(user_id) in get_user_id()
80 pub fn is_user_id_exist(user_id: i32) -> Result<bool> { in is_user_id_exist()
83 if IsUserIdExist(user_id, &mut exist) { in is_user_id_exist()
/base/security/asset/frameworks/os_dependency/file/src/
Dlib.rs25 fn construct_user_path(user_id: i32) -> String { in construct_user_path()
26 format!("{}/{}", ROOT_PATH, user_id) in construct_user_path()
30 pub fn is_user_db_dir_exist(user_id: i32) -> bool { in is_user_db_dir_exist()
31 let path_str = construct_user_path(user_id); in is_user_db_dir_exist()
37 pub fn create_user_db_dir(user_id: i32) -> Result<()> { in create_user_db_dir()
38 if is_user_db_dir_exist(user_id) { in create_user_db_dir()
43 let path_str = construct_user_path(user_id); in create_user_db_dir()
55 pub fn delete_user_db_dir(user_id: i32) -> Result<()> { in delete_user_db_dir()
56 if !is_user_db_dir_exist(user_id) { in delete_user_db_dir()
60 let path_str = construct_user_path(user_id); in delete_user_db_dir()
/base/inputmethod/imf/test/unittest/cpp_test/src/
Denable_ime_data_parse_test.cpp38 static constexpr int32_t USER_ID = 100; member in OHOS::MiscServices::EnableImeDataParseTest
51 EnableImeDataParser::GetInstance()->Initialize(USER_ID); in SetUpTestCase()
68 ImeInfoInquirer::GetInstance().GetCurrentInputMethod(USER_ID)->name = "defaultImeName"; in SetUp()
69 ImeInfoInquirer::GetInstance().GetCurrentInputMethod(USER_ID)->id = "defaultImeId"; in SetUp()
89 …leImeDataParser::GetInstance()->GetEnableData(IME_KEY, enableVec, EnableImeDataParseTest::USER_ID);
131 …leImeDataParser::GetInstance()->GetEnableData(IME_KEY, enableVec, EnableImeDataParseTest::USER_ID);
149 …meDataParser::GetInstance()->CheckNeedSwitch(IME_KEY, switchInfo, EnableImeDataParseTest::USER_ID);
163 ImeInfoInquirer::GetInstance().GetCurrentInputMethod(USER_ID)->name = "xiaoyiIme";
164 ImeInfoInquirer::GetInstance().GetCurrentInputMethod(USER_ID)->id = "xiaoyiImeId";
170 bool ret = EnableImeDataParser::GetInstance()->CheckNeedSwitch(IME_KEY, switchInfo, USER_ID);
[all …]
Dsecurity_mode_parser_test.cpp43 static constexpr int32_t USER_ID = 100; member in OHOS::MiscServices::SecurityModeParserTest
56 SecurityModeParser::GetInstance()->Initialize(USER_ID); in SetUpTestCase()
64 service_->userId_ = USER_ID; in SetUpTestCase()
115 …t32_t ret = SecurityModeParser::GetInstance()->UpdateFullModeList(SecurityModeParserTest::USER_ID);
135 …t32_t ret = SecurityModeParser::GetInstance()->UpdateFullModeList(SecurityModeParserTest::USER_ID);
138 … SecurityModeParser::GetInstance()->GetSecurityMode("xiaoyiIme", SecurityModeParserTest::USER_ID);
152 …t32_t ret = SecurityModeParser::GetInstance()->UpdateFullModeList(SecurityModeParserTest::USER_ID);
155 SecurityModeParser::GetInstance()->GetSecurityMode("test", SecurityModeParserTest::USER_ID);
/base/security/asset/services/core_service/src/common_event/
Dlistener.rs46 fn delete_on_package_removed(user_id: i32, owner: Vec<u8>) -> Result<bool> { in delete_on_package_removed()
53 let mut db = Database::build(user_id)?; in delete_on_package_removed()
65 fn delete_data_by_owner(user_id: i32, owner: *const u8, owner_size: u32) { in delete_data_by_owner()
69 let calling_info = CallingInfo::new(user_id, OwnerType::Hap, owner.clone()); in delete_data_by_owner()
71 let res = match delete_on_package_removed(user_id, owner) { in delete_data_by_owner()
92 user_id: i32, in on_package_removed()
98 delete_data_by_owner(user_id, owner, owner_size); in on_package_removed()
109 logi!("[INFO]On app -{}-{}-{}- removed.", user_id, bundle_name, app_index); in on_package_removed()
113 params.insert(PARAM_NAME_USER_ID, Value::Number(user_id as u32)); in on_package_removed()
126 extern "C" fn delete_dir_by_user(user_id: i32) { in delete_dir_by_user()
[all …]
Dstart_event.rs26 const USER_ID: &str = "userId"; constant
33 let Some(user_id) = want.get(USER_ID) else { in handle_package_removed()
59 let user_id = match user_id.parse::<i32>() { in handle_package_removed() localVariable
62 loge!("[FATIL]Get removed user_id failed, failed to parse user_id"); in handle_package_removed()
72 …listener::on_package_removed(user_id, owner.as_ptr(), owner.len() as u32, bundle_name.as_ptr(), ap… in handle_package_removed()
90 let user_id = match want.get(USER_ID) { in handle_common_event() localVariable
94 loge!("[FATIL]Get restore app info failed, failed to parse user_id"); in handle_common_event()
122 listener::on_app_restore(user_id, bundle_name.as_ptr(), app_index); in handle_common_event()
/base/security/asset/services/core_service/src/
Dsys_event.rs40 pub(crate) const USER_ID: &str = "USER_ID"; constant
70 .set_param(build_number_param!(SysEvent::USER_ID, calling_info.user_id())) in upload_statistic_system_event()
76 "[INFO]Calling fun:[{}], user_id:[{}], caller:[{}], start_time:[{:?}], run_time:[{}]", in upload_statistic_system_event()
78 calling_info.user_id(), in upload_statistic_system_event()
94 .set_param(build_number_param!(SysEvent::USER_ID, calling_info.user_id())) in upload_fault_system_event()
100 "[ERROR]Calling fun:[{}], user_id:[{}], in upload_fault_system_event()
103 calling_info.user_id(), in upload_fault_system_event()
/base/notification/common_event_service/
Dhisysevent.yaml19 USER_ID: {type: INT32, desc: userId}
27 USER_ID: {type: INT32, desc: userId}
34 USER_ID: {type: INT32, desc: userId}
40 USER_ID: {type: INT32, desc: userId}
49 USER_ID: {type: INT32, desc: userId}
57 USER_ID: {type: INT32, desc: userId}
65 USER_ID: {type: INT32, desc: userId}
73 USER_ID: {type: INT32, desc: userId}
82 USER_ID: {type: INT32, desc: userId}
/base/security/asset/services/db_operator/src/
Ddatabase.rs47 pub(crate) user_id: i32, field
55 fn get_file_lock_by_user_id(user_id: i32) -> &'static UserDbLock { in get_file_lock_by_user_id()
58 if f.user_id == user_id { in get_file_lock_by_user_id()
62 let nf = Box::new(UserDbLock { user_id, mtx: Mutex::new(user_id) }); in get_file_lock_by_user_id()
88 fn fmt_db_path(user_id: i32) -> String { in fmt_db_path()
89 format!("{}/{}/asset.db", ROOT_PATH, user_id) in fmt_db_path()
106 pub fn build(user_id: i32) -> Result<Database> { in build()
107 let path = fmt_db_path(user_id); in build()
109 let lock = get_file_lock_by_user_id(user_id); in build()
114 db.upgrade(user_id, DB_UPGRADE_VERSION, |_, _, _| Ok(()))?; in build()
[all …]
Ddatabase_file_upgrade.rs24 pub fn trigger_db_upgrade(user_id: i32) -> Result<()> { in trigger_db_upgrade()
25 let _ = Database::build(user_id)?; in trigger_db_upgrade()
/base/useriam/user_auth_framework/test/unittest/services/src/
Duser_idm_database_test.cpp47 constexpr int32_t USER_ID = 100; variable
49 database.GetSecUserInfo(USER_ID, secUserInfo);
56 constexpr int32_t USER_ID = 100; variable
68 EXPECT_CALL(*mock, GetUserInfo(USER_ID, _, _, _))
73 database.GetSecUserInfo(USER_ID, secUserInfo);
81 constexpr int32_t USER_ID = 100; variable
88 EXPECT_CALL(*mock, GetUserInfo(USER_ID, _, _, _))
92 UserIdmDatabase::Instance().GetSecUserInfo(USER_ID, secUserInfo);
101 constexpr int32_t USER_ID = 100; variable
119 EXPECT_CALL(*mock, GetUserInfo(USER_ID, _, _, _))
[all …]
/base/security/asset/services/core_service/src/operations/common/
Dpermission_check.rs42 let user_id = get_user_id(uid)?; in check_system_permission() localVariable
43 if user_id > ROOT_USER_UPPERBOUND { in check_system_permission()
46 "[FATAL]The caller user_id is: {}. Not in range[0, 99]", in check_system_permission()
47 user_id in check_system_permission()
/base/security/dlp_permission_service/
Dhisysevent.yaml24 USER_ID: {type: INT32, desc: current user id}
30 USER_ID: {type: INT32, desc: current user id}
35 USER_ID: {type: INT32, desc: current user id}
43 USER_ID: {type: INT32, desc: current user id}
/base/security/asset/services/crypto_manager/src/
Dlib.rs38 user_id: i32, field
44 fn new(user_id: i32, alias: HksBlob, accessibility: Accessibility) -> Self { in new()
45 Self { user_id, alias, accessibility } in new()
/base/customization/enterprise_device_management/test/unittest/common/external/
Dedm_bundle_manager_impl_test.cpp29 const int32_t USER_ID = 1; variable
74 want, AppExecFwk::ExtensionAbilityType::BACKUP, FLAGS, USER_ID, extensionInfos), false);
87 EMPTY_BUNDLE_NAME, AppExecFwk::BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
91 … INVALID_BUNDLE_NAME, AppExecFwk::BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
105 BUNDLE_NAME, AppExecFwk::BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
/base/account/os_account/services/accountmgr/test/moduletest/common/
Dbundle_manager_adapter_module_test.cpp51 const int32_t USER_ID = 1; variable
84 INVALID_BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
89 …result = g_bundleManagerAdapterProxyRemoteNull->QueryAbilityInfos(want, FLAGS, USER_ID, abilityInf…
93 …result = g_bundleManagerAdapterProxyRemoteNull->QueryExtensionAbilityInfos(want, FLAGS, USER_ID, e…
115 INVALID_BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
137 EMPTY_BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
157 int32_t result = bundleManagerAdapterProxy->GetUidByBundleName(EMPTY_BUNDLE_NAME, USER_ID);
179 bool result = bundleManagerAdapterProxy->QueryAbilityInfos(want, FLAGS, USER_ID, abilityInfos);
201 …bool result = bundleManagerAdapterProxy->QueryExtensionAbilityInfos(want, FLAGS, USER_ID, extensio…
215 BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
[all …]
/base/security/dlp_permission_service/services/dlp_permission/sa/test/unittest/src/
Ddlp_bundle_adapter_test.cpp31 const int32_t USER_ID = 1; variable
52 BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
66 BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
/base/notification/distributed_notification_service/
Dhisysevent.yaml21 USER_ID: {type: INT32, desc: subscribe notification published from this userId}
45 USER_ID: {type: INT32, desc: userId of notification creater}
59 USER_ID: {type: INT32, desc: subscribe notification published from this userId}
66 USER_ID: {type: INT32, desc: unsubscribe notification published from this userId}
88 USER_ID: {type: INT32, desc: userId of notification creater}
/base/security/asset/
Dhisysevent.yaml19 USER_ID: {type: INT32, desc: user id}
27 USER_ID: {type: INT32, desc: user id}
/base/security/security_guard/test/unittest/risk_classify/include/
Dstore_define.h26 constexpr const char *USER_ID = "user_id"; variable
/base/security/security_guard/test/unittest/risk_collect/include/
Dstore_define.h26 constexpr const char *USER_ID = "user_id"; variable
/base/security/security_guard/test/unittest/data_collect/database_manager/
Dstore_define.h26 constexpr const char *USER_ID = "user_id"; variable
/base/customization/enterprise_device_management/services/edm/src/
Dadmin_policies_storage_rdb.cpp70 …// insert into admin_policies(user_id, admin_type, package_name, class_name, ent_name, ent_desc, p… in InsertAdmin()
84 …// update admin_policies set user_id=?, admin_type=?, package_name=?, class_name=?, ent_name=?, en… in UpdateAdmin()
85 // permissions=? where user_id=? and package_name=? in UpdateAdmin()
123 // delete from admin_policies where user_id=? and package_name=? in DeleteAdmin()
139 …// update admin_policies set package_name=?, class_name=?, permissions=? where user_id=? and packa… in UpdateAdmin()
166 // update admin_policies set ent_name=?, ent_desc=? where user_id=? and package_name=? in UpdateEntInfo()
186 // update admin_policies set subscribe_events=? where user_id=? and package_name=? in UpdateManagedEvents()
289 …// insert into admin_policies(user_id, admin_type, package_name, class_name, permissions, parent_a… in InsertAuthorizedAdmin()
311 … // update admin_policies set permissions=? where user_id=100 and package_name=? and parent_name=? in UpdateAuthorizedAdmin()

123456