| /base/security/asset/services/common/src/ |
| D | calling_info.rs | 26 user_id: i32, field 38 pub fn new_part_info(user_id: i32) -> Self { in new_part_info() 39 Self::new(user_id, OwnerType::Native, "asset_service_8100".as_bytes().to_vec()) in new_part_info() 43 pub fn new(user_id: i32, owner_type: OwnerType, owner_info: Vec<u8>) -> Self { in new() 44 Self { user_id, owner_type, owner_info } in new() 62 let mut user_id = process_info.user_id; in build() localVariable 64 user_id = specific_user_id; in build() 67 CallingInfo { user_id: user_id as i32, owner_type: process_info.owner_type, owner_info } in build() 86 pub fn user_id(&self) -> i32 { in user_id() method 87 self.user_id in user_id() [all …]
|
| D | process_info.rs | 38 user_id: u32, field 49 fn init(user_id: u32, uid: u32, process_name: &mut Vec<u8>, app_id: &mut Vec<u8>) -> Self { in init() 51 user_id, in init() 100 pub user_id: u32, field 116 let user_id = get_user_id(uid)?; in build() localVariable 119 …let mut process_info_ffi = ProcessInfoFfi::init(user_id, uid as u32, &mut process_name, &mut app_i… in build() 120 match unsafe { GetCallingProcessInfo(user_id, uid, &mut process_info_ffi) } { in build() 139 user_id, in build()
|
| D | lib.rs | 70 let mut user_id = 0; in get_user_id() localVariable 71 if GetUserIdByUid(uid, &mut user_id) { in get_user_id() 72 Ok(user_id) in get_user_id() 80 pub fn is_user_id_exist(user_id: i32) -> Result<bool> { in is_user_id_exist() 83 if IsUserIdExist(user_id, &mut exist) { in is_user_id_exist()
|
| /base/security/asset/frameworks/os_dependency/file/src/ |
| D | ce_operator.rs | 23 fn construct_ce_db_dir(user_id: i32) -> String { in construct_ce_db_dir() 24 format!("data/service/el2/{}/asset_service", user_id) in construct_ce_db_dir() 27 fn construct_db_key_cipher_path(user_id: i32) -> String { in construct_db_key_cipher_path() 28 format!("data/service/el2/{}/asset_service/{}", user_id, DB_KEY) in construct_db_key_cipher_path() 32 pub fn is_db_key_cipher_file_exist(user_id: i32) -> Result<bool> { in is_db_key_cipher_file_exist() 33 let path_str = construct_db_key_cipher_path(user_id); in is_db_key_cipher_file_exist() 38 pub fn read_db_key_cipher(user_id: i32) -> Result<Vec<u8>> { in read_db_key_cipher() 39 let path_str = construct_db_key_cipher_path(user_id); in read_db_key_cipher() 54 pub fn write_db_key_cipher(user_id: i32, db_key_cipher: &Vec<u8>) -> Result<()> { in write_db_key_cipher() 55 let path_str = construct_db_key_cipher_path(user_id); in write_db_key_cipher() [all …]
|
| D | de_operator.rs | 24 fn construct_user_de_path(user_id: i32) -> String { in construct_user_de_path() 25 format!("data/service/el1/public/asset_service/{}", user_id) in construct_user_de_path() 28 fn is_user_de_dir_exist(user_id: i32) -> Result<bool> { in is_user_de_dir_exist() 29 let path_str = construct_user_de_path(user_id); in is_user_de_dir_exist() 34 pub fn create_user_de_dir(user_id: i32) -> Result<()> { in create_user_de_dir() 35 if is_user_de_dir_exist(user_id)? { in create_user_de_dir() 40 let path_str = construct_user_de_path(user_id); in create_user_de_dir() 56 pub fn delete_user_de_dir(user_id: i32) -> Result<()> { in delete_user_de_dir() 57 if !is_user_de_dir_exist(user_id)? { in delete_user_de_dir() 61 let path_str = construct_user_de_path(user_id); in delete_user_de_dir() [all …]
|
| /base/security/asset/services/db_key_operator/src/ |
| D | lib.rs | 29 fn build_db_key_secret_key(user_id: i32) -> Result<SecretKey> { in build_db_key_secret_key() 35 SecretKey::new_with_alias(user_id, auth_type, access_type, require_password_set, alias) in build_db_key_secret_key() 68 fn decrypt_db_key_cipher(user_id: i32, db_key_cipher: &Vec<u8>) -> Result<DbKey> { in decrypt_db_key_cipher() 69 let secret_key = build_db_key_secret_key(user_id)?; in decrypt_db_key_cipher() 85 fn encrypt_db_key(&self, user_id: i32) -> Result<Vec<u8>> { in encrypt_db_key() 86 let secret_key = build_db_key_secret_key(user_id)?; in encrypt_db_key() 95 pub fn check_existance(user_id: i32) -> Result<bool> { in check_existance() 96 is_db_key_cipher_file_exist(user_id) in check_existance() 100 pub fn get_db_key(user_id: i32) -> Result<DbKey> { in get_db_key() 101 match is_db_key_cipher_file_exist(user_id) { in get_db_key() [all …]
|
| /base/security/asset/services/db_operator/src/ |
| D | database_file_upgrade.rs | 39 pub(crate) fn fmt_old_de_db_path(user_id: i32) -> String { in fmt_old_de_db_path() 40 format!("{}/{}/asset.db", DE_ROOT_PATH, user_id) in fmt_old_de_db_path() 43 fn check_old_db_exist(user_id: i32) -> bool { in check_old_db_exist() 44 let path_str = fmt_old_de_db_path(user_id); in check_old_db_exist() 76 fn get_db_before_split(user_id: i32) -> Result<Database> { in get_db_before_split() 77 get_db(user_id, OLD_DB_NAME, DB_UPGRADE_VERSION_V3, None) in get_db_before_split() 87 fn remove_old_db(user_id: i32) -> Result<()> { in remove_old_db() 89 let path = fmt_de_db_path_with_name(user_id, OLD_DB_NAME); in remove_old_db() 98 fn get_new_db(user_id: i32, info_map: &DbMap) -> Result<Database> { in get_new_db() 104 get_db(user_id, &new_db_name, DB_UPGRADE_VERSION_V3, None) in get_new_db() [all …]
|
| D | database.rs | 62 pub(crate) fn get_split_db_lock_by_user_id(user_id: i32) -> &'static UserDbLock { in get_split_db_lock_by_user_id() 64 if let Some(&lock) = map.get(&user_id) { in get_split_db_lock_by_user_id() 68 let nf = Box::new(UserDbLock { mtx: Mutex::new(user_id) }); in get_split_db_lock_by_user_id() 72 map.insert(user_id, nf); in get_split_db_lock_by_user_id() 78 pub(crate) fn get_file_lock_by_user_id_db_file_name(user_id: i32, db_file_name: String) -> &'static… in get_file_lock_by_user_id_db_file_name() 81 if let Some(&lock) = map.get(&(user_id, db_file_name.clone())) { in get_file_lock_by_user_id_db_file_name() 85 let nf = Box::new(UserDbLock { mtx: Mutex::new(user_id) }); in get_file_lock_by_user_id_db_file_name() 89 map.insert((user_id, db_file_name), nf); in get_file_lock_by_user_id_db_file_name() 126 pub(crate) fn fmt_ce_db_path_with_name(user_id: i32, db_name: &str) -> String { in fmt_ce_db_path_with_name() 127 format!("data/service/el2/{}/asset_service/{}.db", user_id, db_name) in fmt_ce_db_path_with_name() [all …]
|
| /base/inputmethod/imf/test/unittest/cpp_test/src/ |
| D | enable_ime_data_parse_test.cpp | 38 static constexpr int32_t USER_ID = 100; member in OHOS::MiscServices::EnableImeDataParseTest 51 EnableImeDataParser::GetInstance()->Initialize(USER_ID); in SetUpTestCase() 68 ImeInfoInquirer::GetInstance().GetCurrentInputMethod(USER_ID)->name = "defaultImeName"; in SetUp() 69 ImeInfoInquirer::GetInstance().GetCurrentInputMethod(USER_ID)->id = "defaultImeId"; in SetUp() 89 …leImeDataParser::GetInstance()->GetEnableData(IME_KEY, enableVec, EnableImeDataParseTest::USER_ID); 131 …leImeDataParser::GetInstance()->GetEnableData(IME_KEY, enableVec, EnableImeDataParseTest::USER_ID); 149 …meDataParser::GetInstance()->CheckNeedSwitch(IME_KEY, switchInfo, EnableImeDataParseTest::USER_ID); 163 ImeInfoInquirer::GetInstance().GetCurrentInputMethod(USER_ID)->name = "xiaoyiIme"; 164 ImeInfoInquirer::GetInstance().GetCurrentInputMethod(USER_ID)->id = "xiaoyiImeId"; 170 bool ret = EnableImeDataParser::GetInstance()->CheckNeedSwitch(IME_KEY, switchInfo, USER_ID); [all …]
|
| D | security_mode_parser_test.cpp | 43 static constexpr int32_t USER_ID = 100; member in OHOS::MiscServices::SecurityModeParserTest 56 SecurityModeParser::GetInstance()->Initialize(USER_ID); in SetUpTestCase() 64 service_->userId_ = USER_ID; in SetUpTestCase() 115 …t32_t ret = SecurityModeParser::GetInstance()->UpdateFullModeList(SecurityModeParserTest::USER_ID); 135 …t32_t ret = SecurityModeParser::GetInstance()->UpdateFullModeList(SecurityModeParserTest::USER_ID); 138 … SecurityModeParser::GetInstance()->GetSecurityMode("xiaoyiIme", SecurityModeParserTest::USER_ID); 152 …t32_t ret = SecurityModeParser::GetInstance()->UpdateFullModeList(SecurityModeParserTest::USER_ID); 155 SecurityModeParser::GetInstance()->GetSecurityMode("test", SecurityModeParserTest::USER_ID);
|
| /base/security/asset/services/core_service/src/common_event/ |
| D | listener.rs | 82 …Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(),… in delete_in_de_db_on_package_removed() 87 remove_db(&format!("{}/{}", DE_ROOT_PATH, calling_info.user_id()), calling_info, false)?; in delete_in_de_db_on_package_removed() 100 …Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(),… in delete_in_ce_db_on_package_removed() 105 …remove_db(&format!("{}/{}/asset_service", CE_ROOT_PATH, calling_info.user_id()), calling_info, fal… in delete_in_ce_db_on_package_removed() 121 if is_db_key_cipher_file_exist(calling_info.user_id())? { in delete_on_package_removed() 135 fn delete_data_by_owner(user_id: i32, owner: *const u8, owner_size: u32) { in delete_data_by_owner() 139 let calling_info = CallingInfo::new(user_id, OwnerType::Hap, owner.clone()); in delete_data_by_owner() 161 user_id: i32, in on_package_removed() 167 delete_data_by_owner(user_id, owner, owner_size); in on_package_removed() 178 logi!("[INFO]On app -{}-{}-{}- removed.", user_id, bundle_name, app_index); in on_package_removed() [all …]
|
| D | start_event.rs | 26 const USER_ID: &str = "userId"; constant 34 let Some(user_id) = want.get(USER_ID) else { in handle_package_removed() 58 let user_id = match user_id.parse::<i32>() { in handle_package_removed() localVariable 61 loge!("[FATIL]Get removed user_id failed, failed to parse user_id"); in handle_package_removed() 71 …listener::on_package_removed(user_id, owner.as_ptr(), owner.len() as u32, bundle_name.as_ptr(), ap… in handle_package_removed() 90 let user_id = match want.get(USER_ID) { in handle_common_event() localVariable 94 loge!("[FATIL]Get restore app info failed, failed to parse user_id"); in handle_common_event() 122 listener::on_app_restore(user_id, bundle_name.as_ptr(), app_index); in handle_common_event()
|
| /base/security/asset/services/plugin/src/ |
| D | asset_plugin.rs | 109 pub user_id: i32, field 124 fn init(&mut self, user_id: i32) -> std::result::Result<(), u32> { in init() 125 create_user_de_dir(user_id).map_err(|e| e.code as u32)?; in init() 126 self.user_id = user_id; in init() 133 …let mut db = Database::build_with_file_name(self.user_id, &db_name, false).map_err(|e| e.code as u… in add() 140 …let mut db = Database::build_with_file_name(self.user_id, &db_name, true).map_err(|e| e.code as u3… in ce_add() 147 …let mut db = Database::build_with_file_name(self.user_id, &db_name, false).map_err(|e| e.code as u… in replace() 154 …let mut db = Database::build_with_file_name(self.user_id, &db_name, true).map_err(|e| e.code as u3… in ce_replace() 160 …let de_dbs = asset_file_operator::de_operator::get_de_user_dbs(self.user_id).map_err(|e| e.code as… in query() 163 …let mut db = Database::build_with_file_name(self.user_id, &db_name, false).map_err(|e| e.code as u… in query() [all …]
|
| /base/security/asset/services/core_service/src/ |
| D | sys_event.rs | 40 pub(crate) const USER_ID: &str = "USER_ID"; constant 70 .set_param(build_number_param!(SysEvent::USER_ID, calling_info.user_id())) in upload_statistic_system_event() 76 "[INFO]Calling fun:[{}], user_id:[{}], caller:[{}], start_time:[{:?}], run_time:[{}]", in upload_statistic_system_event() 78 calling_info.user_id(), in upload_statistic_system_event() 94 .set_param(build_number_param!(SysEvent::USER_ID, calling_info.user_id())) in upload_fault_system_event() 100 …"[ERROR]Calling fun:[{}], user_id:[{}], caller:[{}], start_time:[{:?}], error_code:[{}], error_msg… in upload_fault_system_event() 102 calling_info.user_id(), in upload_fault_system_event()
|
| /base/notification/common_event_service/ |
| D | hisysevent.yaml | 19 USER_ID: {type: INT32, desc: userId} 27 USER_ID: {type: INT32, desc: userId} 34 USER_ID: {type: INT32, desc: userId} 40 USER_ID: {type: INT32, desc: userId} 49 USER_ID: {type: INT32, desc: userId} 57 USER_ID: {type: INT32, desc: userId} 65 USER_ID: {type: INT32, desc: userId} 73 USER_ID: {type: INT32, desc: userId} 82 USER_ID: {type: INT32, desc: userId}
|
| /base/security/asset/services/crypto_manager/src/ |
| D | secret_key.rs | 32 user_id: i32, field 73 alias.extend_from_slice(&calling_info.user_id().to_le_bytes()); in calculate_key_alias() 93 user_id: calling_info.user_id(), in get_existing_key_alias() 105 user_id: calling_info.user_id(), in get_existing_key_alias() 118 user_id: calling_info.user_id(), in get_existing_key_alias() 142 let key_id = KeyId::new(calling_info.user_id(), alias_blob, access_type); in huks_rename_key_alias() 190 user_id: i32, in new_with_alias() 196 Ok(Self { user_id, auth_type, access_type, require_password_set, alias }) in new_with_alias() 209 user_id: calling_info.user_id(), in new_without_alias() 221 let key_id = KeyId::new(self.user_id, key_alias, self.access_type); in exists() [all …]
|
| D | lib.rs | 38 user_id: i32, field 44 fn new(user_id: i32, alias: HksBlob, accessibility: Accessibility) -> Self { in new() 45 Self { user_id, alias, accessibility } in new()
|
| /base/useriam/user_auth_framework/test/unittest/services/src/ |
| D | user_idm_database_test.cpp | 47 constexpr int32_t USER_ID = 100; variable 49 database.GetSecUserInfo(USER_ID, secUserInfo); 56 constexpr int32_t USER_ID = 100; variable 68 EXPECT_CALL(*mock, GetUserInfo(USER_ID, _, _, _)) 73 database.GetSecUserInfo(USER_ID, secUserInfo); 81 constexpr int32_t USER_ID = 100; variable 88 EXPECT_CALL(*mock, GetUserInfo(USER_ID, _, _, _)) 92 UserIdmDatabase::Instance().GetSecUserInfo(USER_ID, secUserInfo); 101 constexpr int32_t USER_ID = 100; variable 119 EXPECT_CALL(*mock, GetUserInfo(USER_ID, _, _, _)) [all …]
|
| /base/security/asset/services/core_service/src/operations/common/ |
| D | permission_check.rs | 42 let user_id = get_user_id(uid)?; in check_system_permission() localVariable 43 if user_id > ROOT_USER_UPPERBOUND { in check_system_permission() 46 "[FATAL]The caller user_id is: {}. Not in range[0, 99]", in check_system_permission() 47 user_id in check_system_permission()
|
| /base/security/dlp_permission_service/ |
| D | hisysevent.yaml | 24 USER_ID: {type: INT32, desc: current user id} 30 USER_ID: {type: INT32, desc: current user id} 35 USER_ID: {type: INT32, desc: current user id} 43 USER_ID: {type: INT32, desc: current user id}
|
| /base/customization/enterprise_device_management/test/unittest/common/external/ |
| D | edm_bundle_manager_impl_test.cpp | 29 const int32_t USER_ID = 1; variable 74 want, AppExecFwk::ExtensionAbilityType::BACKUP, FLAGS, USER_ID, extensionInfos), false); 87 EMPTY_BUNDLE_NAME, AppExecFwk::BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 91 … INVALID_BUNDLE_NAME, AppExecFwk::BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 105 BUNDLE_NAME, AppExecFwk::BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
|
| /base/account/os_account/services/accountmgr/test/moduletest/common/ |
| D | bundle_manager_adapter_module_test.cpp | 51 const int32_t USER_ID = 1; variable 84 INVALID_BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 89 …result = g_bundleManagerAdapterProxyRemoteNull->QueryAbilityInfos(want, FLAGS, USER_ID, abilityInf… 93 …result = g_bundleManagerAdapterProxyRemoteNull->QueryExtensionAbilityInfos(want, FLAGS, USER_ID, e… 115 INVALID_BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 137 EMPTY_BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 157 int32_t result = bundleManagerAdapterProxy->GetUidByBundleName(EMPTY_BUNDLE_NAME, USER_ID); 179 bool result = bundleManagerAdapterProxy->QueryAbilityInfos(want, FLAGS, USER_ID, abilityInfos); 201 …bool result = bundleManagerAdapterProxy->QueryExtensionAbilityInfos(want, FLAGS, USER_ID, extensio… 215 BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); [all …]
|
| /base/security/dlp_permission_service/services/dlp_permission/sa/test/unittest/src/ |
| D | dlp_bundle_adapter_test.cpp | 31 const int32_t USER_ID = 1; variable 52 BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID); 66 BUNDLE_NAME, BundleFlag::GET_BUNDLE_WITH_ABILITIES, bundleInfo, USER_ID);
|
| /base/notification/distributed_notification_service/ |
| D | hisysevent.yaml | 21 USER_ID: {type: INT32, desc: subscribe notification published from this userId} 45 USER_ID: {type: INT32, desc: userId of notification creater} 59 USER_ID: {type: INT32, desc: subscribe notification published from this userId} 66 USER_ID: {type: INT32, desc: unsubscribe notification published from this userId} 88 USER_ID: {type: INT32, desc: userId of notification creater}
|
| /base/security/asset/services/db_operator/src/test/ |
| D | test_database.rs | 66 …Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(),… in open_db_and_insert_data() 90 …Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(),… in create_and_drop_database() 101 …let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owne… in database_version() 113 …let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owne… in error_sql() 125 …Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(),… in create_delete_asset_table() 143 …Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(),… in insert_data_with_different_alias() 217 …Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(),… in query_ordered_data() 254 …Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(),… in insert_error_data() 274 …Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(),… in backup_and_restore() 304 …Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(),… in query_mismatch_type_data()
|