/base/security/access_token/frameworks/common/src/ |
H A D | permission_map.cpp | 549 bool TransferPermissionToOpcode(const std::string& permission, uint32_t& opCode) in TransferPermissionToOpcode() argument 555 opCode = i; in TransferPermissionToOpcode() 562 bool TransferOpcodeToPermission(uint32_t opCode, std::string& permission) in TransferOpcodeToPermission() argument 564 if (opCode >= MAX_PERM_SIZE || opCode >= g_permMap.size()) { in TransferOpcodeToPermission() 567 permission = g_permMap[opCode].first; in TransferOpcodeToPermission()
|
/base/security/access_token/interfaces/innerkits/token_setproc/src/ |
H A D | perm_setproc.cpp | 35 uint32_t opCode; member 62 uint32_t opCode = opCodeList[i]; in AddPermissionToKernel() local 63 uint32_t idx = opCode / UINT32_T_BITS; in AddPermissionToKernel() 64 uint32_t bitIdx = opCode % UINT32_T_BITS; in AddPermissionToKernel() 100 int32_t SetPermissionToKernel(uint32_t tokenID, int32_t opCode, bool status) in SetPermissionToKernel() argument 104 .opCode = opCode, in SetPermissionToKernel() 121 int32_t GetPermissionFromKernel(uint32_t tokenID, int32_t opCode, bool& isGranted) in GetPermissionFromKernel() argument 125 .opCode = opCode, in GetPermissionFromKernel() [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_client_protocol_task.c | 66 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PakeRequest() 67 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in PakeRequest() 78 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND || params->opCode == AUTH_KEY_AGREEMENT) { in PakeRequest() 106 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in ParseMsgForClientConfirm() 107 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in ParseMsgForClientConfirm() 165 if (params->isPskSupported && (params->opCode in PakeClientConfirm() [all...] |
H A D | pake_v1_server_protocol_task.c | 65 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PackageMsgForResponse() 66 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in PackageMsgForResponse() 95 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PakeResponse() 96 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in PakeResponse() 107 if (params->isPskSupported && (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND)) { in PakeResponse() 215 res = ServerProtocolMessageOut(out, params->opCode, step); in Process()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_task_common.c | 41 if (params->opCode == AUTHENTICATE) { in ConstructOutJson() 92 GOTO_ERR_AND_SET_RET(AddIntToJson(sendToSelf, FIELD_OPERATION_CODE, params->opCode), res); in SendResultToSelf() 163 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in FillAuthId() 241 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in FillNonce() 257 if (GetIntFromJson(in, FIELD_OPERATION_CODE, &(params->opCode)) != HC_SUCCESS) { in FillDasPakeParams() 258 LOGD("Get opCode failed, use default."); in FillDasPakeParams() 259 params->opCode = AUTHENTICATE; in FillDasPakeParams() 261 if (params->opCode ! in FillDasPakeParams() [all...] |
H A D | pake_message_util.c | 33 if (AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode) != HC_SUCCESS) { in PackagePakeRequestData() 34 LOGE("Add opCode failed."); in PackagePakeRequestData() 37 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PackagePakeRequestData() 66 * opCode: OP_UNBIND, pake v1: don't need returnKey, use default 0 length in ParsePakeRequestMessage() 67 * opCode: OP_UNBIND, pake v2: don't need returnKey, use default 0 length in ParsePakeRequestMessage() 68 * opCode: OP_BIND, pake v1: use default 32 length in ParsePakeRequestMessage() 69 * opCode: OP_BIND, pake v2: don't need returnKey, use default 0 length in ParsePakeRequestMessage() 70 * Therefore, only params->opCode == AUTHENTICATE or AUTH_KEY_AGREEMENT, need to get keyLen from message in ParsePakeRequestMessage() 72 if (params->opCode in ParsePakeRequestMessage() [all...] |
/base/security/access_token/frameworks/common/include/ |
H A D | permission_map.h | 25 bool TransferPermissionToOpcode(const std::string& permissionName, uint32_t& opCode); 26 bool TransferOpcodeToPermission(uint32_t opCode, std::string& permissionName);
|
/base/security/device_auth/services/legacy/group_manager/inc/ |
H A D | base_group_manager_task.h | 27 int32_t opCode; member 35 int32_t opCode; member
|
/base/security/access_token/interfaces/innerkits/token_setproc/include/ |
H A D | perm_setproc.h | 26 int32_t SetPermissionToKernel(uint32_t tokenID, int32_t opCode, bool status); 27 int32_t GetPermissionFromKernel(uint32_t tokenID, int32_t opCode, bool& isGranted);
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/ |
H A D | account_module.c | 38 int32_t opCode; in IsAccountMsgNeedIgnore() local 39 if (GetIntFromJson(in, FIELD_OPERATION_CODE, &opCode) != HC_SUCCESS) { in IsAccountMsgNeedIgnore() 40 LOGE("Get opCode failed."); in IsAccountMsgNeedIgnore() 44 if (opCode == OP_BIND) { in IsAccountMsgNeedIgnore() 46 } else if (opCode == AUTHENTICATE) { in IsAccountMsgNeedIgnore() 49 LOGE("Invalid opCode: %d.", opCode); in IsAccountMsgNeedIgnore()
|
/base/security/access_token/services/privacymanager/include/record/ |
H A D | permission_record.h | 29 int32_t opCode = 0; member 46 int32_t opCode = 0; member
|
/base/security/access_token/services/privacymanager/src/record/ |
H A D | permission_record_manager.cpp | 159 // the same tokenID + opCode + status + lockScreenStatus + usedType in RecordMergeCheck() 161 (record1.opCode != record2.opCode) || in RecordMergeCheck() 241 record.tokenId, record.opCode, record.status, record.accessCount, record.rejectCount, record.lockScreenStatus, in MergeOrInsertRecord() 255 conditionValue.Put(PrivacyFiledConst::FIELD_OP_CODE, record.opCode); in UpdatePermissionUsedRecord() 312 int32_t opCode; in GetPermissionRecord() local 313 if (!Constant::TransferPermissionToOpcode(info.permissionName, opCode)) { in GetPermissionRecord() 326 record.opCode = opCode; in GetPermissionRecord() 345 bool PermissionRecordManager::AddOrUpdateUsedTypeIfNeeded(const AccessTokenID tokenId, const int32_t opCode, in AddOrUpdateUsedTypeIfNeeded() argument 492 int32_t opCode = Constant::OP_INVALID; TransferToOpcode() local 512 int32_t opCode = queryValue.GetInt(PrivacyFiledConst::FIELD_OP_CODE); InsteadMergedRecIfNessary() local 766 int32_t opCode; AddRecordToStartList() local 874 int32_t opCode; RemoveRecordFromStartList() local 980 RemoveRecordFromStartListByOp(int32_t opCode) RemoveRecordFromStartListByOp() argument 1036 int32_t opCode; ExecuteAndUpdateRecordByPerm() local 1470 int32_t opCode; GetPermissionUsedTypeInfos() local [all...] |
H A D | permission_record.cpp | 26 values.Put(PrivacyFiledConst::FIELD_OP_CODE, record.opCode); in TranslationIntoGenericValues() 39 record.opCode = values.GetInt(PrivacyFiledConst::FIELD_OP_CODE); in TranslationIntoPermissionRecord()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/ |
H A D | pake_v1_server_task.c | 67 switch (realTask->params.opCode) { in CreateNextTask() 79 LOGE("Unsupported opCode: %d.", realTask->params.opCode); in CreateNextTask() 83 LOGE("Create and process next task failed, opcode: %d, res: %d.", realTask->params.opCode, res); in CreateNextTask() 94 LOGI("End server task successfully, opcode: %d.", realTask->params.opCode); in CreateNextTask()
|
H A D | pake_v1_client_task.c | 67 switch (realTask->params.opCode) { in CreateNextTask() 79 LOGE("Unsupported opCode: %d.", realTask->params.opCode); in CreateNextTask() 83 LOGE("Create and process next task failed, opcode: %d, res: %d.", realTask->params.opCode, res); in CreateNextTask() 94 LOGI("End client task successfully, opcode: %d.", realTask->params.opCode); in CreateNextTask()
|
/base/security/device_auth/services/legacy/authenticators/inc/account_unrelated/ |
H A D | das_task_common.h | 40 int ClientProtocolMessageOut(CJson *out, int opCode, uint32_t step); 41 int ServerProtocolMessageOut(CJson *out, int opCode, uint32_t step);
|
H A D | das_version_util.h | 53 int32_t opCode; member 77 ProtocolType GetPrototolType(VersionStruct *curVersion, OperationCode opCode);
|
/base/security/access_token/services/privacymanager/include/common/ |
H A D | constant.h | 85 static bool TransferPermissionToOpcode(const std::string& permissionName, int32_t& opCode); 86 static bool TransferOpcodeToPermission(int32_t opCode, std::string& permissionName);
|
/base/security/access_token/services/privacymanager/src/common/ |
H A D | constant.cpp | 84 bool Constant::TransferPermissionToOpcode(const std::string& permissionName, int32_t& opCode) in TransferPermissionToOpcode() argument 89 opCode = PERMISSION_OPCODE_MAP.at(permissionName); in TransferPermissionToOpcode() 93 bool Constant::TransferOpcodeToPermission(int32_t opCode, std::string& permissionName) in TransferOpcodeToPermission() argument 96 [opCode](const std::map<std::string, int32_t>::value_type item) { in TransferOpcodeToPermission() 97 return item.second == opCode; in TransferOpcodeToPermission()
|
/base/security/device_auth/services/session_manager/src/session/v1/compatible_bind_sub_session/ |
H A D | compatible_bind_sub_session.c | 107 static int32_t CreateBaseBindSubSession(int32_t sessionType, int32_t opCode, const CJson *params, in CreateBaseBindSubSession() argument 140 subSession->opCode = opCode; in CreateBaseBindSubSession() 149 static int32_t GenerateKeyPairIfNeeded(int32_t osAccountId, int isClient, int32_t opCode, CJson *jsonParams) in GenerateKeyPairIfNeeded() argument 151 if (!IsCreateGroupNeeded(isClient, opCode)) { in GenerateKeyPairIfNeeded() 222 res = CheckServerStatusIfNotInvite(session->osAccountId, session->opCode, jsonParams); in GenerateServerBindParams() 230 return GenerateKeyPairIfNeeded(session->osAccountId, SERVER, session->opCode, jsonParams); in GenerateServerBindParams() 295 ProcessFinishCallback(session->reqId, session->opCode, jsonDataStr, session->base.callback); in InformSelfBindSuccess() 789 result = AddInfoToBindData((session->opCode == MEMBER_JOIN), session, *sendData); in PrepareServerData() 834 int32_t opCode in CreateClientBindSubSession() local 880 int32_t opCode = MEMBER_INVITE; CreateServerBindSubSession() local [all...] |
/base/security/device_auth/services/session_manager/inc/session/v1/compatible_bind_sub_session/ |
H A D | compatible_bind_sub_session_defines.h | 27 int32_t opCode; member
|
/base/security/device_auth/services/ |
H A D | device_auth.c | 331 int32_t opCode = GetOpCodeFromContext(context); in AddClientReqInfoToContext() local 332 if (AddIntToJson(context, FIELD_OPERATION_CODE, opCode) != HC_SUCCESS) { in AddClientReqInfoToContext() 336 if (opCode == MEMBER_JOIN) { in AddClientReqInfoToContext() 523 int32_t opCode; in CheckBindParams() local 524 if (GetIntFromJson(context, FIELD_OPERATION_CODE, &opCode) != HC_SUCCESS) { in CheckBindParams() 528 if ((isClient && opCode == MEMBER_INVITE) || (!isClient && opCode == MEMBER_JOIN)) { in CheckBindParams() 640 static int32_t AddServerReqInfoToContext(int64_t requestId, const char *appId, int32_t opCode, in AddServerReqInfoToContext() argument 664 if (AddIntToJson(context, FIELD_OPERATION_CODE, opCode) != HC_SUCCESS) { in AddServerReqInfoToContext() 665 LOGE("add opCode t in AddServerReqInfoToContext() 722 BuildServerBindContext(int64_t requestId, const char *appId, int32_t opCode, const CJson *receivedMsg, CJson *context) BuildServerBindContext() argument 765 int32_t opCode; OpenServerBindSession() local 980 BuildServerAuthContext(int64_t requestId, int32_t opCode, const char *appId, CJson *context) BuildServerAuthContext() argument 1024 BuildServerP2PAuthContext(int64_t requestId, int32_t opCode, const char *appId, CJson *context) BuildServerP2PAuthContext() argument 1072 int32_t opCode = AUTH_FORM_ACCOUNT_UNRELATED; OpenServerAuthSession() local 1110 int32_t opCode = P2P_BIND; OpenServerAuthSessionForP2P() local [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/ |
H A D | iso_task_common.c | 125 GOTO_ERR_AND_SET_RET(AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode), ret); in GenerateEncResult() 205 GOTO_ERR_AND_SET_RET(AddIntToJson(sendToSelf, FIELD_OPERATION_CODE, params->opCode), res); in GenEncResult() 364 if (params->opCode == OP_BIND) { in FillAuthId() 442 if (params->opCode == OP_BIND) { in FillPin() 503 if (params->opCode == OP_UNBIND || params->opCode == OP_BIND) { in GetUpgradeFlagAndKeyLength() 522 if (GetIntFromJson(in, FIELD_OPERATION_CODE, &(params->opCode)) != 0) { in InitIsoParams() 523 LOGD("Get opCode failed, use default."); in InitIsoParams() 524 params->opCode = AUTHENTICATE; in InitIsoParams() 526 if (params->opCode ! in InitIsoParams() [all...] |
/base/hiviewdfx/faultloggerd/interfaces/innerkits/unwinder/ |
H A D | dwarf_cfa_instructions.cpp | 55 uint8_t opCode;
in Iterate() local 56 if (!memory_->ReadU8(instPtr, &opCode, true)) {
in Iterate() 60 if (!DecodeDwCfa(opCode, cie, pcOffset, instPtr, rsState)) {
in Iterate() 69 bool DwarfCfaInstructions::DecodeDwCfa(uint8_t opCode, CommonInfoEntry cie,
in DecodeDwCfa() argument 78 switch (opCode) {
in DecodeDwCfa() 276 uint8_t operand = opCode & 0x3F;
in DecodeDwCfa() 278 switch (opCode & 0xC0) {
in DecodeDwCfa() 304 DFXLOGU("DW_CFA_unknown: opcode=0x%{public}02x", opCode);
in DecodeDwCfa()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_protocol_task/ |
H A D | iso_client_protocol_task.c | 64 GOTO_ERR_AND_SET_RET(AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode), res); in IsoClientStartPackData() 67 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in IsoClientStartPackData() 140 if (params->opCode == OP_BIND) { in ParseServerStartMessage() 269 res = ClientProtocolMessageOut(out, params->opCode, step); in Process()
|