/base/security/selinux_adapter/test/unittest/service_checker/ |
H A D | unit_test.cpp | 45 int GetSidForCurrentProcess(std::string &sid) in GetSidForCurrentProcess() argument 51 sid = con; in GetSidForCurrentProcess() 64 std::string sid; in HWTEST_F() local 65 if (GetSidForCurrentProcess(sid) < 0) { in HWTEST_F() 69 ASSERT_EQ(SELINUX_SUCC, HdfListServiceCheck(sid.c_str())); in HWTEST_F() 70 std::string cmd = "hilog -T Selinux -x | grep 'avc: denied { list } for service=hdf_devmgr_class sid=" + in HWTEST_F() 71 sid + "' | grep 'tclass=hdf_devmgr_class'"; in HWTEST_F() 84 std::string sid; in HWTEST_F() local 85 if (GetSidForCurrentProcess(sid) < 0) { in HWTEST_F() 89 ASSERT_EQ(-SELINUX_PTR_NULL, HdfGetServiceCheck(sid in HWTEST_F() 105 std::string sid; HWTEST_F() local 126 std::string sid; HWTEST_F() local 148 std::string sid; HWTEST_F() local 170 std::string sid; HWTEST_F() local 192 std::string sid; HWTEST_F() local [all...] |
/base/security/selinux_adapter/framework/tools/service_check/ |
H A D | test.cpp | 108 static int GetSidForCurrentProcess(std::string &sid) in GetSidForCurrentProcess() argument 114 sid = con; in GetSidForCurrentProcess() 121 std::string sid; in TestAddService() local 122 if (GetSidForCurrentProcess(sid) < 0) { in TestAddService() 126 std::cout << GetErrStr(isHdf ? HdfAddServiceCheck(sid.c_str(), serviceName.c_str()) in TestAddService() 127 : g_service->AddServiceCheck(sid, serviceName)) in TestAddService() 133 std::cout << GetErrStr(isHdf ? HdfAddServiceCheck(sid.c_str(), serName.c_str()) in TestAddService() 134 : g_service->AddServiceCheck(sid, serName)) in TestAddService() 141 std::string sid; in TestGetService() local 142 if (GetSidForCurrentProcess(sid) < in TestGetService() 161 std::string sid; TestGetRemoteService() local 180 std::string sid; TestListService() local [all...] |
/base/security/security_guard/frameworks/common/collector/src/ |
H A D | collector_service_loader.cpp | 52 void CollectorServiceLoader::LoadCallback::OnLoadSystemAbilitySuccess(int32_t sid, const sptr<IRemoteObject> &object) in OnLoadSystemAbilitySuccess() argument 54 LOGI("OnLoadSystemAbilitySuccess = %{public}d.", sid); in OnLoadSystemAbilitySuccess() 58 void CollectorServiceLoader::LoadCallback::OnLoadSystemAbilityFail(int32_t sid) in OnLoadSystemAbilityFail() argument 60 LOGI("OnLoadSystemAbilityFail = %{public}d.", sid); in OnLoadSystemAbilityFail()
|
/base/security/device_security_level/interfaces/inner_api/src/standard/ |
H A D | device_security_level_loader.cpp | 59 void DeviceSecurityLevelLoader::LoadCallback::OnLoadSystemAbilitySuccess(int32_t sid, const sptr<IRemoteObject> &object) in OnLoadSystemAbilitySuccess() argument 61 HILOG_INFO(LOG_CORE, "OnLoadSystemAbilitySuccess = %{public}d.", sid); in OnLoadSystemAbilitySuccess() 65 void DeviceSecurityLevelLoader::LoadCallback::OnLoadSystemAbilityFail(int32_t sid) in OnLoadSystemAbilityFail() argument 67 HILOG_ERROR(LOG_CORE, "OnLoadSystemAbilityFail = %{public}d.", sid); in OnLoadSystemAbilityFail()
|
H A D | device_security_level_loader.h | 41 void OnLoadSystemAbilitySuccess(int32_t sid, const sptr<IRemoteObject> &object) override; 42 void OnLoadSystemAbilityFail(int32_t sid) override;
|
/base/security/security_guard/interfaces/inner_api/collector/include/ |
H A D | collector_service_loader.h | 35 void OnLoadSystemAbilitySuccess(int32_t sid, const sptr<IRemoteObject> &object) override; 36 void OnLoadSystemAbilityFail(int32_t sid) override;
|
/base/security/device_auth/frameworks/src/lite/ |
H A D | ipc_callback_proxy.c | 49 void CbProxySendRequest(SvcIdentity sid, int32_t callbackId, uintptr_t cbHook, IpcIo *data, IpcIo *reply)
in CbProxySendRequest() argument 57 ShowIpcSvcInfo(&(sid));
in CbProxySendRequest() 77 ret = SendRequest(sid, DEV_AUTH_CALLBACK_REQUEST, reqData, &replyTmp, option, &outMsg);
in CbProxySendRequest()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
H A D | pake_v2_protocol_common.c | 275 static int32_t ComputeSid(const PakeBaseParams *params, Uint8Buff *sid)
in ComputeSid() argument 315 if (memcpy_s(sid->val, sid->length, maxId->val, maxId->length) != EOK) {
in ComputeSid() 320 if (memcpy_s(sid->val + maxId->length, sid->length - maxId->length, minId->val, minId->length) != EOK) {
in ComputeSid() 331 static int32_t ComputeSharedSecret(PakeBaseParams *params, const Uint8Buff *sid, const Uint8Buff *tmpSharedSecret)
in ComputeSharedSecret() argument 335 sharedSecretMsg.length = sid->length + params->innerKeyLen + HcStrlen(SHARED_SECRET_DERIVED_FACTOR);
in ComputeSharedSecret() 343 if (memcpy_s(sharedSecretMsg.val, sharedSecretMsg.length, sid->val, sid->length) != EOK) {
in ComputeSharedSecret() 348 usedLen += sid in ComputeSharedSecret() 385 Uint8Buff sid = { NULL, SHA256_LEN * 2 }; // sid is composed of client sid and server sid, so need twice SHA256_LEN GenerateSharedSecret() local [all...] |
/base/security/device_auth/frameworks/inc/lite/ |
H A D | ipc_callback_proxy.h | 27 void CbProxySendRequest(SvcIdentity sid, int32_t callbackId, uintptr_t cbHook, IpcIo *data, IpcIo *reply);
|
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
H A D | dl_speke_protocol.c | 423 static int32_t CalSid(DlSpekeParams *params, Uint8Buff *sid) in CalSid() argument 443 if (memcpy_s(sid->val, sid->length, maxSid->val, maxSid->length) != EOK) { in CalSid() 447 if (memcpy_s(sid->val + maxSid->length, sid->length - maxSid->length, minSid->val, minSid->length) != EOK) { in CalSid() 454 static int32_t CombineSharedSecretMsg(DlSpekeParams *params, const Uint8Buff *tmpSharedSecret, const Uint8Buff *sid, in CombineSharedSecretMsg() argument 458 if (memcpy_s(sharedSecretMsg->val, sharedSecretMsg->length, sid->val, sid->length) != EOK) { in CombineSharedSecretMsg() 462 usedLen += sid->length; in CombineSharedSecretMsg() 490 // sid i in GenerateSharedSecretMsg() 492 Uint8Buff sid = { sidVal, SHA256_LEN * 2 }; GenerateSharedSecretMsg() local [all...] |
H A D | ec_speke_protocol.c | 395 static int32_t CalSid(EcSpekeParams *params, Uint8Buff *sid) in CalSid() argument 415 if (memcpy_s(sid->val, sid->length, maxSid->val, maxSid->length) != EOK) { in CalSid() 419 if (memcpy_s(sid->val + maxSid->length, sid->length - maxSid->length, minSid->val, minSid->length) != EOK) { in CalSid() 426 static int32_t CombineSharedSecretMsg(const Uint8Buff *p, const Uint8Buff *sid, Uint8Buff *sharedSecretMsg) in CombineSharedSecretMsg() argument 429 if (memcpy_s(sharedSecretMsg->val, sharedSecretMsg->length, sid->val, sid->length) != EOK) { in CombineSharedSecretMsg() 433 usedLen += sid->length; in CombineSharedSecretMsg() 462 // sid i in GenerateSharedSecretMsg() 464 Uint8Buff sid = { sidVal, SHA256_LEN * 2 }; GenerateSharedSecretMsg() local [all...] |
/base/sensors/sensor_lite/services/src/ |
H A D | sensor_service_impl.c | 84 SvcIdentity sid;
in SetSvcIdentity() local 85 bool ret = ReadRemoteObject(req, &sid);
in SetSvcIdentity() 90 g_svcIdentity.handle = sid.handle;
in SetSvcIdentity() 91 g_svcIdentity.token = sid.token;
in SetSvcIdentity()
|
/base/telephony/core_service/frameworks/native/src/ |
H A D | cell_location.cpp | 195 void CdmaCellLocation::SetCdmaParam(int32_t baseId, int32_t latitude, int32_t longitude, int32_t nid, int32_t sid) in SetCdmaParam() argument 201 sid_ = sid; in SetCdmaParam()
|
H A D | cell_information.cpp | 859 void CdmaCellInformation::SetCdmaParam(int32_t baseId, int32_t latitude, int32_t longitude, int32_t nid, int32_t sid) in SetCdmaParam() argument 865 sid_ = sid; in SetCdmaParam() 1041 ",sid:" + std::to_string(sid_)); in ToString()
|
/base/security/selinux_adapter/framework/policycoreutils/src/ |
H A D | service_checker.cpp | 87 const char *sid; member 101 if (snprintf_s(buf, len, len - 1, "service=%s sid=%s", msg->name, msg->sid) <= 0) { in SelinuxAuditCallback() 266 msg.sid = srcContext.c_str(); in CheckPerm()
|
/base/telephony/core_service/interfaces/innerkits/include/ |
H A D | cell_location.h | 85 void SetCdmaParam(int32_t baseId, int32_t latitude, int32_t longitude, int32_t nid, int32_t sid);
|
H A D | cell_information.h | 267 void SetCdmaParam(int32_t baseId, int32_t latitude, int32_t longitude, int32_t nid, int32_t sid);
|
/base/security/crypto_framework/frameworks/cj/src/ |
H A D | crypto_ffi.cpp | 714 int32_t FFiOHOSSignInit(int64_t sid, int64_t pid) in FFiOHOSSignInit() argument 717 auto sign = FFIData::GetData<SignImpl>(sid); in FFiOHOSSignInit() 830 int32_t FFiOHOSVerifyInit(int64_t sid, int64_t pid) in FFiOHOSVerifyInit() argument 833 auto verify = FFIData::GetData<VerifyImpl>(sid); in FFiOHOSVerifyInit()
|
/base/security/crypto_framework/frameworks/cj/include/ |
H A D | crypto_ffi.h | 100 FFI_EXPORT int32_t FFiOHOSSignInit(int64_t sid, int64_t pid);
|