/base/security/asset/services/common/src/ |
H A D | calling_info.rs | 26 user_id: i32, 38 pub fn new_part_info(user_id: i32) -> Self { in new_part_info() 39 Self::new(user_id, OwnerType::Native, "asset_service_8100".as_bytes().to_vec()) in new_part_info() 43 pub fn new(user_id: i32, owner_type: OwnerType, owner_info: Vec<u8>) -> Self { in new() 44 Self { user_id, owner_type, owner_info } in new() 62 let mut user_id = process_info.user_id; in build() variables 64 user_id = specific_user_id; in build() 67 CallingInfo { user_id: user_id a in build() 86 pub fn user_id(&self) -> i32 { user_id() functions [all...] |
H A D | process_info.rs | 38 user_id: u32, 49 fn init(user_id: u32, uid: u32, process_name: &mut Vec<u8>, app_id: &mut Vec<u8>) -> Self { in init() 51 user_id, in init() 100 pub user_id: u32, 116 let user_id = get_user_id(uid)?; in build() 119 let mut process_info_ffi = ProcessInfoFfi::init(user_id, uid as u32, &mut process_name, &mut app_id); in build() 120 match unsafe { GetCallingProcessInfo(user_id, uid, &mut process_info_ffi) } { in build() 139 user_id, in build()
|
H A D | lib.rs | 70 let mut user_id = 0; in get_user_id() variables 71 if GetUserIdByUid(uid, &mut user_id) { in get_user_id() 72 Ok(user_id) in get_user_id() 80 pub fn is_user_id_exist(user_id: i32) -> Result<bool> { in is_user_id_exist() 83 if IsUserIdExist(user_id, &mut exist) { in is_user_id_exist()
|
/base/security/asset/frameworks/os_dependency/file/src/ |
H A D | de_operator.rs | 24 fn construct_user_de_path(user_id: i32) -> String { in construct_user_de_path() 25 format!("data/service/el1/public/asset_service/{}", user_id) in construct_user_de_path() 28 fn is_user_de_dir_exist(user_id: i32) -> Result<bool> { in is_user_de_dir_exist() 29 let path_str = construct_user_de_path(user_id); in is_user_de_dir_exist() 34 pub fn create_user_de_dir(user_id: i32) -> Result<()> { in create_user_de_dir() 35 if is_user_de_dir_exist(user_id)? { in create_user_de_dir() 40 let path_str = construct_user_de_path(user_id); in create_user_de_dir() 56 pub fn delete_user_de_dir(user_id: i32) -> Result<()> { in delete_user_de_dir() 57 if !is_user_de_dir_exist(user_id)? { in delete_user_de_dir() 61 let path_str = construct_user_de_path(user_id); in delete_user_de_dir() [all...] |
H A D | ce_operator.rs | 23 fn construct_ce_db_dir(user_id: i32) -> String { in construct_ce_db_dir() 24 format!("data/service/el2/{}/asset_service", user_id) in construct_ce_db_dir() 27 fn construct_db_key_cipher_path(user_id: i32) -> String { in construct_db_key_cipher_path() 28 format!("data/service/el2/{}/asset_service/{}", user_id, DB_KEY) in construct_db_key_cipher_path() 32 pub fn is_db_key_cipher_file_exist(user_id: i32) -> Result<bool> { in is_db_key_cipher_file_exist() 33 let path_str = construct_db_key_cipher_path(user_id); in is_db_key_cipher_file_exist() 38 pub fn read_db_key_cipher(user_id: i32) -> Result<Vec<u8>> { in read_db_key_cipher() 39 let path_str = construct_db_key_cipher_path(user_id); in read_db_key_cipher() 54 pub fn write_db_key_cipher(user_id: i32, db_key_cipher: &Vec<u8>) -> Result<()> { in write_db_key_cipher() 55 let path_str = construct_db_key_cipher_path(user_id); in write_db_key_cipher() [all...] |
/base/security/asset/services/db_key_operator/src/ |
H A D | lib.rs | 29 fn build_db_key_secret_key(user_id: i32) -> Result<SecretKey> { in build_db_key_secret_key() 35 SecretKey::new_with_alias(user_id, auth_type, access_type, require_password_set, alias) in build_db_key_secret_key() 68 fn decrypt_db_key_cipher(user_id: i32, db_key_cipher: &Vec<u8>) -> Result<DbKey> { in decrypt_db_key_cipher() 69 let secret_key = build_db_key_secret_key(user_id)?; in decrypt_db_key_cipher() 85 fn encrypt_db_key(&self, user_id: i32) -> Result<Vec<u8>> { in encrypt_db_key() 86 let secret_key = build_db_key_secret_key(user_id)?; in encrypt_db_key() 95 pub fn check_existance(user_id: i32) -> Result<bool> { in check_existance() 96 is_db_key_cipher_file_exist(user_id) in check_existance() 100 pub fn get_db_key(user_id: i32) -> Result<DbKey> { in get_db_key() 101 match is_db_key_cipher_file_exist(user_id) { in get_db_key() [all...] |
/base/security/asset/services/db_operator/src/ |
H A D | database_file_upgrade.rs | 39 pub(crate) fn fmt_old_de_db_path(user_id: i32) -> String { 40 format!("{}/{}/asset.db", DE_ROOT_PATH, user_id) 43 fn check_old_db_exist(user_id: i32) -> bool { in check_old_db_exist() 44 let path_str = fmt_old_de_db_path(user_id); in check_old_db_exist() 76 fn get_db_before_split(user_id: i32) -> Result<Database> { in get_db_before_split() 77 get_db(user_id, OLD_DB_NAME, DB_UPGRADE_VERSION_V3, None) in get_db_before_split() 87 fn remove_old_db(user_id: i32) -> Result<()> { in remove_old_db() 89 let path = fmt_de_db_path_with_name(user_id, OLD_DB_NAME); in remove_old_db() 98 fn get_new_db(user_id: i32, info_map: &DbMap) -> Result<Database> { in get_new_db() 104 get_db(user_id, in get_new_db() [all...] |
H A D | database.rs | 62 pub(crate) fn get_split_db_lock_by_user_id(user_id: i32) -> &'static UserDbLock { 64 if let Some(&lock) = map.get(&user_id) { 68 let nf = Box::new(UserDbLock { mtx: Mutex::new(user_id) }); 72 map.insert(user_id, nf); 78 pub(crate) fn get_file_lock_by_user_id_db_file_name(user_id: i32, db_file_name: String) -> &'static UserDbLock { 81 if let Some(&lock) = map.get(&(user_id, db_file_name.clone())) { 85 let nf = Box::new(UserDbLock { mtx: Mutex::new(user_id) }); 89 map.insert((user_id, db_file_name), nf); 126 pub(crate) fn fmt_ce_db_path_with_name(user_id: i32, db_name: &str) -> String { 127 format!("data/service/el2/{}/asset_service/{}.db", user_id, db_nam [all...] |
/base/security/asset/services/core_service/src/common_event/ |
H A D | listener.rs | 82 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false)?; in delete_in_de_db_on_package_removed() 87 remove_db(&format!("{}/{}", DE_ROOT_PATH, calling_info.user_id()), calling_info, false)?; in delete_in_de_db_on_package_removed() 100 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), true)?; in delete_in_ce_db_on_package_removed() 105 remove_db(&format!("{}/{}/asset_service", CE_ROOT_PATH, calling_info.user_id()), calling_info, false)?; in delete_in_ce_db_on_package_removed() 121 if is_db_key_cipher_file_exist(calling_info.user_id())? { in delete_on_package_removed() 135 fn delete_data_by_owner(user_id: i32, owner: *const u8, owner_size: u32) { in delete_data_by_owner() 139 let calling_info = CallingInfo::new(user_id, OwnerType::Hap, owner.clone()); in delete_data_by_owner() 161 user_id: i32, 167 delete_data_by_owner(user_id, owner, owner_size); 178 logi!("[INFO]On app -{}-{}-{}- removed.", user_id, bundle_nam [all...] |
H A D | start_event.rs | 33 let Some(user_id) = want.get(USER_ID) else { in handle_package_removed() 59 let user_id = match user_id.parse::<i32>() { in handle_package_removed() 62 loge!("[FATIL]Get removed user_id failed, failed to parse user_id"); in handle_package_removed() 72 listener::on_package_removed(user_id, owner.as_ptr(), owner.len() as u32, bundle_name.as_ptr(), app_index); in handle_package_removed() 91 let user_id = match want.get(USER_ID) { 95 loge!("[FATIL]Get restore app info failed, failed to parse user_id"); 123 listener::on_app_restore(user_id, bundle_name.as_ptr(), app_index);
|
/base/security/asset/services/crypto_manager/src/ |
H A D | secret_key.rs | 32 user_id: i32, 73 alias.extend_from_slice(&calling_info.user_id().to_le_bytes()); in calculate_key_alias() 93 user_id: calling_info.user_id(), in get_existing_key_alias() 105 user_id: calling_info.user_id(), in get_existing_key_alias() 118 user_id: calling_info.user_id(), in get_existing_key_alias() 142 let key_id = KeyId::new(calling_info.user_id(), alias_blob, access_type); in huks_rename_key_alias() 190 user_id in new_with_alias() [all...] |
H A D | lib.rs | 38 user_id: i32, 44 fn new(user_id: i32, alias: HksBlob, accessibility: Accessibility) -> Self { in new() 45 Self { user_id, alias, accessibility } in new()
|
H A D | crypto.rs | 72 let key_id = KeyId::new(self.key.user_id(), key_alias, self.key.access_type()); in init_key() 123 let key_id = KeyId::new(key.user_id(), key_alias, key.access_type()); in encrypt() 150 let key_id = KeyId::new(key.user_id(), key_alias, key.access_type()); in decrypt()
|
/base/security/asset/services/plugin/src/ |
H A D | asset_plugin.rs | 109 pub user_id: i32, 124 fn init(&mut self, user_id: i32) -> std::result::Result<(), u32> { in init() 125 create_user_de_dir(user_id).map_err(|e| e.code as u32)?; in init() 126 self.user_id = user_id; in init() 133 let mut db = Database::build_with_file_name(self.user_id, &db_name, false).map_err(|e| e.code as u32)?; in add() 140 let mut db = Database::build_with_file_name(self.user_id, &db_name, true).map_err(|e| e.code as u32)?; in ce_add() 147 let mut db = Database::build_with_file_name(self.user_id, &db_name, false).map_err(|e| e.code as u32)?; in replace() 154 let mut db = Database::build_with_file_name(self.user_id, &db_name, true).map_err(|e| e.code as u32)?; in ce_replace() 160 let de_dbs = asset_file_operator::de_operator::get_de_user_dbs(self.user_id) in query() [all...] |
/base/security/asset/services/core_service/src/operations/common/ |
H A D | permission_check.rs | 42 let user_id = get_user_id(uid)?; 43 if user_id > ROOT_USER_UPPERBOUND { 46 "[FATAL]The caller user_id is: {}. Not in range[0, 99]", 47 user_id
|
/base/security/asset/services/db_operator/src/test/ |
H A D | test_database.rs | 66 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in open_db_and_insert_data() 90 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in create_and_drop_database() 101 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in database_version() 113 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in error_sql() 125 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in create_delete_asset_table() 143 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in insert_data_with_different_alias() 217 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in query_ordered_data() 254 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in insert_error_data() 274 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in backup_and_restore() 304 Database::build(calling_info.user_id(), calling_inf in query_mismatch_type_data() [all...] |
H A D | test_table.rs | 37 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in create_delete_table() 53 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in table_restore() 86 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in insert_test_data() 156 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in single_data() 189 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in multiple_data() 231 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in insert_query_row() 261 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in update_delete_row() 289 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in upgrade_table() 329 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in replace_datas()
|
/base/security/asset/services/core_service/src/ |
H A D | lib.rs | 112 if let Ok(user_id) = entry.file_name().to_string_lossy().parse::<i32>() { 113 check_and_split_db(user_id)?; 124 .init(Box::new(AssetContext { user_id: 0, calling_info: CallingInfo::new(0, OwnerType::Hap, vec![]) })); in start_service() 162 create_user_de_dir($calling_info.user_id())?;
|
/base/request/request/services/src/manage/ |
H A D | account.rs | 35 pub(crate) fn remove_account_tasks(user_id: i32) { 36 info!("delete database task, uid {}", user_id); 38 request_db.delete_all_account_tasks(user_id); 221 pub(crate) fn delete_all_account_tasks(&self, user_id: i32) { 222 let sql = format!("DELETE from request_task WHERE uid/200000 = {}", user_id);
|
H A D | task_manager.rs | 178 AccountEvent::Remove(user_id) => remove_account_tasks(user_id),
|
/base/request/request/services/src/ |
H A D | ability.rs | 132 let user_id = reason.value.parse::<i32>().unwrap(); in on_start_with_reason() 133 account::remove_account_tasks(user_id); in on_start_with_reason()
|
/base/security/asset/services/core_service/src/operations/ |
H A D | operation_add.rs | 104 if calling_info.user_id() > SYSTEM_USER_ID_MAX { in check_accessibity_validity()
|