Home
last modified time | relevance | path

Searched refs:user_id (Results 1 - 22 of 22) sorted by relevance

/base/security/asset/services/common/src/
H A Dcalling_info.rs26 user_id: i32,
38 pub fn new_part_info(user_id: i32) -> Self { in new_part_info()
39 Self::new(user_id, OwnerType::Native, "asset_service_8100".as_bytes().to_vec()) in new_part_info()
43 pub fn new(user_id: i32, owner_type: OwnerType, owner_info: Vec<u8>) -> Self { in new()
44 Self { user_id, owner_type, owner_info } in new()
62 let mut user_id = process_info.user_id; in build() variables
64 user_id = specific_user_id; in build()
67 CallingInfo { user_id: user_id a in build()
86 pub fn user_id(&self) -> i32 { user_id() functions
[all...]
H A Dprocess_info.rs38 user_id: u32,
49 fn init(user_id: u32, uid: u32, process_name: &mut Vec<u8>, app_id: &mut Vec<u8>) -> Self { in init()
51 user_id, in init()
100 pub user_id: u32,
116 let user_id = get_user_id(uid)?; in build()
119 let mut process_info_ffi = ProcessInfoFfi::init(user_id, uid as u32, &mut process_name, &mut app_id); in build()
120 match unsafe { GetCallingProcessInfo(user_id, uid, &mut process_info_ffi) } { in build()
139 user_id, in build()
H A Dlib.rs70 let mut user_id = 0; in get_user_id() variables
71 if GetUserIdByUid(uid, &mut user_id) { in get_user_id()
72 Ok(user_id) in get_user_id()
80 pub fn is_user_id_exist(user_id: i32) -> Result<bool> { in is_user_id_exist()
83 if IsUserIdExist(user_id, &mut exist) { in is_user_id_exist()
/base/security/asset/frameworks/os_dependency/file/src/
H A Dde_operator.rs24 fn construct_user_de_path(user_id: i32) -> String { in construct_user_de_path()
25 format!("data/service/el1/public/asset_service/{}", user_id) in construct_user_de_path()
28 fn is_user_de_dir_exist(user_id: i32) -> Result<bool> { in is_user_de_dir_exist()
29 let path_str = construct_user_de_path(user_id); in is_user_de_dir_exist()
34 pub fn create_user_de_dir(user_id: i32) -> Result<()> { in create_user_de_dir()
35 if is_user_de_dir_exist(user_id)? { in create_user_de_dir()
40 let path_str = construct_user_de_path(user_id); in create_user_de_dir()
56 pub fn delete_user_de_dir(user_id: i32) -> Result<()> { in delete_user_de_dir()
57 if !is_user_de_dir_exist(user_id)? { in delete_user_de_dir()
61 let path_str = construct_user_de_path(user_id); in delete_user_de_dir()
[all...]
H A Dce_operator.rs23 fn construct_ce_db_dir(user_id: i32) -> String { in construct_ce_db_dir()
24 format!("data/service/el2/{}/asset_service", user_id) in construct_ce_db_dir()
27 fn construct_db_key_cipher_path(user_id: i32) -> String { in construct_db_key_cipher_path()
28 format!("data/service/el2/{}/asset_service/{}", user_id, DB_KEY) in construct_db_key_cipher_path()
32 pub fn is_db_key_cipher_file_exist(user_id: i32) -> Result<bool> { in is_db_key_cipher_file_exist()
33 let path_str = construct_db_key_cipher_path(user_id); in is_db_key_cipher_file_exist()
38 pub fn read_db_key_cipher(user_id: i32) -> Result<Vec<u8>> { in read_db_key_cipher()
39 let path_str = construct_db_key_cipher_path(user_id); in read_db_key_cipher()
54 pub fn write_db_key_cipher(user_id: i32, db_key_cipher: &Vec<u8>) -> Result<()> { in write_db_key_cipher()
55 let path_str = construct_db_key_cipher_path(user_id); in write_db_key_cipher()
[all...]
/base/security/asset/services/db_key_operator/src/
H A Dlib.rs29 fn build_db_key_secret_key(user_id: i32) -> Result<SecretKey> { in build_db_key_secret_key()
35 SecretKey::new_with_alias(user_id, auth_type, access_type, require_password_set, alias) in build_db_key_secret_key()
68 fn decrypt_db_key_cipher(user_id: i32, db_key_cipher: &Vec<u8>) -> Result<DbKey> { in decrypt_db_key_cipher()
69 let secret_key = build_db_key_secret_key(user_id)?; in decrypt_db_key_cipher()
85 fn encrypt_db_key(&self, user_id: i32) -> Result<Vec<u8>> { in encrypt_db_key()
86 let secret_key = build_db_key_secret_key(user_id)?; in encrypt_db_key()
95 pub fn check_existance(user_id: i32) -> Result<bool> { in check_existance()
96 is_db_key_cipher_file_exist(user_id) in check_existance()
100 pub fn get_db_key(user_id: i32) -> Result<DbKey> { in get_db_key()
101 match is_db_key_cipher_file_exist(user_id) { in get_db_key()
[all...]
/base/security/asset/services/db_operator/src/
H A Ddatabase_file_upgrade.rs39 pub(crate) fn fmt_old_de_db_path(user_id: i32) -> String {
40 format!("{}/{}/asset.db", DE_ROOT_PATH, user_id)
43 fn check_old_db_exist(user_id: i32) -> bool { in check_old_db_exist()
44 let path_str = fmt_old_de_db_path(user_id); in check_old_db_exist()
76 fn get_db_before_split(user_id: i32) -> Result<Database> { in get_db_before_split()
77 get_db(user_id, OLD_DB_NAME, DB_UPGRADE_VERSION_V3, None) in get_db_before_split()
87 fn remove_old_db(user_id: i32) -> Result<()> { in remove_old_db()
89 let path = fmt_de_db_path_with_name(user_id, OLD_DB_NAME); in remove_old_db()
98 fn get_new_db(user_id: i32, info_map: &DbMap) -> Result<Database> { in get_new_db()
104 get_db(user_id, in get_new_db()
[all...]
H A Ddatabase.rs62 pub(crate) fn get_split_db_lock_by_user_id(user_id: i32) -> &'static UserDbLock {
64 if let Some(&lock) = map.get(&user_id) {
68 let nf = Box::new(UserDbLock { mtx: Mutex::new(user_id) });
72 map.insert(user_id, nf);
78 pub(crate) fn get_file_lock_by_user_id_db_file_name(user_id: i32, db_file_name: String) -> &'static UserDbLock {
81 if let Some(&lock) = map.get(&(user_id, db_file_name.clone())) {
85 let nf = Box::new(UserDbLock { mtx: Mutex::new(user_id) });
89 map.insert((user_id, db_file_name), nf);
126 pub(crate) fn fmt_ce_db_path_with_name(user_id: i32, db_name: &str) -> String {
127 format!("data/service/el2/{}/asset_service/{}.db", user_id, db_nam
[all...]
/base/security/asset/services/core_service/src/common_event/
H A Dlistener.rs82 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false)?; in delete_in_de_db_on_package_removed()
87 remove_db(&format!("{}/{}", DE_ROOT_PATH, calling_info.user_id()), calling_info, false)?; in delete_in_de_db_on_package_removed()
100 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), true)?; in delete_in_ce_db_on_package_removed()
105 remove_db(&format!("{}/{}/asset_service", CE_ROOT_PATH, calling_info.user_id()), calling_info, false)?; in delete_in_ce_db_on_package_removed()
121 if is_db_key_cipher_file_exist(calling_info.user_id())? { in delete_on_package_removed()
135 fn delete_data_by_owner(user_id: i32, owner: *const u8, owner_size: u32) { in delete_data_by_owner()
139 let calling_info = CallingInfo::new(user_id, OwnerType::Hap, owner.clone()); in delete_data_by_owner()
161 user_id: i32,
167 delete_data_by_owner(user_id, owner, owner_size);
178 logi!("[INFO]On app -{}-{}-{}- removed.", user_id, bundle_nam
[all...]
H A Dstart_event.rs33 let Some(user_id) = want.get(USER_ID) else { in handle_package_removed()
59 let user_id = match user_id.parse::<i32>() { in handle_package_removed()
62 loge!("[FATIL]Get removed user_id failed, failed to parse user_id"); in handle_package_removed()
72 listener::on_package_removed(user_id, owner.as_ptr(), owner.len() as u32, bundle_name.as_ptr(), app_index); in handle_package_removed()
91 let user_id = match want.get(USER_ID) {
95 loge!("[FATIL]Get restore app info failed, failed to parse user_id");
123 listener::on_app_restore(user_id, bundle_name.as_ptr(), app_index);
/base/security/asset/services/crypto_manager/src/
H A Dsecret_key.rs32 user_id: i32,
73 alias.extend_from_slice(&calling_info.user_id().to_le_bytes()); in calculate_key_alias()
93 user_id: calling_info.user_id(), in get_existing_key_alias()
105 user_id: calling_info.user_id(), in get_existing_key_alias()
118 user_id: calling_info.user_id(), in get_existing_key_alias()
142 let key_id = KeyId::new(calling_info.user_id(), alias_blob, access_type); in huks_rename_key_alias()
190 user_id in new_with_alias()
[all...]
H A Dlib.rs38 user_id: i32,
44 fn new(user_id: i32, alias: HksBlob, accessibility: Accessibility) -> Self { in new()
45 Self { user_id, alias, accessibility } in new()
H A Dcrypto.rs72 let key_id = KeyId::new(self.key.user_id(), key_alias, self.key.access_type()); in init_key()
123 let key_id = KeyId::new(key.user_id(), key_alias, key.access_type()); in encrypt()
150 let key_id = KeyId::new(key.user_id(), key_alias, key.access_type()); in decrypt()
/base/security/asset/services/plugin/src/
H A Dasset_plugin.rs109 pub user_id: i32,
124 fn init(&mut self, user_id: i32) -> std::result::Result<(), u32> { in init()
125 create_user_de_dir(user_id).map_err(|e| e.code as u32)?; in init()
126 self.user_id = user_id; in init()
133 let mut db = Database::build_with_file_name(self.user_id, &db_name, false).map_err(|e| e.code as u32)?; in add()
140 let mut db = Database::build_with_file_name(self.user_id, &db_name, true).map_err(|e| e.code as u32)?; in ce_add()
147 let mut db = Database::build_with_file_name(self.user_id, &db_name, false).map_err(|e| e.code as u32)?; in replace()
154 let mut db = Database::build_with_file_name(self.user_id, &db_name, true).map_err(|e| e.code as u32)?; in ce_replace()
160 let de_dbs = asset_file_operator::de_operator::get_de_user_dbs(self.user_id) in query()
[all...]
/base/security/asset/services/core_service/src/operations/common/
H A Dpermission_check.rs42 let user_id = get_user_id(uid)?;
43 if user_id > ROOT_USER_UPPERBOUND {
46 "[FATAL]The caller user_id is: {}. Not in range[0, 99]",
47 user_id
/base/security/asset/services/db_operator/src/test/
H A Dtest_database.rs66 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in open_db_and_insert_data()
90 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in create_and_drop_database()
101 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in database_version()
113 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in error_sql()
125 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in create_delete_asset_table()
143 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in insert_data_with_different_alias()
217 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in query_ordered_data()
254 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in insert_error_data()
274 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in backup_and_restore()
304 Database::build(calling_info.user_id(), calling_inf in query_mismatch_type_data()
[all...]
H A Dtest_table.rs37 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in create_delete_table()
53 Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in table_restore()
86 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in insert_test_data()
156 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in single_data()
189 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in multiple_data()
231 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in insert_query_row()
261 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in update_delete_row()
289 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in upgrade_table()
329 let db = Database::build(calling_info.user_id(), calling_info.owner_type_enum(), calling_info.owner_info(), false) in replace_datas()
/base/security/asset/services/core_service/src/
H A Dlib.rs112 if let Ok(user_id) = entry.file_name().to_string_lossy().parse::<i32>() {
113 check_and_split_db(user_id)?;
124 .init(Box::new(AssetContext { user_id: 0, calling_info: CallingInfo::new(0, OwnerType::Hap, vec![]) })); in start_service()
162 create_user_de_dir($calling_info.user_id())?;
/base/request/request/services/src/manage/
H A Daccount.rs35 pub(crate) fn remove_account_tasks(user_id: i32) {
36 info!("delete database task, uid {}", user_id);
38 request_db.delete_all_account_tasks(user_id);
221 pub(crate) fn delete_all_account_tasks(&self, user_id: i32) {
222 let sql = format!("DELETE from request_task WHERE uid/200000 = {}", user_id);
H A Dtask_manager.rs178 AccountEvent::Remove(user_id) => remove_account_tasks(user_id),
/base/request/request/services/src/
H A Dability.rs132 let user_id = reason.value.parse::<i32>().unwrap(); in on_start_with_reason()
133 account::remove_account_tasks(user_id); in on_start_with_reason()
/base/security/asset/services/core_service/src/operations/
H A Doperation_add.rs104 if calling_info.user_id() > SYSTEM_USER_ID_MAX { in check_accessibity_validity()

Completed in 28 milliseconds