/foundation/communication/dsoftbus/core/authentication/src/ |
H A D | auth_manager.c | 64 AuthManager *auth = (AuthManager *)SoftBusCalloc(sizeof(AuthManager)); in NewAuthManager() local 65 if (auth == NULL) { in NewAuthManager() 69 auth->authId = authSeq; in NewAuthManager() 70 auth->isServer = info->isServer; in NewAuthManager() 71 auth->connId[info->connInfo.type] = info->connId; in NewAuthManager() 72 auth->connInfo[info->connInfo.type] = info->connInfo; in NewAuthManager() 73 if (strcpy_s(auth->udid, sizeof(auth->udid), info->udid) != EOK || in NewAuthManager() 74 strcpy_s(auth->uuid, sizeof(auth in NewAuthManager() 95 DupAuthManager(const AuthManager *auth) DupAuthManager() argument 112 DelDupAuthManager(AuthManager *auth) DelDupAuthManager() argument 119 DelAuthManager(AuthManager *auth, int32_t type) DelAuthManager() argument 253 SetAuthConnId(AuthManager *auth, const AuthManager *inAuth, AuthLinkType type) SetAuthConnId() argument 259 SetAuthP2pMac(AuthManager *auth, const AuthManager *inAuth, AuthLinkType type) SetAuthP2pMac() argument 276 AuthManager *auth = FindAuthManagerByAuthId(authId); UpdateAuthManagerByAuthId() local 296 AuthManager *auth = FindAuthManagerByAuthId(authId); RemoveAuthSessionKeyByIndex() local 322 AuthManager *auth = FindAuthManagerByAuthId(authHandle.authId); RemoveAuthManagerByAuthId() local 337 AuthManager *auth = FindAuthManagerByConnInfo(connInfo, isServer); RemoveAuthManagerByConnInfo() local 349 HasAuthPassed(AuthManager *auth) HasAuthPassed() argument 396 AuthManager *auth = FindAuthManagerByUuid(uuid, type, false); GetAuthConnInfoByUuid() local 420 AuthManager *auth = FindAuthManagerByUuid(uuid, type, false); GetAvailableAuthConnInfoByUuid() local 489 AuthManager *auth = FindAuthManagerByConnId(connId, isServer); GetAuthIdByConnId() local 511 const AuthManager *auth[2] = { NULL, NULL }; /* 2: client + server */ GetLatestIdByConnInfo() local 535 AuthManager *auth = FindAuthManagerByConnInfo(connInfo, isServer); GetAuthIdByConnInfo() local 554 AuthManager *auth[2] = { NULL, NULL }; /* 2: client + server */ GetActiveAuthIdByConnInfo() local 621 AuthManager *auth = FindNormalizedKeyAuthManagerByUdid(info->udid, info->isServer); GetExistAuthManager() local 646 AuthManager *auth = FindAuthManagerByConnInfo(&info->connInfo, info->isServer); GetDeviceAuthManager() local 685 AuthManager *auth = FindAuthManagerByUdid(info->udid, AUTH_LINK_TYPE_BLE, isServer); ProcessEmptySessionKey() local 713 AuthManager *auth = FindAuthManagerByUdid(info->udid, info->connInfo.type, info->isServer); AuthProcessEmptySessionKey() local 755 AuthManager *auth = GetDeviceAuthManager(authSeq, info, &isNewCreated, sessionKeyIndex); AuthManagerSetSessionKey() local 796 AuthManager *auth = FindAuthManagerByConnInfo(&info->connInfo, info->isServer); AuthManagerGetSessionKey() local 898 AuthManager *auth = FindAuthManagerByConnInfo(&info->connInfo, info->isServer); AuthNotifyAuthPassed() local 944 AuthManager *auth = FindAuthManagerByConnInfo(&info->connInfo, info->isServer); AuthManagerSetAuthPassed() local 991 AuthManager *auth = NULL; AuthManagerSetAuthFailed() local 1232 AuthManager *auth = FindAuthManagerByConnInfo(connInfo, isServer); FlushDeviceProcess() local 1254 AuthManager *auth[AUTH_COUNT] = { NULL, NULL }; /* 2: WiFi * (Client + Server) */ AuthSetTcpKeepaliveByConnInfo() local 1349 AuthManager *auth = FindAuthManagerByConnInfo(connInfo, !fromServer); HandleConnectionData() local 1399 const AuthManager *auth[2] = { NULL, NULL }; /* 2: client + server */ HandleDecryptFailData() local 1558 AuthManager *auth = FindAuthManagerByAuthId(authHandle.authId); AuthHandleLeaveLNN() local 1594 AuthManager *auth[2] = { NULL, NULL }; /* 2: WiFi * (Client + Server) */ PostDeviceMessageByUuid() local 1939 AuthManager *auth[2] = { NULL, NULL }; /* 2: max size for (CLIENT+ SERVER) */ AuthDeviceGetLatestIdByUuid() local 1990 AuthManager *auth = FindAuthManagerByUuid(uuid, type, isServer); AuthDeviceGetIdByUuid() local 2015 AuthManager *auth = FindNormalizedKeyAuthManagerByUdid(udid, isServer); AuthDeviceGetAuthHandleByIndex() local 2036 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthGetEncryptSize() local [all...] |
H A D | auth_device.c | 184 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); in AuthDevicePostTransData() local 185 if (auth == NULL) { in AuthDevicePostTransData() 196 if (EncryptInner(&auth->sessionKeyList, (AuthLinkType)authHandle.type, &inDataInfo, &encData, in AuthDevicePostTransData() 199 DelDupAuthManager(auth); in AuthDevicePostTransData() 202 if (PostAuthData(auth->connId[authHandle.type], !auth->isServer, &head, encData) != SOFTBUS_OK) { in AuthDevicePostTransData() 205 DelDupAuthManager(auth); in AuthDevicePostTransData() 209 DelDupAuthManager(auth); in AuthDevicePostTransData() 221 AuthManager *auth = GetAuthManagerByAuthId(authHandle->authId); in AuthDeviceEncrypt() local 222 if (auth in AuthDeviceEncrypt() 244 AuthManager *auth = GetAuthManagerByAuthId(authHandle->authId); AuthDeviceDecrypt() local 269 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); AuthDeviceGetConnInfo() local 284 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthDeviceGetServerSide() local 299 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthDeviceGetDeviceUuid() local 318 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthDeviceGetVersion() local 353 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); AuthNotifyDeviceVerifyPassed() local 517 AuthManager *auth = GetDeviceAuthManager(authSeq, info, &isNewCreated, authSeq); AuthDirectOnlineCreateAuthManager() local 615 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); AuthStartReconnectDevice() local 647 AuthManager *auth = GetAuthManagerByAuthId(authHandle->authId); AuthCheckSessionKey() local 708 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); AuthDeviceCloseConn() local [all...] |
H A D | auth_interface.c | 197 AUTH_LOGE(AUTH_CONN, "client and server auth not found, type=%{public}d", type); in AuthCheckSessionKeyValidByConnInfo() 227 AuthManager *auth = GetAuthManagerByAuthId(authHandle->authId); in AuthCheckSessionKeyValidByAuthHandle() local 228 if (auth == NULL) { in AuthCheckSessionKeyValidByAuthHandle() 229 AUTH_LOGE(AUTH_CONN, "not found auth manager, type=%{public}d, authId=%{public}" PRId64, in AuthCheckSessionKeyValidByAuthHandle() 234 if (!CheckSessionKeyListExistType(&auth->sessionKeyList, (AuthLinkType)authHandle->type)) { in AuthCheckSessionKeyValidByAuthHandle() 239 DelDupAuthManager(auth); in AuthCheckSessionKeyValidByAuthHandle() 262 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); in AuthPostTransData() local 263 if (auth != NULL) { in AuthPostTransData() 264 DelDupAuthManager(auth); in AuthPostTransData() 276 AuthManager *auth in AuthCloseConn() local 456 AuthManager *auth = GetAuthManagerByConnInfo(&info->connInfo, info->isServer); AuthDirectOnlineProcessSessionKey() local 474 AuthManager *auth = GetAuthManagerByConnInfo(&info->connInfo, info->isServer); AuthDirectOnlineWithoutSessionKey() local 533 AuthManager *auth = GetAuthManagerByAuthId(authHandle->authId); AuthEncrypt() local 548 AuthManager *auth = GetAuthManagerByAuthId(authHandle->authId); AuthDecrypt() local 558 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthSetP2pMac() local 572 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); AuthGetConnInfo() local 582 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthGetDeviceUuid() local 597 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthGetServerSide() local 611 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthGetMetaType() local [all...] |
H A D | auth_session_message.c | 489 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 ", udid is null update local auth state=%{public}d", in UpdateLocalAuthState() 495 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 " local auth state=%{public}d", authSeq, info->localState); in UpdateLocalAuthState() 500 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 " local auth state=%{public}d", authSeq, info->localState); in UpdateLocalAuthState() 530 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 " local auth state=%{public}d", authSeq, info->localState); in UpdateLocalAuthState() 535 const AuthManager *auth, int32_t flagRelay, AuthLinkType type, const DeviceMessageParse *messageParse) in PostDeviceMessage() 537 AUTH_CHECK_AND_RETURN_RET_LOGE(auth != NULL, SOFTBUS_INVALID_PARAM, AUTH_FSM, "auth is NULL"); in PostDeviceMessage() 548 msg = PackVerifyDeviceMessage(auth->uuid); in PostDeviceMessage() 550 msg = PackKeepaliveMessage(auth->uuid, messageParse->cycle); in PostDeviceMessage() 560 if (EncryptInner(&auth in PostDeviceMessage() 534 PostDeviceMessage( const AuthManager *auth, int32_t flagRelay, AuthLinkType type, const DeviceMessageParse *messageParse) PostDeviceMessage() argument [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/ |
H A D | base_key.h | 44 bool StoreKey(const UserAuth &auth, bool needGenerateShield = true); 46 bool StoreKey(const UserAuth &auth); 49 bool RestoreKey(const UserAuth &auth); 58 virtual bool DecryptClassE(const UserAuth &auth, bool &isSupport, bool &eBufferStatue, uint32_t user, 60 virtual bool EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) = 0; 63 bool DoRestoreKeyEx(const UserAuth &auth, const std::string &keypath); 64 bool EncryptKeyBlob(const UserAuth &auth, const std::string &keyPath, KeyBlob &planKey, KeyBlob &encryptedKey); 65 bool DecryptKeyBlob(const UserAuth &auth, const std::string &keyPath, KeyBlob &planKey, KeyBlob &decryptedKey); 93 bool DoStoreKey(const UserAuth &auth, bool needGenerateShield = true); 95 bool DoStoreKey(const UserAuth &auth); [all...] |
H A D | huks_master.h | 39 bool GenerateKey(const UserAuth &auth, KeyBlob &keyOut); 40 bool EncryptKey(KeyContext &ctx, const UserAuth &auth, const KeyInfo &key, bool isNeedNewNonce); 41 bool EncryptKeyEx(const UserAuth &auth, const KeyBlob &rnd, KeyContext &ctx); 42 bool DecryptKey(KeyContext &ctx, const UserAuth &auth, KeyInfo &key, bool isNeedNewNonce); 43 bool DecryptKeyEx(KeyContext &ctx, const UserAuth &auth, KeyBlob &rnd);
|
H A D | fscrypt_key_v2.h | 40 bool DecryptClassE(const UserAuth &auth, bool &isSupport, bool &eBufferStatue, uint32_t user = 0, 42 bool EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user = 0, uint32_t status = 0);
|
H A D | fscrypt_key_v1.h | 45 bool DecryptClassE(const UserAuth &auth, bool &isSupport, bool &eBufferStatue, uint32_t user = 0, 47 bool EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user = 0, uint32_t status = 0);
|
H A D | key_backup.h | 46 int32_t TryRestoreKey(const std::shared_ptr<BaseKey> &baseKey, const UserAuth &auth); 48 const UserAuth &auth, 90 int32_t DoResotreKeyMix(std::shared_ptr<BaseKey> &baseKey, const UserAuth &auth, const std::string &keyDir,
|
/foundation/communication/dsoftbus/tests/core/authentication/unittest/ |
H A D | auth_lane_test.cpp | 138 * @tc.desc: add auth request node test 185 * @tc.desc: auth get request option test test 209 * @tc.desc: get auth link type list test 233 * @tc.desc: auth alloc lane test 263 * @tc.desc: auth alloc lane wlan test 284 AuthManager *auth = FindAuthManagerByConnInfo(&connInfo, false); in HWTEST_F() local 285 EXPECT_TRUE(auth != nullptr); in HWTEST_F() 286 auth->hasAuthPassed[AUTH_LINK_TYPE_WIFI] = true; in HWTEST_F() 287 auth->authId = 1; in HWTEST_F() 288 auth in HWTEST_F() 330 AuthManager *auth = FindAuthManagerByConnInfo(&connInfo, false); HWTEST_F() local 374 AuthManager *auth = FindAuthManagerByConnInfo(&connInfo, false); HWTEST_F() local 414 AuthManager *auth = FindAuthManagerByConnInfo(&connInfo, false); HWTEST_F() local 460 AuthManager *auth = FindAuthManagerByConnInfo(&connInfo, false); HWTEST_F() local 507 AuthManager *auth = FindAuthManagerByConnInfo(&connInfo, false); HWTEST_F() local 550 AuthManager *auth = FindAuthManagerByConnInfo(&connInfo, false); HWTEST_F() local [all...] |
H A D | auth_manager_test.cpp | 130 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); in HWTEST_F() local 131 EXPECT_TRUE(auth != nullptr); in HWTEST_F() 160 EXPECT_EQ(AddSessionKey(&auth->sessionKeyList, AUTH_SEQ, &sessionKey, AUTH_LINK_TYPE_WIFI, false), SOFTBUS_OK); in HWTEST_F() 161 EXPECT_EQ(SetSessionKeyAvailable(&auth->sessionKeyList, AUTH_SEQ), SOFTBUS_OK); in HWTEST_F() 195 AuthManager *auth = FindAuthManagerByConnId(CONN_ID, true); in HWTEST_F() local 196 EXPECT_TRUE(auth == nullptr); in HWTEST_F() 198 MyUpdateFuncReturnError, auth, AUTH_LINK_TYPE_WIFI) == SOFTBUS_AUTH_NOT_FOUND); in HWTEST_F() 199 EXPECT_TRUE(UpdateAuthManagerByAuthId(AUTH_SEQ, MyUpdateFuncReturnError, auth, in HWTEST_F() 201 EXPECT_TRUE(UpdateAuthManagerByAuthId(AUTH_SEQ, MyUpdateFuncReturnOk, auth, AUTH_LINK_TYPE_WIFI) == SOFTBUS_OK); in HWTEST_F() 232 AuthManager *auth in HWTEST_F() local 265 AuthManager *auth = GetDeviceAuthManager(AUTH_SEQ_4, &info, &isNewCreated, AUTH_SEQ_4); HWTEST_F() local 293 AuthManager *auth = GetDeviceAuthManager(AUTH_SEQ_5, &info, &isNewCreated, AUTH_SEQ_5); HWTEST_F() local 335 AuthManager *auth = GetDeviceAuthManager(AUTH_SEQ_1, &info, &isNewCreated, AUTH_SEQ_1); HWTEST_F() local 597 AuthManager *auth = NewAuthManager(authHandle.authId, &info); HWTEST_F() local 740 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); HWTEST_F() local 768 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); HWTEST_F() local 930 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); HWTEST_F() local 954 AuthManager *auth = NewAuthManager(authSeq, &info); HWTEST_F() local [all...] |
H A D | auth_test.cpp | 108 * @tc.desc: auth commone test 142 * @tc.desc: hichain start auth test 181 * @tc.desc: add auth request test 195 * @tc.desc: get auth request test 210 * @tc.desc: auth session process devId data test 226 * @tc.desc: auth session post auth data test 242 * @tc.desc: auth session process auth data test 258 * @tc.desc: auth sessio 577 AuthManager auth = { 0 }; HWTEST_F() local 596 const AuthManager *auth = nullptr; HWTEST_F() local 929 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1090 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1180 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1216 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1249 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1276 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1299 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1343 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local 1370 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/mock/ |
H A D | base_key_mock.cpp | 38 bool BaseKey::StoreKey(const UserAuth &auth, bool needGenerateShield) in StoreKey() argument 43 return IBaseKeyMoc::baseKeyMoc->StoreKey(auth, needGenerateShield); in StoreKey() 46 bool BaseKey::StoreKey(const UserAuth &auth) in StoreKey() argument 51 return IBaseKeyMoc::baseKeyMoc->StoreKey(auth); in StoreKey() 71 bool BaseKey::RestoreKey(const UserAuth &auth) in RestoreKey() argument 76 return IBaseKeyMoc::baseKeyMoc->RestoreKey(auth); in RestoreKey() 87 bool BaseKey::DecryptKeyBlob(const UserAuth &auth, const std::string &keyPath, KeyBlob &planKey, in DecryptKeyBlob() argument 93 return IBaseKeyMoc::baseKeyMoc->DecryptKeyBlob(auth, keyPath, planKey, decryptedKey); in DecryptKeyBlob() 96 bool BaseKey::EncryptKeyBlob(const UserAuth &auth, const std::string &keyPath, KeyBlob &planKey, in EncryptKeyBlob() argument 102 return IBaseKeyMoc::baseKeyMoc->EncryptKeyBlob(auth, keyPat in EncryptKeyBlob() [all...] |
H A D | fscrypt_key_v2_mock.cpp | 101 bool FscryptKeyV2::DecryptClassE(const UserAuth &auth, bool &isSupport, in DecryptClassE() argument 107 return IFscryptKeyV2Moc::fscryptKeyV2Moc->DecryptClassE(auth, isSupport, eBufferStatue, user, status); in DecryptClassE() 110 bool FscryptKeyV2::EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) in EncryptClassE() argument 115 return IFscryptKeyV2Moc::fscryptKeyV2Moc->EncryptClassE(auth, isSupport, user, status); in EncryptClassE()
|
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/crypto_test/ |
H A D | crypto_test.cpp | 103 const UserAuth auth; in HWTEST_F() local 108 bool ret = HuksMaster::GetInstance().EncryptKey(ctx, auth, key, isNeedNewNonce); in HWTEST_F() 111 ret = HuksMaster::GetInstance().EncryptKeyEx(auth, rnd, ctx); in HWTEST_F() 127 const UserAuth auth; in HWTEST_F() local 132 bool ret = HuksMaster::GetInstance().EncryptKey(ctx, auth, key, isNeedNewNonce); in HWTEST_F() 135 ret = HuksMaster::GetInstance().EncryptKeyEx(auth, rnd, ctx); in HWTEST_F() 150 const UserAuth auth; in HWTEST_F() local 155 bool ret = HuksMaster::GetInstance().DecryptKey(ctx, auth, key, isNeedNewNonce); in HWTEST_F() 158 ret = HuksMaster::GetInstance().DecryptKeyEx(ctx, auth, rnd); in HWTEST_F() 174 const UserAuth auth; in HWTEST_F() local 198 const UserAuth auth; HWTEST_F() local [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/ |
H A D | base_key.cpp | 195 bool BaseKey::StoreKey(const UserAuth &auth, bool needGenerateShield) in StoreKey() argument 197 bool BaseKey::StoreKey(const UserAuth &auth) in StoreKey() 203 if (DoStoreKey(auth, needGenerateShield)) { in StoreKey() 205 if (DoStoreKey(auth)) { in StoreKey() 229 bool BaseKey::DoStoreKey(const UserAuth &auth, bool needGenerateShield) in StoreKey() argument 231 bool BaseKey::DoStoreKey(const UserAuth &auth) in StoreKey() 244 return EncryptDe(auth, pathTemp); in StoreKey() 246 if ((auth.token.IsEmpty() && auth.secret.IsEmpty()) || // OOBE首次开机 删除密码(ABC) in StoreKey() 247 !auth in StoreKey() 287 InitKeyContext(const UserAuth &auth, const std::string &keyPath, KeyContext &keyCtx) StoreKey() argument 331 LoadAndSaveShield(const UserAuth &auth, const std::string &pathShield, bool needGenerateShield, KeyContext &keyCtx) StoreKey() argument 421 EncryptDe(const UserAuth &auth, const std::string &path) StoreKey() argument 450 EncryptEceSece(const UserAuth &auth, const uint32_t keyType, KeyContext &keyCtx) StoreKey() argument 482 RestoreKey(const UserAuth &auth) StoreKey() argument 521 DoRestoreKeyEx(const UserAuth &auth, const std::string &keyPath) StoreKey() argument 565 DoRestoreKeyOld(const UserAuth &auth, const std::string &path) StoreKey() argument 598 DoRestoreKeyDe(const UserAuth &auth, const std::string &path) StoreKey() argument 625 DoRestoreKeyCeEceSece(const UserAuth &auth, const std::string &path, const uint32_t keyType) StoreKey() argument 673 DoRestoreKey(const UserAuth &auth, const std::string &path) StoreKey() argument 701 DoUpdateRestore(const UserAuth &auth, const std::string &keyPath) StoreKey() argument 729 DecryptReal(const UserAuth &auth, const uint32_t keyType, KeyContext &keyCtx) StoreKey() argument 757 Decrypt(const UserAuth &auth) StoreKey() argument 919 EncryptKeyBlob(const UserAuth &auth, const std::string &keyPath, KeyBlob &planKey, KeyBlob &encryptedKey) StoreKey() argument 952 DecryptKeyBlob(const UserAuth &auth, const std::string &keyPath, KeyBlob &planKey, KeyBlob &decryptedKey) StoreKey() argument [all...] |
H A D | huks_master.cpp | 330 static int AppendSecureAccessParams(const UserAuth &auth, HksParamSet *paramSet) in AppendSecureAccessParams() argument 332 if (auth.secret.IsEmpty() || auth.token.IsEmpty()) { in AppendSecureAccessParams() 333 LOGI("auth is empty, not to enable secure access for the key"); in AppendSecureAccessParams() 344 { .tag = HKS_TAG_USER_AUTH_SECURE_UID, .blob = { sizeof(auth.secureUid), (uint8_t *)&auth.secureUid } }, in AppendSecureAccessParams() 365 bool HuksMaster::GenerateKey(const UserAuth &auth, KeyBlob &keyOut) in GenerateKey() argument 382 ret = AppendSecureAccessParams(auth, paramSet); in GenerateKey() 466 static int AppendNonceAadTokenEx(KeyContext &ctx, const UserAuth &auth, HksParamSet *paramSet, bool isEncrypt) in AppendNonceAadTokenEx() argument 468 if (auth in AppendNonceAadTokenEx() 485 AppendNewNonceAadToken(KeyContext &ctx, const UserAuth &auth, HksParamSet *paramSet, const bool isEncrypt) AppendNewNonceAadToken() argument 506 AppendNonceAadToken(KeyContext &ctx, const UserAuth &auth, HksParamSet *paramSet) AppendNonceAadToken() argument 535 GenHuksOptionParamEx(KeyContext &ctx, const UserAuth &auth, const bool isEncrypt) GenHuksOptionParamEx() argument 586 GenHuksOptionParam(KeyContext &ctx, const UserAuth &auth, const bool isEncrypt, const bool isNeedNewNonce) GenHuksOptionParam() argument 674 EncryptKeyEx(const UserAuth &auth, const KeyBlob &rnd, KeyContext &ctx) EncryptKeyEx() argument 708 EncryptKey(KeyContext &ctx, const UserAuth &auth, const KeyInfo &key, bool isNeedNewNonce) EncryptKey() argument 741 DecryptKey(KeyContext &ctx, const UserAuth &auth, KeyInfo &key, bool isNeedNewNonce) DecryptKey() argument 775 DecryptKeyEx(KeyContext &ctx, const UserAuth &auth, KeyBlob &rnd) DecryptKeyEx() argument [all...] |
H A D | key_manager.cpp | 172 int KeyManager::GenerateAndInstallUserKey(uint32_t userId, const std::string &dir, const UserAuth &auth, KeyType type) in GenerateAndInstallUserKey() argument 184 return GenerateAndInstallEl5Key(userId, dir, auth); in GenerateAndInstallUserKey() 190 if (elKey->StoreKey(auth) == false) { in GenerateAndInstallUserKey() 214 int KeyManager::GenerateAndInstallEl5Key(uint32_t userId, const std::string &dir, const UserAuth &auth) in GenerateAndInstallEl5Key() argument 235 saveESecretStatus[userId] = (!auth.secret.IsEmpty() && !auth.token.IsEmpty()); in GenerateAndInstallEl5Key() 237 if ((!auth.secret.IsEmpty() && !auth.token.IsEmpty()) && in GenerateAndInstallEl5Key() 238 !elKey->EncryptClassE(auth, saveESecretStatus[userId], userId, USER_ADD_AUTH)) { in GenerateAndInstallEl5Key() 245 if (!elKey->DecryptClassE(auth, saveESecretStatu in GenerateAndInstallEl5Key() 253 RestoreUserKey(uint32_t userId, const std::string &dir, const UserAuth &auth, KeyType type) RestoreUserKey() argument 642 UserAuth auth = { .token = token, .secret = secret, .secureUid = secureUid }; GenerateUserKeyByType() local 871 UserAuth auth = { .token = tokenSecret.token, .secret = tokenSecret.newSecret, .secureUid = tokenSecret.secureUid }; UpdateESecret() local 902 UserAuth auth = { {}, userTokenSecret.oldSecret, userTokenSecret.secureUid }; UpdateCeEceSeceUserAuth() local 1220 UserAuth auth = { .token = token, .secret = secret }; UpdateCeEceSeceUserAuth() local 1245 UserAuth auth = { token, secret }; UpdateCeEceSeceUserAuth() local 1340 UserAuth auth = {.token = token, .secret = secret}; UpdateCeEceSeceUserAuth() local 1437 UserAuth auth = { token, secret }; UpdateCeEceSeceUserAuth() local 1897 UserAuth auth = { .token = token, .secret = secret, .secureUid = secureUid }; UpdateCeEceSeceUserAuth() local 1931 UserAuth auth = { .token=token, .secret=secret, .secureUid = secureUid }; UpdateCeEceSeceUserAuth() local [all...] |
H A D | fscrypt_key_v2.cpp | 181 bool FscryptKeyV2::DecryptClassE(const UserAuth &auth, bool &isSupport, in DecryptClassE() argument 184 (void)auth; in DecryptClassE() 193 bool FscryptKeyV2::EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) in EncryptClassE() argument 195 (void)auth; in EncryptClassE()
|
H A D | fscrypt_key_v1.cpp | 228 bool FscryptKeyV1::DecryptClassE(const UserAuth &auth, bool &isSupport, in DecryptClassE() argument 238 if ((auth.token.IsEmpty() && auth.secret.IsEmpty()) || eSecretFBE.IsEmpty()) { in DecryptClassE() 251 if (KeyBackup::GetInstance().TryRestoreUeceKey(shared_from_this(), auth, eSecretFBE, decryptedKey) != 0) { in DecryptClassE() 267 bool FscryptKeyV1::EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) in EncryptClassE() argument 282 if (!EncryptKeyBlob(auth, dir_ + PATH_LATEST, eSecretFBE, encryptedKey)) { in EncryptClassE()
|
/foundation/filemanagement/storage_service/services/storage_daemon/include/mock/ |
H A D | base_key_mock.h | 30 virtual bool StoreKey(const UserAuth &auth) = 0; 31 virtual bool StoreKey(const UserAuth &auth, bool needGenerateShield) = 0; 34 virtual bool RestoreKey(const UserAuth &auth) = 0; 50 MOCK_METHOD2(StoreKey, bool(const UserAuth &auth, bool needGenerateShield)); 51 MOCK_METHOD1(StoreKey, bool(const UserAuth &auth)); 54 MOCK_METHOD1(RestoreKey, bool(const UserAuth &auth));
|
H A D | fscrypt_key_v2_mock.h | 39 virtual bool DecryptClassE(const UserAuth &auth, bool &isSupport, 41 virtual bool EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) = 0; 58 MOCK_METHOD5(DecryptClassE, bool(const UserAuth &auth, bool &isSupport, 60 MOCK_METHOD4(EncryptClassE, bool(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status));
|
/foundation/communication/ipc/ipc/native/src/core/source/ |
H A D | ipc_process_skeleton.cpp | 1299 const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) in IsSameRemoteObject() 1301 if ((auth->GetStubObject() == stub) && (auth->GetRemotePid() == pid) && (auth->GetRemoteUid() == uid) && in IsSameRemoteObject() 1302 (auth->GetRemoteTokenId() == tokenId) && (auth->GetRemoteDeviceId().compare(deviceId) == 0)) { in IsSameRemoteObject() 1310 const std::shared_ptr<CommAuthInfo> &auth) in IsSameRemoteObject() 1312 if ((auth->GetRemotePid() == pid) && (auth->GetRemoteUid() == uid) && in IsSameRemoteObject() 1313 (auth in IsSameRemoteObject() 1298 IsSameRemoteObject(IRemoteObject *stub, int pid, int uid, uint32_t tokenId, const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) IsSameRemoteObject() argument 1309 IsSameRemoteObject(int pid, int uid, const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) IsSameRemoteObject() argument [all...] |
/foundation/communication/bluetooth/frameworks/inner/src/ |
H A D | bluetooth_socket.cpp | 84 impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth); 86 impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth, 362 ClientSocket::impl::impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth) in impl() argument 369 auth_(auth), in impl() 388 ClientSocket::impl::impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth, in impl() argument 397 auth_(auth), in impl() 403 ClientSocket::ClientSocket(const BluetoothRemoteDevice &bda, UUID uuid, BtSocketType type, bool auth) in ClientSocket() argument 404 : pimpl(new ClientSocket::impl(bda, uuid, type, auth)) in ClientSocket() 411 ClientSocket::ClientSocket(const BluetoothRemoteDevice &bda, UUID uuid, BtSocketType type, bool auth, in ClientSocket() argument 413 : pimpl(new ClientSocket::impl(bda, uuid, type, auth, observe in ClientSocket() [all...] |
/foundation/communication/bluetooth/interfaces/inner_api/include/ |
H A D | bluetooth_socket.h | 112 * @param auth Connection state. 115 ClientSocket(const BluetoothRemoteDevice &bda, UUID uuid, BtSocketType type, bool auth); 134 * @param auth Connection state. 138 ClientSocket(const BluetoothRemoteDevice &bda, UUID uuid, BtSocketType type, bool auth, 275 * @param encrypt Remote device auth and encrypt connection.
|