Home
last modified time | relevance | path

Searched refs:auth (Results 1 - 25 of 46) sorted by relevance

12

/foundation/communication/dsoftbus/core/authentication/src/
H A Dauth_manager.c64 AuthManager *auth = (AuthManager *)SoftBusCalloc(sizeof(AuthManager)); in NewAuthManager() local
65 if (auth == NULL) { in NewAuthManager()
69 auth->authId = authSeq; in NewAuthManager()
70 auth->isServer = info->isServer; in NewAuthManager()
71 auth->connId[info->connInfo.type] = info->connId; in NewAuthManager()
72 auth->connInfo[info->connInfo.type] = info->connInfo; in NewAuthManager()
73 if (strcpy_s(auth->udid, sizeof(auth->udid), info->udid) != EOK || in NewAuthManager()
74 strcpy_s(auth->uuid, sizeof(auth in NewAuthManager()
95 DupAuthManager(const AuthManager *auth) DupAuthManager() argument
112 DelDupAuthManager(AuthManager *auth) DelDupAuthManager() argument
119 DelAuthManager(AuthManager *auth, int32_t type) DelAuthManager() argument
253 SetAuthConnId(AuthManager *auth, const AuthManager *inAuth, AuthLinkType type) SetAuthConnId() argument
259 SetAuthP2pMac(AuthManager *auth, const AuthManager *inAuth, AuthLinkType type) SetAuthP2pMac() argument
276 AuthManager *auth = FindAuthManagerByAuthId(authId); UpdateAuthManagerByAuthId() local
296 AuthManager *auth = FindAuthManagerByAuthId(authId); RemoveAuthSessionKeyByIndex() local
322 AuthManager *auth = FindAuthManagerByAuthId(authHandle.authId); RemoveAuthManagerByAuthId() local
337 AuthManager *auth = FindAuthManagerByConnInfo(connInfo, isServer); RemoveAuthManagerByConnInfo() local
349 HasAuthPassed(AuthManager *auth) HasAuthPassed() argument
396 AuthManager *auth = FindAuthManagerByUuid(uuid, type, false); GetAuthConnInfoByUuid() local
420 AuthManager *auth = FindAuthManagerByUuid(uuid, type, false); GetAvailableAuthConnInfoByUuid() local
489 AuthManager *auth = FindAuthManagerByConnId(connId, isServer); GetAuthIdByConnId() local
511 const AuthManager *auth[2] = { NULL, NULL }; /* 2: client + server */ GetLatestIdByConnInfo() local
535 AuthManager *auth = FindAuthManagerByConnInfo(connInfo, isServer); GetAuthIdByConnInfo() local
554 AuthManager *auth[2] = { NULL, NULL }; /* 2: client + server */ GetActiveAuthIdByConnInfo() local
621 AuthManager *auth = FindNormalizedKeyAuthManagerByUdid(info->udid, info->isServer); GetExistAuthManager() local
646 AuthManager *auth = FindAuthManagerByConnInfo(&info->connInfo, info->isServer); GetDeviceAuthManager() local
685 AuthManager *auth = FindAuthManagerByUdid(info->udid, AUTH_LINK_TYPE_BLE, isServer); ProcessEmptySessionKey() local
713 AuthManager *auth = FindAuthManagerByUdid(info->udid, info->connInfo.type, info->isServer); AuthProcessEmptySessionKey() local
755 AuthManager *auth = GetDeviceAuthManager(authSeq, info, &isNewCreated, sessionKeyIndex); AuthManagerSetSessionKey() local
796 AuthManager *auth = FindAuthManagerByConnInfo(&info->connInfo, info->isServer); AuthManagerGetSessionKey() local
898 AuthManager *auth = FindAuthManagerByConnInfo(&info->connInfo, info->isServer); AuthNotifyAuthPassed() local
944 AuthManager *auth = FindAuthManagerByConnInfo(&info->connInfo, info->isServer); AuthManagerSetAuthPassed() local
991 AuthManager *auth = NULL; AuthManagerSetAuthFailed() local
1232 AuthManager *auth = FindAuthManagerByConnInfo(connInfo, isServer); FlushDeviceProcess() local
1254 AuthManager *auth[AUTH_COUNT] = { NULL, NULL }; /* 2: WiFi * (Client + Server) */ AuthSetTcpKeepaliveByConnInfo() local
1349 AuthManager *auth = FindAuthManagerByConnInfo(connInfo, !fromServer); HandleConnectionData() local
1399 const AuthManager *auth[2] = { NULL, NULL }; /* 2: client + server */ HandleDecryptFailData() local
1558 AuthManager *auth = FindAuthManagerByAuthId(authHandle.authId); AuthHandleLeaveLNN() local
1594 AuthManager *auth[2] = { NULL, NULL }; /* 2: WiFi * (Client + Server) */ PostDeviceMessageByUuid() local
1939 AuthManager *auth[2] = { NULL, NULL }; /* 2: max size for (CLIENT+ SERVER) */ AuthDeviceGetLatestIdByUuid() local
1990 AuthManager *auth = FindAuthManagerByUuid(uuid, type, isServer); AuthDeviceGetIdByUuid() local
2015 AuthManager *auth = FindNormalizedKeyAuthManagerByUdid(udid, isServer); AuthDeviceGetAuthHandleByIndex() local
2036 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthGetEncryptSize() local
[all...]
H A Dauth_device.c184 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); in AuthDevicePostTransData() local
185 if (auth == NULL) { in AuthDevicePostTransData()
196 if (EncryptInner(&auth->sessionKeyList, (AuthLinkType)authHandle.type, &inDataInfo, &encData, in AuthDevicePostTransData()
199 DelDupAuthManager(auth); in AuthDevicePostTransData()
202 if (PostAuthData(auth->connId[authHandle.type], !auth->isServer, &head, encData) != SOFTBUS_OK) { in AuthDevicePostTransData()
205 DelDupAuthManager(auth); in AuthDevicePostTransData()
209 DelDupAuthManager(auth); in AuthDevicePostTransData()
221 AuthManager *auth = GetAuthManagerByAuthId(authHandle->authId); in AuthDeviceEncrypt() local
222 if (auth in AuthDeviceEncrypt()
244 AuthManager *auth = GetAuthManagerByAuthId(authHandle->authId); AuthDeviceDecrypt() local
269 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); AuthDeviceGetConnInfo() local
284 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthDeviceGetServerSide() local
299 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthDeviceGetDeviceUuid() local
318 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthDeviceGetVersion() local
353 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); AuthNotifyDeviceVerifyPassed() local
517 AuthManager *auth = GetDeviceAuthManager(authSeq, info, &isNewCreated, authSeq); AuthDirectOnlineCreateAuthManager() local
615 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); AuthStartReconnectDevice() local
647 AuthManager *auth = GetAuthManagerByAuthId(authHandle->authId); AuthCheckSessionKey() local
708 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); AuthDeviceCloseConn() local
[all...]
H A Dauth_interface.c197 AUTH_LOGE(AUTH_CONN, "client and server auth not found, type=%{public}d", type); in AuthCheckSessionKeyValidByConnInfo()
227 AuthManager *auth = GetAuthManagerByAuthId(authHandle->authId); in AuthCheckSessionKeyValidByAuthHandle() local
228 if (auth == NULL) { in AuthCheckSessionKeyValidByAuthHandle()
229 AUTH_LOGE(AUTH_CONN, "not found auth manager, type=%{public}d, authId=%{public}" PRId64, in AuthCheckSessionKeyValidByAuthHandle()
234 if (!CheckSessionKeyListExistType(&auth->sessionKeyList, (AuthLinkType)authHandle->type)) { in AuthCheckSessionKeyValidByAuthHandle()
239 DelDupAuthManager(auth); in AuthCheckSessionKeyValidByAuthHandle()
262 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); in AuthPostTransData() local
263 if (auth != NULL) { in AuthPostTransData()
264 DelDupAuthManager(auth); in AuthPostTransData()
276 AuthManager *auth in AuthCloseConn() local
456 AuthManager *auth = GetAuthManagerByConnInfo(&info->connInfo, info->isServer); AuthDirectOnlineProcessSessionKey() local
474 AuthManager *auth = GetAuthManagerByConnInfo(&info->connInfo, info->isServer); AuthDirectOnlineWithoutSessionKey() local
533 AuthManager *auth = GetAuthManagerByAuthId(authHandle->authId); AuthEncrypt() local
548 AuthManager *auth = GetAuthManagerByAuthId(authHandle->authId); AuthDecrypt() local
558 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthSetP2pMac() local
572 AuthManager *auth = GetAuthManagerByAuthId(authHandle.authId); AuthGetConnInfo() local
582 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthGetDeviceUuid() local
597 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthGetServerSide() local
611 AuthManager *auth = GetAuthManagerByAuthId(authId); AuthGetMetaType() local
[all...]
H A Dauth_session_message.c489 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 ", udid is null update local auth state=%{public}d", in UpdateLocalAuthState()
495 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 " local auth state=%{public}d", authSeq, info->localState); in UpdateLocalAuthState()
500 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 " local auth state=%{public}d", authSeq, info->localState); in UpdateLocalAuthState()
530 AUTH_LOGI(AUTH_FSM, "authSeq=%{public}" PRId64 " local auth state=%{public}d", authSeq, info->localState); in UpdateLocalAuthState()
535 const AuthManager *auth, int32_t flagRelay, AuthLinkType type, const DeviceMessageParse *messageParse) in PostDeviceMessage()
537 AUTH_CHECK_AND_RETURN_RET_LOGE(auth != NULL, SOFTBUS_INVALID_PARAM, AUTH_FSM, "auth is NULL"); in PostDeviceMessage()
548 msg = PackVerifyDeviceMessage(auth->uuid); in PostDeviceMessage()
550 msg = PackKeepaliveMessage(auth->uuid, messageParse->cycle); in PostDeviceMessage()
560 if (EncryptInner(&auth in PostDeviceMessage()
534 PostDeviceMessage( const AuthManager *auth, int32_t flagRelay, AuthLinkType type, const DeviceMessageParse *messageParse) PostDeviceMessage() argument
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/
H A Dbase_key.h44 bool StoreKey(const UserAuth &auth, bool needGenerateShield = true);
46 bool StoreKey(const UserAuth &auth);
49 bool RestoreKey(const UserAuth &auth);
58 virtual bool DecryptClassE(const UserAuth &auth, bool &isSupport, bool &eBufferStatue, uint32_t user,
60 virtual bool EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) = 0;
63 bool DoRestoreKeyEx(const UserAuth &auth, const std::string &keypath);
64 bool EncryptKeyBlob(const UserAuth &auth, const std::string &keyPath, KeyBlob &planKey, KeyBlob &encryptedKey);
65 bool DecryptKeyBlob(const UserAuth &auth, const std::string &keyPath, KeyBlob &planKey, KeyBlob &decryptedKey);
93 bool DoStoreKey(const UserAuth &auth, bool needGenerateShield = true);
95 bool DoStoreKey(const UserAuth &auth);
[all...]
H A Dhuks_master.h39 bool GenerateKey(const UserAuth &auth, KeyBlob &keyOut);
40 bool EncryptKey(KeyContext &ctx, const UserAuth &auth, const KeyInfo &key, bool isNeedNewNonce);
41 bool EncryptKeyEx(const UserAuth &auth, const KeyBlob &rnd, KeyContext &ctx);
42 bool DecryptKey(KeyContext &ctx, const UserAuth &auth, KeyInfo &key, bool isNeedNewNonce);
43 bool DecryptKeyEx(KeyContext &ctx, const UserAuth &auth, KeyBlob &rnd);
H A Dfscrypt_key_v2.h40 bool DecryptClassE(const UserAuth &auth, bool &isSupport, bool &eBufferStatue, uint32_t user = 0,
42 bool EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user = 0, uint32_t status = 0);
H A Dfscrypt_key_v1.h45 bool DecryptClassE(const UserAuth &auth, bool &isSupport, bool &eBufferStatue, uint32_t user = 0,
47 bool EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user = 0, uint32_t status = 0);
H A Dkey_backup.h46 int32_t TryRestoreKey(const std::shared_ptr<BaseKey> &baseKey, const UserAuth &auth);
48 const UserAuth &auth,
90 int32_t DoResotreKeyMix(std::shared_ptr<BaseKey> &baseKey, const UserAuth &auth, const std::string &keyDir,
/foundation/communication/dsoftbus/tests/core/authentication/unittest/
H A Dauth_lane_test.cpp138 * @tc.desc: add auth request node test
185 * @tc.desc: auth get request option test test
209 * @tc.desc: get auth link type list test
233 * @tc.desc: auth alloc lane test
263 * @tc.desc: auth alloc lane wlan test
284 AuthManager *auth = FindAuthManagerByConnInfo(&connInfo, false); in HWTEST_F() local
285 EXPECT_TRUE(auth != nullptr); in HWTEST_F()
286 auth->hasAuthPassed[AUTH_LINK_TYPE_WIFI] = true; in HWTEST_F()
287 auth->authId = 1; in HWTEST_F()
288 auth in HWTEST_F()
330 AuthManager *auth = FindAuthManagerByConnInfo(&connInfo, false); HWTEST_F() local
374 AuthManager *auth = FindAuthManagerByConnInfo(&connInfo, false); HWTEST_F() local
414 AuthManager *auth = FindAuthManagerByConnInfo(&connInfo, false); HWTEST_F() local
460 AuthManager *auth = FindAuthManagerByConnInfo(&connInfo, false); HWTEST_F() local
507 AuthManager *auth = FindAuthManagerByConnInfo(&connInfo, false); HWTEST_F() local
550 AuthManager *auth = FindAuthManagerByConnInfo(&connInfo, false); HWTEST_F() local
[all...]
H A Dauth_manager_test.cpp130 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); in HWTEST_F() local
131 EXPECT_TRUE(auth != nullptr); in HWTEST_F()
160 EXPECT_EQ(AddSessionKey(&auth->sessionKeyList, AUTH_SEQ, &sessionKey, AUTH_LINK_TYPE_WIFI, false), SOFTBUS_OK); in HWTEST_F()
161 EXPECT_EQ(SetSessionKeyAvailable(&auth->sessionKeyList, AUTH_SEQ), SOFTBUS_OK); in HWTEST_F()
195 AuthManager *auth = FindAuthManagerByConnId(CONN_ID, true); in HWTEST_F() local
196 EXPECT_TRUE(auth == nullptr); in HWTEST_F()
198 MyUpdateFuncReturnError, auth, AUTH_LINK_TYPE_WIFI) == SOFTBUS_AUTH_NOT_FOUND); in HWTEST_F()
199 EXPECT_TRUE(UpdateAuthManagerByAuthId(AUTH_SEQ, MyUpdateFuncReturnError, auth, in HWTEST_F()
201 EXPECT_TRUE(UpdateAuthManagerByAuthId(AUTH_SEQ, MyUpdateFuncReturnOk, auth, AUTH_LINK_TYPE_WIFI) == SOFTBUS_OK); in HWTEST_F()
232 AuthManager *auth in HWTEST_F() local
265 AuthManager *auth = GetDeviceAuthManager(AUTH_SEQ_4, &info, &isNewCreated, AUTH_SEQ_4); HWTEST_F() local
293 AuthManager *auth = GetDeviceAuthManager(AUTH_SEQ_5, &info, &isNewCreated, AUTH_SEQ_5); HWTEST_F() local
335 AuthManager *auth = GetDeviceAuthManager(AUTH_SEQ_1, &info, &isNewCreated, AUTH_SEQ_1); HWTEST_F() local
597 AuthManager *auth = NewAuthManager(authHandle.authId, &info); HWTEST_F() local
740 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); HWTEST_F() local
768 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); HWTEST_F() local
930 AuthManager *auth = NewAuthManager(AUTH_SEQ, &info); HWTEST_F() local
954 AuthManager *auth = NewAuthManager(authSeq, &info); HWTEST_F() local
[all...]
H A Dauth_test.cpp108 * @tc.desc: auth commone test
142 * @tc.desc: hichain start auth test
181 * @tc.desc: add auth request test
195 * @tc.desc: get auth request test
210 * @tc.desc: auth session process devId data test
226 * @tc.desc: auth session post auth data test
242 * @tc.desc: auth session process auth data test
258 * @tc.desc: auth sessio
577 AuthManager auth = { 0 }; HWTEST_F() local
596 const AuthManager *auth = nullptr; HWTEST_F() local
929 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1090 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1180 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1216 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1249 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1276 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1299 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1343 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
1370 AuthManager *auth = NewAuthManager(authId, &info); HWTEST_F() local
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/mock/
H A Dbase_key_mock.cpp38 bool BaseKey::StoreKey(const UserAuth &auth, bool needGenerateShield) in StoreKey() argument
43 return IBaseKeyMoc::baseKeyMoc->StoreKey(auth, needGenerateShield); in StoreKey()
46 bool BaseKey::StoreKey(const UserAuth &auth) in StoreKey() argument
51 return IBaseKeyMoc::baseKeyMoc->StoreKey(auth); in StoreKey()
71 bool BaseKey::RestoreKey(const UserAuth &auth) in RestoreKey() argument
76 return IBaseKeyMoc::baseKeyMoc->RestoreKey(auth); in RestoreKey()
87 bool BaseKey::DecryptKeyBlob(const UserAuth &auth, const std::string &keyPath, KeyBlob &planKey, in DecryptKeyBlob() argument
93 return IBaseKeyMoc::baseKeyMoc->DecryptKeyBlob(auth, keyPath, planKey, decryptedKey); in DecryptKeyBlob()
96 bool BaseKey::EncryptKeyBlob(const UserAuth &auth, const std::string &keyPath, KeyBlob &planKey, in EncryptKeyBlob() argument
102 return IBaseKeyMoc::baseKeyMoc->EncryptKeyBlob(auth, keyPat in EncryptKeyBlob()
[all...]
H A Dfscrypt_key_v2_mock.cpp101 bool FscryptKeyV2::DecryptClassE(const UserAuth &auth, bool &isSupport, in DecryptClassE() argument
107 return IFscryptKeyV2Moc::fscryptKeyV2Moc->DecryptClassE(auth, isSupport, eBufferStatue, user, status); in DecryptClassE()
110 bool FscryptKeyV2::EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) in EncryptClassE() argument
115 return IFscryptKeyV2Moc::fscryptKeyV2Moc->EncryptClassE(auth, isSupport, user, status); in EncryptClassE()
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/crypto_test/
H A Dcrypto_test.cpp103 const UserAuth auth; in HWTEST_F() local
108 bool ret = HuksMaster::GetInstance().EncryptKey(ctx, auth, key, isNeedNewNonce); in HWTEST_F()
111 ret = HuksMaster::GetInstance().EncryptKeyEx(auth, rnd, ctx); in HWTEST_F()
127 const UserAuth auth; in HWTEST_F() local
132 bool ret = HuksMaster::GetInstance().EncryptKey(ctx, auth, key, isNeedNewNonce); in HWTEST_F()
135 ret = HuksMaster::GetInstance().EncryptKeyEx(auth, rnd, ctx); in HWTEST_F()
150 const UserAuth auth; in HWTEST_F() local
155 bool ret = HuksMaster::GetInstance().DecryptKey(ctx, auth, key, isNeedNewNonce); in HWTEST_F()
158 ret = HuksMaster::GetInstance().DecryptKeyEx(ctx, auth, rnd); in HWTEST_F()
174 const UserAuth auth; in HWTEST_F() local
198 const UserAuth auth; HWTEST_F() local
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/
H A Dbase_key.cpp195 bool BaseKey::StoreKey(const UserAuth &auth, bool needGenerateShield) in StoreKey() argument
197 bool BaseKey::StoreKey(const UserAuth &auth) in StoreKey()
203 if (DoStoreKey(auth, needGenerateShield)) { in StoreKey()
205 if (DoStoreKey(auth)) { in StoreKey()
229 bool BaseKey::DoStoreKey(const UserAuth &auth, bool needGenerateShield) in StoreKey() argument
231 bool BaseKey::DoStoreKey(const UserAuth &auth) in StoreKey()
244 return EncryptDe(auth, pathTemp); in StoreKey()
246 if ((auth.token.IsEmpty() && auth.secret.IsEmpty()) || // OOBE首次开机 删除密码(ABC) in StoreKey()
247 !auth in StoreKey()
287 InitKeyContext(const UserAuth &auth, const std::string &keyPath, KeyContext &keyCtx) StoreKey() argument
331 LoadAndSaveShield(const UserAuth &auth, const std::string &pathShield, bool needGenerateShield, KeyContext &keyCtx) StoreKey() argument
421 EncryptDe(const UserAuth &auth, const std::string &path) StoreKey() argument
450 EncryptEceSece(const UserAuth &auth, const uint32_t keyType, KeyContext &keyCtx) StoreKey() argument
482 RestoreKey(const UserAuth &auth) StoreKey() argument
521 DoRestoreKeyEx(const UserAuth &auth, const std::string &keyPath) StoreKey() argument
565 DoRestoreKeyOld(const UserAuth &auth, const std::string &path) StoreKey() argument
598 DoRestoreKeyDe(const UserAuth &auth, const std::string &path) StoreKey() argument
625 DoRestoreKeyCeEceSece(const UserAuth &auth, const std::string &path, const uint32_t keyType) StoreKey() argument
673 DoRestoreKey(const UserAuth &auth, const std::string &path) StoreKey() argument
701 DoUpdateRestore(const UserAuth &auth, const std::string &keyPath) StoreKey() argument
729 DecryptReal(const UserAuth &auth, const uint32_t keyType, KeyContext &keyCtx) StoreKey() argument
757 Decrypt(const UserAuth &auth) StoreKey() argument
919 EncryptKeyBlob(const UserAuth &auth, const std::string &keyPath, KeyBlob &planKey, KeyBlob &encryptedKey) StoreKey() argument
952 DecryptKeyBlob(const UserAuth &auth, const std::string &keyPath, KeyBlob &planKey, KeyBlob &decryptedKey) StoreKey() argument
[all...]
H A Dhuks_master.cpp330 static int AppendSecureAccessParams(const UserAuth &auth, HksParamSet *paramSet) in AppendSecureAccessParams() argument
332 if (auth.secret.IsEmpty() || auth.token.IsEmpty()) { in AppendSecureAccessParams()
333 LOGI("auth is empty, not to enable secure access for the key"); in AppendSecureAccessParams()
344 { .tag = HKS_TAG_USER_AUTH_SECURE_UID, .blob = { sizeof(auth.secureUid), (uint8_t *)&auth.secureUid } }, in AppendSecureAccessParams()
365 bool HuksMaster::GenerateKey(const UserAuth &auth, KeyBlob &keyOut) in GenerateKey() argument
382 ret = AppendSecureAccessParams(auth, paramSet); in GenerateKey()
466 static int AppendNonceAadTokenEx(KeyContext &ctx, const UserAuth &auth, HksParamSet *paramSet, bool isEncrypt) in AppendNonceAadTokenEx() argument
468 if (auth in AppendNonceAadTokenEx()
485 AppendNewNonceAadToken(KeyContext &ctx, const UserAuth &auth, HksParamSet *paramSet, const bool isEncrypt) AppendNewNonceAadToken() argument
506 AppendNonceAadToken(KeyContext &ctx, const UserAuth &auth, HksParamSet *paramSet) AppendNonceAadToken() argument
535 GenHuksOptionParamEx(KeyContext &ctx, const UserAuth &auth, const bool isEncrypt) GenHuksOptionParamEx() argument
586 GenHuksOptionParam(KeyContext &ctx, const UserAuth &auth, const bool isEncrypt, const bool isNeedNewNonce) GenHuksOptionParam() argument
674 EncryptKeyEx(const UserAuth &auth, const KeyBlob &rnd, KeyContext &ctx) EncryptKeyEx() argument
708 EncryptKey(KeyContext &ctx, const UserAuth &auth, const KeyInfo &key, bool isNeedNewNonce) EncryptKey() argument
741 DecryptKey(KeyContext &ctx, const UserAuth &auth, KeyInfo &key, bool isNeedNewNonce) DecryptKey() argument
775 DecryptKeyEx(KeyContext &ctx, const UserAuth &auth, KeyBlob &rnd) DecryptKeyEx() argument
[all...]
H A Dkey_manager.cpp172 int KeyManager::GenerateAndInstallUserKey(uint32_t userId, const std::string &dir, const UserAuth &auth, KeyType type) in GenerateAndInstallUserKey() argument
184 return GenerateAndInstallEl5Key(userId, dir, auth); in GenerateAndInstallUserKey()
190 if (elKey->StoreKey(auth) == false) { in GenerateAndInstallUserKey()
214 int KeyManager::GenerateAndInstallEl5Key(uint32_t userId, const std::string &dir, const UserAuth &auth) in GenerateAndInstallEl5Key() argument
235 saveESecretStatus[userId] = (!auth.secret.IsEmpty() && !auth.token.IsEmpty()); in GenerateAndInstallEl5Key()
237 if ((!auth.secret.IsEmpty() && !auth.token.IsEmpty()) && in GenerateAndInstallEl5Key()
238 !elKey->EncryptClassE(auth, saveESecretStatus[userId], userId, USER_ADD_AUTH)) { in GenerateAndInstallEl5Key()
245 if (!elKey->DecryptClassE(auth, saveESecretStatu in GenerateAndInstallEl5Key()
253 RestoreUserKey(uint32_t userId, const std::string &dir, const UserAuth &auth, KeyType type) RestoreUserKey() argument
642 UserAuth auth = { .token = token, .secret = secret, .secureUid = secureUid }; GenerateUserKeyByType() local
871 UserAuth auth = { .token = tokenSecret.token, .secret = tokenSecret.newSecret, .secureUid = tokenSecret.secureUid }; UpdateESecret() local
902 UserAuth auth = { {}, userTokenSecret.oldSecret, userTokenSecret.secureUid }; UpdateCeEceSeceUserAuth() local
1220 UserAuth auth = { .token = token, .secret = secret }; UpdateCeEceSeceUserAuth() local
1245 UserAuth auth = { token, secret }; UpdateCeEceSeceUserAuth() local
1340 UserAuth auth = {.token = token, .secret = secret}; UpdateCeEceSeceUserAuth() local
1437 UserAuth auth = { token, secret }; UpdateCeEceSeceUserAuth() local
1897 UserAuth auth = { .token = token, .secret = secret, .secureUid = secureUid }; UpdateCeEceSeceUserAuth() local
1931 UserAuth auth = { .token=token, .secret=secret, .secureUid = secureUid }; UpdateCeEceSeceUserAuth() local
[all...]
H A Dfscrypt_key_v2.cpp181 bool FscryptKeyV2::DecryptClassE(const UserAuth &auth, bool &isSupport, in DecryptClassE() argument
184 (void)auth; in DecryptClassE()
193 bool FscryptKeyV2::EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) in EncryptClassE() argument
195 (void)auth; in EncryptClassE()
H A Dfscrypt_key_v1.cpp228 bool FscryptKeyV1::DecryptClassE(const UserAuth &auth, bool &isSupport, in DecryptClassE() argument
238 if ((auth.token.IsEmpty() && auth.secret.IsEmpty()) || eSecretFBE.IsEmpty()) { in DecryptClassE()
251 if (KeyBackup::GetInstance().TryRestoreUeceKey(shared_from_this(), auth, eSecretFBE, decryptedKey) != 0) { in DecryptClassE()
267 bool FscryptKeyV1::EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) in EncryptClassE() argument
282 if (!EncryptKeyBlob(auth, dir_ + PATH_LATEST, eSecretFBE, encryptedKey)) { in EncryptClassE()
/foundation/filemanagement/storage_service/services/storage_daemon/include/mock/
H A Dbase_key_mock.h30 virtual bool StoreKey(const UserAuth &auth) = 0;
31 virtual bool StoreKey(const UserAuth &auth, bool needGenerateShield) = 0;
34 virtual bool RestoreKey(const UserAuth &auth) = 0;
50 MOCK_METHOD2(StoreKey, bool(const UserAuth &auth, bool needGenerateShield));
51 MOCK_METHOD1(StoreKey, bool(const UserAuth &auth));
54 MOCK_METHOD1(RestoreKey, bool(const UserAuth &auth));
H A Dfscrypt_key_v2_mock.h39 virtual bool DecryptClassE(const UserAuth &auth, bool &isSupport,
41 virtual bool EncryptClassE(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status) = 0;
58 MOCK_METHOD5(DecryptClassE, bool(const UserAuth &auth, bool &isSupport,
60 MOCK_METHOD4(EncryptClassE, bool(const UserAuth &auth, bool &isSupport, uint32_t user, uint32_t status));
/foundation/communication/ipc/ipc/native/src/core/source/
H A Dipc_process_skeleton.cpp1299 const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) in IsSameRemoteObject()
1301 if ((auth->GetStubObject() == stub) && (auth->GetRemotePid() == pid) && (auth->GetRemoteUid() == uid) && in IsSameRemoteObject()
1302 (auth->GetRemoteTokenId() == tokenId) && (auth->GetRemoteDeviceId().compare(deviceId) == 0)) { in IsSameRemoteObject()
1310 const std::shared_ptr<CommAuthInfo> &auth) in IsSameRemoteObject()
1312 if ((auth->GetRemotePid() == pid) && (auth->GetRemoteUid() == uid) && in IsSameRemoteObject()
1313 (auth in IsSameRemoteObject()
1298 IsSameRemoteObject(IRemoteObject *stub, int pid, int uid, uint32_t tokenId, const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) IsSameRemoteObject() argument
1309 IsSameRemoteObject(int pid, int uid, const std::string &deviceId, const std::shared_ptr<CommAuthInfo> &auth) IsSameRemoteObject() argument
[all...]
/foundation/communication/bluetooth/frameworks/inner/src/
H A Dbluetooth_socket.cpp84 impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth);
86 impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth,
362 ClientSocket::impl::impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth) in impl() argument
369 auth_(auth), in impl()
388 ClientSocket::impl::impl(const BluetoothRemoteDevice &addr, UUID uuid, BtSocketType type, bool auth, in impl() argument
397 auth_(auth), in impl()
403 ClientSocket::ClientSocket(const BluetoothRemoteDevice &bda, UUID uuid, BtSocketType type, bool auth) in ClientSocket() argument
404 : pimpl(new ClientSocket::impl(bda, uuid, type, auth)) in ClientSocket()
411 ClientSocket::ClientSocket(const BluetoothRemoteDevice &bda, UUID uuid, BtSocketType type, bool auth, in ClientSocket() argument
413 : pimpl(new ClientSocket::impl(bda, uuid, type, auth, observe in ClientSocket()
[all...]
/foundation/communication/bluetooth/interfaces/inner_api/include/
H A Dbluetooth_socket.h112 * @param auth Connection state.
115 ClientSocket(const BluetoothRemoteDevice &bda, UUID uuid, BtSocketType type, bool auth);
134 * @param auth Connection state.
138 ClientSocket(const BluetoothRemoteDevice &bda, UUID uuid, BtSocketType type, bool auth,
275 * @param encrypt Remote device auth and encrypt connection.

Completed in 20 milliseconds

12