/foundation/communication/dsoftbus/tests/core/authentication/unittest/ |
H A D | auth_normalize_request_test.cpp | 56 int64_t authSeq = -1; in HWTEST_F() local 62 request.authSeq = 1; in HWTEST_F() 66 request.authSeq = 2; in HWTEST_F() 69 DelAuthNormalizeRequest(request.authSeq); in HWTEST_F() 70 request.authSeq = 3; in HWTEST_F() 73 bool result = AuthIsRepeatedAuthRequest(request.authSeq); in HWTEST_F() 75 NotifyNormalizeRequestSuccess(authSeq, false); in HWTEST_F() 76 authSeq = 1; in HWTEST_F() 77 NotifyNormalizeRequestSuccess(authSeq, false); in HWTEST_F() 89 int64_t authSeq in HWTEST_F() local [all...] |
H A D | auth_test.cpp | 148 int64_t authSeq = 0; in HWTEST_F() local 153 ret = HichainStartAuth(authSeq, nullptr, uid); in HWTEST_F() 155 ret = HichainStartAuth(authSeq, udid, nullptr); in HWTEST_F() 157 (void)HichainStartAuth(authSeq, udid, uid); in HWTEST_F() 168 int64_t authSeq = 0; in HWTEST_F() local 173 ret = HichainProcessData(authSeq, nullptr, len); in HWTEST_F() 175 ret = HichainProcessData(authSeq, data, len); in HWTEST_F() 216 int64_t authSeq = 0; in HWTEST_F() local 220 ret = AuthSessionProcessDevIdData(authSeq, nullptr, len); in HWTEST_F() 232 int64_t authSeq in HWTEST_F() local 248 int64_t authSeq = 0; HWTEST_F() local 264 int64_t authSeq = 0; HWTEST_F() local 284 int64_t authSeq = 0; HWTEST_F() local 300 int64_t authSeq = 0; HWTEST_F() local 316 int64_t authSeq = 0; HWTEST_F() local 398 int64_t authSeq = 0; HWTEST_F() local 440 int64_t authSeq = 0; HWTEST_F() local 480 int64_t authSeq = 0; HWTEST_F() local 499 int64_t authSeq = 0; HWTEST_F() local 518 int64_t authSeq = 0; HWTEST_F() local 541 int64_t authSeq = 0; HWTEST_F() local 560 int64_t authSeq = 0; HWTEST_F() local 762 int64_t authSeq = 0; HWTEST_F() local 779 int64_t authSeq = 0; HWTEST_F() local 1723 int64_t authSeq = 0; HWTEST_F() local 1738 int64_t authSeq = 0; HWTEST_F() local 1753 int64_t authSeq = 0; HWTEST_F() local [all...] |
H A D | auth_hichain_test.cpp | 123 int64_t authSeq = 0; in HWTEST_F() local 125 OnSessionKeyReturned(authSeq, nullptr, SESSION_KEY_LENGTH + 1); in HWTEST_F() 126 OnSessionKeyReturned(authSeq, nullptr, SESSION_KEY_LENGTH); in HWTEST_F() 127 OnSessionKeyReturned(authSeq, sessionKey, SESSION_KEY_LENGTH + 1); in HWTEST_F() 142 int64_t authSeq = 0; in HWTEST_F() local 146 char *msgStr = OnRequest(authSeq, operationCode, reqParams); in HWTEST_F() 157 DfxRecordLnnExchangekeyEnd(authSeq, SOFTBUS_OK); in HWTEST_F() 158 DfxRecordLnnEndHichainEnd(authSeq, SOFTBUS_OK); in HWTEST_F()
|
H A D | auth_test_enhance.cpp | 129 int64_t authSeq = 5678; in HWTEST_F() local 135 int32_t ret = HichainStartAuth(authSeq, udid, uid); in HWTEST_F() 317 int64_t authSeq = 1; in HWTEST_F() local 329 EXPECT_EQ(AuthDirectOnlineCreateAuthManager(authSeq, &info), SOFTBUS_OK); in HWTEST_F() 342 EXPECT_EQ(AuthManagerSetSessionKey(authSeq, &info, &sessionKey, true, false), SOFTBUS_OK); in HWTEST_F() 355 int64_t authSeq = 1; in HWTEST_F() local 367 EXPECT_EQ(AuthDirectOnlineCreateAuthManager(authSeq, &info), SOFTBUS_OK); in HWTEST_F() 368 AuthHandle authHandle = { .authId = authSeq, .type = connInfo.type }; in HWTEST_F() 372 EXPECT_EQ(AuthManagerSetSessionKey(authSeq, &info, &sessionKey, true, false), SOFTBUS_OK); in HWTEST_F()
|
H A D | auth_other_test.cpp | 208 int64_t authSeq = 0; in HWTEST_F() local 225 AuthManager *auth = NewAuthManager(authSeq, &info); in HWTEST_F() 235 AuthHandle authHandle = { .authId = authSeq, .type = AUTH_LINK_TYPE_WIFI }; in HWTEST_F() 278 int64_t authSeq = 0; in HWTEST_F() local 285 AuthManager *auth = NewAuthManager(authSeq, &info); in HWTEST_F() 287 AuthManagerSetAuthPassed(authSeq, nullptr); in HWTEST_F() 289 AuthManagerSetAuthPassed(authSeq, &info); in HWTEST_F() 291 AuthManagerSetAuthFailed(authSeq, &info, reason); in HWTEST_F() 478 int64_t authSeq = 0; in HWTEST_F() local 481 int32_t ret = PostCloseAckMessage(authSeq, nullpt in HWTEST_F() 620 int64_t authSeq = 0; HWTEST_F() local 767 int64_t authSeq = 0; HWTEST_F() local [all...] |
H A D | auth_manager_test.cpp | 647 int64_t authSeq[DISCOVERY_TYPE_COUNT] = { 0 }; in HWTEST_F() local 648 EXPECT_TRUE(AuthGetLatestAuthSeqList(nullptr, authSeq, in HWTEST_F() 650 EXPECT_EQ(AuthGetLatestAuthSeqList("", authSeq, DISCOVERY_TYPE_COUNT), SOFTBUS_INVALID_PARAM); in HWTEST_F() 651 EXPECT_EQ(AuthGetLatestAuthSeqList(UDID_TEST, authSeq, DISCOVERY_TYPE_COUNT), SOFTBUS_OK); in HWTEST_F() 652 EXPECT_EQ(AuthGetLatestAuthSeqList(INVALID_UDID_TEST, authSeq, in HWTEST_F() 747 int64_t authSeq[DISCOVERY_TYPE_COUNT] = { 0 }; in HWTEST_F() local 749 int32_t ret = AuthGetLatestAuthSeqListByType(nullptr, authSeq, authVerifyTime, DISCOVERY_TYPE_BLE); in HWTEST_F() 751 int32_t ret1 = AuthGetLatestAuthSeqListByType("", authSeq, authVerifyTime, DISCOVERY_TYPE_BLE); in HWTEST_F() 753 int32_t ret2 = AuthGetLatestAuthSeqListByType(UDID_TEST, authSeq, authVerifyTime, DISCOVERY_TYPE_BLE); in HWTEST_F() 950 int64_t authSeq in HWTEST_F() local [all...] |
/foundation/communication/dsoftbus/core/authentication/src/ |
H A D | auth_normalize_request.c | 82 static int32_t FindAndDelNormalizeRequest(int64_t authSeq, NormalizeRequest *request) in FindAndDelNormalizeRequest() argument 89 if (item->authSeq == authSeq) { in FindAndDelNormalizeRequest() 99 static int32_t GetNormalizeRequestList(int64_t authSeq, bool isNeedClear, NormalizeRequest *request, in GetNormalizeRequestList() argument 109 if (FindAndDelNormalizeRequest(authSeq, request) != SOFTBUS_OK) { in GetNormalizeRequestList() 119 void DelAuthNormalizeRequest(int64_t authSeq) in DelAuthNormalizeRequest() argument 127 if (item->authSeq == authSeq) { in DelAuthNormalizeRequest() 130 AUTH_LOGI(AUTH_HICHAIN, "del normalize request authSeq=%{public}" PRId64, authSeq); in DelAuthNormalizeRequest() 137 AuthIsRepeatedAuthRequest(int64_t authSeq) AuthIsRepeatedAuthRequest() argument 174 NotifyNormalizeRequestSuccess(int64_t authSeq, bool isSupportNego) NotifyNormalizeRequestSuccess() argument 199 NotifyNormalizeRequestFail(int64_t authSeq, int32_t ret) NotifyNormalizeRequestFail() argument [all...] |
H A D | auth_session_fsm.c | 155 AUTH_LOGE(AUTH_FSM, "auth fsm has dead. authSeq=%{public}" PRId64 "", authFsm->authSeq); in TranslateToAuthFsm() 252 static AuthFsm *CreateAuthFsm(int64_t authSeq, uint32_t requestId, uint64_t connId, in CreateAuthFsm() argument 261 authFsm->authSeq = authSeq; in CreateAuthFsm() 294 "create auth fsm. authSeq=%{public}" PRId64 ", name=%{public}s, side=%{public}s, requestId=%{public}u, " in CreateAuthFsm() 295 "" CONN_INFO, authFsm->authSeq, authFsm->fsmName, GetAuthSideStr(isServer), requestId, CONN_DATA(connId)); in CreateAuthFsm() 301 AUTH_LOGI(AUTH_FSM, "destroy auth. authSeq=%{public}" PRId64 ", side=%{public}s, requestId=%{public}u", in DestroyAuthFsm() 302 authFsm->authSeq, GetAuthSideStr(authFsm->info.isServer), authFsm->info.requestId); in DestroyAuthFsm() 379 extra.authId = (int32_t)authFsm->authSeq; in DfxRecordLnnAuthEnd() 666 SaveLastAuthSeq(const unsigned char *udidHash, int64_t authSeq) SaveLastAuthSeq() argument 1075 TrySyncDeviceInfo(int64_t authSeq, const AuthSessionInfo *info) TrySyncDeviceInfo() argument 1399 GetAuthFsmByAuthSeq(int64_t authSeq) GetAuthFsmByAuthSeq() argument 1436 GetSessionInfoFromAuthFsm(int64_t authSeq, AuthSessionInfo *info) GetSessionInfoFromAuthFsm() argument 1454 PostMessageToAuthFsm(int32_t msgType, int64_t authSeq, const uint8_t *data, uint32_t len) PostMessageToAuthFsm() argument 1530 GetFirstFsmState(AuthSessionInfo *info, int64_t authSeq, AuthFsmStateIndex *state) GetFirstFsmState() argument 1579 AuthSessionProcessDevIdData(int64_t authSeq, const uint8_t *data, uint32_t len) AuthSessionProcessDevIdData() argument 1588 AuthSessionPostAuthData(int64_t authSeq, const uint8_t *data, uint32_t len) AuthSessionPostAuthData() argument 1600 AuthSessionProcessAuthData(int64_t authSeq, const uint8_t *data, uint32_t len) AuthSessionProcessAuthData() argument 1609 AuthSessionGetUdid(int64_t authSeq, char *udid, uint32_t size) AuthSessionGetUdid() argument 1626 AuthSessionSaveSessionKey(int64_t authSeq, const uint8_t *key, uint32_t len) AuthSessionSaveSessionKey() argument 1635 AuthSessionHandleAuthFinish(int64_t authSeq) AuthSessionHandleAuthFinish() argument 1640 AuthSessionHandleAuthError(int64_t authSeq, int32_t reason) AuthSessionHandleAuthError() argument 1645 AuthSessionProcessDevInfoData(int64_t authSeq, const uint8_t *data, uint32_t len) AuthSessionProcessDevInfoData() argument 1654 AuthSessionProcessCloseAck(int64_t authSeq, const uint8_t *data, uint32_t len) AuthSessionProcessCloseAck() argument 1746 AuthNotifyRequestVerify(int64_t authSeq) AuthNotifyRequestVerify() argument [all...] |
H A D | auth_session_message.c | 68 static int32_t PostDeviceIdData(int64_t authSeq, const AuthSessionInfo *info, uint8_t *data, uint32_t len) in PostDeviceIdData() argument 73 .seq = authSeq, in PostDeviceIdData() 84 static int32_t PostBtV1DevId(int64_t authSeq, const AuthSessionInfo *info) in PostBtV1DevId() argument 95 return PostDeviceIdData(authSeq, info, (uint8_t *)uuid, strlen(uuid)); in PostBtV1DevId() 98 static int32_t PostWifiV1DevId(int64_t authSeq, const AuthSessionInfo *info) in PostWifiV1DevId() argument 109 if (PostDeviceIdData(authSeq, info, (uint8_t *)msg, strlen(msg) + 1) != SOFTBUS_OK) { in PostWifiV1DevId() 117 static int32_t PostDeviceIdV1(int64_t authSeq, const AuthSessionInfo *info) in PostDeviceIdV1() argument 120 return PostWifiV1DevId(authSeq, info); in PostDeviceIdV1() 123 return PostBtV1DevId(authSeq, info); in PostDeviceIdV1() 127 static int32_t PostDeviceIdNew(int64_t authSeq, cons argument 142 DfxRecordLnnPostDeviceIdStart(int64_t authSeq, const AuthSessionInfo *info) DfxRecordLnnPostDeviceIdStart() argument 153 PostDeviceIdMessage(int64_t authSeq, const AuthSessionInfo *info) PostDeviceIdMessage() argument 175 GetDumpSessionKeyList(int64_t authSeq, const AuthSessionInfo *info, SessionKeyList *list) GetDumpSessionKeyList() argument 198 DfxRecordLnnPostDeviceInfoStart(int64_t authSeq, const AuthSessionInfo *info) DfxRecordLnnPostDeviceInfoStart() argument 235 PostDeviceInfoMessage(int64_t authSeq, const AuthSessionInfo *info) PostDeviceInfoMessage() argument 283 ProcessDeviceInfoMessage(int64_t authSeq, AuthSessionInfo *info, const uint8_t *data, uint32_t len) ProcessDeviceInfoMessage() argument 329 PostCloseAckMessage(int64_t authSeq, const AuthSessionInfo *info) PostCloseAckMessage() argument 347 PostHichainAuthMessage(int64_t authSeq, const AuthSessionInfo *info, const uint8_t *data, uint32_t len) PostHichainAuthMessage() argument 484 UpdateLocalAuthState(int64_t authSeq, AuthSessionInfo *info) UpdateLocalAuthState() argument [all...] |
H A D | auth_hichain.c | 92 static bool OnTransmit(int64_t authSeq, const uint8_t *data, uint32_t len) in OnTransmit() argument 96 AUTH_LOGI(AUTH_HICHAIN, "hichain OnTransmit: authSeq=%{public}" PRId64 ", len=%{public}u", authSeq, len); in OnTransmit() 97 if (AuthSessionPostAuthData(authSeq, data, len) != SOFTBUS_OK) { in OnTransmit() 98 AUTH_LOGE(AUTH_HICHAIN, "hichain OnTransmit fail: authSeq=%{public}" PRId64, authSeq); in OnTransmit() 104 static void DfxRecordLnnExchangekeyEnd(int64_t authSeq, int32_t reason) in DfxRecordLnnExchangekeyEnd() argument 108 extra.authId = (int32_t)authSeq; in DfxRecordLnnExchangekeyEnd() 114 static void OnSessionKeyReturned(int64_t authSeq, const uint8_t *sessionKey, uint32_t sessionKeyLen) in OnSessionKeyReturned() argument 116 AUTH_LOGI(AUTH_HICHAIN, "hichain OnSessionKeyReturned: authSeq in OnSessionKeyReturned() 127 DfxRecordLnnEndHichainEnd(int64_t authSeq, int32_t reason) DfxRecordLnnEndHichainEnd() argument 137 OnFinish(int64_t authSeq, int operationCode, const char *returnData) OnFinish() argument 182 OnError(int64_t authSeq, int operationCode, int errCode, const char *errorReturn) OnError() argument 197 OnRequest(int64_t authSeq, int operationCode, const char *reqParams) OnRequest() argument 408 HichainStartAuth(int64_t authSeq, const char *udid, const char *uid) HichainStartAuth() argument 430 HichainProcessData(int64_t authSeq, const uint8_t *data, uint32_t len) HichainProcessData() argument [all...] |
H A D | auth_manager.c | 60 AuthManager *NewAuthManager(int64_t authSeq, const AuthSessionInfo *info) in NewAuthManager() argument 69 auth->authId = authSeq; in NewAuthManager() 615 static AuthManager *GetExistAuthManager(int64_t authSeq, const AuthSessionInfo *info) in GetExistAuthManager() argument 619 return NewAuthManager(authSeq, info); in GetExistAuthManager() 623 return NewAuthManager(authSeq, info); in GetExistAuthManager() 640 AuthManager *GetDeviceAuthManager(int64_t authSeq, const AuthSessionInfo *info, bool *isNewCreated, in GetDeviceAuthManager() argument 667 auth = GetExistAuthManager(authSeq, info); in GetDeviceAuthManager() 732 int32_t AuthManagerSetSessionKey(int64_t authSeq, AuthSessionInfo *info, const SessionKey *sessionKey, in AuthManagerSetSessionKey() argument 739 int64_t sessionKeyIndex = authSeq; in AuthManagerSetSessionKey() 743 authSeq in AuthManagerSetSessionKey() 785 AuthManagerGetSessionKey(int64_t authSeq, const AuthSessionInfo *info, SessionKey *sessionKey) AuthManagerGetSessionKey() argument 873 PostCancelAuthMessage(int64_t authSeq, const AuthSessionInfo *info) PostCancelAuthMessage() argument 889 AuthNotifyAuthPassed(int64_t authSeq, const AuthSessionInfo *info) AuthNotifyAuthPassed() argument 934 AuthManagerSetAuthPassed(int64_t authSeq, const AuthSessionInfo *info) AuthManagerSetAuthPassed() argument 985 AuthManagerSetAuthFailed(int64_t authSeq, const AuthSessionInfo *info, int32_t reason) AuthManagerSetAuthFailed() argument 1046 AuthManagerSetAuthFinished(int64_t authSeq, const AuthSessionInfo *info) AuthManagerSetAuthFinished() argument [all...] |
H A D | auth_device.c | 500 int32_t AuthDirectOnlineCreateAuthManager(int64_t authSeq, const AuthSessionInfo *info) in AuthDirectOnlineCreateAuthManager() argument 505 AUTH_LOGI(AUTH_FSM, "direct online authSeq=%{public}" PRId64 ", side=%{public}s, requestId=%{public}u", in AuthDirectOnlineCreateAuthManager() 506 authSeq, GetAuthSideStr(info->isServer), info->requestId); in AuthDirectOnlineCreateAuthManager() 517 AuthManager *auth = GetDeviceAuthManager(authSeq, info, &isNewCreated, authSeq); in AuthDirectOnlineCreateAuthManager() 525 "auth manager without sessionkey. isNewCreated=%{public}d, authId=%{public}" PRId64 ", authSeq=%{public}" PRId64 in AuthDirectOnlineCreateAuthManager() 527 isNewCreated, auth->authId, authSeq, auth->lastVerifyTime); in AuthDirectOnlineCreateAuthManager()
|
/foundation/communication/dsoftbus/core/authentication/include/ |
H A D | auth_session_fsm.h | 105 int64_t authSeq; member 115 int64_t authSeq; member 123 int32_t AuthSessionProcessDevIdData(int64_t authSeq, const uint8_t *data, uint32_t len); 124 int32_t AuthSessionPostAuthData(int64_t authSeq, const uint8_t *data, uint32_t len); 125 int32_t AuthSessionProcessAuthData(int64_t authSeq, const uint8_t *data, uint32_t len); 126 int32_t AuthSessionGetUdid(int64_t authSeq, char *udid, uint32_t size); 127 int32_t AuthSessionSaveSessionKey(int64_t authSeq, const uint8_t *key, uint32_t len); 128 int32_t AuthSessionHandleAuthFinish(int64_t authSeq); 129 int32_t AuthSessionHandleAuthError(int64_t authSeq, int32_t reason); 130 int32_t AuthSessionProcessDevInfoData(int64_t authSeq, cons [all...] |
H A D | auth_normalize_request.h | 32 int64_t authSeq; member 38 bool AuthIsRepeatedAuthRequest(int64_t authSeq); 40 void NotifyNormalizeRequestSuccess(int64_t authSeq, bool isSupportNego); 41 void NotifyNormalizeRequestFail(int64_t authSeq, int32_t ret); 42 void DelAuthNormalizeRequest(int64_t authSeq);
|
H A D | auth_manager.h | 64 int32_t AuthManagerSetSessionKey(int64_t authSeq, AuthSessionInfo *info, const SessionKey *sessionKey, 66 int32_t AuthManagerGetSessionKey(int64_t authSeq, const AuthSessionInfo *info, SessionKey *sessionKey); 68 void AuthManagerSetAuthPassed(int64_t authSeq, const AuthSessionInfo *info); 69 void AuthManagerSetAuthFailed(int64_t authSeq, const AuthSessionInfo *info, int32_t reason); 70 void AuthManagerSetAuthFinished(int64_t authSeq, const AuthSessionInfo *info); 74 void AuthNotifyAuthPassed(int64_t authSeq, const AuthSessionInfo *info); 100 AuthManager *NewAuthManager(int64_t authSeq, const AuthSessionInfo *info); 112 AuthManager *GetDeviceAuthManager(int64_t authSeq, const AuthSessionInfo *info, bool *isNewCreated,
|
H A D | auth_session_message.h | 56 int32_t PostDeviceIdMessage(int64_t authSeq, const AuthSessionInfo *info); 59 int32_t PostDeviceInfoMessage(int64_t authSeq, const AuthSessionInfo *info); 60 int32_t ProcessDeviceInfoMessage(int64_t authSeq, AuthSessionInfo *info, const uint8_t *data, uint32_t len); 62 int32_t PostCloseAckMessage(int64_t authSeq, const AuthSessionInfo *info); 63 int32_t PostHichainAuthMessage(int64_t authSeq, const AuthSessionInfo *info, const uint8_t *data, uint32_t len); 68 int32_t UpdateLocalAuthState(int64_t authSeq, AuthSessionInfo *info);
|
H A D | auth_hichain.h | 42 int32_t HichainStartAuth(int64_t authSeq, const char *udid, const char *uid); 43 int32_t HichainProcessData(int64_t authSeq, const uint8_t *data, uint32_t len);
|
H A D | auth_hichain_adapter.h | 45 int32_t ProcessAuthData(int64_t authSeq, const uint8_t *data, uint32_t len, DeviceAuthCallback *cb);
|
H A D | auth_device.h | 47 int32_t AuthDirectOnlineCreateAuthManager(int64_t authSeq, const AuthSessionInfo *info);
|
/foundation/communication/dsoftbus/core/bus_center/lnn/net_builder/include/ |
H A D | lnn_fast_offline.h | 33 int64_t authSeq[DISCOVERY_TYPE_COUNT]; member
|
/foundation/communication/dsoftbus/core/bus_center/lnn/net_builder/src/ |
H A D | lnn_sync_info_manager.c | 550 static char *PackBleOfflineMsg(int64_t connCap, int32_t networkType, int64_t authSeq) in PackBleOfflineMsg() argument 559 !JSON_AddInt64ToObject(json, NETWORK_SYNC_SEQ, authSeq)) { in PackBleOfflineMsg() 605 LNN_LOGE(LNN_BUILDER, "authSeq is invalid, udid:%{public}s, local:%{public}" PRId64 ", %{public}" in CheckPeerAuthSeq() 641 LNN_LOGW(LNN_BUILDER, "device has offline or get authId/authSeq fail, uuid:%{public}s", in BleOffLineProcess() 715 LNN_LOGW(LNN_BUILDER, "device has offline or get authId/authSeq fail, uuid:%{public}s", in WlanOffLineProcess() 1234 int64_t authSeq[2] = {0}; in LnnSendP2pSyncInfoMsg() local 1238 if (AuthGetLatestAuthSeqListByType(udid, authSeq, authVerifyTime, DISCOVERY_TYPE_BLE) != SOFTBUS_OK || in LnnSendP2pSyncInfoMsg() 1239 (authSeq[0] == 0 && authSeq[1] == 0)) { in LnnSendP2pSyncInfoMsg() 1240 LNN_LOGE(LNN_BUILDER, "seqErr, ble authSeq in LnnSendP2pSyncInfoMsg() [all...] |
H A D | lnn_net_builder.c | 500 int64_t authSeq[DISCOVERY_TYPE_COUNT] = { 0 }; in OnLnnProcessNotTrustedMsgDelay() local 507 if (AuthGetLatestAuthSeqList(info->udid, authSeq, DISCOVERY_TYPE_COUNT) != SOFTBUS_OK) { in OnLnnProcessNotTrustedMsgDelay() 508 LNN_LOGE(LNN_BUILDER, "get latest authSeq list fail"); in OnLnnProcessNotTrustedMsgDelay() 521 LNN_BUILDER, "after 5s, authSeq:%{public}" PRId64 "->%{public}" PRId64, info->authSeq[type], authSeq[type]); in OnLnnProcessNotTrustedMsgDelay() 522 if (authSeq[type] == info->authSeq[type] && authSeq[type] != 0 && info->authSeq[typ in OnLnnProcessNotTrustedMsgDelay() 551 int64_t authSeq[DISCOVERY_TYPE_COUNT] = { 0 }; LnnProcessCompleteNotTrustedMsg() local [all...] |
/foundation/communication/dsoftbus/tests/core/bus_center/mock_common/src/ |
H A D | lnn_hichain_mock.cpp | 78 int64_t authSeq, const uint8_t *data, uint32_t len, const DeviceAuthCallback *gaCallback) in ActionOfProcessData() 80 (void)authSeq; in ActionOfProcessData() 77 ActionOfProcessData( int64_t authSeq, const uint8_t *data, uint32_t len, const DeviceAuthCallback *gaCallback) ActionOfProcessData() argument
|
/foundation/communication/dsoftbus/core/transmission/common/include/ |
H A D | softbus_app_info.h | 120 int64_t authSeq; member
|
/foundation/communication/dsoftbus/tests/core/bus_center/mock_common/include/ |
H A D | lnn_hichain_mock.h | 63 int64_t authSeq, const uint8_t *data, uint32_t len, const DeviceAuthCallback *gaCallback);
|