/base/security/asset/services/core_service/src/operations/ |
H A D | common.rs | 28 log_throw_error, Accessibility, AssetMap, AuthType, ErrCode, Extension, OperationType, Result, Tag, Value, 34 const TAG_COLUMN_TABLE: [(Tag, &str); 20] = [ 35 (Tag::Secret, column::SECRET), 36 (Tag::Alias, column::ALIAS), 37 (Tag::Accessibility, column::ACCESSIBILITY), 38 (Tag::AuthType, column::AUTH_TYPE), 39 (Tag::SyncType, column::SYNC_TYPE), 40 (Tag::UpdateTime, column::UPDATE_TIME), 41 (Tag::IsPersistent, column::IS_PERSISTENT), 42 (Tag [all...] |
H A D | operation_post_query.rs | 20 use asset_definition::{AssetMap, Extension, Result, Tag}; 24 const REQUIRED_ATTRS: [Tag; 1] = [Tag::AuthChallenge]; 25 const OPTIONAL_ATTRS: [Tag; 1] = [Tag::UserId]; 38 let challenge = handle.get_bytes_attr(&Tag::AuthChallenge)?;
|
H A D | operation_query.rs | 27 log_throw_error, throw_error, AssetMap, AuthType, ErrCode, Extension, Result, ReturnType, Tag, Value, 72 let challenge = query.get_bytes_attr(&Tag::AuthChallenge)?; in exec_crypto() 73 let auth_token = query.get_bytes_attr(&Tag::AuthToken)?; in exec_crypto() 117 offset: match attrs.get(&Tag::ReturnOffset) { in get_query_options() 121 limit: match attrs.get(&Tag::ReturnLimit) { in get_query_options() 125 order_by: match attrs.get(&Tag::ReturnOrderedBy) { in get_query_options() 127 let tag = Tag::try_from(*order_by).expect("Tag::ReturnOrderBy has been verified"); in get_query_options() 133 if attrs.contains_key(&Tag::ReturnOrderedBy) { in get_query_options() 156 const OPTIONAL_ATTRS: [Tag; [all...] |
H A D | operation_add.rs | 29 SyncStatus, SyncType, Tag, Value, 52 match attrs.get(&Tag::ConflictResolution) { in resolve_conflict() 72 let alias = attrs.get_bytes_attr(&Tag::Alias)?; in get_query_condition() 99 const REQUIRED_ATTRS: [Tag; 2] = [Tag::Secret, Tag::Alias]; 100 const OPTIONAL_ATTRS: [Tag; 2] = [Tag::Secret, Tag::ConflictResolution]; 108 attributes.get_enum_attr::<Accessibility>(&Tag in check_accessibity_validity() [all...] |
H A D | operation_update.rs | 24 use asset_definition::{log_throw_error, AssetMap, ErrCode, Extension, LocalStatus, Result, SyncStatus, Tag, Value}; 65 const QUERY_REQUIRED_ATTRS: [Tag; 1] = [Tag::Alias]; 66 const UPDATE_OPTIONAL_ATTRS: [Tag; 1] = [Tag::Secret]; 112 if update.contains_key(&Tag::Secret) { 123 result.insert(column::SECRET, update[&Tag::Secret].clone());
|
H A D | operation_pre_query.rs | 24 use asset_definition::{log_throw_error, Accessibility, AssetMap, AuthType, ErrCode, Extension, Result, Tag, Value}; 28 const OPTIONAL_ATTRS: [Tag; 1] = [Tag::AuthValidityPeriod]; 42 match attributes.get(&Tag::AuthType) { in check_arguments() 75 let valid_time = match query.get(&Tag::AuthValidityPeriod) {
|
/base/security/asset/services/core_service/src/operations/common/ |
H A D | argument_check.rs | 21 ReturnType, Tag, Value, 42 fn check_data_type(tag: &Tag, value: &Value) -> Result<()> { in check_data_type() 54 fn check_array_size(tag: &Tag, value: &Value, min: usize, max: usize) -> Result<()> { in check_array_size() 61 "[FATAL]The array length[{}] of Tag[{}], exceeds the valid range.", in check_array_size() 69 fn check_enum_variant<T: TryFrom<u32>>(tag: &Tag, value: &Value) -> Result<()> { in check_enum_variant() 76 "[FATAL]The value[{}] of Tag[{}] is not a legal enumeration variant", in check_enum_variant() 84 fn check_valid_bits(tag: &Tag, value: &Value, min_bits: u32, max_bits: u32) -> Result<()> { in check_valid_bits() 92 "[FATAL]The value[{}] of Tag[{}] is not in the valid bit number.", in check_valid_bits() 100 fn check_number_range(tag: &Tag, value: &Value, min: u32, max: u32) -> Result<()> { in check_number_range() 107 "[FATAL]The value[{}] of Tag[{}] i in check_number_range() [all...] |
H A D | permission_check.rs | 23 use asset_definition::{log_throw_error, AssetMap, ErrCode, Result, Tag}; 31 if attrs.get(&Tag::UserId).is_some() {
|
/base/security/asset/test/unittest/inner_kits_rust/src/ |
H A D | add.rs | 27 assert_eq!(alias, *res[0].get_bytes_attr(&Tag::Alias).unwrap()); in add_all_tags() 28 assert_eq!(NORMAL_LABEL1, *res[0].get_bytes_attr(&Tag::DataLabelNormal1).unwrap()); in add_all_tags() 29 assert_eq!(NORMAL_LABEL2, *res[0].get_bytes_attr(&Tag::DataLabelNormal2).unwrap()); in add_all_tags() 30 assert_eq!(NORMAL_LABEL3, *res[0].get_bytes_attr(&Tag::DataLabelNormal3).unwrap()); in add_all_tags() 31 assert_eq!(NORMAL_LABEL4, *res[0].get_bytes_attr(&Tag::DataLabelNormal4).unwrap()); in add_all_tags() 32 assert_eq!(NORMAL_LOCAL_LABEL1, *res[0].get_bytes_attr(&Tag::DataLabelNormalLocal1).unwrap()); in add_all_tags() 33 assert_eq!(NORMAL_LOCAL_LABEL2, *res[0].get_bytes_attr(&Tag::DataLabelNormalLocal2).unwrap()); in add_all_tags() 34 assert_eq!(NORMAL_LOCAL_LABEL3, *res[0].get_bytes_attr(&Tag::DataLabelNormalLocal3).unwrap()); in add_all_tags() 35 assert_eq!(NORMAL_LOCAL_LABEL4, *res[0].get_bytes_attr(&Tag::DataLabelNormalLocal4).unwrap()); in add_all_tags() 36 assert_eq!(CRITICAL_LABEL1, *res[0].get_bytes_attr(&Tag in add_all_tags() [all...] |
H A D | query_abnormal.rs | 22 query.insert_attr(Tag::Alias, vec![]); in query_invalid_alias() 25 query.insert_attr(Tag::Alias, vec![0; MAX_ALIAS_SIZE + 1]); in query_invalid_alias() 33 query.insert_attr(Tag::Accessibility, (Accessibility::DeviceUnlocked as u32) + 1); in query_invalid_accessibility() 40 query.insert_attr(Tag::AuthType, (AuthType::None as u32) + 1); in query_invalid_auth_type() 43 query.insert_attr(Tag::AuthType, (AuthType::Any as u32) + 1); in query_invalid_auth_type() 51 query.insert_attr(Tag::SyncType, sync_type + 1); in query_invalid_sync_type() 71 query.insert_attr(Tag::ReturnLimit, MIN_NUMBER_VALUE); in query_invalid_return_limit() 74 query.insert_attr(Tag::ReturnLimit, MAX_RETURN_LIMIT + 1); in query_invalid_return_limit() 81 Tag::Secret, in query_invalid_return_ordered_by() 82 Tag in query_invalid_return_ordered_by() [all...] |
H A D | update_abnormal.rs | 23 update.insert_attr(Tag::Secret, function_name.to_owned()); in update_query_without_alias() 36 update.insert_attr(Tag::Secret, function_name.to_owned()); in update_query_invalid_alias() 39 query.insert_attr(Tag::Alias, vec![]); in update_query_invalid_alias() 45 query.insert_attr(Tag::Alias, vec![0; MAX_ALIAS_SIZE + 1]); in update_query_invalid_alias() 56 update.insert_attr(Tag::Secret, function_name.to_owned()); in update_query_alias_with_unmatched_type() 59 query.insert_attr(Tag::Alias, 0); in update_query_alias_with_unmatched_type() 65 query.insert_attr(Tag::Alias, true); in update_query_alias_with_unmatched_type() 76 update.insert_attr(Tag::Secret, function_name.to_owned()); in update_query_invalid_accessibility() 78 query.insert_attr(Tag::Alias, function_name.to_owned()); in update_query_invalid_accessibility() 80 query.insert_attr(Tag in update_query_invalid_accessibility() [all...] |
H A D | add_abnormal.rs | 22 attrs.insert_attr(Tag::Accessibility, Accessibility::DevicePowerOn); in add_empty_attr() 30 attrs.insert_attr(Tag::Accessibility, Accessibility::DevicePowerOn); in add_without_alias() 31 attrs.insert_attr(Tag::Secret, function_name.to_owned()); in add_without_alias() 40 attrs.insert_attr(Tag::Alias, alias.clone()); in add_alias_with_min_len() 41 attrs.insert_attr(Tag::Secret, function_name.to_owned()); in add_alias_with_min_len() 42 attrs.insert_attr(Tag::Accessibility, Accessibility::DevicePowerOn); in add_alias_with_min_len() 54 attrs.insert_attr(Tag::Alias, alias.clone()); in add_alias_with_max_len() 55 attrs.insert_attr(Tag::Secret, function_name.to_owned()); in add_alias_with_max_len() 56 attrs.insert_attr(Tag::Accessibility, Accessibility::DevicePowerOn); in add_alias_with_max_len() 67 attrs.insert_attr(Tag in add_invalid_alias() [all...] |
H A D | post_query_abnormal.rs | 22 query.insert_attr(Tag::AuthChallenge, vec![0; CHALLENGE_SIZE - 1]); in post_query_auth_challenge() 25 query.insert_attr(Tag::AuthChallenge, vec![0; CHALLENGE_SIZE + 1]); in post_query_auth_challenge() 31 let tags_bytes = vec![Tag::AuthChallenge]; in post_query_bytes_tag_with_unmatched_type() 44 let mut tags_bytes = vec![Tag::Secret, Tag::Alias, Tag::AuthToken]; in post_query_unsupported_tags() 54 Tag::Accessibility, in post_query_unsupported_tags() 55 Tag::AuthType, in post_query_unsupported_tags() 56 Tag::AuthValidityPeriod, in post_query_unsupported_tags() 57 Tag in post_query_unsupported_tags() [all...] |
H A D | pre_query_abnormal.rs | 22 query.insert_attr(Tag::Alias, vec![]); in pre_query_invalid_alias() 25 query.insert_attr(Tag::Alias, vec![0; MAX_ALIAS_SIZE + 1]); in pre_query_invalid_alias() 32 query.insert_attr(Tag::Accessibility, (Accessibility::DeviceUnlocked as u32) + 1); in pre_query_invalid_accessibility() 39 query.insert_attr(Tag::AuthType, (AuthType::None as u32) + 1); in pre_query_invalid_auth_type() 42 query.insert_attr(Tag::AuthType, (AuthType::Any as u32) + 1); in pre_query_invalid_auth_type() 50 query.insert_attr(Tag::SyncType, sync_type + 1); in pre_query_invalid_sync_type() 57 query.insert_attr(Tag::AuthValidityPeriod, MIN_NUMBER_VALUE); in pre_query_invalid_auth_validity_period() 60 query.insert_attr(Tag::AuthValidityPeriod, MAX_AUTH_VALID_PERIOD + 1); in pre_query_invalid_auth_validity_period() 79 let tags = [Tag::RequirePasswordSet, Tag in pre_query_bool_tag_with_unmatched_type() [all...] |
H A D | remove_abnormal.rs | 22 query.insert_attr(Tag::Alias, vec![]); in remove_invalid_alias() 25 query.insert_attr(Tag::Alias, vec![0; MAX_ALIAS_SIZE + 1]); in remove_invalid_alias() 33 query.insert_attr(Tag::Accessibility, (Accessibility::DeviceUnlocked as u32) + 1); in remove_invalid_accessibility() 40 query.insert_attr(Tag::AuthType, (AuthType::None as u32) + 1); in remove_invalid_auth_type() 43 query.insert_attr(Tag::AuthType, (AuthType::Any as u32) + 1); in remove_invalid_auth_type() 51 query.insert_attr(Tag::SyncType, sync_type + 1); in remove_invalid_sync_type() 70 let tags = [Tag::RequirePasswordSet, Tag::IsPersistent]; in remove_bool_tag_with_unmatched_type() 84 tags_bytes.extend(&[Tag::Alias]); in remove_bytes_tag_with_unmatched_type() 97 let tags_bytes = [Tag in remove_number_tag_with_unmatched_type() [all...] |
H A D | query.rs | 42 query.insert_attr(Tag::RequirePasswordSet, true); in query_non_exist_without_alias() 50 add.insert_attr(Tag::RequirePasswordSet, false); in query_without_alias_with_wrong_condition() 51 add.insert_attr(Tag::Alias, function_name.to_owned()); in query_without_alias_with_wrong_condition() 52 add.insert_attr(Tag::Secret, function_name.to_owned()); in query_without_alias_with_wrong_condition() 53 add.insert_attr(Tag::Accessibility, Accessibility::DevicePowerOn); in query_without_alias_with_wrong_condition() 57 query.insert_attr(Tag::RequirePasswordSet, true); in query_without_alias_with_wrong_condition() 94 let query = AssetMap::from([(Tag::ReturnOffset, Value::Number(offset))]); in query_with_offset_without_limit() 98 let query = AssetMap::from([(Tag::ReturnOffset, Value::Number(offset))]); in query_with_offset_without_limit() 119 query.insert_attr(Tag::ReturnLimit, limit); in query_with_limit_with_without_offset() 124 query.insert_attr(Tag in query_with_limit_with_without_offset() [all...] |
H A D | remove.rs | 27 AssetMap::from([(Tag::DataLabelCritical1, Value::Bytes("remove_condition_non_exist".as_bytes().to_vec()))]); in remove_condition_non_exist() 36 (Tag::Alias, Value::Bytes(function_name.to_owned())), in remove_condition_exist_and_query() 37 (Tag::Secret, Value::Bytes(function_name.to_owned())), in remove_condition_exist_and_query() 38 (Tag::DataLabelCritical2, Value::Bytes(critical_label.to_owned())), in remove_condition_exist_and_query() 40 condition.insert_attr(Tag::Accessibility, Accessibility::DevicePowerOn); in remove_condition_exist_and_query() 42 condition.remove(&Tag::Alias); in remove_condition_exist_and_query() 43 condition.remove(&Tag::Secret); in remove_condition_exist_and_query()
|
H A D | update.rs | 26 query.insert_attr(Tag::Alias, alias.to_owned()); in update_same_secret() 29 update.insert_attr(Tag::Secret, secret.to_owned()); in update_same_secret() 43 query.insert_attr(Tag::Alias, alias.to_owned()); in update_different_secret() 48 update.insert_attr(Tag::Secret, secret_new.to_owned()); in update_different_secret() 54 assert_eq!(secret_new, res[0].get_bytes_attr(&Tag::Secret).unwrap()); in update_different_secret() 66 query.insert_attr(Tag::Alias, alias.to_owned()); in update_attr_normal() 70 update.insert_attr(Tag::DataLabelNormal1, label_normal.to_owned()); in update_attr_normal() 74 let label_normal_query = query_res.get_bytes_attr(&Tag::DataLabelNormal1).unwrap(); in update_attr_normal() 86 query.insert_attr(Tag::Alias, alias.to_owned()); in update_non_exist() 89 update.insert_attr(Tag in update_non_exist() [all...] |
H A D | pre_query.rs | 23 query.insert_attr(Tag::Alias, alias.to_owned()); in pre_query_non_exist_with_alias() 33 query.insert_attr(Tag::Alias, function_name.to_owned()); in pre_query_with_wrong_auth_type() 44 query.insert_attr(Tag::Accessibility, Accessibility::DeviceUnlocked); in pre_query_with_wrong_accessibility() 55 query.insert_attr(Tag::AuthType, AuthType::None); in pre_query_with_unsupported_auth_type() 66 query.insert_attr(Tag::IsPersistent, true); in pre_query_with_wrong_persistent() 77 query.insert_attr(Tag::SyncType, SyncType::TrustedDevice); in pre_query_with_wrong_sync_type() 91 query.insert_attr(Tag::AuthChallenge, challenge); in pre_query_batch_data() 103 query.insert_attr(Tag::Alias, function_name.to_owned()); in pre_query_single_data() 104 query.insert_attr(Tag::Accessibility, Accessibility::DevicePowerOn); in pre_query_single_data() 105 query.insert_attr(Tag in pre_query_single_data() [all...] |
H A D | post_query.rs | 22 query.insert_attr(Tag::AuthChallenge, vec![0; CHALLENGE_SIZE]); in post_query_non_exist_with_auth_challenge() 34 query.insert_attr(Tag::AuthChallenge, vec![0; CHALLENGE_SIZE]); in post_query_with_wrong_auth_challenge() 37 query.insert_attr(Tag::AuthChallenge, challenge); in post_query_with_wrong_auth_challenge() 50 query.insert_attr(Tag::AuthChallenge, challenge); in post_query_normal()
|
/base/security/huks/services/huks_standard/huks_engine/main/device_cert_manager/include/ |
H A D | dcm_attest_utils.h | 26 static uint8_t name##Tag[] = { 0x06, id##_SIZE, id }
29 static const struct HksBlob name##Oid = { sizeof(name##Tag), name##Tag }
|
/base/security/asset/frameworks/definition/src/ |
H A D | extension.rs | 24 Result, Tag, Value, 30 impl Conversion for Tag {
|
H A D | lib.rs | 44 pub enum Tag { enum 175 pub type AssetMap = HashMap<Tag, Value>;
|
/base/security/asset/services/core_service/src/ |
H A D | stub.rs | 30 ErrCode, Tag, Value, 100 let calling_info = CallingInfo::build(map.get(&Tag::UserId).cloned(), &process_info); in on_remote_request()
|
/base/security/asset/frameworks/ipc/src/ |
H A D | lib.rs | 21 impl_enum_trait, log_throw_error, AssetError, AssetMap, Conversion, DataType, ErrCode, Result, Tag, Value, 88 let tag = Tag::try_from(tag)?; in deserialize_map()
|