Home
last modified time | relevance | path

Searched refs:opCode (Results 1 - 25 of 56) sorted by relevance

123

/base/security/access_token/frameworks/common/src/
H A Dpermission_map.cpp549 bool TransferPermissionToOpcode(const std::string& permission, uint32_t& opCode) in TransferPermissionToOpcode() argument
555 opCode = i; in TransferPermissionToOpcode()
562 bool TransferOpcodeToPermission(uint32_t opCode, std::string& permission) in TransferOpcodeToPermission() argument
564 if (opCode >= MAX_PERM_SIZE || opCode >= g_permMap.size()) { in TransferOpcodeToPermission()
567 permission = g_permMap[opCode].first; in TransferOpcodeToPermission()
/base/security/access_token/interfaces/innerkits/token_setproc/src/
H A Dperm_setproc.cpp35 uint32_t opCode; member
62 uint32_t opCode = opCodeList[i]; in AddPermissionToKernel() local
63 uint32_t idx = opCode / UINT32_T_BITS; in AddPermissionToKernel()
64 uint32_t bitIdx = opCode % UINT32_T_BITS; in AddPermissionToKernel()
100 int32_t SetPermissionToKernel(uint32_t tokenID, int32_t opCode, bool status) in SetPermissionToKernel() argument
104 .opCode = opCode, in SetPermissionToKernel()
121 int32_t GetPermissionFromKernel(uint32_t tokenID, int32_t opCode, bool& isGranted) in GetPermissionFromKernel() argument
125 .opCode = opCode, in GetPermissionFromKernel()
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/
H A Dpake_v1_client_protocol_task.c66 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PakeRequest()
67 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in PakeRequest()
78 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND || params->opCode == AUTH_KEY_AGREEMENT) { in PakeRequest()
106 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in ParseMsgForClientConfirm()
107 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in ParseMsgForClientConfirm()
165 if (params->isPskSupported && (params->opCode in PakeClientConfirm()
[all...]
H A Dpake_v1_server_protocol_task.c65 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PackageMsgForResponse()
66 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in PackageMsgForResponse()
95 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PakeResponse()
96 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in PakeResponse()
107 if (params->isPskSupported && (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND)) { in PakeResponse()
215 res = ServerProtocolMessageOut(out, params->opCode, step); in Process()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/
H A Dpake_task_common.c41 if (params->opCode == AUTHENTICATE) { in ConstructOutJson()
92 GOTO_ERR_AND_SET_RET(AddIntToJson(sendToSelf, FIELD_OPERATION_CODE, params->opCode), res); in SendResultToSelf()
163 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in FillAuthId()
241 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in FillNonce()
257 if (GetIntFromJson(in, FIELD_OPERATION_CODE, &(params->opCode)) != HC_SUCCESS) { in FillDasPakeParams()
258 LOGD("Get opCode failed, use default."); in FillDasPakeParams()
259 params->opCode = AUTHENTICATE; in FillDasPakeParams()
261 if (params->opCode ! in FillDasPakeParams()
[all...]
H A Dpake_message_util.c33 if (AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode) != HC_SUCCESS) { in PackagePakeRequestData()
34 LOGE("Add opCode failed."); in PackagePakeRequestData()
37 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PackagePakeRequestData()
66 * opCode: OP_UNBIND, pake v1: don't need returnKey, use default 0 length in ParsePakeRequestMessage()
67 * opCode: OP_UNBIND, pake v2: don't need returnKey, use default 0 length in ParsePakeRequestMessage()
68 * opCode: OP_BIND, pake v1: use default 32 length in ParsePakeRequestMessage()
69 * opCode: OP_BIND, pake v2: don't need returnKey, use default 0 length in ParsePakeRequestMessage()
70 * Therefore, only params->opCode == AUTHENTICATE or AUTH_KEY_AGREEMENT, need to get keyLen from message in ParsePakeRequestMessage()
72 if (params->opCode in ParsePakeRequestMessage()
[all...]
/base/security/access_token/frameworks/common/include/
H A Dpermission_map.h25 bool TransferPermissionToOpcode(const std::string& permissionName, uint32_t& opCode);
26 bool TransferOpcodeToPermission(uint32_t opCode, std::string& permissionName);
/base/security/device_auth/services/legacy/group_manager/inc/
H A Dbase_group_manager_task.h27 int32_t opCode; member
35 int32_t opCode; member
/base/security/access_token/interfaces/innerkits/token_setproc/include/
H A Dperm_setproc.h26 int32_t SetPermissionToKernel(uint32_t tokenID, int32_t opCode, bool status);
27 int32_t GetPermissionFromKernel(uint32_t tokenID, int32_t opCode, bool& isGranted);
/base/security/device_auth/services/legacy/authenticators/src/account_related/
H A Daccount_module.c38 int32_t opCode; in IsAccountMsgNeedIgnore() local
39 if (GetIntFromJson(in, FIELD_OPERATION_CODE, &opCode) != HC_SUCCESS) { in IsAccountMsgNeedIgnore()
40 LOGE("Get opCode failed."); in IsAccountMsgNeedIgnore()
44 if (opCode == OP_BIND) { in IsAccountMsgNeedIgnore()
46 } else if (opCode == AUTHENTICATE) { in IsAccountMsgNeedIgnore()
49 LOGE("Invalid opCode: %d.", opCode); in IsAccountMsgNeedIgnore()
/base/security/access_token/services/privacymanager/include/record/
H A Dpermission_record.h29 int32_t opCode = 0; member
46 int32_t opCode = 0; member
/base/security/access_token/services/privacymanager/src/record/
H A Dpermission_record_manager.cpp159 // the same tokenID + opCode + status + lockScreenStatus + usedType in RecordMergeCheck()
161 (record1.opCode != record2.opCode) || in RecordMergeCheck()
241 record.tokenId, record.opCode, record.status, record.accessCount, record.rejectCount, record.lockScreenStatus, in MergeOrInsertRecord()
255 conditionValue.Put(PrivacyFiledConst::FIELD_OP_CODE, record.opCode); in UpdatePermissionUsedRecord()
312 int32_t opCode; in GetPermissionRecord() local
313 if (!Constant::TransferPermissionToOpcode(info.permissionName, opCode)) { in GetPermissionRecord()
326 record.opCode = opCode; in GetPermissionRecord()
345 bool PermissionRecordManager::AddOrUpdateUsedTypeIfNeeded(const AccessTokenID tokenId, const int32_t opCode, in AddOrUpdateUsedTypeIfNeeded() argument
492 int32_t opCode = Constant::OP_INVALID; TransferToOpcode() local
512 int32_t opCode = queryValue.GetInt(PrivacyFiledConst::FIELD_OP_CODE); InsteadMergedRecIfNessary() local
766 int32_t opCode; AddRecordToStartList() local
874 int32_t opCode; RemoveRecordFromStartList() local
980 RemoveRecordFromStartListByOp(int32_t opCode) RemoveRecordFromStartListByOp() argument
1036 int32_t opCode; ExecuteAndUpdateRecordByPerm() local
1470 int32_t opCode; GetPermissionUsedTypeInfos() local
[all...]
H A Dpermission_record.cpp26 values.Put(PrivacyFiledConst::FIELD_OP_CODE, record.opCode); in TranslationIntoGenericValues()
39 record.opCode = values.GetInt(PrivacyFiledConst::FIELD_OP_CODE); in TranslationIntoPermissionRecord()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/
H A Dpake_v1_server_task.c67 switch (realTask->params.opCode) { in CreateNextTask()
79 LOGE("Unsupported opCode: %d.", realTask->params.opCode); in CreateNextTask()
83 LOGE("Create and process next task failed, opcode: %d, res: %d.", realTask->params.opCode, res); in CreateNextTask()
94 LOGI("End server task successfully, opcode: %d.", realTask->params.opCode); in CreateNextTask()
H A Dpake_v1_client_task.c67 switch (realTask->params.opCode) { in CreateNextTask()
79 LOGE("Unsupported opCode: %d.", realTask->params.opCode); in CreateNextTask()
83 LOGE("Create and process next task failed, opcode: %d, res: %d.", realTask->params.opCode, res); in CreateNextTask()
94 LOGI("End client task successfully, opcode: %d.", realTask->params.opCode); in CreateNextTask()
/base/security/device_auth/services/legacy/authenticators/inc/account_unrelated/
H A Ddas_task_common.h40 int ClientProtocolMessageOut(CJson *out, int opCode, uint32_t step);
41 int ServerProtocolMessageOut(CJson *out, int opCode, uint32_t step);
H A Ddas_version_util.h53 int32_t opCode; member
77 ProtocolType GetPrototolType(VersionStruct *curVersion, OperationCode opCode);
/base/security/access_token/services/privacymanager/include/common/
H A Dconstant.h85 static bool TransferPermissionToOpcode(const std::string& permissionName, int32_t& opCode);
86 static bool TransferOpcodeToPermission(int32_t opCode, std::string& permissionName);
/base/security/access_token/services/privacymanager/src/common/
H A Dconstant.cpp84 bool Constant::TransferPermissionToOpcode(const std::string& permissionName, int32_t& opCode) in TransferPermissionToOpcode() argument
89 opCode = PERMISSION_OPCODE_MAP.at(permissionName); in TransferPermissionToOpcode()
93 bool Constant::TransferOpcodeToPermission(int32_t opCode, std::string& permissionName) in TransferOpcodeToPermission() argument
96 [opCode](const std::map<std::string, int32_t>::value_type item) { in TransferOpcodeToPermission()
97 return item.second == opCode; in TransferOpcodeToPermission()
/base/security/device_auth/services/session_manager/src/session/v1/compatible_bind_sub_session/
H A Dcompatible_bind_sub_session.c107 static int32_t CreateBaseBindSubSession(int32_t sessionType, int32_t opCode, const CJson *params, in CreateBaseBindSubSession() argument
140 subSession->opCode = opCode; in CreateBaseBindSubSession()
149 static int32_t GenerateKeyPairIfNeeded(int32_t osAccountId, int isClient, int32_t opCode, CJson *jsonParams) in GenerateKeyPairIfNeeded() argument
151 if (!IsCreateGroupNeeded(isClient, opCode)) { in GenerateKeyPairIfNeeded()
222 res = CheckServerStatusIfNotInvite(session->osAccountId, session->opCode, jsonParams); in GenerateServerBindParams()
230 return GenerateKeyPairIfNeeded(session->osAccountId, SERVER, session->opCode, jsonParams); in GenerateServerBindParams()
295 ProcessFinishCallback(session->reqId, session->opCode, jsonDataStr, session->base.callback); in InformSelfBindSuccess()
789 result = AddInfoToBindData((session->opCode == MEMBER_JOIN), session, *sendData); in PrepareServerData()
834 int32_t opCode in CreateClientBindSubSession() local
880 int32_t opCode = MEMBER_INVITE; CreateServerBindSubSession() local
[all...]
/base/security/device_auth/services/session_manager/inc/session/v1/compatible_bind_sub_session/
H A Dcompatible_bind_sub_session_defines.h27 int32_t opCode; member
/base/security/device_auth/services/
H A Ddevice_auth.c331 int32_t opCode = GetOpCodeFromContext(context); in AddClientReqInfoToContext() local
332 if (AddIntToJson(context, FIELD_OPERATION_CODE, opCode) != HC_SUCCESS) { in AddClientReqInfoToContext()
336 if (opCode == MEMBER_JOIN) { in AddClientReqInfoToContext()
523 int32_t opCode; in CheckBindParams() local
524 if (GetIntFromJson(context, FIELD_OPERATION_CODE, &opCode) != HC_SUCCESS) { in CheckBindParams()
528 if ((isClient && opCode == MEMBER_INVITE) || (!isClient && opCode == MEMBER_JOIN)) { in CheckBindParams()
640 static int32_t AddServerReqInfoToContext(int64_t requestId, const char *appId, int32_t opCode, in AddServerReqInfoToContext() argument
664 if (AddIntToJson(context, FIELD_OPERATION_CODE, opCode) != HC_SUCCESS) { in AddServerReqInfoToContext()
665 LOGE("add opCode t in AddServerReqInfoToContext()
722 BuildServerBindContext(int64_t requestId, const char *appId, int32_t opCode, const CJson *receivedMsg, CJson *context) BuildServerBindContext() argument
765 int32_t opCode; OpenServerBindSession() local
980 BuildServerAuthContext(int64_t requestId, int32_t opCode, const char *appId, CJson *context) BuildServerAuthContext() argument
1024 BuildServerP2PAuthContext(int64_t requestId, int32_t opCode, const char *appId, CJson *context) BuildServerP2PAuthContext() argument
1072 int32_t opCode = AUTH_FORM_ACCOUNT_UNRELATED; OpenServerAuthSession() local
1110 int32_t opCode = P2P_BIND; OpenServerAuthSessionForP2P() local
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/
H A Diso_task_common.c125 GOTO_ERR_AND_SET_RET(AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode), ret); in GenerateEncResult()
205 GOTO_ERR_AND_SET_RET(AddIntToJson(sendToSelf, FIELD_OPERATION_CODE, params->opCode), res); in GenEncResult()
364 if (params->opCode == OP_BIND) { in FillAuthId()
442 if (params->opCode == OP_BIND) { in FillPin()
503 if (params->opCode == OP_UNBIND || params->opCode == OP_BIND) { in GetUpgradeFlagAndKeyLength()
522 if (GetIntFromJson(in, FIELD_OPERATION_CODE, &(params->opCode)) != 0) { in InitIsoParams()
523 LOGD("Get opCode failed, use default."); in InitIsoParams()
524 params->opCode = AUTHENTICATE; in InitIsoParams()
526 if (params->opCode ! in InitIsoParams()
[all...]
/base/hiviewdfx/faultloggerd/interfaces/innerkits/unwinder/
H A Ddwarf_cfa_instructions.cpp55 uint8_t opCode; in Iterate() local
56 if (!memory_->ReadU8(instPtr, &opCode, true)) { in Iterate()
60 if (!DecodeDwCfa(opCode, cie, pcOffset, instPtr, rsState)) { in Iterate()
69 bool DwarfCfaInstructions::DecodeDwCfa(uint8_t opCode, CommonInfoEntry cie, in DecodeDwCfa() argument
78 switch (opCode) { in DecodeDwCfa()
276 uint8_t operand = opCode & 0x3F; in DecodeDwCfa()
278 switch (opCode & 0xC0) { in DecodeDwCfa()
304 DFXLOGU("DW_CFA_unknown: opcode=0x%{public}02x", opCode); in DecodeDwCfa()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_protocol_task/
H A Diso_client_protocol_task.c64 GOTO_ERR_AND_SET_RET(AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode), res); in IsoClientStartPackData()
67 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in IsoClientStartPackData()
140 if (params->opCode == OP_BIND) { in ParseServerStartMessage()
269 res = ClientProtocolMessageOut(out, params->opCode, step); in Process()

Completed in 16 milliseconds

123