/base/useriam/user_auth_framework/services/core/src/ |
H A D | user_info_impl.cpp | 21 UserInfoImpl::UserInfoImpl(const int32_t userId, const UserInfo &userInfo) : userId_(userId), userInfo_(userInfo) in UserInfoImpl() argument
|
H A D | user_idm_database_impl.cpp | 201 auto userInfo = Common::MakeShared<UserInfoImpl>(iter.userId, iter.userInfo); in GetAllExtUserInfo() local 202 if (userInfo == nullptr) { in GetAllExtUserInfo() 206 infoRet.emplace_back(userInfo); in GetAllExtUserInfo()
|
H A D | user_info_impl.h | 29 UserInfoImpl(const int32_t userId, const UserInfo &userInfo);
|
H A D | enrollment_impl.cpp | 156 auto userInfo = UserIdmDatabase::Instance().GetSecUserInfo(enrollPara_.userId); in GetSecUserId() local 157 if (userInfo != nullptr) { in GetSecUserId() 158 secUserId = userInfo->GetSecUserId(); in GetSecUserId()
|
/base/security/device_auth/frameworks/deviceauth_lite/test/fuzztest/dellocalauthinfo_fuzzer/ |
H A D | dellocalauthinfo_fuzzer.cpp | 78 hc_user_info userInfo = {authId, 1}; in DelLocalaAuthInfoFuzz() local 79 delete_local_auth_info(handle, &userInfo); in DelLocalaAuthInfoFuzz()
|
/base/security/dlp_permission_service/services/dlp_permission/sa/test/unittest/src/ |
H A D | dlp_permission_serializer_test.cpp | 316 AuthUserInfo userInfo; in HWTEST_F() local 318 int32_t ret = serialize.DeserializeAuthUserInfo(permJson1, userInfo); in HWTEST_F() 322 ret = serialize.DeserializeAuthUserInfo(permJson1, userInfo); in HWTEST_F() 328 ret = serialize.DeserializeAuthUserInfo(permJson1, userInfo); in HWTEST_F() 333 ret = serialize.DeserializeAuthUserInfo(permJson1, userInfo); in HWTEST_F() 338 ret = serialize.DeserializeAuthUserInfo(permJson1, userInfo); in HWTEST_F()
|
/base/useriam/user_auth_framework/services/ipc/src/ |
H A D | user_idm_service.cpp | 129 auto userInfo = UserIdmDatabase::Instance().GetSecUserInfo(userId); in GetCredentialInfoInner() local 130 if (userInfo == nullptr) { in GetCredentialInfoInner() 131 IAM_LOGE("failed to get userInfo"); in GetCredentialInfoInner() 134 info.pinType = userInfo->GetPinSubType(); in GetCredentialInfoInner() 359 auto userInfo = UserIdmDatabase::Instance().GetSecUserInfo(userId); in EnforceDelUser() local 360 if (userInfo == nullptr) { in EnforceDelUser() 516 auto userInfo = UserIdmDatabase::Instance().GetSecUserInfo(activeUserId.value()); in Dump() local 517 if (userInfo == nullptr) { in Dump() 518 IAM_LOGE("userInfo is null"); in Dump() 521 auto enrolledInfo = userInfo in Dump() [all...] |
/base/security/dlp_permission_service/services/dlp_permission/sa/sa_common/ |
H A D | dlp_permission_serializer.h | 45 int32_t DeserializeAuthUserInfo(const unordered_json& accountInfoJson, AuthUserInfo& userInfo);
|
H A D | dlp_permission_serializer.cpp | 150 const AuthUserInfo& userInfo) in SerializeAuthUserInfo() 156 switch (userInfo.authPerm) { in SerializeAuthUserInfo() 181 authUsersJson[userInfo.authAccount.c_str()] = accountRight; in SerializeAuthUserInfo() 186 AuthUserInfo& userInfo) in DeserializeAuthUserInfo() 205 userInfo.authPerm = FULL_CONTROL; in DeserializeAuthUserInfo() 207 userInfo.authPerm = CONTENT_EDIT; in DeserializeAuthUserInfo() 209 userInfo.authPerm = READ_ONLY; in DeserializeAuthUserInfo() 212 userInfo.permExpiryTime = VALID_TIME_STAMP; in DeserializeAuthUserInfo() 213 userInfo.authAccountType = CLOUD_ACCOUNT; in DeserializeAuthUserInfo() 149 SerializeAuthUserInfo(unordered_json& authUsersJson, const AuthUserInfo& userInfo) SerializeAuthUserInfo() argument 185 DeserializeAuthUserInfo(const unordered_json& accountInfoJson, AuthUserInfo& userInfo) DeserializeAuthUserInfo() argument
|
/base/security/access_token/services/accesstokenmanager/main/cpp/src/token/ |
H A D | accesstoken_info_manager.cpp | 1468 for (const auto &userInfo : userList) { in ParseUserPolicyInfo() 1469 if (userInfo.userId < 0) { in ParseUserPolicyInfo() 1470 ACCESSTOKEN_LOG_WARN(LABEL, "userId %{public}d is invalid.", userInfo.userId); in ParseUserPolicyInfo() 1473 if (userInfo.isActive) { in ParseUserPolicyInfo() 1474 ACCESSTOKEN_LOG_INFO(LABEL, "userid %{public}d is active.", userInfo.userId); in ParseUserPolicyInfo() 1477 inactiveUserList_.emplace_back(userInfo.userId); in ParseUserPolicyInfo() 1478 changedUserList[userInfo.userId] = false; in ParseUserPolicyInfo() 1491 for (const auto &userInfo : userList) { in ParseUserPolicyInfo() 1492 if (userInfo.userId < 0) { in ParseUserPolicyInfo() 1493 ACCESSTOKEN_LOG_WARN(LABEL, "UserId %{public}d is invalid.", userInfo in ParseUserPolicyInfo() 1522 auto userInfo = changedUserList.find(infoPtr->GetUserID()); GetGoalHapList() local [all...] |
/base/security/device_auth/frameworks/deviceauth_lite/test/unittest/ |
H A D | deviceauth_test.cpp | 1397 struct hc_user_info userInfo = { in HWTEST_F() local 1407 int32_t trustedPeersNum = delete_local_auth_info(server, &userInfo); in HWTEST_F() 1425 struct hc_user_info userInfo = { in HWTEST_F() local 1432 int32_t trustedPeersNum = delete_local_auth_info(server, &userInfo); in HWTEST_F() 1514 struct hc_user_info userInfo = { in HWTEST_F() local 1521 int32_t ret = is_trust_peer(server, &userInfo); in HWTEST_F() 1539 struct hc_user_info userInfo = { in HWTEST_F() local 1546 int32_t ret = is_trust_peer(server, &userInfo); in HWTEST_F() 1564 struct hc_user_info userInfo = { in HWTEST_F() local 1574 int32_t ret = is_trust_peer(server, &userInfo); in HWTEST_F() 1592 struct hc_user_info userInfo = { HWTEST_F() local 1620 struct hc_user_info userInfo = { HWTEST_F() local 1650 struct hc_user_info userInfo = { HWTEST_F() local 1675 struct hc_user_info userInfo = { HWTEST_F() local [all...] |
/base/hiviewdfx/hiappevent/frameworks/native/libhiappevent/ |
H A D | hiappevent_userinfo.cpp | 44 static UserInfo userInfo;
in GetInstance() local 45 return userInfo;
in GetInstance()
|
/base/security/access_token/services/accesstokenmanager/main/cpp/src/service/ |
H A D | accesstoken_manager_stub.cpp | 850 UserState userInfo; in InitUserPolicyInner() local 851 if (!data.ReadInt32(userInfo.userId)) { in InitUserPolicyInner() 856 if (!data.ReadBool(userInfo.isActive)) { in InitUserPolicyInner() 861 userList.emplace_back(userInfo); in InitUserPolicyInner() 892 UserState userInfo; in UpdateUserPolicyInner() local 893 if (!data.ReadInt32(userInfo.userId)) { in UpdateUserPolicyInner() 898 if (!data.ReadBool(userInfo.isActive)) { in UpdateUserPolicyInner() 903 userList.emplace_back(userInfo); in UpdateUserPolicyInner()
|
/base/security/access_token/interfaces/innerkits/accesstoken/src/ |
H A D | accesstoken_manager_proxy.cpp | 1208 for (const auto& userInfo : userList) { in InitUserPolicy() 1209 if (!data.WriteInt32(userInfo.userId)) { in InitUserPolicy() 1213 if (!data.WriteBool(userInfo.isActive)) { in InitUserPolicy() 1280 for (const auto& userInfo : userList) { in UpdateUserPolicy() 1281 if (!data.WriteInt32(userInfo.userId)) { in UpdateUserPolicy() 1285 if (!data.WriteBool(userInfo.isActive)) { in UpdateUserPolicy()
|
/base/security/dlp_permission_service/interfaces/kits/napi_common/src/ |
H A D | napi_common.cpp | 1594 AuthUserInfo userInfo; in GetVectorAuthUser() local 1595 if (!GetStringValueByKey(env, obj, "authAccount", userInfo.authAccount)) { in GetVectorAuthUser() 1606 userInfo.authPerm = static_cast<DLPFileAccess>(perm); in GetVectorAuthUser() 1613 userInfo.permExpiryTime = static_cast<uint64_t>(time); in GetVectorAuthUser() 1620 userInfo.authAccountType = static_cast<DlpAccountType>(type); in GetVectorAuthUser() 1621 resultVec.push_back(userInfo); in GetVectorAuthUser()
|