/foundation/resourceschedule/ffrt/src/core/ |
H A D | version_ctx.h | 26 * 0、data represents the root node of this data signature 32 VersionCtx(const void* signature, VersionCtx* next, VersionCtx* last) in VersionCtx() 33 : signature(signature), next(next), last(last) {}; in VersionCtx() 35 const void* signature; member
|
H A D | entity.cpp | 45 auto data = std::as_const(Entity::Instance()->vaMap).find(next->signature); in RecycleVersion()
|
H A D | version_ctx.cpp | 109 last = new (SimpleAllocator<VersionCtx>::AllocMem()) VersionCtx(this->signature, this, prev); in CreateChildVersion()
|
/foundation/resourceschedule/ffrt/src/dm/ |
H A D | sdependence_manager.cpp | 62 // signature去重:1)outs去重 in RemoveRepeatedDeps() 67 // signature去重:2)ins去重(不影响功能,skip);3)ins不和outs重复(当前不支持weak signature) in RemoveRepeatedDeps() 120 outsNoDup.push_back(handle); // handle作为任务的输出signature in onSubmit() 220 if (waitData->signature == out->signature) { in onWait() 308 for (auto signature : inDeps) { in MapSignature2Deps() 313 if (parentOut->signature == signature) { in MapSignature2Deps() 321 if (parentIn->signature in MapSignature2Deps() [all...] |
/foundation/ability/ability_base/interfaces/kits/native/want/src/ |
H A D | array_wrapper.cpp | 258 char signature = arrayStr[0]; in Parse() local 259 if (signature != String::SIGNATURE && signature != Boolean::SIGNATURE && signature != Byte::SIGNATURE && in Parse() 260 signature != Short::SIGNATURE && signature != Integer::SIGNATURE && signature != Long::SIGNATURE && in Parse() 261 signature != Float::SIGNATURE && signature != Double::SIGNATURE && signature ! in Parse() [all...] |
/foundation/bundlemanager/bundle_framework/services/bundlemgr/include/ |
H A D | zip_file.h | 34 // local file header signature 4 bytes (0x04034b50) 46 uint32_t signature = 0; member 61 // central file header signature 4 bytes (0x02014b50) 79 uint32_t signature = 0; member 99 // end of central dir signature 4 bytes (0x06054b50) 113 uint32_t signature = 0; member 124 // data descriptor signature 4 bytes (0x06054b50) 131 uint32_t signature = 0; member
|
H A D | bundle_permission_mgr.h | 137 static bool MatchSignature(const DefaultPermission &permission, const std::string &signature);
|
H A D | bundle_install_checker.h | 65 * @brief Check signature info of multiple haps. 67 * @param hapVerifyRes Indicates the signature info. 68 * @return Returns ERR_OK if the every hap has signature info and all haps have same signature info. 112 * @param hapVerifyRes Indicates all signature info of all haps. 219 bool MatchSignature(const std::vector<std::string> &appSignatures, const std::string &signature);
|
/foundation/bundlemanager/bundle_framework_lite/services/bundlemgr_lite/include/ |
H A D | zip_file.h | 37 // local file header signature 4 bytes (0x04034b50) 49 uint32_t signature = 0; member 64 // central file header signature 4 bytes (0x02014b50) 82 uint32_t signature = 0; member 102 uint32_t signature = 0; member 113 // data descriptor signature 4 bytes (0x06054b50) 120 uint32_t signature = 0; member
|
/foundation/ability/ability_base/interfaces/kits/native/extractortool/include/ |
H A D | zip_file.h | 39 // local file header signature 4 bytes (0x04034b50) 51 uint32_t signature = 0; member 66 // central file header signature 4 bytes (0x02014b50) 84 uint32_t signature = 0; member 104 // end of central dir signature 4 bytes (0x06054b50) 118 uint32_t signature = 0; member 129 // data descriptor signature 4 bytes (0x06054b50) 136 uint32_t signature = 0; member
|
/foundation/communication/bluetooth_service/services/bluetooth/stack/src/gap/ |
H A D | gap_le_sec.c | 37 uint8_t signature[GAP_SIGNATURE_SIZE]; member 1110 callback(info->result, info->signature, info->context); in GapDoSignatureCallback() 1140 uint8_t signature[GAP_SIGNATURE_SIZE] = {0}; in GAP_LeDataSignatureGeneration() local 1142 callback(GAP_SIGNATURE_ERR_EXECUTION, signature, context); in GAP_LeDataSignatureGeneration() 1147 callback(GAP_SIGNATURE_ERR_EXECUTION, signature, context); in GAP_LeDataSignatureGeneration() 1175 callback(GAP_SIGNATURE_ERR_EXECUTION, signature, context); in GAP_LeDataSignatureGeneration() 1182 const uint8_t signature[GAP_SIGNATURE_SIZE], GAPSignatureConfirmationResult callback, void *context) in GAP_LeDataSignatureConfirmation() 1196 uint32_t counter = *(uint32_t *)signature; in GAP_LeDataSignatureConfirmation() 1200 (void)memcpy_s(info->signature, GAP_SIGNATURE_SIZE, signature, GAP_SIGNATURE_SIZ in GAP_LeDataSignatureConfirmation() 1181 GAP_LeDataSignatureConfirmation(const BtAddr *addr, GapSignatureData dataInfo, const uint8_t signature[GAP_SIGNATURE_SIZE], GAPSignatureConfirmationResult callback, void *context) GAP_LeDataSignatureConfirmation() argument [all...] |
H A D | gap_le.h | 508 * @brief generation a data signature 520 * @brief Confirmation a data signature 523 * @param[in] signature signature data 530 const uint8_t signature[GAP_SIGNATURE_SIZE], GAPSignatureConfirmationResult callback, void *context);
|
H A D | gap_le_if.c | 227 uint8_t signature[GAP_SIGNATURE_SIZE]; member 1714 GAP_LeDataSignatureConfirmation(info->addr, info->dataInfo, info->signature, info->callback, info->context); in GapLeDataSignatureConfirmationTask() 1725 const uint8_t signature[GAP_SIGNATURE_SIZE], GAPSignatureConfirmationResult callback, void *context) in GAPIF_LeDataSignatureConfirmationAsync() 1737 (void)memcpy_s(ctx->signature, GAP_SIGNATURE_SIZE, signature, GAP_SIGNATURE_SIZE); in GAPIF_LeDataSignatureConfirmationAsync() 1724 GAPIF_LeDataSignatureConfirmationAsync(const BtAddr *addr, GapSignatureData dataInfo, const uint8_t signature[GAP_SIGNATURE_SIZE], GAPSignatureConfirmationResult callback, void *context) GAPIF_LeDataSignatureConfirmationAsync() argument
|
/foundation/bundlemanager/bundle_framework_lite/services/bundlemgr_lite/src/ |
H A D | zip_file.cpp | 75 (endDir.signature != EOCD_SIGNATURE) || in CheckEndDir() 135 if (directoryEntry.signature != CENTRAL_SIGNATURE) { in ParseAllEntries() 137 "parse entry(%{public}d) check signature(0x%{public}08x) at pos(0x%{public}08llx) failed", in ParseAllEntries() 138 i, directoryEntry.signature, currentPos); in ParseAllEntries() 296 if (dataDesc.signature != DATA_DESC_SIGNATURE) { in CheckDataDesc() 297 HILOG_ERROR(HILOG_MODULE_APP, "check local header check datadesc signature failed"); in CheckDataDesc() 338 if ((localHeader.signature != LOCAL_HEADER_SIGNATURE) || in CheckCoherencyLocalHeader() 340 HILOG_ERROR(HILOG_MODULE_APP, "check local header signature or compressionMethod failed"); in CheckCoherencyLocalHeader() 380 // get data offset, add signature+localheader+namesize+extrasize in SeekToEntryStart()
|
/foundation/bundlemanager/bundle_framework/services/bundlemgr/src/ |
H A D | zip_file.cpp | 70 if ((endDir.numDisk != 0) || (endDir.signature != EOCD_SIGNATURE) || (endDir.startDiskOfCentralDir != 0) || in CheckEndDir() 131 if (directoryEntry.signature != CENTRAL_SIGNATURE) { in ParseAllEntries() 132 APP_LOGE("parse entry(%{public}d) check signature(0x%08x) at pos(0x%08llx) failed", in ParseAllEntries() 134 directoryEntry.signature, in ParseAllEntries() 313 if (dataDesc.signature != DATA_DESC_SIGNATURE) { in CheckDataDesc() 314 APP_LOGE("check local header check datadesc signature failed"); in CheckDataDesc() 355 if ((localHeader.signature != LOCAL_HEADER_SIGNATURE) || in CheckCoherencyLocalHeader() 357 APP_LOGE("check local header signature or compressionMethod failed"); in CheckCoherencyLocalHeader() 397 // get data offset, add signature+localheader+namesize+extrasize in SeekToEntryStart()
|
H A D | bundle_permission_mgr.cpp | 374 for (const auto &signature : permission.appSignature) { in MatchSignature() 375 if (std::find(signatures.begin(), signatures.end(), signature) != signatures.end()) { in MatchSignature() 384 const DefaultPermission &permission, const std::string &signature) in MatchSignature() 386 if (permission.appSignature.empty() || signature.empty()) { in MatchSignature() 387 LOG_W(BMS_TAG_DEFAULT, "appSignature or signature is empty"); in MatchSignature() 391 signature) != permission.appSignature.end(); in MatchSignature() 383 MatchSignature( const DefaultPermission &permission, const std::string &signature) MatchSignature() argument
|
H A D | bundle_install_checker.cpp | 207 // on emulator if check signature failed clear appid in CheckMultipleHapsSignInfo() 730 LOG_E(BMS_TAG_INSTALLER, "%{public}s signature not match the capability list", newInfo.GetBundleName().c_str()); in GetPrivilegeCapability() 1184 for (const auto &signature : appSignatures) { in FetchPrivilegeCapabilityFromPreConfig() 1185 if (MatchSignature(configInfo.appSignature, signature)) { in FetchPrivilegeCapabilityFromPreConfig() 1191 LOG_NOFUNC_E(BMS_TAG_INSTALLER, "bundleName: %{public}s signature verify failed in capability list", in FetchPrivilegeCapabilityFromPreConfig() 1240 for (const auto &signature : appSignatures) { in MatchOldSignatures() 1241 if (std::find(oldAppIds.begin(), oldAppIds.end(), signature) != oldAppIds.end()) { in MatchOldSignatures() 1250 const std::vector<std::string> &appSignatures, const std::string &signature) in MatchSignature() 1252 if (appSignatures.empty() || signature.empty()) { in MatchSignature() 1253 LOG_NOFUNC_W(BMS_TAG_INSTALLER, "appSignature of signature i in MatchSignature() 1249 MatchSignature( const std::vector<std::string> &appSignatures, const std::string &signature) MatchSignature() argument [all...] |
/foundation/communication/bluetooth_service/services/bluetooth/stack/src/att/ |
H A D | att_receive.c | 57 uint8_t *data, const uint8_t *dataBuffer, size_t buffSize, uint8_t signature[12]); 1468 uint8_t signature[12] = {0}; in AttSignedWriteCommand() local 1481 AttSignWriteCommConfDataAssign(data, dataBuffer, buffSize, signature); in AttSignedWriteCommand() 1483 if (buffSize < (sizeof(signature) - 1)) { in AttSignedWriteCommand() 1487 gapSignatureDataObj.dataLen = buffSize - (sizeof(signature) - 1); in AttSignedWriteCommand() 1492 uint8_t *arrayPtr = signature; in AttSignedWriteCommand() 1499 sizeof(signature), in AttSignedWriteCommand() 1500 data + (buffSize - sizeof(signature)), in AttSignedWriteCommand() 1501 sizeof(signature)); in AttSignedWriteCommand() 1502 bufferNew = BufferSliceMalloc(buffer, STEP_TWO, buffSize - sizeof(signature) in AttSignedWriteCommand() 1912 AttSignWriteCommConfDataAssign( uint8_t *data, const uint8_t *dataBuffer, size_t buffSize, uint8_t signature[12]) AttSignWriteCommConfDataAssign() argument [all...] |
H A D | att_send_request.c | 86 * @brief callback of gap signature result async. 126 * @brief callback of gap signature result async destroy.. 143 * @brief callback of gap signature result. 146 * @param2 signature Indicates the pointer to array. 149 void AttGapSignatureGenerationResult(GAP_SignatureResult result, uint8_t signature[GAP_SIGNATURE_SIZE], void *context) in AttGapSignatureGenerationResult() argument 162 signatureResultPtr[i] = signature[i]; in AttGapSignatureGenerationResult() 1275 uint8_t signature[12] = {0}; in AttSignedWriteCommandAsync() local 1276 Packet *packet = PacketMalloc(0, 0, sizeof(uint8_t) + sizeof(uint16_t) + bufferSize + sizeof(signature)); in AttSignedWriteCommandAsync()
|
/foundation/ability/ability_base/interfaces/kits/native/extractortool/src/ |
H A D | zip_file.cpp | 123 if ((endDir.numDisk != 0) || (endDir.signature != EOCD_SIGNATURE) || (endDir.startDiskOfCentralDir != 0) || in CheckEndDir() 128 ABILITYBASE_LOGW("failed:fileLen: %{public}llu, signature: %{public}u, numDisk: %{public}hu, " in CheckEndDir() 131 fileLength_, endDir.signature, endDir.numDisk, endDir.startDiskOfCentralDir, endDir.totalEntriesInThisDisk, in CheckEndDir() 173 if (directoryEntry.signature != CENTRAL_SIGNATURE) { in ParseOneEntry() 174 ABILITYBASE_LOGE("check signature failed"); in ParseOneEntry() 626 if (dataDesc.signature != DATA_DESC_SIGNATURE) { in CheckDataDesc() 627 ABILITYBASE_LOGE("check signature failed"); in CheckDataDesc() 671 if ((localHeader.signature != LOCAL_HEADER_SIGNATURE) || in CheckCoherencyLocalHeader() 673 ABILITYBASE_LOGE("signature or compressionMethod failed"); in CheckCoherencyLocalHeader() 699 // get data offset, add signature in GetEntryStart() [all...] |
/foundation/bundlemanager/bundle_framework/services/bundlemgr/test/mock/src/ |
H A D | bundle_permission_mgr.cpp | 263 const std::string &signature)
in MatchSignature() 262 MatchSignature(const DefaultPermission &permission, const std::string &signature) MatchSignature() argument
|
/foundation/communication/bluetooth_service/services/bluetooth/stack/include/ |
H A D | gap_le_if.h | 314 * @brief BLE signature key structure 418 * @brief BLE signature algorithm result 428 * @brief BLE signature algorithm data PDU 436 GAP_SignatureResult result, uint8_t signature[GAP_SIGNATURE_SIZE], void *context); 907 * @brief generation a data signature 919 * @brief Confirmation a data signature 922 * @param[in] signature signature data 929 const uint8_t signature[GAP_SIGNATURE_SIZE], GAPSignatureConfirmationResult callback, void *context);
|
/foundation/graphic/graphic_3d/lume/metaobject/include/meta/ext/ |
H A D | event_impl.h | 49 CORE_LOG_E("Invalid function signature for meta function call"); in Call() 67 template<typename BaseClass, typename signature = typename BaseClass::FunctionType>
|
/foundation/communication/bluetooth_service/services/bluetooth/stack/src/smp/ |
H A D | smp.c | 1726 uint8_t signature[SMP_SIGNATURE_LEN] = {0}; in SMP_GenerateSignatureStep3() local 1736 (void)memcpy_s(signature, sizeof(signature), (uint8_t *)&pEncCmdData->signCounter, SMP_SIGNCOUNTER_LEN); in SMP_GenerateSignatureStep3() 1737 (void)memcpy_s(signature + SMP_SIGNCOUNTER_LEN, in SMP_GenerateSignatureStep3() 1741 SMP_NotifyCbGenSign(SMP_GENERATE_SIGN_STATUS_SUCCESS, signature); in SMP_GenerateSignatureStep3()
|
/foundation/bundlemanager/bundle_framework/services/bundlemgr/test/unittest/bms_service_startup_test/ |
H A D | bms_service_startup_test.cpp | 560 std::string signature = ""; in HWTEST_F() local 562 signatures.insert(signatures.end(), signature); in HWTEST_F() 1009 const std::string signature = "appSignature1"; in HWTEST_F() local 1010 bool result = BundlePermissionMgr::MatchSignature(permission, signature); in HWTEST_F()
|