Home
last modified time | relevance | path

Searched refs:authId (Results 1 – 25 of 196) sorted by relevance

12345678

/ohos5.0/foundation/communication/dsoftbus/core/authentication/src/virtual/
H A Dauth_meta_manager_virtual.c34 (void)authId; in AuthMetaReleaseVerify()
40 (void)authId; in AuthMetaEncrypt()
51 (void)authId; in AuthMetaDecrypt()
85 void AuthMetaCloseConn(int64_t authId) in AuthMetaCloseConn() argument
87 (void)authId; in AuthMetaCloseConn()
93 (void)authId; in AuthMetaPostTransData()
118 (void)authId; in AuthMetaSetP2pMac()
126 (void)authId; in AuthMetaGetConnInfo()
134 (void)authId; in AuthMetaGetServerSide()
142 (void)authId; in AuthMetaGetDeviceUuid()
[all …]
H A Dauth_interface_virtual.c48 void AuthHandleLeaveLNN(int64_t authId) in AuthHandleLeaveLNN() argument
50 (void)authId; in AuthHandleLeaveLNN()
180 (void)authId; in AuthEncrypt()
190 (void)authId; in AuthDecrypt()
198 int32_t AuthSetP2pMac(int64_t authId, const char *p2pMac) in AuthSetP2pMac() argument
200 (void)authId; in AuthSetP2pMac()
207 (void)authId; in AuthGetConnInfo()
214 (void)authId; in AuthGetServerSide()
221 (void)authId; in AuthGetDeviceUuid()
229 (void)authId; in AuthGetVersion()
[all …]
H A Dauth_meta_ptk_proc_virtual.c18 int32_t AuthGetPtkSyncInfoByAuthId(int64_t authId, bool *syncDone, int32_t *reason) in AuthGetPtkSyncInfoByAuthId() argument
20 (void)authId; in AuthGetPtkSyncInfoByAuthId()
33 int32_t AuthDelPtkSyncInfoFromPendingList(int64_t authId) in AuthDelPtkSyncInfoFromPendingList() argument
35 (void)authId; in AuthDelPtkSyncInfoFromPendingList()
39 int32_t AuthWaitingRequestCallback(int64_t authId) in AuthWaitingRequestCallback() argument
41 (void)authId; in AuthWaitingRequestCallback()
45 int32_t AuthNotifyResultByUuid(const char *uuid, int32_t reason, int64_t *authId) in AuthNotifyResultByUuid() argument
49 (void)authId; in AuthNotifyResultByUuid()
53 int32_t UpdateAuthSyncPtkInfoStatus(int64_t authId) in UpdateAuthSyncPtkInfoStatus() argument
55 (void)authId; in UpdateAuthSyncPtkInfoStatus()
/ohos5.0/foundation/communication/dsoftbus/core/transmission/trans_channel/auth/src/
H A Dtrans_auth_manager.c142 authId = info->authId; in GetAuthIdByChannelId()
163 if (info->authId == authId) { in GetChannelInfoByAuthId()
258 (*item)->authId = authId; in InitAuthChannelInfo()
284 if (item->authId == authId) { in OnRequsetUpdateAuthChannel()
464 .authId = authId in OnRecvAuthChannelRequest()
542 extra->authId = authId; in InitExtra()
746 if (item->authId == authId) { in DelAuthChannelInfoByAuthId()
920 extra->authId = authId; in FillAndReportEventEnd()
982 extra->authId = authId; in PostAuthMsg()
984 channel->authId = authId; in PostAuthMsg()
[all …]
/ohos5.0/base/security/huks/test/reliability/src/
H A Dapi_pressure_test.cpp642 ASSERT_NE(authId.data, nullptr); in GenerateRandomTest()
659 HKS_FREE(authId.data); in GenerateRandomTest()
998 (void)HksDeleteKey(&authId, nullptr);
1029 (void)HksDeleteKey(&authId, nullptr);
1059 (void)HksDeleteKey(&authId, nullptr);
1110 (void)HksDeleteKey(&authId, nullptr);
1140 (void)HksDeleteKey(&authId, nullptr);
1200 (void)HksDeleteKey(&authId, nullptr);
1243 (void)HksDeleteKey(&authId, nullptr);
1287 (void)HksDeleteKey(&authId, nullptr);
[all …]
H A Dpressure_test.cpp245 HksDeleteKey(&authId, paramInSet);
284 HksDeleteKey(&authId, paramInSet);
363 HksDeleteKey(&authId, paramInSet);
397 HksDeleteKey(&authId, paramInSet);
433 HKS_FREE(authId.data);
482 HksDeleteKey(&authId, paramInSet);
530 HksDeleteKey(&authId, paramInSet);
589 HksDeleteKey(&authId, paramInSet);
650 HksDeleteKey(&authId, paramInSet);
1213 ASSERT_NE(authId.data, nullptr);
[all …]
/ohos5.0/foundation/communication/dsoftbus/core/authentication/src/
H A Dauth_interface.c184 int64_t authId = AUTH_INVALID_ID; in AuthCheckSessionKeyValidByConnInfo() local
233 authHandle->type, authHandle->authId); in AuthCheckSessionKeyValidByAuthHandle()
239 authHandle->authId, authHandle->type); in AuthCheckSessionKeyValidByAuthHandle()
285 AuthMetaCloseConn(authHandle.authId); in AuthCloseConn()
346 authHandle->authId = AUTH_INVALID_ID; in AuthGetLatestIdByUuid()
465 *authId = auth->authId; in AuthDirectOnlineProcessSessionKey()
482 *authId = auth->authId; in AuthDirectOnlineWithoutSessionKey()
564 return AuthDeviceSetP2pMac(authId, p2pMac); in AuthSetP2pMac()
566 return AuthMetaSetP2pMac(authId, p2pMac); in AuthSetP2pMac()
595 return AuthDeviceGetVersion(authId, version); in AuthGetVersion()
[all …]
H A Dauth_manager.c210 if (item->authId == authId) { in FindAuthManagerByAuthId()
215 if (item->authId == authId) { in FindAuthManagerByAuthId()
494 authId = auth->authId; in GetAuthIdByConnId()
540 authId = auth->authId; in GetAuthIdByConnInfo()
585 authId = auth[i]->authId; in GetActiveAuthIdByConnInfo()
1358 int64_t authId = auth->authId; in HandleConnectionData() local
1416 authHandle.authId = auth[0]->authId; in HandleDecryptFailData()
1422 authHandle.authId = auth[1]->authId; in HandleDecryptFailData()
1856 handle[*num].authId = item->authId; in FillAuthHandleList()
1997 int64_t authId = auth->authId; in AuthDeviceGetIdByUuid() local
[all …]
H A Dauth_device.c278 int32_t AuthDeviceGetServerSide(int64_t authId, bool *isServer) in AuthDeviceGetServerSide() argument
284 AuthManager *auth = GetAuthManagerByAuthId(authId); in AuthDeviceGetServerSide()
299 AuthManager *auth = GetAuthManagerByAuthId(authId); in AuthDeviceGetDeviceUuid()
318 AuthManager *auth = GetAuthManagerByAuthId(authId); in AuthDeviceGetVersion()
583 request.authId = AUTH_INVALID_ID; in StartConnVerifyDevice()
602 request.authId = AUTH_INVALID_ID; in StartVerifyDevice()
614 requestId, authHandle.authId); in AuthStartReconnectDevice()
625 request.authId = authHandle.authId; in AuthStartReconnectDevice()
670 authHandle.authId = GetLatestIdByConnInfo(info); in AuthDeviceOpenConn()
671 if (authHandle.authId == AUTH_INVALID_ID) { in AuthDeviceOpenConn()
[all …]
/ohos5.0/base/security/device_auth/services/frameworks/src/module/
H A Ddev_auth_module_manager.c46 …ol IsParamsForDasTokenManagerValid(const char *pkgName, const char *serviceType, Uint8Buff *authId, in IsParamsForDasTokenManagerValid() argument
53 if (pkgName == NULL || serviceType == NULL || authId == NULL || authId->val == NULL) { in IsParamsForDasTokenManagerValid()
58 if (HcStrlen(pkgName) == 0 || HcStrlen(serviceType) == 0 || authId->length == 0) { in IsParamsForDasTokenManagerValid()
71 …ramsForDasTokenManagerValid(moduleParams->pkgName, moduleParams->serviceType, moduleParams->authId, in RegisterLocalIdentity()
86 .authId = { moduleParams->authId->val, moduleParams->authId->length }, in RegisterLocalIdentity()
99 …ramsForDasTokenManagerValid(moduleParams->pkgName, moduleParams->serviceType, moduleParams->authId, in UnregisterLocalIdentity()
114 .authId = { moduleParams->authId->val, moduleParams->authId->length }, in UnregisterLocalIdentity()
127 …ramsForDasTokenManagerValid(moduleParams->pkgName, moduleParams->serviceType, moduleParams->authId, in DeletePeerAuthInfo()
142 .authId = { moduleParams->authId->val, moduleParams->authId->length }, in DeletePeerAuthInfo()
157 moduleParams->authId, moduleParams->userType, moduleType)) { in GetPublicKey()
[all …]
/ohos5.0/foundation/communication/dsoftbus/core/authentication/include/
H A Dauth_meta_manager.h35 void AuthMetaReleaseVerify(int64_t authId);
37 int32_t AuthMetaEncrypt(int64_t authId, const uint8_t *inData, uint32_t inLen,
39 int32_t AuthMetaDecrypt(int64_t authId, const uint8_t *inData, uint32_t inLen,
45 void AuthMetaCloseConn(int64_t authId);
47 int32_t AuthMetaPostTransData(int64_t authId, const AuthTransData *dataInfo);
50 int32_t AuthMetaSetP2pMac(int64_t authId, const char *p2pMac);
51 int32_t AuthMetaGetConnInfo(int64_t authId, AuthConnInfo *connInfo);
52 int32_t AuthMetaGetServerSide(int64_t authId, bool *isServer);
53 int32_t AuthMetaGetDeviceUuid(int64_t authId, char *uuid, uint16_t size);
H A Dauth_meta_ptk_proc.h29 int32_t AuthGetPtkSyncInfoByAuthId(int64_t authId, bool *syncDone, int32_t *reason);
31 int32_t AuthDelPtkSyncInfoFromPendingList(int64_t authId);
32 int32_t AuthWaitingRequestCallback(int64_t authId);
33 int32_t AuthNotifyResultByUuid(const char *uuid, int32_t reason, int64_t *authId);
34 int32_t UpdateAuthSyncPtkInfoStatus(int64_t authId);
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/test/fuzztest/dellocalauthinfo_fuzzer/
H A Ddellocalauthinfo_fuzzer.cpp70 hc_auth_id authId; in DelLocalaAuthInfoFuzz() local
71 if (memset_s(&authId, sizeof(authId), 0, sizeof(authId)) != EOK) { in DelLocalaAuthInfoFuzz()
74 authId.length = size > HC_AUTH_ID_BUFF_LEN ? HC_AUTH_ID_BUFF_LEN : size; in DelLocalaAuthInfoFuzz()
75 if (memcpy_s(authId.auth_id, HC_AUTH_ID_BUFF_LEN, data, authId.length) != EOK) { in DelLocalaAuthInfoFuzz()
78 hc_user_info userInfo = {authId, 1}; in DelLocalaAuthInfoFuzz()
/ohos5.0/foundation/communication/dsoftbus/tests/core/transmission/common/mock/src/
H A Dtrans_auth_mock.cpp149 uint32_t AuthGetEncryptSize(int64_t authId, uint32_t inLen) in AuthGetEncryptSize() argument
151 return GetTransAuthInterface()->AuthGetEncryptSize(authId, inLen); in AuthGetEncryptSize()
159 int32_t AuthSetP2pMac(int64_t authId, const char *p2pMac) in AuthSetP2pMac() argument
161 return GetTransAuthInterface()->AuthSetP2pMac(authId, p2pMac); in AuthSetP2pMac()
169 int32_t AuthGetServerSide(int64_t authId, bool *isServer) in AuthGetServerSide() argument
174 int32_t AuthGetDeviceUuid(int64_t authId, char *uuid, uint16_t size) in AuthGetDeviceUuid() argument
179 int32_t AuthGetVersion(int64_t authId, SoftBusVersion *version) in AuthGetVersion() argument
181 return GetTransAuthInterface()->AuthGetVersion(authId, version); in AuthGetVersion()
184 int32_t AuthGetMetaType(int64_t authId, bool *isMetaAuth) in AuthGetMetaType() argument
195 void AuthMetaReleaseVerify(int64_t authId) in AuthMetaReleaseVerify() argument
[all …]
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/test/fuzztest/listtrustpeer_fuzzer/
H A Dlisttrustpeer_fuzzer.cpp81 hc_auth_id authId; in ListTrustPeerFuzz() local
82 if (memset_s(&authId, sizeof(authId), 0, sizeof(authId)) != EOK) { in ListTrustPeerFuzz()
85 authId.length = size > HC_AUTH_ID_BUFF_LEN ? HC_AUTH_ID_BUFF_LEN : size; in ListTrustPeerFuzz()
86 if (memcpy_s(authId.auth_id, HC_AUTH_ID_BUFF_LEN, data, authId.length) != EOK) { in ListTrustPeerFuzz()
89 list_trust_peers(handle, 0, &authId, &peerAuthidList); in ListTrustPeerFuzz()
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/asymmetric_alg_test/
H A Dhks_export_test_mt.cpp40 struct HksBlob authId = { strlen(keyAliasString), (uint8_t *)keyAliasString }; variable
51 ret = HksGenerateKeyForDe(&authId, paramInSet, nullptr); in RunTestCase()
93 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS);
108 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS);
121 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS);
136 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS);
154 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS);
170 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS);
185 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS);
200 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS);
[all …]
/ohos5.0/foundation/communication/dsoftbus/tests/core/authentication/unittest/
H A Dauth_other_test.cpp110 (void)authId; in OnDeviceDisconnectTest()
188 int64_t authId = 0; variable
246 int64_t authId = 0; variable
258 AuthHandle authHandle = { .authId = authId, .type = AUTH_LINK_TYPE_BLE };
301 int64_t authId = 0; variable
346 int64_t authId = 0; variable
391 int64_t authId = 10; variable
422 int64_t authId = 10; variable
455 int64_t authId = 1; variable
463 ret = RemoveUpdateSessionKeyFunc(&authId, &authId);
[all …]
H A Dauth_test.cpp919 int64_t authId = 0; variable
920 AuthHandle authHandle = { .authId = authId, .type = AUTH_LINK_TYPE_BLE };
1080 int64_t authId = 0; variable
1167 int64_t authId = 0; variable
1203 int64_t authId = 0; variable
1241 int64_t authId = 0; variable
1268 int64_t authId = 0; variable
1291 int64_t authId = 0; variable
1314 int64_t authId = 0; variable
1332 int64_t authId = 0; variable
[all …]
/ohos5.0/foundation/communication/dsoftbus/tests/core/transmission/trans_channel/proxy_channel/
H A Dtrans_proxy_channel_test.cpp135 chan->authHandle.authId = authId; in TestAddTestProxyChannel()
163 chan->authHandle.authId = AUTH_INVALID_ID;
185 chan->authHandle.authId = TEST_AUTHID;
217 info.authHandle.authId = AUTH_INVALID_ID;
236 info.authHandle.authId = AUTH_INVALID_ID;
270 info.authHandle.authId = AUTH_INVALID_ID;
297 info.authHandle.authId = AUTH_INVALID_ID;
320 info.authHandle.authId = AUTH_INVALID_ID;
351 info.authHandle.authId = AUTH_INVALID_ID;
375 info.authHandle.authId = AUTH_INVALID_ID;
[all …]
/ohos5.0/foundation/communication/wifi/wifi/services/wifi_standard/wifi_framework/wifi_toolkit/utils/
H A Dwifi_encryption_util.cpp95 struct HksBlob authId = wifiEncryptionInfo.keyAlias; in WifiEncryption() local
115 ret = GetKeyByAlias(&authId, encryParamSet); in WifiEncryption()
145 struct HksBlob authId = wifiEncryptionInfo.keyAlias; in WifiDecryption() local
171 int32_t ret = HksKeyExist(&authId, decryParamSet); in WifiDecryption()
260 struct HksBlob authId = wifiEncryptionInfo.keyAlias; in ImportKey() local
292 struct HksBlob authId = wifiEncryptionInfo.keyAlias; in DeleteKey() local
337 struct HksBlob authId = wifiEncryptionInfo.keyAlias; in EncryptParamSet() local
338 int32_t ret = HksKeyExist(&authId, *encryParamSet); in EncryptParamSet()
374 struct HksBlob authId = wifiEncryptionInfo.keyAlias; in DecryptParamSet() local
375 int32_t ret = HksKeyExist(&authId, *decryParamSet); in DecryptParamSet()
[all …]
/ohos5.0/foundation/communication/dsoftbus/tests/core/transmission/trans_channel/auth_channel/
H A Dtrans_auth_channel_test.cpp290 channel->authId = 1;
353 int32_t authId = -1; variable
358 OnAuthMsgDataRecv(authId, NULL);
361 OnAuthMsgDataRecv(authId, &data);
364 OnAuthMsgDataRecv(authId, &data);
376 int32_t authId = -1; variable
395 int32_t authId = -1; variable
459 info->authId = TRANS_TEST_AUTH_ID;
489 info->authId = TRANS_TEST_AUTH_ID;
590 info->authId = TRANS_TEST_AUTH_ID;
[all …]
/ohos5.0/foundation/communication/dsoftbus/core/authentication/interface/
H A Dauth_interface.h88 int64_t authId; /* for open p2p auth conn */ member
137 void AuthMetaReleaseVerify(int64_t authId);
199 uint32_t AuthGetEncryptSize(int64_t authId, uint32_t inLen);
203 int32_t AuthSetP2pMac(int64_t authId, const char *p2pMac);
206 int32_t AuthGetServerSide(int64_t authId, bool *isServer);
207 int32_t AuthGetDeviceUuid(int64_t authId, char *uuid, uint16_t size);
208 int32_t AuthGetVersion(int64_t authId, SoftBusVersion *version);
209 int32_t AuthGetMetaType(int64_t authId, bool *isMetaAuth);
221 const AuthConnInfo *connInfo, uint32_t requestId, NodeInfo *nodeInfo, int64_t *authId);
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/
H A Dpake_task_common.c142 const char *authId = GetStringFromJson(in, FIELD_SELF_AUTH_ID); in FillAuthId() local
143 if (authId == NULL) { in FillAuthId()
147 uint32_t authIdLen = HcStrlen(authId); in FillAuthId()
158 …params->baseParams.idSelf.val, params->baseParams.idSelf.length, authId, HcStrlen(authId)) != EOK)… in FillAuthId()
164 authId = GetStringFromJson(in, FIELD_PEER_AUTH_ID); in FillAuthId()
165 if (authId == NULL) { in FillAuthId()
169 authIdLen = HcStrlen(authId); in FillAuthId()
181 authId, HcStrlen(authId)) != EOK) { in FillAuthId()
/ohos5.0/base/security/huks/services/huks_standard/huks_engine/main/core/src/
H A Dhks_auth.c27 uint32_t authId; member
155 int32_t HksAuth(uint32_t authId, const struct HksKeyNode *keyNode, const struct HksParamSet *paramS… in HksAuth() argument
170 if (authId == g_authPolicyList[i].authId) { in HksAuth()
177 int32_t HksThreeStageAuth(uint32_t authId, const struct HuksKeyNode *keyNode) in HksThreeStageAuth() argument
180 if (authId == g_authPolicyList[i].authId) { in HksThreeStageAuth()
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/common/
H A Ddas_task_common.c202 const Uint8Buff *authId, Uint8Buff *keyAliasHash) in CombineKeyAlias() argument
206 keyAliasBuff.length = serviceId->length + authId->length + keyType->length; in CombineKeyAlias()
229 …if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, authId->val, authId->length) != EOK) { in CombineKeyAlias()
290 const Uint8Buff *authId, Uint8Buff *outKeyAlias) in CombineKeyAliasForIso() argument
295 int32_t res = CombineKeyAlias(serviceId, keyType, authId, outKeyAlias); in CombineKeyAliasForIso()
304 const Uint8Buff *authId, Uint8Buff *outKeyAlias) in CombineKeyAliasForPake() argument
319 res = CombineKeyAlias(serviceId, keyType, authId, &keyAliasHash); in CombineKeyAliasForPake()
348 const KeyAliasType keyType, const Uint8Buff *authId, Uint8Buff *outKeyAlias) in GenerateKeyAlias() argument
354 CHECK_PTR_RETURN_ERROR_CODE(authId, "authId"); in GenerateKeyAlias()
355 CHECK_PTR_RETURN_ERROR_CODE(authId->val, "authId->val"); in GenerateKeyAlias()
[all …]

12345678