/ohos5.0/foundation/communication/dsoftbus/core/authentication/src/virtual/ |
H A D | auth_meta_manager_virtual.c | 34 (void)authId; in AuthMetaReleaseVerify() 40 (void)authId; in AuthMetaEncrypt() 51 (void)authId; in AuthMetaDecrypt() 85 void AuthMetaCloseConn(int64_t authId) in AuthMetaCloseConn() argument 87 (void)authId; in AuthMetaCloseConn() 93 (void)authId; in AuthMetaPostTransData() 118 (void)authId; in AuthMetaSetP2pMac() 126 (void)authId; in AuthMetaGetConnInfo() 134 (void)authId; in AuthMetaGetServerSide() 142 (void)authId; in AuthMetaGetDeviceUuid() [all …]
|
H A D | auth_interface_virtual.c | 48 void AuthHandleLeaveLNN(int64_t authId) in AuthHandleLeaveLNN() argument 50 (void)authId; in AuthHandleLeaveLNN() 180 (void)authId; in AuthEncrypt() 190 (void)authId; in AuthDecrypt() 198 int32_t AuthSetP2pMac(int64_t authId, const char *p2pMac) in AuthSetP2pMac() argument 200 (void)authId; in AuthSetP2pMac() 207 (void)authId; in AuthGetConnInfo() 214 (void)authId; in AuthGetServerSide() 221 (void)authId; in AuthGetDeviceUuid() 229 (void)authId; in AuthGetVersion() [all …]
|
H A D | auth_meta_ptk_proc_virtual.c | 18 int32_t AuthGetPtkSyncInfoByAuthId(int64_t authId, bool *syncDone, int32_t *reason) in AuthGetPtkSyncInfoByAuthId() argument 20 (void)authId; in AuthGetPtkSyncInfoByAuthId() 33 int32_t AuthDelPtkSyncInfoFromPendingList(int64_t authId) in AuthDelPtkSyncInfoFromPendingList() argument 35 (void)authId; in AuthDelPtkSyncInfoFromPendingList() 39 int32_t AuthWaitingRequestCallback(int64_t authId) in AuthWaitingRequestCallback() argument 41 (void)authId; in AuthWaitingRequestCallback() 45 int32_t AuthNotifyResultByUuid(const char *uuid, int32_t reason, int64_t *authId) in AuthNotifyResultByUuid() argument 49 (void)authId; in AuthNotifyResultByUuid() 53 int32_t UpdateAuthSyncPtkInfoStatus(int64_t authId) in UpdateAuthSyncPtkInfoStatus() argument 55 (void)authId; in UpdateAuthSyncPtkInfoStatus()
|
/ohos5.0/foundation/communication/dsoftbus/core/transmission/trans_channel/auth/src/ |
H A D | trans_auth_manager.c | 142 authId = info->authId; in GetAuthIdByChannelId() 163 if (info->authId == authId) { in GetChannelInfoByAuthId() 258 (*item)->authId = authId; in InitAuthChannelInfo() 284 if (item->authId == authId) { in OnRequsetUpdateAuthChannel() 464 .authId = authId in OnRecvAuthChannelRequest() 542 extra->authId = authId; in InitExtra() 746 if (item->authId == authId) { in DelAuthChannelInfoByAuthId() 920 extra->authId = authId; in FillAndReportEventEnd() 982 extra->authId = authId; in PostAuthMsg() 984 channel->authId = authId; in PostAuthMsg() [all …]
|
/ohos5.0/base/security/huks/test/reliability/src/ |
H A D | api_pressure_test.cpp | 642 ASSERT_NE(authId.data, nullptr); in GenerateRandomTest() 659 HKS_FREE(authId.data); in GenerateRandomTest() 998 (void)HksDeleteKey(&authId, nullptr); 1029 (void)HksDeleteKey(&authId, nullptr); 1059 (void)HksDeleteKey(&authId, nullptr); 1110 (void)HksDeleteKey(&authId, nullptr); 1140 (void)HksDeleteKey(&authId, nullptr); 1200 (void)HksDeleteKey(&authId, nullptr); 1243 (void)HksDeleteKey(&authId, nullptr); 1287 (void)HksDeleteKey(&authId, nullptr); [all …]
|
H A D | pressure_test.cpp | 245 HksDeleteKey(&authId, paramInSet); 284 HksDeleteKey(&authId, paramInSet); 363 HksDeleteKey(&authId, paramInSet); 397 HksDeleteKey(&authId, paramInSet); 433 HKS_FREE(authId.data); 482 HksDeleteKey(&authId, paramInSet); 530 HksDeleteKey(&authId, paramInSet); 589 HksDeleteKey(&authId, paramInSet); 650 HksDeleteKey(&authId, paramInSet); 1213 ASSERT_NE(authId.data, nullptr); [all …]
|
/ohos5.0/foundation/communication/dsoftbus/core/authentication/src/ |
H A D | auth_interface.c | 184 int64_t authId = AUTH_INVALID_ID; in AuthCheckSessionKeyValidByConnInfo() local 233 authHandle->type, authHandle->authId); in AuthCheckSessionKeyValidByAuthHandle() 239 authHandle->authId, authHandle->type); in AuthCheckSessionKeyValidByAuthHandle() 285 AuthMetaCloseConn(authHandle.authId); in AuthCloseConn() 346 authHandle->authId = AUTH_INVALID_ID; in AuthGetLatestIdByUuid() 465 *authId = auth->authId; in AuthDirectOnlineProcessSessionKey() 482 *authId = auth->authId; in AuthDirectOnlineWithoutSessionKey() 564 return AuthDeviceSetP2pMac(authId, p2pMac); in AuthSetP2pMac() 566 return AuthMetaSetP2pMac(authId, p2pMac); in AuthSetP2pMac() 595 return AuthDeviceGetVersion(authId, version); in AuthGetVersion() [all …]
|
H A D | auth_manager.c | 210 if (item->authId == authId) { in FindAuthManagerByAuthId() 215 if (item->authId == authId) { in FindAuthManagerByAuthId() 494 authId = auth->authId; in GetAuthIdByConnId() 540 authId = auth->authId; in GetAuthIdByConnInfo() 585 authId = auth[i]->authId; in GetActiveAuthIdByConnInfo() 1358 int64_t authId = auth->authId; in HandleConnectionData() local 1416 authHandle.authId = auth[0]->authId; in HandleDecryptFailData() 1422 authHandle.authId = auth[1]->authId; in HandleDecryptFailData() 1856 handle[*num].authId = item->authId; in FillAuthHandleList() 1997 int64_t authId = auth->authId; in AuthDeviceGetIdByUuid() local [all …]
|
H A D | auth_device.c | 278 int32_t AuthDeviceGetServerSide(int64_t authId, bool *isServer) in AuthDeviceGetServerSide() argument 284 AuthManager *auth = GetAuthManagerByAuthId(authId); in AuthDeviceGetServerSide() 299 AuthManager *auth = GetAuthManagerByAuthId(authId); in AuthDeviceGetDeviceUuid() 318 AuthManager *auth = GetAuthManagerByAuthId(authId); in AuthDeviceGetVersion() 583 request.authId = AUTH_INVALID_ID; in StartConnVerifyDevice() 602 request.authId = AUTH_INVALID_ID; in StartVerifyDevice() 614 requestId, authHandle.authId); in AuthStartReconnectDevice() 625 request.authId = authHandle.authId; in AuthStartReconnectDevice() 670 authHandle.authId = GetLatestIdByConnInfo(info); in AuthDeviceOpenConn() 671 if (authHandle.authId == AUTH_INVALID_ID) { in AuthDeviceOpenConn() [all …]
|
/ohos5.0/base/security/device_auth/services/frameworks/src/module/ |
H A D | dev_auth_module_manager.c | 46 …ol IsParamsForDasTokenManagerValid(const char *pkgName, const char *serviceType, Uint8Buff *authId, in IsParamsForDasTokenManagerValid() argument 53 if (pkgName == NULL || serviceType == NULL || authId == NULL || authId->val == NULL) { in IsParamsForDasTokenManagerValid() 58 if (HcStrlen(pkgName) == 0 || HcStrlen(serviceType) == 0 || authId->length == 0) { in IsParamsForDasTokenManagerValid() 71 …ramsForDasTokenManagerValid(moduleParams->pkgName, moduleParams->serviceType, moduleParams->authId, in RegisterLocalIdentity() 86 .authId = { moduleParams->authId->val, moduleParams->authId->length }, in RegisterLocalIdentity() 99 …ramsForDasTokenManagerValid(moduleParams->pkgName, moduleParams->serviceType, moduleParams->authId, in UnregisterLocalIdentity() 114 .authId = { moduleParams->authId->val, moduleParams->authId->length }, in UnregisterLocalIdentity() 127 …ramsForDasTokenManagerValid(moduleParams->pkgName, moduleParams->serviceType, moduleParams->authId, in DeletePeerAuthInfo() 142 .authId = { moduleParams->authId->val, moduleParams->authId->length }, in DeletePeerAuthInfo() 157 moduleParams->authId, moduleParams->userType, moduleType)) { in GetPublicKey() [all …]
|
/ohos5.0/foundation/communication/dsoftbus/core/authentication/include/ |
H A D | auth_meta_manager.h | 35 void AuthMetaReleaseVerify(int64_t authId); 37 int32_t AuthMetaEncrypt(int64_t authId, const uint8_t *inData, uint32_t inLen, 39 int32_t AuthMetaDecrypt(int64_t authId, const uint8_t *inData, uint32_t inLen, 45 void AuthMetaCloseConn(int64_t authId); 47 int32_t AuthMetaPostTransData(int64_t authId, const AuthTransData *dataInfo); 50 int32_t AuthMetaSetP2pMac(int64_t authId, const char *p2pMac); 51 int32_t AuthMetaGetConnInfo(int64_t authId, AuthConnInfo *connInfo); 52 int32_t AuthMetaGetServerSide(int64_t authId, bool *isServer); 53 int32_t AuthMetaGetDeviceUuid(int64_t authId, char *uuid, uint16_t size);
|
H A D | auth_meta_ptk_proc.h | 29 int32_t AuthGetPtkSyncInfoByAuthId(int64_t authId, bool *syncDone, int32_t *reason); 31 int32_t AuthDelPtkSyncInfoFromPendingList(int64_t authId); 32 int32_t AuthWaitingRequestCallback(int64_t authId); 33 int32_t AuthNotifyResultByUuid(const char *uuid, int32_t reason, int64_t *authId); 34 int32_t UpdateAuthSyncPtkInfoStatus(int64_t authId);
|
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/test/fuzztest/dellocalauthinfo_fuzzer/ |
H A D | dellocalauthinfo_fuzzer.cpp | 70 hc_auth_id authId; in DelLocalaAuthInfoFuzz() local 71 if (memset_s(&authId, sizeof(authId), 0, sizeof(authId)) != EOK) { in DelLocalaAuthInfoFuzz() 74 authId.length = size > HC_AUTH_ID_BUFF_LEN ? HC_AUTH_ID_BUFF_LEN : size; in DelLocalaAuthInfoFuzz() 75 if (memcpy_s(authId.auth_id, HC_AUTH_ID_BUFF_LEN, data, authId.length) != EOK) { in DelLocalaAuthInfoFuzz() 78 hc_user_info userInfo = {authId, 1}; in DelLocalaAuthInfoFuzz()
|
/ohos5.0/foundation/communication/dsoftbus/tests/core/transmission/common/mock/src/ |
H A D | trans_auth_mock.cpp | 149 uint32_t AuthGetEncryptSize(int64_t authId, uint32_t inLen) in AuthGetEncryptSize() argument 151 return GetTransAuthInterface()->AuthGetEncryptSize(authId, inLen); in AuthGetEncryptSize() 159 int32_t AuthSetP2pMac(int64_t authId, const char *p2pMac) in AuthSetP2pMac() argument 161 return GetTransAuthInterface()->AuthSetP2pMac(authId, p2pMac); in AuthSetP2pMac() 169 int32_t AuthGetServerSide(int64_t authId, bool *isServer) in AuthGetServerSide() argument 174 int32_t AuthGetDeviceUuid(int64_t authId, char *uuid, uint16_t size) in AuthGetDeviceUuid() argument 179 int32_t AuthGetVersion(int64_t authId, SoftBusVersion *version) in AuthGetVersion() argument 181 return GetTransAuthInterface()->AuthGetVersion(authId, version); in AuthGetVersion() 184 int32_t AuthGetMetaType(int64_t authId, bool *isMetaAuth) in AuthGetMetaType() argument 195 void AuthMetaReleaseVerify(int64_t authId) in AuthMetaReleaseVerify() argument [all …]
|
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/test/fuzztest/listtrustpeer_fuzzer/ |
H A D | listtrustpeer_fuzzer.cpp | 81 hc_auth_id authId; in ListTrustPeerFuzz() local 82 if (memset_s(&authId, sizeof(authId), 0, sizeof(authId)) != EOK) { in ListTrustPeerFuzz() 85 authId.length = size > HC_AUTH_ID_BUFF_LEN ? HC_AUTH_ID_BUFF_LEN : size; in ListTrustPeerFuzz() 86 if (memcpy_s(authId.auth_id, HC_AUTH_ID_BUFF_LEN, data, authId.length) != EOK) { in ListTrustPeerFuzz() 89 list_trust_peers(handle, 0, &authId, &peerAuthidList); in ListTrustPeerFuzz()
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/asymmetric_alg_test/ |
H A D | hks_export_test_mt.cpp | 40 struct HksBlob authId = { strlen(keyAliasString), (uint8_t *)keyAliasString }; variable 51 ret = HksGenerateKeyForDe(&authId, paramInSet, nullptr); in RunTestCase() 93 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS); 108 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS); 121 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS); 136 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS); 154 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS); 170 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS); 185 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS); 200 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS); [all …]
|
/ohos5.0/foundation/communication/dsoftbus/tests/core/authentication/unittest/ |
H A D | auth_other_test.cpp | 110 (void)authId; in OnDeviceDisconnectTest() 188 int64_t authId = 0; variable 246 int64_t authId = 0; variable 258 AuthHandle authHandle = { .authId = authId, .type = AUTH_LINK_TYPE_BLE }; 301 int64_t authId = 0; variable 346 int64_t authId = 0; variable 391 int64_t authId = 10; variable 422 int64_t authId = 10; variable 455 int64_t authId = 1; variable 463 ret = RemoveUpdateSessionKeyFunc(&authId, &authId); [all …]
|
H A D | auth_test.cpp | 919 int64_t authId = 0; variable 920 AuthHandle authHandle = { .authId = authId, .type = AUTH_LINK_TYPE_BLE }; 1080 int64_t authId = 0; variable 1167 int64_t authId = 0; variable 1203 int64_t authId = 0; variable 1241 int64_t authId = 0; variable 1268 int64_t authId = 0; variable 1291 int64_t authId = 0; variable 1314 int64_t authId = 0; variable 1332 int64_t authId = 0; variable [all …]
|
/ohos5.0/foundation/communication/dsoftbus/tests/core/transmission/trans_channel/proxy_channel/ |
H A D | trans_proxy_channel_test.cpp | 135 chan->authHandle.authId = authId; in TestAddTestProxyChannel() 163 chan->authHandle.authId = AUTH_INVALID_ID; 185 chan->authHandle.authId = TEST_AUTHID; 217 info.authHandle.authId = AUTH_INVALID_ID; 236 info.authHandle.authId = AUTH_INVALID_ID; 270 info.authHandle.authId = AUTH_INVALID_ID; 297 info.authHandle.authId = AUTH_INVALID_ID; 320 info.authHandle.authId = AUTH_INVALID_ID; 351 info.authHandle.authId = AUTH_INVALID_ID; 375 info.authHandle.authId = AUTH_INVALID_ID; [all …]
|
/ohos5.0/foundation/communication/wifi/wifi/services/wifi_standard/wifi_framework/wifi_toolkit/utils/ |
H A D | wifi_encryption_util.cpp | 95 struct HksBlob authId = wifiEncryptionInfo.keyAlias; in WifiEncryption() local 115 ret = GetKeyByAlias(&authId, encryParamSet); in WifiEncryption() 145 struct HksBlob authId = wifiEncryptionInfo.keyAlias; in WifiDecryption() local 171 int32_t ret = HksKeyExist(&authId, decryParamSet); in WifiDecryption() 260 struct HksBlob authId = wifiEncryptionInfo.keyAlias; in ImportKey() local 292 struct HksBlob authId = wifiEncryptionInfo.keyAlias; in DeleteKey() local 337 struct HksBlob authId = wifiEncryptionInfo.keyAlias; in EncryptParamSet() local 338 int32_t ret = HksKeyExist(&authId, *encryParamSet); in EncryptParamSet() 374 struct HksBlob authId = wifiEncryptionInfo.keyAlias; in DecryptParamSet() local 375 int32_t ret = HksKeyExist(&authId, *decryParamSet); in DecryptParamSet() [all …]
|
/ohos5.0/foundation/communication/dsoftbus/tests/core/transmission/trans_channel/auth_channel/ |
H A D | trans_auth_channel_test.cpp | 290 channel->authId = 1; 353 int32_t authId = -1; variable 358 OnAuthMsgDataRecv(authId, NULL); 361 OnAuthMsgDataRecv(authId, &data); 364 OnAuthMsgDataRecv(authId, &data); 376 int32_t authId = -1; variable 395 int32_t authId = -1; variable 459 info->authId = TRANS_TEST_AUTH_ID; 489 info->authId = TRANS_TEST_AUTH_ID; 590 info->authId = TRANS_TEST_AUTH_ID; [all …]
|
/ohos5.0/foundation/communication/dsoftbus/core/authentication/interface/ |
H A D | auth_interface.h | 88 int64_t authId; /* for open p2p auth conn */ member 137 void AuthMetaReleaseVerify(int64_t authId); 199 uint32_t AuthGetEncryptSize(int64_t authId, uint32_t inLen); 203 int32_t AuthSetP2pMac(int64_t authId, const char *p2pMac); 206 int32_t AuthGetServerSide(int64_t authId, bool *isServer); 207 int32_t AuthGetDeviceUuid(int64_t authId, char *uuid, uint16_t size); 208 int32_t AuthGetVersion(int64_t authId, SoftBusVersion *version); 209 int32_t AuthGetMetaType(int64_t authId, bool *isMetaAuth); 221 const AuthConnInfo *connInfo, uint32_t requestId, NodeInfo *nodeInfo, int64_t *authId);
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_task_common.c | 142 const char *authId = GetStringFromJson(in, FIELD_SELF_AUTH_ID); in FillAuthId() local 143 if (authId == NULL) { in FillAuthId() 147 uint32_t authIdLen = HcStrlen(authId); in FillAuthId() 158 …params->baseParams.idSelf.val, params->baseParams.idSelf.length, authId, HcStrlen(authId)) != EOK)… in FillAuthId() 164 authId = GetStringFromJson(in, FIELD_PEER_AUTH_ID); in FillAuthId() 165 if (authId == NULL) { in FillAuthId() 169 authIdLen = HcStrlen(authId); in FillAuthId() 181 authId, HcStrlen(authId)) != EOK) { in FillAuthId()
|
/ohos5.0/base/security/huks/services/huks_standard/huks_engine/main/core/src/ |
H A D | hks_auth.c | 27 uint32_t authId; member 155 int32_t HksAuth(uint32_t authId, const struct HksKeyNode *keyNode, const struct HksParamSet *paramS… in HksAuth() argument 170 if (authId == g_authPolicyList[i].authId) { in HksAuth() 177 int32_t HksThreeStageAuth(uint32_t authId, const struct HuksKeyNode *keyNode) in HksThreeStageAuth() argument 180 if (authId == g_authPolicyList[i].authId) { in HksThreeStageAuth()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/common/ |
H A D | das_task_common.c | 202 const Uint8Buff *authId, Uint8Buff *keyAliasHash) in CombineKeyAlias() argument 206 keyAliasBuff.length = serviceId->length + authId->length + keyType->length; in CombineKeyAlias() 229 …if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, authId->val, authId->length) != EOK) { in CombineKeyAlias() 290 const Uint8Buff *authId, Uint8Buff *outKeyAlias) in CombineKeyAliasForIso() argument 295 int32_t res = CombineKeyAlias(serviceId, keyType, authId, outKeyAlias); in CombineKeyAliasForIso() 304 const Uint8Buff *authId, Uint8Buff *outKeyAlias) in CombineKeyAliasForPake() argument 319 res = CombineKeyAlias(serviceId, keyType, authId, &keyAliasHash); in CombineKeyAliasForPake() 348 const KeyAliasType keyType, const Uint8Buff *authId, Uint8Buff *outKeyAlias) in GenerateKeyAlias() argument 354 CHECK_PTR_RETURN_ERROR_CODE(authId, "authId"); in GenerateKeyAlias() 355 CHECK_PTR_RETURN_ERROR_CODE(authId->val, "authId->val"); in GenerateKeyAlias() [all …]
|