/ohos5.0/foundation/communication/bluetooth_service/services/bluetooth/stack/src/hci/cmd/ |
H A D | hci_cmd.c | 44 uint16_t opCode; member 111 uint16_t opCode = 0; in HciCmdTimeoutTask() local 118 opCode = pCmd->opCode; in HciCmdTimeoutTask() 127 if (opCode == 0) { in HciCmdTimeoutTask() 131 HciCmdOnCommandStatus(opCode, HCI_TIMEOUT); in HciCmdTimeoutTask() 181 header->opCode = opCode; in HciCreateCmdPacket() 194 header->opCode = opCode; in HciCreateCmdPacketWithParam() 205 cmd->opCode = opCode; in HciAllocCmd() 275 if (opCode == cmd->opCode) { in HciCmdOnCommandStatus() 312 void HciCmdOnCommandComplete(uint16_t opCode) in HciCmdOnCommandComplete() argument [all …]
|
H A D | hci_cmd_failure.c | 28 void HciOnCmdFailed(uint16_t opCode, uint8_t status, const void *param) in HciOnCmdFailed() argument 30 switch (GET_OGF(opCode)) { in HciOnCmdFailed() 34 HciOnLinkControlCmdFailed(opCode, status, param); in HciOnCmdFailed() 39 HciOnLinkPolicyCmdFailed(opCode, status, param); in HciOnCmdFailed() 44 HciOnControllerBasebandCmdFailed(opCode, status, param); in HciOnCmdFailed() 49 HciOnInformationalParametersCmdFailed(opCode, status, param); in HciOnCmdFailed() 54 HciOnStatusParametersCmdFailed(opCode, status, param); in HciOnCmdFailed() 59 HciOnLeControllerCmdFailed(opCode, status, param); in HciOnCmdFailed()
|
H A D | hci_cmd.h | 29 uint16_t opCode; member 40 void HciCmdOnCommandComplete(uint16_t opCode); 41 void HciCmdOnCommandStatus(uint16_t opCode, uint8_t status); 43 HciCmd *HciAllocCmd(uint16_t opCode, const void *param, size_t paramLength);
|
/ohos5.0/base/security/access_token/interfaces/innerkits/token_setproc/src/ |
H A D | perm_setproc.cpp | 35 uint32_t opCode; member 62 uint32_t opCode = opCodeList[i]; in AddPermissionToKernel() local 63 uint32_t idx = opCode / UINT32_T_BITS; in AddPermissionToKernel() 64 uint32_t bitIdx = opCode % UINT32_T_BITS; in AddPermissionToKernel() 100 int32_t SetPermissionToKernel(uint32_t tokenID, int32_t opCode, bool status) in SetPermissionToKernel() argument 104 .opCode = opCode, in SetPermissionToKernel() 121 int32_t GetPermissionFromKernel(uint32_t tokenID, int32_t opCode, bool& isGranted) in GetPermissionFromKernel() argument 125 .opCode = opCode, in GetPermissionFromKernel()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_task_common.c | 41 if (params->opCode == AUTHENTICATE) { in ConstructOutJson() 92 GOTO_ERR_AND_SET_RET(AddIntToJson(sendToSelf, FIELD_OPERATION_CODE, params->opCode), res); in SendResultToSelf() 163 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in FillAuthId() 241 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in FillNonce() 257 if (GetIntFromJson(in, FIELD_OPERATION_CODE, &(params->opCode)) != HC_SUCCESS) { in FillDasPakeParams() 259 params->opCode = AUTHENTICATE; in FillDasPakeParams() 261 if (params->opCode != OP_BIND && params->opCode != OP_UNBIND && in FillDasPakeParams() 262 params->opCode != AUTHENTICATE && params->opCode != AUTH_KEY_AGREEMENT) { in FillDasPakeParams() 263 LOGE("Unsupported opCode: %d.", params->opCode); in FillDasPakeParams() 277 if (params->opCode != AUTH_KEY_AGREEMENT) { in FillDasPakeParams() [all …]
|
H A D | pake_message_util.c | 33 if (AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode) != HC_SUCCESS) { in PackagePakeRequestData() 37 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PackagePakeRequestData() 72 if (params->opCode == AUTHENTICATE || params->opCode == AUTH_KEY_AGREEMENT) { in ParsePakeRequestMessage() 95 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PackagePakeResponseData() 142 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in ParsePakeResponseMessage()
|
/ohos5.0/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/common/src/relational/ |
H A D | prepared_stmt.cpp | 20 PreparedStmt::PreparedStmt(ExecutorOperation opCode, const std::string &sql, const std::vector<std:… in PreparedStmt() argument 21 : opCode_(opCode), sql_(sql), bindArgs_(bindArgs) {} in PreparedStmt() 24 void PreparedStmt::SetOpCode(ExecutorOperation opCode) in SetOpCode() argument 26 opCode_ = opCode; in SetOpCode() 117 int opCode = 0; in DeSerialize() local 118 (void)parcel.ReadInt(opCode); in DeSerialize() 119 if (parcel.IsError() || opCode <= MIN_LIMIT || opCode >= MAX_LIMIT) { in DeSerialize() 122 opCode_ = static_cast<ExecutorOperation>(opCode); in DeSerialize()
|
/ohos5.0/base/security/access_token/frameworks/common/src/ |
H A D | permission_map.cpp | 521 bool TransferPermissionToOpcode(const std::string& permission, uint32_t& opCode) in TransferPermissionToOpcode() argument 527 opCode = i; in TransferPermissionToOpcode() 534 bool TransferOpcodeToPermission(uint32_t opCode, std::string& permission) in TransferOpcodeToPermission() argument 536 if (opCode >= MAX_PERM_SIZE || opCode >= g_permMap.size()) { in TransferOpcodeToPermission() 539 permission = g_permMap[opCode].first; in TransferOpcodeToPermission()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_client_protocol_task.c | 66 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PakeRequest() 67 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in PakeRequest() 78 …if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND || params->opCode == AUTH_KEY_AG… in PakeRequest() 105 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in ParseMsgForClientConfirm() 106 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in ParseMsgForClientConfirm() 164 if (params->isPskSupported && (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND)) { in PakeClientConfirm() 249 res = ClientProtocolMessageOut(out, params->opCode, step); in Process()
|
H A D | pake_v1_server_protocol_task.c | 65 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PackageMsgForResponse() 66 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in PackageMsgForResponse() 95 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PakeResponse() 96 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in PakeResponse() 107 if (params->isPskSupported && (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND)) { in PakeResponse() 214 res = ServerProtocolMessageOut(out, params->opCode, step); in Process()
|
/ohos5.0/foundation/communication/bluetooth_service/services/bluetooth/service/src/ble/ble_scan_filter/src/ |
H A D | ble_scan_filter_lsf.cpp | 356 uint16_t opCode = MakeVendorOpCode(HCI_VENDOR_OCF_GET_CAPABILITIES); in BleScanFilterGetVendorCapabilities() local 359 return HCIVIF_SendCmd(opCode, &version, 1); in BleScanFilterGetVendorCapabilities() 364 uint16_t opCode = MakeVendorOpCode(HCI_VENDOR_OCF_LSF); in BleScanFilterEnable() local 377 uint16_t opCode = MakeVendorOpCode(HCI_VENDOR_OCF_LSF); in BleScanFilterSetParameters() local 398 uint16_t opCode = MakeVendorOpCode(HCI_VENDOR_OCF_LSF); in BleScanFilterAddressAdd() local 413 uint16_t opCode = MakeVendorOpCode(HCI_VENDOR_OCF_LSF); in BleScanFilterUuidAdd() local 462 uint16_t opCode = MakeVendorOpCode(HCI_VENDOR_OCF_LSF); in BleScanFilterNameAdd() local 490 uint16_t opCode = MakeVendorOpCode(HCI_VENDOR_OCF_LSF); in BleScanFilterManufacturerDataAdd() local 549 uint16_t opCode = MakeVendorOpCode(HCI_VENDOR_OCF_LSF); in BleScanFilterServiceDataAdd() local 595 (opCode != MakeVendorOpCode(HCI_VENDOR_OCF_LSF))) { in VendEventCommandCompleteCallback() [all …]
|
/ohos5.0/base/security/access_token/services/privacymanager/src/record/ |
H A D | permission_record_manager.cpp | 164 (record1.opCode != record2.opCode) || in RecordMergeCheck() 311 int32_t opCode; in GetPermissionRecord() local 325 record.opCode = opCode; in GetPermissionRecord() 515 (opCode == record.opCode) && in InsteadMergedRecIfNecessary() 763 int32_t opCode; in AddRecordToStartList() local 790 record.opCode = opCode; in AddRecordToStartList() 866 int32_t opCode; in RemoveRecordFromStartList() local 879 if ((it->opCode != opCode) || (it->tokenId != tokenId)) { in RemoveRecordFromStartList() 971 if (it->opCode != opCode) { in RemoveRecordFromStartListByOp() 1014 int32_t opCode; in ExecuteAndUpdateRecordByPerm() local [all …]
|
/ohos5.0/drivers/hdf_core/framework/tools/hc-gen/src/ |
H A D | decompile.cpp | 200 std::shared_ptr<AstObject> Decompile::RebuildNumberObject(uint8_t opCode) in RebuildNumberObject() argument 206 switch (opCode) { in RebuildNumberObject() 240 uint32_t opCode = 0; in RebuildArray() local 241 if (!GetNextByteCode(opCode)) { in RebuildArray() 244 auto element = RebuildObject(opCode); in RebuildArray() 264 std::shared_ptr<AstObject> Decompile::RebuildObject(uint8_t opCode) in RebuildObject() argument 266 switch (opCode) { in RebuildObject() 277 return RebuildNumberObject(opCode); in RebuildObject() 283 Logger().Error() << "Rebuild object failed, unknown OpCode is: " << opCode; in RebuildObject()
|
H A D | bytecode_gen.h | 18 OpCode() : opCode(0), size(0) {} in OpCode() 20 OpCode(uint8_t code, uint32_t s, const std::string &str) : opCode(code), size(s), opStr(str) {} in OpCode() 24 uint8_t opCode; member
|
/ohos5.0/base/security/device_auth/services/ |
H A D | device_auth.c | 331 int32_t opCode = GetOpCodeFromContext(context); in AddClientReqInfoToContext() local 336 if (opCode == MEMBER_JOIN) { in AddClientReqInfoToContext() 523 int32_t opCode; in CheckBindParams() local 528 if ((isClient && opCode == MEMBER_INVITE) || (!isClient && opCode == MEMBER_JOIN)) { in CheckBindParams() 664 if (opCode == MEMBER_INVITE) { in AddServerReqInfoToContext() 756 int32_t opCode; in OpenServerBindSession() local 759 opCode = MEMBER_JOIN; in OpenServerBindSession() 1058 int32_t opCode = AUTH_FORM_ACCOUNT_UNRELATED; in OpenServerAuthSession() local 1061 opCode = AUTH_FORM_INVALID_TYPE; in OpenServerAuthSession() 1096 int32_t opCode = P2P_BIND; in OpenServerAuthSessionForP2P() local [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/ |
H A D | account_module.c | 38 int32_t opCode; in IsAccountMsgNeedIgnore() local 39 if (GetIntFromJson(in, FIELD_OPERATION_CODE, &opCode) != HC_SUCCESS) { in IsAccountMsgNeedIgnore() 44 if (opCode == OP_BIND) { in IsAccountMsgNeedIgnore() 46 } else if (opCode == AUTHENTICATE) { in IsAccountMsgNeedIgnore() 49 LOGE("Invalid opCode: %d.", opCode); in IsAccountMsgNeedIgnore()
|
/ohos5.0/foundation/communication/bluetooth_service/services/bluetooth/stack/include/ |
H A D | hci_vendor_if.h | 35 …void (*hciCommandCompleteEvent)(uint16_t opCode, const void *param, uint8_t paramLength, void *con… 66 int BTSTACK_API HCIVIF_SendCmd(uint16_t opCode, const void *param, size_t paramLength); 75 void HciEventOnVendorCommandComplete(uint16_t opCode, const void *param, uint8_t paramLength);
|
/ohos5.0/base/hiviewdfx/faultloggerd/interfaces/innerkits/unwinder/ |
H A D | dwarf_cfa_instructions.cpp | 55 uint8_t opCode; in Iterate() local 56 if (!memory_->ReadU8(instPtr, &opCode, true)) { in Iterate() 60 if (!DecodeDwCfa(opCode, cie, pcOffset, instPtr, rsState)) { in Iterate() 68 bool DwarfCfaInstructions::DecodeDwCfa(uint8_t opCode, CommonInfoEntry cie, in DecodeDwCfa() argument 77 switch (opCode) { in DecodeDwCfa() 274 uint8_t operand = opCode & 0x3F; in DecodeDwCfa() 276 switch (opCode & 0xC0) { in DecodeDwCfa() 302 LOGU("DW_CFA_unknown: opcode=0x%02x", opCode); in DecodeDwCfa()
|
/ohos5.0/foundation/communication/bluetooth_service/services/bluetooth/stack/src/hci/ |
H A D | hci_vendor_if.c | 147 int HCIVIF_SendCmd(uint16_t opCode, const void *param, size_t paramLength) in HCIVIF_SendCmd() argument 149 HciCmd *cmd = HciAllocCmd(opCode, param, paramLength); in HCIVIF_SendCmd() 153 NO_SANITIZE("cfi") void HciEventOnVendorCommandComplete(uint16_t opCode, const void *param, uint8_t… in HciEventOnVendorCommandComplete() argument 165 block->callback->hciCommandCompleteEvent(opCode, param, paramLength, block->context); in HciEventOnVendorCommandComplete()
|
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v1/compatible_bind_sub_session/ |
H A D | compatible_bind_sub_session.c | 141 subSession->opCode = opCode; in CreateBaseBindSubSession() 152 if (!IsCreateGroupNeeded(isClient, opCode)) { in GenerateKeyPairIfNeeded() 223 res = CheckServerStatusIfNotInvite(session->osAccountId, session->opCode, jsonParams); in GenerateServerBindParams() 231 return GenerateKeyPairIfNeeded(session->osAccountId, SERVER, session->opCode, jsonParams); in GenerateServerBindParams() 811 result = AddInfoToBindData((session->opCode == MEMBER_JOIN), session, *sendData); in PrepareServerData() 856 int32_t opCode = MEMBER_INVITE; in CreateClientBindSubSession() local 857 if (GetIntFromJson(jsonParams, FIELD_OPERATION_CODE, &opCode) != HC_SUCCESS) { in CreateClientBindSubSession() 862 int32_t result = CheckClientStatus(opCode, jsonParams); in CreateClientBindSubSession() 874 result = GenerateKeyPairIfNeeded(subSession->osAccountId, CLIENT, opCode, jsonParams); in CreateClientBindSubSession() 902 int32_t opCode = MEMBER_INVITE; in CreateServerBindSubSession() local [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/ |
H A D | pake_v1_client_task.c | 67 switch (realTask->params.opCode) { in CreateNextTask() 79 LOGE("Unsupported opCode: %d.", realTask->params.opCode); in CreateNextTask() 83 … LOGE("Create and process next task failed, opcode: %d, res: %d.", realTask->params.opCode, res); in CreateNextTask() 94 LOGI("End client task successfully, opcode: %d.", realTask->params.opCode); in CreateNextTask()
|
H A D | pake_v1_server_task.c | 67 switch (realTask->params.opCode) { in CreateNextTask() 79 LOGE("Unsupported opCode: %d.", realTask->params.opCode); in CreateNextTask() 83 … LOGE("Create and process next task failed, opcode: %d, res: %d.", realTask->params.opCode, res); in CreateNextTask() 94 LOGI("End server task successfully, opcode: %d.", realTask->params.opCode); in CreateNextTask()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/ |
H A D | iso_task_common.c | 125 GOTO_ERR_AND_SET_RET(AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode), ret); in GenerateEncResult() 205 GOTO_ERR_AND_SET_RET(AddIntToJson(sendToSelf, FIELD_OPERATION_CODE, params->opCode), res); in GenEncResult() 364 if (params->opCode == OP_BIND) { in FillAuthId() 442 if (params->opCode == OP_BIND) { in FillPin() 503 if (params->opCode == OP_UNBIND || params->opCode == OP_BIND) { in GetUpgradeFlagAndKeyLength() 522 if (GetIntFromJson(in, FIELD_OPERATION_CODE, &(params->opCode)) != 0) { in InitIsoParams() 524 params->opCode = AUTHENTICATE; in InitIsoParams() 526 … if (params->opCode != OP_BIND && params->opCode != OP_UNBIND && params->opCode != AUTHENTICATE) { in InitIsoParams() 527 LOGE("Unsupported opCode: %d.", params->opCode); in InitIsoParams() 642 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in GeneratePsk()
|
/ohos5.0/base/security/access_token/services/privacymanager/src/common/ |
H A D | constant.cpp | 84 bool Constant::TransferPermissionToOpcode(const std::string& permissionName, int32_t& opCode) in TransferPermissionToOpcode() argument 89 opCode = PERMISSION_OPCODE_MAP.at(permissionName); in TransferPermissionToOpcode() 93 bool Constant::TransferOpcodeToPermission(int32_t opCode, std::string& permissionName) in TransferOpcodeToPermission() argument 96 [opCode](const std::map<std::string, int32_t>::value_type item) { in TransferOpcodeToPermission() 97 return item.second == opCode; in TransferOpcodeToPermission()
|
/ohos5.0/base/security/access_token/frameworks/common/include/ |
H A D | permission_map.h | 25 bool TransferPermissionToOpcode(const std::string& permissionName, uint32_t& opCode); 26 bool TransferOpcodeToPermission(uint32_t opCode, std::string& permissionName);
|