/ohos5.0/foundation/graphic/graphic_2d/rosen/test/render_service/render_service_base/unittest/memory/ |
H A D | rs_interface_code_access_verifier_base_test.cpp | 45 ASSERT_EQ(verifier->IsSystemCalling(callingCode), true); 58 ASSERT_EQ(verifier->CheckPermission(code), true); 124 auto tokenID = verifier->GetTokenID(); 141 auto tokenID = verifier->GetTokenID(); 157 ASSERT_EQ(verifier->CheckPermission(code), true); 199 auto ret = verifier->GetPermissions(interfaceName); 201 verifier->AddPermission(interfaceName, newPermission); 202 ret = verifier->GetPermissions(interfaceName); 215 ASSERT_EQ(verifier->GetInterfacePermissionSize(), 0); 227 ASSERT_EQ(verifier->IsSystemApp(), false); [all …]
|
/ohos5.0/foundation/graphic/graphic_2d/rosen/test/render_service/render_service/fuzztest/rstransaction_fuzzer/ |
H A D | rstransaction_fuzzer.cpp | 62 RSIRenderServiceConnectionInterfaceCodeAccessVerifier verifier; in RSIRenderServiceConnectionIpcInterFaceCodeAccessVerifierFuzztest001() local 63 verifier.IsExclusiveVerificationPassed(code); in RSIRenderServiceConnectionIpcInterFaceCodeAccessVerifierFuzztest001() 67 verifier.IsAccessTimesVerificationPassed(code, times); in RSIRenderServiceConnectionIpcInterFaceCodeAccessVerifierFuzztest001() 83 RSIRenderServiceConnectionInterfaceCodeAccessVerifier verifier; in RSIRenderServiceConnectionIpcInterFaceCodeAccessVerifierFuzztest002() local 86 verifier.IsExclusiveVerificationPassed(code); in RSIRenderServiceConnectionIpcInterFaceCodeAccessVerifierFuzztest002() 89 verifier.IsExclusiveVerificationPassed(code); in RSIRenderServiceConnectionIpcInterFaceCodeAccessVerifierFuzztest002() 92 verifier.IsExclusiveVerificationPassed(code); in RSIRenderServiceConnectionIpcInterFaceCodeAccessVerifierFuzztest002() 95 verifier.IsExclusiveVerificationPassed(code); in RSIRenderServiceConnectionIpcInterFaceCodeAccessVerifierFuzztest002() 98 verifier.IsExclusiveVerificationPassed(code); in RSIRenderServiceConnectionIpcInterFaceCodeAccessVerifierFuzztest002() 101 verifier.IsExclusiveVerificationPassed(code); in RSIRenderServiceConnectionIpcInterFaceCodeAccessVerifierFuzztest002() [all …]
|
/ohos5.0/base/useriam/user_auth_framework/services/core/src/ |
H A D | schedule_node_builder.cpp | 33 const std::shared_ptr<ResourceNode> &verifier) in ScheduleNodeBuilder() argument 35 verifier_(verifier) in ScheduleNodeBuilder() 147 info_.verifier = verifier_; in Build() 161 const std::shared_ptr<ResourceNode> &verifier) in CheckExecutors() argument 168 if (!verifier) { in CheckExecutors() 173 if (collector->GetAuthType() != verifier->GetAuthType()) { in CheckExecutors() 178 if (collector->GetExecutorMatcher() != verifier->GetExecutorMatcher()) { in CheckExecutors() 184 if (collector == verifier && collector->GetExecutorRole() == ALL_IN_ONE) { in CheckExecutors() 197 const std::shared_ptr<ResourceNode> &verifier) in New() argument 199 auto result = ScheduleNodeBuilder::CheckExecutors(collector, verifier); in New() [all …]
|
H A D | schedule_node_impl.cpp | 118 return info_.verifier; in GetVerifyExecutor() 292 auto verifier = info_.verifier.lock(); in GetDescription() local 353 auto verifier = info_.verifier.lock(); in ProcessBeginVerifier() local 377 auto verifier = info_.verifier.lock(); in ProcessBeginCollector() local 384 if (collector == verifier) { in ProcessBeginCollector() 407 auto verifier = info_.verifier.lock(); in NotifyCollectorReady() local 408 if (verifier == nullptr) { in NotifyCollectorReady() 442 auto verifier = info_.verifier.lock(); in ProcessEndCollector() local 448 if (collector == verifier) { in ProcessEndCollector() 466 auto verifier = info_.verifier.lock(); in ProcessEndVerifier() local [all …]
|
H A D | schedule_node_helper.cpp | 61 std::shared_ptr<ResourceNode> verifier; in ScheduleInfoToScheduleNode() local 65 if (!ScheduleInfoToExecutors(info, collector, verifier, collectorMessage, verifierMessage)) { in ScheduleInfoToScheduleNode() 73 auto builder = ScheduleNode::Builder::New(collector, verifier); in ScheduleInfoToScheduleNode() 106 std::shared_ptr<ResourceNode> &verifier, std::vector<uint8_t> &collectorMessage, in ScheduleInfoToExecutors() argument 127 verifier = resource; in ScheduleInfoToExecutors() 133 verifier = resource; in ScheduleInfoToExecutors() 147 if (verifier == nullptr) { in ScheduleInfoToExecutors()
|
H A D | schedule_resource_node_listener.cpp | 39 auto verifier = scheduleNode->GetVerifyExecutor().lock(); in OnResourceNodePoolDelete() local 40 if (collector == resource || verifier == resource) { in OnResourceNodePoolDelete()
|
/ohos5.0/foundation/graphic/graphic_2d/rosen/test/render_service/render_service/fuzztest/rsirenderserviceipcinterfacecodeaccessverifier_fuzzer/ |
H A D | rsirenderserviceipcinterfacecodeaccessverifier_fuzzer.cpp | 62 RSIRenderServiceInterfaceCodeAccessVerifier verifier; in RSIRenderServiceInterfaceCodeAccessVerifierFuzztest() local 63 verifier.IsExclusiveVerificationPassed(code); in RSIRenderServiceInterfaceCodeAccessVerifierFuzztest() 67 verifier.permissionRSIRenderServiceInterfaceMappings_.emplace(code, permission); in RSIRenderServiceInterfaceCodeAccessVerifierFuzztest() 68 verifier.permissionRSIRenderServiceInterfaceMappings_.emplace(code + 1, "unknown"); in RSIRenderServiceInterfaceCodeAccessVerifierFuzztest() 69 verifier.AddRSIRenderServiceConnectionInterfaceCodePermission(); in RSIRenderServiceInterfaceCodeAccessVerifierFuzztest() 70 verifier.accessRSIRenderServiceInterfaceTimesRestrictions_.emplace(code, code); in RSIRenderServiceInterfaceCodeAccessVerifierFuzztest() 71 verifier.IsAccessTimesVerificationPassed(code, times); in RSIRenderServiceInterfaceCodeAccessVerifierFuzztest()
|
/ohos5.0/base/update/updater/test/unittest/package/ |
H A D | pkg_verify_unittest.cpp | 203 HashDataVerifier verifier {nullptr}; in TestHashDataVerifierFailed01() local 204 EXPECT_FALSE(verifier.LoadHashDataAndPkcs7("")); in TestHashDataVerifierFailed01() 215 HashDataVerifier verifier {pkgManager_}; in TestHashDataVerifierFailed02() local 216 EXPECT_FALSE(verifier.LoadHashDataAndPkcs7(testPackagePath + invalidPkgPath)); in TestHashDataVerifierFailed02() 219 EXPECT_FALSE(verifier.LoadHashDataAndPkcs7("invalid package path")); in TestHashDataVerifierFailed02() 230 HashDataVerifier verifier {pkgManager_}; in TestHashDataVerifierFailed03() local 239 HashDataVerifier verifier {pkgManager_}; in TestHashDataVerifierFailed04() local 255 EXPECT_TRUE(verifier.VerifyHashData("build_tools/", fileName, outStream)); in VerifyFileByVerifier() 256 EXPECT_FALSE(verifier.VerifyHashData("build_tools/", "invalid", outStream)); in VerifyFileByVerifier() 266 HashDataVerifier verifier {pkgManager_}; in TestHashDataVerifierSuccess() local [all …]
|
/ohos5.0/commonlibrary/rust/ylong_http/ylong_http_client/src/util/config/tls/ |
H A D | mod.rs | 17 mod verifier; module 18 pub(crate) use verifier::DefaultCertVerifier; 19 pub use verifier::{CertVerifier, ServerCerts};
|
/ohos5.0/docs/zh-cn/application-dev/security/CryptoArchitectureKit/ |
H A D | crypto-ecdsa-sign-sig-verify.md | 55 let verifier = cryptoFramework.createVerify(verifyAlg); 56 await verifier.init(pubKey); 57 await verifier.update(input1); // 如果明文较短,可以直接调用verify接口一次性传入 58 let res = await verifier.verify(input2, signMessageBlob); 94 let verifier = cryptoFramework.createVerify(verifyAlg); 95 verifier.initSync(pubKey); 96 verifier.updateSync(input1); // 如果明文较短,可以直接调用verify接口一次性传入 97 let res = verifier.verifySync(input2, signMessageBlob);
|
H A D | crypto-sm2-sign-sig-verify-pkcs1.md | 55 let verifier = cryptoFramework.createVerify(verifyAlg); 56 await verifier.init(pubKey); 57 await verifier.update(input1); // 如果明文较短,可以直接调用verify接口一次性传入 58 let res = await verifier.verify(input2, signMessageBlob); 94 let verifier = cryptoFramework.createVerify(verifyAlg); 95 verifier.initSync(pubKey); 96 verifier.updateSync(input1); // 如果明文较短,可以直接调用verify接口一次性传入 97 let res = verifier.verifySync(input2, signMessageBlob);
|
H A D | crypto-rsa-sign-sig-verify-pkcs1.md | 62 let verifier = cryptoFramework.createVerify(verifyAlg); 63 await verifier.init(pubKey); 64 await verifier.update(input1); // 如果明文较短,可以直接调用verify接口一次性传入 65 let res = await verifier.verify(input2, signMessageBlob); 101 let verifier = cryptoFramework.createVerify(verifyAlg); 102 verifier.initSync(pubKey); 103 verifier.updateSync(input1); // 如果明文较短,可以直接调用verify接口一次性传入 104 let res = verifier.verifySync(input2, signMessageBlob);
|
H A D | crypto-rsa-sign-sig-verify-recover-pkcs1.md | 46 let verifier = cryptoFramework.createVerify(verifyAlg); 47 await verifier.init(pubKey); 48 let rawSignData = await verifier.recover(signMessageBlob); 81 let verifier = cryptoFramework.createVerify(verifyAlg); 82 verifier.initSync(pubKey); 83 let rawSignData = verifier.recoverSync(signMessageBlob);
|
H A D | crypto-rsa-sign-sig-verify-pkcs1-by-segment.md | 60 let verifier = cryptoFramework.createVerify(verifyAlg); 61 await verifier.init(pubKey); 67 await verifier.update(updateMessageBlob); 70 let res = await verifier.verify(null, signMessageBlob); 120 let verifier = cryptoFramework.createVerify(verifyAlg); 121 verifier.initSync(pubKey); 127 verifier.updateSync(updateMessageBlob); 130 let res = verifier.verifySync(null, signMessageBlob);
|
/ohos5.0/docs/en/application-dev/security/CryptoArchitectureKit/ |
H A D | crypto-ecdsa-sign-sig-verify.md | 55 let verifier = cryptoFramework.createVerify(verifyAlg); 56 await verifier.init(pubKey); 57 …await verifier.update(input1); // If the plaintext is short, you can use verify() to pass in the f… 58 let res = await verifier.verify(input2, signMessageBlob); 94 let verifier = cryptoFramework.createVerify(verifyAlg); 95 verifier.initSync(pubKey); 96 …verifier.updateSync(input1); // If the plaintext is short, you can use verify() to pass in the ful… 97 let res = verifier.verifySync(input2, signMessageBlob);
|
H A D | crypto-sm2-sign-sig-verify-pkcs1.md | 55 let verifier = cryptoFramework.createVerify(verifyAlg); 56 await verifier.init(pubKey); 57 …await verifier.update(input1); // If the plaintext is short, you can use verify() to pass in the f… 58 let res = await verifier.verify(input2, signMessageBlob); 94 let verifier = cryptoFramework.createVerify(verifyAlg); 95 verifier.initSync(pubKey); 96 …verifier.updateSync(input1); // If the plaintext is short, you can use verify() to pass in the ful… 97 let res = verifier.verifySync(input2, signMessageBlob);
|
H A D | crypto-rsa-sign-sig-verify-recover-pkcs1.md | 46 let verifier = cryptoFramework.createVerify(verifyAlg); 47 await verifier.init(pubKey); 48 let rawSignData = await verifier.recover(signMessageBlob); 81 let verifier = cryptoFramework.createVerify(verifyAlg); 82 verifier.initSync(pubKey); 83 let rawSignData = verifier.recoverSync(signMessageBlob);
|
H A D | crypto-rsa-sign-sig-verify-pkcs1.md | 61 let verifier = cryptoFramework.createVerify(verifyAlg); 62 await verifier.init(pubKey); 63 …await verifier.update(input1); // If the plaintext is short, you can use verify() to pass in the f… 64 let res = await verifier.verify(input2, signMessageBlob); 100 let verifier = cryptoFramework.createVerify(verifyAlg); 101 verifier.initSync(pubKey); 102 …verifier.updateSync(input1); // If the plaintext is short, you can use verify() to pass in the ful… 103 let res = verifier.verifySync(input2, signMessageBlob);
|
H A D | crypto-rsa-sign-sig-verify-pkcs1-by-segment.md | 60 let verifier = cryptoFramework.createVerify(verifyAlg); 61 await verifier.init(pubKey); 67 await verifier.update(updateMessageBlob); 70 let res = await verifier.verify(null, signMessageBlob); 120 let verifier = cryptoFramework.createVerify(verifyAlg); 121 verifier.initSync(pubKey); 127 verifier.updateSync(updateMessageBlob); 130 let res = verifier.verifySync(null, signMessageBlob);
|
/ohos5.0/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/common/src/ |
H A D | flatbuffer_schema.cpp | 306 const flatbuffers::Verifier &verifier) in DoVerifyBeforeExtract() argument 315 verifyResult = rootValue.VerifyField<int8_t>(verifier, fieldInfo.offset()); in DoVerifyBeforeExtract() 319 verifyResult = rootValue.VerifyField<int16_t>(verifier, fieldInfo.offset()); in DoVerifyBeforeExtract() 323 verifyResult = rootValue.VerifyField<int32_t>(verifier, fieldInfo.offset()); in DoVerifyBeforeExtract() 330 verifyResult = rootValue.VerifyField<float>(verifier, fieldInfo.offset()); in DoVerifyBeforeExtract() 333 verifyResult = rootValue.VerifyField<double>(verifier, fieldInfo.offset()); in DoVerifyBeforeExtract() 402 const flatbuffers::Verifier &verifier, TypeValue &outExtract) in ExtractFlatBufferValueFinal() argument 412 int errCode = DoVerifyBeforeExtract(rootValue, fieldInfo, verifier); in ExtractFlatBufferValueFinal() 451 flatbuffers::Verifier verifier(valueRealBegin, valueRealSize); in ExtractFlatBufferValue() local 463 bool vTableOk = rootValue->VerifyTableStart(verifier); in ExtractFlatBufferValue() [all …]
|
/ohos5.0/base/update/updater/services/package/pkg_package/ |
H A D | pkg_upgradefile.h | 168 VerifyFunction verifier, const std::vector<uint8_t> &signData); 180 int32_t VerifyHeader(DigestAlgorithm::DigestAlgorithmPtr algorithm, VerifyFunction verifier, 183 VerifyFunction verifier); 185 VerifyFunction verifier); 187 VerifyFunction verifier);
|
H A D | pkg_upgradefile.cpp | 437 if (verifier == nullptr) { in LoadPackage() 475 ret = VerifyFile(parsedLen, algorithm, verifier); in LoadPackage() 481 VerifyFunction verifier) in VerifyFile() argument 484 return VerifyFileV2(parsedLen, algorithm, verifier); in VerifyFile() 487 return VerifyFileV1(parsedLen, algorithm, verifier); in VerifyFile() 491 VerifyFunction verifier) in VerifyFileV1() argument 501 return Verify(parsedLen, algorithm, verifier, signData); in VerifyFileV1() 505 VerifyFunction verifier) in VerifyFileV2() argument 527 return VerifyHeader(algorithm, verifier, signData); in VerifyFileV2() 557 ret = verifier(&pkgInfo_.pkgInfo, digest.data, signData); in Verify() [all …]
|
/ohos5.0/commonlibrary/rust/ylong_http/ylong_http_client/src/util/config/tls/verifier/ |
H A D | mod.rs | 29 pub(crate) fn new<T: CertVerifier + Send + Sync + 'static>(verifier: T) -> Self { in new() 31 inner: Box::new(verifier), in new()
|
/ohos5.0/commonlibrary/rust/ylong_http/ylong_http_client/src/util/c_openssl/ffi/ |
H A D | callback.rs | 24 let verifier = &*(arg as *const DefaultCertVerifier); in cert_verify() localVariable 26 verifier.verify(&ServerCerts::new(ctx)) as c_int in cert_verify()
|
/ohos5.0/base/update/updater/services/script/script_manager/ |
H A D | script_manager_impl.h | 34 explicit ScriptManagerImpl(UScriptEnv *env, const Hpackage::HashDataVerifier *verifier) in ScriptManagerImpl() argument 35 : scriptEnv_(env), scriptVerifier_(verifier) {} in ScriptManagerImpl()
|