/base/startup/init/test/unittest/seccomp/ |
D | seccomp_unittest.cpp | 159 int ret = syscall(__NR_get_mempolicy, nullptr, nullptr, 0, nullptr, 0); in CheckGetMempolicy() local 160 if (ret < 0) { in CheckGetMempolicy() 190 int ret = syscall(__NR_setresuid, 20000, 20000, 20000); in CheckSetresuidArgsInRange() local 191 if (ret == 0) { in CheckSetresuidArgsInRange() 200 int ret = syscall(__NR_setresuid, 800, 800, 800); in CheckSetresuidArgsOutOfRange() local 201 if (ret == 0) { in CheckSetresuidArgsOutOfRange() 220 int ret = syscall(__NR_setuid, 0); in CheckSetuid64ForUidFilter1() local 221 if (ret == 0) { in CheckSetuid64ForUidFilter1() 230 int ret = syscall(__NR_setuid, 2); in CheckSetuid64ForUidFilter2() local 231 if (ret == 0) { in CheckSetuid64ForUidFilter2() [all …]
|
/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/ |
D | hks_rkc_rw.c | 65 int32_t ret; in GetKeyBlobKsf() local 68 ret = GetProcessInfo(&processInfo); in GetKeyBlobKsf() 69 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "get process info failed") in GetKeyBlobKsf() 73 ret = HksStoreGetKeyBlob(&processInfo, &fileNameBlob, HKS_STORAGE_TYPE_ROOT_KEY, tmpKsf); in GetKeyBlobKsf() 74 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "Get ksf file failed! ret = 0x%" LOG_PUBLIC "X", ret) in GetKeyBlobKsf() 82 return ret; in GetKeyBlobKsf() 134 int32_t ret = ExtractFieldFromBuffer(ksfFromFile, ksfBufOffset, fileFlag, HKS_RKC_KSF_FLAG_LEN); in RkcExtractKsfFileFlag() local 135 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "Memcpy file flag failed!") in RkcExtractKsfFileFlag() 148 …int32_t ret = ExtractFieldFromBuffer(ksfFromFile, ksfBufOffset, &(time->hksYear), sizeof(time->hks… in RkcExtractTime() local 149 HKS_IF_NOT_SUCC_RETURN(ret, ret) in RkcExtractTime() [all …]
|
D | hks_rkc_v1.c | 32 int32_t ret = RkcExtractKsfFileFlag(ksfFromFile, &ksfBufOffset); in RkcExtractKsfBufV1() local 33 …HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "Rkc extract ksf flag failed! ret = 0x%" LOG_PUBLIC "X", ret) in RkcExtractKsfBufV1() 36 …ret = ExtractFieldFromBuffer(ksfFromFile, &ksfBufOffset, &(ksfData->version), sizeof(ksfData->vers… in RkcExtractKsfBufV1() 37 …HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "Rkc extract ksf version failed! ret = 0x%" LOG_PUBLIC "X", … in RkcExtractKsfBufV1() 40 ret = ExtractKsfDataRkc(ksfFromFile, &ksfBufOffset, &(ksfData->ksfDataRkc)); in RkcExtractKsfBufV1() 41 … HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "Rkc extract ksf rk failed! ret = 0x%" LOG_PUBLIC "X", ret) in RkcExtractKsfBufV1() 44 ret = ExtractKsfDataMk(ksfFromFile, &ksfBufOffset, &(ksfData->ksfDataMk)); in RkcExtractKsfBufV1() 45 … HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "Rkc extract ksf mk failed! ret = 0x%" LOG_PUBLIC "X", ret) in RkcExtractKsfBufV1() 58 int32_t ret = GetKeyBlobKsf(ksfName, &tmpKsf); in HksRkcReadKsfV1() local 59 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "Get ksf file failed! ret = 0x%" LOG_PUBLIC "X", ret) in HksRkcReadKsfV1() [all …]
|
/base/security/crypto_framework/test/unittest/src/ |
D | crypto_3des_cipher_test.cpp | 59 HcfResult ret = HcfSymKeyGeneratorCreate("3DES192", &generator); in GenerateDesSymKey() local 60 if (ret != HCF_SUCCESS) { in GenerateDesSymKey() 62 return ret; in GenerateDesSymKey() 65 ret = generator->generateSymKey(generator, key); in GenerateDesSymKey() 66 if (ret != HCF_SUCCESS) { in GenerateDesSymKey() 70 return ret; in GenerateDesSymKey() 80 int32_t ret = cipher->init(cipher, ENCRYPT_MODE, (HcfKey *)key, params); in DesEncrypt() local 81 if (ret != 0) { in DesEncrypt() 82 LOGE("init failed! %d", ret); in DesEncrypt() 83 return ret; in DesEncrypt() [all …]
|
D | crypto_sm4_cipher_test.cpp | 62 HcfResult ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); in GenerateSm4SymKey() local 63 if (ret != HCF_SUCCESS) { in GenerateSm4SymKey() 65 return ret; in GenerateSm4SymKey() 68 ret = generator->generateSymKey(generator, key); in GenerateSm4SymKey() 69 if (ret != HCF_SUCCESS) { in GenerateSm4SymKey() 73 return ret; in GenerateSm4SymKey() 80 int32_t ret = HcfSymKeyGeneratorCreate(algoName, &generator); in GenerateSymKey() local 81 if (ret != 0) { in GenerateSymKey() 83 return ret; in GenerateSymKey() 86 ret = generator->generateSymKey(generator, key); in GenerateSymKey() [all …]
|
D | crypto_aes_cipher_test.cpp | 87 int32_t ret = HcfSymKeyGeneratorCreate(algoName, &generator); in GenerateSymKey() local 88 if (ret != 0) { in GenerateSymKey() 90 return ret; in GenerateSymKey() 93 ret = generator->generateSymKey(generator, key); in GenerateSymKey() 94 if (ret != 0) { in GenerateSymKey() 98 return ret; in GenerateSymKey() 110 int32_t ret = HcfSymKeyGeneratorCreate(algoName, &generator); in ConvertSymKey() local 111 if (ret != 0) { in ConvertSymKey() 112 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret); in ConvertSymKey() 113 return ret; in ConvertSymKey() [all …]
|
D | crypto_sm4_generator_test.cpp | 60 int32_t ret = HcfSymKeyGeneratorCreate(algoName, &generator); in GenerateSymKey() local 61 if (ret != 0) { in GenerateSymKey() 63 return ret; in GenerateSymKey() 66 ret = generator->generateSymKey(generator, key); in GenerateSymKey() 67 if (ret != 0) { in GenerateSymKey() 71 return ret; in GenerateSymKey() 76 int ret = 0; variable 82 ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); 83 if (ret != 0) { 87 ret = generator->generateSymKey(generator, &key); [all …]
|
/base/sensors/sensor_lite/interfaces/kits/native/test/unittest/src/ |
D | sensor_agent_interfaces_test.cpp | 61 int32_t ret = GetAllSensors(&sensorInfo, &count); variable 71 EXPECT_EQ(ret, 0) << "GetAllSensors ret = " << ret << endl; 84 int32_t ret = GetAllSensors(sensorInfo, (int32_t *)NULLPTR); variable 85 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "GetAllSensors ret = " << ret << endl; 99 int32_t ret = GetAllSensors(sensorInfo, &count); variable 100 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "GetAllSensors ret = " << ret << endl; 113 int32_t ret = GetAllSensors(&sensorInfo, (int32_t *)NULLPTR); variable 114 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "GetAllSensors ret = " << ret << endl; 127 int32_t ret = ActivateSensor(-1, &sensorUser); variable 128 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "ActivateSensor ret = " << ret << endl; [all …]
|
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/sdk_test/src/ |
D | hks_test_curve25519.c | 34 int32_t ret = HksInitParamSet(¶mSet); in TestGenerateEd25519Key() local 35 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 39 ret = HksAddParams(paramSet, &algParam, 1); in TestGenerateEd25519Key() 40 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 44 ret = HksAddParams(paramSet, &keySizeParam, 1); in TestGenerateEd25519Key() 45 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 49 ret = HksAddParams(paramSet, &purposeParam, 1); in TestGenerateEd25519Key() 50 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 54 ret = HksAddParams(paramSet, &digestParam, 1); in TestGenerateEd25519Key() 55 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() [all …]
|
/base/security/huks/test/unittest/huks_lite_test/common/ |
D | hks_test_curve25519.c | 36 int32_t ret = HksInitParamSet(¶mSet); in TestGenerateEd25519Key() local 37 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 41 ret = HksAddParams(paramSet, &algParam, 1); in TestGenerateEd25519Key() 42 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 46 ret = HksAddParams(paramSet, &keySizeParam, 1); in TestGenerateEd25519Key() 47 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 51 ret = HksAddParams(paramSet, &purposeParam, 1); in TestGenerateEd25519Key() 52 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 56 ret = HksAddParams(paramSet, &digestParam, 1); in TestGenerateEd25519Key() 57 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() [all …]
|
/base/startup/init/test/unittest/param/ |
D | dac_unittest.cpp | 38 int ret = RegisterSecurityDacOps(nullptr, LABEL_INIT_FOR_INIT); in TestDacInitLocalLabel() local 39 EXPECT_NE(ret, 0); in TestDacInitLocalLabel() 40 ret = RegisterSecurityDacOps(&initParamSecurityOps, LABEL_INIT_FOR_INIT); in TestDacInitLocalLabel() 41 EXPECT_EQ(ret, 0); in TestDacInitLocalLabel() 47 ret = initParamSecurityOps.securityInitLabel(&label, LABEL_INIT_FOR_INIT); in TestDacInitLocalLabel() 48 EXPECT_EQ(ret, 0); in TestDacInitLocalLabel() 49 ret = initParamSecurityOps.securityFreeLabel(&label); in TestDacInitLocalLabel() 50 EXPECT_EQ(ret, 0); in TestDacInitLocalLabel() 56 int ret = RegisterSecurityDacOps(&initParamSecurityOps, LABEL_INIT_FOR_INIT); in TestDacGetLabel() local 57 EXPECT_EQ(ret, 0); in TestDacGetLabel() [all …]
|
/base/security/certificate_manager/test/unittest/src/ |
D | cm_user_cert_test.cpp | 509 int32_t ret; variable 513 ret = CmInstallUserTrustedCert(&userCert[0], &certAlias[0], &certUri); 514 EXPECT_EQ(ret, CM_SUCCESS) << "Normal user cert Install test failed, recode:" << ret; 516 ret = CmUninstallUserTrustedCert(&certUri); 517 EXPECT_EQ(ret, CM_SUCCESS) << "Normal user cert Uninstall test failed, recode:" << ret; 528 int32_t ret; variable 532 ret = CmInstallUserTrustedCert(&userCert[1], &certAlias[1], &certUri); 533 EXPECT_EQ(ret, CM_SUCCESS) << "Normal user cert Install test failed, recode:" << ret; 535 ret = CmUninstallUserTrustedCert(&certUri); 536 EXPECT_EQ(ret, CM_SUCCESS) << "Normal user cert Uninstall test failed, recode:" << ret; [all …]
|
/base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/common_test/src/ |
D | hks_param_test.cpp | 71 int32_t ret = HksCheckParamMatch(&baseParam, &otherParam); variable 72 EXPECT_EQ(ret, HKS_ERROR_INVALID_ARGUMENT) << "HksCheckParamMatch failed, ret = " << ret; 85 int32_t ret = HksCheckParamMatch(&baseParam, &otherParam); variable 86 EXPECT_EQ(ret, HKS_ERROR_INVALID_ARGUMENT) << "HksCheckParamMatch failed, ret = " << ret; 99 int32_t ret = HksCheckParamMatch(&baseParam, &otherParam); variable 100 EXPECT_EQ(ret, HKS_ERROR_INVALID_ARGUMENT) << "HksCheckParamMatch failed, ret = " << ret; 117 int32_t ret = HksCheckParamMatch(&baseParam, &otherParam); variable 118 EXPECT_EQ(ret, HKS_ERROR_INVALID_ARGUMENT) << "HksCheckParamMatch failed, ret = " << ret; 135 int32_t ret = HksCheckParamMatch(&baseParam, &otherParam); variable 136 EXPECT_EQ(ret, HKS_ERROR_INVALID_ARGUMENT) << "HksCheckParamMatch failed, ret = " << ret; [all …]
|
D | hks_check_paramset_test.cpp | 72 int32_t ret = CheckMutableParams(HKS_ALG_RSA, keyType, ¶ms); variable 73 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 87 int32_t ret = CheckMutableParams(HKS_ALG_ECC, keyType, ¶ms); variable 88 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 102 int32_t ret = CheckMutableParams(HKS_ALG_SM2, keyType, ¶ms); variable 103 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 117 int32_t ret = CheckMutableParams(HKS_ALG_DSA, keyType, ¶ms); variable 118 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 132 int32_t ret = CheckMutableParams(HKS_ALG_ED25519, keyType, ¶ms); variable 133 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); [all …]
|
/base/security/huks/services/huks_standard/huks_service/main/core/src/ |
D | hks_client_service.c | 64 int32_t ret = HksStoreGetKeyBlob(processInfo, keyAlias, mode, key); in GetKeyData() local 65 HKS_IF_NOT_SUCC_LOGE(ret, "get key blob from storage failed, ret = %" LOG_PUBLIC "d", ret) in GetKeyData() 66 return ret; in GetKeyData() 73 int32_t ret = HksStoreGetToatalSize(&size); in CheckKeyCondition() local 74 …HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "get total size from storage failed, ret = %" LOG_PUBLIC "d"… in CheckKeyCondition() 78 ret = HksStoreIsKeyBlobExist(processInfo, keyAlias, HKS_STORAGE_TYPE_KEY); in CheckKeyCondition() 79 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_STORAGE_FAILURE, "buffer exceeds limit") in CheckKeyCondition() 88 int32_t ret = HksCheckGetKeyInfoListParams(&(processInfo->processName), keyInfoList, listCount); in HksServiceGetKeyInfoList() local 89 HKS_IF_NOT_SUCC_RETURN(ret, ret) in HksServiceGetKeyInfoList() 91 ret = HksStoreGetKeyInfoList(keyInfoList, listCount); in HksServiceGetKeyInfoList() [all …]
|
/base/security/device_auth/frameworks/src/ |
D | ipc_sdk.c | 57 int32_t ret; in DelIpcCliCallbackCtx() local 63 ret = memcmp(appId, cbCache->appId, strlen(cbCache->appId) + 1); in DelIpcCliCallbackCtx() 64 if (ret == 0) { in DelIpcCliCallbackCtx() 93 int32_t ret = HC_ERR_IPC_BAD_MSG_TYPE; in GetIpcReplyByType() local 101 ret = HC_SUCCESS; in GetIpcReplyByType() 117 ret = HC_ERR_MEMORY_COPY; in GetIpcReplyByType() 123 ret = HC_ERR_IPC_BAD_MSG_TYPE; in GetIpcReplyByType() 128 LOGI("process done, type %d, result %d", type, ret); in GetIpcReplyByType() 135 int32_t ret; in IpcGmRegCallback() local 142 ret = CreateCallCtx(&callCtx, NULL); in IpcGmRegCallback() [all …]
|
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_service/main/os_dependency/idl/cm_ipc/ |
D | cm_ipc_service.c | 42 int32_t ret = CmGetProcessInfoForIPC(cmContext); in GetInputParams() local 43 if (ret != CM_SUCCESS) { in GetInputParams() 44 CM_LOG_E("get ipc info failed, ret = %d", ret); in GetInputParams() 45 return ret; in GetInputParams() 49 ret = CmGetParamSet((struct CmParamSet *)paramSetBlob->data, paramSetBlob->size, paramSet); in GetInputParams() 50 if (ret != CM_SUCCESS) { in GetInputParams() 51 CM_LOG_E("get paramSet failed, ret = %d", ret); in GetInputParams() 52 return ret; in GetInputParams() 55 ret = CmParamSetToParams(*paramSet, params, paramsCount); in GetInputParams() 56 if (ret != CM_SUCCESS) { in GetInputParams() [all …]
|
/base/sensors/sensor/interfaces/native/src/ |
D | sensor_agent.cpp | 47 int32_t ret = SENSOR_AGENT_IMPL->GetAllSensors(sensorInfo, count); in GetAllSensors() local 48 if (ret != OHOS::ERR_OK) { in GetAllSensors() 50 return NormalizeErrCode(ret); in GetAllSensors() 52 return ret; in GetAllSensors() 57 int32_t ret = SENSOR_AGENT_IMPL->ActivateSensor(sensorId, user); in ActivateSensor() local 58 if (ret != OHOS::ERR_OK) { in ActivateSensor() 60 return NormalizeErrCode(ret); in ActivateSensor() 62 return ret; in ActivateSensor() 67 int32_t ret = SENSOR_AGENT_IMPL->DeactivateSensor(sensorId, user); in DeactivateSensor() local 68 if (ret != OHOS::ERR_OK) { in DeactivateSensor() [all …]
|
/base/security/huks/services/huks_standard/huks_service/main/os_dependency/idl/ipc/ |
D | hks_ipc_service.c | 61 int32_t ret; in HksIpcServiceGenerateKey() local 65 ret = HksGenerateKeyUnpack(srcData, &keyAlias, &inParamSet, &keyOut); in HksIpcServiceGenerateKey() 66 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksGenerateKeyUnpack Ipc fail") in HksIpcServiceGenerateKey() 73 ret = HKS_ERROR_MALLOC_FAIL; in HksIpcServiceGenerateKey() 79 ret = HksGetProcessInfoForIPC(context, &processInfo); in HksIpcServiceGenerateKey() 80 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksGetProcessInfoForIPC fail, ret = %" LOG_PUBLIC "d", ret) in HksIpcServiceGenerateKey() 82 ret = HksServiceGenerateKey(&processInfo, &keyAlias, inParamSet, &keyOut); in HksIpcServiceGenerateKey() 83 HKS_IF_NOT_SUCC_LOGE(ret, "HksServiceGenerateKey fail, ret = %" LOG_PUBLIC "d", ret) in HksIpcServiceGenerateKey() 87 HksSendResponse(context, ret, NULL); in HksIpcServiceGenerateKey() 89 HksSendResponse(context, ret, &keyOut); in HksIpcServiceGenerateKey() [all …]
|
/base/startup/init/test/unittest/init/ |
D | init_reboot_unittest.cpp | 46 int ret = AddRebootCmdExecutor("reboot_cmd1", rebootCallback); variable 47 EXPECT_EQ(ret, 0); 48 ret = AddRebootCmdExecutor("reboot_cmd2", rebootCallback); 49 EXPECT_EQ(ret, 0); 50 ret = AddRebootCmdExecutor("reboot_cmd3", rebootCallback); 51 EXPECT_EQ(ret, 0); 52 …ret = AddRebootCmdExecutor("reboot_cmd4", [](int id, const char *name, int argc, const char **argv… in __anon60c376870202() 56 EXPECT_EQ(ret, 0); 57 …ret = AddRebootCmdExecutor("reboot_cmd5", [](int id, const char *name, int argc, const char **argv… in __anon60c376870302() 61 EXPECT_EQ(ret, 0); [all …]
|
/base/security/device_auth/test/unittest/deviceauth/unit_test/source/ |
D | common_lib_test.cpp | 85 HcBool ret = ParcelReadWithoutPopData(&parcelWithData, &num, uintDataSize); variable 86 EXPECT_EQ(ret, HC_TRUE); 87 ret = ParcelRead(nullptr, nullptr, uintDataSize); 88 EXPECT_EQ(ret, HC_FALSE); 89 ret = ParcelRead(&parcelWithData, &num, uintDataSize); 90 EXPECT_EQ(ret, HC_TRUE); 92 ret = ParcelRead(&parcelWithData, &num, uintDataSize); 95 ret = ParcelRead(&parcelWithData, &num, uintDataSize); 96 EXPECT_EQ(ret, HC_FALSE); 107 HcBool ret = ParcelEraseBlock(nullptr, start, uintDataSize, &num); variable [all …]
|
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/ |
D | cert_manager_auth_mgr.c | 93 int32_t ret = CertManagerUriDecode(uriObj, (char *)uri->data); in GetAndCheckUriObj() local 94 if (ret != CM_SUCCESS) { in GetAndCheckUriObj() 95 CM_LOG_E("uri decode failed, ret = %d", ret); in GetAndCheckUriObj() 96 return ret; in GetAndCheckUriObj() 138 int32_t ret = UintToString(clientUid, uidStr, MAX_UINT32_LEN); in ConstructToBeAuthedUri() local 139 if (ret != CM_SUCCESS) { in ConstructToBeAuthedUri() 141 return ret; in ConstructToBeAuthedUri() 157 int32_t ret = UintToString(clientUid, uidStr, MAX_UINT32_LEN); in ConstructMacKeyUri() local 158 if (ret != CM_SUCCESS) { in ConstructMacKeyUri() 160 return ret; in ConstructMacKeyUri() [all …]
|
/base/msdp/device_status/libs/test/unittest/src/ |
D | device_status_datahub_test.cpp | 69 bool ret = SENSOR_DATA_CB.SubscribeSensorEvent(sensorTypeId, callback); variable 70 ASSERT_TRUE(ret); 71 ret = SENSOR_DATA_CB.UnsubscribeSensorEvent(sensorTypeId, callback); 72 ASSERT_TRUE(ret); 84 bool ret = SENSOR_DATA_CB.RegisterCallbackSensor(sensorTypeId); variable 85 ASSERT_TRUE(ret); 90 ret = SENSOR_DATA_CB.PushData(sensorTypeId, reinterpret_cast<uint8_t*>(&data)); 91 EXPECT_FALSE(ret); 92 ret = SENSOR_DATA_CB.UnregisterCallbackSensor(sensorTypeId); 93 ASSERT_TRUE(ret); [all …]
|
/base/security/certificate_framework/test/unittest/cf_adapter_test/src/ |
D | cf_adapter_cert_test.cpp | 82 int32_t ret = CfOpensslCreateCert(&g_cert[0], &derObj); variable 83 EXPECT_EQ(ret, CF_SUCCESS) << "Normal adapter create cert object test failed, recode:" << ret; 97 int32_t ret = CfOpensslCreateCert(&g_cert[1], &pemObj); variable 98 EXPECT_EQ(ret, CF_SUCCESS) << "Normal adapter create cert object test failed, recode:" << ret; 113 int32_t ret = CfOpensslCreateCert(invalCert001, &obj001); variable 114 …EXPECT_EQ(ret, CF_INVALID_PARAMS) << "Abnormal adapter create cert object test failed, recode:" <<… 127 int32_t ret = CfOpensslCreateCert(&invalCert002, &obj002); variable 128 …EXPECT_EQ(ret, CF_INVALID_PARAMS) << "Abnormal adapter create cert object test failed, recode:" <<… 141 int32_t ret = CfOpensslCreateCert(&invalCert003, &obj003); variable 142 …EXPECT_EQ(ret, CF_INVALID_PARAMS) << "Abnormal adapter create cert object test failed, recode:" <<… [all …]
|
/base/security/huks/test/unittest/huks_standard_test/module_test/service_test/huks_engine/core/src/ |
D | hks_upgrade_key_c_test.cpp | 69 int32_t ret = HksInitParamSet(&srcParamSet); variable 70 ASSERT_EQ(HKS_SUCCESS, ret); 72 ret = HksAddParams(srcParamSet, &algParam, 1); 73 ASSERT_EQ(HKS_SUCCESS, ret); 74 ret = HksBuildParamSet(&srcParamSet); 75 ASSERT_EQ(HKS_SUCCESS, ret); 76 ret = AddAlgParamsTags(srcParamSet, nullptr); 77 ASSERT_EQ(HKS_ERROR_INVALID_ARGUMENT, ret); 90 int32_t ret = HksAddkeyToParamSet(nullptr, nullptr); variable 91 ASSERT_EQ(HKS_ERROR_INVALID_ARGUMENT, ret); [all …]
|