Home
last modified time | relevance | path

Searched refs:ret (Results 1 – 25 of 2383) sorted by relevance

12345678910>>...96

/base/startup/init/test/unittest/seccomp/
Dseccomp_unittest.cpp164 int ret = unshare(CLONE_NEWPID); in CheckUnshare() local
165 if (ret) { in CheckUnshare()
245 int ret = (int)syscall(__NR_mq_open, nullptr, 0); in CheckMqOpen() local
246 if (ret < 0) { in CheckMqOpen()
276 int ret = syscall(__NR_setresuid, 20000, 20000, 20000); in CheckSetresuidArgsInRange() local
277 if (ret == 0) { in CheckSetresuidArgsInRange()
286 int ret = syscall(__NR_setresuid, 800, 800, 800); in CheckSetresuidArgsOutOfRange() local
287 if (ret == 0) { in CheckSetresuidArgsOutOfRange()
306 int ret = syscall(__NR_setuid, 0); in CheckSetuid64ForUidFilter1() local
307 if (ret == 0) { in CheckSetuid64ForUidFilter1()
[all …]
/base/security/crypto_framework/test/unittest/src/aes_cipher/
Dcrypto_aes_ecb_cipher_test.cpp53 int ret = 0; variable
61 ret = HcfSymKeyGeneratorCreate("AES128", &generator);
62 if (ret != 0) {
63 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret);
67 ret = generator->generateSymKey(generator, &key);
68 if (ret != 0) {
73 ret = HcfCipherCreate("AES128|ECB|NoPadding", &cipher);
74 if (ret != 0) {
79 ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen);
80 if (ret != 0) {
[all …]
Dcrypto_aes_cfb_cipher_test.cpp47 int ret = 0; variable
59 ret = HcfSymKeyGeneratorCreate("AES128", &generator);
60 if (ret != 0) {
61 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret);
65 ret = generator->generateSymKey(generator, &key);
66 if (ret != 0) {
71 ret = HcfCipherCreate("AES128|CFB|NoPadding", &cipher);
72 if (ret != 0) {
77 ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen);
78 if (ret != 0) {
[all …]
Dcrypto_aes_cipher_test.cpp47 int ret = 0; variable
53 ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator);
54 if (ret != 0) {
55 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret);
58 ret = generator->generateSymKey(generator, &key);
59 if (ret != 0) {
68 ret = HCF_ERR_CRYPTO_OPERATION;
72 ret = strcmp(generatorAlgoName, inputAlgoName);
73 if (ret != 0) {
79 EXPECT_EQ(ret, 0);
[all …]
Dcrypto_aes_ofb_cipher_test.cpp47 int ret = 0; variable
59 ret = HcfSymKeyGeneratorCreate("AES128", &generator);
60 if (ret != 0) {
61 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret);
65 ret = generator->generateSymKey(generator, &key);
66 if (ret != 0) {
71 ret = HcfCipherCreate("AES128|OFB|NoPadding", &cipher);
72 if (ret != 0) {
77 ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen);
78 if (ret != 0) {
[all …]
Dcrypto_aes_cbc_cipher_test.cpp47 int ret = 0; variable
59 ret = HcfSymKeyGeneratorCreate("AES128", &generator);
60 if (ret != 0) {
61 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret);
65 ret = generator->generateSymKey(generator, &key);
66 if (ret != 0) {
71 ret = HcfCipherCreate("AES128|CBC|NoPadding", &cipher);
72 if (ret != 0) {
77 ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen);
78 if (ret != 0) {
[all …]
Dcrypto_aes_ctr_cipher_test.cpp47 int ret = 0; variable
59 ret = HcfSymKeyGeneratorCreate("AES128", &generator);
60 if (ret != 0) {
61 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret);
65 ret = generator->generateSymKey(generator, &key);
66 if (ret != 0) {
71 ret = HcfCipherCreate("AES128|CTR|NoPadding", &cipher);
72 if (ret != 0) {
77 ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen);
78 if (ret != 0) {
[all …]
/base/security/huks/frameworks/huks_standard/main/crypto_engine/rkc/src/
Dhks_rkc_rw.c65 int32_t ret; in GetKeyBlobKsf() local
68 ret = GetProcessInfo(&processInfo); in GetKeyBlobKsf()
69 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "get process info failed") in GetKeyBlobKsf()
73 ret = HksStoreGetKeyBlob(&processInfo, &fileNameBlob, HKS_STORAGE_TYPE_ROOT_KEY, tmpKsf); in GetKeyBlobKsf()
74 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "Get ksf file failed! ret = 0x%" LOG_PUBLIC "X", ret) in GetKeyBlobKsf()
82 return ret; in GetKeyBlobKsf()
134 int32_t ret = ExtractFieldFromBuffer(ksfFromFile, ksfBufOffset, fileFlag, HKS_RKC_KSF_FLAG_LEN); in RkcExtractKsfFileFlag() local
135 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "Memcpy file flag failed!") in RkcExtractKsfFileFlag()
148 …int32_t ret = ExtractFieldFromBuffer(ksfFromFile, ksfBufOffset, &(time->hksYear), sizeof(time->hks… in RkcExtractTime() local
149 HKS_IF_NOT_SUCC_RETURN(ret, ret) in RkcExtractTime()
[all …]
/base/security/crypto_framework/test/unittest/src/
Dcrypto_3des_cipher_test.cpp59 HcfResult ret = HcfSymKeyGeneratorCreate("3DES192", &generator); in GenerateDesSymKey() local
60 if (ret != HCF_SUCCESS) { in GenerateDesSymKey()
62 return ret; in GenerateDesSymKey()
65 ret = generator->generateSymKey(generator, key); in GenerateDesSymKey()
66 if (ret != HCF_SUCCESS) { in GenerateDesSymKey()
70 return ret; in GenerateDesSymKey()
80 int32_t ret = cipher->init(cipher, ENCRYPT_MODE, (HcfKey *)key, params); in DesEncrypt() local
81 if (ret != 0) { in DesEncrypt()
82 LOGE("init failed! %d", ret); in DesEncrypt()
83 return ret; in DesEncrypt()
[all …]
Dcrypto_sm4_ecb_cipher_test.cpp47 int ret = 0; variable
55 ret = HcfSymKeyGeneratorCreate("SM4_128", &generator);
56 if (ret != 0) {
61 ret = generator->generateSymKey(generator, &key);
62 if (ret != 0) {
67 ret = HcfCipherCreate("SM4_128|ECB|NoPadding", &cipher);
68 if (ret != 0) {
73 ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen);
74 if (ret != 0) {
79 ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen);
[all …]
Dcrypto_sm4_cfb_cipher_test.cpp47 int ret = 0; variable
56 ret = HcfSymKeyGeneratorCreate("SM4_128", &generator);
57 if (ret != 0) {
62 ret = generator->generateSymKey(generator, &key);
63 if (ret != 0) {
68 ret = HcfCipherCreate("SM4_128|CFB|NoPadding", &cipher);
69 if (ret != 0) {
74 ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen);
75 if (ret != 0) {
80 ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen);
[all …]
/base/security/huks/services/huks_standard/huks_service/main/os_dependency/idl/ipc/
Dhks_ipc_service.c64 int32_t ret; in HksIpcServiceGenerateKey() local
68 ret = HksGenerateKeyUnpack(srcData, &keyAlias, &inParamSet, &keyOut); in HksIpcServiceGenerateKey()
69 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksGenerateKeyUnpack Ipc fail") in HksIpcServiceGenerateKey()
76 ret = HKS_ERROR_MALLOC_FAIL; in HksIpcServiceGenerateKey()
82 ret = HksGetProcessInfoForIPC(context, &processInfo); in HksIpcServiceGenerateKey()
83 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksGetProcessInfoForIPC fail, ret = %" LOG_PUBLIC "d", ret) in HksIpcServiceGenerateKey()
85 ret = AppendSpecificUserIdAndStorageLevelToProcessInfo(inParamSet, &processInfo); in HksIpcServiceGenerateKey()
86 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, in HksIpcServiceGenerateKey()
87 "AppendSpecificUserIdAndStorageLevelToProcessInfo fail, ret = %" LOG_PUBLIC "d", ret) in HksIpcServiceGenerateKey()
90 ret = HksCheckAndGetUserAuthInfo(inParamSet, &userAuthType, &authAccessType); in HksIpcServiceGenerateKey()
[all …]
/base/security/huks/test/unittest/huks_common_test/src/
Dhks_test_curve25519_func.cpp22 int32_t ret = HksInitParamSet(&paramSet); in TestGenerateEd25519Key() local
23 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key()
27 ret = HksAddParams(paramSet, &algParam, 1); in TestGenerateEd25519Key()
28 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key()
32 ret = HksAddParams(paramSet, &keySizeParam, 1); in TestGenerateEd25519Key()
33 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key()
37 ret = HksAddParams(paramSet, &purposeParam, 1); in TestGenerateEd25519Key()
38 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key()
42 ret = HksAddParams(paramSet, &digestParam, 1); in TestGenerateEd25519Key()
43 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key()
[all …]
/base/sensors/sensor_lite/interfaces/kits/native/test/unittest/src/
Dsensor_agent_interfaces_test.cpp61 int32_t ret = GetAllSensors(&sensorInfo, &count); variable
71 EXPECT_EQ(ret, 0) << "GetAllSensors ret = " << ret << endl;
84 int32_t ret = GetAllSensors(sensorInfo, (int32_t *)NULLPTR); variable
85 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "GetAllSensors ret = " << ret << endl;
99 int32_t ret = GetAllSensors(sensorInfo, &count); variable
100 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "GetAllSensors ret = " << ret << endl;
113 int32_t ret = GetAllSensors(&sensorInfo, (int32_t *)NULLPTR); variable
114 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "GetAllSensors ret = " << ret << endl;
127 int32_t ret = ActivateSensor(-1, &sensorUser); variable
128 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "ActivateSensor ret = " << ret << endl;
[all …]
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_service/main/os_dependency/idl/cm_ipc/
Dcm_ipc_service.c47 int32_t ret = CmGetProcessInfoForIPC(cmContext); in GetInputParams() local
48 if (ret != CM_SUCCESS) { in GetInputParams()
49 CM_LOG_E("get ipc info failed, ret = %d", ret); in GetInputParams()
50 return ret; in GetInputParams()
54 ret = CmGetParamSet((struct CmParamSet *)paramSetBlob->data, paramSetBlob->size, paramSet); in GetInputParams()
55 if (ret != CM_SUCCESS) { in GetInputParams()
56 CM_LOG_E("get paramSet failed, ret = %d", ret); in GetInputParams()
57 return ret; in GetInputParams()
60 ret = CmParamSetToParams(*paramSet, params, paramsCount); in GetInputParams()
61 if (ret != CM_SUCCESS) { in GetInputParams()
[all …]
/base/startup/init/test/unittest/param/
Ddac_unittest.cpp38 int ret = RegisterSecurityDacOps(nullptr, LABEL_INIT_FOR_INIT); in TestDacInitLocalLabel() local
39 EXPECT_NE(ret, 0); in TestDacInitLocalLabel()
40 ret = RegisterSecurityDacOps(&initParamSecurityOps, LABEL_INIT_FOR_INIT); in TestDacInitLocalLabel()
41 EXPECT_EQ(ret, 0); in TestDacInitLocalLabel()
47 ret = initParamSecurityOps.securityInitLabel(&label, LABEL_INIT_FOR_INIT); in TestDacInitLocalLabel()
48 EXPECT_EQ(ret, 0); in TestDacInitLocalLabel()
49 ret = initParamSecurityOps.securityFreeLabel(&label); in TestDacInitLocalLabel()
50 EXPECT_EQ(ret, 0); in TestDacInitLocalLabel()
56 int ret = RegisterSecurityDacOps(&initParamSecurityOps, LABEL_INIT_FOR_INIT); in TestDacGetLabel() local
57 EXPECT_EQ(ret, 0); in TestDacGetLabel()
[all …]
/base/security/huks/services/huks_standard/huks_service/main/core/src/
Dhks_client_service.c73 int32_t ret = HksStoreGetKeyBlob(processInfo, keyAlias, mode, key); in GetKeyData() local
74 HKS_IF_NOT_SUCC_LOGE(ret, "get key blob from storage failed, ret = %" LOG_PUBLIC "d", ret) in GetKeyData()
75 return ret; in GetKeyData()
82 int32_t ret = HksStoreGetToatalSize(&size); in CheckKeyCondition() local
83 …HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "get total size from storage failed, ret = %" LOG_PUBLIC "d"… in CheckKeyCondition()
87 ret = HksStoreIsKeyBlobExist(processInfo, keyAlias, HKS_STORAGE_TYPE_KEY); in CheckKeyCondition()
88 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_STORAGE_FAILURE, "buffer exceeds limit") in CheckKeyCondition()
97 int32_t ret = HksCheckGetKeyInfoListParams(&(processInfo->processName), keyInfoList, listCount); in HksServiceGetKeyInfoList() local
98 HKS_IF_NOT_SUCC_RETURN(ret, ret) in HksServiceGetKeyInfoList()
100 ret = HksStoreGetKeyInfoList(keyInfoList, listCount); in HksServiceGetKeyInfoList()
[all …]
/base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/common_test/src/
Dhks_param_test.cpp69 int32_t ret = HksCheckParamMatch(&baseParam, &otherParam); variable
70 EXPECT_EQ(ret, HKS_ERROR_INVALID_ARGUMENT) << "HksCheckParamMatch failed, ret = " << ret;
83 int32_t ret = HksCheckParamMatch(&baseParam, &otherParam); variable
84 EXPECT_EQ(ret, HKS_ERROR_INVALID_ARGUMENT) << "HksCheckParamMatch failed, ret = " << ret;
97 int32_t ret = HksCheckParamMatch(&baseParam, &otherParam); variable
98 EXPECT_EQ(ret, HKS_ERROR_INVALID_ARGUMENT) << "HksCheckParamMatch failed, ret = " << ret;
115 int32_t ret = HksCheckParamMatch(&baseParam, &otherParam); variable
116 EXPECT_EQ(ret, HKS_ERROR_INVALID_ARGUMENT) << "HksCheckParamMatch failed, ret = " << ret;
133 int32_t ret = HksCheckParamMatch(&baseParam, &otherParam); variable
134 EXPECT_EQ(ret, HKS_ERROR_INVALID_ARGUMENT) << "HksCheckParamMatch failed, ret = " << ret;
[all …]
Dhks_check_paramset_test.cpp70 int32_t ret = CheckMutableParams(HKS_ALG_RSA, keyType, &params); variable
71 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE);
85 int32_t ret = CheckMutableParams(HKS_ALG_ECC, keyType, &params); variable
86 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE);
100 int32_t ret = CheckMutableParams(HKS_ALG_SM2, keyType, &params); variable
101 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE);
115 int32_t ret = CheckMutableParams(HKS_ALG_DSA, keyType, &params); variable
116 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE);
130 int32_t ret = CheckMutableParams(HKS_ALG_ED25519, keyType, &params); variable
131 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE);
[all …]
/base/security/certificate_manager/test/unittest/src/
Dcm_user_cert_test.cpp535 int32_t ret; variable
539 ret = CmInstallUserTrustedCert(&userCert[0], &certAlias[0], &certUri);
540 EXPECT_EQ(ret, CM_SUCCESS) << "Normal user cert Install test failed, recode:" << ret;
542 ret = CmUninstallUserTrustedCert(&certUri);
543 EXPECT_EQ(ret, CM_SUCCESS) << "Normal user cert Uninstall test failed, recode:" << ret;
554 int32_t ret; variable
558 ret = CmInstallUserTrustedCert(&userCert[1], &certAlias[1], &certUri);
559 EXPECT_EQ(ret, CM_SUCCESS) << "Normal user cert Install test failed, recode:" << ret;
561 ret = CmUninstallUserTrustedCert(&certUri);
562 EXPECT_EQ(ret, CM_SUCCESS) << "Normal user cert Uninstall test failed, recode:" << ret;
[all …]
/base/telephony/call_manager/frameworks/js/napi/src/
Dnapi_call_manager_callback.cpp27 … int32_t ret = DelayedSingleton<NapiCallAbilityCallback>::GetInstance()->UpdateCallStateInfo(info); in OnCallDetailsChange() local
28 if (ret != TELEPHONY_SUCCESS) { in OnCallDetailsChange()
29 TELEPHONY_LOGE("UpdateCallStateInfoHandler failed! errCode:%{public}d", ret); in OnCallDetailsChange()
34 return ret; in OnCallDetailsChange()
39 int32_t ret = DelayedSingleton<NapiCallAbilityCallback>::GetInstance()->UpdateCallEvent(info); in OnCallEventChange() local
40 if (ret != TELEPHONY_SUCCESS) { in OnCallEventChange()
41 TELEPHONY_LOGE("UpdateCallEvent failed! errCode:%{public}d", ret); in OnCallEventChange()
45 return ret; in OnCallEventChange()
50 …int32_t ret = DelayedSingleton<NapiCallAbilityCallback>::GetInstance()->UpdateCallDisconnectedCaus… in OnCallDisconnectedCause() local
51 if (ret != TELEPHONY_SUCCESS) { in OnCallDisconnectedCause()
[all …]
/base/sensors/sensor/frameworks/native/src/
Dsensor_agent.cpp49 int32_t ret = SENSOR_AGENT_IMPL->GetAllSensors(sensorInfo, count); in GetAllSensors() local
50 if (ret != OHOS::ERR_OK) { in GetAllSensors()
52 return NormalizeErrCode(ret); in GetAllSensors()
54 return ret; in GetAllSensors()
59 int32_t ret = SENSOR_AGENT_IMPL->ActivateSensor(sensorId, user); in ActivateSensor() local
60 if (ret != OHOS::ERR_OK) { in ActivateSensor()
62 return NormalizeErrCode(ret); in ActivateSensor()
64 return ret; in ActivateSensor()
69 int32_t ret = SENSOR_AGENT_IMPL->DeactivateSensor(sensorId, user); in DeactivateSensor() local
70 if (ret != OHOS::ERR_OK) { in DeactivateSensor()
[all …]
/base/security/device_auth/test/unittest/deviceauth/unit_test/source/
Dcommon_lib_test.cpp83 HcBool ret = ParcelReadWithoutPopData(&parcelWithData, &num, uintDataSize); variable
84 EXPECT_EQ(ret, HC_TRUE);
85 ret = ParcelRead(nullptr, nullptr, uintDataSize);
86 EXPECT_EQ(ret, HC_FALSE);
87 ret = ParcelRead(&parcelWithData, &num, uintDataSize);
88 EXPECT_EQ(ret, HC_TRUE);
90 ret = ParcelRead(&parcelWithData, &num, uintDataSize);
93 ret = ParcelRead(&parcelWithData, &num, uintDataSize);
94 EXPECT_EQ(ret, HC_FALSE);
105 HcBool ret = ParcelEraseBlock(nullptr, start, uintDataSize, &num); variable
[all …]
/base/security/device_auth/frameworks/src/
Dipc_sdk.c57 int32_t ret; in DelIpcCliCallbackCtx() local
63 ret = memcmp(appId, cbCache->appId, strlen(cbCache->appId) + 1); in DelIpcCliCallbackCtx()
64 if (ret == 0) { in DelIpcCliCallbackCtx()
124 int32_t ret; in IpcGmRegCallback() local
131 ret = CreateCallCtx(&callCtx, NULL); in IpcGmRegCallback()
132 if (ret != HC_SUCCESS) { in IpcGmRegCallback()
133 LOGE("CreateCallCtx failed, ret %d", ret); in IpcGmRegCallback()
137ret = SetCallRequestParamInfo(callCtx, PARAM_TYPE_APPID, (const uint8_t *)appId, strlen(appId) + 1… in IpcGmRegCallback()
138 if (ret != HC_SUCCESS) { in IpcGmRegCallback()
139 LOGE("set request param failed, ret %d, type %d", ret, PARAM_TYPE_APPID); in IpcGmRegCallback()
[all …]
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/
Dcert_manager_auth_mgr.c93 int32_t ret = CertManagerUriDecode(uriObj, (char *)uri->data); in GetAndCheckUriObj() local
94 if (ret != CM_SUCCESS) { in GetAndCheckUriObj()
95 CM_LOG_E("uri decode failed, ret = %d", ret); in GetAndCheckUriObj()
96 return ret; in GetAndCheckUriObj()
138 int32_t ret = UintToString(clientUid, uidStr, MAX_UINT32_LEN); in ConstructToBeAuthedUri() local
139 if (ret != CM_SUCCESS) { in ConstructToBeAuthedUri()
141 return ret; in ConstructToBeAuthedUri()
157 int32_t ret = UintToString(clientUid, uidStr, MAX_UINT32_LEN); in ConstructMacKeyUri() local
158 if (ret != CM_SUCCESS) { in ConstructMacKeyUri()
160 return ret; in ConstructMacKeyUri()
[all …]

12345678910>>...96