/base/startup/init/test/unittest/seccomp/ |
D | seccomp_unittest.cpp | 164 int ret = unshare(CLONE_NEWPID); in CheckUnshare() local 165 if (ret) { in CheckUnshare() 245 int ret = (int)syscall(__NR_mq_open, nullptr, 0); in CheckMqOpen() local 246 if (ret < 0) { in CheckMqOpen() 276 int ret = syscall(__NR_setresuid, 20000, 20000, 20000); in CheckSetresuidArgsInRange() local 277 if (ret == 0) { in CheckSetresuidArgsInRange() 286 int ret = syscall(__NR_setresuid, 800, 800, 800); in CheckSetresuidArgsOutOfRange() local 287 if (ret == 0) { in CheckSetresuidArgsOutOfRange() 306 int ret = syscall(__NR_setuid, 0); in CheckSetuid64ForUidFilter1() local 307 if (ret == 0) { in CheckSetuid64ForUidFilter1() [all …]
|
/base/security/crypto_framework/test/unittest/src/aes_cipher/ |
D | crypto_aes_ecb_cipher_test.cpp | 53 int ret = 0; variable 61 ret = HcfSymKeyGeneratorCreate("AES128", &generator); 62 if (ret != 0) { 63 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret); 67 ret = generator->generateSymKey(generator, &key); 68 if (ret != 0) { 73 ret = HcfCipherCreate("AES128|ECB|NoPadding", &cipher); 74 if (ret != 0) { 79 ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); 80 if (ret != 0) { [all …]
|
D | crypto_aes_cfb_cipher_test.cpp | 47 int ret = 0; variable 59 ret = HcfSymKeyGeneratorCreate("AES128", &generator); 60 if (ret != 0) { 61 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret); 65 ret = generator->generateSymKey(generator, &key); 66 if (ret != 0) { 71 ret = HcfCipherCreate("AES128|CFB|NoPadding", &cipher); 72 if (ret != 0) { 77 ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); 78 if (ret != 0) { [all …]
|
D | crypto_aes_cipher_test.cpp | 47 int ret = 0; variable 53 ret = HcfSymKeyGeneratorCreate(inputAlgoName, &generator); 54 if (ret != 0) { 55 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret); 58 ret = generator->generateSymKey(generator, &key); 59 if (ret != 0) { 68 ret = HCF_ERR_CRYPTO_OPERATION; 72 ret = strcmp(generatorAlgoName, inputAlgoName); 73 if (ret != 0) { 79 EXPECT_EQ(ret, 0); [all …]
|
D | crypto_aes_ofb_cipher_test.cpp | 47 int ret = 0; variable 59 ret = HcfSymKeyGeneratorCreate("AES128", &generator); 60 if (ret != 0) { 61 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret); 65 ret = generator->generateSymKey(generator, &key); 66 if (ret != 0) { 71 ret = HcfCipherCreate("AES128|OFB|NoPadding", &cipher); 72 if (ret != 0) { 77 ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); 78 if (ret != 0) { [all …]
|
D | crypto_aes_cbc_cipher_test.cpp | 47 int ret = 0; variable 59 ret = HcfSymKeyGeneratorCreate("AES128", &generator); 60 if (ret != 0) { 61 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret); 65 ret = generator->generateSymKey(generator, &key); 66 if (ret != 0) { 71 ret = HcfCipherCreate("AES128|CBC|NoPadding", &cipher); 72 if (ret != 0) { 77 ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); 78 if (ret != 0) { [all …]
|
D | crypto_aes_ctr_cipher_test.cpp | 47 int ret = 0; variable 59 ret = HcfSymKeyGeneratorCreate("AES128", &generator); 60 if (ret != 0) { 61 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret); 65 ret = generator->generateSymKey(generator, &key); 66 if (ret != 0) { 71 ret = HcfCipherCreate("AES128|CTR|NoPadding", &cipher); 72 if (ret != 0) { 77 ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); 78 if (ret != 0) { [all …]
|
/base/security/huks/frameworks/huks_standard/main/crypto_engine/rkc/src/ |
D | hks_rkc_rw.c | 65 int32_t ret; in GetKeyBlobKsf() local 68 ret = GetProcessInfo(&processInfo); in GetKeyBlobKsf() 69 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "get process info failed") in GetKeyBlobKsf() 73 ret = HksStoreGetKeyBlob(&processInfo, &fileNameBlob, HKS_STORAGE_TYPE_ROOT_KEY, tmpKsf); in GetKeyBlobKsf() 74 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "Get ksf file failed! ret = 0x%" LOG_PUBLIC "X", ret) in GetKeyBlobKsf() 82 return ret; in GetKeyBlobKsf() 134 int32_t ret = ExtractFieldFromBuffer(ksfFromFile, ksfBufOffset, fileFlag, HKS_RKC_KSF_FLAG_LEN); in RkcExtractKsfFileFlag() local 135 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "Memcpy file flag failed!") in RkcExtractKsfFileFlag() 148 …int32_t ret = ExtractFieldFromBuffer(ksfFromFile, ksfBufOffset, &(time->hksYear), sizeof(time->hks… in RkcExtractTime() local 149 HKS_IF_NOT_SUCC_RETURN(ret, ret) in RkcExtractTime() [all …]
|
/base/security/crypto_framework/test/unittest/src/ |
D | crypto_3des_cipher_test.cpp | 59 HcfResult ret = HcfSymKeyGeneratorCreate("3DES192", &generator); in GenerateDesSymKey() local 60 if (ret != HCF_SUCCESS) { in GenerateDesSymKey() 62 return ret; in GenerateDesSymKey() 65 ret = generator->generateSymKey(generator, key); in GenerateDesSymKey() 66 if (ret != HCF_SUCCESS) { in GenerateDesSymKey() 70 return ret; in GenerateDesSymKey() 80 int32_t ret = cipher->init(cipher, ENCRYPT_MODE, (HcfKey *)key, params); in DesEncrypt() local 81 if (ret != 0) { in DesEncrypt() 82 LOGE("init failed! %d", ret); in DesEncrypt() 83 return ret; in DesEncrypt() [all …]
|
D | crypto_sm4_ecb_cipher_test.cpp | 47 int ret = 0; variable 55 ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); 56 if (ret != 0) { 61 ret = generator->generateSymKey(generator, &key); 62 if (ret != 0) { 67 ret = HcfCipherCreate("SM4_128|ECB|NoPadding", &cipher); 68 if (ret != 0) { 73 ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); 74 if (ret != 0) { 79 ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); [all …]
|
D | crypto_sm4_cfb_cipher_test.cpp | 47 int ret = 0; variable 56 ret = HcfSymKeyGeneratorCreate("SM4_128", &generator); 57 if (ret != 0) { 62 ret = generator->generateSymKey(generator, &key); 63 if (ret != 0) { 68 ret = HcfCipherCreate("SM4_128|CFB|NoPadding", &cipher); 69 if (ret != 0) { 74 ret = Sm4Encrypt(cipher, key, nullptr, cipherText, &cipherTextLen); 75 if (ret != 0) { 80 ret = Sm4Decrypt(cipher, key, nullptr, cipherText, cipherTextLen); [all …]
|
/base/security/huks/services/huks_standard/huks_service/main/os_dependency/idl/ipc/ |
D | hks_ipc_service.c | 64 int32_t ret; in HksIpcServiceGenerateKey() local 68 ret = HksGenerateKeyUnpack(srcData, &keyAlias, &inParamSet, &keyOut); in HksIpcServiceGenerateKey() 69 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksGenerateKeyUnpack Ipc fail") in HksIpcServiceGenerateKey() 76 ret = HKS_ERROR_MALLOC_FAIL; in HksIpcServiceGenerateKey() 82 ret = HksGetProcessInfoForIPC(context, &processInfo); in HksIpcServiceGenerateKey() 83 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksGetProcessInfoForIPC fail, ret = %" LOG_PUBLIC "d", ret) in HksIpcServiceGenerateKey() 85 ret = AppendSpecificUserIdAndStorageLevelToProcessInfo(inParamSet, &processInfo); in HksIpcServiceGenerateKey() 86 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, in HksIpcServiceGenerateKey() 87 "AppendSpecificUserIdAndStorageLevelToProcessInfo fail, ret = %" LOG_PUBLIC "d", ret) in HksIpcServiceGenerateKey() 90 ret = HksCheckAndGetUserAuthInfo(inParamSet, &userAuthType, &authAccessType); in HksIpcServiceGenerateKey() [all …]
|
/base/security/huks/test/unittest/huks_common_test/src/ |
D | hks_test_curve25519_func.cpp | 22 int32_t ret = HksInitParamSet(¶mSet); in TestGenerateEd25519Key() local 23 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 27 ret = HksAddParams(paramSet, &algParam, 1); in TestGenerateEd25519Key() 28 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 32 ret = HksAddParams(paramSet, &keySizeParam, 1); in TestGenerateEd25519Key() 33 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 37 ret = HksAddParams(paramSet, &purposeParam, 1); in TestGenerateEd25519Key() 38 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 42 ret = HksAddParams(paramSet, &digestParam, 1); in TestGenerateEd25519Key() 43 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() [all …]
|
/base/sensors/sensor_lite/interfaces/kits/native/test/unittest/src/ |
D | sensor_agent_interfaces_test.cpp | 61 int32_t ret = GetAllSensors(&sensorInfo, &count); variable 71 EXPECT_EQ(ret, 0) << "GetAllSensors ret = " << ret << endl; 84 int32_t ret = GetAllSensors(sensorInfo, (int32_t *)NULLPTR); variable 85 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "GetAllSensors ret = " << ret << endl; 99 int32_t ret = GetAllSensors(sensorInfo, &count); variable 100 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "GetAllSensors ret = " << ret << endl; 113 int32_t ret = GetAllSensors(&sensorInfo, (int32_t *)NULLPTR); variable 114 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "GetAllSensors ret = " << ret << endl; 127 int32_t ret = ActivateSensor(-1, &sensorUser); variable 128 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "ActivateSensor ret = " << ret << endl; [all …]
|
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_service/main/os_dependency/idl/cm_ipc/ |
D | cm_ipc_service.c | 47 int32_t ret = CmGetProcessInfoForIPC(cmContext); in GetInputParams() local 48 if (ret != CM_SUCCESS) { in GetInputParams() 49 CM_LOG_E("get ipc info failed, ret = %d", ret); in GetInputParams() 50 return ret; in GetInputParams() 54 ret = CmGetParamSet((struct CmParamSet *)paramSetBlob->data, paramSetBlob->size, paramSet); in GetInputParams() 55 if (ret != CM_SUCCESS) { in GetInputParams() 56 CM_LOG_E("get paramSet failed, ret = %d", ret); in GetInputParams() 57 return ret; in GetInputParams() 60 ret = CmParamSetToParams(*paramSet, params, paramsCount); in GetInputParams() 61 if (ret != CM_SUCCESS) { in GetInputParams() [all …]
|
/base/startup/init/test/unittest/param/ |
D | dac_unittest.cpp | 38 int ret = RegisterSecurityDacOps(nullptr, LABEL_INIT_FOR_INIT); in TestDacInitLocalLabel() local 39 EXPECT_NE(ret, 0); in TestDacInitLocalLabel() 40 ret = RegisterSecurityDacOps(&initParamSecurityOps, LABEL_INIT_FOR_INIT); in TestDacInitLocalLabel() 41 EXPECT_EQ(ret, 0); in TestDacInitLocalLabel() 47 ret = initParamSecurityOps.securityInitLabel(&label, LABEL_INIT_FOR_INIT); in TestDacInitLocalLabel() 48 EXPECT_EQ(ret, 0); in TestDacInitLocalLabel() 49 ret = initParamSecurityOps.securityFreeLabel(&label); in TestDacInitLocalLabel() 50 EXPECT_EQ(ret, 0); in TestDacInitLocalLabel() 56 int ret = RegisterSecurityDacOps(&initParamSecurityOps, LABEL_INIT_FOR_INIT); in TestDacGetLabel() local 57 EXPECT_EQ(ret, 0); in TestDacGetLabel() [all …]
|
/base/security/huks/services/huks_standard/huks_service/main/core/src/ |
D | hks_client_service.c | 73 int32_t ret = HksStoreGetKeyBlob(processInfo, keyAlias, mode, key); in GetKeyData() local 74 HKS_IF_NOT_SUCC_LOGE(ret, "get key blob from storage failed, ret = %" LOG_PUBLIC "d", ret) in GetKeyData() 75 return ret; in GetKeyData() 82 int32_t ret = HksStoreGetToatalSize(&size); in CheckKeyCondition() local 83 …HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "get total size from storage failed, ret = %" LOG_PUBLIC "d"… in CheckKeyCondition() 87 ret = HksStoreIsKeyBlobExist(processInfo, keyAlias, HKS_STORAGE_TYPE_KEY); in CheckKeyCondition() 88 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_STORAGE_FAILURE, "buffer exceeds limit") in CheckKeyCondition() 97 int32_t ret = HksCheckGetKeyInfoListParams(&(processInfo->processName), keyInfoList, listCount); in HksServiceGetKeyInfoList() local 98 HKS_IF_NOT_SUCC_RETURN(ret, ret) in HksServiceGetKeyInfoList() 100 ret = HksStoreGetKeyInfoList(keyInfoList, listCount); in HksServiceGetKeyInfoList() [all …]
|
/base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/common_test/src/ |
D | hks_param_test.cpp | 69 int32_t ret = HksCheckParamMatch(&baseParam, &otherParam); variable 70 EXPECT_EQ(ret, HKS_ERROR_INVALID_ARGUMENT) << "HksCheckParamMatch failed, ret = " << ret; 83 int32_t ret = HksCheckParamMatch(&baseParam, &otherParam); variable 84 EXPECT_EQ(ret, HKS_ERROR_INVALID_ARGUMENT) << "HksCheckParamMatch failed, ret = " << ret; 97 int32_t ret = HksCheckParamMatch(&baseParam, &otherParam); variable 98 EXPECT_EQ(ret, HKS_ERROR_INVALID_ARGUMENT) << "HksCheckParamMatch failed, ret = " << ret; 115 int32_t ret = HksCheckParamMatch(&baseParam, &otherParam); variable 116 EXPECT_EQ(ret, HKS_ERROR_INVALID_ARGUMENT) << "HksCheckParamMatch failed, ret = " << ret; 133 int32_t ret = HksCheckParamMatch(&baseParam, &otherParam); variable 134 EXPECT_EQ(ret, HKS_ERROR_INVALID_ARGUMENT) << "HksCheckParamMatch failed, ret = " << ret; [all …]
|
D | hks_check_paramset_test.cpp | 70 int32_t ret = CheckMutableParams(HKS_ALG_RSA, keyType, ¶ms); variable 71 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 85 int32_t ret = CheckMutableParams(HKS_ALG_ECC, keyType, ¶ms); variable 86 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 100 int32_t ret = CheckMutableParams(HKS_ALG_SM2, keyType, ¶ms); variable 101 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 115 int32_t ret = CheckMutableParams(HKS_ALG_DSA, keyType, ¶ms); variable 116 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 130 int32_t ret = CheckMutableParams(HKS_ALG_ED25519, keyType, ¶ms); variable 131 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); [all …]
|
/base/security/certificate_manager/test/unittest/src/ |
D | cm_user_cert_test.cpp | 535 int32_t ret; variable 539 ret = CmInstallUserTrustedCert(&userCert[0], &certAlias[0], &certUri); 540 EXPECT_EQ(ret, CM_SUCCESS) << "Normal user cert Install test failed, recode:" << ret; 542 ret = CmUninstallUserTrustedCert(&certUri); 543 EXPECT_EQ(ret, CM_SUCCESS) << "Normal user cert Uninstall test failed, recode:" << ret; 554 int32_t ret; variable 558 ret = CmInstallUserTrustedCert(&userCert[1], &certAlias[1], &certUri); 559 EXPECT_EQ(ret, CM_SUCCESS) << "Normal user cert Install test failed, recode:" << ret; 561 ret = CmUninstallUserTrustedCert(&certUri); 562 EXPECT_EQ(ret, CM_SUCCESS) << "Normal user cert Uninstall test failed, recode:" << ret; [all …]
|
/base/telephony/call_manager/frameworks/js/napi/src/ |
D | napi_call_manager_callback.cpp | 27 … int32_t ret = DelayedSingleton<NapiCallAbilityCallback>::GetInstance()->UpdateCallStateInfo(info); in OnCallDetailsChange() local 28 if (ret != TELEPHONY_SUCCESS) { in OnCallDetailsChange() 29 TELEPHONY_LOGE("UpdateCallStateInfoHandler failed! errCode:%{public}d", ret); in OnCallDetailsChange() 34 return ret; in OnCallDetailsChange() 39 int32_t ret = DelayedSingleton<NapiCallAbilityCallback>::GetInstance()->UpdateCallEvent(info); in OnCallEventChange() local 40 if (ret != TELEPHONY_SUCCESS) { in OnCallEventChange() 41 TELEPHONY_LOGE("UpdateCallEvent failed! errCode:%{public}d", ret); in OnCallEventChange() 45 return ret; in OnCallEventChange() 50 …int32_t ret = DelayedSingleton<NapiCallAbilityCallback>::GetInstance()->UpdateCallDisconnectedCaus… in OnCallDisconnectedCause() local 51 if (ret != TELEPHONY_SUCCESS) { in OnCallDisconnectedCause() [all …]
|
/base/sensors/sensor/frameworks/native/src/ |
D | sensor_agent.cpp | 49 int32_t ret = SENSOR_AGENT_IMPL->GetAllSensors(sensorInfo, count); in GetAllSensors() local 50 if (ret != OHOS::ERR_OK) { in GetAllSensors() 52 return NormalizeErrCode(ret); in GetAllSensors() 54 return ret; in GetAllSensors() 59 int32_t ret = SENSOR_AGENT_IMPL->ActivateSensor(sensorId, user); in ActivateSensor() local 60 if (ret != OHOS::ERR_OK) { in ActivateSensor() 62 return NormalizeErrCode(ret); in ActivateSensor() 64 return ret; in ActivateSensor() 69 int32_t ret = SENSOR_AGENT_IMPL->DeactivateSensor(sensorId, user); in DeactivateSensor() local 70 if (ret != OHOS::ERR_OK) { in DeactivateSensor() [all …]
|
/base/security/device_auth/test/unittest/deviceauth/unit_test/source/ |
D | common_lib_test.cpp | 83 HcBool ret = ParcelReadWithoutPopData(&parcelWithData, &num, uintDataSize); variable 84 EXPECT_EQ(ret, HC_TRUE); 85 ret = ParcelRead(nullptr, nullptr, uintDataSize); 86 EXPECT_EQ(ret, HC_FALSE); 87 ret = ParcelRead(&parcelWithData, &num, uintDataSize); 88 EXPECT_EQ(ret, HC_TRUE); 90 ret = ParcelRead(&parcelWithData, &num, uintDataSize); 93 ret = ParcelRead(&parcelWithData, &num, uintDataSize); 94 EXPECT_EQ(ret, HC_FALSE); 105 HcBool ret = ParcelEraseBlock(nullptr, start, uintDataSize, &num); variable [all …]
|
/base/security/device_auth/frameworks/src/ |
D | ipc_sdk.c | 57 int32_t ret; in DelIpcCliCallbackCtx() local 63 ret = memcmp(appId, cbCache->appId, strlen(cbCache->appId) + 1); in DelIpcCliCallbackCtx() 64 if (ret == 0) { in DelIpcCliCallbackCtx() 124 int32_t ret; in IpcGmRegCallback() local 131 ret = CreateCallCtx(&callCtx, NULL); in IpcGmRegCallback() 132 if (ret != HC_SUCCESS) { in IpcGmRegCallback() 133 LOGE("CreateCallCtx failed, ret %d", ret); in IpcGmRegCallback() 137 …ret = SetCallRequestParamInfo(callCtx, PARAM_TYPE_APPID, (const uint8_t *)appId, strlen(appId) + 1… in IpcGmRegCallback() 138 if (ret != HC_SUCCESS) { in IpcGmRegCallback() 139 LOGE("set request param failed, ret %d, type %d", ret, PARAM_TYPE_APPID); in IpcGmRegCallback() [all …]
|
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/ |
D | cert_manager_auth_mgr.c | 93 int32_t ret = CertManagerUriDecode(uriObj, (char *)uri->data); in GetAndCheckUriObj() local 94 if (ret != CM_SUCCESS) { in GetAndCheckUriObj() 95 CM_LOG_E("uri decode failed, ret = %d", ret); in GetAndCheckUriObj() 96 return ret; in GetAndCheckUriObj() 138 int32_t ret = UintToString(clientUid, uidStr, MAX_UINT32_LEN); in ConstructToBeAuthedUri() local 139 if (ret != CM_SUCCESS) { in ConstructToBeAuthedUri() 141 return ret; in ConstructToBeAuthedUri() 157 int32_t ret = UintToString(clientUid, uidStr, MAX_UINT32_LEN); in ConstructMacKeyUri() local 158 if (ret != CM_SUCCESS) { in ConstructMacKeyUri() 160 return ret; in ConstructMacKeyUri() [all …]
|