Home
last modified time | relevance | path

Searched full:ret (Results 1 – 25 of 3099) sorted by relevance

12345678910>>...124

/base/security/huks/services/huks_standard/huks_service/main/os_dependency/idl/ipc/
Dhks_ipc_service.c69 int32_t ret; in HksIpcServiceGenerateKey() local
73 ret = HksGenerateKeyUnpack(srcData, &keyAlias, &inParamSet, &keyOut); in HksIpcServiceGenerateKey()
74 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksGenerateKeyUnpack Ipc fail") in HksIpcServiceGenerateKey()
81 ret = HKS_ERROR_MALLOC_FAIL; in HksIpcServiceGenerateKey()
87 ret = HksGetProcessInfoForIPC(context, &processInfo); in HksIpcServiceGenerateKey()
88 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksGetProcessInfoForIPC fail, ret = %" LOG_PUBLIC "d", ret) in HksIpcServiceGenerateKey()
90 ret = HksCheckAcrossAccountsPermission(inParamSet, processInfo.userIdInt); in HksIpcServiceGenerateKey()
91 …HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksCheckAcrossAccountsPermission fail, ret = %" LOG_PUBLIC "d", r… in HksIpcServiceGenerateKey()
94 ret = HksGetParam(inParamSet, HKS_TAG_KEY_AUTH_ACCESS_TYPE, &accessTypeParam); in HksIpcServiceGenerateKey()
95 if (ret == HKS_SUCCESS && accessTypeParam != NULL && in HksIpcServiceGenerateKey()
[all …]
/base/security/device_auth/test/unittest/deviceauth/unit_test/source/
Dcommon_lib_test.cpp65 HcBool ret = ParcelEraseBlock(&parcel, 1, 1, dstNull); variable
66 EXPECT_EQ(ret, HC_FALSE);
67 ret = ParcelIncrease(parcelNull, 1);
68 EXPECT_EQ(ret, HC_FALSE);
69 ret = ParcelIncrease(&parcel, 0);
70 EXPECT_EQ(ret, HC_FALSE);
73 ret = ParcelWrite(&parcel, srcNull, 1);
74 EXPECT_EQ(ret, HC_FALSE);
75 ret = ParcelPopBack(parcelNull, 1);
76 EXPECT_EQ(ret, HC_FALSE);
[all …]
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/
Dhks_rename_part1_test.cpp70 int32_t ret = HksInitParamSet(&paramSet); in TestGenerateKey() local
71 if (ret != HKS_SUCCESS) { in TestGenerateKey()
73 return ret; in TestGenerateKey()
76 ret = HksAddParams(paramSet, tmpParams, sizeof(tmpParams) / sizeof(tmpParams[0])); in TestGenerateKey()
77 if (ret != HKS_SUCCESS) { in TestGenerateKey()
80 return ret; in TestGenerateKey()
83 ret = HksBuildParamSet(&paramSet); in TestGenerateKey()
84 if (ret != HKS_SUCCESS) { in TestGenerateKey()
87 return ret; in TestGenerateKey()
90 ret = HksGenerateKey(keyAlias, paramSet, nullptr); in TestGenerateKey()
[all …]
/base/security/huks/services/huks_standard/huks_service/main/core/src/
Dhks_client_service.c110 int32_t ret = HuksAccessGetErrorInfo(&errMsg); in IfNotSuccAppendHdiErrorInfo() local
111 if (ret == HKS_ERROR_API_NOT_SUPPORTED) { in IfNotSuccAppendHdiErrorInfo()
116 if (ret == HKS_SUCCESS && CheckBlob(&errMsg) == HKS_SUCCESS && errMsg.size > offset) { in IfNotSuccAppendHdiErrorInfo()
120 … HKS_LOG_E("HuksAccessGetErrorInfo fail, ret = %" LOG_PUBLIC "d, errMsg size = %" LOG_PUBLIC "u", in IfNotSuccAppendHdiErrorInfo()
121 ret, errMsg.size); in IfNotSuccAppendHdiErrorInfo()
134 int32_t ret = HksGetParam(paramSet, HKS_TAG_SPECIFIC_USER_ID, &specificUserId); in AddSpecificUserIdToParamSet() local
135 if (ret == HKS_ERROR_PARAM_NOT_EXIST) { in AddSpecificUserIdToParamSet()
140 ret = HksAddParams(paramSet, &specificUserIdParam, 1); in AddSpecificUserIdToParamSet()
142 return ret; in AddSpecificUserIdToParamSet()
150 …int32_t ret = HksMatchConfig("", processInfo->uidInt, processInfo->userIdInt, processInfo->accessT… in GetStorageLevelForSkipUpgradeApp() local
[all …]
/base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/common_test/src/
Dhks_check_paramset_test.cpp70 int32_t ret = CheckMutableParams(HKS_ALG_RSA, keyType, &params); variable
71 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE);
85 int32_t ret = CheckMutableParams(HKS_ALG_ECC, keyType, &params); variable
86 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE);
100 int32_t ret = CheckMutableParams(HKS_ALG_SM2, keyType, &params); variable
101 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE);
115 int32_t ret = CheckMutableParams(HKS_ALG_DSA, keyType, &params); variable
116 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE);
130 int32_t ret = CheckMutableParams(HKS_ALG_ED25519, keyType, &params); variable
131 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE);
[all …]
/base/security/huks/test/unittest/huks_common_test/src/
Dhks_test_curve25519_func.cpp23 int32_t ret = HksInitParamSet(&paramSet); in TestGenerateEd25519Key() local
24 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key()
28 ret = HksAddParams(paramSet, &algParam, 1); in TestGenerateEd25519Key()
29 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key()
33 ret = HksAddParams(paramSet, &keySizeParam, 1); in TestGenerateEd25519Key()
34 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key()
38 ret = HksAddParams(paramSet, &purposeParam, 1); in TestGenerateEd25519Key()
39 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key()
43 ret = HksAddParams(paramSet, &digestParam, 1); in TestGenerateEd25519Key()
44 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key()
[all …]
Dhks_test_adapt_for_de.c23 int32_t ret = HksInitParamSet(paramSet); in GenerateParamSet() local
24 if (ret != HKS_SUCCESS) { in GenerateParamSet()
26 return ret; in GenerateParamSet()
30 ret = HksAddParams(*paramSet, tmpParams, paramCount); in GenerateParamSet()
31 if (ret != HKS_SUCCESS) { in GenerateParamSet()
34 return ret; in GenerateParamSet()
38 ret = HksBuildParamSet(paramSet); in GenerateParamSet()
39 if (ret != HKS_SUCCESS) { in GenerateParamSet()
42 return ret; in GenerateParamSet()
44 return ret; in GenerateParamSet()
[all …]
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_service/main/os_dependency/idl/cm_ipc/
Dcm_ipc_service.c46 int32_t ret = CmGetProcessInfoForIPC(cmContext); in GetInputParams() local
47 if (ret != CM_SUCCESS) { in GetInputParams()
48 CM_LOG_E("get ipc info failed, ret = %d", ret); in GetInputParams()
49 return ret; in GetInputParams()
53 ret = CmGetParamSet((struct CmParamSet *)paramSetBlob->data, paramSetBlob->size, paramSet); in GetInputParams()
54 if (ret != CM_SUCCESS) { in GetInputParams()
55 CM_LOG_E("get paramSet failed, ret = %d", ret); in GetInputParams()
56 return ret; in GetInputParams()
59 ret = CmParamSetToParams(*paramSet, params, paramsCount); in GetInputParams()
60 if (ret != CM_SUCCESS) { in GetInputParams()
[all …]
/base/security/device_auth/frameworks/src/
Dipc_service_common.c49 int32_t ret = GetIpcRequestParamByType(ipcParams, paramNum, paramType, param, paramSize); in GetAndValSize32Param() local
50 if ((*paramSize) != sizeof(int32_t) || ret != HC_SUCCESS) { in GetAndValSize32Param()
60 int32_t ret = GetIpcRequestParamByType(ipcParams, paramNum, paramType, param, paramSize); in GetAndValSize64Param() local
61 if ((*paramSize) != sizeof(int64_t) || ret != HC_SUCCESS) { in GetAndValSize64Param()
71 int32_t ret = GetIpcRequestParamByType(ipcParams, paramNum, paramType, param, paramSize); in GetAndValSizeCbParam() local
72 if ((*paramSize) != sizeof(DeviceAuthCallback) || ret != HC_SUCCESS) { in GetAndValSizeCbParam()
82 int32_t ret = GetIpcRequestParamByType(ipcParams, paramNum, paramType, param, NULL); in GetAndValNullParam() local
83 if (param == NULL || ret != HC_SUCCESS) { in GetAndValNullParam()
93 int32_t ret; in BindRequestIdWithAppId() local
108 ret = AddReqIdByAppId(appId, requestId); in BindRequestIdWithAppId()
[all …]
Dipc_sdk.c62 int32_t ret; in DelIpcCliCallbackCtx() local
68 ret = memcmp(appId, cbCache->appId, HcStrlen(cbCache->appId) + 1); in DelIpcCliCallbackCtx()
69 if (ret == 0) { in DelIpcCliCallbackCtx()
137 int32_t ret; in IpcGmRegCallback() local
144 ret = CreateCallCtx(&callCtx, NULL); in IpcGmRegCallback()
145 if (ret != HC_SUCCESS) { in IpcGmRegCallback()
146 LOGE("CreateCallCtx failed, ret %" LOG_PUB "d", ret); in IpcGmRegCallback()
150ret = SetCallRequestParamInfo(callCtx, PARAM_TYPE_APPID, (const uint8_t *)appId, HcStrlen(appId) +… in IpcGmRegCallback()
151 if (ret != HC_SUCCESS) { in IpcGmRegCallback()
152 … LOGE("set request param failed, ret %" LOG_PUB "d, type %" LOG_PUB "d", ret, PARAM_TYPE_APPID); in IpcGmRegCallback()
[all …]
Didentity_service_ipc_sdk.c57 int32_t ret; in DelIpcCliCallbackCtx() local
63 ret = memcmp(appId, cbCache->appId, HcStrlen(cbCache->appId) + 1); in DelIpcCliCallbackCtx()
64 if (ret == 0) { in DelIpcCliCallbackCtx()
127 …int32_t ret = SetCallRequestParamInfo(callCtx, PARAM_TYPE_OS_ACCOUNT_ID, (const uint8_t *)&osAccou… in EncodeAddCredentialParams() local
129 if (ret != HC_SUCCESS) { in EncodeAddCredentialParams()
130 …LOGE("set request param failed, ret %" LOG_PUB "d, param id %" LOG_PUB "d", ret, PARAM_TYPE_OS_ACC… in EncodeAddCredentialParams()
133ret = SetCallRequestParamInfo(callCtx, PARAM_TYPE_REQUEST_PARAMS, (const uint8_t *)requestParams, in EncodeAddCredentialParams()
135 if (ret != HC_SUCCESS) { in EncodeAddCredentialParams()
136 …LOGE("set request param failed, ret %" LOG_PUB "d, param id %" LOG_PUB "d", ret, PARAM_TYPE_REQUES… in EncodeAddCredentialParams()
145 int32_t ret; in AddCredentialIpcResult() local
[all …]
/base/security/huks/frameworks/huks_standard/main/crypto_engine/rkc/src/
Dhks_rkc_rw.c68 int32_t ret; in GetKeyBlobKsf() local
72 ret = GetProcessInfo(&processInfo); in GetKeyBlobKsf()
73 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "get process info failed") in GetKeyBlobKsf()
77 ret = HksRkcBuildParamSet(&paramSet); in GetKeyBlobKsf()
78 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "rkc build paramset failed") in GetKeyBlobKsf()
80ret = HksManageStoreGetKeyBlob(&processInfo, paramSet, &fileNameBlob, tmpKsf, HKS_STORAGE_TYPE_ROO… in GetKeyBlobKsf()
81 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "Get ksf file failed! ret = 0x%" LOG_PUBLIC "X", ret) in GetKeyBlobKsf()
91 return ret; in GetKeyBlobKsf()
146 int32_t ret = ExtractFieldFromBuffer(ksfFromFile, ksfBufOffset, fileFlag, HKS_RKC_KSF_FLAG_LEN); in RkcExtractKsfFileFlag() local
147 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "Memcpy file flag failed!") in RkcExtractKsfFileFlag()
[all …]
/base/security/device_auth/test/unittest/deviceauth/source/
Didentity_manager_test.cpp60 int32_t ret = InitDeviceAuthService(); in SetUp() local
61 ASSERT_EQ(ret, HC_SUCCESS); in SetUp()
71 int32_t ret = AddCertInfoToJson(nullptr, nullptr); variable
72 EXPECT_NE(ret, HC_SUCCESS);
74 ret = AddCertInfoToJson(&info, nullptr);
75 EXPECT_NE(ret, HC_SUCCESS);
86 ret = AddCertInfoToJson(&info, out);
87 EXPECT_NE(ret, HC_SUCCESS);
91 ret = AddCertInfoToJson(&info, out);
92 EXPECT_EQ(ret, HC_SUCCESS);
[all …]
/base/time/time_service/framework/cj/src/
Dsystem_date_time_ffi.cpp28 RetCode ret = SystemDateTimeImpl::SetTime(time); in FfiOHOSSysDateTimeSetTime() local
29 if (ret != SUCCESS_CODE) { in FfiOHOSSysDateTimeSetTime()
30 return ret; in FfiOHOSSysDateTimeSetTime()
32 return ret; in FfiOHOSSysDateTimeSetTime()
37 RetDataI64 ret = { .code = INVALID_DATA_ID, .data = 0 }; in FfiOHOSSysDateTimegetCurrentTime() local
40 ret.code = state; in FfiOHOSSysDateTimegetCurrentTime()
41 ret.data = 0; in FfiOHOSSysDateTimegetCurrentTime()
42 return ret; in FfiOHOSSysDateTimegetCurrentTime()
44 ret.code = state; in FfiOHOSSysDateTimegetCurrentTime()
45 ret.data = time; in FfiOHOSSysDateTimegetCurrentTime()
[all …]
/base/security/crypto_framework/test/unittest/src/aes_cipher/
Dcrypto_aes_ecb_cipher_test.cpp53 int ret = 0; variable
61 ret = HcfSymKeyGeneratorCreate("AES128", &generator);
62 if (ret != 0) {
63 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret);
67 ret = generator->generateSymKey(generator, &key);
68 if (ret != 0) {
73 ret = HcfCipherCreate("AES128|ECB|NoPadding", &cipher);
74 if (ret != 0) {
79 ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen);
80 if (ret != 0) {
[all …]
Dcrypto_aes_cfb_cipher_test.cpp47 int ret = 0; variable
59 ret = HcfSymKeyGeneratorCreate("AES128", &generator);
60 if (ret != 0) {
61 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret);
65 ret = generator->generateSymKey(generator, &key);
66 if (ret != 0) {
71 ret = HcfCipherCreate("AES128|CFB|NoPadding", &cipher);
72 if (ret != 0) {
77 ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen);
78 if (ret != 0) {
[all …]
/base/security/access_token/interfaces/innerkits/accesstoken/test/unittest/DlpTest/
Dclone_app_permission_test.cpp169 int ret = AccessTokenKit::VerifyAccessToken(tokenId, PERMISSION_FULL_CONTROL, false); in AllocHapTokenId() local
170 EXPECT_EQ(ret, PermissionState::PERMISSION_DENIED); in AllocHapTokenId()
171 ret = AccessTokenKit::VerifyAccessToken(tokenId, PERMISSION_ALL, false); in AllocHapTokenId()
172 EXPECT_EQ(ret, PermissionState::PERMISSION_DENIED); in AllocHapTokenId()
174 ret = AccessTokenKit::GetPermissionFlag(tokenId, PERMISSION_FULL_CONTROL, flag); in AllocHapTokenId()
176 EXPECT_EQ(ret, RET_SUCCESS); in AllocHapTokenId()
177 ret = AccessTokenKit::GetPermissionFlag(tokenId, PERMISSION_ALL, flag); in AllocHapTokenId()
179 EXPECT_EQ(ret, RET_SUCCESS); in AllocHapTokenId()
191 int ret; variable
200 ret = AccessTokenKit::GrantPermission(tokenCommon, PERMISSION_ALL, PERMISSION_USER_FIXED);
[all …]
/base/security/huks/frameworks/huks_standard/main/os_dependency/ipc/src/
Dhks_client_service_ipc.c70 int32_t ret; in BuildParamSetNotNull() local
74 ret = HksCheckParamSet(paramSetIn, paramSetIn->paramSetSize); in BuildParamSetNotNull()
75 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "check paramSet failed") in BuildParamSetNotNull()
78 ret = HksInitParamSet(&tmpParamSet); in BuildParamSetNotNull()
79 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksInitParamSet failed") in BuildParamSetNotNull()
82 ret = HksAddParams(tmpParamSet, paramSetIn->params, paramSetIn->paramsCnt); in BuildParamSetNotNull()
83 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksAddParams failed") in BuildParamSetNotNull()
85 ret = HksBuildParamSet(&tmpParamSet); in BuildParamSetNotNull()
86 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksBuildParamSet failed") in BuildParamSetNotNull()
88 if (ret != HKS_SUCCESS) { in BuildParamSetNotNull()
[all …]
/base/security/crypto_framework/test/unittest/src/
Dcrypto_3des_cipher_test.cpp59 HcfResult ret = HcfSymKeyGeneratorCreate("3DES192", &generator); in GenerateDesSymKey() local
60 if (ret != HCF_SUCCESS) { in GenerateDesSymKey()
62 return ret; in GenerateDesSymKey()
65 ret = generator->generateSymKey(generator, key); in GenerateDesSymKey()
66 if (ret != HCF_SUCCESS) { in GenerateDesSymKey()
70 return ret; in GenerateDesSymKey()
80 int32_t ret = cipher->init(cipher, ENCRYPT_MODE, (HcfKey *)key, params); in DesEncrypt() local
81 if (ret != 0) { in DesEncrypt()
82 LOGE("init failed! %d", ret); in DesEncrypt()
83 return ret; in DesEncrypt()
[all …]
Dcrypto_signature_exception_test.cpp50 HcfResult ret = EngineSignInit((HcfSignSpi *)&g_obj, nullptr, &sk); variable
51 ASSERT_EQ(ret, HCF_INVALID_PARAMS);
53 ret = EngineSignInit((HcfSignSpi *)&g_obj, nullptr, &sk);
54 ASSERT_EQ(ret, HCF_INVALID_PARAMS);
66 HcfResult ret = EngineVerifyInit((HcfVerifySpi *)&g_obj, nullptr, &pk); variable
67 ASSERT_EQ(ret, HCF_INVALID_PARAMS);
69 ret = EngineVerifyInit((HcfVerifySpi *)&g_obj, nullptr, &pk);
70 ASSERT_EQ(ret, HCF_INVALID_PARAMS);
75 HcfResult ret = EngineSignUpdate((HcfSignSpi *)&g_obj, nullptr); variable
76 ASSERT_EQ(ret, HCF_INVALID_PARAMS);
[all …]
/base/security/huks/services/huks_standard/huks_service/main/hks_storage/src/
Dhks_storage_manager.c59 int32_t ret = HksGetParam(paramSet, HKS_TAG_SPECIFIC_USER_ID, &specificUserIdParam); in GetStorageLevelAndStoreUserIdParam() local
60 if (ret == HKS_SUCCESS) { in GetStorageLevelAndStoreUserIdParam()
62 } else if (ret == HKS_ERROR_PARAM_NOT_EXIST) { in GetStorageLevelAndStoreUserIdParam()
64 ret = HKS_SUCCESS; in GetStorageLevelAndStoreUserIdParam()
66 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "get store user id failed, ret = %" LOG_PUBLIC "d.", ret) in GetStorageLevelAndStoreUserIdParam()
69 ret = HksGetParam(paramSet, HKS_TAG_AUTH_STORAGE_LEVEL, &storageLevelParam); in GetStorageLevelAndStoreUserIdParam()
70 …HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "get storage level tag failed, ret = %" LOG_PUBLIC "d.", ret) in GetStorageLevelAndStoreUserIdParam()
79 return ret; in GetStorageLevelAndStoreUserIdParam()
126 int32_t ret; in GetUserIdPath() local
128 ret = ConstructPlainName(&userIdBlob, outMaterial->userIdPath, HKS_MAX_FILE_NAME_LEN); in GetUserIdPath()
[all …]
Dhks_storage.c47 int32_t ret = HksGetFileName(path, fileName, fullPath, HKS_MAX_FILE_NAME_LEN); in CreateStorageFileLock()
48 if (ret != HKS_SUCCESS) { in CreateStorageFileLock()
49 HKS_LOG_E("get full path failed, ret = %" LOG_PUBLIC "d.", ret); in CreateStorageFileLock()
66 int32_t ret = HksFileWrite(path, fileName, offset, buf, len); in HksStorageWriteFile() local
69 return ret; in HksStorageWriteFile()
81 int32_t ret = HksFileRead(path, fileName, offset, blob, size); in HksStorageReadFile() local
85 int32_t ret = HksFileRead(path, fileName, offset, blob, size); in HksStorageReadFile()
87 return ret; in HksStorageReadFile()
95 HKS_LOG_E("get file size failed, ret = %" LOG_PUBLIC "u.", size); in CleanFile()
99 int32_t ret = HKS_SUCCESS; in CleanFile() local
[all …]
/base/security/device_auth/test/fuzztest/devauthfunc_fuzzer/
Ddevauthfunc_fuzzer.cpp235 int32_t ret = GetLoaderInstance()->checkKeyExist(keyAlias, false, DEFAULT_OS_ACCOUNT); in GenerateTempKeyPair() local
236 if (ret != HC_SUCCESS) { in GenerateTempKeyPair()
241ret = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN,… in GenerateTempKeyPair()
244 return ret; in GenerateTempKeyPair()
265 int32_t ret = GetLoaderInstance()->exportPublicKey(&keyAliasParams, &serverPk); in GetAsyCredentialJson() local
266 if (ret != HC_SUCCESS) { in GetAsyCredentialJson()
280 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson()
281 if (ret != HC_SUCCESS) { in GetAsyCredentialJson()
304 int32_t ret = gm->createGroup(osAccountId, reqId, appId, createParams); in CreateDemoGroup() local
305 if (ret != HC_SUCCESS) { in CreateDemoGroup()
[all …]
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/
Dcert_manager_auth_mgr.c96 int32_t ret = CertManagerUriDecode(uriObj, (char *)uri->data); in GetAndCheckUriObj() local
97 if (ret != CM_SUCCESS) { in GetAndCheckUriObj()
98 CM_LOG_E("uri decode failed, ret = %d", ret); in GetAndCheckUriObj()
99 return ret; in GetAndCheckUriObj()
144 int32_t ret = UintToString(clientUid, uidStr, MAX_UINT32_LEN); in ConstructToBeAuthedUri() local
145 if (ret != CM_SUCCESS) { in ConstructToBeAuthedUri()
147 return ret; in ConstructToBeAuthedUri()
163 int32_t ret = UintToString(clientUid, uidStr, MAX_UINT32_LEN); in ConstructMacKeyUri() local
164 if (ret != CM_SUCCESS) { in ConstructMacKeyUri()
166 return ret; in ConstructMacKeyUri()
[all …]
/base/sensors/sensor/frameworks/native/src/
Dsensor_agent.cpp49 int32_t ret = SENSOR_AGENT_IMPL->GetAllSensors(sensorInfo, count); in GetAllSensors() local
50 if (ret != OHOS::ERR_OK) { in GetAllSensors()
52 return NormalizeErrCode(ret); in GetAllSensors()
54 return ret; in GetAllSensors()
59 int32_t ret = SENSOR_AGENT_IMPL->ActivateSensor(sensorId, user); in ActivateSensor() local
60 if (ret != OHOS::ERR_OK) { in ActivateSensor()
62 return NormalizeErrCode(ret); in ActivateSensor()
64 return ret; in ActivateSensor()
69 int32_t ret = SENSOR_AGENT_IMPL->DeactivateSensor(sensorId, user); in DeactivateSensor() local
70 if (ret != OHOS::ERR_OK) { in DeactivateSensor()
[all …]

12345678910>>...124