| /base/security/huks/services/huks_standard/huks_service/main/os_dependency/idl/ipc/ |
| D | hks_ipc_service.c | 69 int32_t ret; in HksIpcServiceGenerateKey() local 73 ret = HksGenerateKeyUnpack(srcData, &keyAlias, &inParamSet, &keyOut); in HksIpcServiceGenerateKey() 74 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksGenerateKeyUnpack Ipc fail") in HksIpcServiceGenerateKey() 81 ret = HKS_ERROR_MALLOC_FAIL; in HksIpcServiceGenerateKey() 87 ret = HksGetProcessInfoForIPC(context, &processInfo); in HksIpcServiceGenerateKey() 88 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksGetProcessInfoForIPC fail, ret = %" LOG_PUBLIC "d", ret) in HksIpcServiceGenerateKey() 90 ret = HksCheckAcrossAccountsPermission(inParamSet, processInfo.userIdInt); in HksIpcServiceGenerateKey() 91 …HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksCheckAcrossAccountsPermission fail, ret = %" LOG_PUBLIC "d", r… in HksIpcServiceGenerateKey() 94 ret = HksGetParam(inParamSet, HKS_TAG_KEY_AUTH_ACCESS_TYPE, &accessTypeParam); in HksIpcServiceGenerateKey() 95 if (ret == HKS_SUCCESS && accessTypeParam != NULL && in HksIpcServiceGenerateKey() [all …]
|
| /base/security/device_auth/test/unittest/deviceauth/unit_test/source/ |
| D | common_lib_test.cpp | 65 HcBool ret = ParcelEraseBlock(&parcel, 1, 1, dstNull); variable 66 EXPECT_EQ(ret, HC_FALSE); 67 ret = ParcelIncrease(parcelNull, 1); 68 EXPECT_EQ(ret, HC_FALSE); 69 ret = ParcelIncrease(&parcel, 0); 70 EXPECT_EQ(ret, HC_FALSE); 73 ret = ParcelWrite(&parcel, srcNull, 1); 74 EXPECT_EQ(ret, HC_FALSE); 75 ret = ParcelPopBack(parcelNull, 1); 76 EXPECT_EQ(ret, HC_FALSE); [all …]
|
| /base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/ |
| D | hks_rename_part1_test.cpp | 70 int32_t ret = HksInitParamSet(¶mSet); in TestGenerateKey() local 71 if (ret != HKS_SUCCESS) { in TestGenerateKey() 73 return ret; in TestGenerateKey() 76 ret = HksAddParams(paramSet, tmpParams, sizeof(tmpParams) / sizeof(tmpParams[0])); in TestGenerateKey() 77 if (ret != HKS_SUCCESS) { in TestGenerateKey() 80 return ret; in TestGenerateKey() 83 ret = HksBuildParamSet(¶mSet); in TestGenerateKey() 84 if (ret != HKS_SUCCESS) { in TestGenerateKey() 87 return ret; in TestGenerateKey() 90 ret = HksGenerateKey(keyAlias, paramSet, nullptr); in TestGenerateKey() [all …]
|
| /base/security/huks/services/huks_standard/huks_service/main/core/src/ |
| D | hks_client_service.c | 110 int32_t ret = HuksAccessGetErrorInfo(&errMsg); in IfNotSuccAppendHdiErrorInfo() local 111 if (ret == HKS_ERROR_API_NOT_SUPPORTED) { in IfNotSuccAppendHdiErrorInfo() 116 if (ret == HKS_SUCCESS && CheckBlob(&errMsg) == HKS_SUCCESS && errMsg.size > offset) { in IfNotSuccAppendHdiErrorInfo() 120 … HKS_LOG_E("HuksAccessGetErrorInfo fail, ret = %" LOG_PUBLIC "d, errMsg size = %" LOG_PUBLIC "u", in IfNotSuccAppendHdiErrorInfo() 121 ret, errMsg.size); in IfNotSuccAppendHdiErrorInfo() 134 int32_t ret = HksGetParam(paramSet, HKS_TAG_SPECIFIC_USER_ID, &specificUserId); in AddSpecificUserIdToParamSet() local 135 if (ret == HKS_ERROR_PARAM_NOT_EXIST) { in AddSpecificUserIdToParamSet() 140 ret = HksAddParams(paramSet, &specificUserIdParam, 1); in AddSpecificUserIdToParamSet() 142 return ret; in AddSpecificUserIdToParamSet() 150 …int32_t ret = HksMatchConfig("", processInfo->uidInt, processInfo->userIdInt, processInfo->accessT… in GetStorageLevelForSkipUpgradeApp() local [all …]
|
| /base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/common_test/src/ |
| D | hks_check_paramset_test.cpp | 70 int32_t ret = CheckMutableParams(HKS_ALG_RSA, keyType, ¶ms); variable 71 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 85 int32_t ret = CheckMutableParams(HKS_ALG_ECC, keyType, ¶ms); variable 86 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 100 int32_t ret = CheckMutableParams(HKS_ALG_SM2, keyType, ¶ms); variable 101 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 115 int32_t ret = CheckMutableParams(HKS_ALG_DSA, keyType, ¶ms); variable 116 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 130 int32_t ret = CheckMutableParams(HKS_ALG_ED25519, keyType, ¶ms); variable 131 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); [all …]
|
| /base/security/huks/test/unittest/huks_common_test/src/ |
| D | hks_test_curve25519_func.cpp | 23 int32_t ret = HksInitParamSet(¶mSet); in TestGenerateEd25519Key() local 24 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 28 ret = HksAddParams(paramSet, &algParam, 1); in TestGenerateEd25519Key() 29 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 33 ret = HksAddParams(paramSet, &keySizeParam, 1); in TestGenerateEd25519Key() 34 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 38 ret = HksAddParams(paramSet, &purposeParam, 1); in TestGenerateEd25519Key() 39 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 43 ret = HksAddParams(paramSet, &digestParam, 1); in TestGenerateEd25519Key() 44 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() [all …]
|
| D | hks_test_adapt_for_de.c | 23 int32_t ret = HksInitParamSet(paramSet); in GenerateParamSet() local 24 if (ret != HKS_SUCCESS) { in GenerateParamSet() 26 return ret; in GenerateParamSet() 30 ret = HksAddParams(*paramSet, tmpParams, paramCount); in GenerateParamSet() 31 if (ret != HKS_SUCCESS) { in GenerateParamSet() 34 return ret; in GenerateParamSet() 38 ret = HksBuildParamSet(paramSet); in GenerateParamSet() 39 if (ret != HKS_SUCCESS) { in GenerateParamSet() 42 return ret; in GenerateParamSet() 44 return ret; in GenerateParamSet() [all …]
|
| /base/security/certificate_manager/services/cert_manager_standard/cert_manager_service/main/os_dependency/idl/cm_ipc/ |
| D | cm_ipc_service.c | 46 int32_t ret = CmGetProcessInfoForIPC(cmContext); in GetInputParams() local 47 if (ret != CM_SUCCESS) { in GetInputParams() 48 CM_LOG_E("get ipc info failed, ret = %d", ret); in GetInputParams() 49 return ret; in GetInputParams() 53 ret = CmGetParamSet((struct CmParamSet *)paramSetBlob->data, paramSetBlob->size, paramSet); in GetInputParams() 54 if (ret != CM_SUCCESS) { in GetInputParams() 55 CM_LOG_E("get paramSet failed, ret = %d", ret); in GetInputParams() 56 return ret; in GetInputParams() 59 ret = CmParamSetToParams(*paramSet, params, paramsCount); in GetInputParams() 60 if (ret != CM_SUCCESS) { in GetInputParams() [all …]
|
| /base/security/device_auth/frameworks/src/ |
| D | ipc_service_common.c | 49 int32_t ret = GetIpcRequestParamByType(ipcParams, paramNum, paramType, param, paramSize); in GetAndValSize32Param() local 50 if ((*paramSize) != sizeof(int32_t) || ret != HC_SUCCESS) { in GetAndValSize32Param() 60 int32_t ret = GetIpcRequestParamByType(ipcParams, paramNum, paramType, param, paramSize); in GetAndValSize64Param() local 61 if ((*paramSize) != sizeof(int64_t) || ret != HC_SUCCESS) { in GetAndValSize64Param() 71 int32_t ret = GetIpcRequestParamByType(ipcParams, paramNum, paramType, param, paramSize); in GetAndValSizeCbParam() local 72 if ((*paramSize) != sizeof(DeviceAuthCallback) || ret != HC_SUCCESS) { in GetAndValSizeCbParam() 82 int32_t ret = GetIpcRequestParamByType(ipcParams, paramNum, paramType, param, NULL); in GetAndValNullParam() local 83 if (param == NULL || ret != HC_SUCCESS) { in GetAndValNullParam() 93 int32_t ret; in BindRequestIdWithAppId() local 108 ret = AddReqIdByAppId(appId, requestId); in BindRequestIdWithAppId() [all …]
|
| D | ipc_sdk.c | 62 int32_t ret; in DelIpcCliCallbackCtx() local 68 ret = memcmp(appId, cbCache->appId, HcStrlen(cbCache->appId) + 1); in DelIpcCliCallbackCtx() 69 if (ret == 0) { in DelIpcCliCallbackCtx() 137 int32_t ret; in IpcGmRegCallback() local 144 ret = CreateCallCtx(&callCtx, NULL); in IpcGmRegCallback() 145 if (ret != HC_SUCCESS) { in IpcGmRegCallback() 146 LOGE("CreateCallCtx failed, ret %" LOG_PUB "d", ret); in IpcGmRegCallback() 150 …ret = SetCallRequestParamInfo(callCtx, PARAM_TYPE_APPID, (const uint8_t *)appId, HcStrlen(appId) +… in IpcGmRegCallback() 151 if (ret != HC_SUCCESS) { in IpcGmRegCallback() 152 … LOGE("set request param failed, ret %" LOG_PUB "d, type %" LOG_PUB "d", ret, PARAM_TYPE_APPID); in IpcGmRegCallback() [all …]
|
| D | identity_service_ipc_sdk.c | 57 int32_t ret; in DelIpcCliCallbackCtx() local 63 ret = memcmp(appId, cbCache->appId, HcStrlen(cbCache->appId) + 1); in DelIpcCliCallbackCtx() 64 if (ret == 0) { in DelIpcCliCallbackCtx() 127 …int32_t ret = SetCallRequestParamInfo(callCtx, PARAM_TYPE_OS_ACCOUNT_ID, (const uint8_t *)&osAccou… in EncodeAddCredentialParams() local 129 if (ret != HC_SUCCESS) { in EncodeAddCredentialParams() 130 …LOGE("set request param failed, ret %" LOG_PUB "d, param id %" LOG_PUB "d", ret, PARAM_TYPE_OS_ACC… in EncodeAddCredentialParams() 133 … ret = SetCallRequestParamInfo(callCtx, PARAM_TYPE_REQUEST_PARAMS, (const uint8_t *)requestParams, in EncodeAddCredentialParams() 135 if (ret != HC_SUCCESS) { in EncodeAddCredentialParams() 136 …LOGE("set request param failed, ret %" LOG_PUB "d, param id %" LOG_PUB "d", ret, PARAM_TYPE_REQUES… in EncodeAddCredentialParams() 145 int32_t ret; in AddCredentialIpcResult() local [all …]
|
| /base/security/huks/frameworks/huks_standard/main/crypto_engine/rkc/src/ |
| D | hks_rkc_rw.c | 68 int32_t ret; in GetKeyBlobKsf() local 72 ret = GetProcessInfo(&processInfo); in GetKeyBlobKsf() 73 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "get process info failed") in GetKeyBlobKsf() 77 ret = HksRkcBuildParamSet(¶mSet); in GetKeyBlobKsf() 78 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "rkc build paramset failed") in GetKeyBlobKsf() 80 …ret = HksManageStoreGetKeyBlob(&processInfo, paramSet, &fileNameBlob, tmpKsf, HKS_STORAGE_TYPE_ROO… in GetKeyBlobKsf() 81 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "Get ksf file failed! ret = 0x%" LOG_PUBLIC "X", ret) in GetKeyBlobKsf() 91 return ret; in GetKeyBlobKsf() 146 int32_t ret = ExtractFieldFromBuffer(ksfFromFile, ksfBufOffset, fileFlag, HKS_RKC_KSF_FLAG_LEN); in RkcExtractKsfFileFlag() local 147 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "Memcpy file flag failed!") in RkcExtractKsfFileFlag() [all …]
|
| /base/security/device_auth/test/unittest/deviceauth/source/ |
| D | identity_manager_test.cpp | 60 int32_t ret = InitDeviceAuthService(); in SetUp() local 61 ASSERT_EQ(ret, HC_SUCCESS); in SetUp() 71 int32_t ret = AddCertInfoToJson(nullptr, nullptr); variable 72 EXPECT_NE(ret, HC_SUCCESS); 74 ret = AddCertInfoToJson(&info, nullptr); 75 EXPECT_NE(ret, HC_SUCCESS); 86 ret = AddCertInfoToJson(&info, out); 87 EXPECT_NE(ret, HC_SUCCESS); 91 ret = AddCertInfoToJson(&info, out); 92 EXPECT_EQ(ret, HC_SUCCESS); [all …]
|
| /base/time/time_service/framework/cj/src/ |
| D | system_date_time_ffi.cpp | 28 RetCode ret = SystemDateTimeImpl::SetTime(time); in FfiOHOSSysDateTimeSetTime() local 29 if (ret != SUCCESS_CODE) { in FfiOHOSSysDateTimeSetTime() 30 return ret; in FfiOHOSSysDateTimeSetTime() 32 return ret; in FfiOHOSSysDateTimeSetTime() 37 RetDataI64 ret = { .code = INVALID_DATA_ID, .data = 0 }; in FfiOHOSSysDateTimegetCurrentTime() local 40 ret.code = state; in FfiOHOSSysDateTimegetCurrentTime() 41 ret.data = 0; in FfiOHOSSysDateTimegetCurrentTime() 42 return ret; in FfiOHOSSysDateTimegetCurrentTime() 44 ret.code = state; in FfiOHOSSysDateTimegetCurrentTime() 45 ret.data = time; in FfiOHOSSysDateTimegetCurrentTime() [all …]
|
| /base/security/crypto_framework/test/unittest/src/aes_cipher/ |
| D | crypto_aes_ecb_cipher_test.cpp | 53 int ret = 0; variable 61 ret = HcfSymKeyGeneratorCreate("AES128", &generator); 62 if (ret != 0) { 63 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret); 67 ret = generator->generateSymKey(generator, &key); 68 if (ret != 0) { 73 ret = HcfCipherCreate("AES128|ECB|NoPadding", &cipher); 74 if (ret != 0) { 79 ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); 80 if (ret != 0) { [all …]
|
| D | crypto_aes_cfb_cipher_test.cpp | 47 int ret = 0; variable 59 ret = HcfSymKeyGeneratorCreate("AES128", &generator); 60 if (ret != 0) { 61 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret); 65 ret = generator->generateSymKey(generator, &key); 66 if (ret != 0) { 71 ret = HcfCipherCreate("AES128|CFB|NoPadding", &cipher); 72 if (ret != 0) { 77 ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); 78 if (ret != 0) { [all …]
|
| /base/security/access_token/interfaces/innerkits/accesstoken/test/unittest/DlpTest/ |
| D | clone_app_permission_test.cpp | 169 int ret = AccessTokenKit::VerifyAccessToken(tokenId, PERMISSION_FULL_CONTROL, false); in AllocHapTokenId() local 170 EXPECT_EQ(ret, PermissionState::PERMISSION_DENIED); in AllocHapTokenId() 171 ret = AccessTokenKit::VerifyAccessToken(tokenId, PERMISSION_ALL, false); in AllocHapTokenId() 172 EXPECT_EQ(ret, PermissionState::PERMISSION_DENIED); in AllocHapTokenId() 174 ret = AccessTokenKit::GetPermissionFlag(tokenId, PERMISSION_FULL_CONTROL, flag); in AllocHapTokenId() 176 EXPECT_EQ(ret, RET_SUCCESS); in AllocHapTokenId() 177 ret = AccessTokenKit::GetPermissionFlag(tokenId, PERMISSION_ALL, flag); in AllocHapTokenId() 179 EXPECT_EQ(ret, RET_SUCCESS); in AllocHapTokenId() 191 int ret; variable 200 ret = AccessTokenKit::GrantPermission(tokenCommon, PERMISSION_ALL, PERMISSION_USER_FIXED); [all …]
|
| /base/security/huks/frameworks/huks_standard/main/os_dependency/ipc/src/ |
| D | hks_client_service_ipc.c | 70 int32_t ret; in BuildParamSetNotNull() local 74 ret = HksCheckParamSet(paramSetIn, paramSetIn->paramSetSize); in BuildParamSetNotNull() 75 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "check paramSet failed") in BuildParamSetNotNull() 78 ret = HksInitParamSet(&tmpParamSet); in BuildParamSetNotNull() 79 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksInitParamSet failed") in BuildParamSetNotNull() 82 ret = HksAddParams(tmpParamSet, paramSetIn->params, paramSetIn->paramsCnt); in BuildParamSetNotNull() 83 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksAddParams failed") in BuildParamSetNotNull() 85 ret = HksBuildParamSet(&tmpParamSet); in BuildParamSetNotNull() 86 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksBuildParamSet failed") in BuildParamSetNotNull() 88 if (ret != HKS_SUCCESS) { in BuildParamSetNotNull() [all …]
|
| /base/security/crypto_framework/test/unittest/src/ |
| D | crypto_3des_cipher_test.cpp | 59 HcfResult ret = HcfSymKeyGeneratorCreate("3DES192", &generator); in GenerateDesSymKey() local 60 if (ret != HCF_SUCCESS) { in GenerateDesSymKey() 62 return ret; in GenerateDesSymKey() 65 ret = generator->generateSymKey(generator, key); in GenerateDesSymKey() 66 if (ret != HCF_SUCCESS) { in GenerateDesSymKey() 70 return ret; in GenerateDesSymKey() 80 int32_t ret = cipher->init(cipher, ENCRYPT_MODE, (HcfKey *)key, params); in DesEncrypt() local 81 if (ret != 0) { in DesEncrypt() 82 LOGE("init failed! %d", ret); in DesEncrypt() 83 return ret; in DesEncrypt() [all …]
|
| D | crypto_signature_exception_test.cpp | 50 HcfResult ret = EngineSignInit((HcfSignSpi *)&g_obj, nullptr, &sk); variable 51 ASSERT_EQ(ret, HCF_INVALID_PARAMS); 53 ret = EngineSignInit((HcfSignSpi *)&g_obj, nullptr, &sk); 54 ASSERT_EQ(ret, HCF_INVALID_PARAMS); 66 HcfResult ret = EngineVerifyInit((HcfVerifySpi *)&g_obj, nullptr, &pk); variable 67 ASSERT_EQ(ret, HCF_INVALID_PARAMS); 69 ret = EngineVerifyInit((HcfVerifySpi *)&g_obj, nullptr, &pk); 70 ASSERT_EQ(ret, HCF_INVALID_PARAMS); 75 HcfResult ret = EngineSignUpdate((HcfSignSpi *)&g_obj, nullptr); variable 76 ASSERT_EQ(ret, HCF_INVALID_PARAMS); [all …]
|
| /base/security/huks/services/huks_standard/huks_service/main/hks_storage/src/ |
| D | hks_storage_manager.c | 59 int32_t ret = HksGetParam(paramSet, HKS_TAG_SPECIFIC_USER_ID, &specificUserIdParam); in GetStorageLevelAndStoreUserIdParam() local 60 if (ret == HKS_SUCCESS) { in GetStorageLevelAndStoreUserIdParam() 62 } else if (ret == HKS_ERROR_PARAM_NOT_EXIST) { in GetStorageLevelAndStoreUserIdParam() 64 ret = HKS_SUCCESS; in GetStorageLevelAndStoreUserIdParam() 66 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "get store user id failed, ret = %" LOG_PUBLIC "d.", ret) in GetStorageLevelAndStoreUserIdParam() 69 ret = HksGetParam(paramSet, HKS_TAG_AUTH_STORAGE_LEVEL, &storageLevelParam); in GetStorageLevelAndStoreUserIdParam() 70 …HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "get storage level tag failed, ret = %" LOG_PUBLIC "d.", ret) in GetStorageLevelAndStoreUserIdParam() 79 return ret; in GetStorageLevelAndStoreUserIdParam() 126 int32_t ret; in GetUserIdPath() local 128 ret = ConstructPlainName(&userIdBlob, outMaterial->userIdPath, HKS_MAX_FILE_NAME_LEN); in GetUserIdPath() [all …]
|
| D | hks_storage.c | 47 int32_t ret = HksGetFileName(path, fileName, fullPath, HKS_MAX_FILE_NAME_LEN); in CreateStorageFileLock() 48 if (ret != HKS_SUCCESS) { in CreateStorageFileLock() 49 HKS_LOG_E("get full path failed, ret = %" LOG_PUBLIC "d.", ret); in CreateStorageFileLock() 66 int32_t ret = HksFileWrite(path, fileName, offset, buf, len); in HksStorageWriteFile() local 69 return ret; in HksStorageWriteFile() 81 int32_t ret = HksFileRead(path, fileName, offset, blob, size); in HksStorageReadFile() local 85 int32_t ret = HksFileRead(path, fileName, offset, blob, size); in HksStorageReadFile() 87 return ret; in HksStorageReadFile() 95 HKS_LOG_E("get file size failed, ret = %" LOG_PUBLIC "u.", size); in CleanFile() 99 int32_t ret = HKS_SUCCESS; in CleanFile() local [all …]
|
| /base/security/device_auth/test/fuzztest/devauthfunc_fuzzer/ |
| D | devauthfunc_fuzzer.cpp | 235 int32_t ret = GetLoaderInstance()->checkKeyExist(keyAlias, false, DEFAULT_OS_ACCOUNT); in GenerateTempKeyPair() local 236 if (ret != HC_SUCCESS) { in GenerateTempKeyPair() 241 …ret = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN,… in GenerateTempKeyPair() 244 return ret; in GenerateTempKeyPair() 265 int32_t ret = GetLoaderInstance()->exportPublicKey(&keyAliasParams, &serverPk); in GetAsyCredentialJson() local 266 if (ret != HC_SUCCESS) { in GetAsyCredentialJson() 280 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson() 281 if (ret != HC_SUCCESS) { in GetAsyCredentialJson() 304 int32_t ret = gm->createGroup(osAccountId, reqId, appId, createParams); in CreateDemoGroup() local 305 if (ret != HC_SUCCESS) { in CreateDemoGroup() [all …]
|
| /base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/ |
| D | cert_manager_auth_mgr.c | 96 int32_t ret = CertManagerUriDecode(uriObj, (char *)uri->data); in GetAndCheckUriObj() local 97 if (ret != CM_SUCCESS) { in GetAndCheckUriObj() 98 CM_LOG_E("uri decode failed, ret = %d", ret); in GetAndCheckUriObj() 99 return ret; in GetAndCheckUriObj() 144 int32_t ret = UintToString(clientUid, uidStr, MAX_UINT32_LEN); in ConstructToBeAuthedUri() local 145 if (ret != CM_SUCCESS) { in ConstructToBeAuthedUri() 147 return ret; in ConstructToBeAuthedUri() 163 int32_t ret = UintToString(clientUid, uidStr, MAX_UINT32_LEN); in ConstructMacKeyUri() local 164 if (ret != CM_SUCCESS) { in ConstructMacKeyUri() 166 return ret; in ConstructMacKeyUri() [all …]
|
| /base/sensors/sensor/frameworks/native/src/ |
| D | sensor_agent.cpp | 49 int32_t ret = SENSOR_AGENT_IMPL->GetAllSensors(sensorInfo, count); in GetAllSensors() local 50 if (ret != OHOS::ERR_OK) { in GetAllSensors() 52 return NormalizeErrCode(ret); in GetAllSensors() 54 return ret; in GetAllSensors() 59 int32_t ret = SENSOR_AGENT_IMPL->ActivateSensor(sensorId, user); in ActivateSensor() local 60 if (ret != OHOS::ERR_OK) { in ActivateSensor() 62 return NormalizeErrCode(ret); in ActivateSensor() 64 return ret; in ActivateSensor() 69 int32_t ret = SENSOR_AGENT_IMPL->DeactivateSensor(sensorId, user); in DeactivateSensor() local 70 if (ret != OHOS::ERR_OK) { in DeactivateSensor() [all …]
|