Home
last modified time | relevance | path

Searched full:operation (Results 1 – 25 of 522) sorted by relevance

12345678910>>...21

/base/security/huks/services/huks_standard/huks_service/main/core/src/
Dhks_session_manager.c68 static void FreeOperation(struct HksOperation **operation) in FreeOperation() argument
70 if (operation == NULL || *operation == NULL) { in FreeOperation()
73 RemoveDoubleListNode(&(*operation)->listHead); in FreeOperation()
74 HKS_FREE_BLOB((*operation)->processInfo.userId); in FreeOperation()
75 HKS_FREE_BLOB((*operation)->processInfo.processName); in FreeOperation()
76 HKS_FREE_BLOB((*operation)->errMsgBlob); in FreeOperation()
77 HKS_FREE(*operation); in FreeOperation()
81 static void DeleteKeyNodeAndDecreaseGlobalCount(struct HksOperation *operation) in DeleteKeyNodeAndDecreaseGlobalCount() argument
83 DeleteKeyNode(operation->handle); in DeleteKeyNodeAndDecreaseGlobalCount()
84 FreeOperation(&operation); in DeleteKeyNodeAndDecreaseGlobalCount()
[all …]
/base/tee/tee_os_framework/lib/teelib/libcrypto/src/
Dtee_crypto_api_cipher.c72 static TEE_Result cipher_init_check_config(TEE_OperationHandle operation, const void *iv, size_t iv… in cipher_init_check_config() argument
74 const struct cipher_op_config_s *config = get_ae_config(operation->algorithm); in cipher_init_check_config()
76 bool check = (config == NULL || operation->operationClass != config->expect_class || in cipher_init_check_config()
77 (operation->mode != config->expect_mode[0] && operation->mode != config->expect_mode[1])); in cipher_init_check_config()
79 tloge("This operation is invalid\n"); in cipher_init_check_config()
85 tloge("This operation iv length is invalid\n"); in cipher_init_check_config()
92 static TEE_Result cipher_init_operation_state_check(TEE_OperationHandle operation, const void *iv, … in cipher_init_operation_state_check() argument
96 if ((operation->handleState & TEE_HANDLE_FLAG_KEY_SET) != TEE_HANDLE_FLAG_KEY_SET) { in cipher_init_operation_state_check()
97 tloge("Invalid operation key state for this operation\n"); in cipher_init_operation_state_check()
101 operation->handleState &= ~TEE_HANDLE_FLAG_INITIALIZED; in cipher_init_operation_state_check()
[all …]
Dtee_crypto_api_hmac.c49 static TEE_Result mac_init_check_config(TEE_OperationHandle operation, const void *iv, size_t iv_le… in mac_init_check_config() argument
55 if (operation->algorithm == g_mac_config[index].algorithm) { in mac_init_check_config()
61 bool check = (config == NULL || operation->operationClass != config->expect_class || in mac_init_check_config()
62 operation->mode != config->expect_mode || in mac_init_check_config()
65 tloge("This Operation is invalid\n"); in mac_init_check_config()
72 static TEE_Result mac_init_operation_state_check(TEE_OperationHandle operation, const void *iv, siz… in mac_init_operation_state_check() argument
76 if ((operation->handleState & TEE_HANDLE_FLAG_KEY_SET) != TEE_HANDLE_FLAG_KEY_SET) { in mac_init_operation_state_check()
77 tloge("Invalid operation key state for this operation\n"); in mac_init_operation_state_check()
81 operation->handleState &= ~TEE_HANDLE_FLAG_INITIALIZED; in mac_init_operation_state_check()
83 if (operation->keyValue == NULL) { in mac_init_operation_state_check()
[all …]
Dtee_crypto_api.c41 TEE_Result crypto_lock_operation(TEE_OperationHandle operation) in crypto_lock_operation() argument
43 if (operation == NULL) in crypto_lock_operation()
46 int32_t ret = pthread_mutex_lock(&(operation->operation_lock)); in crypto_lock_operation()
52 void crypto_unlock_operation(TEE_OperationHandle operation) in crypto_unlock_operation() argument
54 if (operation == NULL) in crypto_unlock_operation()
57 int32_t ret = pthread_mutex_unlock(&(operation->operation_lock)); in crypto_unlock_operation()
175 static TEE_Result set_operation_hal_info(TEE_OperationHandle operation, uint32_t algorithm) in set_operation_hal_info() argument
177 operation->hal_info = TEE_Malloc(sizeof(crypto_hal_info), 0); in set_operation_hal_info()
178 if (operation->hal_info == NULL) { in set_operation_hal_info()
184 return TEE_SetCryptoFlag(operation, engine); in set_operation_hal_info()
[all …]
Dtee_crypto_api_asymmetric.c49 static TEE_Result asymmetric_cipher_operation_check_config(const TEE_OperationHandle operation, uin… in asymmetric_cipher_operation_check_config() argument
55 if (operation->algorithm == g_asymmetric_cipher_config[index].algorithm) { in asymmetric_cipher_operation_check_config()
61 bool check = (config == NULL || operation->operationClass != config->expect_class || in asymmetric_cipher_operation_check_config()
62 type >= ELEM_NUM(config->expect_mode) || operation->mode != config->expect_mode[type]); in asymmetric_cipher_operation_check_config()
64 tloge("Invalid param of this operation!\n"); in asymmetric_cipher_operation_check_config()
71 static TEE_Result asymmetric_cipher_operation_state_check(const TEE_OperationHandle operation, uint… in asymmetric_cipher_operation_state_check() argument
75 if ((operation->handleState & TEE_HANDLE_FLAG_KEY_SET) != TEE_HANDLE_FLAG_KEY_SET) { in asymmetric_cipher_operation_state_check()
76 tloge("Invalid operation key state for this operation\n"); in asymmetric_cipher_operation_state_check()
81 bool check = (operation->publicKey == NULL && operation->privateKey == NULL); in asymmetric_cipher_operation_state_check()
83 tloge("Please setup the key first for this operation\n"); in asymmetric_cipher_operation_state_check()
[all …]
Dtee_crypto_api_ae.c103 static TEE_Result ae_init_operation_error(const TEE_OperationHandle operation) in ae_init_operation_error() argument
105 if ((operation->handleState & TEE_HANDLE_FLAG_KEY_SET) != TEE_HANDLE_FLAG_KEY_SET) { in ae_init_operation_error()
106 tloge("Invalid operation key state for this operation\n"); in ae_init_operation_error()
110 if ((operation->handleState & TEE_HANDLE_FLAG_INITIALIZED) == TEE_HANDLE_FLAG_INITIALIZED) { in ae_init_operation_error()
111 tloge("Invalid operation state for this operation\n"); in ae_init_operation_error()
115 if (operation->keyValue == NULL) { in ae_init_operation_error()
116 tloge("Please initialize operation key first\n"); in ae_init_operation_error()
123 static TEE_Result ae_init_check_config(const TEE_OperationHandle operation, const struct ae_op_conf… in ae_init_check_config() argument
126 if (operation->operationClass != config->expect_class) { in ae_init_check_config()
131 if (operation->mode != config->expect_mode[0] && operation->mode != config->expect_mode[1]) { in ae_init_check_config()
[all …]
Dtee_operation.c25 TEE_OperationHandle operation; member
37 TEE_Result add_operation(TEE_OperationHandle operation) in add_operation() argument
39 if (operation == NULL) { in add_operation()
40 tloge("The operation is NULL\n"); in add_operation()
46 tloge("Malloc operation node failed\n"); in add_operation()
49 valid_operation->operation = operation; in add_operation()
52 tloge("Lock operation mutex failed\n"); in add_operation()
58 tloge("Unlock operation mutex failed\n"); in add_operation()
67 void delete_operation(const TEE_OperationHandle operation) in delete_operation() argument
69 if (operation == NULL) in delete_operation()
[all …]
Dtee_crypto_api_hash.c30 static TEE_Result digest_update_param_check(TEE_OperationHandle operation, const void *chunk, size_… in digest_update_param_check() argument
32 bool check = (operation == NULL || chunk == NULL || chunk_size == 0 || in digest_update_param_check()
33 (check_operation((const TEE_OperationHandle)operation) != TEE_SUCCESS)); in digest_update_param_check()
35 tloge("operation handle or other param is Invalid!"); in digest_update_param_check()
46 TEE_Result tee_digest_update100(TEE_OperationHandle operation, const void *chunk, size_t chunk_size) in tee_digest_update100() argument
48 TEE_Result ret = digest_update_param_check(operation, chunk, chunk_size); in tee_digest_update100()
54 if (crypto_lock_operation(operation) != TEE_SUCCESS) in tee_digest_update100()
57 ret = digest_operation_state_check((const TEE_OperationHandle)operation); in tee_digest_update100()
59 crypto_unlock_operation(operation); in tee_digest_update100()
64 ret = proc_hal_digest_update(operation, chunk, chunk_size); in tee_digest_update100()
[all …]
Dtee_crypto_common_hash.c38 TEE_Result digest_operation_state_check(const TEE_OperationHandle operation) in digest_operation_state_check() argument
43 if (operation == NULL) in digest_operation_state_check()
48 if ((operation->handleState & TEE_HANDLE_FLAG_KEY_SET) != TEE_HANDLE_FLAG_KEY_SET) { in digest_operation_state_check()
49 tloge("Invalid operation key state for this operation\n"); in digest_operation_state_check()
53 if ((operation->handleState & TEE_HANDLE_FLAG_INITIALIZED) != TEE_HANDLE_FLAG_INITIALIZED) { in digest_operation_state_check()
60 if (operation->algorithm == g_digest_config[index].algorithm) { in digest_operation_state_check()
66 bool check = (config == NULL || operation->operationClass != config->expect_class || in digest_operation_state_check()
67 operation->mode != config->expect_mode); in digest_operation_state_check()
69 tloge("This operation is Invalid!\n"); in digest_operation_state_check()
76 TEE_Result proc_hal_digest_init(TEE_OperationHandle operation) in proc_hal_digest_init() argument
[all …]
Dtee_crypto_api_derive_key.c29 static TEE_Result get_ecdh_public_key_hal(TEE_OperationHandle operation, const TEE_Attribute *param… in get_ecdh_public_key_hal() argument
34 if (operation->algorithm == TEE_ALG_X25519) { in get_ecdh_public_key_hal()
81 static TEE_Result tee_derive_key_ecdh_hal(TEE_OperationHandle operation, const TEE_Attribute *param… in tee_derive_key_ecdh_hal() argument
87 TEE_Result ret = get_ecdh_public_key_hal(operation, params, param_count, &client_key); in tee_derive_key_ecdh_hal()
100 …int32_t res = tee_crypto_ecdh_derive_key(operation->algorithm, &client_key, operation->privateKey,… in tee_derive_key_ecdh_hal()
125 static void tee_derive_key_ecdh(TEE_OperationHandle operation, const TEE_Attribute *params, uint32_… in tee_derive_key_ecdh() argument
128 if (operation->operationClass != TEE_OPERATION_KEY_DERIVATION) { in tee_derive_key_ecdh()
129 …tloge("operationClass isn't TEE_OPERATION_KEY_DERIVATION, it is 0x%x\n", operation->operationClass… in tee_derive_key_ecdh()
133 if (operation->algorithm != (uint32_t)TEE_ALG_ECDH_DERIVE_SHARED_SECRET && in tee_derive_key_ecdh()
134 operation->algorithm != (uint32_t)TEE_ALG_X25519) { in tee_derive_key_ecdh()
[all …]
/base/tee/tee_client/test/unittest/
Dcadaemontest.cpp74 TEEC_Operation *operation, MessageParcel &reply) in RecOpenReply() argument
91 writeRet = reply.WriteBuffer(operation, sizeof(*operation)); in RecOpenReply()
145 TEEC_Operation operation = { 0 }; variable
147 operation.started = 1;
148 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_NONE, TEEC_NONE, TEEC_NONE, TEEC_NONE);
150 RecOpenReply(TEEC_ORIGIN_API, TEEC_SUCCESS, &session, &operation, reply);
152 …ret = TEEC_OpenSession(nullptr, nullptr, nullptr, TEEC_LOGIN_PUBLIC, nullptr, &operation, &origin);
154 …ret = TEEC_OpenSession(&context, &session, &g_testUuid, TEEC_LOGIN_PUBLIC, nullptr, &operation, &o…
156 …ret = TEEC_OpenSession(&context, &session, &g_testUuid, TEEC_LOGIN_PUBLIC, nullptr, &operation, &o…
161 …EC_OpenSession(&context, &session, &g_testUuid, TEEC_LOGIN_IDENTIFY, nullptr, &operation, &origin);
[all …]
Dteecvendortest.cpp217 TEEC_Operation operation = { 0 }; variable
218 operation.started = 1;
220 operation.paramTypes = TEEC_MEMREF_TEMP_INPUT;
221 operation.params[0].tmpref.buffer = nullptr;
222 operation.params[0].tmpref.size = 1;
223 TEEC_Result ret = TEEC_CheckOperation(&context, &operation);
226 operation.paramTypes = TEEC_MEMREF_TEMP_INPUT;
227 operation.params[0].tmpref.buffer = (void*)1;
228 operation.params[0].tmpref.size = 0;
229 ret = TEEC_CheckOperation(&context, &operation);
[all …]
/base/tee/tee_client/test/fuzztest/libteecvendor/libteecvendoropensession_fuzzer/
Dlibteecvendoropensession_fuzzer.cpp38 TEEC_Operation operation = *reinterpret_cast<TEEC_Operation *>(temp); in LibteecVendorOpenSessionFuzzTest() local
49 operation.params[0] = param; in LibteecVendorOpenSessionFuzzTest()
50 operation.params[1] = param; in LibteecVendorOpenSessionFuzzTest()
51 operation.params[2] = param; in LibteecVendorOpenSessionFuzzTest()
52 operation.params[3] = param; in LibteecVendorOpenSessionFuzzTest()
53 operation.session = &session; in LibteecVendorOpenSessionFuzzTest()
56 reinterpret_cast<const char *>(temp), &operation, &returnOrigin); in LibteecVendorOpenSessionFuzzTest()
95 TEEC_Operation operation = { 0 }; in TEEC_OpenSessionInnerTest_001() local
99 TEEC_LOGIN_IDENTIFY, NULL, &operation, &retOrigin); in TEEC_OpenSessionInnerTest_001()
102 TEEC_LOGIN_IDENTIFY, NULL, &operation, &retOrigin); in TEEC_OpenSessionInnerTest_001()
[all …]
/base/tee/tee_os_framework/test/xts/ca/tcf_api/src/
Dcommon_test.cpp29 TEEC_Operation operation = { 0 }; in SetUp() local
35 operation.started = 1; in SetUp()
36 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_NONE, TEEC_NONE, TEEC_NONE, TEEC_NONE); in SetUp()
44 ret = TEEC_OpenSession(&context, &session, &uuid, TEEC_LOGIN_IDENTIFY, NULL, &operation, NULL); in SetUp()
63 TEEC_Operation operation = { 0 }; in SetUp() local
71 operation.started = 1; in SetUp()
72 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_NONE, TEEC_NONE, TEEC_NONE, TEEC_NONE); in SetUp()
81 ret = TEEC_OpenSession(&context, &session, &uuid, TEEC_LOGIN_IDENTIFY, NULL, &operation, NULL); in SetUp()
101 TEEC_Operation operation = { 0 }; in SetUp() local
109 operation.started = 1; in SetUp()
[all …]
/base/tee/tee_os_framework/test/xts/ca/client_api/src/
Dinvokecommand_test.cpp68 TEEC_Operation operation = { 0 }; variable
69 operation.started = 1;
70 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_VALUE_INOUT, TEEC_NONE, TEEC_NONE, TEEC_NONE);
71 operation.params[0].value.a = 0xaaa;
72 operation.params[0].value.b = 0xbbb;
74 ret = TEEC_InvokeCommand(&sess.session, 0, &operation, &origin);
94 TEEC_Operation operation = { 0 }; variable
95 operation.started = 1;
96 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_VALUE_INOUT, TEEC_NONE, TEEC_NONE, TEEC_NONE);
97 operation.params[0].value.a = 0xaaa;
[all …]
Dopensession_test.cpp40 TEEC_Operation operation = { 0 }; variable
41 operation.started = 1;
42 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_NONE, TEEC_NONE, TEEC_NONE, TEEC_NONE);
44 … ret = TEEC_OpenSession(NULL, GetSession(), &uuid, TEEC_LOGIN_IDENTIFY, NULL, &operation, &origin);
59 TEEC_Operation operation = { 0 }; variable
60 operation.started = 1;
61 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_NONE, TEEC_NONE, TEEC_NONE, TEEC_NONE);
70 … ret = TEEC_OpenSession(GetContext(), NULL, &uuid, TEEC_LOGIN_IDENTIFY, NULL, &operation, &origin);
84 TEEC_Operation operation = { 0 }; variable
85 operation.started = 1;
[all …]
Dallocatesharedmemory_test.cpp189 TEEC_Operation operation = { 0 }; variable
190 operation.started = 1;
191operation.paramTypes = TEEC_PARAM_TYPES(TEEC_MEMREF_PARTIAL_OUTPUT, TEEC_NONE, TEEC_NONE, TEEC_NON…
192 operation.params[0].memref.parent = &testMem.sharedMem;
193 operation.params[0].memref.offset = 0;
194 operation.params[0].memref.size = testMem.sharedMem.size;
195 ret = TEEC_InvokeCommand(&sess.session, TEE_TEST_ALLTYPE, &operation, &origin);
224 TEEC_Operation operation = { 0 }; variable
225 operation.started = 1;
226operation.paramTypes = TEEC_PARAM_TYPES(TEEC_MEMREF_PARTIAL_INOUT, TEEC_NONE, TEEC_NONE, TEEC_NONE…
[all …]
Dregistersharedmemory_test.cpp219 TEEC_Operation operation = { 0 }; variable
220 operation.started = 1;
221operation.paramTypes = TEEC_PARAM_TYPES(TEEC_MEMREF_PARTIAL_OUTPUT, TEEC_NONE, TEEC_NONE, TEEC_NON…
222 operation.params[0].memref.parent = &testMem.sharedMem;
223 operation.params[0].memref.offset = 0;
224 operation.params[0].memref.size = testMem.sharedMem.size;
225 ret = TEEC_InvokeCommand(&sess.session, TEE_TEST_ALLTYPE, &operation, &origin);
256 TEEC_Operation operation = { 0 }; variable
257 operation.started = 1;
258operation.paramTypes = TEEC_PARAM_TYPES(TEEC_MEMREF_PARTIAL_INOUT, TEEC_NONE, TEEC_NONE, TEEC_NONE…
[all …]
/base/tee/tee_client/test/fuzztest/teeclient/teeclientopensession_fuzzer/
Dteeclientopensession_fuzzer.cpp41 TEEC_Operation *operation, MessageParcel &reply) in RecOpenReply() argument
58 writeRet = reply.WriteBuffer(operation, sizeof(*operation)); in RecOpenReply()
78 TEEC_Operation operation = *reinterpret_cast<TEEC_Operation *>(temp); in TeeClientOpenSessionFuzzTest() local
94 operation.params[0] = param; in TeeClientOpenSessionFuzzTest()
95 operation.params[1] = param; in TeeClientOpenSessionFuzzTest()
96 operation.params[2] = param; in TeeClientOpenSessionFuzzTest()
97 operation.params[3] = param; in TeeClientOpenSessionFuzzTest()
98 operation.session = &session; in TeeClientOpenSessionFuzzTest()
101 reinterpret_cast<const char *>(temp), &operation, &returnOrigin); in TeeClientOpenSessionFuzzTest()
108 nullptr, &operation, &returnOrigin); in TeeClientOpenSessionFuzzTest()
[all …]
/base/security/crypto_framework/interfaces/kits/native/include/
Dcrypto_signature.h86 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful.
88 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported.
89 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed.
100 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful.
102 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported.
103 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed.
116 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful.
118 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported.
119 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed.
146 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful.
[all …]
Dcrypto_asym_key.h162 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful.
164 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported.
165 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed.
176 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful.
178 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported.
179 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed.
193 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful.
195 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported.
196 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed.
253 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful.
[all …]
Dcrypto_mac.h71 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful.
72 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported.
73 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed.
75 * {@link OH_Crypto_ErrCode#CRYPTO_OPERTION_ERROR} 17630001 - If crypto operation failed.
86 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful.
87 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported.
88 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed.
90 * {@link OH_Crypto_ErrCode#CRYPTO_OPERTION_ERROR} 17630001 - If crypto operation failed.
100 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful.
101 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported.
[all …]
Dcrypto_asym_cipher.h59 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful.
60 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported.
61 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed.
63 * {@link OH_Crypto_ErrCode#CRYPTO_OPERTION_ERROR} 17630001 - If crypto operation failed.
74 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful.
75 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported.
76 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed.
78 * {@link OH_Crypto_ErrCode#CRYPTO_OPERTION_ERROR} 17630001 - If crypto operation failed.
85 * @brief Finalizes the encryption or decryption operation.
90 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful.
[all …]
/base/hiviewdfx/hitrace/frameworks/trace_dump_executor/
Dtrace_dump_pipe.cpp116 bool HitraceDumpPipe::CheckProcessRole(bool shouldBeParent, const char* operation) const in CheckProcessRole()
119 HILOG_ERROR(LOG_CORE, "%{public}s: %{public}s process can not perform this operation.", in CheckProcessRole()
120 operation, shouldBeParent ? "child" : "parent"); in CheckProcessRole()
126 bool HitraceDumpPipe::CheckFdValidity(const int fd, const char* operation, const char* pipeName) co… in CheckFdValidity() argument
129 HILOG_ERROR(LOG_CORE, "%{public}s: %{public}s fd is illegal.", operation, pipeName); in CheckFdValidity()
135 bool HitraceDumpPipe::WriteToPipe(const int fd, const TraceDumpTask& task, const char* operation) in WriteToPipe() argument
139 HILOG_ERROR(LOG_CORE, "%{public}s: write pipe failed.", operation); in WriteToPipe()
142 …HILOG_INFO(LOG_CORE, "%{public}s: task submitted, task id: %{public}" PRIu64 ".", operation, task.… in WriteToPipe()
146 …mpPipe::ReadFromPipe(const int fd, TraceDumpTask& task, const int timeoutMs, const char* operation) in ReadFromPipe() argument
169 …_INFO(LOG_CORE, "%{public}s: read task done, task id: %{public}" PRIu64 ".", operation, task.time); in ReadFromPipe()
[all …]
/base/tee/tee_os_framework/test/xts/ca/device_api/src/
Dtee_test_device_api.cpp41 TEEC_Operation operation = { 0 }; variable
42 operation.started = 1;
43 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_NONE, TEEC_NONE, TEEC_NONE, TEEC_NONE);
44 ret = TEEC_InvokeCommand(&sess.session, CMD_ID_TEST_SE_API, &operation, &origin);
66 TEEC_Operation operation = { 0 }; variable
67 operation.started = 1;
68 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_NONE, TEEC_NONE, TEEC_NONE, TEEC_NONE);
69 … ret = TEEC_InvokeCommand(&sess.session, CMD_ID_TEST_SECHANNELSELECTNEXT_API, &operation, &origin);
91 TEEC_Operation operation = { 0 }; variable
92 operation.started = 1;
[all …]

12345678910>>...21