| /base/security/huks/services/huks_standard/huks_service/main/core/src/ |
| D | hks_session_manager.c | 68 static void FreeOperation(struct HksOperation **operation) in FreeOperation() argument 70 if (operation == NULL || *operation == NULL) { in FreeOperation() 73 RemoveDoubleListNode(&(*operation)->listHead); in FreeOperation() 74 HKS_FREE_BLOB((*operation)->processInfo.userId); in FreeOperation() 75 HKS_FREE_BLOB((*operation)->processInfo.processName); in FreeOperation() 76 HKS_FREE_BLOB((*operation)->errMsgBlob); in FreeOperation() 77 HKS_FREE(*operation); in FreeOperation() 81 static void DeleteKeyNodeAndDecreaseGlobalCount(struct HksOperation *operation) in DeleteKeyNodeAndDecreaseGlobalCount() argument 83 DeleteKeyNode(operation->handle); in DeleteKeyNodeAndDecreaseGlobalCount() 84 FreeOperation(&operation); in DeleteKeyNodeAndDecreaseGlobalCount() [all …]
|
| /base/tee/tee_os_framework/lib/teelib/libcrypto/src/ |
| D | tee_crypto_api_cipher.c | 72 static TEE_Result cipher_init_check_config(TEE_OperationHandle operation, const void *iv, size_t iv… in cipher_init_check_config() argument 74 const struct cipher_op_config_s *config = get_ae_config(operation->algorithm); in cipher_init_check_config() 76 bool check = (config == NULL || operation->operationClass != config->expect_class || in cipher_init_check_config() 77 (operation->mode != config->expect_mode[0] && operation->mode != config->expect_mode[1])); in cipher_init_check_config() 79 tloge("This operation is invalid\n"); in cipher_init_check_config() 85 tloge("This operation iv length is invalid\n"); in cipher_init_check_config() 92 static TEE_Result cipher_init_operation_state_check(TEE_OperationHandle operation, const void *iv, … in cipher_init_operation_state_check() argument 96 if ((operation->handleState & TEE_HANDLE_FLAG_KEY_SET) != TEE_HANDLE_FLAG_KEY_SET) { in cipher_init_operation_state_check() 97 tloge("Invalid operation key state for this operation\n"); in cipher_init_operation_state_check() 101 operation->handleState &= ~TEE_HANDLE_FLAG_INITIALIZED; in cipher_init_operation_state_check() [all …]
|
| D | tee_crypto_api_hmac.c | 49 static TEE_Result mac_init_check_config(TEE_OperationHandle operation, const void *iv, size_t iv_le… in mac_init_check_config() argument 55 if (operation->algorithm == g_mac_config[index].algorithm) { in mac_init_check_config() 61 bool check = (config == NULL || operation->operationClass != config->expect_class || in mac_init_check_config() 62 operation->mode != config->expect_mode || in mac_init_check_config() 65 tloge("This Operation is invalid\n"); in mac_init_check_config() 72 static TEE_Result mac_init_operation_state_check(TEE_OperationHandle operation, const void *iv, siz… in mac_init_operation_state_check() argument 76 if ((operation->handleState & TEE_HANDLE_FLAG_KEY_SET) != TEE_HANDLE_FLAG_KEY_SET) { in mac_init_operation_state_check() 77 tloge("Invalid operation key state for this operation\n"); in mac_init_operation_state_check() 81 operation->handleState &= ~TEE_HANDLE_FLAG_INITIALIZED; in mac_init_operation_state_check() 83 if (operation->keyValue == NULL) { in mac_init_operation_state_check() [all …]
|
| D | tee_crypto_api.c | 41 TEE_Result crypto_lock_operation(TEE_OperationHandle operation) in crypto_lock_operation() argument 43 if (operation == NULL) in crypto_lock_operation() 46 int32_t ret = pthread_mutex_lock(&(operation->operation_lock)); in crypto_lock_operation() 52 void crypto_unlock_operation(TEE_OperationHandle operation) in crypto_unlock_operation() argument 54 if (operation == NULL) in crypto_unlock_operation() 57 int32_t ret = pthread_mutex_unlock(&(operation->operation_lock)); in crypto_unlock_operation() 175 static TEE_Result set_operation_hal_info(TEE_OperationHandle operation, uint32_t algorithm) in set_operation_hal_info() argument 177 operation->hal_info = TEE_Malloc(sizeof(crypto_hal_info), 0); in set_operation_hal_info() 178 if (operation->hal_info == NULL) { in set_operation_hal_info() 184 return TEE_SetCryptoFlag(operation, engine); in set_operation_hal_info() [all …]
|
| D | tee_crypto_api_asymmetric.c | 49 static TEE_Result asymmetric_cipher_operation_check_config(const TEE_OperationHandle operation, uin… in asymmetric_cipher_operation_check_config() argument 55 if (operation->algorithm == g_asymmetric_cipher_config[index].algorithm) { in asymmetric_cipher_operation_check_config() 61 bool check = (config == NULL || operation->operationClass != config->expect_class || in asymmetric_cipher_operation_check_config() 62 type >= ELEM_NUM(config->expect_mode) || operation->mode != config->expect_mode[type]); in asymmetric_cipher_operation_check_config() 64 tloge("Invalid param of this operation!\n"); in asymmetric_cipher_operation_check_config() 71 static TEE_Result asymmetric_cipher_operation_state_check(const TEE_OperationHandle operation, uint… in asymmetric_cipher_operation_state_check() argument 75 if ((operation->handleState & TEE_HANDLE_FLAG_KEY_SET) != TEE_HANDLE_FLAG_KEY_SET) { in asymmetric_cipher_operation_state_check() 76 tloge("Invalid operation key state for this operation\n"); in asymmetric_cipher_operation_state_check() 81 bool check = (operation->publicKey == NULL && operation->privateKey == NULL); in asymmetric_cipher_operation_state_check() 83 tloge("Please setup the key first for this operation\n"); in asymmetric_cipher_operation_state_check() [all …]
|
| D | tee_crypto_api_ae.c | 103 static TEE_Result ae_init_operation_error(const TEE_OperationHandle operation) in ae_init_operation_error() argument 105 if ((operation->handleState & TEE_HANDLE_FLAG_KEY_SET) != TEE_HANDLE_FLAG_KEY_SET) { in ae_init_operation_error() 106 tloge("Invalid operation key state for this operation\n"); in ae_init_operation_error() 110 if ((operation->handleState & TEE_HANDLE_FLAG_INITIALIZED) == TEE_HANDLE_FLAG_INITIALIZED) { in ae_init_operation_error() 111 tloge("Invalid operation state for this operation\n"); in ae_init_operation_error() 115 if (operation->keyValue == NULL) { in ae_init_operation_error() 116 tloge("Please initialize operation key first\n"); in ae_init_operation_error() 123 static TEE_Result ae_init_check_config(const TEE_OperationHandle operation, const struct ae_op_conf… in ae_init_check_config() argument 126 if (operation->operationClass != config->expect_class) { in ae_init_check_config() 131 if (operation->mode != config->expect_mode[0] && operation->mode != config->expect_mode[1]) { in ae_init_check_config() [all …]
|
| D | tee_operation.c | 25 TEE_OperationHandle operation; member 37 TEE_Result add_operation(TEE_OperationHandle operation) in add_operation() argument 39 if (operation == NULL) { in add_operation() 40 tloge("The operation is NULL\n"); in add_operation() 46 tloge("Malloc operation node failed\n"); in add_operation() 49 valid_operation->operation = operation; in add_operation() 52 tloge("Lock operation mutex failed\n"); in add_operation() 58 tloge("Unlock operation mutex failed\n"); in add_operation() 67 void delete_operation(const TEE_OperationHandle operation) in delete_operation() argument 69 if (operation == NULL) in delete_operation() [all …]
|
| D | tee_crypto_api_hash.c | 30 static TEE_Result digest_update_param_check(TEE_OperationHandle operation, const void *chunk, size_… in digest_update_param_check() argument 32 bool check = (operation == NULL || chunk == NULL || chunk_size == 0 || in digest_update_param_check() 33 (check_operation((const TEE_OperationHandle)operation) != TEE_SUCCESS)); in digest_update_param_check() 35 tloge("operation handle or other param is Invalid!"); in digest_update_param_check() 46 TEE_Result tee_digest_update100(TEE_OperationHandle operation, const void *chunk, size_t chunk_size) in tee_digest_update100() argument 48 TEE_Result ret = digest_update_param_check(operation, chunk, chunk_size); in tee_digest_update100() 54 if (crypto_lock_operation(operation) != TEE_SUCCESS) in tee_digest_update100() 57 ret = digest_operation_state_check((const TEE_OperationHandle)operation); in tee_digest_update100() 59 crypto_unlock_operation(operation); in tee_digest_update100() 64 ret = proc_hal_digest_update(operation, chunk, chunk_size); in tee_digest_update100() [all …]
|
| D | tee_crypto_common_hash.c | 38 TEE_Result digest_operation_state_check(const TEE_OperationHandle operation) in digest_operation_state_check() argument 43 if (operation == NULL) in digest_operation_state_check() 48 if ((operation->handleState & TEE_HANDLE_FLAG_KEY_SET) != TEE_HANDLE_FLAG_KEY_SET) { in digest_operation_state_check() 49 tloge("Invalid operation key state for this operation\n"); in digest_operation_state_check() 53 if ((operation->handleState & TEE_HANDLE_FLAG_INITIALIZED) != TEE_HANDLE_FLAG_INITIALIZED) { in digest_operation_state_check() 60 if (operation->algorithm == g_digest_config[index].algorithm) { in digest_operation_state_check() 66 bool check = (config == NULL || operation->operationClass != config->expect_class || in digest_operation_state_check() 67 operation->mode != config->expect_mode); in digest_operation_state_check() 69 tloge("This operation is Invalid!\n"); in digest_operation_state_check() 76 TEE_Result proc_hal_digest_init(TEE_OperationHandle operation) in proc_hal_digest_init() argument [all …]
|
| D | tee_crypto_api_derive_key.c | 29 static TEE_Result get_ecdh_public_key_hal(TEE_OperationHandle operation, const TEE_Attribute *param… in get_ecdh_public_key_hal() argument 34 if (operation->algorithm == TEE_ALG_X25519) { in get_ecdh_public_key_hal() 81 static TEE_Result tee_derive_key_ecdh_hal(TEE_OperationHandle operation, const TEE_Attribute *param… in tee_derive_key_ecdh_hal() argument 87 TEE_Result ret = get_ecdh_public_key_hal(operation, params, param_count, &client_key); in tee_derive_key_ecdh_hal() 100 …int32_t res = tee_crypto_ecdh_derive_key(operation->algorithm, &client_key, operation->privateKey,… in tee_derive_key_ecdh_hal() 125 static void tee_derive_key_ecdh(TEE_OperationHandle operation, const TEE_Attribute *params, uint32_… in tee_derive_key_ecdh() argument 128 if (operation->operationClass != TEE_OPERATION_KEY_DERIVATION) { in tee_derive_key_ecdh() 129 …tloge("operationClass isn't TEE_OPERATION_KEY_DERIVATION, it is 0x%x\n", operation->operationClass… in tee_derive_key_ecdh() 133 if (operation->algorithm != (uint32_t)TEE_ALG_ECDH_DERIVE_SHARED_SECRET && in tee_derive_key_ecdh() 134 operation->algorithm != (uint32_t)TEE_ALG_X25519) { in tee_derive_key_ecdh() [all …]
|
| /base/tee/tee_client/test/unittest/ |
| D | cadaemontest.cpp | 74 TEEC_Operation *operation, MessageParcel &reply) in RecOpenReply() argument 91 writeRet = reply.WriteBuffer(operation, sizeof(*operation)); in RecOpenReply() 145 TEEC_Operation operation = { 0 }; variable 147 operation.started = 1; 148 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_NONE, TEEC_NONE, TEEC_NONE, TEEC_NONE); 150 RecOpenReply(TEEC_ORIGIN_API, TEEC_SUCCESS, &session, &operation, reply); 152 …ret = TEEC_OpenSession(nullptr, nullptr, nullptr, TEEC_LOGIN_PUBLIC, nullptr, &operation, &origin); 154 …ret = TEEC_OpenSession(&context, &session, &g_testUuid, TEEC_LOGIN_PUBLIC, nullptr, &operation, &o… 156 …ret = TEEC_OpenSession(&context, &session, &g_testUuid, TEEC_LOGIN_PUBLIC, nullptr, &operation, &o… 161 …EC_OpenSession(&context, &session, &g_testUuid, TEEC_LOGIN_IDENTIFY, nullptr, &operation, &origin); [all …]
|
| D | teecvendortest.cpp | 217 TEEC_Operation operation = { 0 }; variable 218 operation.started = 1; 220 operation.paramTypes = TEEC_MEMREF_TEMP_INPUT; 221 operation.params[0].tmpref.buffer = nullptr; 222 operation.params[0].tmpref.size = 1; 223 TEEC_Result ret = TEEC_CheckOperation(&context, &operation); 226 operation.paramTypes = TEEC_MEMREF_TEMP_INPUT; 227 operation.params[0].tmpref.buffer = (void*)1; 228 operation.params[0].tmpref.size = 0; 229 ret = TEEC_CheckOperation(&context, &operation); [all …]
|
| /base/tee/tee_client/test/fuzztest/libteecvendor/libteecvendoropensession_fuzzer/ |
| D | libteecvendoropensession_fuzzer.cpp | 38 TEEC_Operation operation = *reinterpret_cast<TEEC_Operation *>(temp); in LibteecVendorOpenSessionFuzzTest() local 49 operation.params[0] = param; in LibteecVendorOpenSessionFuzzTest() 50 operation.params[1] = param; in LibteecVendorOpenSessionFuzzTest() 51 operation.params[2] = param; in LibteecVendorOpenSessionFuzzTest() 52 operation.params[3] = param; in LibteecVendorOpenSessionFuzzTest() 53 operation.session = &session; in LibteecVendorOpenSessionFuzzTest() 56 reinterpret_cast<const char *>(temp), &operation, &returnOrigin); in LibteecVendorOpenSessionFuzzTest() 95 TEEC_Operation operation = { 0 }; in TEEC_OpenSessionInnerTest_001() local 99 TEEC_LOGIN_IDENTIFY, NULL, &operation, &retOrigin); in TEEC_OpenSessionInnerTest_001() 102 TEEC_LOGIN_IDENTIFY, NULL, &operation, &retOrigin); in TEEC_OpenSessionInnerTest_001() [all …]
|
| /base/tee/tee_os_framework/test/xts/ca/tcf_api/src/ |
| D | common_test.cpp | 29 TEEC_Operation operation = { 0 }; in SetUp() local 35 operation.started = 1; in SetUp() 36 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_NONE, TEEC_NONE, TEEC_NONE, TEEC_NONE); in SetUp() 44 ret = TEEC_OpenSession(&context, &session, &uuid, TEEC_LOGIN_IDENTIFY, NULL, &operation, NULL); in SetUp() 63 TEEC_Operation operation = { 0 }; in SetUp() local 71 operation.started = 1; in SetUp() 72 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_NONE, TEEC_NONE, TEEC_NONE, TEEC_NONE); in SetUp() 81 ret = TEEC_OpenSession(&context, &session, &uuid, TEEC_LOGIN_IDENTIFY, NULL, &operation, NULL); in SetUp() 101 TEEC_Operation operation = { 0 }; in SetUp() local 109 operation.started = 1; in SetUp() [all …]
|
| /base/tee/tee_os_framework/test/xts/ca/client_api/src/ |
| D | invokecommand_test.cpp | 68 TEEC_Operation operation = { 0 }; variable 69 operation.started = 1; 70 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_VALUE_INOUT, TEEC_NONE, TEEC_NONE, TEEC_NONE); 71 operation.params[0].value.a = 0xaaa; 72 operation.params[0].value.b = 0xbbb; 74 ret = TEEC_InvokeCommand(&sess.session, 0, &operation, &origin); 94 TEEC_Operation operation = { 0 }; variable 95 operation.started = 1; 96 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_VALUE_INOUT, TEEC_NONE, TEEC_NONE, TEEC_NONE); 97 operation.params[0].value.a = 0xaaa; [all …]
|
| D | opensession_test.cpp | 40 TEEC_Operation operation = { 0 }; variable 41 operation.started = 1; 42 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_NONE, TEEC_NONE, TEEC_NONE, TEEC_NONE); 44 … ret = TEEC_OpenSession(NULL, GetSession(), &uuid, TEEC_LOGIN_IDENTIFY, NULL, &operation, &origin); 59 TEEC_Operation operation = { 0 }; variable 60 operation.started = 1; 61 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_NONE, TEEC_NONE, TEEC_NONE, TEEC_NONE); 70 … ret = TEEC_OpenSession(GetContext(), NULL, &uuid, TEEC_LOGIN_IDENTIFY, NULL, &operation, &origin); 84 TEEC_Operation operation = { 0 }; variable 85 operation.started = 1; [all …]
|
| D | allocatesharedmemory_test.cpp | 189 TEEC_Operation operation = { 0 }; variable 190 operation.started = 1; 191 …operation.paramTypes = TEEC_PARAM_TYPES(TEEC_MEMREF_PARTIAL_OUTPUT, TEEC_NONE, TEEC_NONE, TEEC_NON… 192 operation.params[0].memref.parent = &testMem.sharedMem; 193 operation.params[0].memref.offset = 0; 194 operation.params[0].memref.size = testMem.sharedMem.size; 195 ret = TEEC_InvokeCommand(&sess.session, TEE_TEST_ALLTYPE, &operation, &origin); 224 TEEC_Operation operation = { 0 }; variable 225 operation.started = 1; 226 …operation.paramTypes = TEEC_PARAM_TYPES(TEEC_MEMREF_PARTIAL_INOUT, TEEC_NONE, TEEC_NONE, TEEC_NONE… [all …]
|
| D | registersharedmemory_test.cpp | 219 TEEC_Operation operation = { 0 }; variable 220 operation.started = 1; 221 …operation.paramTypes = TEEC_PARAM_TYPES(TEEC_MEMREF_PARTIAL_OUTPUT, TEEC_NONE, TEEC_NONE, TEEC_NON… 222 operation.params[0].memref.parent = &testMem.sharedMem; 223 operation.params[0].memref.offset = 0; 224 operation.params[0].memref.size = testMem.sharedMem.size; 225 ret = TEEC_InvokeCommand(&sess.session, TEE_TEST_ALLTYPE, &operation, &origin); 256 TEEC_Operation operation = { 0 }; variable 257 operation.started = 1; 258 …operation.paramTypes = TEEC_PARAM_TYPES(TEEC_MEMREF_PARTIAL_INOUT, TEEC_NONE, TEEC_NONE, TEEC_NONE… [all …]
|
| /base/tee/tee_client/test/fuzztest/teeclient/teeclientopensession_fuzzer/ |
| D | teeclientopensession_fuzzer.cpp | 41 TEEC_Operation *operation, MessageParcel &reply) in RecOpenReply() argument 58 writeRet = reply.WriteBuffer(operation, sizeof(*operation)); in RecOpenReply() 78 TEEC_Operation operation = *reinterpret_cast<TEEC_Operation *>(temp); in TeeClientOpenSessionFuzzTest() local 94 operation.params[0] = param; in TeeClientOpenSessionFuzzTest() 95 operation.params[1] = param; in TeeClientOpenSessionFuzzTest() 96 operation.params[2] = param; in TeeClientOpenSessionFuzzTest() 97 operation.params[3] = param; in TeeClientOpenSessionFuzzTest() 98 operation.session = &session; in TeeClientOpenSessionFuzzTest() 101 reinterpret_cast<const char *>(temp), &operation, &returnOrigin); in TeeClientOpenSessionFuzzTest() 108 nullptr, &operation, &returnOrigin); in TeeClientOpenSessionFuzzTest() [all …]
|
| /base/security/crypto_framework/interfaces/kits/native/include/ |
| D | crypto_signature.h | 86 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful. 88 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported. 89 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed. 100 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful. 102 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported. 103 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed. 116 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful. 118 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported. 119 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed. 146 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful. [all …]
|
| D | crypto_asym_key.h | 162 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful. 164 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported. 165 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed. 176 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful. 178 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported. 179 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed. 193 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful. 195 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported. 196 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed. 253 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful. [all …]
|
| D | crypto_mac.h | 71 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful. 72 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported. 73 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed. 75 * {@link OH_Crypto_ErrCode#CRYPTO_OPERTION_ERROR} 17630001 - If crypto operation failed. 86 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful. 87 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported. 88 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed. 90 * {@link OH_Crypto_ErrCode#CRYPTO_OPERTION_ERROR} 17630001 - If crypto operation failed. 100 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful. 101 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported. [all …]
|
| D | crypto_asym_cipher.h | 59 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful. 60 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported. 61 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed. 63 * {@link OH_Crypto_ErrCode#CRYPTO_OPERTION_ERROR} 17630001 - If crypto operation failed. 74 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful. 75 * {@link OH_Crypto_ErrCode#CRYPTO_NOT_SUPPORTED} 801 - If the operation is not supported. 76 * {@link OH_Crypto_ErrCode#CRYPTO_MEMORY_ERROR} 17620001 - If memory operation failed. 78 * {@link OH_Crypto_ErrCode#CRYPTO_OPERTION_ERROR} 17630001 - If crypto operation failed. 85 * @brief Finalizes the encryption or decryption operation. 90 * @return {@link OH_Crypto_ErrCode#CRYPTO_SUCCESS} 0 - If the operation is successful. [all …]
|
| /base/hiviewdfx/hitrace/frameworks/trace_dump_executor/ |
| D | trace_dump_pipe.cpp | 116 bool HitraceDumpPipe::CheckProcessRole(bool shouldBeParent, const char* operation) const in CheckProcessRole() 119 HILOG_ERROR(LOG_CORE, "%{public}s: %{public}s process can not perform this operation.", in CheckProcessRole() 120 operation, shouldBeParent ? "child" : "parent"); in CheckProcessRole() 126 bool HitraceDumpPipe::CheckFdValidity(const int fd, const char* operation, const char* pipeName) co… in CheckFdValidity() argument 129 HILOG_ERROR(LOG_CORE, "%{public}s: %{public}s fd is illegal.", operation, pipeName); in CheckFdValidity() 135 bool HitraceDumpPipe::WriteToPipe(const int fd, const TraceDumpTask& task, const char* operation) in WriteToPipe() argument 139 HILOG_ERROR(LOG_CORE, "%{public}s: write pipe failed.", operation); in WriteToPipe() 142 …HILOG_INFO(LOG_CORE, "%{public}s: task submitted, task id: %{public}" PRIu64 ".", operation, task.… in WriteToPipe() 146 …mpPipe::ReadFromPipe(const int fd, TraceDumpTask& task, const int timeoutMs, const char* operation) in ReadFromPipe() argument 169 …_INFO(LOG_CORE, "%{public}s: read task done, task id: %{public}" PRIu64 ".", operation, task.time); in ReadFromPipe() [all …]
|
| /base/tee/tee_os_framework/test/xts/ca/device_api/src/ |
| D | tee_test_device_api.cpp | 41 TEEC_Operation operation = { 0 }; variable 42 operation.started = 1; 43 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_NONE, TEEC_NONE, TEEC_NONE, TEEC_NONE); 44 ret = TEEC_InvokeCommand(&sess.session, CMD_ID_TEST_SE_API, &operation, &origin); 66 TEEC_Operation operation = { 0 }; variable 67 operation.started = 1; 68 operation.paramTypes = TEEC_PARAM_TYPES(TEEC_NONE, TEEC_NONE, TEEC_NONE, TEEC_NONE); 69 … ret = TEEC_InvokeCommand(&sess.session, CMD_ID_TEST_SECHANNELSELECTNEXT_API, &operation, &origin); 91 TEEC_Operation operation = { 0 }; variable 92 operation.started = 1; [all …]
|