| /base/security/huks/services/huks_standard/huks_service/main/os_dependency/idl/ipc/ |
| D | hks_ipc_service.c | 67 int32_t ret; in HksIpcServiceGenerateKey() local 71 ret = HksGenerateKeyUnpack(srcData, &keyAlias, &inParamSet, &keyOut); in HksIpcServiceGenerateKey() 72 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksGenerateKeyUnpack Ipc fail") in HksIpcServiceGenerateKey() 79 ret = HKS_ERROR_MALLOC_FAIL; in HksIpcServiceGenerateKey() 85 ret = HksGetProcessInfoForIPC(context, &processInfo); in HksIpcServiceGenerateKey() 86 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksGetProcessInfoForIPC fail, ret = %" LOG_PUBLIC "d", ret) in HksIpcServiceGenerateKey() 88 ret = HksCheckAcrossAccountsPermission(inParamSet, processInfo.userIdInt); in HksIpcServiceGenerateKey() 89 …HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksCheckAcrossAccountsPermission fail, ret = %" LOG_PUBLIC "d", r… in HksIpcServiceGenerateKey() 92 ret = HksGetParam(inParamSet, HKS_TAG_KEY_AUTH_ACCESS_TYPE, &accessTypeParam); in HksIpcServiceGenerateKey() 93 if (ret == HKS_SUCCESS && accessTypeParam != NULL && in HksIpcServiceGenerateKey() [all …]
|
| /base/security/huks/services/huks_standard/huks_service/main/core/src/ |
| D | hks_client_service.c | 72 int32_t ret; in AppendToNewParamSet() local 76 ret = HksCheckParamSet(paramSet, paramSet->paramSetSize); in AppendToNewParamSet() 77 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "check paramSet failed") in AppendToNewParamSet() 79 ret = HksFreshParamSet((struct HksParamSet *)paramSet, false); in AppendToNewParamSet() 80 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "append fresh paramset failed") in AppendToNewParamSet() 82 ret = HksInitParamSet(&newParamSet); in AppendToNewParamSet() 83 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "append init operation param set failed") in AppendToNewParamSet() 85 ret = HksAddParams(newParamSet, paramSet->params, paramSet->paramsCnt); in AppendToNewParamSet() 86 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "append params failed") in AppendToNewParamSet() 89 return ret; in AppendToNewParamSet() [all …]
|
| /base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/ |
| D | hks_rename_part1_test.cpp | 72 int32_t ret = HksInitParamSet(¶mSet); in TestGenerateKey() local 73 if (ret != HKS_SUCCESS) { in TestGenerateKey() 75 return ret; in TestGenerateKey() 78 ret = HksAddParams(paramSet, tmpParams, sizeof(tmpParams) / sizeof(tmpParams[0])); in TestGenerateKey() 79 if (ret != HKS_SUCCESS) { in TestGenerateKey() 82 return ret; in TestGenerateKey() 85 ret = HksBuildParamSet(¶mSet); in TestGenerateKey() 86 if (ret != HKS_SUCCESS) { in TestGenerateKey() 89 return ret; in TestGenerateKey() 92 ret = HksGenerateKey(keyAlias, paramSet, nullptr); in TestGenerateKey() [all …]
|
| /base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/common_test/src/ |
| D | hks_check_paramset_test.cpp | 70 int32_t ret = CheckMutableParams(HKS_ALG_RSA, keyType, ¶ms); variable 71 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 85 int32_t ret = CheckMutableParams(HKS_ALG_ECC, keyType, ¶ms); variable 86 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 100 int32_t ret = CheckMutableParams(HKS_ALG_SM2, keyType, ¶ms); variable 101 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 115 int32_t ret = CheckMutableParams(HKS_ALG_DSA, keyType, ¶ms); variable 116 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); 130 int32_t ret = CheckMutableParams(HKS_ALG_ED25519, keyType, ¶ms); variable 131 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE); [all …]
|
| /base/security/huks/test/unittest/huks_common_test/src/ |
| D | hks_test_curve25519_func.cpp | 23 int32_t ret = HksInitParamSet(¶mSet); in TestGenerateEd25519Key() local 24 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 28 ret = HksAddParams(paramSet, &algParam, 1); in TestGenerateEd25519Key() 29 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 33 ret = HksAddParams(paramSet, &keySizeParam, 1); in TestGenerateEd25519Key() 34 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 38 ret = HksAddParams(paramSet, &purposeParam, 1); in TestGenerateEd25519Key() 39 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() 43 ret = HksAddParams(paramSet, &digestParam, 1); in TestGenerateEd25519Key() 44 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key() [all …]
|
| D | hks_test_adapt_for_de.c | 23 int32_t ret = HksInitParamSet(paramSet); in GenerateParamSet() local 24 if (ret != HKS_SUCCESS) { in GenerateParamSet() 26 return ret; in GenerateParamSet() 30 ret = HksAddParams(*paramSet, tmpParams, paramCount); in GenerateParamSet() 31 if (ret != HKS_SUCCESS) { in GenerateParamSet() 34 return ret; in GenerateParamSet() 38 ret = HksBuildParamSet(paramSet); in GenerateParamSet() 39 if (ret != HKS_SUCCESS) { in GenerateParamSet() 42 return ret; in GenerateParamSet() 44 return ret; in GenerateParamSet() [all …]
|
| /base/security/certificate_manager/services/cert_manager_standard/cert_manager_service/main/os_dependency/idl/cm_ipc/ |
| D | cm_ipc_service.c | 46 int32_t ret = CmGetProcessInfoForIPC(cmContext); in GetInputParams() local 47 if (ret != CM_SUCCESS) { in GetInputParams() 48 CM_LOG_E("get ipc info failed, ret = %d", ret); in GetInputParams() 49 return ret; in GetInputParams() 53 ret = CmGetParamSet((struct CmParamSet *)paramSetBlob->data, paramSetBlob->size, paramSet); in GetInputParams() 54 if (ret != CM_SUCCESS) { in GetInputParams() 55 CM_LOG_E("get paramSet failed, ret = %d", ret); in GetInputParams() 56 return ret; in GetInputParams() 59 ret = CmParamSetToParams(*paramSet, params, paramsCount); in GetInputParams() 60 if (ret != CM_SUCCESS) { in GetInputParams() [all …]
|
| /base/security/device_auth/frameworks/src/ |
| D | ipc_sdk.c | 57 int32_t ret; in DelIpcCliCallbackCtx() local 63 ret = memcmp(appId, cbCache->appId, HcStrlen(cbCache->appId) + 1); in DelIpcCliCallbackCtx() 64 if (ret == 0) { in DelIpcCliCallbackCtx() 124 int32_t ret; in IpcGmRegCallback() local 131 ret = CreateCallCtx(&callCtx, NULL); in IpcGmRegCallback() 132 if (ret != HC_SUCCESS) { in IpcGmRegCallback() 133 LOGE("CreateCallCtx failed, ret %d", ret); in IpcGmRegCallback() 137 …ret = SetCallRequestParamInfo(callCtx, PARAM_TYPE_APPID, (const uint8_t *)appId, HcStrlen(appId) +… in IpcGmRegCallback() 138 if (ret != HC_SUCCESS) { in IpcGmRegCallback() 139 LOGE("set request param failed, ret %d, type %d", ret, PARAM_TYPE_APPID); in IpcGmRegCallback() [all …]
|
| /base/security/huks/frameworks/huks_standard/main/crypto_engine/rkc/src/ |
| D | hks_rkc_rw.c | 66 int32_t ret; in GetKeyBlobKsf() local 70 ret = GetProcessInfo(&processInfo); in GetKeyBlobKsf() 71 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "get process info failed") in GetKeyBlobKsf() 75 ret = HksRkcBuildParamSet(¶mSet); in GetKeyBlobKsf() 76 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "rkc build paramset failed") in GetKeyBlobKsf() 78 …ret = HksManageStoreGetKeyBlob(&processInfo, paramSet, &fileNameBlob, tmpKsf, HKS_STORAGE_TYPE_ROO… in GetKeyBlobKsf() 79 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "Get ksf file failed! ret = 0x%" LOG_PUBLIC "X", ret) in GetKeyBlobKsf() 89 return ret; in GetKeyBlobKsf() 141 int32_t ret = ExtractFieldFromBuffer(ksfFromFile, ksfBufOffset, fileFlag, HKS_RKC_KSF_FLAG_LEN); in RkcExtractKsfFileFlag() local 142 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "Memcpy file flag failed!") in RkcExtractKsfFileFlag() [all …]
|
| /base/time/time_service/framework/cj/src/ |
| D | system_date_time_ffi.cpp | 28 RetCode ret = SystemDateTimeImpl::SetTime(time); in FfiOHOSSysDateTimeSetTime() local 29 if (ret != SUCCESS_CODE) { in FfiOHOSSysDateTimeSetTime() 30 return ret; in FfiOHOSSysDateTimeSetTime() 32 return ret; in FfiOHOSSysDateTimeSetTime() 37 RetDataI64 ret = { .code = INVALID_DATA_ID, .data = 0 }; in FfiOHOSSysDateTimegetCurrentTime() local 40 ret.code = state; in FfiOHOSSysDateTimegetCurrentTime() 41 ret.data = 0; in FfiOHOSSysDateTimegetCurrentTime() 42 return ret; in FfiOHOSSysDateTimegetCurrentTime() 44 ret.code = state; in FfiOHOSSysDateTimegetCurrentTime() 45 ret.data = time; in FfiOHOSSysDateTimegetCurrentTime() [all …]
|
| /base/security/crypto_framework/test/unittest/src/aes_cipher/ |
| D | crypto_aes_ecb_cipher_test.cpp | 53 int ret = 0; variable 61 ret = HcfSymKeyGeneratorCreate("AES128", &generator); 62 if (ret != 0) { 63 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret); 67 ret = generator->generateSymKey(generator, &key); 68 if (ret != 0) { 73 ret = HcfCipherCreate("AES128|ECB|NoPadding", &cipher); 74 if (ret != 0) { 79 ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen); 80 if (ret != 0) { [all …]
|
| D | crypto_aes_cfb_cipher_test.cpp | 47 int ret = 0; variable 59 ret = HcfSymKeyGeneratorCreate("AES128", &generator); 60 if (ret != 0) { 61 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret); 65 ret = generator->generateSymKey(generator, &key); 66 if (ret != 0) { 71 ret = HcfCipherCreate("AES128|CFB|NoPadding", &cipher); 72 if (ret != 0) { 77 ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen); 78 if (ret != 0) { [all …]
|
| /base/security/access_token/interfaces/innerkits/accesstoken/test/unittest/src/ |
| D | clone_app_permission_test.cpp | 106 int32_t ret = AccessTokenKit::DeleteToken(tokenId); in TearDownTestCase() local 107 EXPECT_EQ(RET_SUCCESS, ret); in TearDownTestCase() 163 int ret = AccessTokenKit::VerifyAccessToken(tokenId, PERMISSION_FULL_CONTROL, false); in AllocHapTokenId() local 164 EXPECT_EQ(ret, PermissionState::PERMISSION_DENIED); in AllocHapTokenId() 165 ret = AccessTokenKit::VerifyAccessToken(tokenId, PERMISSION_ALL, false); in AllocHapTokenId() 166 EXPECT_EQ(ret, PermissionState::PERMISSION_DENIED); in AllocHapTokenId() 168 ret = AccessTokenKit::GetPermissionFlag(tokenId, PERMISSION_FULL_CONTROL, flag); in AllocHapTokenId() 170 EXPECT_EQ(ret, RET_SUCCESS); in AllocHapTokenId() 171 ret = AccessTokenKit::GetPermissionFlag(tokenId, PERMISSION_ALL, flag); in AllocHapTokenId() 173 EXPECT_EQ(ret, RET_SUCCESS); in AllocHapTokenId() [all …]
|
| /base/security/device_auth/test/unittest/deviceauth/unit_test/source/ |
| D | common_lib_test.cpp | 83 HcBool ret = ParcelReadWithoutPopData(&parcelWithData, &num, uintDataSize); variable 84 EXPECT_EQ(ret, HC_TRUE); 85 ret = ParcelRead(nullptr, nullptr, uintDataSize); 86 EXPECT_EQ(ret, HC_FALSE); 87 ret = ParcelRead(&parcelWithData, &num, uintDataSize); 88 EXPECT_EQ(ret, HC_TRUE); 90 ret = ParcelRead(&parcelWithData, &num, uintDataSize); 93 ret = ParcelRead(&parcelWithData, &num, uintDataSize); 94 EXPECT_EQ(ret, HC_FALSE); 105 HcBool ret = ParcelEraseBlock(nullptr, start, uintDataSize, &num); variable [all …]
|
| /base/security/crypto_framework/test/unittest/src/ |
| D | crypto_3des_cipher_test.cpp | 59 HcfResult ret = HcfSymKeyGeneratorCreate("3DES192", &generator); in GenerateDesSymKey() local 60 if (ret != HCF_SUCCESS) { in GenerateDesSymKey() 62 return ret; in GenerateDesSymKey() 65 ret = generator->generateSymKey(generator, key); in GenerateDesSymKey() 66 if (ret != HCF_SUCCESS) { in GenerateDesSymKey() 70 return ret; in GenerateDesSymKey() 80 int32_t ret = cipher->init(cipher, ENCRYPT_MODE, (HcfKey *)key, params); in DesEncrypt() local 81 if (ret != 0) { in DesEncrypt() 82 LOGE("init failed! %d", ret); in DesEncrypt() 83 return ret; in DesEncrypt() [all …]
|
| D | crypto_signature_exception_test.cpp | 50 HcfResult ret = EngineSignInit((HcfSignSpi *)&g_obj, nullptr, &sk); variable 51 ASSERT_EQ(ret, HCF_INVALID_PARAMS); 53 ret = EngineSignInit((HcfSignSpi *)&g_obj, nullptr, &sk); 54 ASSERT_EQ(ret, HCF_INVALID_PARAMS); 66 HcfResult ret = EngineVerifyInit((HcfVerifySpi *)&g_obj, nullptr, &pk); variable 67 ASSERT_EQ(ret, HCF_INVALID_PARAMS); 69 ret = EngineVerifyInit((HcfVerifySpi *)&g_obj, nullptr, &pk); 70 ASSERT_EQ(ret, HCF_INVALID_PARAMS); 75 HcfResult ret = EngineSignUpdate((HcfSignSpi *)&g_obj, nullptr); variable 76 ASSERT_EQ(ret, HCF_INVALID_PARAMS); [all …]
|
| /base/security/huks/services/huks_standard/huks_service/main/hks_storage/src/ |
| D | hks_storage_manager.c | 49 int32_t ret = HksGetParam(paramSet, HKS_TAG_SPECIFIC_USER_ID, &specificUserIdParam); in GetStorageLevelAndStoreUserIdParam() local 50 if (ret == HKS_SUCCESS) { in GetStorageLevelAndStoreUserIdParam() 52 } else if (ret == HKS_ERROR_PARAM_NOT_EXIST) { in GetStorageLevelAndStoreUserIdParam() 54 ret = HKS_SUCCESS; in GetStorageLevelAndStoreUserIdParam() 56 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "get store user id failed, ret = %" LOG_PUBLIC "d.", ret) in GetStorageLevelAndStoreUserIdParam() 59 ret = HksGetParam(paramSet, HKS_TAG_AUTH_STORAGE_LEVEL, &storageLevelParam); in GetStorageLevelAndStoreUserIdParam() 60 …HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "get storage level tag failed, ret = %" LOG_PUBLIC "d.", ret) in GetStorageLevelAndStoreUserIdParam() 69 return ret; in GetStorageLevelAndStoreUserIdParam() 102 int32_t ret; in GetUserIdPath() local 104 ret = ConstructPlainName(&userIdBlob, outMaterial->userIdPath, HKS_MAX_FILE_NAME_LEN); in GetUserIdPath() [all …]
|
| D | hks_storage.c | 47 int32_t ret = HksGetFileName(path, fileName, fullPath, HKS_MAX_FILE_NAME_LEN); in CreateStorageFileLock() 48 if (ret != HKS_SUCCESS) { in CreateStorageFileLock() 49 HKS_LOG_E("get full path failed, ret = %" LOG_PUBLIC "d.", ret); in CreateStorageFileLock() 66 int32_t ret = HksFileWrite(path, fileName, offset, buf, len); in HksStorageWriteFile() local 69 return ret; in HksStorageWriteFile() 81 int32_t ret = HksFileRead(path, fileName, offset, blob, size); in HksStorageReadFile() local 85 int32_t ret = HksFileRead(path, fileName, offset, blob, size); in HksStorageReadFile() 87 return ret; in HksStorageReadFile() 95 HKS_LOG_E("get file size failed, ret = %" LOG_PUBLIC "u.", size); in CleanFile() 99 int32_t ret = HKS_SUCCESS; in CleanFile() local [all …]
|
| /base/security/device_auth/test/fuzztest/devauthfunc_fuzzer/ |
| D | devauthfunc_fuzzer.cpp | 235 int32_t ret = GetLoaderInstance()->checkKeyExist(keyAlias, false, DEFAULT_OS_ACCOUNT); in GenerateTempKeyPair() local 236 if (ret != HC_SUCCESS) { in GenerateTempKeyPair() 241 …ret = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN,… in GenerateTempKeyPair() 244 return ret; in GenerateTempKeyPair() 265 int32_t ret = GetLoaderInstance()->exportPublicKey(&keyAliasParams, &serverPk); in GetAsyCredentialJson() local 266 if (ret != HC_SUCCESS) { in GetAsyCredentialJson() 280 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson() 281 if (ret != HC_SUCCESS) { in GetAsyCredentialJson() 304 int32_t ret = gm->createGroup(osAccountId, reqId, appId, createParams); in CreateDemoGroup() local 305 if (ret != HC_SUCCESS) { in CreateDemoGroup() [all …]
|
| /base/startup/init/test/unittest/seccomp/ |
| D | seccomp_unittest.cpp | 164 int ret = unshare(CLONE_NEWPID); in CheckUnshare() local 165 if (ret) { in CheckUnshare() 247 int ret = (int)syscall(__NR_mq_open, nullptr, 0); in CheckMqOpen() local 248 if (ret < 0) { in CheckMqOpen() 278 int ret = syscall(__NR_setresuid, 20000, 20000, 20000); in CheckSetresuidArgsInRange() local 279 if (ret == 0) { in CheckSetresuidArgsInRange() 288 int ret = syscall(__NR_setresuid, 800, 800, 800); in CheckSetresuidArgsOutOfRange() local 289 if (ret == 0) { in CheckSetresuidArgsOutOfRange() 308 int ret = syscall(__NR_setuid, 0); in CheckSetuid64ForUidFilter1() local 309 if (ret == 0) { in CheckSetuid64ForUidFilter1() [all …]
|
| /base/sensors/sensor/frameworks/native/src/ |
| D | sensor_agent.cpp | 49 int32_t ret = SENSOR_AGENT_IMPL->GetAllSensors(sensorInfo, count); in GetAllSensors() local 50 if (ret != OHOS::ERR_OK) { in GetAllSensors() 52 return NormalizeErrCode(ret); in GetAllSensors() 54 return ret; in GetAllSensors() 59 int32_t ret = SENSOR_AGENT_IMPL->ActivateSensor(sensorId, user); in ActivateSensor() local 60 if (ret != OHOS::ERR_OK) { in ActivateSensor() 62 return NormalizeErrCode(ret); in ActivateSensor() 64 return ret; in ActivateSensor() 69 int32_t ret = SENSOR_AGENT_IMPL->DeactivateSensor(sensorId, user); in DeactivateSensor() local 70 if (ret != OHOS::ERR_OK) { in DeactivateSensor() [all …]
|
| /base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/ |
| D | cert_manager_auth_mgr.c | 94 int32_t ret = CertManagerUriDecode(uriObj, (char *)uri->data); in GetAndCheckUriObj() local 95 if (ret != CM_SUCCESS) { in GetAndCheckUriObj() 96 CM_LOG_E("uri decode failed, ret = %d", ret); in GetAndCheckUriObj() 97 return ret; in GetAndCheckUriObj() 136 int32_t ret = UintToString(clientUid, uidStr, MAX_UINT32_LEN); in ConstructToBeAuthedUri() local 137 if (ret != CM_SUCCESS) { in ConstructToBeAuthedUri() 139 return ret; in ConstructToBeAuthedUri() 155 int32_t ret = UintToString(clientUid, uidStr, MAX_UINT32_LEN); in ConstructMacKeyUri() local 156 if (ret != CM_SUCCESS) { in ConstructMacKeyUri() 158 return ret; in ConstructMacKeyUri() [all …]
|
| /base/sensors/sensor_lite/interfaces/kits/native/test/unittest/src/ |
| D | sensor_agent_interfaces_test.cpp | 61 int32_t ret = GetAllSensors(&sensorInfo, &count); variable 71 EXPECT_EQ(ret, 0) << "GetAllSensors ret = " << ret << endl; 84 int32_t ret = GetAllSensors(sensorInfo, (int32_t *)NULLPTR); variable 85 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "GetAllSensors ret = " << ret << endl; 99 int32_t ret = GetAllSensors(sensorInfo, &count); variable 100 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "GetAllSensors ret = " << ret << endl; 113 int32_t ret = GetAllSensors(&sensorInfo, (int32_t *)NULLPTR); variable 114 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "GetAllSensors ret = " << ret << endl; 127 int32_t ret = ActivateSensor(-1, &sensorUser); variable 128 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "ActivateSensor ret = " << ret << endl; [all …]
|
| /base/sensors/sensor/test/unittest/interfaces/kits/ |
| D | sensor_native_test.cpp | 59 int32_t ret = OH_Sensor_GetInfos(nullptr, &count); in SetUpTestCase() local 60 ASSERT_EQ(ret, SENSOR_SUCCESS); in SetUpTestCase() 63 ret = OH_Sensor_GetInfos(sensors, &count); in SetUpTestCase() 64 ASSERT_EQ(ret, SENSOR_SUCCESS); in SetUpTestCase() 67 ret = OH_SensorInfo_GetType(sensors[i], &sensorType); in SetUpTestCase() 68 ASSERT_EQ(ret, SENSOR_SUCCESS); in SetUpTestCase() 78 ret = OH_Sensor_DestroyInfos(sensors, count); in SetUpTestCase() 79 ASSERT_EQ(ret, SENSOR_SUCCESS); in SetUpTestCase() 96 int32_t ret = OH_SensorEvent_GetTimestamp(event, ×tamp); in SensorDataCallbackImpl() local 97 ASSERT_EQ(ret, SENSOR_SUCCESS); in SensorDataCallbackImpl() [all …]
|
| /base/security/huks/frameworks/huks_standard/main/os_dependency/ipc/src/ |
| D | hks_client_service_ipc.c | 70 int32_t ret; in BuildParamSetNotNull() local 74 ret = HksCheckParamSet(paramSetIn, paramSetIn->paramSetSize); in BuildParamSetNotNull() 75 if (ret != HKS_SUCCESS) { in BuildParamSetNotNull() 77 return ret; in BuildParamSetNotNull() 81 ret = HksInitParamSet(&tmpParamSet); in BuildParamSetNotNull() 82 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksInitParamSet failed") in BuildParamSetNotNull() 85 ret = HksAddParams(tmpParamSet, paramSetIn->params, paramSetIn->paramsCnt); in BuildParamSetNotNull() 86 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksAddParams failed") in BuildParamSetNotNull() 88 ret = HksBuildParamSet(&tmpParamSet); in BuildParamSetNotNull() 89 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksBuildParamSet failed") in BuildParamSetNotNull() [all …]
|