Home
last modified time | relevance | path

Searched full:ret (Results 1 – 25 of 3069) sorted by relevance

12345678910>>...123

/base/security/huks/services/huks_standard/huks_service/main/os_dependency/idl/ipc/
Dhks_ipc_service.c67 int32_t ret; in HksIpcServiceGenerateKey() local
71 ret = HksGenerateKeyUnpack(srcData, &keyAlias, &inParamSet, &keyOut); in HksIpcServiceGenerateKey()
72 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksGenerateKeyUnpack Ipc fail") in HksIpcServiceGenerateKey()
79 ret = HKS_ERROR_MALLOC_FAIL; in HksIpcServiceGenerateKey()
85 ret = HksGetProcessInfoForIPC(context, &processInfo); in HksIpcServiceGenerateKey()
86 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksGetProcessInfoForIPC fail, ret = %" LOG_PUBLIC "d", ret) in HksIpcServiceGenerateKey()
88 ret = HksCheckAcrossAccountsPermission(inParamSet, processInfo.userIdInt); in HksIpcServiceGenerateKey()
89 …HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksCheckAcrossAccountsPermission fail, ret = %" LOG_PUBLIC "d", r… in HksIpcServiceGenerateKey()
92 ret = HksGetParam(inParamSet, HKS_TAG_KEY_AUTH_ACCESS_TYPE, &accessTypeParam); in HksIpcServiceGenerateKey()
93 if (ret == HKS_SUCCESS && accessTypeParam != NULL && in HksIpcServiceGenerateKey()
[all …]
/base/security/huks/services/huks_standard/huks_service/main/core/src/
Dhks_client_service.c72 int32_t ret; in AppendToNewParamSet() local
76 ret = HksCheckParamSet(paramSet, paramSet->paramSetSize); in AppendToNewParamSet()
77 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "check paramSet failed") in AppendToNewParamSet()
79 ret = HksFreshParamSet((struct HksParamSet *)paramSet, false); in AppendToNewParamSet()
80 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "append fresh paramset failed") in AppendToNewParamSet()
82 ret = HksInitParamSet(&newParamSet); in AppendToNewParamSet()
83 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "append init operation param set failed") in AppendToNewParamSet()
85 ret = HksAddParams(newParamSet, paramSet->params, paramSet->paramsCnt); in AppendToNewParamSet()
86 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "append params failed") in AppendToNewParamSet()
89 return ret; in AppendToNewParamSet()
[all …]
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/
Dhks_rename_part1_test.cpp72 int32_t ret = HksInitParamSet(&paramSet); in TestGenerateKey() local
73 if (ret != HKS_SUCCESS) { in TestGenerateKey()
75 return ret; in TestGenerateKey()
78 ret = HksAddParams(paramSet, tmpParams, sizeof(tmpParams) / sizeof(tmpParams[0])); in TestGenerateKey()
79 if (ret != HKS_SUCCESS) { in TestGenerateKey()
82 return ret; in TestGenerateKey()
85 ret = HksBuildParamSet(&paramSet); in TestGenerateKey()
86 if (ret != HKS_SUCCESS) { in TestGenerateKey()
89 return ret; in TestGenerateKey()
92 ret = HksGenerateKey(keyAlias, paramSet, nullptr); in TestGenerateKey()
[all …]
/base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/common_test/src/
Dhks_check_paramset_test.cpp70 int32_t ret = CheckMutableParams(HKS_ALG_RSA, keyType, &params); variable
71 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE);
85 int32_t ret = CheckMutableParams(HKS_ALG_ECC, keyType, &params); variable
86 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE);
100 int32_t ret = CheckMutableParams(HKS_ALG_SM2, keyType, &params); variable
101 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE);
115 int32_t ret = CheckMutableParams(HKS_ALG_DSA, keyType, &params); variable
116 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE);
130 int32_t ret = CheckMutableParams(HKS_ALG_ED25519, keyType, &params); variable
131 ASSERT_EQ(ret, HKS_ERROR_INVALID_PURPOSE);
[all …]
/base/security/huks/test/unittest/huks_common_test/src/
Dhks_test_curve25519_func.cpp23 int32_t ret = HksInitParamSet(&paramSet); in TestGenerateEd25519Key() local
24 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key()
28 ret = HksAddParams(paramSet, &algParam, 1); in TestGenerateEd25519Key()
29 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key()
33 ret = HksAddParams(paramSet, &keySizeParam, 1); in TestGenerateEd25519Key()
34 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key()
38 ret = HksAddParams(paramSet, &purposeParam, 1); in TestGenerateEd25519Key()
39 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key()
43 ret = HksAddParams(paramSet, &digestParam, 1); in TestGenerateEd25519Key()
44 HKS_TEST_ASSERT(ret == 0); in TestGenerateEd25519Key()
[all …]
Dhks_test_adapt_for_de.c23 int32_t ret = HksInitParamSet(paramSet); in GenerateParamSet() local
24 if (ret != HKS_SUCCESS) { in GenerateParamSet()
26 return ret; in GenerateParamSet()
30 ret = HksAddParams(*paramSet, tmpParams, paramCount); in GenerateParamSet()
31 if (ret != HKS_SUCCESS) { in GenerateParamSet()
34 return ret; in GenerateParamSet()
38 ret = HksBuildParamSet(paramSet); in GenerateParamSet()
39 if (ret != HKS_SUCCESS) { in GenerateParamSet()
42 return ret; in GenerateParamSet()
44 return ret; in GenerateParamSet()
[all …]
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_service/main/os_dependency/idl/cm_ipc/
Dcm_ipc_service.c46 int32_t ret = CmGetProcessInfoForIPC(cmContext); in GetInputParams() local
47 if (ret != CM_SUCCESS) { in GetInputParams()
48 CM_LOG_E("get ipc info failed, ret = %d", ret); in GetInputParams()
49 return ret; in GetInputParams()
53 ret = CmGetParamSet((struct CmParamSet *)paramSetBlob->data, paramSetBlob->size, paramSet); in GetInputParams()
54 if (ret != CM_SUCCESS) { in GetInputParams()
55 CM_LOG_E("get paramSet failed, ret = %d", ret); in GetInputParams()
56 return ret; in GetInputParams()
59 ret = CmParamSetToParams(*paramSet, params, paramsCount); in GetInputParams()
60 if (ret != CM_SUCCESS) { in GetInputParams()
[all …]
/base/security/device_auth/frameworks/src/
Dipc_sdk.c57 int32_t ret; in DelIpcCliCallbackCtx() local
63 ret = memcmp(appId, cbCache->appId, HcStrlen(cbCache->appId) + 1); in DelIpcCliCallbackCtx()
64 if (ret == 0) { in DelIpcCliCallbackCtx()
124 int32_t ret; in IpcGmRegCallback() local
131 ret = CreateCallCtx(&callCtx, NULL); in IpcGmRegCallback()
132 if (ret != HC_SUCCESS) { in IpcGmRegCallback()
133 LOGE("CreateCallCtx failed, ret %d", ret); in IpcGmRegCallback()
137ret = SetCallRequestParamInfo(callCtx, PARAM_TYPE_APPID, (const uint8_t *)appId, HcStrlen(appId) +… in IpcGmRegCallback()
138 if (ret != HC_SUCCESS) { in IpcGmRegCallback()
139 LOGE("set request param failed, ret %d, type %d", ret, PARAM_TYPE_APPID); in IpcGmRegCallback()
[all …]
/base/security/huks/frameworks/huks_standard/main/crypto_engine/rkc/src/
Dhks_rkc_rw.c66 int32_t ret; in GetKeyBlobKsf() local
70 ret = GetProcessInfo(&processInfo); in GetKeyBlobKsf()
71 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "get process info failed") in GetKeyBlobKsf()
75 ret = HksRkcBuildParamSet(&paramSet); in GetKeyBlobKsf()
76 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "rkc build paramset failed") in GetKeyBlobKsf()
78ret = HksManageStoreGetKeyBlob(&processInfo, paramSet, &fileNameBlob, tmpKsf, HKS_STORAGE_TYPE_ROO… in GetKeyBlobKsf()
79 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "Get ksf file failed! ret = 0x%" LOG_PUBLIC "X", ret) in GetKeyBlobKsf()
89 return ret; in GetKeyBlobKsf()
141 int32_t ret = ExtractFieldFromBuffer(ksfFromFile, ksfBufOffset, fileFlag, HKS_RKC_KSF_FLAG_LEN); in RkcExtractKsfFileFlag() local
142 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "Memcpy file flag failed!") in RkcExtractKsfFileFlag()
[all …]
/base/time/time_service/framework/cj/src/
Dsystem_date_time_ffi.cpp28 RetCode ret = SystemDateTimeImpl::SetTime(time); in FfiOHOSSysDateTimeSetTime() local
29 if (ret != SUCCESS_CODE) { in FfiOHOSSysDateTimeSetTime()
30 return ret; in FfiOHOSSysDateTimeSetTime()
32 return ret; in FfiOHOSSysDateTimeSetTime()
37 RetDataI64 ret = { .code = INVALID_DATA_ID, .data = 0 }; in FfiOHOSSysDateTimegetCurrentTime() local
40 ret.code = state; in FfiOHOSSysDateTimegetCurrentTime()
41 ret.data = 0; in FfiOHOSSysDateTimegetCurrentTime()
42 return ret; in FfiOHOSSysDateTimegetCurrentTime()
44 ret.code = state; in FfiOHOSSysDateTimegetCurrentTime()
45 ret.data = time; in FfiOHOSSysDateTimegetCurrentTime()
[all …]
/base/security/crypto_framework/test/unittest/src/aes_cipher/
Dcrypto_aes_ecb_cipher_test.cpp53 int ret = 0; variable
61 ret = HcfSymKeyGeneratorCreate("AES128", &generator);
62 if (ret != 0) {
63 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret);
67 ret = generator->generateSymKey(generator, &key);
68 if (ret != 0) {
73 ret = HcfCipherCreate("AES128|ECB|NoPadding", &cipher);
74 if (ret != 0) {
79 ret = AesEncrypt(cipher, key, nullptr, cipherText, &cipherTextLen);
80 if (ret != 0) {
[all …]
Dcrypto_aes_cfb_cipher_test.cpp47 int ret = 0; variable
59 ret = HcfSymKeyGeneratorCreate("AES128", &generator);
60 if (ret != 0) {
61 LOGE("HcfSymKeyGeneratorCreate failed!%d", ret);
65 ret = generator->generateSymKey(generator, &key);
66 if (ret != 0) {
71 ret = HcfCipherCreate("AES128|CFB|NoPadding", &cipher);
72 if (ret != 0) {
77 ret = AesEncrypt(cipher, key, (HcfParamsSpec *)&ivSpec, cipherText, &cipherTextLen);
78 if (ret != 0) {
[all …]
/base/security/access_token/interfaces/innerkits/accesstoken/test/unittest/src/
Dclone_app_permission_test.cpp106 int32_t ret = AccessTokenKit::DeleteToken(tokenId); in TearDownTestCase() local
107 EXPECT_EQ(RET_SUCCESS, ret); in TearDownTestCase()
163 int ret = AccessTokenKit::VerifyAccessToken(tokenId, PERMISSION_FULL_CONTROL, false); in AllocHapTokenId() local
164 EXPECT_EQ(ret, PermissionState::PERMISSION_DENIED); in AllocHapTokenId()
165 ret = AccessTokenKit::VerifyAccessToken(tokenId, PERMISSION_ALL, false); in AllocHapTokenId()
166 EXPECT_EQ(ret, PermissionState::PERMISSION_DENIED); in AllocHapTokenId()
168 ret = AccessTokenKit::GetPermissionFlag(tokenId, PERMISSION_FULL_CONTROL, flag); in AllocHapTokenId()
170 EXPECT_EQ(ret, RET_SUCCESS); in AllocHapTokenId()
171 ret = AccessTokenKit::GetPermissionFlag(tokenId, PERMISSION_ALL, flag); in AllocHapTokenId()
173 EXPECT_EQ(ret, RET_SUCCESS); in AllocHapTokenId()
[all …]
/base/security/device_auth/test/unittest/deviceauth/unit_test/source/
Dcommon_lib_test.cpp83 HcBool ret = ParcelReadWithoutPopData(&parcelWithData, &num, uintDataSize); variable
84 EXPECT_EQ(ret, HC_TRUE);
85 ret = ParcelRead(nullptr, nullptr, uintDataSize);
86 EXPECT_EQ(ret, HC_FALSE);
87 ret = ParcelRead(&parcelWithData, &num, uintDataSize);
88 EXPECT_EQ(ret, HC_TRUE);
90 ret = ParcelRead(&parcelWithData, &num, uintDataSize);
93 ret = ParcelRead(&parcelWithData, &num, uintDataSize);
94 EXPECT_EQ(ret, HC_FALSE);
105 HcBool ret = ParcelEraseBlock(nullptr, start, uintDataSize, &num); variable
[all …]
/base/security/crypto_framework/test/unittest/src/
Dcrypto_3des_cipher_test.cpp59 HcfResult ret = HcfSymKeyGeneratorCreate("3DES192", &generator); in GenerateDesSymKey() local
60 if (ret != HCF_SUCCESS) { in GenerateDesSymKey()
62 return ret; in GenerateDesSymKey()
65 ret = generator->generateSymKey(generator, key); in GenerateDesSymKey()
66 if (ret != HCF_SUCCESS) { in GenerateDesSymKey()
70 return ret; in GenerateDesSymKey()
80 int32_t ret = cipher->init(cipher, ENCRYPT_MODE, (HcfKey *)key, params); in DesEncrypt() local
81 if (ret != 0) { in DesEncrypt()
82 LOGE("init failed! %d", ret); in DesEncrypt()
83 return ret; in DesEncrypt()
[all …]
Dcrypto_signature_exception_test.cpp50 HcfResult ret = EngineSignInit((HcfSignSpi *)&g_obj, nullptr, &sk); variable
51 ASSERT_EQ(ret, HCF_INVALID_PARAMS);
53 ret = EngineSignInit((HcfSignSpi *)&g_obj, nullptr, &sk);
54 ASSERT_EQ(ret, HCF_INVALID_PARAMS);
66 HcfResult ret = EngineVerifyInit((HcfVerifySpi *)&g_obj, nullptr, &pk); variable
67 ASSERT_EQ(ret, HCF_INVALID_PARAMS);
69 ret = EngineVerifyInit((HcfVerifySpi *)&g_obj, nullptr, &pk);
70 ASSERT_EQ(ret, HCF_INVALID_PARAMS);
75 HcfResult ret = EngineSignUpdate((HcfSignSpi *)&g_obj, nullptr); variable
76 ASSERT_EQ(ret, HCF_INVALID_PARAMS);
[all …]
/base/security/huks/services/huks_standard/huks_service/main/hks_storage/src/
Dhks_storage_manager.c49 int32_t ret = HksGetParam(paramSet, HKS_TAG_SPECIFIC_USER_ID, &specificUserIdParam); in GetStorageLevelAndStoreUserIdParam() local
50 if (ret == HKS_SUCCESS) { in GetStorageLevelAndStoreUserIdParam()
52 } else if (ret == HKS_ERROR_PARAM_NOT_EXIST) { in GetStorageLevelAndStoreUserIdParam()
54 ret = HKS_SUCCESS; in GetStorageLevelAndStoreUserIdParam()
56 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "get store user id failed, ret = %" LOG_PUBLIC "d.", ret) in GetStorageLevelAndStoreUserIdParam()
59 ret = HksGetParam(paramSet, HKS_TAG_AUTH_STORAGE_LEVEL, &storageLevelParam); in GetStorageLevelAndStoreUserIdParam()
60 …HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "get storage level tag failed, ret = %" LOG_PUBLIC "d.", ret) in GetStorageLevelAndStoreUserIdParam()
69 return ret; in GetStorageLevelAndStoreUserIdParam()
102 int32_t ret; in GetUserIdPath() local
104 ret = ConstructPlainName(&userIdBlob, outMaterial->userIdPath, HKS_MAX_FILE_NAME_LEN); in GetUserIdPath()
[all …]
Dhks_storage.c47 int32_t ret = HksGetFileName(path, fileName, fullPath, HKS_MAX_FILE_NAME_LEN); in CreateStorageFileLock()
48 if (ret != HKS_SUCCESS) { in CreateStorageFileLock()
49 HKS_LOG_E("get full path failed, ret = %" LOG_PUBLIC "d.", ret); in CreateStorageFileLock()
66 int32_t ret = HksFileWrite(path, fileName, offset, buf, len); in HksStorageWriteFile() local
69 return ret; in HksStorageWriteFile()
81 int32_t ret = HksFileRead(path, fileName, offset, blob, size); in HksStorageReadFile() local
85 int32_t ret = HksFileRead(path, fileName, offset, blob, size); in HksStorageReadFile()
87 return ret; in HksStorageReadFile()
95 HKS_LOG_E("get file size failed, ret = %" LOG_PUBLIC "u.", size); in CleanFile()
99 int32_t ret = HKS_SUCCESS; in CleanFile() local
[all …]
/base/security/device_auth/test/fuzztest/devauthfunc_fuzzer/
Ddevauthfunc_fuzzer.cpp235 int32_t ret = GetLoaderInstance()->checkKeyExist(keyAlias, false, DEFAULT_OS_ACCOUNT); in GenerateTempKeyPair() local
236 if (ret != HC_SUCCESS) { in GenerateTempKeyPair()
241ret = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN,… in GenerateTempKeyPair()
244 return ret; in GenerateTempKeyPair()
265 int32_t ret = GetLoaderInstance()->exportPublicKey(&keyAliasParams, &serverPk); in GetAsyCredentialJson() local
266 if (ret != HC_SUCCESS) { in GetAsyCredentialJson()
280 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson()
281 if (ret != HC_SUCCESS) { in GetAsyCredentialJson()
304 int32_t ret = gm->createGroup(osAccountId, reqId, appId, createParams); in CreateDemoGroup() local
305 if (ret != HC_SUCCESS) { in CreateDemoGroup()
[all …]
/base/startup/init/test/unittest/seccomp/
Dseccomp_unittest.cpp164 int ret = unshare(CLONE_NEWPID); in CheckUnshare() local
165 if (ret) { in CheckUnshare()
247 int ret = (int)syscall(__NR_mq_open, nullptr, 0); in CheckMqOpen() local
248 if (ret < 0) { in CheckMqOpen()
278 int ret = syscall(__NR_setresuid, 20000, 20000, 20000); in CheckSetresuidArgsInRange() local
279 if (ret == 0) { in CheckSetresuidArgsInRange()
288 int ret = syscall(__NR_setresuid, 800, 800, 800); in CheckSetresuidArgsOutOfRange() local
289 if (ret == 0) { in CheckSetresuidArgsOutOfRange()
308 int ret = syscall(__NR_setuid, 0); in CheckSetuid64ForUidFilter1() local
309 if (ret == 0) { in CheckSetuid64ForUidFilter1()
[all …]
/base/sensors/sensor/frameworks/native/src/
Dsensor_agent.cpp49 int32_t ret = SENSOR_AGENT_IMPL->GetAllSensors(sensorInfo, count); in GetAllSensors() local
50 if (ret != OHOS::ERR_OK) { in GetAllSensors()
52 return NormalizeErrCode(ret); in GetAllSensors()
54 return ret; in GetAllSensors()
59 int32_t ret = SENSOR_AGENT_IMPL->ActivateSensor(sensorId, user); in ActivateSensor() local
60 if (ret != OHOS::ERR_OK) { in ActivateSensor()
62 return NormalizeErrCode(ret); in ActivateSensor()
64 return ret; in ActivateSensor()
69 int32_t ret = SENSOR_AGENT_IMPL->DeactivateSensor(sensorId, user); in DeactivateSensor() local
70 if (ret != OHOS::ERR_OK) { in DeactivateSensor()
[all …]
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/
Dcert_manager_auth_mgr.c94 int32_t ret = CertManagerUriDecode(uriObj, (char *)uri->data); in GetAndCheckUriObj() local
95 if (ret != CM_SUCCESS) { in GetAndCheckUriObj()
96 CM_LOG_E("uri decode failed, ret = %d", ret); in GetAndCheckUriObj()
97 return ret; in GetAndCheckUriObj()
136 int32_t ret = UintToString(clientUid, uidStr, MAX_UINT32_LEN); in ConstructToBeAuthedUri() local
137 if (ret != CM_SUCCESS) { in ConstructToBeAuthedUri()
139 return ret; in ConstructToBeAuthedUri()
155 int32_t ret = UintToString(clientUid, uidStr, MAX_UINT32_LEN); in ConstructMacKeyUri() local
156 if (ret != CM_SUCCESS) { in ConstructMacKeyUri()
158 return ret; in ConstructMacKeyUri()
[all …]
/base/sensors/sensor_lite/interfaces/kits/native/test/unittest/src/
Dsensor_agent_interfaces_test.cpp61 int32_t ret = GetAllSensors(&sensorInfo, &count); variable
71 EXPECT_EQ(ret, 0) << "GetAllSensors ret = " << ret << endl;
84 int32_t ret = GetAllSensors(sensorInfo, (int32_t *)NULLPTR); variable
85 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "GetAllSensors ret = " << ret << endl;
99 int32_t ret = GetAllSensors(sensorInfo, &count); variable
100 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "GetAllSensors ret = " << ret << endl;
113 int32_t ret = GetAllSensors(&sensorInfo, (int32_t *)NULLPTR); variable
114 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "GetAllSensors ret = " << ret << endl;
127 int32_t ret = ActivateSensor(-1, &sensorUser); variable
128 EXPECT_EQ(ret, SENSOR_ERROR_INVALID_PARAM) << "ActivateSensor ret = " << ret << endl;
[all …]
/base/sensors/sensor/test/unittest/interfaces/kits/
Dsensor_native_test.cpp59 int32_t ret = OH_Sensor_GetInfos(nullptr, &count); in SetUpTestCase() local
60 ASSERT_EQ(ret, SENSOR_SUCCESS); in SetUpTestCase()
63 ret = OH_Sensor_GetInfos(sensors, &count); in SetUpTestCase()
64 ASSERT_EQ(ret, SENSOR_SUCCESS); in SetUpTestCase()
67 ret = OH_SensorInfo_GetType(sensors[i], &sensorType); in SetUpTestCase()
68 ASSERT_EQ(ret, SENSOR_SUCCESS); in SetUpTestCase()
78 ret = OH_Sensor_DestroyInfos(sensors, count); in SetUpTestCase()
79 ASSERT_EQ(ret, SENSOR_SUCCESS); in SetUpTestCase()
96 int32_t ret = OH_SensorEvent_GetTimestamp(event, &timestamp); in SensorDataCallbackImpl() local
97 ASSERT_EQ(ret, SENSOR_SUCCESS); in SensorDataCallbackImpl()
[all …]
/base/security/huks/frameworks/huks_standard/main/os_dependency/ipc/src/
Dhks_client_service_ipc.c70 int32_t ret; in BuildParamSetNotNull() local
74 ret = HksCheckParamSet(paramSetIn, paramSetIn->paramSetSize); in BuildParamSetNotNull()
75 if (ret != HKS_SUCCESS) { in BuildParamSetNotNull()
77 return ret; in BuildParamSetNotNull()
81 ret = HksInitParamSet(&tmpParamSet); in BuildParamSetNotNull()
82 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksInitParamSet failed") in BuildParamSetNotNull()
85 ret = HksAddParams(tmpParamSet, paramSetIn->params, paramSetIn->paramsCnt); in BuildParamSetNotNull()
86 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksAddParams failed") in BuildParamSetNotNull()
88 ret = HksBuildParamSet(&tmpParamSet); in BuildParamSetNotNull()
89 HKS_IF_NOT_SUCC_LOGE_BREAK(ret, "HksBuildParamSet failed") in BuildParamSetNotNull()
[all …]

12345678910>>...123