/base/security/access_token/interfaces/innerkits/accesstoken/test/unittest/src/ |
H A D | security_component_grant_test.cpp | 136 ASSERT_EQ(res, RET_SUCCESS); in HWTEST_F() 139 ASSERT_EQ(res, RET_SUCCESS); in HWTEST_F() 146 ASSERT_EQ(res, RET_SUCCESS); in HWTEST_F() 150 ASSERT_EQ(res, RET_SUCCESS); in HWTEST_F() 153 ASSERT_EQ(res, RET_SUCCESS); in HWTEST_F() 169 ASSERT_EQ(res, RET_SUCCESS); in HWTEST_F() 173 ASSERT_EQ(res, RET_SUCCESS); in HWTEST_F() 178 ASSERT_EQ(res, RET_SUCCESS); in HWTEST_F() 183 ASSERT_EQ(res, RET_SUCCESS); in HWTEST_F() 187 ASSERT_EQ(res, RET_SUCCESS); in HWTEST_F() [all...] |
H A D | clone_app_permission_test.cpp | 107 EXPECT_EQ(RET_SUCCESS, ret); in TearDownTestCase() 170 EXPECT_EQ(ret, RET_SUCCESS); in AllocHapTokenId() 173 EXPECT_EQ(ret, RET_SUCCESS); in AllocHapTokenId() 195 EXPECT_EQ(RET_SUCCESS, ret); in HWTEST_F() 208 EXPECT_EQ(RET_SUCCESS, ret); in HWTEST_F() 210 EXPECT_EQ(RET_SUCCESS, ret); in HWTEST_F() 212 EXPECT_EQ(RET_SUCCESS, ret); in HWTEST_F() 214 EXPECT_EQ(RET_SUCCESS, ret); in HWTEST_F() 216 EXPECT_EQ(RET_SUCCESS, ret); in HWTEST_F() 237 EXPECT_EQ(RET_SUCCESS, re in HWTEST_F() [all...] |
H A D | app_installation_optimized_test.cpp | 195 EXPECT_EQ(RET_SUCCESS, ret); in HWTEST_F() 196 ASSERT_EQ(RET_SUCCESS, AccessTokenKit::DeleteToken(fullTokenId.tokenIdExStruct.tokenID)); in HWTEST_F() 197 ASSERT_NE(RET_SUCCESS, AccessTokenKit::DeleteToken(fullTokenId.tokenIdExStruct.tokenID)); in HWTEST_F() 216 EXPECT_EQ(RET_SUCCESS, res); in HWTEST_F() 222 ASSERT_EQ(RET_SUCCESS, res); in HWTEST_F() 226 ASSERT_EQ(RET_SUCCESS, AccessTokenKit::DeleteToken(fullTokenId.tokenIdExStruct.tokenID)); in HWTEST_F() 244 EXPECT_EQ(RET_SUCCESS, res); in HWTEST_F() 252 ASSERT_EQ(RET_SUCCESS, AccessTokenKit::DeleteToken(fullTokenId.tokenIdExStruct.tokenID)); in HWTEST_F() 275 EXPECT_EQ(RET_SUCCESS, res); in HWTEST_F() 281 ASSERT_EQ(RET_SUCCESS, re in HWTEST_F() [all...] |
H A D | share_permission_with_sandbox_test.cpp | 146 EXPECT_EQ(RET_SUCCESS, ret); in TearDownTestCase() 188 EXPECT_EQ(RET_SUCCESS, ret); in HWTEST_F() 198 EXPECT_EQ(RET_SUCCESS, ret); in HWTEST_F() 208 EXPECT_EQ(RET_SUCCESS, ret); in HWTEST_F() 217 EXPECT_EQ(RET_SUCCESS, ret); in HWTEST_F() 219 EXPECT_EQ(RET_SUCCESS, ret); in HWTEST_F() 221 EXPECT_EQ(RET_SUCCESS, ret); in HWTEST_F() 239 EXPECT_EQ(RET_SUCCESS, ret); in HWTEST_F() 249 EXPECT_EQ(RET_SUCCESS, ret); in HWTEST_F() 259 EXPECT_NE(RET_SUCCESS, re in HWTEST_F() [all...] |
H A D | remote_token_kit_test.cpp | 163 ASSERT_EQ(res, RET_SUCCESS); in SetUpTestCase() 171 ASSERT_EQ(res, RET_SUCCESS); in TearDownTestCase() 188 ASSERT_EQ(res, RET_SUCCESS); in SetUp() 194 ASSERT_EQ(res, RET_SUCCESS); in SetUp() 222 ASSERT_EQ(RET_SUCCESS, ret); in DeleteTestToken() 261 ASSERT_EQ(ret, RET_SUCCESS); in HWTEST_F() 270 ASSERT_EQ(ret, RET_SUCCESS); in HWTEST_F() 285 ASSERT_EQ(ret, RET_SUCCESS); in HWTEST_F() 297 EXPECT_NE(ret, RET_SUCCESS); in SetRemoteHapTokenInfoWithWrongInfo() 303 EXPECT_NE(ret, RET_SUCCESS); in SetRemoteHapTokenInfoWithWrongInfo() [all...] |
H A D | edm_policy_set_test.cpp | 233 EXPECT_EQ(res, RET_SUCCESS); in HWTEST_F() 250 EXPECT_EQ(RET_SUCCESS, AccessTokenKit::InitHapToken(g_testHapInfoParams, g_testPolicyParams, fullIdUser1)); in HWTEST_F() 253 EXPECT_EQ(RET_SUCCESS, AccessTokenKit::InitHapToken(g_testHapInfoParams, g_testPolicyParams, fullIdUser2)); in HWTEST_F() 269 EXPECT_EQ(RET_SUCCESS, res); in HWTEST_F() 274 EXPECT_EQ(RET_SUCCESS, AccessTokenKit::DeleteToken(fullIdUser1.tokenIdExStruct.tokenID)); in HWTEST_F() 275 EXPECT_EQ(RET_SUCCESS, AccessTokenKit::DeleteToken(fullIdUser2.tokenIdExStruct.tokenID)); in HWTEST_F() 295 EXPECT_EQ(RET_SUCCESS, AccessTokenKit::InitHapToken(g_testHapInfoParams, g_testPolicyParams, fullIdUser1)); in HWTEST_F() 298 EXPECT_EQ(RET_SUCCESS, AccessTokenKit::InitHapToken(g_testHapInfoParams, g_testPolicyParams, fullIdUser2)); in HWTEST_F() 301 EXPECT_EQ(RET_SUCCESS, AccessTokenKit::InitHapToken(g_testHapInfoParams, g_testPolicyParams, fullIdUser3)); in HWTEST_F() 326 EXPECT_EQ(RET_SUCCESS, AccessTokenKi in HWTEST_F() [all...] |
H A D | accesstoken_kit_test.cpp | 284 ASSERT_EQ(RET_SUCCESS, ret); in DeleteTestToken() 402 ASSERT_EQ(RET_SUCCESS, AccessTokenKit::GrantPermission(tokenID, distributedDatasync, PERMISSION_COMPONENT_SET)); in HWTEST_F() 417 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 422 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 457 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 474 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 497 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 538 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 555 ASSERT_EQ(RET_SUCCESS, res); in HWTEST_F() 575 ASSERT_EQ(RET_SUCCESS, re in HWTEST_F() [all...] |
H A D | accesstoken_kit_extension_test.cpp | 694 ASSERT_EQ(RET_SUCCESS, AccessTokenKit::DeleteToken(tokenId)); in HWTEST_F() 723 ASSERT_EQ(RET_SUCCESS, AccessTokenKit::DeleteToken(tokenId)); in HWTEST_F() 766 ASSERT_EQ(RET_SUCCESS, AccessTokenKit::GetPermissionsStatus(tokenID, permsList)); in HWTEST_F() 820 ASSERT_EQ(RET_SUCCESS, AccessTokenKit::SetPermDialogCap(hapBaseInfo, true)); in HWTEST_F() 821 ASSERT_EQ(RET_SUCCESS, AccessTokenKit::GetPermissionsStatus(tokenID, permsList)); in HWTEST_F() 827 ASSERT_EQ(RET_SUCCESS, AccessTokenKit::SetPermDialogCap(hapBaseInfo, false)); in HWTEST_F() 948 ASSERT_EQ(RET_SUCCESS, AccessTokenKit::GetPermissionsStatus(tokenID, permsList)); in HWTEST_F() 968 ASSERT_EQ(RET_SUCCESS, res); in HWTEST_F() 982 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 987 ASSERT_EQ(RET_SUCCESS, re in HWTEST_F() [all...] |
/base/hiviewdfx/hilog/frameworks/libhilog/ioctl/ |
H A D | log_ioctl.cpp | 52 return RET_SUCCESS;
in SendMsgHeader() 61 return RET_SUCCESS;
in ReceiveMsgHeaer() 70 return RET_SUCCESS;
in GetRsp() 93 if (GetRsp(tmp, msgSize) != RET_SUCCESS) {
in ReceiveProcTagStats() 101 return RET_SUCCESS;
in ReceiveProcTagStats() 123 if (GetRsp(tmp, msgSize) != RET_SUCCESS) {
in ReceiveProcLogTypeStats() 131 return RET_SUCCESS;
in ReceiveProcLogTypeStats() 141 return RET_SUCCESS;
in ReceiveProcStats() 153 if (GetRsp(tmp, msgSize) != RET_SUCCESS) {
in ReceiveProcStats() 160 return RET_SUCCESS;
in ReceiveProcStats() [all...] |
/base/security/access_token/services/accesstokenmanager/test/unittest/ |
H A D | short_grant_manager_test.cpp | 103 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 110 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 120 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 136 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 143 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 162 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 177 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 185 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 192 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 196 ASSERT_EQ(RET_SUCCESS, re in HWTEST_F() [all...] |
H A D | accesstoken_info_manager_test.cpp | 220 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 231 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 251 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 257 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 261 ASSERT_EQ(RET_SUCCESS, in HWTEST_F() 274 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 292 ASSERT_NE(RET_SUCCESS, AccessTokenInfoManager::GetInstance().CreateHapTokenInfo(info, policy, tokenIdEx)); in HWTEST_F() 310 ASSERT_NE(RET_SUCCESS, AccessTokenInfoManager::GetInstance().CreateHapTokenInfo(info, policy, tokenIdEx)); in HWTEST_F() 329 ASSERT_NE(RET_SUCCESS, AccessTokenInfoManager::GetInstance().CreateHapTokenInfo(info, policy, tokenIdEx)); in HWTEST_F() 350 ASSERT_NE(RET_SUCCESS, AccessTokenInfoManage in HWTEST_F() [all...] |
H A D | permission_manager_test.cpp | 334 if (res != RET_SUCCESS) { in PrepareJsonData1() 375 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 393 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 429 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 447 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 483 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 500 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 525 if (res != RET_SUCCESS) { in PrepareJsonData2() 560 ASSERT_EQ(RET_SUCCESS, ret); in HWTEST_F() 571 ASSERT_EQ(RET_SUCCESS, re in HWTEST_F() [all...] |
H A D | native_token_receptor_test.cpp | 294 ASSERT_EQ(ret, RET_SUCCESS); in HWTEST_F() 316 ASSERT_EQ(ret, RET_SUCCESS); in HWTEST_F() 322 ASSERT_EQ(ret, RET_SUCCESS); in HWTEST_F() 359 ASSERT_EQ(ret, RET_SUCCESS); in CompareGoalTokenInfo() 423 ASSERT_EQ(ret, RET_SUCCESS); in HWTEST_F() 431 ASSERT_EQ(ret, RET_SUCCESS); in HWTEST_F() 448 ASSERT_EQ(RET_SUCCESS, RET_SUCCESS); in HWTEST_F() 490 ASSERT_EQ(ret, RET_SUCCESS); in HWTEST_F() 495 ASSERT_EQ(ret, RET_SUCCESS); in HWTEST_F() [all...] |
/base/security/access_token/services/accesstokenmanager/test/coverage/ |
H A D | permission_manager_coverage_test.cpp | 95 EXPECT_EQ(RET_SUCCESS, SetSelfTokenID(nativeToken)); in HWTEST_F() 98 ASSERT_EQ(RET_SUCCESS, in HWTEST_F() 105 ASSERT_EQ(RET_SUCCESS, in HWTEST_F() 107 EXPECT_EQ(RET_SUCCESS, SetSelfTokenID(selfTokenId)); in HWTEST_F() 153 EXPECT_EQ(RET_SUCCESS, callback.OnRemoteRequest(static_cast<uint32_t>( in HWTEST_F() 166 EXPECT_EQ(RET_SUCCESS, callback.OnRemoteRequest(static_cast<uint32_t>( in HWTEST_F() 170 EXPECT_NE(RET_SUCCESS, callback.OnRemoteRequest(code, data2, reply, option)); in HWTEST_F() 182 ASSERT_EQ(RET_SUCCESS, AccessTokenInfoManager::GetInstance().CreateHapTokenInfo(g_info, g_policy, tokenIdEx)); in HWTEST_F() 201 ASSERT_EQ(RET_SUCCESS, AccessTokenInfoManager::GetInstance().CreateHapTokenInfo(g_info, g_policy, tokenIdEx)); in HWTEST_F()
|
/base/security/access_token/services/privacymanager/test/unittest/ |
H A D | privacy_manager_service_test.cpp | 140 ASSERT_NE(RET_SUCCESS, privacyManagerService_->Dump(fd, args)); in HWTEST_F() 145 ASSERT_EQ(RET_SUCCESS, privacyManagerService_->Dump(fd, args)); in HWTEST_F() 149 ASSERT_EQ(RET_SUCCESS, privacyManagerService_->Dump(fd, args)); in HWTEST_F() 154 ASSERT_NE(RET_SUCCESS, privacyManagerService_->Dump(fd, args)); in HWTEST_F() 160 ASSERT_NE(RET_SUCCESS, privacyManagerService_->Dump(fd, args)); in HWTEST_F() 165 ASSERT_NE(RET_SUCCESS, privacyManagerService_->Dump(fd, args)); in HWTEST_F() 171 ASSERT_EQ(RET_SUCCESS, privacyManagerService_->Dump(fd, args)); in HWTEST_F() 190 ASSERT_EQ(RET_SUCCESS, privacyManagerService_->Dump(fd, args)); in HWTEST_F() 202 ASSERT_EQ(RET_SUCCESS, privacyManagerService_->Dump(fd, args)); in HWTEST_F() 205 ASSERT_EQ(RET_SUCCESS, privacyManagerService in HWTEST_F() [all...] |
H A D | permission_record_manager_test.cpp | 251 ASSERT_EQ(RET_SUCCESS, PermissionRecordManager::GetInstance().RegisterPermActiveStatusCallback( in HWTEST_F() 263 ASSERT_EQ(RET_SUCCESS, in HWTEST_F() 378 ASSERT_EQ(RET_SUCCESS, in HWTEST_F() 384 ASSERT_EQ(RET_SUCCESS, PermissionRecordManager::GetInstance().RegisterPermActiveStatusCallback( in HWTEST_F() 391 ASSERT_EQ(RET_SUCCESS, in HWTEST_F() 427 ASSERT_EQ(RET_SUCCESS, PermissionRecordManager::GetInstance().RegisterPermActiveStatusCallback( in HWTEST_F() 434 ASSERT_EQ(RET_SUCCESS, in HWTEST_F() 467 ASSERT_EQ(RET_SUCCESS, PermissionRecordManager::GetInstance().RegisterPermActiveStatusCallback( in HWTEST_F() 474 ASSERT_EQ(RET_SUCCESS, in HWTEST_F() 524 ASSERT_EQ(RET_SUCCESS, PermissionRecordManage in HWTEST_F() [all...] |
/base/hiviewdfx/hilog/services/hilogtool/ |
H A D | main.cpp | 284 cout << msg << ((ret == RET_SUCCESS) ? " successfully" : " failed") << endl; in PrintResult() 416 return RET_SUCCESS; in QueryLogHandler() 442 if (ret != RET_SUCCESS) { in QueryLogHandler() 445 return RET_SUCCESS; in QueryLogHandler() 484 return RET_SUCCESS; in BaseLogLevelHandler() 508 return RET_SUCCESS; in DomainHandler() 517 return RET_SUCCESS; in RegexHandler() 526 return RET_SUCCESS; in FileNameHandler() 540 return RET_SUCCESS; in BufferSizeGetHandler() 542 if (ret != RET_SUCCESS) { in BufferSizeGetHandler() [all...] |
/base/security/access_token/services/accesstokenmanager/main/cpp/src/permission/ |
H A D | dlp_permission_set_parser.cpp | 78 return RET_SUCCESS; in ParserDlpPermsRawData() 116 return RET_SUCCESS; in ReadCfgFile() 125 return RET_SUCCESS; in Init() 130 if (ret != RET_SUCCESS) { in Init() 136 if (ret != RET_SUCCESS) { in Init() 144 return RET_SUCCESS; in Init()
|
/base/hiviewdfx/hilog/frameworks/libhilog/ioctl/include/ |
H A D | log_ioctl.h | 71 if (ret != RET_SUCCESS) {
in RequestMsgHead() 81 if (ret != RET_SUCCESS) {
in RequestMsgHead() 93 return RET_SUCCESS;
in RequestMsgHead() 104 if (ret != RET_SUCCESS) {
in Request() 110 if (ret != RET_SUCCESS) {
in Request()
|
/base/hiviewdfx/hilog/services/hilogd/ |
H A D | main.cpp | 87 return RET_SUCCESS; in WriteStringToFile() 92 if (ret != RET_SUCCESS) { in WriteStringToFile() 113 return RET_SUCCESS; in RedirectStdStreamToLogFile() 117 if (ret == RET_SUCCESS) { in RedirectStdStreamToLogFile() 176 return RET_SUCCESS; in HilogdEntry() 180 if (ret == RET_SUCCESS) { in HilogdEntry()
|
/base/security/access_token/services/accesstokenmanager/main/cpp/src/token/ |
H A D | accesstoken_info_manager.cpp | 134 if (ret != RET_SUCCESS || hapTokenRes.empty()) { in InitHapTokenInfos() 138 if (ret != RET_SUCCESS || permDefRes.empty()) { in InitHapTokenInfos() 142 if (ret != RET_SUCCESS || permStateRes.empty()) { in InitHapTokenInfos() 149 if (ret != RET_SUCCESS) { in InitHapTokenInfos() 157 if (ret != RET_SUCCESS) { in InitHapTokenInfos() 164 if (ret != RET_SUCCESS) { in InitHapTokenInfos() 187 if (ret != RET_SUCCESS || nativeTokenResults.empty()) { in InitNativeTokenInfos() 191 if (ret != RET_SUCCESS || permStateRes.empty()) { in InitNativeTokenInfos() 199 if (ret != RET_SUCCESS) { in InitNativeTokenInfos() 207 if (ret != RET_SUCCESS) { in InitNativeTokenInfos() [all...] |
H A D | native_token_receptor.cpp | 74 return RET_SUCCESS; in NativeReqPermsGet() 134 if (NativeReqPermsGet(j, permStateList) != RET_SUCCESS) { in from_json() 157 return RET_SUCCESS; in ParserNativeRawData() 164 if (ret != RET_SUCCESS) { in Init() 170 if (ret != RET_SUCCESS) { in Init() 177 return RET_SUCCESS; in Init()
|
/base/security/access_token/tools/accesstoken/src/ |
H A D | atm_command.cpp | 171 return RET_SUCCESS; in RunAsHelpCommand() 176 int32_t result = RET_SUCCESS; in RunAsCommandError() 208 int32_t result = RET_SUCCESS; in RunAsCommandMissingOptionArgument() 350 if (result != RET_SUCCESS) { in GetToggleStatus() 366 int32_t ret = RET_SUCCESS; in RunCommandByOperationType() 383 dumpInfo = (ret == RET_SUCCESS) ? "Success" : "Failure"; in RunCommandByOperationType() 389 dumpInfo = (ret == RET_SUCCESS) ? "Success" : "Failure"; in RunCommandByOperationType() 395 if (ret != RET_SUCCESS) { in RunCommandByOperationType() 411 int32_t result = RET_SUCCESS; in HandleComplexCommand() 442 if (result != RET_SUCCESS) { in HandleComplexCommand() [all...] |
/base/security/access_token/frameworks/inner_api/privacy/src/ |
H A D | privacy_manager_client.cpp | 99 return RET_SUCCESS; in CreateStateChangeCbk() 114 if (result != RET_SUCCESS) { in StartUsingPermission() 125 if (result == RET_SUCCESS) { in StartUsingPermission() 213 return RET_SUCCESS; in CreateActiveStatusChangeCbk() 226 if (result != RET_SUCCESS) { in RegisterPermActiveStatusCallback() 243 if (result == RET_SUCCESS) { in RegisterPermActiveStatusCallback() 268 if (result == RET_SUCCESS) { in UnRegisterPermActiveStatusCallback() 316 if (res != RET_SUCCESS) { in GetSecCompEnhance() 320 return RET_SUCCESS; in GetSecCompEnhance() 333 if (res != RET_SUCCESS) { in GetSpecialSecCompEnhance() [all...] |
/base/security/access_token/services/privacymanager/src/seccomp/ |
H A D | privacy_sec_comp_enhance_agent.cpp | 138 return RET_SUCCESS; in RegisterSecCompEnhance() 149 return RET_SUCCESS; in UpdateSecCompEnhance() 163 return RET_SUCCESS; in GetSecCompEnhance() 175 if (AccessTokenKit::GetHapTokenInfo(iter->token, info) == AccessTokenKitRet::RET_SUCCESS) { in GetSpecialSecCompEnhance() 181 return RET_SUCCESS; in GetSpecialSecCompEnhance()
|