/base/inputmethod/imf/frameworks/native/inputmethod_ability/src/ |
H A D | input_method_agent_proxy.cpp | 33 int32_t res = -1; in DispatchKeyEvent() local 39 [&res](MessageParcel &reply) { return ITypesUtil::Unmarshal(reply, res); }); in DispatchKeyEvent() 40 return ret == ErrorCode::NO_ERROR ? res : ret; in DispatchKeyEvent() 77 int32_t res = -1; in SendPrivateCommand() local 81 [&res](MessageParcel &reply) { return ITypesUtil::Unmarshal(reply, res); }); in SendPrivateCommand() 82 return ret == ErrorCode::NO_ERROR ? res : ret; in SendPrivateCommand()
|
/base/customization/enterprise_device_management/services/edm_plugin/src/ |
H A D | bundle_install_plugin.cpp | 57 ErrCode res = appControlProxy->AddAppInstallControlRule(data, controlRuleType_, userId); in OnSetPolicy() local 58 if (res != ERR_OK) { in OnSetPolicy() 59 EDMLOGE("BundleInstallPlugin OnSetPolicyDone Faild %{public}d:", res); in OnSetPolicy() 96 ErrCode res = appControlProxy->DeleteAppInstallControlRule(controlRuleType_, data, userId); in OnRemovePolicy() local 97 if (res != ERR_OK) { in OnRemovePolicy() 98 EDMLOGE("BundleInstallPlugin DeleteAppInstallControlRule OnRemovePolicy faild %{public}d:", res); in OnRemovePolicy() 115 ErrCode res = appControlProxy->DeleteAppInstallControlRule(controlRuleType_, data, userId); in OnAdminRemoveDone() local 116 EDMLOGD("BundleInstallPlugin OnAdminRemoveDone result %{public}d:", res); in OnAdminRemoveDone()
|
/base/security/asset/test/unittest/common/src/ |
H A D | asset_test_common.cpp | 102 AssetAttr *res = AssetParseAttr(result, static_cast<AssetTag>(attrs[i].tag)); in CheckMatchAttrResultSdk() local 103 if (res == nullptr) { in CheckMatchAttrResultSdk() 108 if (attrs[i].value.boolean != res->value.boolean) { in CheckMatchAttrResultSdk() 109 printf("tag is %x, %u vs %u", attrs[i].tag, attrs[i].value.boolean, res->value.boolean); in CheckMatchAttrResultSdk() 114 if (attrs[i].value.u32 != res->value.u32) { in CheckMatchAttrResultSdk() 115 printf("tag is %x, %u vs %u", attrs[i].tag, attrs[i].value.u32, res->value.u32); in CheckMatchAttrResultSdk() 120 if (!CompareBlobSdk(&attrs[i].value.blob, &res->value.blob)) { in CheckMatchAttrResultSdk() 121 printf("tag is %x, len %u vs len %u", attrs[i].tag, attrs[i].value.blob.size, res->value.blob.size); in CheckMatchAttrResultSdk()
|
/base/security/certificate_framework/test/fuzztest/v1.0/x509distinguishedname_fuzzer/ |
H A D | x509distinguished_name_fuzzer.cpp | 62 CfResult res = HcfX509DistinguishedNameCreate(&nameDerStream, false, &x509DistinguishedNameObj); in CreateOneDistinguishedName() local 63 if (res != CF_SUCCESS) { in CreateOneDistinguishedName() 74 res = HcfX509DistinguishedNameCreate(&nameStrStream, true, &x509DistinguishedNameObj); in CreateOneDistinguishedName() 75 if (res != CF_SUCCESS) { in CreateOneDistinguishedName() 99 CfResult res = HcfX509DistinguishedNameCreate(&inStream, false, &x509DistinguishedNameObj); in X509DistinguishedNameFuzzTest() local 100 if (res != CF_SUCCESS) { in X509DistinguishedNameFuzzTest() 108 res = HcfX509DistinguishedNameCreate(&inStream, true, &x509DistinguishedNameObj); in X509DistinguishedNameFuzzTest() 109 if (res != CF_SUCCESS) { in X509DistinguishedNameFuzzTest()
|
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/key_agreement/src/ |
H A D | ecdh_openssl.c | 54 EVP_PKEY *res = AssignEcKeyToPkey(ecKey); in NewPKeyByEccPubKey() local 55 if (res == NULL) { in NewPKeyByEccPubKey() 58 return res; in NewPKeyByEccPubKey() 67 EVP_PKEY *res = AssignEcKeyToPkey(ecKey); in NewPKeyByEccPriKey() local 68 if (res == NULL) { in NewPKeyByEccPriKey() 71 return res; in NewPKeyByEccPriKey() 115 HcfResult res = KeyDerive(priPKey, pubPKey, returnSecret); in EngineGenerateSecret() local 118 return res; in EngineGenerateSecret()
|
/base/security/device_auth/services/frameworks/inc/ |
H A D | common_defs.h | 212 int32_t res = x; \ 213 if ((res) != HC_SUCCESS) { \ 226 #define GOTO_ERR_AND_SET_RET(x, res) do { \ 227 res = x; \ 228 if ((res) != HC_SUCCESS) { \ 234 int32_t res = x; \ 235 if ((res) != HC_SUCCESS) { \ 236 return res; \
|
/base/security/certificate_framework/frameworks/adapter/v1.0/src/ |
H A D | x509_crl_openssl.c | 117 int32_t res = X509_CRL_get0_by_cert(crl, &rev, certOpenssl); in IsRevoked() local 118 return (res != 0); in IsRevoked() 195 int32_t res = X509_CRL_verify(crl, pubKey); in Verify() local 196 if (res != CF_OPENSSL_SUCCESS) { in Verify() 275 CfResult res = GetIssuerName(self, ((HcfX509CRLOpensslImpl *)self)->certIssuer); in SetCertIssuer() local 276 if (res != CF_SUCCESS) { in SetCertIssuer() 280 return res; in SetCertIssuer() 381 LOGE("Get revoked certificate fail, res : %d!", opensslRes); in GetRevokedCert() 385 CfResult res = HcfCX509CRLEntryCreate(rev, entryOut, ((HcfX509CRLOpensslImpl *)self)->certIssuer); in GetRevokedCert() local 386 if (res ! in GetRevokedCert() 420 CfResult res = HcfCX509CRLEntryCreate(revokedRet, entryOut, ((HcfX509CRLOpensslImpl *)self)->certIssuer); GetRevokedCertWithCert() local 438 CfResult res = HcfCX509CRLEntryCreate(rev, &crlEntry, ((HcfX509CRLOpensslImpl *)self)->certIssuer); DeepCopyRevokedCertificates() local 647 CfResult res = GetSignatureAlgOid(self, oidOut); GetSignatureAlgName() local 784 CfResult res = DeepCopyDataToOut(bufMem->data, bufMem->length, out); ToString() local 945 CfResult res = GetNextUpdate(self, &outNextUpdate); CompareUpdateDateTimeX509Openssl() local 982 CfResult res = GetNumOfCRL(self, &outNum); CompareCRLX509Openssl() local 1011 CfResult res = CF_SUCCESS; MatchX509CRLOpensslPart2() local 1066 CfResult res = Comparex509CertX509Openssl(self, matchParams->x509Cert, out); MatchX509CRLOpenssl() local 1075 CfResult res = CompareIssuerX509Openssl(self, matchParams->issuer, out); MatchX509CRLOpenssl() local [all...] |
/base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/src/ |
H A D | dlp_permission_proxy.cpp | 71 int32_t res; in GenerateDlpCertificate() local 72 if (!reply.ReadInt32(res)) { in GenerateDlpCertificate() 76 return res; in GenerateDlpCertificate() 120 int32_t res; in ParseDlpCertificate() local 121 if (!reply.ReadInt32(res)) { in ParseDlpCertificate() 125 return res; in ParseDlpCertificate() 170 int32_t res; in InstallDlpSandbox() local 171 if (!reply.ReadInt32(res)) { in InstallDlpSandbox() 185 return res; in InstallDlpSandbox() 224 int32_t res; in UninstallDlpSandbox() local 264 int32_t res; GetSandboxExternalAuthorization() local 304 int32_t res; QueryDlpFileCopyableByTokenId() local 337 int32_t res; QueryDlpFileAccess() local 372 int32_t res; IsInDlpSandbox() local 405 int32_t res; GetDlpSupportFileType() local 489 int32_t res; UnRegisterDlpSandboxChangeCallback() local 563 int32_t res; UnRegisterOpenDlpFileCallback() local 592 int32_t res; GetDlpGatheringPolicy() local 630 int32_t res; SetRetentionState() local 664 int32_t res; CancelRetentionState() local 700 int32_t res; GetRetentionSandboxList() local 768 int32_t res; GetDLPFileVisitRecord() local 823 int32_t res; SetMDMPolicy() local 852 int32_t res; GetMDMPolicy() local 894 int32_t res; RemoveMDMPolicy() local [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_related/creds_manager/ |
H A D | sym_token_manager.c | 359 int32_t res = GetLoaderInstance()->sha256(&oriAliasBuff, keyAlias); in GenerateKeyAlias() local 361 if (res != HAL_SUCCESS) { in GenerateKeyAlias() 364 return res; in GenerateKeyAlias() 387 int32_t res = GenerateKeyAlias(token->userId, token->deviceId, &keyAlias); in ImportSymTokenToKeyManager() local 388 if (res != HC_SUCCESS) { in ImportSymTokenToKeyManager() 391 return res; in ImportSymTokenToKeyManager() 398 res = GetLoaderInstance()->importSymmetricKey(&keyParams, &authCodeBuff, purpose, NULL); in ImportSymTokenToKeyManager() 400 if (res != HC_SUCCESS) { in ImportSymTokenToKeyManager() 401 LOGE("Failed to import sym token! res: %d", res); in ImportSymTokenToKeyManager() 422 int32_t res = GenerateKeyAlias(token->userId, token->deviceId, &keyAlias); DeleteSymTokenFromKeyManager() local 667 int32_t res = AddSymTokenToVec(osAccountId, symToken); AddToken() local 703 int32_t res = DeleteSymTokenFromKeyManager(osAccountId, symToken); DeleteToken() local [all...] |
/base/security/crypto_framework/test/fuzztest/key/asykeygenerator_fuzzer/ |
H A D | asykeygenerator_fuzzer.cpp | 637 HcfResult res = keyPair->pubKey->getAsyKeySpecBigInteger(keyPair->pubKey, ECC_PK_X_BN, &retBigInt); in ConstructSm2256PubKeyBigInt() local 638 if (res != HCF_SUCCESS) { in ConstructSm2256PubKeyBigInt() 639 return res; in ConstructSm2256PubKeyBigInt() 644 res = keyPair->pubKey->getAsyKeySpecBigInteger(keyPair->pubKey, ECC_PK_Y_BN, &retBigInt); in ConstructSm2256PubKeyBigInt() 645 if (res != HCF_SUCCESS) { in ConstructSm2256PubKeyBigInt() 649 return res; in ConstructSm2256PubKeyBigInt() 659 HcfResult res = HCF_ERR_CRYPTO_OPERATION; in ConstructSm2256PubKeyParamsSpec() local 662 return res; in ConstructSm2256PubKeyParamsSpec() 668 return res; in ConstructSm2256PubKeyParamsSpec() 696 res in ConstructSm2256PubKeyParamsSpec() 708 HcfResult res = HCF_ERR_CRYPTO_OPERATION; ConstructSm2256PriKeyParamsSpec() local 759 HcfResult res = keyPair->pubKey->getAsyKeySpecBigInteger(keyPair->pubKey, ECC_PK_X_BN, &retBigInt); ConstructSm2256KeyPairBigInt() local 795 HcfResult res = HCF_ERR_CRYPTO_OPERATION; ConstructSm2256KeyPairParamsSpec() local 871 HcfResult res = HCF_ERR_CRYPTO_OPERATION; ConstructAlg25519KeyPairParamsSpec() local 953 HcfResult res = HCF_ERR_CRYPTO_OPERATION; ConstructAlg25519PubKeyParamsSpec() local 1020 HcfResult res = HCF_ERR_CRYPTO_OPERATION; ConstructAlg25519PriKeyParamsSpec() local 1069 HcfResult res = HcfAsyKeyGeneratorCreate(algoName.c_str(), &generator); ConstructDhPubKeyParamsSpec() local 1116 HcfResult res = HcfAsyKeyGeneratorCreate(algoName.c_str(), &generator); ConstructDhPriKeyParamsSpec() local 1161 HcfResult res = keyPair->pubKey->getAsyKeySpecBigInteger(keyPair->pubKey, DH_PK_BN, &retBigInt); ConstructDhKeyPairBigInt() local 1184 HcfResult res = HcfAsyKeyGeneratorCreate(algoName.c_str(), &generator); ConstructDhKeyPairParamsSpec() local 1224 HcfResult res = HcfAsyKeyGeneratorCreate("ECC224", &generator); TestEccKey() local 1254 HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); TestRsaKey() local 1286 HcfResult res = HcfAsyKeyGeneratorCreate("DSA2048", &generator); TestDsaKey() local 1318 HcfResult res = HcfAsyKeyGeneratorCreate("SM2_256", &generator); TestSm2Key() local 1348 HcfResult res = HcfAsyKeyGeneratorCreate("ECC_BrainPoolP160r1", &generator); TestBrainpoolKey() local 1379 HcfResult res = HcfAsyKeyGeneratorCreate("Ed25519", &generator); TestEd25519Key() local 1410 HcfResult res = HcfAsyKeyGeneratorCreate("X25519", &generator); TestX25519Key() local 1441 HcfResult res = HcfAsyKeyGeneratorCreate("DH_modp2048", &generator); TestDhKey() local 1476 HcfResult res = HCF_SUCCESS; GenEccKeyBySpec() local 1529 HcfResult res = HCF_SUCCESS; GenRsaKeyBySpec() local 1574 HcfResult res = HCF_SUCCESS; GenDsaKeyBySpec() local 1618 HcfResult res = HCF_SUCCESS; GenSm2KeyBySpec() local 1664 HcfResult res = HCF_SUCCESS; GenSm2KeyCommonBySpec() local 1720 HcfResult res = HCF_SUCCESS; GenAlg25519KeyBySpec() local 1785 HcfResult res = HCF_SUCCESS; GenDhKeyBySpec() local 1831 HcfResult res = HCF_SUCCESS; GenDhKeyCommonBySpec() local 1885 HcfResult res = HcfAsyKeyGeneratorCreate(algoName.c_str(), &generator); AsyKeyGeneratorFuzzTest() local [all...] |
/base/security/crypto_framework/test/fuzztest/crypto_operation/hcfmdcreate_fuzzer/ |
H A D | hcfmdcreate_fuzzer.cpp | 30 HcfResult res = HcfMdCreate("SHA1", &mdObj); in TestMd() local 31 if (res != HCF_SUCCESS) { in TestMd() 49 HcfResult res = HcfMdCreate(alg.c_str(), &mdObj); in HcMdCreateFuzzTest() local 50 if (res != HCF_SUCCESS) { in HcMdCreateFuzzTest()
|
/base/security/device_auth/deps_adapter/os_adapter/impl/src/liteos/ |
H A D | hc_dev_info.c | 31 int32_t res = GetDevUdid((char *)udid, udidLen);
in HcGetUdid() local 32 if (res != 0) {
in HcGetUdid() 33 LOGE("[UDID]: GetDevUdid fail. [Res]: %d", res);
in HcGetUdid()
|
/base/hiviewdfx/faultloggerd/test/unittest/local_handler/ |
H A D | local_handler_test.cpp | 300 int res = 0; in HWTEST_F() local 308 res = 1; in HWTEST_F() 312 res = 1; in HWTEST_F() 319 res = 1; in HWTEST_F() 326 res = 1; in HWTEST_F() 331 ASSERT_TRUE(res == 0); in HWTEST_F() 346 int res = 0; in HWTEST_F() local 353 res = 1; in HWTEST_F() 357 res = 1; in HWTEST_F() 364 res in HWTEST_F() 388 int res = 0; HWTEST_F() local [all...] |
/base/security/crypto_framework/frameworks/cj/src/ |
H A D | crypto_ffi.cpp | 29 HcfResult res = HcfRandCreate(&randObj); in FfiOHOSCreateRandom() local 30 *errCode = static_cast<int32_t>(res); in FfiOHOSCreateRandom() 31 if (res != HCF_SUCCESS) { in FfiOHOSCreateRandom() 55 const char* res = instance->GetAlgName(errCode); in FfiOHOSRandomGetAlgName() local 57 return res; in FfiOHOSRandomGetAlgName() 93 HcfResult res = HcfMdCreate(algName, &mdObj); in FfiOHOSCreateMd() local 94 *errCode = static_cast<int32_t>(res); in FfiOHOSCreateMd() 95 if (res != HCF_SUCCESS) { in FfiOHOSCreateMd() 113 HcfResult res = HCF_ERR_MALLOC; in FfiOHOSMdUpdate() local 117 return res; in FfiOHOSMdUpdate() 134 HcfResult res = instance->MdDoFinal(&blob); FfiOHOSDigest() local 148 uint32_t res = 0; FfiOHOSGetMdLength() local 164 HcfResult res = HcfSymKeyGeneratorCreate(algName, &generator); FfiOHOSCreateSymKeyGenerator() local 190 const char* res = instance->GetAlgName(errCode); FfiOHOSSymKeyGeneratorGetAlgName() local 205 HcfResult res = instance->GenerateSymKey(&key); FfiOHOSGenerateSymKey() local 232 HcfResult res = instance->ConvertKey(*key, &symkey); FfiOHOSConvertKey() local 259 const char* res = instance->GetAlgorithm(errCode); FfiOHOSSymKeyGetAlgName() local 273 const char* res = instance->GetFormat(errCode); FfiOHOSSymKeyGetFormat() local 286 HcfResult res = instance->GetEncoded(returnBlob); FfiOHOSSymKeyGetEncoded() local 361 HcfResult res = HcfCipherCreate(transformation, &cipher); FfiOHOSCreateCipher() local 401 HcfResult res = instance->CipherInit(mode, static_cast<HcfKey*>(key), paramsSpec); FfiOHOSCipherInitByIv() local 444 HcfResult res = instance->CipherInit(mode, static_cast<HcfKey*>(key), paramsSpec); FfiOHOSCipherInitByGcm() local 488 HcfResult res = instance->CipherInit(mode, static_cast<HcfKey*>(key), paramsSpec); FfiOHOSCipherInitByCcm() local 510 HcfResult res = instance->CipherInit(mode, static_cast<HcfKey*>(key), paramsSpec); FfiOHOSCipherInitWithOutParams() local 523 HcfResult res = instance->CipherUpdate(input, output); FfiOHOSCipherUpdate() local 536 HcfResult res = instance->CipherDoFinal(input, output); FfiOHOSCipherDoFinal() local 550 HcfResult res = instance->SetCipherSpec(csi, pSource); FfiOHOSSetCipherSpec() local 564 HcfResult res = instance->GetCipherSpecString(csi, returnString); FfiOHOSGetCipherSpecString() local 578 HcfResult res = instance->GetCipherSpecUint8Array(csi, returnUint8Array); FfiOHOSGetCipherSpecUint8Array() local 592 const char* res = instance->GetAlgorithm(errCode); FfiOHOSCipherGetAlgName() local 602 HcfResult res = HcfMacCreate(algName, &macObj); FFiOHOSCryptoMacConstructor() local 634 HcfResult res = instance->MacInit(keyInstance->GetSymKey()); FfiOHOSCryptoMacInit() local 647 HcfResult res = HCF_ERR_MALLOC; FfiOHOSCryptoMacUpdate() local 668 HcfResult res = instance->MacDoFinal(&blob); FfiOHOSCryptoMacDoFinal() local 682 uint32_t res = 0; FfiOHOSCryptoGetMacLength() local 697 HcfResult res = HcfSignCreate(algName, &signObj); FFiOHOSCryptoSignConstructor() local 813 HcfResult res = HcfVerifyCreate(algName, &verify); FFiOHOSVerifyConstructor() local 1475 const char* res = instance->GetFormat(errCode); FfiOHOSPriKeyGetFormat() local 1619 const char* res = instance->GetFormat(errCode); FfiOHOSPubKeyGetFormat() local [all...] |
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/ |
H A D | auth_sub_session.c | 69 int32_t res = protocol->start(protocol, returnSendMsg); in StartAuthSubSession() local 70 if (res != HC_SUCCESS) { in StartAuthSubSession() 71 return res; in StartAuthSubSession() 85 int32_t res = protocol->process(protocol, receviedMsg, returnSendMsg); in ProcessAuthSubSession() local 86 if (res != HC_SUCCESS) { in ProcessAuthSubSession() 87 return res; in ProcessAuthSubSession() 156 int32_t res = component->createProtocolFunc(params, isClient, &protocol); in CreateAuthSubSession() local 157 if (res != HC_SUCCESS) { in CreateAuthSubSession() 159 return res; in CreateAuthSubSession()
|
/base/security/huks/services/huks_standard/huks_service/main/os_dependency/sa/ |
H A D | hks_sa_interface.cpp | 147 int res = Remote()->SendRequest(HKS_MSG_ATTEST_KEY_ASYNC_REPLY, data, reply, option); in SendAsyncReply() local 148 if (res != ERR_OK) { in SendAsyncReply() 149 HKS_LOG_E("send fail reply errCode failed %" LOG_PUBLIC "d", res); in SendAsyncReply() 160 int res = Remote()->SendRequest(HKS_MSG_ATTEST_KEY_ASYNC_REPLY, data, reply, option); in SendAsyncReply() local 161 if (res != ERR_OK) { in SendAsyncReply() 162 HKS_LOG_E("Remote()->SendRequest HKS_MSG_ATTEST_KEY_ASYNC_REPLY failed %" LOG_PUBLIC "d", res); in SendAsyncReply() 171 int res = Remote()->SendRequest(HKS_MSG_ATTEST_KEY_ASYNC_REPLY, data, reply, option); in SendAsyncReply() local 172 if (res != ERR_OK) { in SendAsyncReply() 173 HKS_LOG_E("Remote()->SendRequest HKS_MSG_ATTEST_KEY_ASYNC_REPLY failed %" LOG_PUBLIC "d", res); in SendAsyncReply()
|
/base/telephony/core_service/services/sim/src/ |
H A D | tag_service.cpp | 38 uint8_t res = 0; in TagService() local 39 std::from_chars(std::addressof(*it), std::addressof(*(it + CHINESE_POS)), res, HEX_TYPE); in TagService() 40 data_.push_back(res); in TagService() 131 const auto res = TagFunc(data_.at(offset_), order, tag_); in Next() local 132 if (res < INT_ZERO) { in Next() 135 } else if (res > INT_ZERO) { in Next() 149 const auto res = LengthFunc(data_.at(offset_), order, length_); in Next() local 150 if (res < INT_ZERO) { in Next() 153 } else if (res > INT_ZERO) { in Next()
|
/base/security/crypto_framework/test/unittest/src/ |
H A D | crypto_sm4_cipher_test.cpp | 962 HcfResult res = HCF_SUCCESS; in HWTEST_F() local 968 res = HcfCipherSm4GeneratorSpiCreate(¶ms, nullptr); in HWTEST_F() 969 EXPECT_NE(res, HCF_SUCCESS); in HWTEST_F() 976 HcfResult res = HCF_SUCCESS; in HWTEST_F() local 985 res = HcfCipherSm4GeneratorSpiCreate(¶ms, &cipher); in HWTEST_F() 986 EXPECT_EQ(res, HCF_SUCCESS); in HWTEST_F() 987 res = cipher->init(nullptr, ENCRYPT_MODE, (HcfKey *)key, nullptr); in HWTEST_F() 988 ASSERT_EQ(res, HCF_INVALID_PARAMS); in HWTEST_F() 996 HcfResult res = HCF_SUCCESS; in HWTEST_F() local 1002 res in HWTEST_F() 1013 HcfResult res = HCF_SUCCESS; HWTEST_F() local 1033 HcfResult res = HCF_SUCCESS; HWTEST_F() local 1059 HcfResult res = HCF_SUCCESS; HWTEST_F() local 1082 HcfResult res = HCF_SUCCESS; HWTEST_F() local 1106 HcfResult res = HCF_SUCCESS; HWTEST_F() local 1125 HcfResult res = HCF_SUCCESS; HWTEST_F() local 1144 HcfResult res = HCF_SUCCESS; HWTEST_F() local 1165 HcfResult res = HCF_SUCCESS; HWTEST_F() local 1187 HcfResult res = HCF_SUCCESS; HWTEST_F() local [all...] |
/base/customization/enterprise_device_management/test/unittest/services/edm/src/ |
H A D | iplugin_template_test.cpp | 74 ErrCode res; in HWTEST_F() local 89 res = plugin->OnHandlePolicy(funcCode, data, reply, handlePolicyData, DEFAULT_USER_ID); in HWTEST_F() 90 ASSERT_TRUE(res != ERR_OK); in HWTEST_F() 100 res = plugin->OnHandlePolicy(funcCode, data, reply, handlePolicyData, DEFAULT_USER_ID); in HWTEST_F() 101 ASSERT_TRUE(res != ERR_OK); in HWTEST_F() 114 ErrCode res; in HWTEST_F() local 128 res = plugin->OnHandlePolicy(funcCode, data, reply, handlePolicyData, DEFAULT_USER_ID); in HWTEST_F() 129 ASSERT_TRUE(res == ERR_OK); in HWTEST_F() 137 res = plugin->OnHandlePolicy(funcCode, data, reply, handlePolicyData, DEFAULT_USER_ID); in HWTEST_F() 138 ASSERT_TRUE(res in HWTEST_F() 163 ErrCode res; HWTEST_F() local 355 ErrCode res = plugin->OnHandlePolicy(funcCode, data, reply, handlePolicyData, DEFAULT_USER_ID); HWTEST_F() local [all...] |
/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/src/ |
H A D | dlp_zip.cpp | 73 int32_t res = DLP_ZIP_OK; in AddBuffToZip() local 77 res = DLP_ZIP_FAIL; in AddBuffToZip() 82 res = DLP_ZIP_FAIL; in AddBuffToZip() 90 return res; in AddBuffToZip() 117 int32_t res = DLP_ZIP_OK; in AddFileContextToZip() local 123 res = DLP_ZIP_FAIL; in AddFileContextToZip() 130 res = DLP_ZIP_FAIL; in AddFileContextToZip() 135 res = DLP_ZIP_FAIL; in AddFileContextToZip() 143 return res; in AddFileContextToZip() 221 int res in CheckUnzipFileInfo() local [all...] |
/base/security/security_component_manager/services/security_component_service/sa/sa_main/ |
H A D | sec_comp_stub.cpp | 78 int32_t res = this->RegisterSecurityComponent(static_cast<SecCompType>(type), componentInfo, scId); in RegisterSecurityComponentInner() local 80 if (!rawReply.WriteInt32(res)) { in RegisterSecurityComponentInner() 122 int32_t res = this->UpdateSecurityComponent(scId, componentInfo); in UpdateSecurityComponentInner() local 124 if (!rawReply.WriteInt32(res)) { in UpdateSecurityComponentInner() 134 return res; in UpdateSecurityComponentInner() 155 int32_t res = this->UnregisterSecurityComponent(scId); in UnregisterSecurityComponentInner() local 157 if (!rawReply.WriteInt32(res)) { in UnregisterSecurityComponentInner() 211 int32_t res = in ReportSecurityComponentClickEventInner() local 216 if (!rawReply.WriteInt32(res)) { in ReportSecurityComponentClickEventInner() 246 bool res in VerifySavePermissionInner() local 262 auto res = this->GetEnhanceRemoteObject(); GetEnhanceRemoteObjectInner() local 284 int32_t res = this->PreRegisterSecCompProcess(); PreRegisterSecCompProcessInner() local [all...] |
/base/security/device_auth/services/legacy/group_manager/src/channel_manager/soft_bus_channel/ |
H A D | soft_bus_channel.c | 188 int32_t res = AddChannelEntry(requestId, channelId); in OpenSoftBusChannel() local 189 if (res != HC_SUCCESS) { in OpenSoftBusChannel() 190 return res; in OpenSoftBusChannel() 210 int32_t res = SendBytes(channelId, data, dataLen); in SendSoftBusMsg() local 211 LOGI("[SoftBus][Out]: SendMsg! res: %d", res); in SendSoftBusMsg() 212 if (res != HC_SUCCESS) { in SendSoftBusMsg() 259 int32_t res = CreateSessionServer(GROUP_MANAGER_PACKAGE_NAME, GROUP_MANAGER_PACKAGE_NAME, &softBusListener); in InitSoftBusChannelModule() local 260 LOGI("[SoftBus][Out]: CreateSessionServer! res: %d", res); in InitSoftBusChannelModule() 273 int32_t res = RemoveSessionServer(GROUP_MANAGER_PACKAGE_NAME, GROUP_MANAGER_PACKAGE_NAME); DestroySoftBusChannelModule() local [all...] |
/base/security/crypto_framework/plugin/openssl_plugin/key/asy_key_generator/src/ |
H A D | ecc_asy_key_generator_openssl.c | 535 HcfResult res = HCF_INVALID_PARAMS; in CompareOpenssl224BitsType() local 536 res = CheckEc224CurveId(bigIntegerParams->p, bigIntegerParams->b, bigIntegerParams->x, bigIntegerParams->y); in CompareOpenssl224BitsType() 537 if (res == HCF_SUCCESS) { in CompareOpenssl224BitsType() 539 return res; in CompareOpenssl224BitsType() 555 HcfResult res = HCF_INVALID_PARAMS; in CompareOpenssl256BitsType() local 556 res = CheckEc256CurveId(bigIntegerParams->p, bigIntegerParams->b, bigIntegerParams->x, bigIntegerParams->y); in CompareOpenssl256BitsType() 557 if (res == HCF_SUCCESS) { in CompareOpenssl256BitsType() 559 return res; in CompareOpenssl256BitsType() 590 HcfResult res = HCF_INVALID_PARAMS; in CompareOpenssl384BitsType() local 591 res in CompareOpenssl384BitsType() 625 HcfResult res = CheckEc521CurveId(bigIntegerParams->p, bigIntegerParams->b, CompareOpenssl521BitsType() local 652 HcfResult res = HCF_INVALID_PARAMS; CheckParamsSpecToGetCurveId() local 1480 HcfResult res = CheckEcKeySelf(self, &isPrivate); GetEcKeySpecBigInteger() local 1524 HcfResult res = CheckEcKeySelf(self, &isPrivate); GetEcKeySpecString() local 1552 HcfResult res = CheckEcKeySelf(self, &isPrivate); GetEcKeySpecInt() local 1723 HcfResult res = PackEccPubKey(curveId, ecKey, g_eccGenerateFieldType, returnPubKey); ConvertEcPubKey() local 1754 HcfResult res = ConvertPriFromEncoded(&ecKey, priKeyBlob); ConvertEcPriKey() local 1793 HcfResult res = HCF_SUCCESS; EngineConvertEccKey() local 1840 HcfResult res = PackEccPubKey(curveId, ecKey, g_eccGenerateFieldType, returnPubKey); ConvertEcPemPubKey() local 1891 HcfResult res = HCF_SUCCESS; EngineConvertEccPemKey() local 1926 HcfResult res = PackEccPubKey(impl->curveId, ecKey, fieldType, &pubKey); PackAndAssignPubKey() local 1938 HcfResult res = PackEccPriKey(impl->curveId, ecKey, fieldType, &priKey); PackAndAssignPriKey() local 1955 HcfResult res = PackEccPriKey(impl->curveId, ecPriKey, fieldType, &priKey); CreateAndAssignKeyPair() local 2002 HcfResult res = NewEcKeyPair(impl->curveId, &ecKey); EngineGenerateKeyPair() local 2029 HcfResult res = GenKeyPairEcKeyBySpec(params, &ecKey); EngineGenerateKeyPairBySpec() local 2065 HcfResult res = GenPubKeyEcKeyBySpec(params, &ecKey); EngineGeneratePubKeyBySpec() local 2098 HcfResult res = GenPriKeyEcKeyBySpec(params, &ecKey); EngineGeneratePriKeyBySpec() local [all...] |
/base/hiviewdfx/hidumper/test/unittest/common/ |
H A D | hidumper_test_utils.cpp | 38 bool res = false; in IsExistStrInFile() local 44 return res; in IsExistStrInFile() 49 res = true; in IsExistStrInFile() 54 return res; in IsExistStrInFile() 74 bool res = false; in GetSpecialLine() local 81 res = true; in GetSpecialLine() 87 return res; in GetSpecialLine()
|
/base/security/access_token/frameworks/test/unittest/ |
H A D | common_test.cpp | 71 std::string res;
in HWTEST_F() local 72 res = ConstantCommon::EncryptDevId("");
in HWTEST_F() 73 EXPECT_EQ(res, "");
in HWTEST_F() 75 res = ConstantCommon::EncryptDevId("12345");
in HWTEST_F() 76 EXPECT_EQ(res, "1*******");
in HWTEST_F() 78 res = ConstantCommon::EncryptDevId("123454321");
in HWTEST_F() 79 EXPECT_EQ(res, "1234****4321");
in HWTEST_F()
|