Home
last modified time | relevance | path

Searched refs:res (Results 251 - 275 of 795) sorted by relevance

1...<<11121314151617181920>>...32

/base/inputmethod/imf/frameworks/native/inputmethod_ability/src/
H A Dinput_method_agent_proxy.cpp33 int32_t res = -1; in DispatchKeyEvent() local
39 [&res](MessageParcel &reply) { return ITypesUtil::Unmarshal(reply, res); }); in DispatchKeyEvent()
40 return ret == ErrorCode::NO_ERROR ? res : ret; in DispatchKeyEvent()
77 int32_t res = -1; in SendPrivateCommand() local
81 [&res](MessageParcel &reply) { return ITypesUtil::Unmarshal(reply, res); }); in SendPrivateCommand()
82 return ret == ErrorCode::NO_ERROR ? res : ret; in SendPrivateCommand()
/base/customization/enterprise_device_management/services/edm_plugin/src/
H A Dbundle_install_plugin.cpp57 ErrCode res = appControlProxy->AddAppInstallControlRule(data, controlRuleType_, userId); in OnSetPolicy() local
58 if (res != ERR_OK) { in OnSetPolicy()
59 EDMLOGE("BundleInstallPlugin OnSetPolicyDone Faild %{public}d:", res); in OnSetPolicy()
96 ErrCode res = appControlProxy->DeleteAppInstallControlRule(controlRuleType_, data, userId); in OnRemovePolicy() local
97 if (res != ERR_OK) { in OnRemovePolicy()
98 EDMLOGE("BundleInstallPlugin DeleteAppInstallControlRule OnRemovePolicy faild %{public}d:", res); in OnRemovePolicy()
115 ErrCode res = appControlProxy->DeleteAppInstallControlRule(controlRuleType_, data, userId); in OnAdminRemoveDone() local
116 EDMLOGD("BundleInstallPlugin OnAdminRemoveDone result %{public}d:", res); in OnAdminRemoveDone()
/base/security/asset/test/unittest/common/src/
H A Dasset_test_common.cpp102 AssetAttr *res = AssetParseAttr(result, static_cast<AssetTag>(attrs[i].tag)); in CheckMatchAttrResultSdk() local
103 if (res == nullptr) { in CheckMatchAttrResultSdk()
108 if (attrs[i].value.boolean != res->value.boolean) { in CheckMatchAttrResultSdk()
109 printf("tag is %x, %u vs %u", attrs[i].tag, attrs[i].value.boolean, res->value.boolean); in CheckMatchAttrResultSdk()
114 if (attrs[i].value.u32 != res->value.u32) { in CheckMatchAttrResultSdk()
115 printf("tag is %x, %u vs %u", attrs[i].tag, attrs[i].value.u32, res->value.u32); in CheckMatchAttrResultSdk()
120 if (!CompareBlobSdk(&attrs[i].value.blob, &res->value.blob)) { in CheckMatchAttrResultSdk()
121 printf("tag is %x, len %u vs len %u", attrs[i].tag, attrs[i].value.blob.size, res->value.blob.size); in CheckMatchAttrResultSdk()
/base/security/certificate_framework/test/fuzztest/v1.0/x509distinguishedname_fuzzer/
H A Dx509distinguished_name_fuzzer.cpp62 CfResult res = HcfX509DistinguishedNameCreate(&nameDerStream, false, &x509DistinguishedNameObj); in CreateOneDistinguishedName() local
63 if (res != CF_SUCCESS) { in CreateOneDistinguishedName()
74 res = HcfX509DistinguishedNameCreate(&nameStrStream, true, &x509DistinguishedNameObj); in CreateOneDistinguishedName()
75 if (res != CF_SUCCESS) { in CreateOneDistinguishedName()
99 CfResult res = HcfX509DistinguishedNameCreate(&inStream, false, &x509DistinguishedNameObj); in X509DistinguishedNameFuzzTest() local
100 if (res != CF_SUCCESS) { in X509DistinguishedNameFuzzTest()
108 res = HcfX509DistinguishedNameCreate(&inStream, true, &x509DistinguishedNameObj); in X509DistinguishedNameFuzzTest()
109 if (res != CF_SUCCESS) { in X509DistinguishedNameFuzzTest()
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/key_agreement/src/
H A Decdh_openssl.c54 EVP_PKEY *res = AssignEcKeyToPkey(ecKey); in NewPKeyByEccPubKey() local
55 if (res == NULL) { in NewPKeyByEccPubKey()
58 return res; in NewPKeyByEccPubKey()
67 EVP_PKEY *res = AssignEcKeyToPkey(ecKey); in NewPKeyByEccPriKey() local
68 if (res == NULL) { in NewPKeyByEccPriKey()
71 return res; in NewPKeyByEccPriKey()
115 HcfResult res = KeyDerive(priPKey, pubPKey, returnSecret); in EngineGenerateSecret() local
118 return res; in EngineGenerateSecret()
/base/security/device_auth/services/frameworks/inc/
H A Dcommon_defs.h212 int32_t res = x; \
213 if ((res) != HC_SUCCESS) { \
226 #define GOTO_ERR_AND_SET_RET(x, res) do { \
227 res = x; \
228 if ((res) != HC_SUCCESS) { \
234 int32_t res = x; \
235 if ((res) != HC_SUCCESS) { \
236 return res; \
/base/security/certificate_framework/frameworks/adapter/v1.0/src/
H A Dx509_crl_openssl.c117 int32_t res = X509_CRL_get0_by_cert(crl, &rev, certOpenssl); in IsRevoked() local
118 return (res != 0); in IsRevoked()
195 int32_t res = X509_CRL_verify(crl, pubKey); in Verify() local
196 if (res != CF_OPENSSL_SUCCESS) { in Verify()
275 CfResult res = GetIssuerName(self, ((HcfX509CRLOpensslImpl *)self)->certIssuer); in SetCertIssuer() local
276 if (res != CF_SUCCESS) { in SetCertIssuer()
280 return res; in SetCertIssuer()
381 LOGE("Get revoked certificate fail, res : %d!", opensslRes); in GetRevokedCert()
385 CfResult res = HcfCX509CRLEntryCreate(rev, entryOut, ((HcfX509CRLOpensslImpl *)self)->certIssuer); in GetRevokedCert() local
386 if (res ! in GetRevokedCert()
420 CfResult res = HcfCX509CRLEntryCreate(revokedRet, entryOut, ((HcfX509CRLOpensslImpl *)self)->certIssuer); GetRevokedCertWithCert() local
438 CfResult res = HcfCX509CRLEntryCreate(rev, &crlEntry, ((HcfX509CRLOpensslImpl *)self)->certIssuer); DeepCopyRevokedCertificates() local
647 CfResult res = GetSignatureAlgOid(self, oidOut); GetSignatureAlgName() local
784 CfResult res = DeepCopyDataToOut(bufMem->data, bufMem->length, out); ToString() local
945 CfResult res = GetNextUpdate(self, &outNextUpdate); CompareUpdateDateTimeX509Openssl() local
982 CfResult res = GetNumOfCRL(self, &outNum); CompareCRLX509Openssl() local
1011 CfResult res = CF_SUCCESS; MatchX509CRLOpensslPart2() local
1066 CfResult res = Comparex509CertX509Openssl(self, matchParams->x509Cert, out); MatchX509CRLOpenssl() local
1075 CfResult res = CompareIssuerX509Openssl(self, matchParams->issuer, out); MatchX509CRLOpenssl() local
[all...]
/base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/src/
H A Ddlp_permission_proxy.cpp71 int32_t res; in GenerateDlpCertificate() local
72 if (!reply.ReadInt32(res)) { in GenerateDlpCertificate()
76 return res; in GenerateDlpCertificate()
120 int32_t res; in ParseDlpCertificate() local
121 if (!reply.ReadInt32(res)) { in ParseDlpCertificate()
125 return res; in ParseDlpCertificate()
170 int32_t res; in InstallDlpSandbox() local
171 if (!reply.ReadInt32(res)) { in InstallDlpSandbox()
185 return res; in InstallDlpSandbox()
224 int32_t res; in UninstallDlpSandbox() local
264 int32_t res; GetSandboxExternalAuthorization() local
304 int32_t res; QueryDlpFileCopyableByTokenId() local
337 int32_t res; QueryDlpFileAccess() local
372 int32_t res; IsInDlpSandbox() local
405 int32_t res; GetDlpSupportFileType() local
489 int32_t res; UnRegisterDlpSandboxChangeCallback() local
563 int32_t res; UnRegisterOpenDlpFileCallback() local
592 int32_t res; GetDlpGatheringPolicy() local
630 int32_t res; SetRetentionState() local
664 int32_t res; CancelRetentionState() local
700 int32_t res; GetRetentionSandboxList() local
768 int32_t res; GetDLPFileVisitRecord() local
823 int32_t res; SetMDMPolicy() local
852 int32_t res; GetMDMPolicy() local
894 int32_t res; RemoveMDMPolicy() local
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_related/creds_manager/
H A Dsym_token_manager.c359 int32_t res = GetLoaderInstance()->sha256(&oriAliasBuff, keyAlias); in GenerateKeyAlias() local
361 if (res != HAL_SUCCESS) { in GenerateKeyAlias()
364 return res; in GenerateKeyAlias()
387 int32_t res = GenerateKeyAlias(token->userId, token->deviceId, &keyAlias); in ImportSymTokenToKeyManager() local
388 if (res != HC_SUCCESS) { in ImportSymTokenToKeyManager()
391 return res; in ImportSymTokenToKeyManager()
398 res = GetLoaderInstance()->importSymmetricKey(&keyParams, &authCodeBuff, purpose, NULL); in ImportSymTokenToKeyManager()
400 if (res != HC_SUCCESS) { in ImportSymTokenToKeyManager()
401 LOGE("Failed to import sym token! res: %d", res); in ImportSymTokenToKeyManager()
422 int32_t res = GenerateKeyAlias(token->userId, token->deviceId, &keyAlias); DeleteSymTokenFromKeyManager() local
667 int32_t res = AddSymTokenToVec(osAccountId, symToken); AddToken() local
703 int32_t res = DeleteSymTokenFromKeyManager(osAccountId, symToken); DeleteToken() local
[all...]
/base/security/crypto_framework/test/fuzztest/key/asykeygenerator_fuzzer/
H A Dasykeygenerator_fuzzer.cpp637 HcfResult res = keyPair->pubKey->getAsyKeySpecBigInteger(keyPair->pubKey, ECC_PK_X_BN, &retBigInt); in ConstructSm2256PubKeyBigInt() local
638 if (res != HCF_SUCCESS) { in ConstructSm2256PubKeyBigInt()
639 return res; in ConstructSm2256PubKeyBigInt()
644 res = keyPair->pubKey->getAsyKeySpecBigInteger(keyPair->pubKey, ECC_PK_Y_BN, &retBigInt); in ConstructSm2256PubKeyBigInt()
645 if (res != HCF_SUCCESS) { in ConstructSm2256PubKeyBigInt()
649 return res; in ConstructSm2256PubKeyBigInt()
659 HcfResult res = HCF_ERR_CRYPTO_OPERATION; in ConstructSm2256PubKeyParamsSpec() local
662 return res; in ConstructSm2256PubKeyParamsSpec()
668 return res; in ConstructSm2256PubKeyParamsSpec()
696 res in ConstructSm2256PubKeyParamsSpec()
708 HcfResult res = HCF_ERR_CRYPTO_OPERATION; ConstructSm2256PriKeyParamsSpec() local
759 HcfResult res = keyPair->pubKey->getAsyKeySpecBigInteger(keyPair->pubKey, ECC_PK_X_BN, &retBigInt); ConstructSm2256KeyPairBigInt() local
795 HcfResult res = HCF_ERR_CRYPTO_OPERATION; ConstructSm2256KeyPairParamsSpec() local
871 HcfResult res = HCF_ERR_CRYPTO_OPERATION; ConstructAlg25519KeyPairParamsSpec() local
953 HcfResult res = HCF_ERR_CRYPTO_OPERATION; ConstructAlg25519PubKeyParamsSpec() local
1020 HcfResult res = HCF_ERR_CRYPTO_OPERATION; ConstructAlg25519PriKeyParamsSpec() local
1069 HcfResult res = HcfAsyKeyGeneratorCreate(algoName.c_str(), &generator); ConstructDhPubKeyParamsSpec() local
1116 HcfResult res = HcfAsyKeyGeneratorCreate(algoName.c_str(), &generator); ConstructDhPriKeyParamsSpec() local
1161 HcfResult res = keyPair->pubKey->getAsyKeySpecBigInteger(keyPair->pubKey, DH_PK_BN, &retBigInt); ConstructDhKeyPairBigInt() local
1184 HcfResult res = HcfAsyKeyGeneratorCreate(algoName.c_str(), &generator); ConstructDhKeyPairParamsSpec() local
1224 HcfResult res = HcfAsyKeyGeneratorCreate("ECC224", &generator); TestEccKey() local
1254 HcfResult res = HcfAsyKeyGeneratorCreate("RSA1024", &generator); TestRsaKey() local
1286 HcfResult res = HcfAsyKeyGeneratorCreate("DSA2048", &generator); TestDsaKey() local
1318 HcfResult res = HcfAsyKeyGeneratorCreate("SM2_256", &generator); TestSm2Key() local
1348 HcfResult res = HcfAsyKeyGeneratorCreate("ECC_BrainPoolP160r1", &generator); TestBrainpoolKey() local
1379 HcfResult res = HcfAsyKeyGeneratorCreate("Ed25519", &generator); TestEd25519Key() local
1410 HcfResult res = HcfAsyKeyGeneratorCreate("X25519", &generator); TestX25519Key() local
1441 HcfResult res = HcfAsyKeyGeneratorCreate("DH_modp2048", &generator); TestDhKey() local
1476 HcfResult res = HCF_SUCCESS; GenEccKeyBySpec() local
1529 HcfResult res = HCF_SUCCESS; GenRsaKeyBySpec() local
1574 HcfResult res = HCF_SUCCESS; GenDsaKeyBySpec() local
1618 HcfResult res = HCF_SUCCESS; GenSm2KeyBySpec() local
1664 HcfResult res = HCF_SUCCESS; GenSm2KeyCommonBySpec() local
1720 HcfResult res = HCF_SUCCESS; GenAlg25519KeyBySpec() local
1785 HcfResult res = HCF_SUCCESS; GenDhKeyBySpec() local
1831 HcfResult res = HCF_SUCCESS; GenDhKeyCommonBySpec() local
1885 HcfResult res = HcfAsyKeyGeneratorCreate(algoName.c_str(), &generator); AsyKeyGeneratorFuzzTest() local
[all...]
/base/security/crypto_framework/test/fuzztest/crypto_operation/hcfmdcreate_fuzzer/
H A Dhcfmdcreate_fuzzer.cpp30 HcfResult res = HcfMdCreate("SHA1", &mdObj); in TestMd() local
31 if (res != HCF_SUCCESS) { in TestMd()
49 HcfResult res = HcfMdCreate(alg.c_str(), &mdObj); in HcMdCreateFuzzTest() local
50 if (res != HCF_SUCCESS) { in HcMdCreateFuzzTest()
/base/security/device_auth/deps_adapter/os_adapter/impl/src/liteos/
H A Dhc_dev_info.c31 int32_t res = GetDevUdid((char *)udid, udidLen); in HcGetUdid() local
32 if (res != 0) { in HcGetUdid()
33 LOGE("[UDID]: GetDevUdid fail. [Res]: %d", res); in HcGetUdid()
/base/hiviewdfx/faultloggerd/test/unittest/local_handler/
H A Dlocal_handler_test.cpp300 int res = 0; in HWTEST_F() local
308 res = 1; in HWTEST_F()
312 res = 1; in HWTEST_F()
319 res = 1; in HWTEST_F()
326 res = 1; in HWTEST_F()
331 ASSERT_TRUE(res == 0); in HWTEST_F()
346 int res = 0; in HWTEST_F() local
353 res = 1; in HWTEST_F()
357 res = 1; in HWTEST_F()
364 res in HWTEST_F()
388 int res = 0; HWTEST_F() local
[all...]
/base/security/crypto_framework/frameworks/cj/src/
H A Dcrypto_ffi.cpp29 HcfResult res = HcfRandCreate(&randObj); in FfiOHOSCreateRandom() local
30 *errCode = static_cast<int32_t>(res); in FfiOHOSCreateRandom()
31 if (res != HCF_SUCCESS) { in FfiOHOSCreateRandom()
55 const char* res = instance->GetAlgName(errCode); in FfiOHOSRandomGetAlgName() local
57 return res; in FfiOHOSRandomGetAlgName()
93 HcfResult res = HcfMdCreate(algName, &mdObj); in FfiOHOSCreateMd() local
94 *errCode = static_cast<int32_t>(res); in FfiOHOSCreateMd()
95 if (res != HCF_SUCCESS) { in FfiOHOSCreateMd()
113 HcfResult res = HCF_ERR_MALLOC; in FfiOHOSMdUpdate() local
117 return res; in FfiOHOSMdUpdate()
134 HcfResult res = instance->MdDoFinal(&blob); FfiOHOSDigest() local
148 uint32_t res = 0; FfiOHOSGetMdLength() local
164 HcfResult res = HcfSymKeyGeneratorCreate(algName, &generator); FfiOHOSCreateSymKeyGenerator() local
190 const char* res = instance->GetAlgName(errCode); FfiOHOSSymKeyGeneratorGetAlgName() local
205 HcfResult res = instance->GenerateSymKey(&key); FfiOHOSGenerateSymKey() local
232 HcfResult res = instance->ConvertKey(*key, &symkey); FfiOHOSConvertKey() local
259 const char* res = instance->GetAlgorithm(errCode); FfiOHOSSymKeyGetAlgName() local
273 const char* res = instance->GetFormat(errCode); FfiOHOSSymKeyGetFormat() local
286 HcfResult res = instance->GetEncoded(returnBlob); FfiOHOSSymKeyGetEncoded() local
361 HcfResult res = HcfCipherCreate(transformation, &cipher); FfiOHOSCreateCipher() local
401 HcfResult res = instance->CipherInit(mode, static_cast<HcfKey*>(key), paramsSpec); FfiOHOSCipherInitByIv() local
444 HcfResult res = instance->CipherInit(mode, static_cast<HcfKey*>(key), paramsSpec); FfiOHOSCipherInitByGcm() local
488 HcfResult res = instance->CipherInit(mode, static_cast<HcfKey*>(key), paramsSpec); FfiOHOSCipherInitByCcm() local
510 HcfResult res = instance->CipherInit(mode, static_cast<HcfKey*>(key), paramsSpec); FfiOHOSCipherInitWithOutParams() local
523 HcfResult res = instance->CipherUpdate(input, output); FfiOHOSCipherUpdate() local
536 HcfResult res = instance->CipherDoFinal(input, output); FfiOHOSCipherDoFinal() local
550 HcfResult res = instance->SetCipherSpec(csi, pSource); FfiOHOSSetCipherSpec() local
564 HcfResult res = instance->GetCipherSpecString(csi, returnString); FfiOHOSGetCipherSpecString() local
578 HcfResult res = instance->GetCipherSpecUint8Array(csi, returnUint8Array); FfiOHOSGetCipherSpecUint8Array() local
592 const char* res = instance->GetAlgorithm(errCode); FfiOHOSCipherGetAlgName() local
602 HcfResult res = HcfMacCreate(algName, &macObj); FFiOHOSCryptoMacConstructor() local
634 HcfResult res = instance->MacInit(keyInstance->GetSymKey()); FfiOHOSCryptoMacInit() local
647 HcfResult res = HCF_ERR_MALLOC; FfiOHOSCryptoMacUpdate() local
668 HcfResult res = instance->MacDoFinal(&blob); FfiOHOSCryptoMacDoFinal() local
682 uint32_t res = 0; FfiOHOSCryptoGetMacLength() local
697 HcfResult res = HcfSignCreate(algName, &signObj); FFiOHOSCryptoSignConstructor() local
813 HcfResult res = HcfVerifyCreate(algName, &verify); FFiOHOSVerifyConstructor() local
1475 const char* res = instance->GetFormat(errCode); FfiOHOSPriKeyGetFormat() local
1619 const char* res = instance->GetFormat(errCode); FfiOHOSPubKeyGetFormat() local
[all...]
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/
H A Dauth_sub_session.c69 int32_t res = protocol->start(protocol, returnSendMsg); in StartAuthSubSession() local
70 if (res != HC_SUCCESS) { in StartAuthSubSession()
71 return res; in StartAuthSubSession()
85 int32_t res = protocol->process(protocol, receviedMsg, returnSendMsg); in ProcessAuthSubSession() local
86 if (res != HC_SUCCESS) { in ProcessAuthSubSession()
87 return res; in ProcessAuthSubSession()
156 int32_t res = component->createProtocolFunc(params, isClient, &protocol); in CreateAuthSubSession() local
157 if (res != HC_SUCCESS) { in CreateAuthSubSession()
159 return res; in CreateAuthSubSession()
/base/security/huks/services/huks_standard/huks_service/main/os_dependency/sa/
H A Dhks_sa_interface.cpp147 int res = Remote()->SendRequest(HKS_MSG_ATTEST_KEY_ASYNC_REPLY, data, reply, option); in SendAsyncReply() local
148 if (res != ERR_OK) { in SendAsyncReply()
149 HKS_LOG_E("send fail reply errCode failed %" LOG_PUBLIC "d", res); in SendAsyncReply()
160 int res = Remote()->SendRequest(HKS_MSG_ATTEST_KEY_ASYNC_REPLY, data, reply, option); in SendAsyncReply() local
161 if (res != ERR_OK) { in SendAsyncReply()
162 HKS_LOG_E("Remote()->SendRequest HKS_MSG_ATTEST_KEY_ASYNC_REPLY failed %" LOG_PUBLIC "d", res); in SendAsyncReply()
171 int res = Remote()->SendRequest(HKS_MSG_ATTEST_KEY_ASYNC_REPLY, data, reply, option); in SendAsyncReply() local
172 if (res != ERR_OK) { in SendAsyncReply()
173 HKS_LOG_E("Remote()->SendRequest HKS_MSG_ATTEST_KEY_ASYNC_REPLY failed %" LOG_PUBLIC "d", res); in SendAsyncReply()
/base/telephony/core_service/services/sim/src/
H A Dtag_service.cpp38 uint8_t res = 0; in TagService() local
39 std::from_chars(std::addressof(*it), std::addressof(*(it + CHINESE_POS)), res, HEX_TYPE); in TagService()
40 data_.push_back(res); in TagService()
131 const auto res = TagFunc(data_.at(offset_), order, tag_); in Next() local
132 if (res < INT_ZERO) { in Next()
135 } else if (res > INT_ZERO) { in Next()
149 const auto res = LengthFunc(data_.at(offset_), order, length_); in Next() local
150 if (res < INT_ZERO) { in Next()
153 } else if (res > INT_ZERO) { in Next()
/base/security/crypto_framework/test/unittest/src/
H A Dcrypto_sm4_cipher_test.cpp962 HcfResult res = HCF_SUCCESS; in HWTEST_F() local
968 res = HcfCipherSm4GeneratorSpiCreate(&params, nullptr); in HWTEST_F()
969 EXPECT_NE(res, HCF_SUCCESS); in HWTEST_F()
976 HcfResult res = HCF_SUCCESS; in HWTEST_F() local
985 res = HcfCipherSm4GeneratorSpiCreate(&params, &cipher); in HWTEST_F()
986 EXPECT_EQ(res, HCF_SUCCESS); in HWTEST_F()
987 res = cipher->init(nullptr, ENCRYPT_MODE, (HcfKey *)key, nullptr); in HWTEST_F()
988 ASSERT_EQ(res, HCF_INVALID_PARAMS); in HWTEST_F()
996 HcfResult res = HCF_SUCCESS; in HWTEST_F() local
1002 res in HWTEST_F()
1013 HcfResult res = HCF_SUCCESS; HWTEST_F() local
1033 HcfResult res = HCF_SUCCESS; HWTEST_F() local
1059 HcfResult res = HCF_SUCCESS; HWTEST_F() local
1082 HcfResult res = HCF_SUCCESS; HWTEST_F() local
1106 HcfResult res = HCF_SUCCESS; HWTEST_F() local
1125 HcfResult res = HCF_SUCCESS; HWTEST_F() local
1144 HcfResult res = HCF_SUCCESS; HWTEST_F() local
1165 HcfResult res = HCF_SUCCESS; HWTEST_F() local
1187 HcfResult res = HCF_SUCCESS; HWTEST_F() local
[all...]
/base/customization/enterprise_device_management/test/unittest/services/edm/src/
H A Diplugin_template_test.cpp74 ErrCode res; in HWTEST_F() local
89 res = plugin->OnHandlePolicy(funcCode, data, reply, handlePolicyData, DEFAULT_USER_ID); in HWTEST_F()
90 ASSERT_TRUE(res != ERR_OK); in HWTEST_F()
100 res = plugin->OnHandlePolicy(funcCode, data, reply, handlePolicyData, DEFAULT_USER_ID); in HWTEST_F()
101 ASSERT_TRUE(res != ERR_OK); in HWTEST_F()
114 ErrCode res; in HWTEST_F() local
128 res = plugin->OnHandlePolicy(funcCode, data, reply, handlePolicyData, DEFAULT_USER_ID); in HWTEST_F()
129 ASSERT_TRUE(res == ERR_OK); in HWTEST_F()
137 res = plugin->OnHandlePolicy(funcCode, data, reply, handlePolicyData, DEFAULT_USER_ID); in HWTEST_F()
138 ASSERT_TRUE(res in HWTEST_F()
163 ErrCode res; HWTEST_F() local
355 ErrCode res = plugin->OnHandlePolicy(funcCode, data, reply, handlePolicyData, DEFAULT_USER_ID); HWTEST_F() local
[all...]
/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/src/
H A Ddlp_zip.cpp73 int32_t res = DLP_ZIP_OK; in AddBuffToZip() local
77 res = DLP_ZIP_FAIL; in AddBuffToZip()
82 res = DLP_ZIP_FAIL; in AddBuffToZip()
90 return res; in AddBuffToZip()
117 int32_t res = DLP_ZIP_OK; in AddFileContextToZip() local
123 res = DLP_ZIP_FAIL; in AddFileContextToZip()
130 res = DLP_ZIP_FAIL; in AddFileContextToZip()
135 res = DLP_ZIP_FAIL; in AddFileContextToZip()
143 return res; in AddFileContextToZip()
221 int res in CheckUnzipFileInfo() local
[all...]
/base/security/security_component_manager/services/security_component_service/sa/sa_main/
H A Dsec_comp_stub.cpp78 int32_t res = this->RegisterSecurityComponent(static_cast<SecCompType>(type), componentInfo, scId); in RegisterSecurityComponentInner() local
80 if (!rawReply.WriteInt32(res)) { in RegisterSecurityComponentInner()
122 int32_t res = this->UpdateSecurityComponent(scId, componentInfo); in UpdateSecurityComponentInner() local
124 if (!rawReply.WriteInt32(res)) { in UpdateSecurityComponentInner()
134 return res; in UpdateSecurityComponentInner()
155 int32_t res = this->UnregisterSecurityComponent(scId); in UnregisterSecurityComponentInner() local
157 if (!rawReply.WriteInt32(res)) { in UnregisterSecurityComponentInner()
211 int32_t res = in ReportSecurityComponentClickEventInner() local
216 if (!rawReply.WriteInt32(res)) { in ReportSecurityComponentClickEventInner()
246 bool res in VerifySavePermissionInner() local
262 auto res = this->GetEnhanceRemoteObject(); GetEnhanceRemoteObjectInner() local
284 int32_t res = this->PreRegisterSecCompProcess(); PreRegisterSecCompProcessInner() local
[all...]
/base/security/device_auth/services/legacy/group_manager/src/channel_manager/soft_bus_channel/
H A Dsoft_bus_channel.c188 int32_t res = AddChannelEntry(requestId, channelId); in OpenSoftBusChannel() local
189 if (res != HC_SUCCESS) { in OpenSoftBusChannel()
190 return res; in OpenSoftBusChannel()
210 int32_t res = SendBytes(channelId, data, dataLen); in SendSoftBusMsg() local
211 LOGI("[SoftBus][Out]: SendMsg! res: %d", res); in SendSoftBusMsg()
212 if (res != HC_SUCCESS) { in SendSoftBusMsg()
259 int32_t res = CreateSessionServer(GROUP_MANAGER_PACKAGE_NAME, GROUP_MANAGER_PACKAGE_NAME, &softBusListener); in InitSoftBusChannelModule() local
260 LOGI("[SoftBus][Out]: CreateSessionServer! res: %d", res); in InitSoftBusChannelModule()
273 int32_t res = RemoveSessionServer(GROUP_MANAGER_PACKAGE_NAME, GROUP_MANAGER_PACKAGE_NAME); DestroySoftBusChannelModule() local
[all...]
/base/security/crypto_framework/plugin/openssl_plugin/key/asy_key_generator/src/
H A Decc_asy_key_generator_openssl.c535 HcfResult res = HCF_INVALID_PARAMS; in CompareOpenssl224BitsType() local
536 res = CheckEc224CurveId(bigIntegerParams->p, bigIntegerParams->b, bigIntegerParams->x, bigIntegerParams->y); in CompareOpenssl224BitsType()
537 if (res == HCF_SUCCESS) { in CompareOpenssl224BitsType()
539 return res; in CompareOpenssl224BitsType()
555 HcfResult res = HCF_INVALID_PARAMS; in CompareOpenssl256BitsType() local
556 res = CheckEc256CurveId(bigIntegerParams->p, bigIntegerParams->b, bigIntegerParams->x, bigIntegerParams->y); in CompareOpenssl256BitsType()
557 if (res == HCF_SUCCESS) { in CompareOpenssl256BitsType()
559 return res; in CompareOpenssl256BitsType()
590 HcfResult res = HCF_INVALID_PARAMS; in CompareOpenssl384BitsType() local
591 res in CompareOpenssl384BitsType()
625 HcfResult res = CheckEc521CurveId(bigIntegerParams->p, bigIntegerParams->b, CompareOpenssl521BitsType() local
652 HcfResult res = HCF_INVALID_PARAMS; CheckParamsSpecToGetCurveId() local
1480 HcfResult res = CheckEcKeySelf(self, &isPrivate); GetEcKeySpecBigInteger() local
1524 HcfResult res = CheckEcKeySelf(self, &isPrivate); GetEcKeySpecString() local
1552 HcfResult res = CheckEcKeySelf(self, &isPrivate); GetEcKeySpecInt() local
1723 HcfResult res = PackEccPubKey(curveId, ecKey, g_eccGenerateFieldType, returnPubKey); ConvertEcPubKey() local
1754 HcfResult res = ConvertPriFromEncoded(&ecKey, priKeyBlob); ConvertEcPriKey() local
1793 HcfResult res = HCF_SUCCESS; EngineConvertEccKey() local
1840 HcfResult res = PackEccPubKey(curveId, ecKey, g_eccGenerateFieldType, returnPubKey); ConvertEcPemPubKey() local
1891 HcfResult res = HCF_SUCCESS; EngineConvertEccPemKey() local
1926 HcfResult res = PackEccPubKey(impl->curveId, ecKey, fieldType, &pubKey); PackAndAssignPubKey() local
1938 HcfResult res = PackEccPriKey(impl->curveId, ecKey, fieldType, &priKey); PackAndAssignPriKey() local
1955 HcfResult res = PackEccPriKey(impl->curveId, ecPriKey, fieldType, &priKey); CreateAndAssignKeyPair() local
2002 HcfResult res = NewEcKeyPair(impl->curveId, &ecKey); EngineGenerateKeyPair() local
2029 HcfResult res = GenKeyPairEcKeyBySpec(params, &ecKey); EngineGenerateKeyPairBySpec() local
2065 HcfResult res = GenPubKeyEcKeyBySpec(params, &ecKey); EngineGeneratePubKeyBySpec() local
2098 HcfResult res = GenPriKeyEcKeyBySpec(params, &ecKey); EngineGeneratePriKeyBySpec() local
[all...]
/base/hiviewdfx/hidumper/test/unittest/common/
H A Dhidumper_test_utils.cpp38 bool res = false; in IsExistStrInFile() local
44 return res; in IsExistStrInFile()
49 res = true; in IsExistStrInFile()
54 return res; in IsExistStrInFile()
74 bool res = false; in GetSpecialLine() local
81 res = true; in GetSpecialLine()
87 return res; in GetSpecialLine()
/base/security/access_token/frameworks/test/unittest/
H A Dcommon_test.cpp71 std::string res; in HWTEST_F() local
72 res = ConstantCommon::EncryptDevId(""); in HWTEST_F()
73 EXPECT_EQ(res, ""); in HWTEST_F()
75 res = ConstantCommon::EncryptDevId("12345"); in HWTEST_F()
76 EXPECT_EQ(res, "1*******"); in HWTEST_F()
78 res = ConstantCommon::EncryptDevId("123454321"); in HWTEST_F()
79 EXPECT_EQ(res, "1234****4321"); in HWTEST_F()

Completed in 22 milliseconds

1...<<11121314151617181920>>...32