/base/notification/distributed_notification_service/services/ans/src/ |
H A D | advanced_notification_live_view_service.cpp | 484 auto res = NotificationPreferences::GetInstance()->SetByteToDb(key, pixelsVec, request->GetReceiverUserId()); in SetLockScreenPictureToDb() local 485 if (res != ERR_OK) { in SetLockScreenPictureToDb() 486 ANS_LOGE("Failed to set lock screen picture to db, res is %{public}d.", res); in SetLockScreenPictureToDb() 487 return res; in SetLockScreenPictureToDb() 497 uint32_t res = NotificationPreferences::GetInstance()->GetByteFromDb(key, pixelsVec, request->GetReceiverUserId()); in GetLockScreenPictureFromDb() local 498 if (res != ERR_OK) { in GetLockScreenPictureFromDb() 499 ANS_LOGE("Failed to get lock screen picture from db, res is %{public}d.", res); in GetLockScreenPictureFromDb() 500 return res; in GetLockScreenPictureFromDb() [all...] |
/base/security/crypto_framework/test/unittest/src/ |
H A D | crypto_ed25519_verify_test.cpp | 239 int32_t res = HcfSignCreate("Ed25519", &sign); in GetSignTestData() local 240 if (res != HCF_SUCCESS) { in GetSignTestData() 243 res = sign->init(sign, nullptr, CryptoEd25519VerifyTest::ed25519KeyPair_->priKey); in GetSignTestData() 244 if (res != HCF_SUCCESS) { in GetSignTestData() 248 res = sign->sign(sign, &g_mockInput, out); in GetSignTestData() 250 return res == HCF_SUCCESS; in GetSignTestData() 259 int32_t res = HcfVerifyCreate("Ed25519", &verify); in OpensslMockTestFunc() local 260 if (res != HCF_SUCCESS) { in OpensslMockTestFunc() 263 res = verify->init(verify, nullptr, CryptoEd25519VerifyTest::ed25519KeyPair_->pubKey); in OpensslMockTestFunc() 264 if (res ! in OpensslMockTestFunc() 284 int32_t res = HcfVerifyCreate("Ed25519", &verify); HWTEST_F() local [all...] |
/base/security/access_token/frameworks/inner_api/privacy/src/ |
H A D | privacy_manager_client.cpp | 315 int32_t res = proxy->GetSecCompEnhance(pid, parcel); in GetSecCompEnhance() local 316 if (res != RET_SUCCESS) { in GetSecCompEnhance() 317 return res; in GetSecCompEnhance() 332 int32_t res = proxy->GetSpecialSecCompEnhance(bundleName, parcelList); in GetSpecialSecCompEnhance() local 333 if (res != RET_SUCCESS) { in GetSpecialSecCompEnhance() 334 return res; in GetSpecialSecCompEnhance() 353 int32_t res = proxy->GetPermissionUsedTypeInfos(tokenId, permissionName, resultsParcel); in GetPermissionUsedTypeInfos() local 354 if (res != RET_SUCCESS) { in GetPermissionUsedTypeInfos() 355 return res; in GetPermissionUsedTypeInfos()
|
/base/security/crypto_framework/frameworks/js/napi/crypto/src/ |
H A D | napi_rand.cpp | 283 HcfResult res = rand->generateRandom(rand, numBytes, &randBlob); in JsGenerateRandomSync() local 284 if (res != HCF_SUCCESS) { in JsGenerateRandomSync() 285 napi_throw(env, GenerateBusinessError(env, res, "generateRandom failed!")); in JsGenerateRandomSync() 331 HcfResult res = rand->setSeed(rand, seedBlob); in JsSetSeed() local 332 if (res != HCF_SUCCESS) { in JsSetSeed() 335 napi_throw(env, GenerateBusinessError(env, res, "set seed failed.")); in JsSetSeed() 380 HcfResult res = HcfRandCreate(&randObj); in CreateRand() local 381 if (res != HCF_SUCCESS) { in CreateRand() 382 napi_throw(env, GenerateBusinessError(env, res, "create C obj failed.")); in CreateRand()
|
H A D | napi_sm2_crypto_util.cpp | 143 HcfResult res = HcfGenCipherTextBySpec(spec, dataMode.c_str(), output); in JsGenCipherTextBySpec() local 144 if (res != HCF_SUCCESS) { in JsGenCipherTextBySpec() 148 napi_throw(env, GenerateBusinessError(env, res, "gen cipher text by spec fail.")); in JsGenCipherTextBySpec() 266 HcfResult res = HcfGetCipherTextSpec(cipherText, dataMode.c_str(), &returnSpec); in JsGetCipherTextSpec() local 267 if (res != HCF_SUCCESS) { in JsGetCipherTextSpec() 271 napi_throw(env, GenerateBusinessError(env, res, "get cipher text spec fail.")); in JsGetCipherTextSpec()
|
H A D | napi_cipher.cpp | 541 HcfResult res = cipher->init(cipher, opMode, key, paramsSpec); in SyncInit() local 542 if (res != HCF_SUCCESS) { in SyncInit() 544 napi_throw(env, GenerateBusinessError(env, res, "init cipher fail.")); in SyncInit() 723 HcfResult res = cipher->doFinal(cipher, input, &output); in JsCipherDoFinalSync() local 725 if (res != HCF_SUCCESS) { in JsCipherDoFinalSync() 727 napi_throw(env, GenerateBusinessError(env, res, "do final fail!")); in JsCipherDoFinalSync() 732 res = ConvertDataBlobToNapiValue(env, &output, &instance); in JsCipherDoFinalSync() 734 if (res != HCF_SUCCESS) { in JsCipherDoFinalSync() 736 napi_throw(env, GenerateBusinessError(env, res, "cipher convert dataBlob to napi_value failed!")); in JsCipherDoFinalSync() 806 HcfResult res in CreateCipher() local 869 HcfResult res = cipher->setCipherSpecUint8Array(cipher, item, *pSource); JsSetCipherSpec() local 885 HcfResult res = cipher->getCipherSpecString(cipher, item, &returnString); GetCipherSpecString() local 901 HcfResult res = cipher->getCipherSpecUint8Array(cipher, item, &blob); GetCipherSpecUint8Array() local [all...] |
/base/customization/enterprise_device_management/test/unittest/services/edm_plugin/src/ |
H A D | manage_auto_start_apps_plugin_test.cpp | 142 std::vector<std::string> res; in HWTEST_F() local 145 getReply.ReadStringVector(&res); in HWTEST_F() 146 ASSERT_TRUE(res.size() >= 1); in HWTEST_F() 147 ASSERT_TRUE(std::find(res.begin(), res.end(), RIGHT_TEST_BUNDLE) != res.end()); in HWTEST_F()
|
H A D | bundle_install_plugin_test.cpp | 202 ErrCode res = plugin.OnSetPolicy(data, currentData, DEFAULT_USER_ID); in HWTEST_F() local 203 ASSERT_TRUE(res == ERR_OK); in HWTEST_F() 209 res = appControlProxy->GetAppInstallControlRule(static_cast<AppExecFwk::AppInstallControlRuleType>(policyType), in HWTEST_F() 211 ASSERT_TRUE(res == ERR_OK); in HWTEST_F() 221 res = appControlProxy->GetAppInstallControlRule(static_cast<AppExecFwk::AppInstallControlRuleType>(policyType), in HWTEST_F() 223 ASSERT_TRUE(res == ERR_OK); in HWTEST_F()
|
/base/request/request/services/src/manage/ |
H A D | account.rs | 103 let res = GetForegroundOsAccount(&mut foreground_account); 104 if res == 0 { 107 error!("GetForegroundOsAccount failed: {} retry {} times", res, i); 118 let res = GetBackgroundOsAccounts(&mut accounts); 119 if res == 0 { 122 error!("GetBackgroundOsAccounts failed: {} retry {} times", res, i);
|
/base/security/device_auth/services/identity_manager/src/ |
H A D | identity_pin.c | 67 int32_t res = SetDlSpekeProtocol(info); in SetLiteProtocols() local 68 if (res != HC_SUCCESS) { in SetLiteProtocols() 69 return res; in SetLiteProtocols() 82 int32_t res = HC_SUCCESS; in SetLiteProtocolsForPinType() 85 res = SetLiteProtocols(info); in SetLiteProtocolsForPinType() 87 return res; in SetLiteProtocolsForPinType()
|
/base/web/webview/sa/src/ |
H A D | app_fwk_update_service.cpp | 222 WVLOG_I("SendNWebSpawnMesage res = %{public}d.", ret); in SendNWebSpawnMesage() 228 int res = OHOS::system::SetParameter("persist.arkwebcore.install_path", path); in SetWebInstallPath() local 229 WVLOG_I("SetWebInstallPath res = %{public}d.", res); in SetWebInstallPath() 230 return res; in SetWebInstallPath() 234 int res = OHOS::system::SetParameter("persist.arkwebcore.package_name", packageName); in SetWebCorePackageName() local 235 WVLOG_I("SetWebCorePackageName res = %{public}d.", res); in SetWebCorePackageName() 236 return res; in SetWebCorePackageName()
|
/base/notification/distributed_notification_service/services/ans/include/ |
H A D | string_utils.h | 29 static void Split(const std::string &str, const std::string &splitFlag, std::vector<std::string> &res);
|
/base/security/crypto_framework/plugin/openssl_plugin/key/asy_key_generator/src/ |
H A D | rsa_asy_key_generator_openssl.c | 902 HcfResult res = CheckRsaKeyGenParams(params); in GenerateKeyPair() local 903 if (res != HCF_SUCCESS) { in GenerateKeyPair() 933 res = PackKeyPair(rsa, params->bits, &keyPairImpl); in GenerateKeyPair() 934 if (res != HCF_SUCCESS) { in GenerateKeyPair() 937 return res; in GenerateKeyPair() 942 return res; in GenerateKeyPair() 1286 HcfResult res = PackPubKey(pubKeyRsa, &pubKeyImpl); in GenerateKeyPairBySpec() local 1287 if (res != HCF_SUCCESS) { in GenerateKeyPairBySpec() 1292 return res; in GenerateKeyPairBySpec() 1295 res in GenerateKeyPairBySpec() 1327 HcfResult res = PackPubKey(pubKeyRsa, &pubKeyImpl); GeneratePubKeyBySpec() local 1348 HcfResult res = PackPriKey(rsa, &priKeyImpl); GeneratePriKeyBySpec() local [all...] |
/base/security/device_auth/services/legacy/group_manager/src/group_operation/group_operation_common/ |
H A D | group_operation_common.c | 53 int32_t res = ExcuteCredMgrCmd(0, CHECK_UPGRADE_IDENTITY, upgradeJson, NULL); in CheckUpgradeIdentity() local 55 if (res != HC_SUCCESS) { in CheckUpgradeIdentity() 57 return res; in CheckUpgradeIdentity() 60 return res; in CheckUpgradeIdentity() 134 int32_t res = ExcuteCredMgrCmd(UPGRADE_OS_ACCOUNT_ID, CHECK_UPGRADE_DATA, upgradeJson, NULL); in CheckAndRemoveUpgradeGroupEntry() local 136 if (res == HC_SUCCESS) { in CheckAndRemoveUpgradeGroupEntry() 231 int32_t res = HcGetUdid((uint8_t *)localUdid, INPUT_UDID_LEN); in IsLocalDevice() local 232 if (res != HC_SUCCESS) { in IsLocalDevice() 233 LOGE("Failed to get local udid! res: %d", res); in IsLocalDevice() 634 int32_t res = HcGetUdid((uint8_t *)udid, INPUT_UDID_LEN); AddSelfUdidToParams() local 666 int32_t res = HcGetUdid((uint8_t *)udid, INPUT_UDID_LEN); AddAuthIdToParamsOrDefault() local 779 int32_t res = HcGetUdid((uint8_t *)udid, INPUT_UDID_LEN); AssertPeerDeviceNotSelf() local 1008 int32_t res = HcGetUdid((uint8_t *)udid, INPUT_UDID_LEN); ProcessKeyPair() local [all...] |
/base/hiviewdfx/hiview/adapter/plugins/eventservice/service/idl/src/ |
H A D | data_publisher_sys_event_callback.cpp | 70 auto res = OHOS::HiviewDFX::DataShareUtil::CopyFile(srcPath.c_str(), desPath.c_str()); in HandleEventFile() local 71 if (res == -1) { in HandleEventFile()
|
/base/inputmethod/imf/test/fuzztest/systemabilitystubfuzztest/common/ |
H A D | imf_sa_stub_fuzz_util.cpp | 49 int res = SetSelfTokenID(tokenId); in GrantNativePermission() local 50 if (res == 0) { in GrantNativePermission()
|
/base/print/print_fwk/services/print_service/src/ |
H A D | print_security_guard_manager.cpp | 59 int res = OHOS::Security::SecurityGuard::NativeDataCollectKit::ReportSecurityInfo(eventInfo); in ReportSecurityInfo() local 60 PRINT_HILOGI("end to push data to security_guard service status:%{public}d", res); in ReportSecurityInfo()
|
/base/notification/common_event_service/services/test/unittest/ |
H A D | mock_common_event_subscriber.cpp | 88 std::shared_ptr<AsyncCommonEventResult> res = result_; in GoAsyncCommonEvent() local 90 return res; in GoAsyncCommonEvent()
|
/base/notification/common_event_service/frameworks/native/src/ |
H A D | common_event_subscriber.cpp | 124 std::shared_ptr<AsyncCommonEventResult> res = result_; in GoAsyncCommonEvent() local 126 return res; in GoAsyncCommonEvent()
|
/base/notification/distributed_notification_service/frameworks/ans/test/unittest/ |
H A D | notification_unified_group_info_test.cpp | 57 std::string res = "NotificationUnifiedGroupInfo{ key = testKey, title = testtitle, " in HWTEST_F() local 59 EXPECT_EQ(info.Dump(), res); in HWTEST_F()
|
/base/security/access_token/services/accesstokenmanager/main/cpp/src/permission/ |
H A D | dlp_permission_set_manager.cpp | 86 bool res = IsPermDlpModeAvailableToDlpHap(hapDlpType, permissionDlpMode); in UpdatePermStateWithDlpInfo() local 87 if (!res) { in UpdatePermStateWithDlpInfo()
|
/base/request/request/services/src/manage/scheduler/queue/ |
H A D | running_task.rs | 72 Some(res) => match res { in drop()
|
/base/security/access_token/interfaces/innerkits/token_callback/src/ |
H A D | token_callback_stub.cpp | 69 int32_t res = data.ReadInt32(); in OnRemoteRequest() local 70 grantResults.emplace_back(res); in OnRemoteRequest()
|
/base/security/access_token/test/fuzztest/innerkits/accesstoken/inithaptoken_fuzzer/ |
H A D | inithaptoken_fuzzer.cpp | 77 int32_t res = AccessTokenKit::InitHapToken(TestInfoParms, TestPolicyPrams, tokenIdEx); in InitHapTokenFuzzTest() local 80 return res == 0; in InitHapTokenFuzzTest()
|
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/key_agreement/src/ |
H A D | x25519_openssl.c | 75 HcfResult res = KeyDerive(priPKey, pubPKey, returnSecret); in EngineGenerateSecret() local 78 return res; in EngineGenerateSecret()
|