/ohos5.0/base/security/huks/services/huks_standard/huks_service/main/hks_storage/src/ |
H A D | hks_storage_lite.c | 163 return HKS_ERROR_INVALID_KEY_FILE; in FreshImageBuffer() 174 return HKS_ERROR_INVALID_KEY_FILE; in FreshImageBuffer() 210 return HKS_ERROR_INVALID_KEY_FILE; in CheckKeyInfoHeaderValid() 341 return HKS_ERROR_INVALID_KEY_FILE; in GetKeyOffsetByKeyAlias() 353 return HKS_ERROR_INVALID_KEY_FILE; in GetKeyOffsetByKeyAlias() 425 return HKS_ERROR_INVALID_KEY_FILE; in AppendNewKey() 480 return HKS_ERROR_INVALID_KEY_FILE; in DeleteKey() 726 return HKS_ERROR_INVALID_KEY_FILE; in HksGetKeyCountByProcessName() 738 return HKS_ERROR_INVALID_KEY_FILE; in HksStoreGetToatalSize() 785 return HKS_ERROR_INVALID_KEY_FILE; in GetAndCheckKeyCount() [all …]
|
H A D | hks_storage_utils.c | 172 ret = HKS_ERROR_INVALID_KEY_FILE; /* keyfile name invalid */ in ConstructBlob()
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/common_test/src/ |
H A D | hks_base_check_test.cpp | 262 ASSERT_EQ(ret, HKS_ERROR_INVALID_KEY_FILE) << "HksGetKeySize failed, ret = " << ret; 276 ASSERT_EQ(ret, HKS_ERROR_INVALID_KEY_FILE) << "HksGetKeySize failed, ret = " << ret; 355 ASSERT_EQ(ret, HKS_ERROR_INVALID_KEY_FILE) << "HksGetKeySize failed, ret = " << ret;
|
/ohos5.0/base/security/huks/services/huks_standard/huks_service/main/upgrade/file_transfer/src/ |
H A D | hks_config_parser.c | 64 ret = HKS_ERROR_INVALID_KEY_FILE; in ParseOwnerIdFromParamSet() 90 ret = getUid && getAccessToken && getUserId ? HKS_SUCCESS : HKS_ERROR_INVALID_KEY_FILE; in ParseOwnerIdFromParamSet()
|
/ohos5.0/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/mini/ |
H A D | huks_adapter_diff_impl.c | 34 if ((res != HKS_ERROR_INVALID_KEY_FILE) && (res != HKS_ERROR_CRYPTO_ENGINE_ERROR) && in InitHks()
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/ |
H A D | hks_rsa_ecb_oaep_sha512_mt.cpp | 186 .encryptResult = HKS_ERROR_INVALID_KEY_FILE, 210 .encryptResult = HKS_ERROR_INVALID_KEY_FILE, 232 .encryptResult = HKS_ERROR_INVALID_KEY_FILE, 256 .encryptResult = HKS_ERROR_INVALID_KEY_FILE, 278 .encryptResult = HKS_ERROR_INVALID_KEY_FILE, 302 .encryptResult = HKS_ERROR_INVALID_KEY_FILE,
|
H A D | hks_rsa_ecb_oaep_sha384_mt.cpp | 186 .encryptResult = HKS_ERROR_INVALID_KEY_FILE, 210 .encryptResult = HKS_ERROR_INVALID_KEY_FILE, 232 .encryptResult = HKS_ERROR_INVALID_KEY_FILE, 256 .encryptResult = HKS_ERROR_INVALID_KEY_FILE,
|
H A D | hks_rsa_ecb_oaep_sha256_mt.cpp | 186 .encryptResult = HKS_ERROR_INVALID_KEY_FILE, 210 .encryptResult = HKS_ERROR_INVALID_KEY_FILE,
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/common/src/ |
H A D | hks_base_check.c | 795 return HKS_ERROR_INVALID_KEY_FILE; in CheckAndGetKeySize() 800 …HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_INVALID_KEY_FILE, "check key size: paramset invalid fai… in CheckAndGetKeySize() 804 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_INVALID_KEY_FILE, in CheckAndGetKeySize() 808 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_INVALID_KEY_FILE, in CheckAndGetKeySize() 819 return HKS_ERROR_INVALID_KEY_FILE; in CheckAndGetKeySize() 825 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_INVALID_KEY_FILE, in CheckAndGetKeySize() 1213 return HKS_ERROR_INVALID_KEY_FILE; in CheckRsaOaepCipherData() 1544 return HKS_ERROR_INVALID_KEY_FILE; in HksGetDsaKeySize() 1549 …HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_INVALID_KEY_FILE, "check dsa key size: paramset invalid… in HksGetDsaKeySize() 1553 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_INVALID_KEY_FILE, in HksGetDsaKeySize()
|
H A D | hks_errcode_adapter.c | 440 .innerErrCode = HKS_ERROR_INVALID_KEY_FILE,
|
/ohos5.0/base/security/huks/services/huks_standard/huks_service/main/systemapi_wrap/at_wrapper/src/ |
H A D | hks_at_api_wrap.cpp | 85 return HKS_ERROR_INVALID_KEY_FILE; in HksGetAtType()
|
/ohos5.0/base/security/huks/interfaces/inner_api/huks_lite/ |
H A D | hks_errno.h | 88 #define HKS_ERROR_INVALID_KEY_FILE ((int32_t)-1015) macro
|
/ohos5.0/base/security/huks/test/unittest/huks_common_test/src/ |
H A D | hks_test_file_operator_func.c | 112 return HKS_ERROR_INVALID_KEY_FILE; in FileWrite()
|
/ohos5.0/base/security/huks/services/huks_standard/huks_service/main/core/src/ |
H A D | hks_client_service_util.c | 95 return HKS_ERROR_INVALID_KEY_FILE; in GetKeyFileData()
|
H A D | hks_upgrade_helper.c | 119 return HKS_ERROR_INVALID_KEY_FILE; in HksDeleteOldKeyForSmallToService()
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/rkc/src/ |
H A D | hks_rkc_rw.c | 253 return HKS_ERROR_INVALID_KEY_FILE; in RkcExtractKsfHash() 272 return HKS_ERROR_INVALID_KEY_FILE; in RkcExtractKsfHash() 469 return HKS_ERROR_INVALID_KEY_FILE; in RkcFillKsfHash()
|
H A D | hks_rkc.c | 80 return HKS_ERROR_INVALID_KEY_FILE; in ReadAllKsfRkc() 111 return HKS_ERROR_INVALID_KEY_FILE; in ReadAllKsfMk()
|
H A D | hks_rkc_v1.c | 86 return HKS_ERROR_INVALID_KEY_FILE; in RkcReadAllKsfV1()
|
/ohos5.0/base/security/huks/interfaces/inner_api/huks_standard/main/include/ |
H A D | hks_type_enum.h | 301 HKS_ERROR_INVALID_KEY_FILE = -27, enumerator
|
/ohos5.0/base/security/huks/utils/file_operator/ |
H A D | hks_file_operator.c | 159 return HKS_ERROR_INVALID_KEY_FILE; in GetRealPath()
|
/ohos5.0/base/security/huks/services/huks_standard/huks_engine/main/core/src/ |
H A D | hks_keyblob_lite.c | 209 return HKS_ERROR_INVALID_KEY_FILE; in Ed25519BlobToKeyMaterial()
|
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/test/unittest/ |
H A D | hichain_receivedata_test.cpp | 72 HKS_ERROR_INVALID_KEY_FILE = -27, enumerator
|
/ohos5.0/base/security/huks/interfaces/kits/napi/src/ |
H A D | huks_napi.cpp | 386 AddInt32Property(env, errorCode, "HUKS_ERROR_INVALID_KEY_FILE", HKS_ERROR_INVALID_KEY_FILE); in AddHuksErrorCodePart1()
|
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/test/unittest/unittest_mock/ |
H A D | huks_adapter_mock.c | 1522 if ((ret != HKS_ERROR_INVALID_KEY_FILE) && (ret != HKS_ERROR_CRYPTO_ENGINE_ERROR) && in key_info_init()
|
H A D | huks_adapter_mock_for_pake.c | 1592 if ((ret != HKS_ERROR_INVALID_KEY_FILE) && (ret != HKS_ERROR_CRYPTO_ENGINE_ERROR) && in key_info_init()
|