/ohos5.0/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/ |
H A D | hks_crypto_hal_rsa_sign.cpp | 62 .signResult = HKS_SUCCESS, 63 .verifyResult = HKS_SUCCESS, 82 .signResult = HKS_SUCCESS, 83 .verifyResult = HKS_SUCCESS, 102 .signResult = HKS_SUCCESS, 122 .signResult = HKS_SUCCESS, 142 .signResult = HKS_SUCCESS, 162 .signResult = HKS_SUCCESS, 182 .signResult = HKS_SUCCESS, 202 .signResult = HKS_SUCCESS, [all …]
|
H A D | hks_crypto_hal_rsa_cipher.cpp | 62 .encryptResult = HKS_SUCCESS, 63 .decryptResult = HKS_SUCCESS, 90 .encryptResult = HKS_SUCCESS, 91 .decryptResult = HKS_SUCCESS, 118 .encryptResult = HKS_SUCCESS, 119 .decryptResult = HKS_SUCCESS, 150 .encryptResult = HKS_SUCCESS, 151 .decryptResult = HKS_SUCCESS, 183 .encryptResult = HKS_SUCCESS, 184 .decryptResult = HKS_SUCCESS, [all …]
|
H A D | hks_crypto_hal_ecdsa_sign.cpp | 62 .signResult = HKS_SUCCESS, 63 .verifyResult = HKS_SUCCESS, 82 .signResult = HKS_SUCCESS, 83 .verifyResult = HKS_SUCCESS, 101 .signResult = HKS_SUCCESS, 120 .signResult = HKS_SUCCESS, 140 .signResult = HKS_SUCCESS, 159 .signResult = HKS_SUCCESS, 178 .signResult = HKS_SUCCESS, 197 .signResult = HKS_SUCCESS, [all …]
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/asymmetric_alg_test/ |
H A D | hks_dh_agree_test.cpp | 331 EXPECT_EQ(ret, HKS_SUCCESS) << "Init failed."; in HksDhAgreeFinish() 332 if (ret != HKS_SUCCESS) { in HksDhAgreeFinish() 340 if (ret != HKS_SUCCESS) { in HksDhAgreeFinish() 353 EXPECT_EQ(ret, HKS_SUCCESS) << "Init failed."; in HksDhAgreeAbort() 354 if (ret != HKS_SUCCESS) { in HksDhAgreeAbort() 362 if (ret != HKS_SUCCESS) { in HksDhAgreeAbort() 368 if (ret != HKS_SUCCESS) { in HksDhAgreeAbort() 371 return HKS_SUCCESS; in HksDhAgreeAbort() 380 if (ret != HKS_SUCCESS) { in HksDhAgreeExport() 385 if (ret != HKS_SUCCESS) { in HksDhAgreeExport() [all …]
|
H A D | hks_ed25519_sign_verify_test.cpp | 69 EXPECT_EQ(ret, HKS_SUCCESS) << "Init failed."; in HksTestSignVerify() 70 if (ret != HKS_SUCCESS) { in HksTestSignVerify() 75 if (ret != HKS_SUCCESS) { in HksTestSignVerify() 82 if (ret != HKS_SUCCESS) { in HksTestSignVerify() 124 EXPECT_EQ(ret, HKS_SUCCESS) << "Sign failed."; in HksEd25519SignVerifyTestNormalCase() 140 EXPECT_EQ(ret, HKS_SUCCESS) << "Verify failed."; in HksEd25519SignVerifyTestNormalCase() 181 EXPECT_EQ(ret, HKS_SUCCESS) << "Sign failed."; 239 EXPECT_EQ(ret, HKS_SUCCESS) << "Init failed."; 266 EXPECT_EQ(ret, HKS_SUCCESS) << "Init failed."; 272 EXPECT_EQ(ret, HKS_SUCCESS) << "Abort failed."; [all …]
|
H A D | hks_sm2_cipher_test.cpp | 60 HKS_SUCCESS, 159 HKS_SUCCESS, 279 HKS_SUCCESS, 366 if (ret != HKS_SUCCESS) { in HksSm2CipherTestEncrypt() 371 if (ret != HKS_SUCCESS) { in HksSm2CipherTestEncrypt() 384 return HKS_SUCCESS; in HksSm2CipherTestEncrypt() 411 return HKS_SUCCESS; in HksSm2CipherTestDecrypt() 644 ret = ((param.gen.result != HKS_SUCCESS) ? HKS_SUCCESS : ret); in HksSm2CipherTestRunByNdk() 653 ret = ((param.encrypt.result != HKS_SUCCESS) ? HKS_SUCCESS : ret); in HksSm2CipherTestRunByNdk() 663 ret = ((param.encrypt.result != HKS_SUCCESS) ? HKS_SUCCESS : ret); in HksSm2CipherTestRunByNdk() [all …]
|
H A D | hks_rsa_cipher_test_common.cpp | 28 if (ret != HKS_SUCCESS) { in HksRsaCipherTestEncryptAbnormal() 34 if (ret != HKS_SUCCESS) { in HksRsaCipherTestEncryptAbnormal() 45 if (ret != HKS_SUCCESS) { in HksRsaCipherTestEncryptAbnormal() 50 return HKS_SUCCESS; in HksRsaCipherTestEncryptAbnormal() 60 if (ret != HKS_SUCCESS) { in HksRsaCipherTestEncrypt() 66 if (ret != HKS_SUCCESS) { in HksRsaCipherTestEncrypt() 75 if (ret != HKS_SUCCESS) { in HksRsaCipherTestEncrypt() 79 return HKS_SUCCESS; in HksRsaCipherTestEncrypt() 90 if (ret != HKS_SUCCESS) { in HksRsaCipherTestDecrypt() 96 if (ret != HKS_SUCCESS) { in HksRsaCipherTestDecrypt() [all …]
|
H A D | hks_ecdh_agree_part2_test.cpp | 336 EXPECT_EQ(ret, HKS_SUCCESS) << "GenerateKey01 failed."; 338 EXPECT_EQ(ret, HKS_SUCCESS) << "GenerateKey02 failed."; 345 EXPECT_EQ(ret, HKS_SUCCESS) << "ExportKey failed."; 354 EXPECT_EQ(ret, HKS_SUCCESS) << "HksAgreeKey02 failed."; 389 EXPECT_EQ(ret, HKS_SUCCESS) << "GenerateKey01 failed."; 391 EXPECT_EQ(ret, HKS_SUCCESS) << "GenerateKey02 failed."; 398 EXPECT_EQ(ret, HKS_SUCCESS) << "ExportKey failed."; 407 EXPECT_EQ(ret, HKS_SUCCESS) << "HksAgreeKey02 failed."; 442 EXPECT_EQ(ret, HKS_SUCCESS) << "GenerateKey01 failed."; 451 EXPECT_EQ(ret, HKS_SUCCESS) << "ExportKey failed."; [all …]
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/ |
H A D | hks_change_storage_level_test.cpp | 138 if (ret != HKS_SUCCESS) { in SetIdsToken() 202 return HKS_SUCCESS; in HksTestUpdateLoopFinish() 212 if (ret != HKS_SUCCESS) { in HksAesCipherTestEncrypt() 218 if (ret != HKS_SUCCESS) { in HksAesCipherTestEncrypt() 223 return HKS_SUCCESS; in HksAesCipherTestEncrypt() 233 if (ret != HKS_SUCCESS) { in HksAesCipherTestDecrypt() 239 if (ret != HKS_SUCCESS) { in HksAesCipherTestDecrypt() 244 return HKS_SUCCESS; in HksAesCipherTestDecrypt() 259 EXPECT_EQ(ret, HKS_SUCCESS); 324 EXPECT_EQ(ret, HKS_SUCCESS); [all …]
|
H A D | hks_cross_test.cpp | 85 EXPECT_EQ(ret, HKS_SUCCESS) << "HksEncrypt failed."; 132 EXPECT_EQ(ret, HKS_SUCCESS) << "HksDecrypt failed."; 175 EXPECT_EQ(ret, HKS_SUCCESS) << "HksEncrypt failed."; 227 EXPECT_EQ(ret, HKS_SUCCESS) << "HksDecrypt failed."; 271 EXPECT_EQ(ret, HKS_SUCCESS) << "HksSign failed."; 318 EXPECT_EQ(ret, HKS_SUCCESS) << "HksVerify failed."; 362 EXPECT_EQ(ret, HKS_SUCCESS) << "HksSign failed."; 410 EXPECT_EQ(ret, HKS_SUCCESS) << "HksVerify failed."; 451 EXPECT_EQ(ret, HKS_SUCCESS) << "HksSign failed."; 498 EXPECT_EQ(ret, HKS_SUCCESS) << "HksVerify failed."; [all …]
|
H A D | hks_access_control_rsa_sign_verify_test_common.cpp | 47 if (ret != HKS_SUCCESS) { in RSAAuthTokenSign() 56 if (ret != HKS_SUCCESS) { in RSAAuthTokenSign() 68 return HKS_SUCCESS; in RSAAuthTokenSign() 74 if (ret != HKS_SUCCESS) { in AddAuthTokenParam() 79 if (ret != HKS_SUCCESS) { in AddAuthTokenParam() 83 return HKS_SUCCESS; in AddAuthTokenParam() 159 if (ret != HKS_SUCCESS) { in HksAcRsaThreeStageNormalCase() 168 if (ret != HKS_SUCCESS) { in HksAcRsaThreeStageNormalCase() 483 return HKS_SUCCESS; in HksAcRsaSignVerifyTestNormalCase() 571 return HKS_SUCCESS; in HksAcRsaSignVerifyTestAbnormalCase() [all …]
|
H A D | hks_x25519_agree_test.cpp | 307 if (ret != HKS_SUCCESS) { in HksX25519AgreeFinish() 315 if (ret != HKS_SUCCESS) { in HksX25519AgreeFinish() 321 if (ret != HKS_SUCCESS) { in HksX25519AgreeFinish() 324 return HKS_SUCCESS; in HksX25519AgreeFinish() 334 if (ret != HKS_SUCCESS) { in HksX25519AgreeAbort() 342 if (ret != HKS_SUCCESS) { in HksX25519AgreeAbort() 348 if (ret != HKS_SUCCESS) { in HksX25519AgreeAbort() 351 return HKS_SUCCESS; in HksX25519AgreeAbort() 359 if (ret != HKS_SUCCESS) { in HksX25519AgreeExport() 364 if (ret != HKS_SUCCESS) { in HksX25519AgreeExport() [all …]
|
H A D | hks_rename_part1_test.cpp | 73 if (ret != HKS_SUCCESS) { in TestGenerateKey() 79 if (ret != HKS_SUCCESS) { in TestGenerateKey() 86 if (ret != HKS_SUCCESS) { in TestGenerateKey() 93 if (ret != HKS_SUCCESS) { in TestGenerateKey() 103 if (ret != HKS_SUCCESS) { in BuildParamSetWithParam() 109 if (ret != HKS_SUCCESS) { in BuildParamSetWithParam() 140 if (ret != HKS_SUCCESS) { in SetIdsToken() 166 EXPECT_EQ(ret, HKS_SUCCESS); 176 EXPECT_EQ(ret, HKS_SUCCESS); 189 EXPECT_EQ(ret, HKS_SUCCESS); [all …]
|
H A D | hks_cross_test_common.cpp | 49 if (ret != HKS_SUCCESS) { in HksCrossTestAesEncrypt() 65 return HKS_SUCCESS; in HksCrossTestAesEncrypt() 91 return HKS_SUCCESS; in HksCrossTestAesDecrypt() 116 return HKS_SUCCESS; in HksCrossTestRsaEncrypt() 142 return HKS_SUCCESS; in HksCrossTestRsaDecrypt() 169 return HKS_SUCCESS; in HksCrossTestSignVerify() 209 return HKS_SUCCESS; in HksCrossTestHmac() 234 return HKS_SUCCESS; in HksCrossTestAgreeGenerate() 252 return HKS_SUCCESS; in HksCrossTestAgreeExport() 300 return HKS_SUCCESS; in HksCrossTestAgree() [all …]
|
H A D | hks_sm4_cipher_test_common.cpp | 30 EXPECT_EQ(ret, HKS_SUCCESS) << "Init failed."; in HksSm4CipherTestEncrypt() 31 if (ret != HKS_SUCCESS) { in HksSm4CipherTestEncrypt() 37 if (ret != HKS_SUCCESS) { in HksSm4CipherTestEncrypt() 42 return HKS_SUCCESS; in HksSm4CipherTestEncrypt() 53 if (ret != HKS_SUCCESS) { in HksSm4CipherTestDecrypt() 59 if (ret != HKS_SUCCESS) { in HksSm4CipherTestDecrypt() 64 return HKS_SUCCESS; in HksSm4CipherTestDecrypt() 84 if (ret != HKS_SUCCESS) { in HksSm4CipherTestCaseOther() 118 if (ret != HKS_SUCCESS) { in HksSm4CipherTestCaseGcm() 135 if (ret != HKS_SUCCESS) { in HksSm4CipherTestCaseGcm() [all …]
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/ |
H A D | hks_ecc_sign_mt.cpp | 61 .signResult = HKS_SUCCESS, 62 .verifyResult = HKS_SUCCESS, 77 .signResult = HKS_SUCCESS, 78 .verifyResult = HKS_SUCCESS, 93 .signResult = HKS_SUCCESS, 109 .signResult = HKS_SUCCESS, 125 .signResult = HKS_SUCCESS, 141 .signResult = HKS_SUCCESS, 158 .signResult = HKS_SUCCESS, 174 .signResult = HKS_SUCCESS, [all …]
|
H A D | hks_ecc_verify_mt.cpp | 59 .signResult = HKS_SUCCESS, 60 .verifyResult = HKS_SUCCESS, 75 .signResult = HKS_SUCCESS, 76 .verifyResult = HKS_SUCCESS, 91 .signResult = HKS_SUCCESS, 107 .signResult = HKS_SUCCESS, 123 .signResult = HKS_SUCCESS, 139 .signResult = HKS_SUCCESS, 156 .signResult = HKS_SUCCESS, 173 .signResult = HKS_SUCCESS, [all …]
|
H A D | hks_rsa_ecb_nopadding_mt.cpp | 59 .encryptResult = HKS_SUCCESS, 60 .decryptResult = HKS_SUCCESS, 80 .encryptResult = HKS_SUCCESS, 81 .decryptResult = HKS_SUCCESS, 103 .encryptResult = HKS_SUCCESS, 104 .decryptResult = HKS_SUCCESS, 128 .encryptResult = HKS_SUCCESS, 129 .decryptResult = HKS_SUCCESS, 152 .encryptResult = HKS_SUCCESS, 153 .decryptResult = HKS_SUCCESS, [all …]
|
H A D | hks_ecc_key_mt.cpp | 57 .signResult = HKS_SUCCESS, 58 .verifyResult = HKS_SUCCESS, 73 .signResult = HKS_SUCCESS, 74 .verifyResult = HKS_SUCCESS, 89 .signResult = HKS_SUCCESS, 105 .signResult = HKS_SUCCESS, 121 .signResult = HKS_SUCCESS, 137 .signResult = HKS_SUCCESS, 154 .signResult = HKS_SUCCESS, 171 .signResult = HKS_SUCCESS, [all …]
|
H A D | hks_rsa_ecb_oaep_padding_mt.cpp | 58 .encryptResult = HKS_SUCCESS, 59 .decryptResult = HKS_SUCCESS, 79 .encryptResult = HKS_SUCCESS, 80 .decryptResult = HKS_SUCCESS, 100 .encryptResult = HKS_SUCCESS, 101 .decryptResult = HKS_SUCCESS, 121 .encryptResult = HKS_SUCCESS, 122 .decryptResult = HKS_SUCCESS, 142 .encryptResult = HKS_SUCCESS, 143 .decryptResult = HKS_SUCCESS, [all …]
|
H A D | hks_rsa_ecb_oaep_sha1_mt.cpp | 51 .encryptResult = HKS_SUCCESS, 52 .decryptResult = HKS_SUCCESS, 72 .encryptResult = HKS_SUCCESS, 73 .decryptResult = HKS_SUCCESS, 93 .encryptResult = HKS_SUCCESS, 94 .decryptResult = HKS_SUCCESS, 115 .encryptResult = HKS_SUCCESS, 116 .decryptResult = HKS_SUCCESS, 136 .encryptResult = HKS_SUCCESS, 137 .decryptResult = HKS_SUCCESS, [all …]
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/symmetric_alg_test/ |
H A D | hks_aes_cipher_test_common.cpp | 36 if (ret != HKS_SUCCESS) { in HksAesCipherTestEncrypt() 42 if (ret != HKS_SUCCESS) { in HksAesCipherTestEncrypt() 51 if (ret != HKS_SUCCESS) { in HksAesCipherTestEncrypt() 56 return HKS_SUCCESS; in HksAesCipherTestEncrypt() 69 if (ret != HKS_SUCCESS) { in HksAesCipherTestEncryptWithoutNonce() 91 if (ret != HKS_SUCCESS) { in HksAesCipherTestEncryptWithoutNonce() 96 return HKS_SUCCESS; in HksAesCipherTestEncryptWithoutNonce() 107 if (ret != HKS_SUCCESS) { in HksAesCipherTestDecrypt() 113 if (ret != HKS_SUCCESS) { in HksAesCipherTestDecrypt() 122 if (ret != HKS_SUCCESS) { in HksAesCipherTestDecrypt() [all …]
|
H A D | hks_aes_cipher_ccm_test.cpp | 422 return HKS_SUCCESS; in HksAesSetNonceLen() 437 return HKS_SUCCESS; in HksAesSetAadLen() 600 if (ret != HKS_SUCCESS) { in TestAesCcmUpdateLoopFinish() 605 return HKS_SUCCESS; in TestAesCcmUpdateLoopFinish() 614 if (ret != HKS_SUCCESS) { in HksAesCcmCipherTestEncrypt() 620 if (ret != HKS_SUCCESS) { in HksAesCcmCipherTestEncrypt() 631 return HKS_SUCCESS; in HksAesCcmCipherTestEncrypt() 643 if (ret != HKS_SUCCESS) { in HksAesCcmCipherTestDecrypt() 652 if (ret != HKS_SUCCESS) { in HksAesCcmCipherTestDecrypt() 658 if (ret != HKS_SUCCESS) { in HksAesCcmCipherTestDecrypt() [all …]
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/include/ |
H A D | hks_rsa_common_mt.h | 41 HksErrorCode encryptResult = HksErrorCode::HKS_SUCCESS; 42 HksErrorCode decryptResult = HksErrorCode::HKS_SUCCESS; 52 HksErrorCode encryptResult = HksErrorCode::HKS_SUCCESS; 53 HksErrorCode decryptResult = HksErrorCode::HKS_SUCCESS; 65 HksErrorCode encryptResult = HksErrorCode::HKS_SUCCESS; 66 HksErrorCode decryptResult = HksErrorCode::HKS_SUCCESS; 98 HksErrorCode signResult = HksErrorCode::HKS_SUCCESS; 99 HksErrorCode verifyResult = HksErrorCode::HKS_SUCCESS; 109 HksErrorCode signResult = HksErrorCode::HKS_SUCCESS; 119 HksErrorCode signResult = HksErrorCode::HKS_SUCCESS; [all …]
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/module_test/mock/ipc/src/ |
H A D | huks_access_test.cpp | 65 EXPECT_NE(ret, HKS_SUCCESS); 78 EXPECT_NE(ret, HKS_SUCCESS); 91 EXPECT_NE(ret, HKS_SUCCESS); 104 EXPECT_NE(ret, HKS_SUCCESS); 117 EXPECT_NE(ret, HKS_SUCCESS); 130 EXPECT_NE(ret, HKS_SUCCESS); 143 EXPECT_NE(ret, HKS_SUCCESS); 156 EXPECT_NE(ret, HKS_SUCCESS); 169 EXPECT_NE(ret, HKS_SUCCESS); 182 EXPECT_NE(ret, HKS_SUCCESS); [all …]
|