Home
last modified time | relevance | path

Searched refs:res (Results 1 – 25 of 341) sorted by relevance

12345678910>>...14

/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/
Dpake_v1_client_protocol_task.c50 int res = ConstructOutJson(params, out); in PakeRequest() local
51 if (res != HC_SUCCESS) { in PakeRequest()
52 LOGE("ConstructOutJson failed, res: %d.", res); in PakeRequest()
53 return res; in PakeRequest()
60 res = PackagePakeRequestData(params, payload); in PakeRequest()
61 if (res != HC_SUCCESS) { in PakeRequest()
62 LOGE("PackagePakeRequestData failed, res: %d.", res); in PakeRequest()
63 return res; in PakeRequest()
67 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.idSelf.val, in PakeRequest()
69 if (res != HC_SUCCESS) { in PakeRequest()
[all …]
Dpake_v1_server_protocol_task.c43 int res = ConstructOutJson(params, out); in PackageMsgForResponse() local
44 if (res != HC_SUCCESS) { in PackageMsgForResponse()
45 LOGE("ConstructOutJson failed, res: %d.", res); in PackageMsgForResponse()
46 return res; in PackageMsgForResponse()
53 res = PackagePakeResponseData(params, payload); in PackageMsgForResponse()
54 if (res != HC_SUCCESS) { in PackageMsgForResponse()
55 LOGE("PackagePakeResponseData failed, res: %d.", res); in PackageMsgForResponse()
56 return res; in PackageMsgForResponse()
59 res = AddByteToJson(payload, FIELD_CHALLENGE, params->baseParams.challengeSelf.val, in PackageMsgForResponse()
61 if (res != HC_SUCCESS) { in PackageMsgForResponse()
[all …]
Dpake_v1_protocol_task_common.c58 int32_t res = GetIntFromJson(in, FIELD_KEY_LENGTH, (int *)&(params->returnKey.length)); in AllocReturnKey() local
59 if (res != HC_SUCCESS) { in AllocReturnKey()
60 LOGD("Get key length failed, use default, res: %d", res); in AllocReturnKey()
67 res = InitSingleParam(&params->returnKey, params->returnKey.length); in AllocReturnKey()
68 if (res != HC_SUCCESS) { in AllocReturnKey()
69 LOGE("InitSingleParam for returnKey failed, res: %d.", res); in AllocReturnKey()
71 return res; in AllocReturnKey()
76 int32_t res = InitPakeV1BaseParams(&(params->baseParams)); in InitDasPakeV1Params() local
77 if (res != HC_SUCCESS) { in InitDasPakeV1Params()
78 LOGE("InitPakeV1BaseParams failed, res: %d.", res); in InitDasPakeV1Params()
[all …]
/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/
Dpake_message_util.c73 int32_t res = GetAndCheckKeyLenOnServer(in, &(params->returnKey.length)); in ParsePakeRequestMessage() local
74 if (res != HC_SUCCESS) { in ParsePakeRequestMessage()
75 LOGE("GetAndCheckKeyLenOnServer failed, res: %d.", res); in ParsePakeRequestMessage()
76 return res; in ParsePakeRequestMessage()
85 …int32_t res = AddByteToJson(payload, FIELD_SALT, params->baseParams.salt.val, params->baseParams.s… in PackagePakeResponseData() local
86 if (res != HC_SUCCESS) { in PackagePakeResponseData()
87 LOGE("Add salt failed, res: %d.", res); in PackagePakeResponseData()
88 return res; in PackagePakeResponseData()
90res = AddByteToJson(payload, FIELD_EPK, params->baseParams.epkSelf.val, params->baseParams.epkSelf… in PackagePakeResponseData()
91 if (res != HC_SUCCESS) { in PackagePakeResponseData()
[all …]
/base/security/device_auth/test/unittest/deviceauth/source/
Dkey_agree_sdk_test.cpp73 … KeyAgreeResult res = KeyAgreeInitSession(g_session, KEYAGREE_PROTOCOL_ANY, KEYAGREE_TYPE_CLIENT); variable
74 EXPECT_EQ(res, KEYAGREE_SUCCESS);
80 …KeyAgreeResult res = KeyAgreeInitSession(g_session_s, KEYAGREE_PROTOCOL_ANY, KEYAGREE_TYPE_SERVER); variable
81 EXPECT_EQ(res, KEYAGREE_SUCCESS);
87 …KeyAgreeResult res = KeyAgreeInitSession(g_session, KEYAGREE_PROTOCOL_DL_SPEKE_256, KEYAGREE_TYPE_… variable
88 EXPECT_EQ(res, KEYAGREE_SUCCESS);
94 …KeyAgreeResult res = KeyAgreeInitSession(g_session, KEYAGREE_PROTOCOL_DL_SPEKE_384, KEYAGREE_TYPE_… variable
95 EXPECT_EQ(res, KEYAGREE_SUCCESS);
101 …KeyAgreeResult res = KeyAgreeInitSession(g_session, KEYAGREE_PROTOCOL_EC_SPEKE_P256, KEYAGREE_TYPE… variable
102 EXPECT_EQ(res, KEYAGREE_SUCCESS);
[all …]
/base/security/crypto_framework/test/unittest/src/
Dcrypto_ecc_sign_test.cpp59 int32_t res = HcfAsyKeyGeneratorCreate("ECC224", &generator); in SetUpTestCase() local
60 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase()
64 res = generator->generateKeyPair(generator, NULL, &keyPair); in SetUpTestCase()
65 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase()
73 res = HcfAsyKeyGeneratorCreate("ECC256", &generator2); in SetUpTestCase()
74 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase()
78 res = generator2->generateKeyPair(generator2, NULL, &keyPair2); in SetUpTestCase()
79 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase()
87 res = HcfAsyKeyGeneratorCreate("ECC384", &generator3); in SetUpTestCase()
88 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase()
[all …]
Dcrypto_ecc_verify_test.cpp59 int32_t res = HcfAsyKeyGeneratorCreate("ECC224", &generator); in SetUpTestCase() local
60 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase()
64 res = generator->generateKeyPair(generator, NULL, &keyPair); in SetUpTestCase()
65 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase()
73 res = HcfAsyKeyGeneratorCreate("ECC256", &generator2); in SetUpTestCase()
74 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase()
78 res = generator2->generateKeyPair(generator2, NULL, &keyPair2); in SetUpTestCase()
79 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase()
87 res = HcfAsyKeyGeneratorCreate("ECC384", &generator3); in SetUpTestCase()
88 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase()
[all …]
Dcrypto_rsa_verify_test.cpp45 int32_t res = HcfVerifyCreate("RSA1024|PSS|SHA256", &verify); variable
46 EXPECT_NE(res, HCF_SUCCESS);
55 int32_t res = HcfVerifyCreate("RSA1024|PSS|SHA256|MGF1_SHA256", &verify); variable
56 EXPECT_EQ(res, HCF_SUCCESS);
65 HcfResult res = HCF_SUCCESS; variable
67 res = HcfVerifyCreate("RSA1024|PSS|SHA256|MGF1_SHA256", &verify);
68 EXPECT_EQ(res, HCF_SUCCESS);
69 res = verify->init(verify, NULL, NULL);
70 EXPECT_NE(res, HCF_SUCCESS);
79 HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048|PRIMES_2", &generator); variable
[all …]
Dcrypto_rsa_sign_test.cpp44 HcfResult res = HCF_SUCCESS; variable
46 res = HcfSignCreate("RSA1024|PKCS1|MD5", &sign);
47 EXPECT_EQ(res, HCF_SUCCESS);
59 HcfResult res = HCF_SUCCESS; variable
61 res = HcfSignCreate("RSA1024|PKCS1|SHA1", &sign);
62 EXPECT_EQ(res, HCF_SUCCESS);
74 HcfResult res = HCF_SUCCESS; variable
76 res = HcfSignCreate("RSA1024|PKCS1|SHA256", &sign);
77 EXPECT_EQ(res, HCF_SUCCESS);
89 HcfResult res = HCF_SUCCESS; variable
[all …]
Dcrypto_rsa_cipher_test.cpp44 HcfResult res = HCF_SUCCESS; variable
46 res = HcfCipherCreate("RSA1024|NoPadding", &cipher);
47 EXPECT_EQ(res, HCF_SUCCESS);
62 HcfResult res = HCF_SUCCESS; variable
64 res = HcfCipherCreate("RSA1024|NoPadding", &cipher);
65 EXPECT_EQ(res, HCF_SUCCESS);
77 HcfResult res = HCF_SUCCESS; variable
79 res = HcfCipherCreate("RSA1024|NoPadding", &cipher);
80 EXPECT_EQ(res, HCF_SUCCESS);
92 HcfResult res = HCF_SUCCESS; variable
[all …]
/base/security/device_auth/services/key_agree_sdk/src/
Dkey_agree_session.c60 int32_t res = InitSingleParam(authIdPeer, authIdLen); in GetIdPeer() local
61 if (res != HC_SUCCESS) { in GetIdPeer()
62 LOGE("InitSingleParam for peer authId failed, res: %d.", res); in GetIdPeer()
63 return res; in GetIdPeer()
267 int32_t res = GetIdPeer(payload, FIELD_PEER_AUTH_ID, authIdSelf, authIdPeer); in GetAuthIdPeerFromPayload() local
268 if (res != HC_SUCCESS) { in GetAuthIdPeerFromPayload()
269 LOGE("GetIdPeer failed, res: %d.", res); in GetAuthIdPeerFromPayload()
271 return res; in GetAuthIdPeerFromPayload()
276 int32_t res = GetByteFromJson(in, FIELD_KCF_DATA, baseParams->kcfDataPeer.val, in ParsePakeServerConfirmMessage() local
278 if (res != HC_SUCCESS) { in ParsePakeServerConfirmMessage()
[all …]
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common/
Dpake_protocol_dl_common.c54 int res = params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk() local
55 if (res != HC_SUCCESS) { in GenerateEsk()
56 LOGE("GenerateRandom for eskSelf failed, res: %x.", res); in GenerateEsk()
58 return res; in GenerateEsk()
97 int32_t res; in InitDlPakeParams() local
99 res = FillDlKeysLenAccordingToEpkPeer(params); in InitDlPakeParams()
101 res = FillDlKeysLenAccordingToMod(params); in InitDlPakeParams()
103 if (res != HC_SUCCESS) { in InitDlPakeParams()
104 LOGE("FillDlKeysLen failed, res: %x.", res); in InitDlPakeParams()
105 return res; in InitDlPakeParams()
[all …]
/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/standard_exchange_task/
Dcommon_standard_unbind_exchange.c29 int32_t res; in InitStandardUnbindExchangeParams() local
34 res = HC_ERR_ALLOC_MEMORY; in InitStandardUnbindExchangeParams()
48 return res; in InitStandardUnbindExchangeParams()
76 int32_t res = HC_SUCCESS; in PackageRmvInfo() local
80 pakeParams->baseParams.idSelf.length), res); in PackageRmvInfo()
81 GOTO_ERR_AND_SET_RET(AddIntToJson(rmvInfoJson, FIELD_RMV_TYPE, pakeParams->userType), res); in PackageRmvInfo()
85 res = HC_ERR_PACKAGE_JSON_TO_STRING_FAIL; in PackageRmvInfo()
89 res = InitSingleParam(&exchangeParams->rmvInfo, strlen(rmvInfoStr)); in PackageRmvInfo()
90 if (res != HC_SUCCESS) { in PackageRmvInfo()
97 res = HC_ERR_MEMORY_COPY; in PackageRmvInfo()
[all …]
Dstandard_exchange_message_util.c27 int32_t res = HC_SUCCESS; in PackageNonceAndCipherToJson() local
32 res = HC_ERR_ALLOC_MEMORY; in PackageNonceAndCipherToJson()
37 res = HC_ERR_MEMORY_COPY; in PackageNonceAndCipherToJson()
43 res = HC_ERR_MEMORY_COPY; in PackageNonceAndCipherToJson()
46 GOTO_ERR_AND_SET_RET(AddByteToJson(data, key, exAuthInfoVal, exAuthInfoLen), res); in PackageNonceAndCipherToJson()
49 return res; in PackageNonceAndCipherToJson()
54 int32_t res = HC_SUCCESS; in ParseNonceAndCipherFromJson() local
59 res = HC_ERR_JSON_GET; in ParseNonceAndCipherFromJson()
66 res = HC_ERR_ALLOC_MEMORY; in ParseNonceAndCipherFromJson()
69 res = HexStringToByte(exAuthInfoStr, exAuthInfoVal, exAuthInfoLen); in ParseNonceAndCipherFromJson()
[all …]
Ddas_standard_token_manager.c29 int32_t res = GenerateKeyAlias(&pkgNameBuff, &serviceTypeBuff, keyType, authId, &keyAliasBuff); in RegisterLocalIdentity() local
30 if (res != HC_SUCCESS) { in RegisterLocalIdentity()
32 return res; in RegisterLocalIdentity()
35 res = loader->checkKeyExist(&keyAliasBuff); in RegisterLocalIdentity()
36 if (res == HC_SUCCESS) { in RegisterLocalIdentity()
42 res = loader->generateKeyPairWithStorage(&keyAliasBuff, PAKE_ED25519_KEY_PAIR_LEN, ED25519, in RegisterLocalIdentity()
44 if (res != HC_SUCCESS) { in RegisterLocalIdentity()
46 return res; in RegisterLocalIdentity()
60 …int32_t res = GenerateKeyAlias(&pkgNameBuff, &serviceTypeBuff, keyType, authId, &pakeKeyAliasBuff); in UnregisterLocalIdentity() local
61 if (res != HC_SUCCESS) { in UnregisterLocalIdentity()
[all …]
Dcommon_standard_bind_exchange.c27 int32_t res; in InitStandardBindExchangeParams() local
35 res = HC_ERR_ALLOC_MEMORY; in InitStandardBindExchangeParams()
42 res = HC_ERR_ALLOC_MEMORY; in InitStandardBindExchangeParams()
49 res = HC_ERR_ALLOC_MEMORY; in InitStandardBindExchangeParams()
61 return res; in InitStandardBindExchangeParams()
94 int32_t res = pakeParams->baseParams.loader->checkKeyExist(keyAlias); in PackageAuthInfo() local
95 if (res != HC_SUCCESS) { in PackageAuthInfo()
100res = pakeParams->baseParams.loader->generateKeyPairWithStorage(keyAlias, PAKE_ED25519_KEY_PAIR_LE… in PackageAuthInfo()
102 if (res != HC_SUCCESS) { in PackageAuthInfo()
104 return res; in PackageAuthInfo()
[all …]
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/
Dpake_protocol_ec_common.c34 int32_t res; in GenerateEsk() local
38 res = params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk()
39 if (res != HC_SUCCESS) { in GenerateEsk()
40 LOGE("CURVE_25519: GenerateRandom for eskSelf failed, res: %x.", res); in GenerateEsk()
41 return res; in GenerateEsk()
59 int32_t res = InitSingleParam(&(params->eskSelf), params->eskSelf.length); in InitEcPakeParams() local
60 if (res != HC_SUCCESS) { in InitEcPakeParams()
61 LOGE("InitSingleParam for eskSelf failed, res: %x.", res); in InitEcPakeParams()
62 return res; in InitEcPakeParams()
64 res = InitSingleParam(&(params->epkSelf), keyBufferLen); in InitEcPakeParams()
[all …]
/base/security/device_auth/services/authenticators/src/account_unrelated/iso_task/iso_protocol_task/
Diso_client_protocol_task.c43 int res; in IsoClientStartPackData() local
49 res = HC_ERR_JSON_CREATE; in IsoClientStartPackData()
55 res = HC_ERR_JSON_CREATE; in IsoClientStartPackData()
58 … GOTO_ERR_AND_SET_RET(AddIntToJson(sendToPeer, FIELD_AUTH_FORM, AUTH_FORM_ACCOUNT_UNRELATED), res); in IsoClientStartPackData()
61 params->baseParams.randSelf.length), res); in IsoClientStartPackData()
63 params->baseParams.authIdSelf.length), res); in IsoClientStartPackData()
64 GOTO_ERR_AND_SET_RET(AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode), res); in IsoClientStartPackData()
65 …TO_ERR_AND_SET_RET(AddByteToJson(payload, FIELD_SEED, params->seed.val, params->seed.length), res); in IsoClientStartPackData()
66 GOTO_ERR_AND_SET_RET(AddIntToJson(payload, FIELD_PEER_USER_TYPE, params->selfUserType), res); in IsoClientStartPackData()
68 GOTO_ERR_AND_SET_RET(AddStringToJson(payload, FIELD_PKG_NAME, params->packageName), res); in IsoClientStartPackData()
[all …]
Diso_server_protocol_task.c44 int res; in PackageServerStartMessage() local
50 res = HC_ERR_JSON_CREATE; in PackageServerStartMessage()
56 res = HC_ERR_JSON_CREATE; in PackageServerStartMessage()
60 params->baseParams.randSelf.length), res); in PackageServerStartMessage()
61 …ERR_AND_SET_RET(AddByteToJson(payload, FIELD_TOKEN, selfTokenBuf->val, selfTokenBuf->length), res); in PackageServerStartMessage()
63 params->baseParams.authIdSelf.length), res); in PackageServerStartMessage()
64 GOTO_ERR_AND_SET_RET(AddIntToJson(payload, FIELD_PEER_USER_TYPE, params->selfUserType), res); in PackageServerStartMessage()
65 GOTO_ERR_AND_SET_RET(AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode), res); in PackageServerStartMessage()
66 … GOTO_ERR_AND_SET_RET(AddIntToJson(sendToPeer, FIELD_AUTH_FORM, AUTH_FORM_ACCOUNT_UNRELATED), res); in PackageServerStartMessage()
67 GOTO_ERR_AND_SET_RET(AddObjToJson(sendToPeer, FIELD_PAYLOAD, payload), res); in PackageServerStartMessage()
[all …]
/base/security/device_auth/services/authenticators/src/account_unrelated/iso_task/lite_exchange_task/
Diso_server_bind_exchange_task.c53 int res; in Process() local
55 res = GetIntFromJson(in, FIELD_MESSAGE, &message); in Process()
56 if (res != 0 || message != ISO_CLIENT_BIND_EXCHANGE_CONFIRM) { in Process()
59 res = CheckEncResult(params, in, RESULT_AAD); in Process()
60 if (res != 0) { in Process()
61 LOGE("CheckEncResult failed, res:%d", res); in Process()
63 return res; in Process()
65 res = SendResultToFinalSelf(params, out, false); in Process()
66 if (res != 0) { in Process()
67 LOGE("SendResultToFinalSelf failed, res:%d", res); in Process()
[all …]
Diso_client_unbind_exchange_task.c49 int res; in Process() local
52 res = GetIntFromJson(in, FIELD_MESSAGE, &message); in Process()
53 if (res != 0 || message != ISO_SERVER_UNBIND_EXCHANGE_RET) { in Process()
56 res = CheckEncResult(params, in, UNBIND_ADD_RESPONSE); in Process()
57 if (res != 0) { in Process()
58 LOGE("CheckEncResult failed, res:%d", res); in Process()
59 return res; in Process()
63 res = HC_ERR_ALLOC_MEMORY; in Process()
66 res = GenerateKeyAliasInIso(params, keyAlias, ISO_KEY_ALIAS_LEN, true); in Process()
67 if (res != 0) { in Process()
[all …]
Diso_client_bind_exchange_task.c44 int res; in DecAndImportInner() local
47 res = HC_ERR_ALLOC_MEMORY; in DecAndImportInner()
56 res = params->baseParams.loader->aesGcmDecrypt(&params->baseParams.sessionKey, encDataBuf, in DecAndImportInner()
58 if (res != 0) { in DecAndImportInner()
59 LOGE("gcm decrypt failed, res:%d", res); in DecAndImportInner()
62 res = GenerateKeyAliasInIso(params, keyAlias, ISO_KEY_ALIAS_LEN, true); in DecAndImportInner()
63 if (res != 0) { in DecAndImportInner()
64 LOGE("GenerateKeyAliasInIso failed, res:%d", res); in DecAndImportInner()
71res = params->baseParams.loader->importSymmetricKey(&keyAliasBuf, authCodeBuf, KEY_PURPOSE_MAC, &e… in DecAndImportInner()
72 if (res != 0) { in DecAndImportInner()
[all …]
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
Dpake_v2_protocol_common.c150 int32_t res = AllocDefaultParams(params); in InitPakeV2BaseParams() local
151 if (res != HC_SUCCESS) { in InitPakeV2BaseParams()
159 res = HC_ERROR; in InitPakeV2BaseParams()
166 return res; in InitPakeV2BaseParams()
171 int32_t res; in GeneratePakeParams() local
175 res = params->loader->generateRandom(&(params->salt)); in GeneratePakeParams()
176 if (res != HC_SUCCESS) { in GeneratePakeParams()
177 LOGE("Generate salt failed, res: %x.", res); in GeneratePakeParams()
183 res = params->loader->computeHkdf(&(params->psk), &(params->salt), &keyInfo, &secret, false); in GeneratePakeParams()
184 if (res != HC_SUCCESS) { in GeneratePakeParams()
[all …]
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/
Dpake_v1_protocol_common.c156 int32_t res = AllocDefaultParams(params); in InitPakeV1BaseParams() local
157 if (res != HC_SUCCESS) { in InitPakeV1BaseParams()
165 res = HC_ERROR; in InitPakeV1BaseParams()
172 return res; in InitPakeV1BaseParams()
177 int32_t res; in GeneratePakeParams() local
181 res = params->loader->generateRandom(&(params->salt)); in GeneratePakeParams()
182 if (res != HC_SUCCESS) { in GeneratePakeParams()
183 LOGE("Generate salt failed, res: %x.", res); in GeneratePakeParams()
188 res = params->loader->generateRandom(&(params->challengeSelf)); in GeneratePakeParams()
189 if (res != HC_SUCCESS) { in GeneratePakeParams()
[all …]
/base/customization/enterprise_device_management/test/unittest/src/
Dpolicy_manager_test.cpp62 ErrCode res; variable
68 res = PolicyManager::GetInstance()->SetPolicy(adminName, policyName, "false", "true");
69 ASSERT_TRUE(res == ERR_OK);
72 res = PolicyManager::GetInstance()->GetPolicy(adminName, policyName, policyValue);
73 ASSERT_TRUE(res == ERR_OK);
75 res = PolicyManager::GetInstance()->GetPolicy("", policyName, policyValue);
76 ASSERT_TRUE(res == ERR_OK);
79 res = PolicyManager::GetInstance()->SetPolicy(adminName1, policyName, "true", "true");
80 ASSERT_TRUE(res == ERR_OK);
81 res = PolicyManager::GetInstance()->GetPolicy(adminName, policyName, policyValue);
[all …]

12345678910>>...14