/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
D | pake_v1_client_protocol_task.c | 50 int res = ConstructOutJson(params, out); in PakeRequest() local 51 if (res != HC_SUCCESS) { in PakeRequest() 52 LOGE("ConstructOutJson failed, res: %d.", res); in PakeRequest() 53 return res; in PakeRequest() 60 res = PackagePakeRequestData(params, payload); in PakeRequest() 61 if (res != HC_SUCCESS) { in PakeRequest() 62 LOGE("PackagePakeRequestData failed, res: %d.", res); in PakeRequest() 63 return res; in PakeRequest() 67 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.idSelf.val, in PakeRequest() 69 if (res != HC_SUCCESS) { in PakeRequest() [all …]
|
D | pake_v1_server_protocol_task.c | 43 int res = ConstructOutJson(params, out); in PackageMsgForResponse() local 44 if (res != HC_SUCCESS) { in PackageMsgForResponse() 45 LOGE("ConstructOutJson failed, res: %d.", res); in PackageMsgForResponse() 46 return res; in PackageMsgForResponse() 53 res = PackagePakeResponseData(params, payload); in PackageMsgForResponse() 54 if (res != HC_SUCCESS) { in PackageMsgForResponse() 55 LOGE("PackagePakeResponseData failed, res: %d.", res); in PackageMsgForResponse() 56 return res; in PackageMsgForResponse() 59 res = AddByteToJson(payload, FIELD_CHALLENGE, params->baseParams.challengeSelf.val, in PackageMsgForResponse() 61 if (res != HC_SUCCESS) { in PackageMsgForResponse() [all …]
|
D | pake_v1_protocol_task_common.c | 58 int32_t res = GetIntFromJson(in, FIELD_KEY_LENGTH, (int *)&(params->returnKey.length)); in AllocReturnKey() local 59 if (res != HC_SUCCESS) { in AllocReturnKey() 60 LOGD("Get key length failed, use default, res: %d", res); in AllocReturnKey() 67 res = InitSingleParam(¶ms->returnKey, params->returnKey.length); in AllocReturnKey() 68 if (res != HC_SUCCESS) { in AllocReturnKey() 69 LOGE("InitSingleParam for returnKey failed, res: %d.", res); in AllocReturnKey() 71 return res; in AllocReturnKey() 76 int32_t res = InitPakeV1BaseParams(&(params->baseParams)); in InitDasPakeV1Params() local 77 if (res != HC_SUCCESS) { in InitDasPakeV1Params() 78 LOGE("InitPakeV1BaseParams failed, res: %d.", res); in InitDasPakeV1Params() [all …]
|
/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/ |
D | pake_message_util.c | 73 int32_t res = GetAndCheckKeyLenOnServer(in, &(params->returnKey.length)); in ParsePakeRequestMessage() local 74 if (res != HC_SUCCESS) { in ParsePakeRequestMessage() 75 LOGE("GetAndCheckKeyLenOnServer failed, res: %d.", res); in ParsePakeRequestMessage() 76 return res; in ParsePakeRequestMessage() 85 …int32_t res = AddByteToJson(payload, FIELD_SALT, params->baseParams.salt.val, params->baseParams.s… in PackagePakeResponseData() local 86 if (res != HC_SUCCESS) { in PackagePakeResponseData() 87 LOGE("Add salt failed, res: %d.", res); in PackagePakeResponseData() 88 return res; in PackagePakeResponseData() 90 …res = AddByteToJson(payload, FIELD_EPK, params->baseParams.epkSelf.val, params->baseParams.epkSelf… in PackagePakeResponseData() 91 if (res != HC_SUCCESS) { in PackagePakeResponseData() [all …]
|
/base/security/device_auth/test/unittest/deviceauth/source/ |
D | key_agree_sdk_test.cpp | 73 … KeyAgreeResult res = KeyAgreeInitSession(g_session, KEYAGREE_PROTOCOL_ANY, KEYAGREE_TYPE_CLIENT); variable 74 EXPECT_EQ(res, KEYAGREE_SUCCESS); 80 …KeyAgreeResult res = KeyAgreeInitSession(g_session_s, KEYAGREE_PROTOCOL_ANY, KEYAGREE_TYPE_SERVER); variable 81 EXPECT_EQ(res, KEYAGREE_SUCCESS); 87 …KeyAgreeResult res = KeyAgreeInitSession(g_session, KEYAGREE_PROTOCOL_DL_SPEKE_256, KEYAGREE_TYPE_… variable 88 EXPECT_EQ(res, KEYAGREE_SUCCESS); 94 …KeyAgreeResult res = KeyAgreeInitSession(g_session, KEYAGREE_PROTOCOL_DL_SPEKE_384, KEYAGREE_TYPE_… variable 95 EXPECT_EQ(res, KEYAGREE_SUCCESS); 101 …KeyAgreeResult res = KeyAgreeInitSession(g_session, KEYAGREE_PROTOCOL_EC_SPEKE_P256, KEYAGREE_TYPE… variable 102 EXPECT_EQ(res, KEYAGREE_SUCCESS); [all …]
|
/base/security/crypto_framework/test/unittest/src/ |
D | crypto_ecc_sign_test.cpp | 59 int32_t res = HcfAsyKeyGeneratorCreate("ECC224", &generator); in SetUpTestCase() local 60 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase() 64 res = generator->generateKeyPair(generator, NULL, &keyPair); in SetUpTestCase() 65 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase() 73 res = HcfAsyKeyGeneratorCreate("ECC256", &generator2); in SetUpTestCase() 74 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase() 78 res = generator2->generateKeyPair(generator2, NULL, &keyPair2); in SetUpTestCase() 79 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase() 87 res = HcfAsyKeyGeneratorCreate("ECC384", &generator3); in SetUpTestCase() 88 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase() [all …]
|
D | crypto_ecc_verify_test.cpp | 59 int32_t res = HcfAsyKeyGeneratorCreate("ECC224", &generator); in SetUpTestCase() local 60 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase() 64 res = generator->generateKeyPair(generator, NULL, &keyPair); in SetUpTestCase() 65 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase() 73 res = HcfAsyKeyGeneratorCreate("ECC256", &generator2); in SetUpTestCase() 74 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase() 78 res = generator2->generateKeyPair(generator2, NULL, &keyPair2); in SetUpTestCase() 79 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase() 87 res = HcfAsyKeyGeneratorCreate("ECC384", &generator3); in SetUpTestCase() 88 ASSERT_EQ(res, HCF_SUCCESS); in SetUpTestCase() [all …]
|
D | crypto_rsa_verify_test.cpp | 45 int32_t res = HcfVerifyCreate("RSA1024|PSS|SHA256", &verify); variable 46 EXPECT_NE(res, HCF_SUCCESS); 55 int32_t res = HcfVerifyCreate("RSA1024|PSS|SHA256|MGF1_SHA256", &verify); variable 56 EXPECT_EQ(res, HCF_SUCCESS); 65 HcfResult res = HCF_SUCCESS; variable 67 res = HcfVerifyCreate("RSA1024|PSS|SHA256|MGF1_SHA256", &verify); 68 EXPECT_EQ(res, HCF_SUCCESS); 69 res = verify->init(verify, NULL, NULL); 70 EXPECT_NE(res, HCF_SUCCESS); 79 HcfResult res = HcfAsyKeyGeneratorCreate("RSA2048|PRIMES_2", &generator); variable [all …]
|
D | crypto_rsa_sign_test.cpp | 44 HcfResult res = HCF_SUCCESS; variable 46 res = HcfSignCreate("RSA1024|PKCS1|MD5", &sign); 47 EXPECT_EQ(res, HCF_SUCCESS); 59 HcfResult res = HCF_SUCCESS; variable 61 res = HcfSignCreate("RSA1024|PKCS1|SHA1", &sign); 62 EXPECT_EQ(res, HCF_SUCCESS); 74 HcfResult res = HCF_SUCCESS; variable 76 res = HcfSignCreate("RSA1024|PKCS1|SHA256", &sign); 77 EXPECT_EQ(res, HCF_SUCCESS); 89 HcfResult res = HCF_SUCCESS; variable [all …]
|
D | crypto_rsa_cipher_test.cpp | 44 HcfResult res = HCF_SUCCESS; variable 46 res = HcfCipherCreate("RSA1024|NoPadding", &cipher); 47 EXPECT_EQ(res, HCF_SUCCESS); 62 HcfResult res = HCF_SUCCESS; variable 64 res = HcfCipherCreate("RSA1024|NoPadding", &cipher); 65 EXPECT_EQ(res, HCF_SUCCESS); 77 HcfResult res = HCF_SUCCESS; variable 79 res = HcfCipherCreate("RSA1024|NoPadding", &cipher); 80 EXPECT_EQ(res, HCF_SUCCESS); 92 HcfResult res = HCF_SUCCESS; variable [all …]
|
/base/security/device_auth/services/key_agree_sdk/src/ |
D | key_agree_session.c | 60 int32_t res = InitSingleParam(authIdPeer, authIdLen); in GetIdPeer() local 61 if (res != HC_SUCCESS) { in GetIdPeer() 62 LOGE("InitSingleParam for peer authId failed, res: %d.", res); in GetIdPeer() 63 return res; in GetIdPeer() 267 int32_t res = GetIdPeer(payload, FIELD_PEER_AUTH_ID, authIdSelf, authIdPeer); in GetAuthIdPeerFromPayload() local 268 if (res != HC_SUCCESS) { in GetAuthIdPeerFromPayload() 269 LOGE("GetIdPeer failed, res: %d.", res); in GetAuthIdPeerFromPayload() 271 return res; in GetAuthIdPeerFromPayload() 276 int32_t res = GetByteFromJson(in, FIELD_KCF_DATA, baseParams->kcfDataPeer.val, in ParsePakeServerConfirmMessage() local 278 if (res != HC_SUCCESS) { in ParsePakeServerConfirmMessage() [all …]
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common/ |
D | pake_protocol_dl_common.c | 54 int res = params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk() local 55 if (res != HC_SUCCESS) { in GenerateEsk() 56 LOGE("GenerateRandom for eskSelf failed, res: %x.", res); in GenerateEsk() 58 return res; in GenerateEsk() 97 int32_t res; in InitDlPakeParams() local 99 res = FillDlKeysLenAccordingToEpkPeer(params); in InitDlPakeParams() 101 res = FillDlKeysLenAccordingToMod(params); in InitDlPakeParams() 103 if (res != HC_SUCCESS) { in InitDlPakeParams() 104 LOGE("FillDlKeysLen failed, res: %x.", res); in InitDlPakeParams() 105 return res; in InitDlPakeParams() [all …]
|
/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/standard_exchange_task/ |
D | common_standard_unbind_exchange.c | 29 int32_t res; in InitStandardUnbindExchangeParams() local 34 res = HC_ERR_ALLOC_MEMORY; in InitStandardUnbindExchangeParams() 48 return res; in InitStandardUnbindExchangeParams() 76 int32_t res = HC_SUCCESS; in PackageRmvInfo() local 80 pakeParams->baseParams.idSelf.length), res); in PackageRmvInfo() 81 GOTO_ERR_AND_SET_RET(AddIntToJson(rmvInfoJson, FIELD_RMV_TYPE, pakeParams->userType), res); in PackageRmvInfo() 85 res = HC_ERR_PACKAGE_JSON_TO_STRING_FAIL; in PackageRmvInfo() 89 res = InitSingleParam(&exchangeParams->rmvInfo, strlen(rmvInfoStr)); in PackageRmvInfo() 90 if (res != HC_SUCCESS) { in PackageRmvInfo() 97 res = HC_ERR_MEMORY_COPY; in PackageRmvInfo() [all …]
|
D | standard_exchange_message_util.c | 27 int32_t res = HC_SUCCESS; in PackageNonceAndCipherToJson() local 32 res = HC_ERR_ALLOC_MEMORY; in PackageNonceAndCipherToJson() 37 res = HC_ERR_MEMORY_COPY; in PackageNonceAndCipherToJson() 43 res = HC_ERR_MEMORY_COPY; in PackageNonceAndCipherToJson() 46 GOTO_ERR_AND_SET_RET(AddByteToJson(data, key, exAuthInfoVal, exAuthInfoLen), res); in PackageNonceAndCipherToJson() 49 return res; in PackageNonceAndCipherToJson() 54 int32_t res = HC_SUCCESS; in ParseNonceAndCipherFromJson() local 59 res = HC_ERR_JSON_GET; in ParseNonceAndCipherFromJson() 66 res = HC_ERR_ALLOC_MEMORY; in ParseNonceAndCipherFromJson() 69 res = HexStringToByte(exAuthInfoStr, exAuthInfoVal, exAuthInfoLen); in ParseNonceAndCipherFromJson() [all …]
|
D | das_standard_token_manager.c | 29 int32_t res = GenerateKeyAlias(&pkgNameBuff, &serviceTypeBuff, keyType, authId, &keyAliasBuff); in RegisterLocalIdentity() local 30 if (res != HC_SUCCESS) { in RegisterLocalIdentity() 32 return res; in RegisterLocalIdentity() 35 res = loader->checkKeyExist(&keyAliasBuff); in RegisterLocalIdentity() 36 if (res == HC_SUCCESS) { in RegisterLocalIdentity() 42 res = loader->generateKeyPairWithStorage(&keyAliasBuff, PAKE_ED25519_KEY_PAIR_LEN, ED25519, in RegisterLocalIdentity() 44 if (res != HC_SUCCESS) { in RegisterLocalIdentity() 46 return res; in RegisterLocalIdentity() 60 …int32_t res = GenerateKeyAlias(&pkgNameBuff, &serviceTypeBuff, keyType, authId, &pakeKeyAliasBuff); in UnregisterLocalIdentity() local 61 if (res != HC_SUCCESS) { in UnregisterLocalIdentity() [all …]
|
D | common_standard_bind_exchange.c | 27 int32_t res; in InitStandardBindExchangeParams() local 35 res = HC_ERR_ALLOC_MEMORY; in InitStandardBindExchangeParams() 42 res = HC_ERR_ALLOC_MEMORY; in InitStandardBindExchangeParams() 49 res = HC_ERR_ALLOC_MEMORY; in InitStandardBindExchangeParams() 61 return res; in InitStandardBindExchangeParams() 94 int32_t res = pakeParams->baseParams.loader->checkKeyExist(keyAlias); in PackageAuthInfo() local 95 if (res != HC_SUCCESS) { in PackageAuthInfo() 100 …res = pakeParams->baseParams.loader->generateKeyPairWithStorage(keyAlias, PAKE_ED25519_KEY_PAIR_LE… in PackageAuthInfo() 102 if (res != HC_SUCCESS) { in PackageAuthInfo() 104 return res; in PackageAuthInfo() [all …]
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/ |
D | pake_protocol_ec_common.c | 34 int32_t res; in GenerateEsk() local 38 res = params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk() 39 if (res != HC_SUCCESS) { in GenerateEsk() 40 LOGE("CURVE_25519: GenerateRandom for eskSelf failed, res: %x.", res); in GenerateEsk() 41 return res; in GenerateEsk() 59 int32_t res = InitSingleParam(&(params->eskSelf), params->eskSelf.length); in InitEcPakeParams() local 60 if (res != HC_SUCCESS) { in InitEcPakeParams() 61 LOGE("InitSingleParam for eskSelf failed, res: %x.", res); in InitEcPakeParams() 62 return res; in InitEcPakeParams() 64 res = InitSingleParam(&(params->epkSelf), keyBufferLen); in InitEcPakeParams() [all …]
|
/base/security/device_auth/services/authenticators/src/account_unrelated/iso_task/iso_protocol_task/ |
D | iso_client_protocol_task.c | 43 int res; in IsoClientStartPackData() local 49 res = HC_ERR_JSON_CREATE; in IsoClientStartPackData() 55 res = HC_ERR_JSON_CREATE; in IsoClientStartPackData() 58 … GOTO_ERR_AND_SET_RET(AddIntToJson(sendToPeer, FIELD_AUTH_FORM, AUTH_FORM_ACCOUNT_UNRELATED), res); in IsoClientStartPackData() 61 params->baseParams.randSelf.length), res); in IsoClientStartPackData() 63 params->baseParams.authIdSelf.length), res); in IsoClientStartPackData() 64 GOTO_ERR_AND_SET_RET(AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode), res); in IsoClientStartPackData() 65 …TO_ERR_AND_SET_RET(AddByteToJson(payload, FIELD_SEED, params->seed.val, params->seed.length), res); in IsoClientStartPackData() 66 GOTO_ERR_AND_SET_RET(AddIntToJson(payload, FIELD_PEER_USER_TYPE, params->selfUserType), res); in IsoClientStartPackData() 68 GOTO_ERR_AND_SET_RET(AddStringToJson(payload, FIELD_PKG_NAME, params->packageName), res); in IsoClientStartPackData() [all …]
|
D | iso_server_protocol_task.c | 44 int res; in PackageServerStartMessage() local 50 res = HC_ERR_JSON_CREATE; in PackageServerStartMessage() 56 res = HC_ERR_JSON_CREATE; in PackageServerStartMessage() 60 params->baseParams.randSelf.length), res); in PackageServerStartMessage() 61 …ERR_AND_SET_RET(AddByteToJson(payload, FIELD_TOKEN, selfTokenBuf->val, selfTokenBuf->length), res); in PackageServerStartMessage() 63 params->baseParams.authIdSelf.length), res); in PackageServerStartMessage() 64 GOTO_ERR_AND_SET_RET(AddIntToJson(payload, FIELD_PEER_USER_TYPE, params->selfUserType), res); in PackageServerStartMessage() 65 GOTO_ERR_AND_SET_RET(AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode), res); in PackageServerStartMessage() 66 … GOTO_ERR_AND_SET_RET(AddIntToJson(sendToPeer, FIELD_AUTH_FORM, AUTH_FORM_ACCOUNT_UNRELATED), res); in PackageServerStartMessage() 67 GOTO_ERR_AND_SET_RET(AddObjToJson(sendToPeer, FIELD_PAYLOAD, payload), res); in PackageServerStartMessage() [all …]
|
/base/security/device_auth/services/authenticators/src/account_unrelated/iso_task/lite_exchange_task/ |
D | iso_server_bind_exchange_task.c | 53 int res; in Process() local 55 res = GetIntFromJson(in, FIELD_MESSAGE, &message); in Process() 56 if (res != 0 || message != ISO_CLIENT_BIND_EXCHANGE_CONFIRM) { in Process() 59 res = CheckEncResult(params, in, RESULT_AAD); in Process() 60 if (res != 0) { in Process() 61 LOGE("CheckEncResult failed, res:%d", res); in Process() 63 return res; in Process() 65 res = SendResultToFinalSelf(params, out, false); in Process() 66 if (res != 0) { in Process() 67 LOGE("SendResultToFinalSelf failed, res:%d", res); in Process() [all …]
|
D | iso_client_unbind_exchange_task.c | 49 int res; in Process() local 52 res = GetIntFromJson(in, FIELD_MESSAGE, &message); in Process() 53 if (res != 0 || message != ISO_SERVER_UNBIND_EXCHANGE_RET) { in Process() 56 res = CheckEncResult(params, in, UNBIND_ADD_RESPONSE); in Process() 57 if (res != 0) { in Process() 58 LOGE("CheckEncResult failed, res:%d", res); in Process() 59 return res; in Process() 63 res = HC_ERR_ALLOC_MEMORY; in Process() 66 res = GenerateKeyAliasInIso(params, keyAlias, ISO_KEY_ALIAS_LEN, true); in Process() 67 if (res != 0) { in Process() [all …]
|
D | iso_client_bind_exchange_task.c | 44 int res; in DecAndImportInner() local 47 res = HC_ERR_ALLOC_MEMORY; in DecAndImportInner() 56 res = params->baseParams.loader->aesGcmDecrypt(¶ms->baseParams.sessionKey, encDataBuf, in DecAndImportInner() 58 if (res != 0) { in DecAndImportInner() 59 LOGE("gcm decrypt failed, res:%d", res); in DecAndImportInner() 62 res = GenerateKeyAliasInIso(params, keyAlias, ISO_KEY_ALIAS_LEN, true); in DecAndImportInner() 63 if (res != 0) { in DecAndImportInner() 64 LOGE("GenerateKeyAliasInIso failed, res:%d", res); in DecAndImportInner() 71 …res = params->baseParams.loader->importSymmetricKey(&keyAliasBuf, authCodeBuf, KEY_PURPOSE_MAC, &e… in DecAndImportInner() 72 if (res != 0) { in DecAndImportInner() [all …]
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
D | pake_v2_protocol_common.c | 150 int32_t res = AllocDefaultParams(params); in InitPakeV2BaseParams() local 151 if (res != HC_SUCCESS) { in InitPakeV2BaseParams() 159 res = HC_ERROR; in InitPakeV2BaseParams() 166 return res; in InitPakeV2BaseParams() 171 int32_t res; in GeneratePakeParams() local 175 res = params->loader->generateRandom(&(params->salt)); in GeneratePakeParams() 176 if (res != HC_SUCCESS) { in GeneratePakeParams() 177 LOGE("Generate salt failed, res: %x.", res); in GeneratePakeParams() 183 res = params->loader->computeHkdf(&(params->psk), &(params->salt), &keyInfo, &secret, false); in GeneratePakeParams() 184 if (res != HC_SUCCESS) { in GeneratePakeParams() [all …]
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
D | pake_v1_protocol_common.c | 156 int32_t res = AllocDefaultParams(params); in InitPakeV1BaseParams() local 157 if (res != HC_SUCCESS) { in InitPakeV1BaseParams() 165 res = HC_ERROR; in InitPakeV1BaseParams() 172 return res; in InitPakeV1BaseParams() 177 int32_t res; in GeneratePakeParams() local 181 res = params->loader->generateRandom(&(params->salt)); in GeneratePakeParams() 182 if (res != HC_SUCCESS) { in GeneratePakeParams() 183 LOGE("Generate salt failed, res: %x.", res); in GeneratePakeParams() 188 res = params->loader->generateRandom(&(params->challengeSelf)); in GeneratePakeParams() 189 if (res != HC_SUCCESS) { in GeneratePakeParams() [all …]
|
/base/customization/enterprise_device_management/test/unittest/src/ |
D | policy_manager_test.cpp | 62 ErrCode res; variable 68 res = PolicyManager::GetInstance()->SetPolicy(adminName, policyName, "false", "true"); 69 ASSERT_TRUE(res == ERR_OK); 72 res = PolicyManager::GetInstance()->GetPolicy(adminName, policyName, policyValue); 73 ASSERT_TRUE(res == ERR_OK); 75 res = PolicyManager::GetInstance()->GetPolicy("", policyName, policyValue); 76 ASSERT_TRUE(res == ERR_OK); 79 res = PolicyManager::GetInstance()->SetPolicy(adminName1, policyName, "true", "true"); 80 ASSERT_TRUE(res == ERR_OK); 81 res = PolicyManager::GetInstance()->GetPolicy(adminName, policyName, policyValue); [all …]
|