Home
last modified time | relevance | path

Searched refs:HC_SUCCESS (Results 1 – 25 of 134) sorted by relevance

123456

/base/security/device_auth/services/session_manager/src/session/v1/compatible_bind_sub_session/
Dcompatible_bind_sub_session_common.c29 if (AddStringToJson(session->params, FIELD_PIN_CODE, pinCode) != HC_SUCCESS) { in AddPinCode()
33 return HC_SUCCESS; in AddPinCode()
38 if (AddStringToJson(params, FIELD_GROUP_ID, groupId) != HC_SUCCESS) { in AddGroupId()
42 return HC_SUCCESS; in AddGroupId()
52 if (AddStringToJson(params, FIELD_GROUP_NAME, groupName) != HC_SUCCESS) { in AddGroupName()
56 return HC_SUCCESS; in AddGroupName()
62 … ((groupOwner != NULL) && (AddStringToJson(params, FIELD_GROUP_OWNER, groupOwner) != HC_SUCCESS)) { in AddGroupOwnerIfExist()
66 return HC_SUCCESS; in AddGroupOwnerIfExist()
72 if (GetIntFromJson(jsonParams, FIELD_GROUP_TYPE, &groupType) != HC_SUCCESS) { in AddGroupTypeIfValid()
80 if (AddIntToJson(params, FIELD_GROUP_TYPE, groupType) != HC_SUCCESS) { in AddGroupTypeIfValid()
[all …]
Dcompatible_bind_sub_session_util.c31 if (AddStringToJson(jsonParams, FIELD_PIN_CODE, pinCode) != HC_SUCCESS) { in AddPinCode()
35 return HC_SUCCESS; in AddPinCode()
41 if (authId != NULL && AddStringToJson(jsonParams, FIELD_DEVICE_ID, authId) != HC_SUCCESS) { in AddAuthIdIfExist()
45 return HC_SUCCESS; in AddAuthIdIfExist()
51 if (GetIntFromJson(returnData, FIELD_USER_TYPE, &userType) == HC_SUCCESS) { in AddUserTypeIfExistAndValid()
56 if (AddIntToJson(jsonParams, FIELD_USER_TYPE, userType) != HC_SUCCESS) { in AddUserTypeIfExistAndValid()
61 return HC_SUCCESS; in AddUserTypeIfExistAndValid()
67 if (GetIntFromJson(returnData, FIELD_GROUP_VISIBILITY, &groupVisibility) == HC_SUCCESS) { in AddGroupVisibilityIfExistAndValid()
72 if (AddIntToJson(jsonParams, FIELD_GROUP_VISIBILITY, groupVisibility) != HC_SUCCESS) { in AddGroupVisibilityIfExistAndValid()
77 return HC_SUCCESS; in AddGroupVisibilityIfExistAndValid()
[all …]
Dcompatible_bind_sub_session.c43 if (GetIntFromJson(jsonParams, FIELD_OS_ACCOUNT_ID, &osAccountId) != HC_SUCCESS) { in CheckInvitePeer()
50 if (((result = CheckGroupExist(osAccountId, groupId)) != HC_SUCCESS) || in CheckInvitePeer()
51 ((result = GetGroupTypeFromDb(osAccountId, groupId, &groupType)) != HC_SUCCESS) || in CheckInvitePeer()
52 ((result = AssertGroupTypeMatch(groupType, PEER_TO_PEER_GROUP)) != HC_SUCCESS) || in CheckInvitePeer()
53 ((result = CheckPermForGroup(osAccountId, MEMBER_INVITE, appId, groupId)) != HC_SUCCESS) || in CheckInvitePeer()
54 ((result = CheckDeviceNumLimit(osAccountId, groupId, NULL)) != HC_SUCCESS)) { in CheckInvitePeer()
57 return HC_SUCCESS; in CheckInvitePeer()
63 if (GetIntFromJson(jsonParams, FIELD_GROUP_TYPE, &groupType) != HC_SUCCESS) { in CheckJoinPeer()
102 return HC_SUCCESS; in GetDuplicateAppId()
109 if (GetInt64FromJson(params, FIELD_REQUEST_ID, &reqId) != HC_SUCCESS) { in CreateBaseBindSubSession()
[all …]
/base/security/device_auth/services/group_manager/src/group_operation/across_account_group/
Dacross_account_group.c68 if (result != HC_SUCCESS) { in GenerateGroupId()
80 if (result != HC_SUCCESS) { in GenerateGroupId()
86 return HC_SUCCESS; in GenerateGroupId()
93 if (result != HC_SUCCESS) { in AddCredTypeToParamsFromIdenticalGroup()
98 if (res != HC_SUCCESS) { in AddCredTypeToParamsFromIdenticalGroup()
107 if ((QueryDevices(osAccountId, &params, &deviceEntryVec) != HC_SUCCESS) || in AddCredTypeToParamsFromIdenticalGroup()
115 if (AddIntToJson(jsonParams, FIELD_CREDENTIAL_TYPE, deviceEntry->credential) != HC_SUCCESS) { in AddCredTypeToParamsFromIdenticalGroup()
123 return HC_SUCCESS; in AddCredTypeToParamsFromIdenticalGroup()
129 if (((result = AddSelfUdidToParams(devParams)) != HC_SUCCESS) || in GenerateDevParams()
130 ((result = AddAuthIdToParamsOrDefault(jsonParams, devParams)) != HC_SUCCESS) || in GenerateDevParams()
[all …]
/base/security/device_auth/services/group_manager/src/group_operation/identical_account_group/
Didentical_account_group.c33 if (((result = AddSelfUdidToParams(devParams)) != HC_SUCCESS) || in GenerateDevParams()
34 ((result = AddCredTypeToParams(jsonParams, devParams)) != HC_SUCCESS) || in GenerateDevParams()
35 ((result = AddUserIdToDevParams(jsonParams, devParams)) != HC_SUCCESS) || in GenerateDevParams()
36 ((result = AddAuthIdToParamsOrDefault(jsonParams, devParams)) != HC_SUCCESS) || in GenerateDevParams()
37 ((result = AddSourceToParams(SELF_CREATED, devParams)) != HC_SUCCESS) || in GenerateDevParams()
38 ((result = AddUserTypeToParamsOrDefault(jsonParams, devParams)) != HC_SUCCESS) || in GenerateDevParams()
39 ((result = AddGroupIdToDevParams(groupId, devParams)) != HC_SUCCESS) || in GenerateDevParams()
40 ((result = AddServiceTypeToParams(groupId, devParams)) != HC_SUCCESS)) { in GenerateDevParams()
43 return HC_SUCCESS; in GenerateDevParams()
54 if (((result = AddGroupTypeToParams(IDENTICAL_ACCOUNT_GROUP, groupParams)) != HC_SUCCESS) || in GenerateGroupParams()
[all …]
/base/security/device_auth/services/group_manager/src/group_operation/peer_to_peer_group/
Dpeer_to_peer_group.c41 if (result != HC_SUCCESS) { in IsSameNameGroupExist()
65 return HC_SUCCESS; in CheckGroupName()
76 if (result != HC_SUCCESS) { in GenerateGroupId()
88 if (result != HC_SUCCESS) { in GenerateGroupId()
94 return HC_SUCCESS; in GenerateGroupId()
110 if (result != HC_SUCCESS) { in GeneratePeerToPeerGroupId()
114 return HC_SUCCESS; in GeneratePeerToPeerGroupId()
125 if (((result = CheckGroupName(osAccountId, appId, jsonParams)) != HC_SUCCESS) || in CheckCreateParams()
126 ((result = CheckUserTypeIfExist(jsonParams)) != HC_SUCCESS) || in CheckCreateParams()
127 ((result = CheckGroupVisibilityIfExist(jsonParams)) != HC_SUCCESS) || in CheckCreateParams()
[all …]
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/session_manager/session/v2/auth_sub_session/
Dauth_sub_session_test.cpp103 ASSERT_EQ(res, HC_SUCCESS);
112 ASSERT_EQ(res, HC_SUCCESS);
117 ASSERT_EQ(res, HC_SUCCESS);
121 ASSERT_EQ(res, HC_SUCCESS);
123 ASSERT_EQ(res, HC_SUCCESS);
129 ASSERT_EQ(res, HC_SUCCESS);
131 ASSERT_EQ(res, HC_SUCCESS);
133 ASSERT_EQ(res, HC_SUCCESS);
135 ASSERT_EQ(res, HC_SUCCESS);
138 ASSERT_EQ(res, HC_SUCCESS);
[all …]
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/session_manager/session/v2/auth_sub_session/protocol_lib/
Dec_speke_protocol_test.cpp99 ASSERT_EQ(res, HC_SUCCESS);
108 ASSERT_EQ(res, HC_SUCCESS);
113 ASSERT_EQ(res, HC_SUCCESS);
117 ASSERT_EQ(res, HC_SUCCESS);
119 ASSERT_EQ(res, HC_SUCCESS);
125 ASSERT_EQ(res, HC_SUCCESS);
127 ASSERT_EQ(res, HC_SUCCESS);
129 ASSERT_EQ(res, HC_SUCCESS);
131 ASSERT_EQ(res, HC_SUCCESS);
134 ASSERT_EQ(res, HC_SUCCESS);
[all …]
Diso_protocol_test.cpp96 ASSERT_EQ(res, HC_SUCCESS);
105 ASSERT_EQ(res, HC_SUCCESS);
110 ASSERT_EQ(res, HC_SUCCESS);
114 ASSERT_EQ(res, HC_SUCCESS);
116 ASSERT_EQ(res, HC_SUCCESS);
122 ASSERT_EQ(res, HC_SUCCESS);
124 ASSERT_EQ(res, HC_SUCCESS);
126 ASSERT_EQ(res, HC_SUCCESS);
128 ASSERT_EQ(res, HC_SUCCESS);
131 ASSERT_EQ(res, HC_SUCCESS);
[all …]
/base/security/device_auth/services/group_auth/src/group_auth_manager/account_unrelated_group_auth/
Daccount_unrelated_group_auth.c52 int32_t res = HC_SUCCESS; in ReturnSessionKey()
54 if (GetByteFromJson(out, FIELD_SESSION_KEY, sessionKey, keyLen) != HC_SUCCESS) { in ReturnSessionKey()
81 if (AddStringToJson(returnToSelf, FIELD_GROUP_ID, groupId) != HC_SUCCESS) { in AddGroupIdToSelfData()
85 return HC_SUCCESS; in AddGroupIdToSelfData()
93 return HC_SUCCESS; in AddPeerUdidToSelfData()
95 if (AddStringToJson(returnToSelf, FIELD_PEER_CONN_DEVICE_ID, peerUdid) != HC_SUCCESS) { in AddPeerUdidToSelfData()
99 return HC_SUCCESS; in AddPeerUdidToSelfData()
107 return HC_SUCCESS; in AddPeerAuthIdToSelfData()
110 if (AddStringToJson(returnToSelf, FIELD_PEER_AUTH_ID, peerAuthId) != HC_SUCCESS) { in AddPeerAuthIdToSelfData()
114 return HC_SUCCESS; in AddPeerAuthIdToSelfData()
[all …]
/base/security/device_auth/services/mk_agree/src/
Dkey_manager.c45 if (res != HC_SUCCESS) { in ConvertHashToAlias()
56 return HC_SUCCESS; in ConvertHashToAlias()
68 if (res != HC_SUCCESS) { in ConvertHashToAliasWithPrefix()
88 return HC_SUCCESS; in ConvertHashToAliasWithPrefix()
99 if (res != HC_SUCCESS) { in GenerateDevKeyAlias()
107 if (res != HC_SUCCESS) { in GenerateDevKeyAlias()
112 if (res != HC_SUCCESS) { in GenerateDevKeyAlias()
124 if (res != HC_SUCCESS) { in GenerateMkAlias()
129 if (res != HC_SUCCESS) { in GenerateMkAlias()
141 if (res != HC_SUCCESS) { in GeneratePseudonymPskAlias()
[all …]
Dmk_agree_task.c33 if (res != HC_SUCCESS) { in GeneratePakeRequestPayload()
38 if (InitUint8Buff(&devicePk, PAKE_X25519_KEY_PAIR_LEN) != HC_SUCCESS) { in GeneratePakeRequestPayload()
43 if (res != HC_SUCCESS) { in GeneratePakeRequestPayload()
48 if (AddByteToJson(payload, FIELD_SALT, pakeTask->clientSalt, SALT_LEN) != HC_SUCCESS) { in GeneratePakeRequestPayload()
53 if (AddByteToJson(payload, FIELD_PUBLIC_KEY, devicePk.val, devicePk.length) != HC_SUCCESS) { in GeneratePakeRequestPayload()
59 return HC_SUCCESS; in GeneratePakeRequestPayload()
70 if (res != HC_SUCCESS) { in GeneratePakeRequestPayloadData()
82 if (InitUint8Buff(payloadData, payloadLen + 1) != HC_SUCCESS) { in GeneratePakeRequestPayloadData()
94 return HC_SUCCESS; in GeneratePakeRequestPayloadData()
100 if (InitUint8Buff(&devicePk, PAKE_X25519_KEY_PAIR_LEN) != HC_SUCCESS) { in GeneratePakeResponsePayload()
[all …]
/base/security/device_auth/services/session_manager/src/session/v2/
Ddev_session_v2.c87 if (GetIntFromJson(impl->context, FIELD_USER_TYPE, &userType) != HC_SUCCESS) { in CmdExchangePkGenerator()
110 if (GetIntFromJson(impl->context, FIELD_USER_TYPE, &userType) != HC_SUCCESS) { in CmdImportAuthCodeGenerator()
133 if (GetIntFromJson(impl->context, FIELD_OS_ACCOUNT_ID, &osAccountId) != HC_SUCCESS) { in CmdSaveTrustedInfoGenerator()
165 if (GetIntFromJson(impl->context, FIELD_OS_ACCOUNT_ID, &osAccountId) != HC_SUCCESS) { in CmdMkAgreeGenerator()
246 return HC_SUCCESS; in RestartSession()
256 if (AddIntToJson(event, FIELD_TYPE, eventType) != HC_SUCCESS) { in AddMsgToSessionMsg()
261 if (AddObjToJson(event, FIELD_DATA, msg) != HC_SUCCESS) { in AddMsgToSessionMsg()
266 if (AddObjToArray(sessionMsg, event) != HC_SUCCESS) { in AddMsgToSessionMsg()
271 return HC_SUCCESS; in AddMsgToSessionMsg()
281 if (AddIntToJson(errMsg, FIELD_ERROR_CODE, errorCode) != HC_SUCCESS) { in ErrorInformPeer()
[all …]
Ddev_session_util.c51 if (GetIntFromJson(context, FIELD_OS_ACCOUNT_ID, &osAccountId) != HC_SUCCESS) { in GetPdidByContext()
75 if (res != HC_SUCCESS) { in GetPdidByContext()
79 if (DeepCopyString(pdid, returnPdid) != HC_SUCCESS) { in GetPdidByContext()
85 return HC_SUCCESS; in GetPdidByContext()
110 if (AddStringToJson(realPkInfoJson, FIELD_DEVICE_PK, devicePk) != HC_SUCCESS) { in BuildRealPkInfoJson()
114 if (AddStringToJson(realPkInfoJson, FIELD_USER_ID, userId) != HC_SUCCESS) { in BuildRealPkInfoJson()
118 if (AddStringToJson(realPkInfoJson, FIELD_DEVICE_ID, deviceId) != HC_SUCCESS) { in BuildRealPkInfoJson()
122 if (AddStringToJson(realPkInfoJson, FIELD_VERSION, version) != HC_SUCCESS) { in BuildRealPkInfoJson()
126 return HC_SUCCESS; in BuildRealPkInfoJson()
143 if (res != HC_SUCCESS) { in GetRealPkInfoJson()
[all …]
/base/security/device_auth/test/unittest/deviceauth/unit_test/source/
Daccount_related_creds_manager_dir_test.cpp47 EXPECT_EQ(ret, HC_SUCCESS); in SetUp()
59 EXPECT_NE(ret, HC_SUCCESS);
67 EXPECT_NE(ret, HC_SUCCESS);
70 EXPECT_NE(ret, HC_SUCCESS);
72 if (AddStringToJson(in, FIELD_USER_ID, "test_id") != HC_SUCCESS) { // For unit test.
76 EXPECT_NE(ret, HC_SUCCESS);
88 EXPECT_NE(ret, HC_SUCCESS);
91 EXPECT_NE(ret, HC_SUCCESS);
94 EXPECT_NE(ret, HC_SUCCESS);
105 EXPECT_NE(ret, HC_SUCCESS);
[all …]
Didentical_account_group_test.cpp48 EXPECT_NE(ret, HC_SUCCESS);
55 EXPECT_NE(ret, HC_SUCCESS);
61 EXPECT_NE(ret, HC_SUCCESS);
67 EXPECT_NE(ret, HC_SUCCESS);
73 EXPECT_NE(ret, HC_SUCCESS);
79 EXPECT_NE(ret, HC_SUCCESS);
85 EXPECT_NE(ret, HC_SUCCESS);
91 EXPECT_NE(ret, HC_SUCCESS);
97 EXPECT_NE(ret, HC_SUCCESS);
104 EXPECT_NE(ret, HC_SUCCESS);
[all …]
Dacross_account_group_test.cpp54 EXPECT_NE(ret, HC_SUCCESS);
60 EXPECT_NE(ret, HC_SUCCESS);
67 EXPECT_NE(ret, HC_SUCCESS);
74 EXPECT_NE(ret, HC_SUCCESS);
80 EXPECT_NE(ret, HC_SUCCESS);
86 EXPECT_NE(ret, HC_SUCCESS);
92 EXPECT_NE(ret, HC_SUCCESS);
98 EXPECT_NE(ret, HC_SUCCESS);
104 EXPECT_NE(ret, HC_SUCCESS);
111 EXPECT_NE(ret, HC_SUCCESS);
[all …]
/base/security/device_auth/services/
Ddevice_auth.c60 if (ret != HC_SUCCESS) { in IsDeviceIdHashMatch()
71 if (ret != HC_SUCCESS) { in IsDeviceIdHashMatch()
78 if (ret != HC_SUCCESS) { in IsDeviceIdHashMatch()
87 return HC_SUCCESS; in IsDeviceIdHashMatch()
101 if (QueryDevices(osAccountId, &params, &deviceEntryVec) != HC_SUCCESS) { in GetUdidByGroup()
108 if (IsDeviceIdHashMatch(udid, deviceIdHash) == HC_SUCCESS) { in GetUdidByGroup()
127 if (ret != HC_SUCCESS) { in GetDeviceIdByUdidHash()
178 if (AddStringToJson(context, FIELD_GROUP_ID, groupId) != HC_SUCCESS) { in AddGroupInfoToContextByInput()
182 if (AddIntToJson(context, FIELD_GROUP_TYPE, PEER_TO_PEER_GROUP) != HC_SUCCESS) { in AddGroupInfoToContextByInput()
186 if (AddStringToJson(context, FIELD_GROUP_NAME, groupName) != HC_SUCCESS) { in AddGroupInfoToContextByInput()
[all …]
/base/security/device_auth/services/key_agree_sdk/src/
Dkey_agree_session.c61 if (res != HC_SUCCESS) { in GetIdPeer()
65 if (HexStringToByte(authIdStr, authIdPeer->val, authIdPeer->length) != HC_SUCCESS) { in GetIdPeer()
74 return HC_SUCCESS; in GetIdPeer()
154 return HC_SUCCESS; in StringToVersion()
181 return HC_SUCCESS; in VersionToString()
198 if (maxRet != HC_SUCCESS) { in AddVersionToJson()
207 if (AddStringToJson(version, FIELD_SDK_CURRENT_VERSION, maxStr) != HC_SUCCESS) { in AddVersionToJson()
212 if (AddObjToJson(jsonObj, FIELD_SDK_VERSION, version) != HC_SUCCESS) { in AddVersionToJson()
218 return HC_SUCCESS; in AddVersionToJson()
230 if (maxRet != HC_SUCCESS) { in GetVersionFromJson()
[all …]
/base/security/device_auth/test/unittest/deviceauth/source/
Dgroup_operation_common_test.cpp48 return HC_SUCCESS; in GenerateGroupParams()
56 return HC_SUCCESS; in GenerateDevParams()
70 ASSERT_EQ(ret, HC_SUCCESS); in SetUpTestCase()
132 ASSERT_NE(ret, HC_SUCCESS);
138 ASSERT_NE(ret, HC_SUCCESS);
144 ASSERT_NE(ret, HC_SUCCESS);
150 ASSERT_NE(ret, HC_SUCCESS);
156 ASSERT_NE(ret, HC_SUCCESS);
162 ASSERT_NE(ret, HC_SUCCESS);
168 ASSERT_NE(ret, HC_SUCCESS);
[all …]
/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/
Dpake_message_util.c29 if (AddBoolToJson(payload, FIELD_SUPPORT_256_MOD, is256ModSupported) != HC_SUCCESS) { in PackagePakeRequestData()
33 if (AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode) != HC_SUCCESS) { in PackagePakeRequestData()
38 if (AddStringToJson(payload, FIELD_PKG_NAME, params->packageName) != HC_SUCCESS) { in PackagePakeRequestData()
42 if (AddStringToJson(payload, FIELD_SERVICE_TYPE, params->serviceType) != HC_SUCCESS) { in PackagePakeRequestData()
46 if (AddIntToJson(payload, FIELD_PEER_USER_TYPE, params->userType) != HC_SUCCESS) { in PackagePakeRequestData()
51 return HC_SUCCESS; in PackagePakeRequestData()
57 if (GetBoolFromJson(in, FIELD_SUPPORT_256_MOD, &is256ModSupported) != HC_SUCCESS) { in ParsePakeRequestMessage()
74 if (res != HC_SUCCESS) { in ParsePakeRequestMessage()
80 return HC_SUCCESS; in ParsePakeRequestMessage()
86 if (res != HC_SUCCESS) { in PackagePakeResponseData()
[all …]
/base/security/device_auth/services/group_manager/src/group_operation/
Dgroup_operation_common.c63 if (result != HC_SUCCESS) { in GetGroupNumByOwner()
84 if (QueryDevices(osAccountId, &params, &deviceEntryVec) != HC_SUCCESS) { in GetTrustedDeviceEntryById()
111 if (QueryGroups(osAccountId, &params, &groupEntryVec) != HC_SUCCESS) { in GetGroupEntryById()
147 return HC_SUCCESS; in CheckGroupNumLimit()
154 if (res != HC_SUCCESS) { in IsLocalDevice()
214 return HC_SUCCESS; in CheckGroupAccessible()
233 return HC_SUCCESS; in CheckGroupEditAllowed()
266 if (result != HC_SUCCESS) { in GetRelatedGroups()
285 return HC_SUCCESS; in GetRelatedGroups()
300 …int32_t result = GenerateDeviceEntryFromEntry(deviceEntry, returnDeviceEntry) ? HC_SUCCESS : HC_ER… in GetTrustedDevInfoById()
[all …]
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/session_manager/session/v2/expand_sub_session/
Dexpand_sub_session_test.cpp106 ASSERT_EQ(res, HC_SUCCESS);
115 ASSERT_EQ(res, HC_SUCCESS);
120 ASSERT_EQ(res, HC_SUCCESS);
124 ASSERT_EQ(res, HC_SUCCESS);
126 ASSERT_EQ(res, HC_SUCCESS);
128 ASSERT_EQ(res, HC_SUCCESS);
130 ASSERT_EQ(res, HC_SUCCESS);
136 ASSERT_EQ(res, HC_SUCCESS);
142 ASSERT_EQ(res, HC_SUCCESS);
149 ASSERT_EQ(res, HC_SUCCESS);
[all …]
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/
Dec_speke_protocol.c91 if (AddIntToJson(json, FIELD_EVENT, CLEINT_START_REQ_EVENT) != HC_SUCCESS) { in EcSpekeClientStartReqBuildEvent()
97 params->authIdSelf.length) != HC_SUCCESS) { in EcSpekeClientStartReqBuildEvent()
103 return HC_SUCCESS; in EcSpekeClientStartReqBuildEvent()
119 if (InitUint8Buff(&params->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
123 …(HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
127 return HC_SUCCESS; in GetAuthIdPeerFromInput()
132 if (InitUint8Buff(&params->salt, EC_SPEKE_SALT_LEN) != HC_SUCCESS) { in GetSaltFromInput()
136 …if (GetByteFromJson(inputEvent, FIELD_SALT, params->salt.val, params->salt.length) != HC_SUCCESS) { in GetSaltFromInput()
140 return HC_SUCCESS; in GetSaltFromInput()
151 …f (InitUint8Buff(&params->epkPeer, HcStrlen(epkPeerStr) / BYTE_TO_HEX_OPER_LENGTH) != HC_SUCCESS) { in GetEpkPeerFromInput()
[all …]
/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/
Dpub_key_exchange.c127 return HC_SUCCESS; in BuildKeyAliasMsg()
141 if (res != HC_SUCCESS) { in CalKeyAlias()
147 if (res != HC_SUCCESS) { in CalKeyAlias()
151 return HC_SUCCESS; in CalKeyAlias()
177 if (res != HC_SUCCESS) { in CalServiceId()
181 return HC_SUCCESS; in CalServiceId()
189 if (res != HC_SUCCESS) { in GenerateKeyAlias()
204 if (res != HC_SUCCESS) { in GenerateKeyAlias()
210 …exString(keyAliasByte.val, keyAliasByte.length, keyAliasHexStr, keyAliasHexStrLen) != HC_SUCCESS) { in GenerateKeyAlias()
218 return HC_SUCCESS; in GenerateKeyAlias()
[all …]

123456