/base/security/device_auth/services/session_manager/src/session/v1/compatible_bind_sub_session/ |
D | compatible_bind_sub_session_common.c | 29 if (AddStringToJson(session->params, FIELD_PIN_CODE, pinCode) != HC_SUCCESS) { in AddPinCode() 33 return HC_SUCCESS; in AddPinCode() 38 if (AddStringToJson(params, FIELD_GROUP_ID, groupId) != HC_SUCCESS) { in AddGroupId() 42 return HC_SUCCESS; in AddGroupId() 52 if (AddStringToJson(params, FIELD_GROUP_NAME, groupName) != HC_SUCCESS) { in AddGroupName() 56 return HC_SUCCESS; in AddGroupName() 62 … ((groupOwner != NULL) && (AddStringToJson(params, FIELD_GROUP_OWNER, groupOwner) != HC_SUCCESS)) { in AddGroupOwnerIfExist() 66 return HC_SUCCESS; in AddGroupOwnerIfExist() 72 if (GetIntFromJson(jsonParams, FIELD_GROUP_TYPE, &groupType) != HC_SUCCESS) { in AddGroupTypeIfValid() 80 if (AddIntToJson(params, FIELD_GROUP_TYPE, groupType) != HC_SUCCESS) { in AddGroupTypeIfValid() [all …]
|
D | compatible_bind_sub_session_util.c | 31 if (AddStringToJson(jsonParams, FIELD_PIN_CODE, pinCode) != HC_SUCCESS) { in AddPinCode() 35 return HC_SUCCESS; in AddPinCode() 41 if (authId != NULL && AddStringToJson(jsonParams, FIELD_DEVICE_ID, authId) != HC_SUCCESS) { in AddAuthIdIfExist() 45 return HC_SUCCESS; in AddAuthIdIfExist() 51 if (GetIntFromJson(returnData, FIELD_USER_TYPE, &userType) == HC_SUCCESS) { in AddUserTypeIfExistAndValid() 56 if (AddIntToJson(jsonParams, FIELD_USER_TYPE, userType) != HC_SUCCESS) { in AddUserTypeIfExistAndValid() 61 return HC_SUCCESS; in AddUserTypeIfExistAndValid() 67 if (GetIntFromJson(returnData, FIELD_GROUP_VISIBILITY, &groupVisibility) == HC_SUCCESS) { in AddGroupVisibilityIfExistAndValid() 72 if (AddIntToJson(jsonParams, FIELD_GROUP_VISIBILITY, groupVisibility) != HC_SUCCESS) { in AddGroupVisibilityIfExistAndValid() 77 return HC_SUCCESS; in AddGroupVisibilityIfExistAndValid() [all …]
|
D | compatible_bind_sub_session.c | 43 if (GetIntFromJson(jsonParams, FIELD_OS_ACCOUNT_ID, &osAccountId) != HC_SUCCESS) { in CheckInvitePeer() 50 if (((result = CheckGroupExist(osAccountId, groupId)) != HC_SUCCESS) || in CheckInvitePeer() 51 ((result = GetGroupTypeFromDb(osAccountId, groupId, &groupType)) != HC_SUCCESS) || in CheckInvitePeer() 52 ((result = AssertGroupTypeMatch(groupType, PEER_TO_PEER_GROUP)) != HC_SUCCESS) || in CheckInvitePeer() 53 ((result = CheckPermForGroup(osAccountId, MEMBER_INVITE, appId, groupId)) != HC_SUCCESS) || in CheckInvitePeer() 54 ((result = CheckDeviceNumLimit(osAccountId, groupId, NULL)) != HC_SUCCESS)) { in CheckInvitePeer() 57 return HC_SUCCESS; in CheckInvitePeer() 63 if (GetIntFromJson(jsonParams, FIELD_GROUP_TYPE, &groupType) != HC_SUCCESS) { in CheckJoinPeer() 102 return HC_SUCCESS; in GetDuplicateAppId() 109 if (GetInt64FromJson(params, FIELD_REQUEST_ID, &reqId) != HC_SUCCESS) { in CreateBaseBindSubSession() [all …]
|
/base/security/device_auth/services/group_manager/src/group_operation/across_account_group/ |
D | across_account_group.c | 68 if (result != HC_SUCCESS) { in GenerateGroupId() 80 if (result != HC_SUCCESS) { in GenerateGroupId() 86 return HC_SUCCESS; in GenerateGroupId() 93 if (result != HC_SUCCESS) { in AddCredTypeToParamsFromIdenticalGroup() 98 if (res != HC_SUCCESS) { in AddCredTypeToParamsFromIdenticalGroup() 107 if ((QueryDevices(osAccountId, ¶ms, &deviceEntryVec) != HC_SUCCESS) || in AddCredTypeToParamsFromIdenticalGroup() 115 if (AddIntToJson(jsonParams, FIELD_CREDENTIAL_TYPE, deviceEntry->credential) != HC_SUCCESS) { in AddCredTypeToParamsFromIdenticalGroup() 123 return HC_SUCCESS; in AddCredTypeToParamsFromIdenticalGroup() 129 if (((result = AddSelfUdidToParams(devParams)) != HC_SUCCESS) || in GenerateDevParams() 130 ((result = AddAuthIdToParamsOrDefault(jsonParams, devParams)) != HC_SUCCESS) || in GenerateDevParams() [all …]
|
/base/security/device_auth/services/group_manager/src/group_operation/identical_account_group/ |
D | identical_account_group.c | 33 if (((result = AddSelfUdidToParams(devParams)) != HC_SUCCESS) || in GenerateDevParams() 34 ((result = AddCredTypeToParams(jsonParams, devParams)) != HC_SUCCESS) || in GenerateDevParams() 35 ((result = AddUserIdToDevParams(jsonParams, devParams)) != HC_SUCCESS) || in GenerateDevParams() 36 ((result = AddAuthIdToParamsOrDefault(jsonParams, devParams)) != HC_SUCCESS) || in GenerateDevParams() 37 ((result = AddSourceToParams(SELF_CREATED, devParams)) != HC_SUCCESS) || in GenerateDevParams() 38 ((result = AddUserTypeToParamsOrDefault(jsonParams, devParams)) != HC_SUCCESS) || in GenerateDevParams() 39 ((result = AddGroupIdToDevParams(groupId, devParams)) != HC_SUCCESS) || in GenerateDevParams() 40 ((result = AddServiceTypeToParams(groupId, devParams)) != HC_SUCCESS)) { in GenerateDevParams() 43 return HC_SUCCESS; in GenerateDevParams() 54 if (((result = AddGroupTypeToParams(IDENTICAL_ACCOUNT_GROUP, groupParams)) != HC_SUCCESS) || in GenerateGroupParams() [all …]
|
/base/security/device_auth/services/group_manager/src/group_operation/peer_to_peer_group/ |
D | peer_to_peer_group.c | 41 if (result != HC_SUCCESS) { in IsSameNameGroupExist() 65 return HC_SUCCESS; in CheckGroupName() 76 if (result != HC_SUCCESS) { in GenerateGroupId() 88 if (result != HC_SUCCESS) { in GenerateGroupId() 94 return HC_SUCCESS; in GenerateGroupId() 110 if (result != HC_SUCCESS) { in GeneratePeerToPeerGroupId() 114 return HC_SUCCESS; in GeneratePeerToPeerGroupId() 125 if (((result = CheckGroupName(osAccountId, appId, jsonParams)) != HC_SUCCESS) || in CheckCreateParams() 126 ((result = CheckUserTypeIfExist(jsonParams)) != HC_SUCCESS) || in CheckCreateParams() 127 ((result = CheckGroupVisibilityIfExist(jsonParams)) != HC_SUCCESS) || in CheckCreateParams() [all …]
|
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/session_manager/session/v2/auth_sub_session/ |
D | auth_sub_session_test.cpp | 103 ASSERT_EQ(res, HC_SUCCESS); 112 ASSERT_EQ(res, HC_SUCCESS); 117 ASSERT_EQ(res, HC_SUCCESS); 121 ASSERT_EQ(res, HC_SUCCESS); 123 ASSERT_EQ(res, HC_SUCCESS); 129 ASSERT_EQ(res, HC_SUCCESS); 131 ASSERT_EQ(res, HC_SUCCESS); 133 ASSERT_EQ(res, HC_SUCCESS); 135 ASSERT_EQ(res, HC_SUCCESS); 138 ASSERT_EQ(res, HC_SUCCESS); [all …]
|
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/session_manager/session/v2/auth_sub_session/protocol_lib/ |
D | ec_speke_protocol_test.cpp | 99 ASSERT_EQ(res, HC_SUCCESS); 108 ASSERT_EQ(res, HC_SUCCESS); 113 ASSERT_EQ(res, HC_SUCCESS); 117 ASSERT_EQ(res, HC_SUCCESS); 119 ASSERT_EQ(res, HC_SUCCESS); 125 ASSERT_EQ(res, HC_SUCCESS); 127 ASSERT_EQ(res, HC_SUCCESS); 129 ASSERT_EQ(res, HC_SUCCESS); 131 ASSERT_EQ(res, HC_SUCCESS); 134 ASSERT_EQ(res, HC_SUCCESS); [all …]
|
D | iso_protocol_test.cpp | 96 ASSERT_EQ(res, HC_SUCCESS); 105 ASSERT_EQ(res, HC_SUCCESS); 110 ASSERT_EQ(res, HC_SUCCESS); 114 ASSERT_EQ(res, HC_SUCCESS); 116 ASSERT_EQ(res, HC_SUCCESS); 122 ASSERT_EQ(res, HC_SUCCESS); 124 ASSERT_EQ(res, HC_SUCCESS); 126 ASSERT_EQ(res, HC_SUCCESS); 128 ASSERT_EQ(res, HC_SUCCESS); 131 ASSERT_EQ(res, HC_SUCCESS); [all …]
|
/base/security/device_auth/services/group_auth/src/group_auth_manager/account_unrelated_group_auth/ |
D | account_unrelated_group_auth.c | 52 int32_t res = HC_SUCCESS; in ReturnSessionKey() 54 if (GetByteFromJson(out, FIELD_SESSION_KEY, sessionKey, keyLen) != HC_SUCCESS) { in ReturnSessionKey() 81 if (AddStringToJson(returnToSelf, FIELD_GROUP_ID, groupId) != HC_SUCCESS) { in AddGroupIdToSelfData() 85 return HC_SUCCESS; in AddGroupIdToSelfData() 93 return HC_SUCCESS; in AddPeerUdidToSelfData() 95 if (AddStringToJson(returnToSelf, FIELD_PEER_CONN_DEVICE_ID, peerUdid) != HC_SUCCESS) { in AddPeerUdidToSelfData() 99 return HC_SUCCESS; in AddPeerUdidToSelfData() 107 return HC_SUCCESS; in AddPeerAuthIdToSelfData() 110 if (AddStringToJson(returnToSelf, FIELD_PEER_AUTH_ID, peerAuthId) != HC_SUCCESS) { in AddPeerAuthIdToSelfData() 114 return HC_SUCCESS; in AddPeerAuthIdToSelfData() [all …]
|
/base/security/device_auth/services/mk_agree/src/ |
D | key_manager.c | 45 if (res != HC_SUCCESS) { in ConvertHashToAlias() 56 return HC_SUCCESS; in ConvertHashToAlias() 68 if (res != HC_SUCCESS) { in ConvertHashToAliasWithPrefix() 88 return HC_SUCCESS; in ConvertHashToAliasWithPrefix() 99 if (res != HC_SUCCESS) { in GenerateDevKeyAlias() 107 if (res != HC_SUCCESS) { in GenerateDevKeyAlias() 112 if (res != HC_SUCCESS) { in GenerateDevKeyAlias() 124 if (res != HC_SUCCESS) { in GenerateMkAlias() 129 if (res != HC_SUCCESS) { in GenerateMkAlias() 141 if (res != HC_SUCCESS) { in GeneratePseudonymPskAlias() [all …]
|
D | mk_agree_task.c | 33 if (res != HC_SUCCESS) { in GeneratePakeRequestPayload() 38 if (InitUint8Buff(&devicePk, PAKE_X25519_KEY_PAIR_LEN) != HC_SUCCESS) { in GeneratePakeRequestPayload() 43 if (res != HC_SUCCESS) { in GeneratePakeRequestPayload() 48 if (AddByteToJson(payload, FIELD_SALT, pakeTask->clientSalt, SALT_LEN) != HC_SUCCESS) { in GeneratePakeRequestPayload() 53 if (AddByteToJson(payload, FIELD_PUBLIC_KEY, devicePk.val, devicePk.length) != HC_SUCCESS) { in GeneratePakeRequestPayload() 59 return HC_SUCCESS; in GeneratePakeRequestPayload() 70 if (res != HC_SUCCESS) { in GeneratePakeRequestPayloadData() 82 if (InitUint8Buff(payloadData, payloadLen + 1) != HC_SUCCESS) { in GeneratePakeRequestPayloadData() 94 return HC_SUCCESS; in GeneratePakeRequestPayloadData() 100 if (InitUint8Buff(&devicePk, PAKE_X25519_KEY_PAIR_LEN) != HC_SUCCESS) { in GeneratePakeResponsePayload() [all …]
|
/base/security/device_auth/services/session_manager/src/session/v2/ |
D | dev_session_v2.c | 87 if (GetIntFromJson(impl->context, FIELD_USER_TYPE, &userType) != HC_SUCCESS) { in CmdExchangePkGenerator() 110 if (GetIntFromJson(impl->context, FIELD_USER_TYPE, &userType) != HC_SUCCESS) { in CmdImportAuthCodeGenerator() 133 if (GetIntFromJson(impl->context, FIELD_OS_ACCOUNT_ID, &osAccountId) != HC_SUCCESS) { in CmdSaveTrustedInfoGenerator() 165 if (GetIntFromJson(impl->context, FIELD_OS_ACCOUNT_ID, &osAccountId) != HC_SUCCESS) { in CmdMkAgreeGenerator() 246 return HC_SUCCESS; in RestartSession() 256 if (AddIntToJson(event, FIELD_TYPE, eventType) != HC_SUCCESS) { in AddMsgToSessionMsg() 261 if (AddObjToJson(event, FIELD_DATA, msg) != HC_SUCCESS) { in AddMsgToSessionMsg() 266 if (AddObjToArray(sessionMsg, event) != HC_SUCCESS) { in AddMsgToSessionMsg() 271 return HC_SUCCESS; in AddMsgToSessionMsg() 281 if (AddIntToJson(errMsg, FIELD_ERROR_CODE, errorCode) != HC_SUCCESS) { in ErrorInformPeer() [all …]
|
D | dev_session_util.c | 51 if (GetIntFromJson(context, FIELD_OS_ACCOUNT_ID, &osAccountId) != HC_SUCCESS) { in GetPdidByContext() 75 if (res != HC_SUCCESS) { in GetPdidByContext() 79 if (DeepCopyString(pdid, returnPdid) != HC_SUCCESS) { in GetPdidByContext() 85 return HC_SUCCESS; in GetPdidByContext() 110 if (AddStringToJson(realPkInfoJson, FIELD_DEVICE_PK, devicePk) != HC_SUCCESS) { in BuildRealPkInfoJson() 114 if (AddStringToJson(realPkInfoJson, FIELD_USER_ID, userId) != HC_SUCCESS) { in BuildRealPkInfoJson() 118 if (AddStringToJson(realPkInfoJson, FIELD_DEVICE_ID, deviceId) != HC_SUCCESS) { in BuildRealPkInfoJson() 122 if (AddStringToJson(realPkInfoJson, FIELD_VERSION, version) != HC_SUCCESS) { in BuildRealPkInfoJson() 126 return HC_SUCCESS; in BuildRealPkInfoJson() 143 if (res != HC_SUCCESS) { in GetRealPkInfoJson() [all …]
|
/base/security/device_auth/test/unittest/deviceauth/unit_test/source/ |
D | account_related_creds_manager_dir_test.cpp | 47 EXPECT_EQ(ret, HC_SUCCESS); in SetUp() 59 EXPECT_NE(ret, HC_SUCCESS); 67 EXPECT_NE(ret, HC_SUCCESS); 70 EXPECT_NE(ret, HC_SUCCESS); 72 if (AddStringToJson(in, FIELD_USER_ID, "test_id") != HC_SUCCESS) { // For unit test. 76 EXPECT_NE(ret, HC_SUCCESS); 88 EXPECT_NE(ret, HC_SUCCESS); 91 EXPECT_NE(ret, HC_SUCCESS); 94 EXPECT_NE(ret, HC_SUCCESS); 105 EXPECT_NE(ret, HC_SUCCESS); [all …]
|
D | identical_account_group_test.cpp | 48 EXPECT_NE(ret, HC_SUCCESS); 55 EXPECT_NE(ret, HC_SUCCESS); 61 EXPECT_NE(ret, HC_SUCCESS); 67 EXPECT_NE(ret, HC_SUCCESS); 73 EXPECT_NE(ret, HC_SUCCESS); 79 EXPECT_NE(ret, HC_SUCCESS); 85 EXPECT_NE(ret, HC_SUCCESS); 91 EXPECT_NE(ret, HC_SUCCESS); 97 EXPECT_NE(ret, HC_SUCCESS); 104 EXPECT_NE(ret, HC_SUCCESS); [all …]
|
D | across_account_group_test.cpp | 54 EXPECT_NE(ret, HC_SUCCESS); 60 EXPECT_NE(ret, HC_SUCCESS); 67 EXPECT_NE(ret, HC_SUCCESS); 74 EXPECT_NE(ret, HC_SUCCESS); 80 EXPECT_NE(ret, HC_SUCCESS); 86 EXPECT_NE(ret, HC_SUCCESS); 92 EXPECT_NE(ret, HC_SUCCESS); 98 EXPECT_NE(ret, HC_SUCCESS); 104 EXPECT_NE(ret, HC_SUCCESS); 111 EXPECT_NE(ret, HC_SUCCESS); [all …]
|
/base/security/device_auth/services/ |
D | device_auth.c | 60 if (ret != HC_SUCCESS) { in IsDeviceIdHashMatch() 71 if (ret != HC_SUCCESS) { in IsDeviceIdHashMatch() 78 if (ret != HC_SUCCESS) { in IsDeviceIdHashMatch() 87 return HC_SUCCESS; in IsDeviceIdHashMatch() 101 if (QueryDevices(osAccountId, ¶ms, &deviceEntryVec) != HC_SUCCESS) { in GetUdidByGroup() 108 if (IsDeviceIdHashMatch(udid, deviceIdHash) == HC_SUCCESS) { in GetUdidByGroup() 127 if (ret != HC_SUCCESS) { in GetDeviceIdByUdidHash() 178 if (AddStringToJson(context, FIELD_GROUP_ID, groupId) != HC_SUCCESS) { in AddGroupInfoToContextByInput() 182 if (AddIntToJson(context, FIELD_GROUP_TYPE, PEER_TO_PEER_GROUP) != HC_SUCCESS) { in AddGroupInfoToContextByInput() 186 if (AddStringToJson(context, FIELD_GROUP_NAME, groupName) != HC_SUCCESS) { in AddGroupInfoToContextByInput() [all …]
|
/base/security/device_auth/services/key_agree_sdk/src/ |
D | key_agree_session.c | 61 if (res != HC_SUCCESS) { in GetIdPeer() 65 if (HexStringToByte(authIdStr, authIdPeer->val, authIdPeer->length) != HC_SUCCESS) { in GetIdPeer() 74 return HC_SUCCESS; in GetIdPeer() 154 return HC_SUCCESS; in StringToVersion() 181 return HC_SUCCESS; in VersionToString() 198 if (maxRet != HC_SUCCESS) { in AddVersionToJson() 207 if (AddStringToJson(version, FIELD_SDK_CURRENT_VERSION, maxStr) != HC_SUCCESS) { in AddVersionToJson() 212 if (AddObjToJson(jsonObj, FIELD_SDK_VERSION, version) != HC_SUCCESS) { in AddVersionToJson() 218 return HC_SUCCESS; in AddVersionToJson() 230 if (maxRet != HC_SUCCESS) { in GetVersionFromJson() [all …]
|
/base/security/device_auth/test/unittest/deviceauth/source/ |
D | group_operation_common_test.cpp | 48 return HC_SUCCESS; in GenerateGroupParams() 56 return HC_SUCCESS; in GenerateDevParams() 70 ASSERT_EQ(ret, HC_SUCCESS); in SetUpTestCase() 132 ASSERT_NE(ret, HC_SUCCESS); 138 ASSERT_NE(ret, HC_SUCCESS); 144 ASSERT_NE(ret, HC_SUCCESS); 150 ASSERT_NE(ret, HC_SUCCESS); 156 ASSERT_NE(ret, HC_SUCCESS); 162 ASSERT_NE(ret, HC_SUCCESS); 168 ASSERT_NE(ret, HC_SUCCESS); [all …]
|
/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/ |
D | pake_message_util.c | 29 if (AddBoolToJson(payload, FIELD_SUPPORT_256_MOD, is256ModSupported) != HC_SUCCESS) { in PackagePakeRequestData() 33 if (AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode) != HC_SUCCESS) { in PackagePakeRequestData() 38 if (AddStringToJson(payload, FIELD_PKG_NAME, params->packageName) != HC_SUCCESS) { in PackagePakeRequestData() 42 if (AddStringToJson(payload, FIELD_SERVICE_TYPE, params->serviceType) != HC_SUCCESS) { in PackagePakeRequestData() 46 if (AddIntToJson(payload, FIELD_PEER_USER_TYPE, params->userType) != HC_SUCCESS) { in PackagePakeRequestData() 51 return HC_SUCCESS; in PackagePakeRequestData() 57 if (GetBoolFromJson(in, FIELD_SUPPORT_256_MOD, &is256ModSupported) != HC_SUCCESS) { in ParsePakeRequestMessage() 74 if (res != HC_SUCCESS) { in ParsePakeRequestMessage() 80 return HC_SUCCESS; in ParsePakeRequestMessage() 86 if (res != HC_SUCCESS) { in PackagePakeResponseData() [all …]
|
/base/security/device_auth/services/group_manager/src/group_operation/ |
D | group_operation_common.c | 63 if (result != HC_SUCCESS) { in GetGroupNumByOwner() 84 if (QueryDevices(osAccountId, ¶ms, &deviceEntryVec) != HC_SUCCESS) { in GetTrustedDeviceEntryById() 111 if (QueryGroups(osAccountId, ¶ms, &groupEntryVec) != HC_SUCCESS) { in GetGroupEntryById() 147 return HC_SUCCESS; in CheckGroupNumLimit() 154 if (res != HC_SUCCESS) { in IsLocalDevice() 214 return HC_SUCCESS; in CheckGroupAccessible() 233 return HC_SUCCESS; in CheckGroupEditAllowed() 266 if (result != HC_SUCCESS) { in GetRelatedGroups() 285 return HC_SUCCESS; in GetRelatedGroups() 300 …int32_t result = GenerateDeviceEntryFromEntry(deviceEntry, returnDeviceEntry) ? HC_SUCCESS : HC_ER… in GetTrustedDevInfoById() [all …]
|
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/session_manager/session/v2/expand_sub_session/ |
D | expand_sub_session_test.cpp | 106 ASSERT_EQ(res, HC_SUCCESS); 115 ASSERT_EQ(res, HC_SUCCESS); 120 ASSERT_EQ(res, HC_SUCCESS); 124 ASSERT_EQ(res, HC_SUCCESS); 126 ASSERT_EQ(res, HC_SUCCESS); 128 ASSERT_EQ(res, HC_SUCCESS); 130 ASSERT_EQ(res, HC_SUCCESS); 136 ASSERT_EQ(res, HC_SUCCESS); 142 ASSERT_EQ(res, HC_SUCCESS); 149 ASSERT_EQ(res, HC_SUCCESS); [all …]
|
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
D | ec_speke_protocol.c | 91 if (AddIntToJson(json, FIELD_EVENT, CLEINT_START_REQ_EVENT) != HC_SUCCESS) { in EcSpekeClientStartReqBuildEvent() 97 params->authIdSelf.length) != HC_SUCCESS) { in EcSpekeClientStartReqBuildEvent() 103 return HC_SUCCESS; in EcSpekeClientStartReqBuildEvent() 119 if (InitUint8Buff(¶ms->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput() 123 …(HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCESS) { in GetAuthIdPeerFromInput() 127 return HC_SUCCESS; in GetAuthIdPeerFromInput() 132 if (InitUint8Buff(¶ms->salt, EC_SPEKE_SALT_LEN) != HC_SUCCESS) { in GetSaltFromInput() 136 …if (GetByteFromJson(inputEvent, FIELD_SALT, params->salt.val, params->salt.length) != HC_SUCCESS) { in GetSaltFromInput() 140 return HC_SUCCESS; in GetSaltFromInput() 151 …f (InitUint8Buff(¶ms->epkPeer, HcStrlen(epkPeerStr) / BYTE_TO_HEX_OPER_LENGTH) != HC_SUCCESS) { in GetEpkPeerFromInput() [all …]
|
/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/ |
D | pub_key_exchange.c | 127 return HC_SUCCESS; in BuildKeyAliasMsg() 141 if (res != HC_SUCCESS) { in CalKeyAlias() 147 if (res != HC_SUCCESS) { in CalKeyAlias() 151 return HC_SUCCESS; in CalKeyAlias() 177 if (res != HC_SUCCESS) { in CalServiceId() 181 return HC_SUCCESS; in CalServiceId() 189 if (res != HC_SUCCESS) { in GenerateKeyAlias() 204 if (res != HC_SUCCESS) { in GenerateKeyAlias() 210 …exString(keyAliasByte.val, keyAliasByte.length, keyAliasHexStr, keyAliasHexStrLen) != HC_SUCCESS) { in GenerateKeyAlias() 218 return HC_SUCCESS; in GenerateKeyAlias() [all …]
|