Home
last modified time | relevance | path

Searched refs:HC_SUCCESS (Results 1 - 25 of 155) sorted by relevance

1234567

/base/security/device_auth/services/session_manager/src/session/v1/compatible_bind_sub_session/
H A Dcompatible_bind_sub_session_common.c30 if (AddStringToJson(session->params, FIELD_PIN_CODE, pinCode) != HC_SUCCESS) { in AddPinCode()
34 return HC_SUCCESS; in AddPinCode()
41 if (AddIntToJson(session->params, FIELD_PROTOCOL_EXPAND, protocolExpandVal) != HC_SUCCESS) { in AddProtocolExpandVal()
45 return HC_SUCCESS; in AddProtocolExpandVal()
50 if (AddStringToJson(params, FIELD_GROUP_ID, groupId) != HC_SUCCESS) { in AddGroupId()
54 return HC_SUCCESS; in AddGroupId()
64 if (AddStringToJson(params, FIELD_GROUP_NAME, groupName) != HC_SUCCESS) { in AddGroupName()
68 return HC_SUCCESS; in AddGroupName()
74 if ((groupOwner != NULL) && (AddStringToJson(params, FIELD_GROUP_OWNER, groupOwner) != HC_SUCCESS)) { in AddGroupOwnerIfExist()
78 return HC_SUCCESS; in AddGroupOwnerIfExist()
[all...]
H A Dcompatible_bind_sub_session_util.c33 if (AddStringToJson(jsonParams, FIELD_PIN_CODE, pinCode) != HC_SUCCESS) { in AddPinCode()
37 return HC_SUCCESS; in AddPinCode()
43 if (authId != NULL && AddStringToJson(jsonParams, FIELD_DEVICE_ID, authId) != HC_SUCCESS) { in AddAuthIdIfExist()
47 return HC_SUCCESS; in AddAuthIdIfExist()
53 if (GetIntFromJson(returnData, FIELD_USER_TYPE, &userType) == HC_SUCCESS) { in AddUserTypeIfExistAndValid()
58 if (AddIntToJson(jsonParams, FIELD_USER_TYPE, userType) != HC_SUCCESS) { in AddUserTypeIfExistAndValid()
63 return HC_SUCCESS; in AddUserTypeIfExistAndValid()
69 if (GetIntFromJson(returnData, FIELD_GROUP_VISIBILITY, &groupVisibility) == HC_SUCCESS) { in AddGroupVisibilityIfExistAndValid()
74 if (AddIntToJson(jsonParams, FIELD_GROUP_VISIBILITY, groupVisibility) != HC_SUCCESS) { in AddGroupVisibilityIfExistAndValid()
79 return HC_SUCCESS; in AddGroupVisibilityIfExistAndValid()
[all...]
H A Dcompatible_bind_sub_session.c45 if (GetIntFromJson(jsonParams, FIELD_OS_ACCOUNT_ID, &osAccountId) != HC_SUCCESS) { in CheckInvitePeer()
52 if (((result = CheckGroupExist(osAccountId, groupId)) != HC_SUCCESS) || in CheckInvitePeer()
53 ((result = GetGroupTypeFromDb(osAccountId, groupId, &groupType)) != HC_SUCCESS) || in CheckInvitePeer()
54 ((result = AssertGroupTypeMatch(groupType, PEER_TO_PEER_GROUP)) != HC_SUCCESS) || in CheckInvitePeer()
55 ((result = CheckPermForGroup(osAccountId, MEMBER_INVITE, appId, groupId)) != HC_SUCCESS) || in CheckInvitePeer()
56 ((result = CheckDeviceNumLimit(osAccountId, groupId, NULL)) != HC_SUCCESS)) { in CheckInvitePeer()
59 return HC_SUCCESS; in CheckInvitePeer()
65 if (GetIntFromJson(jsonParams, FIELD_GROUP_TYPE, &groupType) != HC_SUCCESS) { in CheckJoinPeer()
104 return HC_SUCCESS; in GetDuplicateAppId()
111 if (GetInt64FromJson(params, FIELD_REQUEST_ID, &reqId) != HC_SUCCESS) { in CreateBaseBindSubSession()
[all...]
/base/security/device_auth/services/legacy/group_manager/src/group_operation/across_account_group/
H A Dacross_account_group.c64 if (result != HC_SUCCESS) { in GenerateGroupId()
76 if (result != HC_SUCCESS) { in GenerateGroupId()
82 return HC_SUCCESS; in GenerateGroupId()
89 if (result != HC_SUCCESS) { in AddCredTypeToParamsFromIdenticalGroup()
94 if (res != HC_SUCCESS) { in AddCredTypeToParamsFromIdenticalGroup()
103 if ((QueryDevices(osAccountId, &params, &deviceEntryVec) != HC_SUCCESS) || in AddCredTypeToParamsFromIdenticalGroup()
111 if (AddIntToJson(jsonParams, FIELD_CREDENTIAL_TYPE, deviceEntry->credential) != HC_SUCCESS) { in AddCredTypeToParamsFromIdenticalGroup()
119 return HC_SUCCESS; in AddCredTypeToParamsFromIdenticalGroup()
125 if (((result = AddSelfUdidToParams(devParams)) != HC_SUCCESS) || in GenerateDevParams()
126 ((result = AddAuthIdToParamsOrDefault(jsonParams, devParams)) != HC_SUCCESS) || in GenerateDevParams()
[all...]
/base/security/device_auth/services/legacy/group_manager/src/group_operation/peer_to_peer_group/
H A Dpeer_to_peer_group.c37 if (result != HC_SUCCESS) { in IsSameNameGroupExist()
61 return HC_SUCCESS; in CheckGroupName()
72 if (result != HC_SUCCESS) { in GenerateGroupId()
84 if (result != HC_SUCCESS) { in GenerateGroupId()
90 return HC_SUCCESS; in GenerateGroupId()
106 if (result != HC_SUCCESS) { in GeneratePeerToPeerGroupId()
110 return HC_SUCCESS; in GeneratePeerToPeerGroupId()
121 if (((result = CheckGroupName(osAccountId, appId, jsonParams)) != HC_SUCCESS) || in CheckCreateParams()
122 ((result = CheckUserTypeIfExist(jsonParams)) != HC_SUCCESS) || in CheckCreateParams()
123 ((result = CheckGroupVisibilityIfExist(jsonParams)) != HC_SUCCESS) || in CheckCreateParams()
[all...]
/base/security/device_auth/test/unittest/deviceauth/source/
H A Ddeviceauth_interface_test.cpp88 return HC_SUCCESS; in CreateSessionTest()
97 return HC_SUCCESS; in ExcuteCredMgrCmdTest()
106 return HC_SUCCESS; in ProcessSessionTest()
112 return HC_SUCCESS; in DestroySessionTest()
120 return HC_SUCCESS; in InitTest()
156 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
161 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
166 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
170 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
172 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
[all...]
H A Didentity_manager_test.cpp53 ASSERT_EQ(ret, HC_SUCCESS); in SetUp()
64 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
67 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
79 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
84 EXPECT_EQ(ret, HC_SUCCESS); in HWTEST_F()
94 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
103 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
114 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
116 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
119 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
[all...]
H A Dprivacy_enhancement_test.cpp87 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
91 EXPECT_EQ(ret, HC_SUCCESS); in HWTEST_F()
101 EXPECT_EQ(ret, HC_SUCCESS); in HWTEST_F()
105 EXPECT_EQ(ret, HC_SUCCESS); in HWTEST_F()
111 EXPECT_EQ(ret, HC_SUCCESS); in HWTEST_F()
115 EXPECT_EQ(ret, HC_SUCCESS); in HWTEST_F()
125 EXPECT_EQ(ret, HC_SUCCESS); in HWTEST_F()
130 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
134 EXPECT_EQ(ret, HC_SUCCESS); in HWTEST_F()
139 EXPECT_EQ(ret, HC_SUCCESS); in HWTEST_F()
[all...]
/base/security/device_auth/services/legacy/group_manager/src/group_operation/identical_account_group/
H A Didentical_account_group.c33 if (((result = AddSelfUdidToParams(devParams)) != HC_SUCCESS) || in GenerateDevParams()
34 ((result = AddCredTypeToParams(jsonParams, devParams)) != HC_SUCCESS) || in GenerateDevParams()
35 ((result = AddUserIdToDevParams(jsonParams, devParams)) != HC_SUCCESS) || in GenerateDevParams()
36 ((result = AddAuthIdToParamsOrDefault(jsonParams, devParams)) != HC_SUCCESS) || in GenerateDevParams()
37 ((result = AddSourceToParams(SELF_CREATED, devParams)) != HC_SUCCESS) || in GenerateDevParams()
38 ((result = AddUserTypeToParamsOrDefault(jsonParams, devParams)) != HC_SUCCESS) || in GenerateDevParams()
39 ((result = AddGroupIdToDevParams(groupId, devParams)) != HC_SUCCESS) || in GenerateDevParams()
40 ((result = AddServiceTypeToParams(groupId, devParams)) != HC_SUCCESS)) { in GenerateDevParams()
43 return HC_SUCCESS; in GenerateDevParams()
54 if (((result = AddGroupTypeToParams(IDENTICAL_ACCOUNT_GROUP, groupParams)) != HC_SUCCESS) || in GenerateGroupParams()
[all...]
/base/security/device_auth/test/unittest/deviceauth/unit_test/source/
H A Daccount_related_creds_manager_dir_test.cpp47 EXPECT_EQ(ret, HC_SUCCESS); in SetUp()
59 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
67 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
70 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
72 if (AddStringToJson(in, FIELD_USER_ID, "test_id") != HC_SUCCESS) { // For unit test. in HWTEST_F()
76 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
88 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
91 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
94 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
105 EXPECT_NE(ret, HC_SUCCESS); in HWTEST_F()
[all...]
/base/security/device_auth/services/mk_agree/src/
H A Dmk_agree_task.c33 if (res != HC_SUCCESS) { in GeneratePakeRequestPayload()
38 if (InitUint8Buff(&devicePk, PAKE_X25519_KEY_PAIR_LEN) != HC_SUCCESS) { in GeneratePakeRequestPayload()
43 if (res != HC_SUCCESS) { in GeneratePakeRequestPayload()
48 if (AddByteToJson(payload, FIELD_SALT, pakeTask->clientSalt, SALT_LEN) != HC_SUCCESS) { in GeneratePakeRequestPayload()
53 if (AddByteToJson(payload, FIELD_PUBLIC_KEY, devicePk.val, devicePk.length) != HC_SUCCESS) { in GeneratePakeRequestPayload()
59 return HC_SUCCESS; in GeneratePakeRequestPayload()
70 if (res != HC_SUCCESS) { in GeneratePakeRequestPayloadData()
82 if (InitUint8Buff(payloadData, payloadLen + 1) != HC_SUCCESS) { in GeneratePakeRequestPayloadData()
94 return HC_SUCCESS; in GeneratePakeRequestPayloadData()
100 if (InitUint8Buff(&devicePk, PAKE_X25519_KEY_PAIR_LEN) != HC_SUCCESS) { in GeneratePakeResponsePayload()
[all...]
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/session_manager/session/v2/auth_sub_session/protocol_lib/
H A Dec_speke_protocol_test.cpp100 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
109 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
114 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
118 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
120 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
126 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
128 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
130 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
132 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
135 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
[all...]
H A Ddl_speke_protocol_test.cpp100 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
109 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
114 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
118 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
120 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
126 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
128 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
130 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
132 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
135 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
[all...]
/base/security/device_auth/services/key_agree_sdk/src/
H A Dkey_agree_session.c61 if (res != HC_SUCCESS) { in GetIdPeer()
65 if (HexStringToByte(authIdStr, authIdPeer->val, authIdPeer->length) != HC_SUCCESS) { in GetIdPeer()
74 return HC_SUCCESS; in GetIdPeer()
154 return HC_SUCCESS; in StringToVersion()
181 return HC_SUCCESS; in VersionToString()
198 if (maxRet != HC_SUCCESS) { in AddVersionToJson()
207 if (AddStringToJson(version, FIELD_SDK_CURRENT_VERSION, maxStr) != HC_SUCCESS) { in AddVersionToJson()
212 if (AddObjToJson(jsonObj, FIELD_SDK_VERSION, version) != HC_SUCCESS) { in AddVersionToJson()
218 return HC_SUCCESS; in AddVersionToJson()
230 if (maxRet != HC_SUCCESS) { in GetVersionFromJson()
[all...]
/base/security/device_auth/test/fuzztest/devauthfunc_fuzzer/
H A Ddevauthfunc_fuzzer.cpp236 if (ret != HC_SUCCESS) { in GenerateTempKeyPair()
255 if (GenerateTempKeyPair(&keyAlias) != HC_SUCCESS) { in GetAsyCredentialJson()
266 if (ret != HC_SUCCESS) { in GetAsyCredentialJson()
281 if (ret != HC_SUCCESS) { in GetAsyCredentialJson()
305 if (ret != HC_SUCCESS) { in CreateDemoGroup()
313 return g_asyncStatus == ASYNC_STATUS_ERROR ? HC_ERROR : HC_SUCCESS; in CreateDemoGroup()
326 if (ret != HC_SUCCESS) { in CreateDemoIdenticalAccountGroup()
331 if (ret != HC_SUCCESS) { in CreateDemoIdenticalAccountGroup()
345 if (ret != HC_SUCCESS) { in CreateDemoIdenticalAccountGroup()
351 return g_asyncStatus == ASYNC_STATUS_ERROR ? HC_ERROR : HC_SUCCESS; in CreateDemoIdenticalAccountGroup()
[all...]
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/session_manager/session/v2/auth_sub_session/
H A Dauth_sub_session_test.cpp104 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
113 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
118 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
122 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
124 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
130 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
132 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
134 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
136 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
139 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
[all...]
/base/security/device_auth/services/legacy/group_auth/src/group_auth_manager/account_unrelated_group_auth/
H A Daccount_unrelated_group_auth.c58 int32_t res = HC_SUCCESS; in ReturnSessionKey()
60 if (GetByteFromJson(out, FIELD_SESSION_KEY, sessionKey, keyLen) != HC_SUCCESS) { in ReturnSessionKey()
88 if (AddStringToJson(returnToSelf, FIELD_GROUP_ID, groupId) != HC_SUCCESS) { in AddGroupIdToSelfData()
92 return HC_SUCCESS; in AddGroupIdToSelfData()
100 return HC_SUCCESS; in AddPeerUdidToSelfData()
102 if (AddStringToJson(returnToSelf, FIELD_PEER_CONN_DEVICE_ID, peerUdid) != HC_SUCCESS) { in AddPeerUdidToSelfData()
106 return HC_SUCCESS; in AddPeerUdidToSelfData()
114 return HC_SUCCESS; in AddPeerAuthIdToSelfData()
117 if (AddStringToJson(returnToSelf, FIELD_PEER_AUTH_ID, peerAuthId) != HC_SUCCESS) { in AddPeerAuthIdToSelfData()
121 return HC_SUCCESS; in AddPeerAuthIdToSelfData()
[all...]
/base/security/device_auth/services/session_manager/src/session/v2/
H A Ddev_session_v2.c92 return HC_SUCCESS; in GetSelfUpgradeFlag()
100 if (res != HC_SUCCESS) { in GetSelfUpgradeFlag()
107 return HC_SUCCESS; in GetSelfUpgradeFlag()
113 if (GetIntFromJson(impl->context, FIELD_USER_TYPE, &userType) != HC_SUCCESS) { in CmdExchangePkGenerator()
118 if (GetIntFromJson(impl->context, FIELD_OS_ACCOUNT_ID, &osAccountId) != HC_SUCCESS) { in CmdExchangePkGenerator()
135 if (res != HC_SUCCESS) { in CmdExchangePkGenerator()
153 if (GetIntFromJson(impl->context, FIELD_OS_ACCOUNT_ID, &osAccountId) != HC_SUCCESS) { in CmdImportAuthCodeGenerator()
158 if (GetIntFromJson(impl->context, FIELD_USER_TYPE, &userType) != HC_SUCCESS) { in CmdImportAuthCodeGenerator()
181 if (GetIntFromJson(impl->context, FIELD_OS_ACCOUNT_ID, &osAccountId) != HC_SUCCESS) { in CmdSaveTrustedInfoGenerator()
215 if (GetIntFromJson(impl->context, FIELD_OS_ACCOUNT_ID, &osAccountId) != HC_SUCCESS) { in CmdMkAgreeGenerator()
[all...]
H A Ddev_session_util.c51 if (GetIntFromJson(context, FIELD_OS_ACCOUNT_ID, &osAccountId) != HC_SUCCESS) { in GetPdidByContext()
75 if (res != HC_SUCCESS) { in GetPdidByContext()
79 if (DeepCopyString(pdid, returnPdid) != HC_SUCCESS) { in GetPdidByContext()
85 return HC_SUCCESS; in GetPdidByContext()
110 if (AddStringToJson(realPkInfoJson, FIELD_DEVICE_PK, devicePk) != HC_SUCCESS) { in BuildRealPkInfoJson()
114 if (AddStringToJson(realPkInfoJson, FIELD_USER_ID, userId) != HC_SUCCESS) { in BuildRealPkInfoJson()
118 if (AddStringToJson(realPkInfoJson, FIELD_DEVICE_ID, deviceId) != HC_SUCCESS) { in BuildRealPkInfoJson()
122 if (AddStringToJson(realPkInfoJson, FIELD_VERSION, version) != HC_SUCCESS) { in BuildRealPkInfoJson()
126 return HC_SUCCESS; in BuildRealPkInfoJson()
143 if (res != HC_SUCCESS) { in GetRealPkInfoJson()
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/
H A Ddas_standard_token_manager.c30 if (res != HC_SUCCESS) { in RegisterLocalIdentityStd()
37 if (res == HC_SUCCESS) { in RegisterLocalIdentityStd()
39 return HC_SUCCESS; in RegisterLocalIdentityStd()
46 if (res != HC_SUCCESS) { in RegisterLocalIdentityStd()
51 return HC_SUCCESS; in RegisterLocalIdentityStd()
63 if (res != HC_SUCCESS) { in UnregisterLocalIdentityStd()
72 if (res != HC_SUCCESS) { in UnregisterLocalIdentityStd()
82 if (res != HC_SUCCESS) { in UnregisterLocalIdentityStd()
87 if (res != HC_SUCCESS) { in UnregisterLocalIdentityStd()
94 if (res != HC_SUCCESS) { in UnregisterLocalIdentityStd()
[all...]
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/session_manager/session/v2/expand_sub_session/
H A Dexpand_sub_session_test.cpp107 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
116 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
121 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
125 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
127 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
129 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
131 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
137 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
143 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
150 ASSERT_EQ(res, HC_SUCCESS); in HWTEST_F()
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/
H A Dpake_message_util.c29 if (AddBoolToJson(payload, FIELD_SUPPORT_256_MOD, is256ModSupported) != HC_SUCCESS) { in PackagePakeRequestData()
33 if (AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode) != HC_SUCCESS) { in PackagePakeRequestData()
38 if (AddStringToJson(payload, FIELD_PKG_NAME, params->packageName) != HC_SUCCESS) { in PackagePakeRequestData()
42 if (AddStringToJson(payload, FIELD_SERVICE_TYPE, params->serviceType) != HC_SUCCESS) { in PackagePakeRequestData()
46 if (AddIntToJson(payload, FIELD_PEER_USER_TYPE, params->userType) != HC_SUCCESS) { in PackagePakeRequestData()
51 return HC_SUCCESS; in PackagePakeRequestData()
57 if (GetBoolFromJson(in, FIELD_SUPPORT_256_MOD, &is256ModSupported) != HC_SUCCESS) { in ParsePakeRequestMessage()
74 if (res != HC_SUCCESS) { in ParsePakeRequestMessage()
80 return HC_SUCCESS; in ParsePakeRequestMessage()
86 if (res != HC_SUCCESS) { in PackagePakeResponseData()
[all...]
/base/security/device_auth/services/session_manager/src/session/v1/compatible_auth_sub_session/
H A Dcompatible_auth_sub_session_common.c51 if (HasAccountAuthPlugin() != HC_SUCCESS) { in GetAccountRelatedCandidateGroups()
64 if (ret != HC_SUCCESS) { in GetAccountRelatedCandidateGroups()
80 if (QueryGroups(osAccountId, &queryParams, vec) != HC_SUCCESS) { in GetAccountUnrelatedCandidateGroups()
94 if (GetBoolFromJson(param, FIELD_IS_CLIENT, &isClient) != HC_SUCCESS) { in GetCandidateGroups()
110 if (QueryGroups(osAccountId, &queryParams, groupEntryVec) != HC_SUCCESS) { in GetGroupInfoByGroupId()
118 if (AddStringToJson(paramsData, FIELD_GROUP_ID, groupId) != HC_SUCCESS) { in AddGeneralParams()
123 if (AddIntToJson(paramsData, FIELD_AUTH_FORM, authForm) != HC_SUCCESS) { in AddGeneralParams()
129 if (AddStringToJson(paramsData, FIELD_SERVICE_TYPE, serviceType) != HC_SUCCESS) { in AddGeneralParams()
134 if (AddStringToJson(paramsData, FIELD_SERVICE_TYPE, groupId) != HC_SUCCESS) { in AddGeneralParams()
139 return HC_SUCCESS; in AddGeneralParams()
[all...]
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/
H A Ddl_speke_protocol.c113 if (AddIntToJson(json, FIELD_EVENT, CLEINT_START_REQ_EVENT) != HC_SUCCESS) { in DlSpekeClientStartReqBuildEvent()
119 params->authIdSelf.length) != HC_SUCCESS) { in DlSpekeClientStartReqBuildEvent()
125 if (AddBoolToJson(json, FIELD_SUPPORT_256_MOD, isOnly256ModSupported) != HC_SUCCESS) { in DlSpekeClientStartReqBuildEvent()
131 return HC_SUCCESS; in DlSpekeClientStartReqBuildEvent()
147 if (InitUint8Buff(&params->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
151 if (HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
155 return HC_SUCCESS; in GetAuthIdPeerFromInput()
160 if (InitUint8Buff(&params->salt, DL_SPEKE_SALT_LEN) != HC_SUCCESS) { in GetSaltFromInput()
164 if (GetByteFromJson(inputData, FIELD_SALT, params->salt.val, params->salt.length) != HC_SUCCESS) { in GetSaltFromInput()
168 return HC_SUCCESS; in GetSaltFromInput()
[all...]
H A Dec_speke_protocol.c92 if (AddIntToJson(json, FIELD_EVENT, CLEINT_START_REQ_EVENT) != HC_SUCCESS) { in EcSpekeClientStartReqBuildEvent()
98 params->authIdSelf.length) != HC_SUCCESS) { in EcSpekeClientStartReqBuildEvent()
104 return HC_SUCCESS; in EcSpekeClientStartReqBuildEvent()
120 if (InitUint8Buff(&params->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
124 if (HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
128 return HC_SUCCESS; in GetAuthIdPeerFromInput()
133 if (InitUint8Buff(&params->salt, EC_SPEKE_SALT_LEN) != HC_SUCCESS) { in GetSaltFromInput()
137 if (GetByteFromJson(inputEvent, FIELD_SALT, params->salt.val, params->salt.length) != HC_SUCCESS) { in GetSaltFromInput()
142 return HC_SUCCESS; in GetSaltFromInput()
153 if (InitUint8Buff(&params->epkPeer, HcStrlen(epkPeerStr) / BYTE_TO_HEX_OPER_LENGTH) != HC_SUCCESS) { in GetEpkPeerFromInput()
[all...]

Completed in 25 milliseconds

1234567