#include <tzplatform_config.h>
#include "hal-security-auth.h"
-#include "hal-security-auth-error.h"
const char *normal_password = "normal-password";
const char *admin_password = "admin-password";
hal_security_auth_password_type_e password_type;
ret = hal_security_auth_create_password_file(user_id, hal_security_auth_password_type_e::HAL_SECURITY_AUTH_PASSWORD_PIN);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to create password file for client (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to create password file for client (" << ret << ")";
ret = hal_security_auth_write_memory_to_file(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to write memory to file (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to write memory to file (" << ret << ")";
ret = hal_security_auth_write_memory_to_file(wrong_user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to write to memory to file (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to write to memory to file (" << ret << ")";
ret = hal_security_auth_write_attempt_to_file(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to write attempt to file (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to write attempt to file (" << ret << ")";
ret = hal_security_auth_write_attempt_to_file(wrong_user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to write attempt to file (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to write attempt to file (" << ret << ")";
ret = hal_security_auth_get_password_type(user_id, &password_type);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to get password type (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to get password type (" << ret << ")";
EXPECT_EQ(password_type, hal_security_auth_password_type_e::HAL_SECURITY_AUTH_PASSWORD_PIN) << "Failed : Wrong password type (" << password_type << ")";
user_id = root_user;
ret = hal_security_auth_create_password_file(user_id, hal_security_auth_password_type_e::HAL_SECURITY_AUTH_PASSWORD_PIN);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to create password file for client (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to create password file for client (" << ret << ")";
ret = hal_security_auth_write_memory_to_file(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to write memory to file (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to write memory to file (" << ret << ")";
ret = hal_security_auth_write_memory_to_file(wrong_user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to write to memory to file (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to write to memory to file (" << ret << ")";
ret = hal_security_auth_write_attempt_to_file(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to write attempt to file (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to write attempt to file (" << ret << ")";
ret = hal_security_auth_write_attempt_to_file(wrong_user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to write attempt to file (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to write attempt to file (" << ret << ")";
ret = hal_security_auth_get_password_type(user_id, &password_type);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to get password type (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to get password type (" << ret << ")";
EXPECT_EQ(password_type, HAL_SECURITY_AUTH_PASSWORD_PIN) << "Failed : Wrong password type (" << password_type << ")";
}
uid_t user_id = tzplatform_getuid(TZ_SYS_DEFAULT_USER);
ret = hal_security_auth_create_password_file(user_id, hal_security_auth_password_type_e::HAL_SECURITY_AUTH_PASSWORD_NORMAL);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to create password file for client (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to create password file for client (" << ret << ")";
ret = hal_security_auth_set_password(user_id, normal_password);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set password (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set password (" << ret << ")";
ret = hal_security_auth_set_password(wrong_user_id, normal_password);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to set password (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to set password (" << ret << ")";
ret = hal_security_auth_check_password(user_id, normal_password);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to check password (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to check password (" << ret << ")";
ret = hal_security_auth_check_password(user_id, wrong_password);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_PASSWORD_MISMATCH) << "Wrong password to check password (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_PASSWORD_MISMATCH) << "Wrong password to check password (" << ret << ")";
user_id = root_user;
ret = hal_security_auth_create_password_file(user_id, hal_security_auth_password_type_e::HAL_SECURITY_AUTH_PASSWORD_NORMAL);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to create password file for client (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to create password file for client (" << ret << ")";
ret = hal_security_auth_set_password(user_id, normal_password);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set password (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set password (" << ret << ")";
ret = hal_security_auth_set_password(wrong_user_id, normal_password);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to set password (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to set password (" << ret << ")";
ret = hal_security_auth_check_password(user_id, normal_password);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to check password (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to check password (" << ret << ")";
ret = hal_security_auth_check_password(user_id, wrong_password);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_PASSWORD_MISMATCH) << "Wrong password to check password (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_PASSWORD_MISMATCH) << "Wrong password to check password (" << ret << ")";
}
TEST_F(SECURITY_AUTH, HistoryParams)
uid_t user_id = tzplatform_getuid(TZ_SYS_DEFAULT_USER);
ret = hal_security_auth_create_password_file(user_id, hal_security_auth_password_type_e::HAL_SECURITY_AUTH_PASSWORD_PIN);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to create password file for client (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to create password file for client (" << ret << ")";
ret = hal_security_auth_set_max_history_size(user_id, max_history_size);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set max history size (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set max history size (" << ret << ")";
ret = hal_security_auth_set_max_history_size(wrong_user_id, max_history_size);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to set max history size (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to set max history size (" << ret << ")";
ret = hal_security_auth_get_max_history_size(user_id, &history_size);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to get max history size (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to get max history size (" << ret << ")";
EXPECT_EQ(history_size, max_history_size) << "Failed : Wrong max history size (" << history_size << ")";
ret = hal_security_auth_get_max_history_size(wrong_user_id, &history_size);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to get max history size (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to get max history size (" << ret << ")";
user_id = root_user;
ret = hal_security_auth_create_password_file(user_id, hal_security_auth_password_type_e::HAL_SECURITY_AUTH_PASSWORD_PIN);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to create password file for client (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to create password file for client (" << ret << ")";
ret = hal_security_auth_set_max_history_size(user_id, max_history_size);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set max history size (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set max history size (" << ret << ")";
ret = hal_security_auth_set_max_history_size(wrong_user_id, max_history_size);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to set max history size (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to set max history size (" << ret << ")";
ret = hal_security_auth_get_max_history_size(user_id, &history_size);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to get max history size (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to get max history size (" << ret << ")";
EXPECT_EQ(history_size, max_history_size) << "Failed : Wrong max history size (" << history_size << ")";
ret = hal_security_auth_get_max_history_size(wrong_user_id, &history_size);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to get max history size (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to get max history size (" << ret << ")";
}
TEST_F(SECURITY_AUTH, ExpireParams)
uid_t user_id = tzplatform_getuid(TZ_SYS_DEFAULT_USER);
ret = hal_security_auth_create_password_file(user_id, hal_security_auth_password_type_e::HAL_SECURITY_AUTH_PASSWORD_PATTERN);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to create password file for client (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to create password file for client (" << ret << ")";
ret = hal_security_auth_set_expire_time(user_id, expire_time_days);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set expire time (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set expire time (" << ret << ")";
ret = hal_security_auth_set_expire_time(wrong_user_id, expire_time_days);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to set expire time (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to set expire time (" << ret << ")";
ret = hal_security_auth_get_expire_time(user_id, &expire_time);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to get expire time (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to get expire time (" << ret << ")";
EXPECT_EQ(expire_time, expire_time_days) << "Wrong expire time (" << expire_time << ")";
ret = hal_security_auth_get_expire_time(wrong_user_id, &expire_time);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to get expire time (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to get expire time (" << ret << ")";
user_id = root_user;
ret = hal_security_auth_create_password_file(user_id, hal_security_auth_password_type_e::HAL_SECURITY_AUTH_PASSWORD_PATTERN);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to create password file for client (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to create password file for client (" << ret << ")";
ret = hal_security_auth_set_expire_time(user_id, expire_time_days);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set expire time (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set expire time (" << ret << ")";
ret = hal_security_auth_set_expire_time(wrong_user_id, expire_time_days);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to set expire time (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to set expire time (" << ret << ")";
ret = hal_security_auth_get_expire_time(user_id, &expire_time);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to get expire time (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to get expire time (" << ret << ")";
EXPECT_EQ(expire_time, expire_time_days) << "Wrong expire time (" << expire_time << ")";
ret = hal_security_auth_get_expire_time(wrong_user_id, &expire_time);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to get expire time (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to get expire time (" << ret << ")";
}
TEST_F(SECURITY_AUTH, AttemptParams)
uid_t user_id = tzplatform_getuid(TZ_SYS_DEFAULT_USER);
ret = hal_security_auth_create_password_file(user_id, hal_security_auth_password_type_e::HAL_SECURITY_AUTH_PASSWORD_NORMAL);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to create password file for client (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to create password file for client (" << ret << ")";
ret = hal_security_auth_reset_attempt(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to reset attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to reset attempt (" << ret << ")";
ret = hal_security_auth_reset_attempt(wrong_user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to reset attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to reset attempt (" << ret << ")";
ret = hal_security_auth_increment_attempt(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to increment attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to increment attempt (" << ret << ")";
ret = hal_security_auth_increment_attempt(wrong_user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to increment attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to increment attempt (" << ret << ")";
ret = hal_security_auth_get_attempt(user_id, &attempt);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to get attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to get attempt (" << ret << ")";
EXPECT_EQ(attempt, increment_unit) << "Wrong attempt (" << attempt << ")";
ret = hal_security_auth_get_attempt(wrong_user_id, &attempt);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to get attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to get attempt (" << ret << ")";
ret = hal_security_auth_set_max_attempt(user_id, max_attempt_size);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set max attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set max attempt (" << ret << ")";
ret = hal_security_auth_set_max_attempt(wrong_user_id, max_attempt_size);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to set max attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to set max attempt (" << ret << ")";
ret = hal_security_auth_get_max_attempt(user_id, &max_attempt);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to get max attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to get max attempt (" << ret << ")";
EXPECT_EQ(max_attempt, max_attempt_size) << "Wrong max attempt (" << max_attempt << ")";
ret = hal_security_auth_get_max_attempt(wrong_user_id, &max_attempt);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to get max attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to get max attempt (" << ret << ")";
user_id = root_user;
ret = hal_security_auth_create_password_file(user_id, hal_security_auth_password_type_e::HAL_SECURITY_AUTH_PASSWORD_NORMAL);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to create password file for client (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to create password file for client (" << ret << ")";
ret = hal_security_auth_reset_attempt(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to reset attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to reset attempt (" << ret << ")";
ret = hal_security_auth_reset_attempt(wrong_user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to reset attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to reset attempt (" << ret << ")";
ret = hal_security_auth_increment_attempt(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to increment attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to increment attempt (" << ret << ")";
ret = hal_security_auth_increment_attempt(wrong_user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to increment attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to increment attempt (" << ret << ")";
ret = hal_security_auth_get_attempt(user_id, &attempt);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to get attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to get attempt (" << ret << ")";
EXPECT_EQ(attempt, increment_unit) << "Wrong attempt (" << attempt << ")";
ret = hal_security_auth_get_attempt(wrong_user_id, &attempt);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to get attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to get attempt (" << ret << ")";
ret = hal_security_auth_set_max_attempt(user_id, max_attempt_size);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set max attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set max attempt (" << ret << ")";
ret = hal_security_auth_set_max_attempt(wrong_user_id, max_attempt_size);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to set max attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to set max attempt (" << ret << ")";
ret = hal_security_auth_get_max_attempt(user_id, &max_attempt);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to get max attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to get max attempt (" << ret << ")";
EXPECT_EQ(max_attempt, max_attempt_size) << "Wrong max attempt (" << max_attempt << ")";
ret = hal_security_auth_get_max_attempt(wrong_user_id, &max_attempt);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id to get max attempt (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id to get max attempt (" << ret << ")";
}
TEST_F(SECURITY_AUTH, StatusParams)
uid_t user_id = tzplatform_getuid(TZ_SYS_DEFAULT_USER);
ret = hal_security_auth_create_password_file(user_id, hal_security_auth_password_type_e::HAL_SECURITY_AUTH_PASSWORD_PIN);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to create password file for client (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to create password file for client (" << ret << ")";
ret = hal_security_auth_set_max_history_size(user_id, max_history_size);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set max history size (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set max history size (" << ret << ")";
ret = hal_security_auth_set_password(user_id, normal_password);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set password (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set password (" << ret << ")";
ret = hal_security_auth_is_password_active(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Wrong password active status (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Wrong password active status (" << ret << ")";
ret = hal_security_auth_is_history_active(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Wrong history active status (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Wrong history active status (" << ret << ")";
ret = hal_security_auth_is_history_active(wrong_user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id for history active status (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id for history active status (" << ret << ")";
ret = hal_security_auth_is_password_reused(user_id, reused_normal);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Wrong to check password reused status for a previously-used one (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Wrong to check password reused status for a previously-used one (" << ret << ")";
ret = hal_security_auth_is_password_reused(user_id, new_password);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_STATUS) << "Wrong password reused status for a new one (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_STATUS) << "Wrong password reused status for a new one (" << ret << ")";
ret = hal_security_auth_set_password(user_id,"");//null password is for inactive password status
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set password (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set password (" << ret << ")";
ret = hal_security_auth_is_password_active(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_STATUS) << "Wrong status for active password (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_STATUS) << "Wrong status for active password (" << ret << ")";
user_id = root_user;
ret = hal_security_auth_create_password_file(user_id, hal_security_auth_password_type_e::HAL_SECURITY_AUTH_PASSWORD_PIN);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to create password file for client (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to create password file for client (" << ret << ")";
ret = hal_security_auth_set_max_history_size(user_id, max_history_size);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set max history size (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set max history size (" << ret << ")";
ret = hal_security_auth_set_password(user_id, normal_password);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set password (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set password (" << ret << ")";
ret = hal_security_auth_is_password_active(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Wrong password active status (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Wrong password active status (" << ret << ")";
ret = hal_security_auth_is_history_active(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Wrong history active status (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Wrong history active status (" << ret << ")";
ret = hal_security_auth_is_history_active(wrong_user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_INPUT_PARAM) << "Wrong user id for history active status (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_INPUT_PARAM) << "Wrong user id for history active status (" << ret << ")";
ret = hal_security_auth_is_password_reused(user_id, reused_normal);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Wrong to check password reused status for a previously-used one (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Wrong to check password reused status for a previously-used one (" << ret << ")";
ret = hal_security_auth_is_password_reused(user_id, new_password);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_STATUS) << "Wrong password reused status for a new one (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_STATUS) << "Wrong password reused status for a new one (" << ret << ")";
ret = hal_security_auth_set_password(user_id,"");//null password is for inactive password status
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set password (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set password (" << ret << ")";
ret = hal_security_auth_is_password_active(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_STATUS) << "Wrong status for active password (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_STATUS) << "Wrong status for active password (" << ret << ")";
}
TEST_F(SECURITY_AUTH, LimitationParams)
hal_security_auth_password_type_e password_type;
ret = hal_security_auth_create_password_file(user_id, hal_security_auth_password_type_e::HAL_SECURITY_AUTH_PASSWORD_PATTERN);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to create password file for client (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to create password file for client (" << ret << ")";
time_t curTime = time(NULL);
unsigned int validSecs = (curTime + (expire_time_left_days * 86400));
ret = hal_security_auth_set_expire_time_left(user_id,validSecs);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed : set expire_time_left (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed : set expire_time_left (" << ret << ")";
unsigned int validLeftSecs = validSecs;
ret = hal_security_auth_get_expire_time_left(user_id,&expire_time_left_secs);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed : get expire_time_left (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed : get expire_time_left (" << ret << ")";
EXPECT_EQ((validLeftSecs <= (expire_time_left_secs+curTime)) && (validLeftSecs <= (expire_time_left_secs+curTime+1)),true) << "Failed : get expire time left (" << expire_time_left_secs << "),"
<< "(" << validLeftSecs << ")";
ret = hal_security_auth_check_expiration(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed : check expiration status (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed : check expiration status (" << ret << ")";
ret = hal_security_auth_check_attempt_exceeded(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed : check to attempt exceeded status (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed : check to attempt exceeded status (" << ret << ")";
sleep(1);
ret = hal_security_auth_is_ignore_period(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_PASSWORD_RETRY_TIMER) << "Failed : ignore period status (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_PASSWORD_RETRY_TIMER) << "Failed : ignore period status (" << ret << ")";
ret = hal_security_auth_get_password_type(user_id, &password_type);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to get password type (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to get password type (" << ret << ")";
EXPECT_EQ(password_type, HAL_SECURITY_AUTH_PASSWORD_PATTERN) << "Failed : Wrong password type (" << password_type << ")";
ret = hal_security_auth_set_max_history_size(user_id, 0);//0 is for inactive history
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set max history size (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set max history size (" << ret << ")";
user_id = root_user;
ret = hal_security_auth_create_password_file(user_id, hal_security_auth_password_type_e::HAL_SECURITY_AUTH_PASSWORD_PATTERN);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to create password file for client (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to create password file for client (" << ret << ")";
curTime = time(NULL);
validSecs = (curTime + (expire_time_left_days * 86400));
ret = hal_security_auth_set_expire_time_left(user_id,validSecs);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed : set expire_time_left (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed : set expire_time_left (" << ret << ")";
validLeftSecs = validSecs;
ret = hal_security_auth_get_expire_time_left(user_id,&expire_time_left_secs);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed : get expire_time_left (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed : get expire_time_left (" << ret << ")";
EXPECT_EQ((validLeftSecs <= (expire_time_left_secs+curTime)) && (validLeftSecs <= (expire_time_left_secs+curTime+1)),true) << "Failed : get expire time left (" << expire_time_left_secs << "),"
<< "(" << validLeftSecs << ")";
ret = hal_security_auth_check_expiration(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed : check expiration status (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed : check expiration status (" << ret << ")";
ret = hal_security_auth_check_attempt_exceeded(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed : check to attempt exceeded status (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed : check to attempt exceeded status (" << ret << ")";
sleep(1);
ret = hal_security_auth_is_ignore_period(user_id);
- EXPECT_EQ(ret, AUTH_PASSWD_API_ERROR_PASSWORD_RETRY_TIMER) << "Failed : ignore period status (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_PASSWORD_RETRY_TIMER) << "Failed : ignore period status (" << ret << ")";
ret = hal_security_auth_get_password_type(user_id, &password_type);
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to get password type (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to get password type (" << ret << ")";
EXPECT_EQ(password_type, HAL_SECURITY_AUTH_PASSWORD_PATTERN) << "Failed : Wrong password type (" << password_type << ")";
ret = hal_security_auth_set_max_history_size(user_id, 0);//0 is for inactive history
- EXPECT_EQ(ret, AUTH_PASSWD_API_SUCCESS) << "Failed to set max history size (" << ret << ")";
+ EXPECT_EQ(ret, HAL_SECURITY_AUTH_ERROR_NONE) << "Failed to set max history size (" << ret << ")";
}
\ No newline at end of file
return 0;
g_security_auth_funcs = calloc(1, sizeof(hal_backend_security_auth_funcs));
if (!g_security_auth_funcs)
- return -ENOMEM;
+ return HAL_SECURITY_AUTH_ERROR_OUT_OF_MEMORY;
ret = hal_common_get_backend(HAL_MODULE_SECURITY_AUTH, (void **)&g_security_auth_funcs);
if (ret < 0) {
free(g_security_auth_funcs);
g_security_auth_funcs = NULL;
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
}
return 0;
EXPORT int hal_security_auth_put_backend(void)
{
if (!g_security_auth_funcs)
- return -EINVAL;
+ return HAL_SECURITY_AUTH_ERROR_INPUT_PARAM;
hal_common_put_backend(HAL_MODULE_SECURITY_AUTH, (void *)g_security_auth_funcs);
EXPORT int hal_security_auth_create_password_file(uid_t user_id, hal_security_auth_password_type_e password_type)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->create_password_file(user_id, password_type);
}
EXPORT int hal_security_auth_write_memory_to_file(uid_t user_id)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->write_memory_to_file(user_id);
}
EXPORT int hal_security_auth_write_attempt_to_file(uid_t user_id)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->write_attempt_to_file(user_id);
}
EXPORT int hal_security_auth_set_password(uid_t user_id, const char* password)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->set_password(user_id, password);
}
EXPORT int hal_security_auth_check_password(uid_t user_id, const char* password)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->check_password(user_id, password);
}
EXPORT int hal_security_auth_set_max_history_size(uid_t user_id, unsigned int history_size)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->set_max_history_size(user_id, history_size);
}
EXPORT int hal_security_auth_get_max_history_size(uid_t user_id, unsigned int *history_size)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->get_max_history_size(user_id, history_size);
}
EXPORT int hal_security_auth_get_expire_time(uid_t user_id, unsigned int *expire_time)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->get_expire_time(user_id, expire_time);
}
EXPORT int hal_security_auth_set_expire_time(uid_t user_id, unsigned int expire_time)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->set_expire_time(user_id, expire_time);
}
EXPORT int hal_security_auth_get_expire_time_left(uid_t user_id, unsigned int *expire_time_left)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->get_expire_time_left(user_id, expire_time_left);
}
EXPORT int hal_security_auth_set_expire_time_left(uid_t user_id, unsigned int expire_time_left)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->set_expire_time_left(user_id, expire_time_left);
}
EXPORT int hal_security_auth_get_attempt(uid_t user_id, unsigned int *attempt)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->get_attempt(user_id, attempt);
}
EXPORT int hal_security_auth_reset_attempt(uid_t user_id)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->reset_attempt(user_id);
}
EXPORT int hal_security_auth_increment_attempt(uid_t user_id)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->increment_attempt(user_id);
}
EXPORT int hal_security_auth_get_max_attempt(uid_t user_id, unsigned int *max_attempt)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->get_max_attempt(user_id, max_attempt);
}
EXPORT int hal_security_auth_set_max_attempt(uid_t user_id, unsigned int max_attempt)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->set_max_attempt(user_id, max_attempt);
}
EXPORT int hal_security_auth_is_password_active(uid_t user_id)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->is_password_active(user_id);
}
EXPORT int hal_security_auth_is_password_reused(uid_t user_id, const char* password)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->is_password_reused(user_id, password);
}
EXPORT int hal_security_auth_check_expiration(uid_t user_id)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->check_expiration(user_id);
}
EXPORT int hal_security_auth_check_attempt_exceeded(uid_t user_id)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->check_attempt_exceeded(user_id);
}
EXPORT int hal_security_auth_is_ignore_period(uid_t user_id)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->is_ignore_period(user_id);
}
EXPORT int hal_security_auth_is_history_active(uid_t user_id)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->is_history_active(user_id);
}
EXPORT int hal_security_auth_get_password_type(uid_t user_id, hal_security_auth_password_type_e *password_type)
{
if (!g_security_auth_funcs)
- return -ENOTSUP;
+ return HAL_SECURITY_AUTH_ERROR_HAL_INIT_FAIL;
return g_security_auth_funcs->get_password_type(user_id, password_type);
}
\ No newline at end of file