if (child == NULL) {
SAFE_DELETE(tlv->val);
SAFE_DELETE(tlv);
+ SAFE_DELETE(authInfo->__meta);
SAFE_DELETE(authInfo);
return NULL;
SAFE_DELETE(tlv);
if (foundMember == false) {
+ SAFE_DELETE(authInfo->__meta);
free(authInfo);
return NULL;
}
_INFO("GetInfoRespTlvEncoder::encode 11");
Buffer *metaBuff = __authMetaTlvEncoder.encode(auth->__meta);
+ RET_IF_FAIL(metaBuff != NULL, NULL);
if (metaBuff != NULL) {
_INFO("GetInfoRespTlvEncoder::encode 12");
/*1.4.3 TAG_AUTHENTICATOR_METADATA*/
regAssertionKrdBuff->data = getRegAssertionKrdTlv->val;
tlv_builder_add_buffer(builder, TAG_UAFV1_KRD, regAssertionKrdBuff);
SAFE_DELETE(regAssertionKrdBuff);
+ SAFE_DELETE(regAssertionKrdBuff);
SAFE_DELETE(getRegAssertionKrdTlv);
}
if (child == NULL) {
SAFE_DELETE(root->val);
SAFE_DELETE(root);
+ SAFE_DELETE(getRegAssertionInfo->krd);
+ SAFE_DELETE(getRegAssertionInfo->attFull);
+ SAFE_DELETE(getRegAssertionInfo->attSur);
SAFE_DELETE(getRegAssertionInfo);
return NULL;
_INFO("");
if (foundMember == false) {
_INFO("");
+ SAFE_DELETE(getRegAssertionInfo->attFull);
+ SAFE_DELETE(getRegAssertionInfo->attSur);
free(getRegAssertionInfo);
return NULL;
}
Buffer *buff = tlv_builder_get_buffer(builder);
SAFE_DELETE(builder);
+ SAFE_DELETE(getRegAssertionBuff);
return buff;
}
if (child == NULL) {
SAFE_DELETE(root->val);
SAFE_DELETE(root);
+ SAFE_DELETE(getRegRespInfo->regAssertion);
SAFE_DELETE(getRegRespInfo);
return NULL;
_INFO("");
if (foundMember == false) {
_INFO("");
+ SAFE_DELETE(getRegRespInfo->regAssertion);
free(getRegRespInfo);
return NULL;
}
if (child == NULL) {
SAFE_DELETE(root->val);
SAFE_DELETE(root);
+ SAFE_DELETE(getAuthAssInfo->sigData);
SAFE_DELETE(getAuthAssInfo);
return NULL;
SAFE_DELETE(root);
if (foundMember == false) {
+ SAFE_DELETE(getAuthAssInfo->sigData);
free(getAuthAssInfo);
return NULL;
}
if (child == NULL) {
SAFE_DELETE(root->val);
SAFE_DELETE(root);
+ SAFE_DELETE(getAuthRespInfo->authAssertion);
SAFE_DELETE(getAuthRespInfo);
return NULL;
SAFE_DELETE(root);
if (foundMember == false) {
+ SAFE_DELETE(getAuthRespInfo->authAssertion);
free(getAuthRespInfo);
return NULL;
}
if (child == NULL) {
SAFE_DELETE(root->val);
SAFE_DELETE(root);
+
+ SAFE_DELETE(getSigDataInfo->assrtInfo);
SAFE_DELETE(getSigDataInfo);
return NULL;
SAFE_DELETE(root);
if (foundMember == false) {
+
+ SAFE_DELETE(getSigDataInfo->assrtInfo);
free(getSigDataInfo);
return NULL;
}
{
if (builder->stack == NULL)
return NULL;
-
+ RET_IF_FAIL(val != NULL, NULL);
+ RET_IF_FAIL(builder != NULL, NULL);
tlv_s *node = ALLOC(tlv_s);
node->tag = tag;
node->len = val->len;
if (child == NULL) {
SAFE_DELETE(root->val);
SAFE_DELETE(root);
+ SAFE_DELETE(getKrdInfo->counter);
+ SAFE_DELETE(getKrdInfo->assrtInfo);
SAFE_DELETE(getKrdInfo);
return NULL;
SAFE_DELETE(root);
if (foundMember == false) {
+ SAFE_DELETE(getKrdInfo->counter);
+ SAFE_DELETE(getKrdInfo->assrtInfo);
free(getKrdInfo);
return NULL;
}
auth_plugin_handle_s *auth_plugin = (auth_plugin_handle_s*)
calloc(1, sizeof(auth_plugin_handle_s));
-
+ RET_IF_FAIL(auth_plugin != NULL, -1);
auth_plugin->conn = createConnectionHandle(mod);
auth_plugin->assrt = createAssertionHandle(mod);
auth_plugin->hash = createHashHandle(mod);
const std::string& dbName = parcel->getDBName();
sqlite3* dbHandle = openDBHandle(dbName);
RET_IF_FAIL(dbHandle != NULL, NULL);
-
-
+ char *sql = NULL;
+ int ret = 0;
std::vector<IStorageParcel*> *resultList = new std::vector<IStorageParcel*>();
char *errMsg = NULL;
cbData.resList = resultList;
_INFO("AsmStorage::searchData:: query = [%s]", query);
- sqlite3_mprintf(execquery, query);
- int ret = sqlite3_exec(dbHandle, execquery, searchItemCb, &cbData, &errMsg);
+ sql = sqlite3_mprintf(execquery, query);
+ CATCH_IF_FAIL(sql == NULL);
+
+
+ ret = sqlite3_exec(dbHandle, execquery, searchItemCb, &cbData, &errMsg);
_INFO("AsmStorage::searchData:: ERROR MSG : [%s]", errMsg);
CATCH_IF_FAIL(ret == SQLITE_OK);
_INFO("Records found = [%zd]", resultList->size());
closeDBHandle(dbHandle);
-
+ sqlite3_free(sql);
SAFE_DELETE(cbData.dbName);
return resultList;
_ERR("No Records found");
sqlite3_free(errMsg);
closeDBHandle(dbHandle);
-
+ sqlite3_free(sql);
SAFE_DELETE(cbData.dbName);
return NULL;
char *errMsg = NULL;
char q[BUFFLEN] = {0};
char *value = NULL;
+ char *sql = NULL;
char execquery[BUFFLEN] = {0};
char query[BUFFLEN] = {0};
RET_IF_FAIL(parcel != NULL, SQLITE_ERROR);
_ERR("AUTHLIST does not allow deletion of entries");
goto CATCH;
}
- sqlite3_mprintf(execquery, query);
+ sql = sqlite3_mprintf(execquery, query);
+ CATCH_IF_FAIL(sql == NULL);
ret = sqlite3_exec(dbHandle, execquery, NULL, 0, &errMsg);
_INFO("AsmStorage::deleteData:: ERROR MSG : [%s]", errMsg);
CATCH_IF_FAIL(ret == SQLITE_OK);
numRecChanged = sqlite3_changes(dbHandle);
_INFO("Number of rows deleted=[%d]", numRecChanged);
closeDBHandle(dbHandle);
+ sqlite3_free(sql);
return SQLITE_OK;
CATCH:
_ERR("Record not deleted/ Record does not exists");
sqlite3_free(errMsg);
closeDBHandle(dbHandle);
+ sqlite3_free(sql);
return SQLITE_ERROR;
}
std::string callerId = FIDO_BT_RAGENT_SVC_PATH;
_INFO("Roaming Agent request");
+ /*TODO: Define a macro in spec file to let the platform/profile SCM decide*/
+ /*
if (RoamingUtil::isRASupported() == false) {
_ERR("RA feature not supported");
fidoasm_complete_ra_request(__dbusObj, invocation, -1, ASM_RESP_ACCESS_DENIED);
return true;
- }
+ }*/
req = RoamingUtil::createAuthReq(tlvReqB64);
if (req == NULL) {
_INFO("Key Handle Parameters : [%s][%s][%s]", user_name, pri_key, khA);
UserNameKeyHandle *ukhInfoNew = ALLOC(UserNameKeyHandle);
+ RET_IF_FAIL(ukhInfoNew != NULL, NULL);
ukhInfoNew->userName = user_name;
user_name = NULL;
ukhInfoNew->kh = ALLOC(Buffer);
+ RET_IF_FAIL(ukhInfoNew->kh != NULL, NULL);
ukhInfoNew->kh->data = NALLOC(BIG_STRING_SIZE, uint8_t);
+ RET_IF_FAIL(ukhInfoNew->kh->data != NULL, NULL);
ukhInfoNew->kh->len = strlen((char*)khStr);
memcpy(ukhInfoNew->kh->data, khStr, strlen((char*)khStr));