Lines Matching refs:isOk

157     ASSERT_TRUE(credentialStore_->createCredential(docType, testCredential, &wc).isOk());  in provisionData()
164 .isOk()); in provisionData()
168 ASSERT_TRUE(wc->setExpectedProofOfProvisioningSize(proofOfProvisioningSize).isOk()); in provisionData()
183 ASSERT_TRUE(wc->addAccessControlProfile(0, cert_A, false, 0, 0, &sacp0_).isOk()); in provisionData()
186 ASSERT_TRUE(wc->addAccessControlProfile(1, cert_B, false, 0, 0, &sacp1_).isOk()); in provisionData()
189 ASSERT_TRUE(wc->addAccessControlProfile(2, cert_C, false, 0, 0, &sacp2_).isOk()); in provisionData()
192 ASSERT_TRUE(wc->addAccessControlProfile(3, {}, false, 0, 0, &sacp3_).isOk()); in provisionData()
195 ASSERT_TRUE(wc->beginAddEntry({0}, "ns", "Accessible by A", 1).isOk()); in provisionData()
196 ASSERT_TRUE(wc->addEntryValue({9}, &encContentAccessibleByA_).isOk()); in provisionData()
199 ASSERT_TRUE(wc->beginAddEntry({0, 1}, "ns", "Accessible by A or B", 1).isOk()); in provisionData()
200 ASSERT_TRUE(wc->addEntryValue({9}, &encContentAccessibleByAorB_).isOk()); in provisionData()
203 ASSERT_TRUE(wc->beginAddEntry({1}, "ns", "Accessible by B", 1).isOk()); in provisionData()
204 ASSERT_TRUE(wc->addEntryValue({9}, &encContentAccessibleByB_).isOk()); in provisionData()
207 ASSERT_TRUE(wc->beginAddEntry({2}, "ns", "Accessible by C", 1).isOk()); in provisionData()
208 ASSERT_TRUE(wc->addEntryValue({9}, &encContentAccessibleByC_).isOk()); in provisionData()
211 ASSERT_TRUE(wc->beginAddEntry({3}, "ns", "Accessible by All", 1).isOk()); in provisionData()
212 ASSERT_TRUE(wc->addEntryValue({9}, &encContentAccessibleByAll_).isOk()); in provisionData()
215 ASSERT_TRUE(wc->beginAddEntry({}, "ns", "Accessible by None", 1).isOk()); in provisionData()
216 ASSERT_TRUE(wc->addEntryValue({9}, &encContentAccessibleByNone_).isOk()); in provisionData()
219 ASSERT_TRUE(wc->finishAddingEntries(&credentialData_, &proofOfProvisioningSignature).isOk()); in provisionData()
247 .isOk()); in retrieveData()
252 ASSERT_TRUE(c->setReaderEphemeralPublicKey(readerEPublicKey.value()).isOk()); in retrieveData()
255 ASSERT_TRUE(c->createEphemeralKeyPair(&eKeyPair).isOk()); in retrieveData()
311 ASSERT_TRUE(c->generateSigningKeyPair(&signingKeyBlob, &signingKeyCertificate).isOk()); in retrieveData()
322 c->setRequestedNamespaces({rns}).isOk(); in retrieveData()
345 ASSERT_TRUE(status.isOk()); in retrieveData()
347 ASSERT_FALSE(status.isOk()); in retrieveData()
354 if (status.isOk()) { in retrieveData()
356 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByA_, &decrypted).isOk()); in retrieveData()
360 if (status.isOk()) { in retrieveData()
362 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByAorB_, &decrypted).isOk()); in retrieveData()
366 if (status.isOk()) { in retrieveData()
368 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByB_, &decrypted).isOk()); in retrieveData()
372 if (status.isOk()) { in retrieveData()
374 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByC_, &decrypted).isOk()); in retrieveData()
378 if (status.isOk()) { in retrieveData()
380 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByAll_, &decrypted).isOk()); in retrieveData()
384 if (status.isOk()) { in retrieveData()
386 ASSERT_TRUE(c->retrieveEntryValue(encContentAccessibleByNone_, &decrypted).isOk()); in retrieveData()
391 ASSERT_TRUE(c->finishRetrieval(&mac, &deviceNameSpaces).isOk()); in retrieveData()
500 .isOk()); in TEST_P()
505 ASSERT_TRUE(c->setReaderEphemeralPublicKey(readerEPublicKey.value()).isOk()); in TEST_P()
508 ASSERT_TRUE(c->createEphemeralKeyPair(&eKeyPair).isOk()); in TEST_P()
554 ASSERT_TRUE(c->generateSigningKeyPair(&signingKeyBlob, &signingKeyCertificate).isOk()); in TEST_P()
565 c->setRequestedNamespaces({rns}).isOk(); in TEST_P()
591 ASSERT_FALSE(status.isOk()); in TEST_P()