/base/security/device_auth/frameworks/deviceauth_lite/test/fuzztest/dellocalauthinfo_fuzzer/ |
H A D | dellocalauthinfo_fuzzer.cpp | 70 hc_auth_id authId; in DelLocalaAuthInfoFuzz() local 71 if (memset_s(&authId, sizeof(authId), 0, sizeof(authId)) != EOK) { in DelLocalaAuthInfoFuzz() 74 authId.length = size > HC_AUTH_ID_BUFF_LEN ? HC_AUTH_ID_BUFF_LEN : size; in DelLocalaAuthInfoFuzz() 75 if (memcpy_s(authId.auth_id, HC_AUTH_ID_BUFF_LEN, data, authId.length) != EOK) { in DelLocalaAuthInfoFuzz() 78 hc_user_info userInfo = {authId, 1}; in DelLocalaAuthInfoFuzz()
|
/base/security/device_auth/frameworks/deviceauth_lite/test/fuzztest/listtrustpeer_fuzzer/ |
H A D | listtrustpeer_fuzzer.cpp | 81 hc_auth_id authId; in ListTrustPeerFuzz() local 82 if (memset_s(&authId, sizeof(authId), 0, sizeof(authId)) != EOK) { in ListTrustPeerFuzz() 85 authId.length = size > HC_AUTH_ID_BUFF_LEN ? HC_AUTH_ID_BUFF_LEN : size; in ListTrustPeerFuzz() 86 if (memcpy_s(authId.auth_id, HC_AUTH_ID_BUFF_LEN, data, authId.length) != EOK) { in ListTrustPeerFuzz() 89 list_trust_peers(handle, 0, &authId, &peerAuthidList); in ListTrustPeerFuzz()
|
/base/security/device_auth/services/frameworks/src/module/ |
H A D | dev_auth_module_manager.c | 46 static bool IsParamsForDasTokenManagerValid(const char *pkgName, const char *serviceType, Uint8Buff *authId, in IsParamsForDasTokenManagerValid() argument 53 if (pkgName == NULL || serviceType == NULL || authId == NULL || authId->val == NULL) { in IsParamsForDasTokenManagerValid() 58 if (HcStrlen(pkgName) == 0 || HcStrlen(serviceType) == 0 || authId->length == 0) { in IsParamsForDasTokenManagerValid() 71 if (!IsParamsForDasTokenManagerValid(moduleParams->pkgName, moduleParams->serviceType, moduleParams->authId, in RegisterLocalIdentity() 86 .authId = { moduleParams->authId->val, moduleParams->authId->length }, in RegisterLocalIdentity() 99 if (!IsParamsForDasTokenManagerValid(moduleParams->pkgName, moduleParams->serviceType, moduleParams->authId, in UnregisterLocalIdentity() 114 .authId in UnregisterLocalIdentity() [all...] |
/base/security/huks/test/reliability/src/ |
H A D | api_pressure_test.cpp | 475 void ImportKeyTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet); 476 void ExportPublicKeyTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet); 478 void GetKeyParamSetTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet); 479 void KeyExistTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet); 481 void SignTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet, const struct HksBlob *message); 482 void VerifyTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet, const struct HksBlob *message, 484 void EncryptTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet); 485 void DecryptTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet, 487 void AgreeKeyTest(const struct HksBlob *authId); 488 void DeriveKeyTest(const struct HksBlob *authId, cons 544 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; GenerateKeyTest() local 557 ImportKeyTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet) ImportKeyTest() argument 572 ExportPublicKeyTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet) ExportPublicKeyTest() argument 594 struct HksBlob authId = { .size = (uint32_t)key.length(), .data = (uint8_t *)&key[0] }; DeleteKeyTest() local 608 GetKeyParamSetTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet) GetKeyParamSetTest() argument 629 KeyExistTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet) KeyExistTest() argument 641 struct HksBlob authId = { .size = RANDOM_KEY_SIZE, .data = (uint8_t *)HksMalloc(RANDOM_KEY_SIZE) }; GenerateRandomTest() local 663 SignTest( const struct HksBlob *authId, const struct HksParamSet *paramInSet, const struct HksBlob *message) SignTest() argument 677 VerifyTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet, const struct HksBlob *message, const struct HksBlob *signature) VerifyTest() argument 688 EncryptTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet) EncryptTest() argument 705 DecryptTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet, const struct HksBlob *cipherText, uint32_t *inLen) DecryptTest() argument 719 AgreeKeyTest(const struct HksBlob *authId) AgreeKeyTest() argument 749 DeriveKeyTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet) DeriveKeyTest() argument 762 MacTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet) MacTest() argument 803 struct HksBlob authId = { .size = (uint32_t)key.length(), .data = (uint8_t *)&key[0] }; CipherScene() local 848 struct HksBlob authId = { .size = (uint32_t)key.length(), .data = (uint8_t *)&key[0] }; SignScene() local 881 struct HksBlob authId = { .size = (uint32_t)key.length(), .data = (uint8_t *)&key[0] }; AgreeScene() local 997 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 1011 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 1041 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 1092 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 1122 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 1173 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 1212 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 1256 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 1299 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 1351 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 1387 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 1436 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local [all...] |
H A D | pressure_test.cpp | 75 int32_t LocalHksGenerate(const uint32_t keyLen, const struct HksBlob *authId, const struct HksParamSet *paramSetIn, 79 int32_t PressureTest::LocalHksGenerate(const uint32_t keyLen, const struct HksBlob *authId, in LocalHksGenerate() argument 95 if (HksGenerateKey(authId, paramSetIn, paramOutSet) != HKS_SUCCESS) { in LocalHksGenerate() 185 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; in HWTEST_F() local 199 int32_t ret = HksGenerateKey(&authId, paramInSet, NULL); in HWTEST_F() 204 HksDeleteKey(&authId, paramInSet); in HWTEST_F() 218 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; in HWTEST_F() local 230 HksGenerateKey(&authId, paramInSet, NULL); in HWTEST_F() 234 HksExportPublicKey(&authId, paramInSet, &pubKey); in HWTEST_F() 245 HksDeleteKey(&authId, paramInSe in HWTEST_F() 259 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 299 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 331 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 376 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 414 struct HksBlob authId = { .size = TEST_KEY_SIZE, .data = (uint8_t *)HksMalloc(TEST_KEY_SIZE) }; HWTEST_F() local 447 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 495 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 544 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 602 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 664 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 725 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 785 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 866 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 914 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 970 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 1026 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 1086 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 1151 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local 1212 struct HksBlob authId = { .size = TEST_KEY_SIZE, .data = (uint8_t *)HksMalloc(TEST_KEY_SIZE) }; HWTEST_F() local 1256 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local [all...] |
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/asymmetric_alg_test/ |
H A D | hks_export_test_mt.cpp | 40 struct HksBlob authId = { strlen(keyAliasString), (uint8_t *)keyAliasString };
member 51 ret = HksGenerateKeyForDe(&authId, paramInSet, nullptr);
in RunTestCase() 93 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS);
in HWTEST_F() 108 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS);
in HWTEST_F() 121 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS);
in HWTEST_F() 136 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS);
in HWTEST_F() 154 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS);
in HWTEST_F() 170 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS);
in HWTEST_F() 183 EXPECT_EQ(HksExportPublicKeyForDe(&authId, nullptr, &publicKey), HKS_ERROR_INSUFFICIENT_DATA);
in HWTEST_F() 185 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullpt in HWTEST_F() [all...] |
/base/security/device_auth/test/fuzztest/authenticators/account_unrelated/pake/standardexchangetask_fuzzer/ |
H A D | standardexchangetask_fuzzer.cpp | 67 uint8_t authId[AUTH_ID_LENGTH] = { 0 }; in StandardExchangeTaskTest003() local 68 (void)memcpy_s(authId, AUTH_ID_LENGTH, TEST_AUTH_ID.c_str(), AUTH_ID_LENGTH); in StandardExchangeTaskTest003() 69 pakeParams.baseParams.idSelf.val = authId; in StandardExchangeTaskTest003() 129 uint8_t authId[AUTH_ID_LENGTH] = { 0 }; in StandardExchangeTaskTest004() local 130 (void)memcpy_s(authId, AUTH_ID_LENGTH, TEST_AUTH_ID.c_str(), AUTH_ID_LENGTH); in StandardExchangeTaskTest004() 131 pakeParams.baseParams.idSelf.val = authId; in StandardExchangeTaskTest004()
|
/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | standard_exchange_task_test.cpp | 75 uint8_t authId[AUTH_ID_LENGTH] = { 0 }; in HWTEST_F() local 76 (void)memcpy_s(authId, AUTH_ID_LENGTH, TEST_AUTH_ID.c_str(), AUTH_ID_LENGTH); in HWTEST_F() 77 pakeParams.baseParams.idSelf.val = authId; in HWTEST_F() 127 uint8_t authId[AUTH_ID_LENGTH] = { 0 }; in HWTEST_F() local 128 (void)memcpy_s(authId, AUTH_ID_LENGTH, TEST_AUTH_ID.c_str(), AUTH_ID_LENGTH); in HWTEST_F() 129 pakeParams.baseParams.idSelf.val = authId; in HWTEST_F()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_task_common.c | 142 const char *authId = GetStringFromJson(in, FIELD_SELF_AUTH_ID); in FillAuthId() local 143 if (authId == NULL) { in FillAuthId() 144 LOGE("Get self authId failed."); in FillAuthId() 147 uint32_t authIdLen = HcStrlen(authId); in FillAuthId() 149 LOGE("Invalid self authId length: %d.", authIdLen); in FillAuthId() 158 if (memcpy_s(params->baseParams.idSelf.val, params->baseParams.idSelf.length, authId, HcStrlen(authId)) != EOK) { in FillAuthId() 164 authId = GetStringFromJson(in, FIELD_PEER_AUTH_ID); in FillAuthId() 165 if (authId == NULL) { in FillAuthId() 166 LOGE("Get peer authId faile in FillAuthId() [all...] |
/base/security/huks/services/huks_standard/huks_engine/main/core/src/ |
H A D | hks_auth.c | 27 uint32_t authId; member 157 int32_t HksAuth(uint32_t authId, const struct HksKeyNode *keyNode, const struct HksParamSet *paramSet) in HksAuth() argument 172 if (authId == g_authPolicyList[i].authId) { in HksAuth() 179 int32_t HksThreeStageAuth(uint32_t authId, const struct HuksKeyNode *keyNode) in HksThreeStageAuth() argument 182 if (authId == g_authPolicyList[i].authId) { in HksThreeStageAuth()
|
/base/security/huks/services/huks_standard/huks_engine/main/core/include/ |
H A D | hks_auth.h | 42 int32_t HksAuth(uint32_t authId, const struct HksKeyNode *keyNode, const struct HksParamSet *paramSet); 44 int32_t HksThreeStageAuth(uint32_t authId, const struct HuksKeyNode *keyNode);
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/ |
H A D | das_lite_token_manager.c | 29 Uint8Buff authIdBuff = { params->authId.val, params->authId.length }; in UnregisterLocalIdentityLite() 57 Uint8Buff authIdBuff = { params->authId.val, params->authId.length }; in DeletePeerAuthInfoLite()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/common/ |
H A D | das_task_common.c | 202 const Uint8Buff *authId, Uint8Buff *keyAliasHash) in CombineKeyAlias() 206 keyAliasBuff.length = serviceId->length + authId->length + keyType->length; in CombineKeyAlias() 229 if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, authId->val, authId->length) != EOK) { in CombineKeyAlias() 230 LOGE("Copy authId failed."); in CombineKeyAlias() 290 const Uint8Buff *authId, Uint8Buff *outKeyAlias) in CombineKeyAliasForIso() 295 int32_t res = CombineKeyAlias(serviceId, keyType, authId, outKeyAlias); in CombineKeyAliasForIso() 304 const Uint8Buff *authId, Uint8Buff *outKeyAlias) in CombineKeyAliasForPake() 319 res = CombineKeyAlias(serviceId, keyType, authId, &keyAliasHash); in CombineKeyAliasForPake() 348 const KeyAliasType keyType, const Uint8Buff *authId, Uint8Buf in GenerateKeyAlias() 201 CombineKeyAlias(const Uint8Buff *serviceId, const Uint8Buff *keyType, const Uint8Buff *authId, Uint8Buff *keyAliasHash) CombineKeyAlias() argument 289 CombineKeyAliasForIso(const Uint8Buff *serviceId, const Uint8Buff *keyType, const Uint8Buff *authId, Uint8Buff *outKeyAlias) CombineKeyAliasForIso() argument 303 CombineKeyAliasForPake(const Uint8Buff *serviceId, const Uint8Buff *keyType, const Uint8Buff *authId, Uint8Buff *outKeyAlias) CombineKeyAliasForPake() argument 347 GenerateKeyAlias(const Uint8Buff *pkgName, const Uint8Buff *serviceType, const KeyAliasType keyType, const Uint8Buff *authId, Uint8Buff *outKeyAlias) GenerateKeyAlias() argument [all...] |
/base/security/device_auth/services/session_manager/src/session/v1/compatible_bind_sub_session/ |
H A D | compatible_bind_sub_session_common.c | 143 static int32_t CheckAuthIdAndUserTypeValid(int32_t osAccountId, int userType, const char *groupId, const char *authId) in CheckAuthIdAndUserTypeValid() argument 165 const char *oriAuthId = StringGet(&deviceInfo->authId); in CheckAuthIdAndUserTypeValid() 166 if ((deviceInfo->devType != userType) || ((oriAuthId != NULL) && (strcmp(oriAuthId, authId) != 0))) { in CheckAuthIdAndUserTypeValid() 167 LOGE("Once a group is created, the service cannot change the local authId and userType used in the group!"); in CheckAuthIdAndUserTypeValid() 184 const char *authId = GetStringFromJson(jsonParams, FIELD_DEVICE_ID); in AddAuthIdAndUserTypeIfValidOrDefault() local 186 if (authId == NULL) { in AddAuthIdAndUserTypeIfValidOrDefault() 187 LOGI("authId is not found, use udid by default!"); in AddAuthIdAndUserTypeIfValidOrDefault() 193 authId = udid; in AddAuthIdAndUserTypeIfValidOrDefault() 195 int32_t result = CheckAuthIdAndUserTypeValid(osAccountId, userType, groupId, authId); in AddAuthIdAndUserTypeIfValidOrDefault() 203 if (AddStringToJson(params, FIELD_AUTH_ID, authId) ! in AddAuthIdAndUserTypeIfValidOrDefault() 418 const char *authId = GetStringFromJson(session->params, FIELD_AUTH_ID); AddGroupAndDevInfoToParams() local 540 const char *authId = GetStringFromJson(session->params, FIELD_AUTH_ID); AddDevInfoToSendData() local [all...] |
/base/security/device_auth/services/identity_manager/src/ |
H A D | credential_operator.c | 66 const Uint8Buff *serviceId, const Uint8Buff *keyType, const Uint8Buff *authId, Uint8Buff *keyAliasHash) in CombineKeyAlias() 70 keyAliasBuff.length = serviceId->length + authId->length + keyType->length; in CombineKeyAlias() 90 if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, authId->val, authId->length) != EOK) { in CombineKeyAlias() 91 LOGE("Copy authId failed."); in CombineKeyAlias() 106 const Uint8Buff *serviceId, const Uint8Buff *keyType, const Uint8Buff *authId, Uint8Buff *outKeyAlias) in CombineKeyAliasForPake() 121 res = CombineKeyAlias(serviceId, keyType, authId, &keyAliasHash); in CombineKeyAliasForPake() 150 const char *pkgName, const char *serviceType, const char *authId, int keyAliasType, Uint8Buff *outKeyAlias) in GenerateKeyAliasInner() 154 CHECK_PTR_RETURN_ERROR_CODE(authId, "authId"); in GenerateKeyAliasInner() 65 CombineKeyAlias( const Uint8Buff *serviceId, const Uint8Buff *keyType, const Uint8Buff *authId, Uint8Buff *keyAliasHash) CombineKeyAlias() argument 105 CombineKeyAliasForPake( const Uint8Buff *serviceId, const Uint8Buff *keyType, const Uint8Buff *authId, Uint8Buff *outKeyAlias) CombineKeyAliasForPake() argument 149 GenerateKeyAliasInner( const char *pkgName, const char *serviceType, const char *authId, int keyAliasType, Uint8Buff *outKeyAlias) GenerateKeyAliasInner() argument 312 PackPublicKeyToJson( CJson *out, int32_t osAccountId, int32_t keyType, const char *authId, const char *serviceType) PackPublicKeyToJson() argument [all...] |
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/ |
H A D | hks_rsa_common_mt.cpp | 166 struct HksBlob authId = { in EncryptServiceTestCase() local 202 EXPECT_EQ(HksImportKey(&authId, paramInSet, &x509Key), HKS_SUCCESS); in EncryptServiceTestCase() 206 EXPECT_EQ(HksEncrypt(&authId, paramInSet, &plainText, &cipherText), testCaseParams.encryptResult); in EncryptServiceTestCase() 221 (void)HksDeleteKey(&authId, nullptr); in EncryptServiceTestCase() 294 struct HksBlob authId = { in DecryptServiceTestCase() local 309 EXPECT_EQ(HksGenerateKey(&authId, paramInSet, paramSetOut), HKS_SUCCESS); in DecryptServiceTestCase() 313 EXPECT_EQ(HksExportPublicKey(&authId, paramInSet, &opensslRsaKeyInfo), HKS_SUCCESS); in DecryptServiceTestCase() 338 EXPECT_EQ(HksDecrypt(&authId, paramInSet, &cipherText, &decryptedText), testCaseParams.decryptResult); in DecryptServiceTestCase() 346 (void)HksDeleteKey(&authId, nullptr); in DecryptServiceTestCase() 420 struct HksBlob authId in SignServiceTestCase() local 542 struct HksBlob authId = { VerifyServiceTestCase() local [all...] |
H A D | hks_hmac_mt.cpp | 291 void LocalHmacScenario(int32_t scenario, struct HksBlob *authId, const TestCaseParams &testCaseParams, in LocalHmacScenario() argument 310 EXPECT_EQ(HksGenerateKey(authId, paramInSet, paramOutSet), testCaseParams.generateKeyResult); in LocalHmacScenario() 312 EXPECT_EQ(HmacGenerateKey(HMAC_KEY_SIZE, authId), testCaseParams.generateKeyResult); in LocalHmacScenario() 329 HKS_FREE(authId->data); in LocalHmacScenario() 340 struct HksBlob authId = { (uint32_t)strlen(HMAC_KEY), (uint8_t *)HMAC_KEY }; in RunTestCase() local 357 LocalHmacScenario(scenario, &authId, testCaseParams, &macForHuks, &message); in RunTestCase() 359 EXPECT_EQ(HksGenerateKey(&authId, paramInSet, NULL), testCaseParams.generateKeyResult); in RunTestCase() 360 EXPECT_EQ(HksMac(&authId, paramInSet, &message, &macForHuks), testCaseParams.hmacResult); in RunTestCase() 363 (void)HksDeleteKey(&authId, nullptr); in RunTestCase()
|
/base/security/device_auth/services/session_manager/inc/session/v2/auth_sub_session/protocol_lib/ |
H A D | iso_protocol.h | 24 Uint8Buff authId; member
|
H A D | dl_speke_protocol.h | 31 Uint8Buff authId; member
|
H A D | ec_speke_protocol.h | 30 Uint8Buff authId; member
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/ |
H A D | iso_task_common.c | 342 const char *authId = GetStringFromJson(in, FIELD_SELF_AUTH_ID); in FillAuthId() local 343 if (authId == NULL) { in FillAuthId() 344 LOGE("get self authId failed"); in FillAuthId() 347 uint32_t authIdLen = HcStrlen(authId); in FillAuthId() 359 authId, HcStrlen(authId)) != EOK) { in FillAuthId() 368 authId = GetStringFromJson(in, FIELD_PEER_AUTH_ID); in FillAuthId() 369 if (authId == NULL) { in FillAuthId() 370 LOGE("get peer authId failed"); in FillAuthId() 373 authIdLen = HcStrlen(authId); in FillAuthId() 620 Uint8Buff authId = { NULL, 0 }; GenerateKeyAliasInIso() local [all...] |
/base/security/device_auth/services/session_manager/inc/session/v2/expand_sub_session/expand_process_lib/ |
H A D | save_trusted_info.h | 30 const char *authId; member
|
H A D | pub_key_exchange.h | 27 Uint8Buff authId; member
|
H A D | auth_code_import.h | 27 Uint8Buff authId; member
|
/base/security/device_auth/services/legacy/authenticators/inc/account_unrelated/ |
H A D | das_token_manager.h | 26 Uint8Buff authId; member
|