Home
last modified time | relevance | path

Searched refs:authId (Results 1 - 25 of 75) sorted by relevance

123

/base/security/device_auth/frameworks/deviceauth_lite/test/fuzztest/dellocalauthinfo_fuzzer/
H A Ddellocalauthinfo_fuzzer.cpp70 hc_auth_id authId; in DelLocalaAuthInfoFuzz() local
71 if (memset_s(&authId, sizeof(authId), 0, sizeof(authId)) != EOK) { in DelLocalaAuthInfoFuzz()
74 authId.length = size > HC_AUTH_ID_BUFF_LEN ? HC_AUTH_ID_BUFF_LEN : size; in DelLocalaAuthInfoFuzz()
75 if (memcpy_s(authId.auth_id, HC_AUTH_ID_BUFF_LEN, data, authId.length) != EOK) { in DelLocalaAuthInfoFuzz()
78 hc_user_info userInfo = {authId, 1}; in DelLocalaAuthInfoFuzz()
/base/security/device_auth/frameworks/deviceauth_lite/test/fuzztest/listtrustpeer_fuzzer/
H A Dlisttrustpeer_fuzzer.cpp81 hc_auth_id authId; in ListTrustPeerFuzz() local
82 if (memset_s(&authId, sizeof(authId), 0, sizeof(authId)) != EOK) { in ListTrustPeerFuzz()
85 authId.length = size > HC_AUTH_ID_BUFF_LEN ? HC_AUTH_ID_BUFF_LEN : size; in ListTrustPeerFuzz()
86 if (memcpy_s(authId.auth_id, HC_AUTH_ID_BUFF_LEN, data, authId.length) != EOK) { in ListTrustPeerFuzz()
89 list_trust_peers(handle, 0, &authId, &peerAuthidList); in ListTrustPeerFuzz()
/base/security/device_auth/services/frameworks/src/module/
H A Ddev_auth_module_manager.c46 static bool IsParamsForDasTokenManagerValid(const char *pkgName, const char *serviceType, Uint8Buff *authId, in IsParamsForDasTokenManagerValid() argument
53 if (pkgName == NULL || serviceType == NULL || authId == NULL || authId->val == NULL) { in IsParamsForDasTokenManagerValid()
58 if (HcStrlen(pkgName) == 0 || HcStrlen(serviceType) == 0 || authId->length == 0) { in IsParamsForDasTokenManagerValid()
71 if (!IsParamsForDasTokenManagerValid(moduleParams->pkgName, moduleParams->serviceType, moduleParams->authId, in RegisterLocalIdentity()
86 .authId = { moduleParams->authId->val, moduleParams->authId->length }, in RegisterLocalIdentity()
99 if (!IsParamsForDasTokenManagerValid(moduleParams->pkgName, moduleParams->serviceType, moduleParams->authId, in UnregisterLocalIdentity()
114 .authId in UnregisterLocalIdentity()
[all...]
/base/security/huks/test/reliability/src/
H A Dapi_pressure_test.cpp475 void ImportKeyTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet);
476 void ExportPublicKeyTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet);
478 void GetKeyParamSetTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet);
479 void KeyExistTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet);
481 void SignTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet, const struct HksBlob *message);
482 void VerifyTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet, const struct HksBlob *message,
484 void EncryptTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet);
485 void DecryptTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet,
487 void AgreeKeyTest(const struct HksBlob *authId);
488 void DeriveKeyTest(const struct HksBlob *authId, cons
544 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; GenerateKeyTest() local
557 ImportKeyTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet) ImportKeyTest() argument
572 ExportPublicKeyTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet) ExportPublicKeyTest() argument
594 struct HksBlob authId = { .size = (uint32_t)key.length(), .data = (uint8_t *)&key[0] }; DeleteKeyTest() local
608 GetKeyParamSetTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet) GetKeyParamSetTest() argument
629 KeyExistTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet) KeyExistTest() argument
641 struct HksBlob authId = { .size = RANDOM_KEY_SIZE, .data = (uint8_t *)HksMalloc(RANDOM_KEY_SIZE) }; GenerateRandomTest() local
663 SignTest( const struct HksBlob *authId, const struct HksParamSet *paramInSet, const struct HksBlob *message) SignTest() argument
677 VerifyTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet, const struct HksBlob *message, const struct HksBlob *signature) VerifyTest() argument
688 EncryptTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet) EncryptTest() argument
705 DecryptTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet, const struct HksBlob *cipherText, uint32_t *inLen) DecryptTest() argument
719 AgreeKeyTest(const struct HksBlob *authId) AgreeKeyTest() argument
749 DeriveKeyTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet) DeriveKeyTest() argument
762 MacTest(const struct HksBlob *authId, const struct HksParamSet *paramInSet) MacTest() argument
803 struct HksBlob authId = { .size = (uint32_t)key.length(), .data = (uint8_t *)&key[0] }; CipherScene() local
848 struct HksBlob authId = { .size = (uint32_t)key.length(), .data = (uint8_t *)&key[0] }; SignScene() local
881 struct HksBlob authId = { .size = (uint32_t)key.length(), .data = (uint8_t *)&key[0] }; AgreeScene() local
997 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
1011 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
1041 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
1092 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
1122 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
1173 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
1212 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
1256 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
1299 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
1351 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
1387 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
1436 struct HksBlob authId = { (uint32_t)strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
[all...]
H A Dpressure_test.cpp75 int32_t LocalHksGenerate(const uint32_t keyLen, const struct HksBlob *authId, const struct HksParamSet *paramSetIn,
79 int32_t PressureTest::LocalHksGenerate(const uint32_t keyLen, const struct HksBlob *authId, in LocalHksGenerate() argument
95 if (HksGenerateKey(authId, paramSetIn, paramOutSet) != HKS_SUCCESS) { in LocalHksGenerate()
185 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; in HWTEST_F() local
199 int32_t ret = HksGenerateKey(&authId, paramInSet, NULL); in HWTEST_F()
204 HksDeleteKey(&authId, paramInSet); in HWTEST_F()
218 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; in HWTEST_F() local
230 HksGenerateKey(&authId, paramInSet, NULL); in HWTEST_F()
234 HksExportPublicKey(&authId, paramInSet, &pubKey); in HWTEST_F()
245 HksDeleteKey(&authId, paramInSe in HWTEST_F()
259 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
299 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
331 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
376 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
414 struct HksBlob authId = { .size = TEST_KEY_SIZE, .data = (uint8_t *)HksMalloc(TEST_KEY_SIZE) }; HWTEST_F() local
447 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
495 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
544 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
602 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
664 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
725 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
785 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
866 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
914 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
970 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
1026 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
1086 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
1151 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
1212 struct HksBlob authId = { .size = TEST_KEY_SIZE, .data = (uint8_t *)HksMalloc(TEST_KEY_SIZE) }; HWTEST_F() local
1256 struct HksBlob authId = { strlen(GENERATE_KEY), (uint8_t *)GENERATE_KEY }; HWTEST_F() local
[all...]
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/asymmetric_alg_test/
H A Dhks_export_test_mt.cpp40 struct HksBlob authId = { strlen(keyAliasString), (uint8_t *)keyAliasString }; member
51 ret = HksGenerateKeyForDe(&authId, paramInSet, nullptr); in RunTestCase()
93 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS); in HWTEST_F()
108 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS); in HWTEST_F()
121 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS); in HWTEST_F()
136 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS); in HWTEST_F()
154 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS); in HWTEST_F()
170 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullptr), HKS_SUCCESS); in HWTEST_F()
183 EXPECT_EQ(HksExportPublicKeyForDe(&authId, nullptr, &publicKey), HKS_ERROR_INSUFFICIENT_DATA); in HWTEST_F()
185 EXPECT_EQ(HksDeleteKeyForDe(&authId, nullpt in HWTEST_F()
[all...]
/base/security/device_auth/test/fuzztest/authenticators/account_unrelated/pake/standardexchangetask_fuzzer/
H A Dstandardexchangetask_fuzzer.cpp67 uint8_t authId[AUTH_ID_LENGTH] = { 0 }; in StandardExchangeTaskTest003() local
68 (void)memcpy_s(authId, AUTH_ID_LENGTH, TEST_AUTH_ID.c_str(), AUTH_ID_LENGTH); in StandardExchangeTaskTest003()
69 pakeParams.baseParams.idSelf.val = authId; in StandardExchangeTaskTest003()
129 uint8_t authId[AUTH_ID_LENGTH] = { 0 }; in StandardExchangeTaskTest004() local
130 (void)memcpy_s(authId, AUTH_ID_LENGTH, TEST_AUTH_ID.c_str(), AUTH_ID_LENGTH); in StandardExchangeTaskTest004()
131 pakeParams.baseParams.idSelf.val = authId; in StandardExchangeTaskTest004()
/base/security/device_auth/test/unittest/deviceauth/source/
H A Dstandard_exchange_task_test.cpp75 uint8_t authId[AUTH_ID_LENGTH] = { 0 }; in HWTEST_F() local
76 (void)memcpy_s(authId, AUTH_ID_LENGTH, TEST_AUTH_ID.c_str(), AUTH_ID_LENGTH); in HWTEST_F()
77 pakeParams.baseParams.idSelf.val = authId; in HWTEST_F()
127 uint8_t authId[AUTH_ID_LENGTH] = { 0 }; in HWTEST_F() local
128 (void)memcpy_s(authId, AUTH_ID_LENGTH, TEST_AUTH_ID.c_str(), AUTH_ID_LENGTH); in HWTEST_F()
129 pakeParams.baseParams.idSelf.val = authId; in HWTEST_F()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/
H A Dpake_task_common.c142 const char *authId = GetStringFromJson(in, FIELD_SELF_AUTH_ID); in FillAuthId() local
143 if (authId == NULL) { in FillAuthId()
144 LOGE("Get self authId failed."); in FillAuthId()
147 uint32_t authIdLen = HcStrlen(authId); in FillAuthId()
149 LOGE("Invalid self authId length: %d.", authIdLen); in FillAuthId()
158 if (memcpy_s(params->baseParams.idSelf.val, params->baseParams.idSelf.length, authId, HcStrlen(authId)) != EOK) { in FillAuthId()
164 authId = GetStringFromJson(in, FIELD_PEER_AUTH_ID); in FillAuthId()
165 if (authId == NULL) { in FillAuthId()
166 LOGE("Get peer authId faile in FillAuthId()
[all...]
/base/security/huks/services/huks_standard/huks_engine/main/core/src/
H A Dhks_auth.c27 uint32_t authId; member
157 int32_t HksAuth(uint32_t authId, const struct HksKeyNode *keyNode, const struct HksParamSet *paramSet) in HksAuth() argument
172 if (authId == g_authPolicyList[i].authId) { in HksAuth()
179 int32_t HksThreeStageAuth(uint32_t authId, const struct HuksKeyNode *keyNode) in HksThreeStageAuth() argument
182 if (authId == g_authPolicyList[i].authId) { in HksThreeStageAuth()
/base/security/huks/services/huks_standard/huks_engine/main/core/include/
H A Dhks_auth.h42 int32_t HksAuth(uint32_t authId, const struct HksKeyNode *keyNode, const struct HksParamSet *paramSet);
44 int32_t HksThreeStageAuth(uint32_t authId, const struct HuksKeyNode *keyNode);
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/
H A Ddas_lite_token_manager.c29 Uint8Buff authIdBuff = { params->authId.val, params->authId.length }; in UnregisterLocalIdentityLite()
57 Uint8Buff authIdBuff = { params->authId.val, params->authId.length }; in DeletePeerAuthInfoLite()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/common/
H A Ddas_task_common.c202 const Uint8Buff *authId, Uint8Buff *keyAliasHash) in CombineKeyAlias()
206 keyAliasBuff.length = serviceId->length + authId->length + keyType->length; in CombineKeyAlias()
229 if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, authId->val, authId->length) != EOK) { in CombineKeyAlias()
230 LOGE("Copy authId failed."); in CombineKeyAlias()
290 const Uint8Buff *authId, Uint8Buff *outKeyAlias) in CombineKeyAliasForIso()
295 int32_t res = CombineKeyAlias(serviceId, keyType, authId, outKeyAlias); in CombineKeyAliasForIso()
304 const Uint8Buff *authId, Uint8Buff *outKeyAlias) in CombineKeyAliasForPake()
319 res = CombineKeyAlias(serviceId, keyType, authId, &keyAliasHash); in CombineKeyAliasForPake()
348 const KeyAliasType keyType, const Uint8Buff *authId, Uint8Buf in GenerateKeyAlias()
201 CombineKeyAlias(const Uint8Buff *serviceId, const Uint8Buff *keyType, const Uint8Buff *authId, Uint8Buff *keyAliasHash) CombineKeyAlias() argument
289 CombineKeyAliasForIso(const Uint8Buff *serviceId, const Uint8Buff *keyType, const Uint8Buff *authId, Uint8Buff *outKeyAlias) CombineKeyAliasForIso() argument
303 CombineKeyAliasForPake(const Uint8Buff *serviceId, const Uint8Buff *keyType, const Uint8Buff *authId, Uint8Buff *outKeyAlias) CombineKeyAliasForPake() argument
347 GenerateKeyAlias(const Uint8Buff *pkgName, const Uint8Buff *serviceType, const KeyAliasType keyType, const Uint8Buff *authId, Uint8Buff *outKeyAlias) GenerateKeyAlias() argument
[all...]
/base/security/device_auth/services/session_manager/src/session/v1/compatible_bind_sub_session/
H A Dcompatible_bind_sub_session_common.c143 static int32_t CheckAuthIdAndUserTypeValid(int32_t osAccountId, int userType, const char *groupId, const char *authId) in CheckAuthIdAndUserTypeValid() argument
165 const char *oriAuthId = StringGet(&deviceInfo->authId); in CheckAuthIdAndUserTypeValid()
166 if ((deviceInfo->devType != userType) || ((oriAuthId != NULL) && (strcmp(oriAuthId, authId) != 0))) { in CheckAuthIdAndUserTypeValid()
167 LOGE("Once a group is created, the service cannot change the local authId and userType used in the group!"); in CheckAuthIdAndUserTypeValid()
184 const char *authId = GetStringFromJson(jsonParams, FIELD_DEVICE_ID); in AddAuthIdAndUserTypeIfValidOrDefault() local
186 if (authId == NULL) { in AddAuthIdAndUserTypeIfValidOrDefault()
187 LOGI("authId is not found, use udid by default!"); in AddAuthIdAndUserTypeIfValidOrDefault()
193 authId = udid; in AddAuthIdAndUserTypeIfValidOrDefault()
195 int32_t result = CheckAuthIdAndUserTypeValid(osAccountId, userType, groupId, authId); in AddAuthIdAndUserTypeIfValidOrDefault()
203 if (AddStringToJson(params, FIELD_AUTH_ID, authId) ! in AddAuthIdAndUserTypeIfValidOrDefault()
418 const char *authId = GetStringFromJson(session->params, FIELD_AUTH_ID); AddGroupAndDevInfoToParams() local
540 const char *authId = GetStringFromJson(session->params, FIELD_AUTH_ID); AddDevInfoToSendData() local
[all...]
/base/security/device_auth/services/identity_manager/src/
H A Dcredential_operator.c66 const Uint8Buff *serviceId, const Uint8Buff *keyType, const Uint8Buff *authId, Uint8Buff *keyAliasHash) in CombineKeyAlias()
70 keyAliasBuff.length = serviceId->length + authId->length + keyType->length; in CombineKeyAlias()
90 if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, authId->val, authId->length) != EOK) { in CombineKeyAlias()
91 LOGE("Copy authId failed."); in CombineKeyAlias()
106 const Uint8Buff *serviceId, const Uint8Buff *keyType, const Uint8Buff *authId, Uint8Buff *outKeyAlias) in CombineKeyAliasForPake()
121 res = CombineKeyAlias(serviceId, keyType, authId, &keyAliasHash); in CombineKeyAliasForPake()
150 const char *pkgName, const char *serviceType, const char *authId, int keyAliasType, Uint8Buff *outKeyAlias) in GenerateKeyAliasInner()
154 CHECK_PTR_RETURN_ERROR_CODE(authId, "authId"); in GenerateKeyAliasInner()
65 CombineKeyAlias( const Uint8Buff *serviceId, const Uint8Buff *keyType, const Uint8Buff *authId, Uint8Buff *keyAliasHash) CombineKeyAlias() argument
105 CombineKeyAliasForPake( const Uint8Buff *serviceId, const Uint8Buff *keyType, const Uint8Buff *authId, Uint8Buff *outKeyAlias) CombineKeyAliasForPake() argument
149 GenerateKeyAliasInner( const char *pkgName, const char *serviceType, const char *authId, int keyAliasType, Uint8Buff *outKeyAlias) GenerateKeyAliasInner() argument
312 PackPublicKeyToJson( CJson *out, int32_t osAccountId, int32_t keyType, const char *authId, const char *serviceType) PackPublicKeyToJson() argument
[all...]
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/
H A Dhks_rsa_common_mt.cpp166 struct HksBlob authId = { in EncryptServiceTestCase() local
202 EXPECT_EQ(HksImportKey(&authId, paramInSet, &x509Key), HKS_SUCCESS); in EncryptServiceTestCase()
206 EXPECT_EQ(HksEncrypt(&authId, paramInSet, &plainText, &cipherText), testCaseParams.encryptResult); in EncryptServiceTestCase()
221 (void)HksDeleteKey(&authId, nullptr); in EncryptServiceTestCase()
294 struct HksBlob authId = { in DecryptServiceTestCase() local
309 EXPECT_EQ(HksGenerateKey(&authId, paramInSet, paramSetOut), HKS_SUCCESS); in DecryptServiceTestCase()
313 EXPECT_EQ(HksExportPublicKey(&authId, paramInSet, &opensslRsaKeyInfo), HKS_SUCCESS); in DecryptServiceTestCase()
338 EXPECT_EQ(HksDecrypt(&authId, paramInSet, &cipherText, &decryptedText), testCaseParams.decryptResult); in DecryptServiceTestCase()
346 (void)HksDeleteKey(&authId, nullptr); in DecryptServiceTestCase()
420 struct HksBlob authId in SignServiceTestCase() local
542 struct HksBlob authId = { VerifyServiceTestCase() local
[all...]
H A Dhks_hmac_mt.cpp291 void LocalHmacScenario(int32_t scenario, struct HksBlob *authId, const TestCaseParams &testCaseParams, in LocalHmacScenario() argument
310 EXPECT_EQ(HksGenerateKey(authId, paramInSet, paramOutSet), testCaseParams.generateKeyResult); in LocalHmacScenario()
312 EXPECT_EQ(HmacGenerateKey(HMAC_KEY_SIZE, authId), testCaseParams.generateKeyResult); in LocalHmacScenario()
329 HKS_FREE(authId->data); in LocalHmacScenario()
340 struct HksBlob authId = { (uint32_t)strlen(HMAC_KEY), (uint8_t *)HMAC_KEY }; in RunTestCase() local
357 LocalHmacScenario(scenario, &authId, testCaseParams, &macForHuks, &message); in RunTestCase()
359 EXPECT_EQ(HksGenerateKey(&authId, paramInSet, NULL), testCaseParams.generateKeyResult); in RunTestCase()
360 EXPECT_EQ(HksMac(&authId, paramInSet, &message, &macForHuks), testCaseParams.hmacResult); in RunTestCase()
363 (void)HksDeleteKey(&authId, nullptr); in RunTestCase()
/base/security/device_auth/services/session_manager/inc/session/v2/auth_sub_session/protocol_lib/
H A Diso_protocol.h24 Uint8Buff authId; member
H A Ddl_speke_protocol.h31 Uint8Buff authId; member
H A Dec_speke_protocol.h30 Uint8Buff authId; member
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/
H A Diso_task_common.c342 const char *authId = GetStringFromJson(in, FIELD_SELF_AUTH_ID); in FillAuthId() local
343 if (authId == NULL) { in FillAuthId()
344 LOGE("get self authId failed"); in FillAuthId()
347 uint32_t authIdLen = HcStrlen(authId); in FillAuthId()
359 authId, HcStrlen(authId)) != EOK) { in FillAuthId()
368 authId = GetStringFromJson(in, FIELD_PEER_AUTH_ID); in FillAuthId()
369 if (authId == NULL) { in FillAuthId()
370 LOGE("get peer authId failed"); in FillAuthId()
373 authIdLen = HcStrlen(authId); in FillAuthId()
620 Uint8Buff authId = { NULL, 0 }; GenerateKeyAliasInIso() local
[all...]
/base/security/device_auth/services/session_manager/inc/session/v2/expand_sub_session/expand_process_lib/
H A Dsave_trusted_info.h30 const char *authId; member
H A Dpub_key_exchange.h27 Uint8Buff authId; member
H A Dauth_code_import.h27 Uint8Buff authId; member
/base/security/device_auth/services/legacy/authenticators/inc/account_unrelated/
H A Ddas_token_manager.h26 Uint8Buff authId; member

Completed in 13 milliseconds

123