Searched refs:pkInfoSignature (Results 1 - 10 of 10) sorted by relevance
/base/security/device_auth/services/identity_manager/src/ |
H A D | cert_operation.c | 121 if (AddByteToJson(out, FIELD_PK_INFO_SIGNATURE, certInfo->pkInfoSignature.val, in AddCertInfoToJson() 122 certInfo->pkInfoSignature.length) != HC_SUCCESS) { in AddCertInfoToJson() 271 &keyParams, &certInfo->pkInfoStr, certInfo->signAlg, &certInfo->pkInfoSignature); in VerifyPeerCertInfo() 354 int32_t GenerateCertInfo(const Uint8Buff *pkInfoStr, const Uint8Buff *pkInfoSignature, CertInfo *certInfo) in GenerateCertInfo() argument 369 uint32_t signatureLen = pkInfoSignature->length; in GenerateCertInfo() 370 certInfo->pkInfoSignature.val = (uint8_t *)HcMalloc(signatureLen, 0); in GenerateCertInfo() 371 if (certInfo->pkInfoSignature.val == NULL) { in GenerateCertInfo() 372 LOGE("Failed to alloc pkInfoSignature memory!"); in GenerateCertInfo() 376 if (memcpy_s(certInfo->pkInfoSignature.val, signatureLen, pkInfoSignature in GenerateCertInfo() [all...] |
H A D | identity_common.c | 161 FreeBuffData(&info->proof.certInfo.pkInfoSignature); in DestroyIdentityInfo()
|
/base/security/device_auth/services/legacy/authenticators/inc/account_related/creds_manager/ |
H A D | asy_token_manager.h | 34 Uint8Buff pkInfoSignature; member
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/creds_manager/ |
H A D | asy_token_manager.c | 157 if (GetByteFromJson(tokenJson, FIELD_PK_INFO_SIGNATURE, token->pkInfoSignature.val, in GenerateTokenFromJson() 158 token->pkInfoSignature.length) != HC_SUCCESS) { in GenerateTokenFromJson() 159 LOGE("Get pkInfoSignature failed"); in GenerateTokenFromJson() 163 token->pkInfoSignature.length = HcStrlen(signatureStr) / BYTE_TO_HEX_OPER_LENGTH; in GenerateTokenFromJson() 293 if (AddByteToJson(tokenJson, FIELD_PK_INFO_SIGNATURE, token->pkInfoSignature.val, in GenerateJsonFromToken() 294 token->pkInfoSignature.length) != HC_SUCCESS) { in GenerateJsonFromToken() 295 LOGE("Add pkInfoSignature to json failed"); in GenerateJsonFromToken() 496 LOGE("Verify pkInfoSignature failed"); in DoImportServerPkAndVerify() 510 LOGE("get pkInfoSignature fail"); in VerifySignature() 537 LOGE("Verify pkInfoSignature faile in VerifySignature() [all...] |
/base/security/device_auth/services/identity_manager/inc/ |
H A D | identity_defines.h | 97 Uint8Buff pkInfoSignature; member
|
/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | identity_manager_test.cpp | 37 extern "C" int32_t GenerateCertInfo(const Uint8Buff *pkInfoStr, const Uint8Buff *pkInfoSignature, CertInfo *certInfo); 81 info.pkInfoSignature.val = testSignature; in HWTEST_F() 82 info.pkInfoSignature.length = TEST_SIGNATURE_LEN; in HWTEST_F()
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_task_common.c | 381 if (memcpy_s(params->pkInfoSignSelf.val, params->pkInfoSignSelf.length, token->pkInfoSignature.val, in GetAsyPubKeyInfo() 382 token->pkInfoSignature.length) != EOK) { in GetAsyPubKeyInfo() 386 params->pkInfoSignSelf.length = token->pkInfoSignature.length; in GetAsyPubKeyInfo()
|
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/creds_manager/ |
H A D | creds_manager_test.cpp | 566 certInfo->pkInfoSignature.val = (uint8_t *)HcMalloc(token->pkInfoSignature.length, 0); in GetCertInfo() 567 ASSERT_NE(certInfo->pkInfoSignature.val, nullptr); in GetCertInfo() 568 certInfo->pkInfoSignature.length = token->pkInfoSignature.length; in GetCertInfo() 569 (void)memcpy_s(certInfo->pkInfoSignature.val, certInfo->pkInfoSignature.length, token->pkInfoSignature.val, in GetCertInfo() 570 token->pkInfoSignature.length); in GetCertInfo() 1944 HcFree(certInfo.pkInfoSignature in HWTEST_F() [all...] |
/base/security/device_auth/test/fuzztest/creds_manager/credsmanager_fuzzer/ |
H A D | credsmanager_fuzzer.cpp | 552 certInfo->pkInfoSignature.val = reinterpret_cast<uint8_t *>(HcMalloc(token->pkInfoSignature.length, 0)); in GetCertInfo() 553 certInfo->pkInfoSignature.length = token->pkInfoSignature.length; in GetCertInfo() 554 (void)memcpy_s(certInfo->pkInfoSignature.val, certInfo->pkInfoSignature.length, token->pkInfoSignature.val, in GetCertInfo() 555 token->pkInfoSignature.length); in GetCertInfo() 1821 HcFree(certInfo.pkInfoSignature.val); in CredsManagerTest64()
|
/base/security/device_auth/services/session_manager/src/session/v2/ |
H A D | dev_session_v2.c | 532 if (AddByteToJson(credInfo, FIELD_PK_INFO_SIGNATURE, cred->proof.certInfo.pkInfoSignature.val, in AddCertCredInfo() 533 cred->proof.certInfo.pkInfoSignature.length) != HC_SUCCESS) { in AddCertCredInfo() 534 LOGE("add pkInfoSignature to json fail."); in AddCertCredInfo() 593 if (InitUint8Buff(&peerCert->pkInfoSignature, pkInfoSignatureLen) != HC_SUCCESS) { in BuildPeerCertInfo() 594 LOGE("allocate pkInfoSignature memory fail."); in BuildPeerCertInfo() 598 if (HexStringToByte(pkInfoSignHexStr, peerCert->pkInfoSignature.val, in BuildPeerCertInfo() 599 peerCert->pkInfoSignature.length) != HC_SUCCESS) { in BuildPeerCertInfo() 600 LOGE("get pkInfoSignature from json fail."); in BuildPeerCertInfo() 602 ClearFreeUint8Buff(&peerCert->pkInfoSignature); in BuildPeerCertInfo() 611 ClearFreeUint8Buff(&certInfo->pkInfoSignature); in DestroyCertInfo() [all...] |
Completed in 13 milliseconds