/drivers/peripheral/user_auth/hdi_service/common/src/ |
H A D | user_sign_centre.c | 50 Buffer *sign = NULL; in UserAuthTokenHmac() local 54 ResultCode ret = HmacSha256(&key, &data, &sign); in UserAuthTokenHmac() 59 if (!CheckBufferWithSize(sign, SHA256_DIGEST_SIZE)) { in UserAuthTokenHmac() 64 if (memcpy_s(userAuthToken->sign, SHA256_DIGEST_SIZE, sign->buf, sign->contentSize) != EOK) { in UserAuthTokenHmac() 65 LOG_ERROR("sign copy failed"); in UserAuthTokenHmac() 71 DestoryBuffer(sign); in UserAuthTokenHmac() 134 const Buffer sign = GetTmpBuffer((uint8_t *)userAuthToken->sign, SHA256_DIGEST_SIZ in CheckUserAuthTokenHmac() local [all...] |
/drivers/peripheral/user_auth/hdi_service/adaptor/src/ |
H A D | adaptor_algorithm.c | 146 int32_t Ed25519Sign(const KeyPair *keyPair, const Buffer *data, Buffer **sign) in Ed25519Sign() argument 148 if (!IsEd25519KeyPairValid(keyPair) || !IsBufferValid(data) || sign == NULL) { in Ed25519Sign() 166 LOG_ERROR("init sign failed"); in Ed25519Sign() 169 *sign = CreateBufferBySize(ED25519_FIX_SIGN_BUFFER_SIZE); in Ed25519Sign() 170 if (!IsBufferValid(*sign)) { in Ed25519Sign() 174 size_t signSize = (*sign)->maxSize; in Ed25519Sign() 175 if (EVP_DigestSign(ctx, (*sign)->buf, &signSize, data->buf, data->contentSize) != OPENSSL_SUCCESS) { in Ed25519Sign() 176 LOG_ERROR("sign failed"); in Ed25519Sign() 177 DestoryBuffer(*sign); in Ed25519Sign() 178 *sign in Ed25519Sign() 190 Ed25519Verify(const Buffer *pubKey, const Buffer *data, const Buffer *sign) Ed25519Verify() argument [all...] |
/drivers/peripheral/user_auth/hdi_service/adaptor/inc/ |
H A D | adaptor_algorithm.h | 50 int32_t Ed25519Sign(const KeyPair *keyPair, const Buffer *data, Buffer **sign); 51 int32_t Ed25519Verify(const Buffer *pubKey, const Buffer *data, const Buffer *sign);
|
/drivers/peripheral/pin_auth/hdi_service/adaptor/src/ |
H A D | adaptor_algorithm.c | 137 int32_t Ed25519Sign(const KeyPair *keyPair, const Buffer *data, Buffer **sign) in Ed25519Sign() argument 139 if (!IsEd25519KeyPairValid(keyPair) || !IsBufferValid(data) || sign == NULL) { in Ed25519Sign() 157 LOG_ERROR("init sign fail"); in Ed25519Sign() 160 *sign = CreateBufferBySize(ED25519_FIX_SIGN_BUFFER_SIZE); in Ed25519Sign() 161 if (!IsBufferValid(*sign)) { in Ed25519Sign() 165 size_t signSize = (*sign)->maxSize; in Ed25519Sign() 166 if (EVP_DigestSign(ctx, (*sign)->buf, &signSize, data->buf, data->contentSize) != OPENSSL_SUCCESS) { in Ed25519Sign() 167 LOG_ERROR("sign fail"); in Ed25519Sign() 168 DestroyBuffer(*sign); in Ed25519Sign() 169 *sign in Ed25519Sign() 181 Ed25519Verify(const Buffer *pubKey, const Buffer *data, const Buffer *sign) Ed25519Verify() argument [all...] |
/drivers/peripheral/user_auth/hdi_service/key_mgr/src/ |
H A D | hmac_key.c | 100 ResultCode HmacVerify(const Buffer *data, const Buffer *sign, SignParam signParam) in HmacVerify() argument 102 if (signParam.keyType != KEY_TYPE_CROSS_DEVICE || !IsBufferValid(data) || !IsBufferValid(sign)) { in HmacVerify() 121 if (!CompareBuffer(rightSign, sign)) { in HmacVerify() 122 LOG_ERROR("sign compare failed"); in HmacVerify()
|
/drivers/peripheral/user_auth/hdi_service/key_mgr/inc/ |
H A D | hmac_key.h | 28 ResultCode HmacVerify(const Buffer *data, const Buffer *sign, SignParam signParam);
|
/drivers/peripheral/pin_auth/hdi_service/adaptor/inc/ |
H A D | adaptor_algorithm.h | 53 int32_t Ed25519Sign(const KeyPair *keyPair, const Buffer *data, Buffer **sign); 54 int32_t Ed25519Verify(const Buffer *pubKey, const Buffer *data, const Buffer *sign);
|
/drivers/hdf_core/framework/test/unittest/platform/virtual/ |
H A D | adc_linux_virtual_iio_driver.c | 104 .sign = 's', 119 .sign = 's',
|
/drivers/peripheral/user_auth/hdi_service/common/inc/ |
H A D | user_sign_centre.h | 60 uint8_t sign[SHA256_DIGEST_SIZE]; member
|
/drivers/hdf_core/framework/model/sensor/driver/common/include/ |
H A D | sensor_config_parser.h | 72 uint32_t sign[MAX_SENSOR_AXIS_NUM]; member
|
/drivers/peripheral/pin_auth/hdi_service/main/src/ |
H A D | executor_func_common.c | 120 Buffer *sign = NULL; in GetRootMsg() local 122 result = Ed25519Sign(keyPair, &dataBuf, &sign); in GetRootMsg() 139 result = SetBufferToAttribute(attribute, ATTR_SIGNATURE, sign); in GetRootMsg() 141 LOG_ERROR("set sign fail!"); in GetRootMsg() 152 DestroyBuffer(sign); in GetRootMsg() 257 LOG_ERROR("get data or sign buffer fail!"); in VerifyAndGetDataAttribute()
|
/drivers/hdf_core/framework/model/sensor/driver/common/src/ |
H A D | sensor_config_parser.c | 502 config->direction->sign[AXIS_X] = buf[index + SIGN_X_INDEX]; in ParseSensorDirection() 503 config->direction->sign[AXIS_Y] = buf[index + SIGN_Y_INDEX]; in ParseSensorDirection() 504 config->direction->sign[AXIS_Z] = buf[index + SIGN_Z_INDEX]; in ParseSensorDirection() 527 if (direction->sign[axis] == 0) { in SensorRawDataToRemapData()
|
/drivers/peripheral/user_auth/test/unittest/user_auth_test/ |
H A D | user_sign_centre_test.cpp | 105 .sign = DEFAULT_SIGN, in HWTEST_F()
|
/drivers/peripheral/user_auth/hdi_service/coauth/src/ |
H A D | executor_message.c | 55 LOG_ERROR("copy sign to signDtaTlv failed"); in SignData() 60 LOG_INFO("sign data success"); in SignData() 168 Buffer sign = GetTmpBuffer(signTlv.data, signTlv.len, signTlv.len); in Ed25519VerifyData() local 169 if (!IsBufferValid(publicKey) || !IsBufferValid(&data) || !IsBufferValid(&sign)) { in Ed25519VerifyData() 170 LOG_ERROR("data or sign is invalid"); in Ed25519VerifyData() 173 result = (ResultCode)Ed25519Verify(publicKey, &data, &sign); in Ed25519VerifyData() 175 LOG_ERROR("verify sign failed"); in Ed25519VerifyData() 204 Buffer sign = GetTmpBuffer(signTlv.data, signTlv.len, signTlv.len); in VerifyDataTlvSignature() local 205 result = HmacVerify(&data, &sign, signParam); in VerifyDataTlvSignature()
|