Home
last modified time | relevance | path

Searched refs:sign (Results 1 - 14 of 14) sorted by relevance

/drivers/peripheral/user_auth/hdi_service/common/src/
H A Duser_sign_centre.c50 Buffer *sign = NULL; in UserAuthTokenHmac() local
54 ResultCode ret = HmacSha256(&key, &data, &sign); in UserAuthTokenHmac()
59 if (!CheckBufferWithSize(sign, SHA256_DIGEST_SIZE)) { in UserAuthTokenHmac()
64 if (memcpy_s(userAuthToken->sign, SHA256_DIGEST_SIZE, sign->buf, sign->contentSize) != EOK) { in UserAuthTokenHmac()
65 LOG_ERROR("sign copy failed"); in UserAuthTokenHmac()
71 DestoryBuffer(sign); in UserAuthTokenHmac()
134 const Buffer sign = GetTmpBuffer((uint8_t *)userAuthToken->sign, SHA256_DIGEST_SIZ in CheckUserAuthTokenHmac() local
[all...]
/drivers/peripheral/user_auth/hdi_service/adaptor/src/
H A Dadaptor_algorithm.c146 int32_t Ed25519Sign(const KeyPair *keyPair, const Buffer *data, Buffer **sign) in Ed25519Sign() argument
148 if (!IsEd25519KeyPairValid(keyPair) || !IsBufferValid(data) || sign == NULL) { in Ed25519Sign()
166 LOG_ERROR("init sign failed"); in Ed25519Sign()
169 *sign = CreateBufferBySize(ED25519_FIX_SIGN_BUFFER_SIZE); in Ed25519Sign()
170 if (!IsBufferValid(*sign)) { in Ed25519Sign()
174 size_t signSize = (*sign)->maxSize; in Ed25519Sign()
175 if (EVP_DigestSign(ctx, (*sign)->buf, &signSize, data->buf, data->contentSize) != OPENSSL_SUCCESS) { in Ed25519Sign()
176 LOG_ERROR("sign failed"); in Ed25519Sign()
177 DestoryBuffer(*sign); in Ed25519Sign()
178 *sign in Ed25519Sign()
190 Ed25519Verify(const Buffer *pubKey, const Buffer *data, const Buffer *sign) Ed25519Verify() argument
[all...]
/drivers/peripheral/user_auth/hdi_service/adaptor/inc/
H A Dadaptor_algorithm.h50 int32_t Ed25519Sign(const KeyPair *keyPair, const Buffer *data, Buffer **sign);
51 int32_t Ed25519Verify(const Buffer *pubKey, const Buffer *data, const Buffer *sign);
/drivers/peripheral/pin_auth/hdi_service/adaptor/src/
H A Dadaptor_algorithm.c137 int32_t Ed25519Sign(const KeyPair *keyPair, const Buffer *data, Buffer **sign) in Ed25519Sign() argument
139 if (!IsEd25519KeyPairValid(keyPair) || !IsBufferValid(data) || sign == NULL) { in Ed25519Sign()
157 LOG_ERROR("init sign fail"); in Ed25519Sign()
160 *sign = CreateBufferBySize(ED25519_FIX_SIGN_BUFFER_SIZE); in Ed25519Sign()
161 if (!IsBufferValid(*sign)) { in Ed25519Sign()
165 size_t signSize = (*sign)->maxSize; in Ed25519Sign()
166 if (EVP_DigestSign(ctx, (*sign)->buf, &signSize, data->buf, data->contentSize) != OPENSSL_SUCCESS) { in Ed25519Sign()
167 LOG_ERROR("sign fail"); in Ed25519Sign()
168 DestroyBuffer(*sign); in Ed25519Sign()
169 *sign in Ed25519Sign()
181 Ed25519Verify(const Buffer *pubKey, const Buffer *data, const Buffer *sign) Ed25519Verify() argument
[all...]
/drivers/peripheral/user_auth/hdi_service/key_mgr/src/
H A Dhmac_key.c100 ResultCode HmacVerify(const Buffer *data, const Buffer *sign, SignParam signParam) in HmacVerify() argument
102 if (signParam.keyType != KEY_TYPE_CROSS_DEVICE || !IsBufferValid(data) || !IsBufferValid(sign)) { in HmacVerify()
121 if (!CompareBuffer(rightSign, sign)) { in HmacVerify()
122 LOG_ERROR("sign compare failed"); in HmacVerify()
/drivers/peripheral/user_auth/hdi_service/key_mgr/inc/
H A Dhmac_key.h28 ResultCode HmacVerify(const Buffer *data, const Buffer *sign, SignParam signParam);
/drivers/peripheral/pin_auth/hdi_service/adaptor/inc/
H A Dadaptor_algorithm.h53 int32_t Ed25519Sign(const KeyPair *keyPair, const Buffer *data, Buffer **sign);
54 int32_t Ed25519Verify(const Buffer *pubKey, const Buffer *data, const Buffer *sign);
/drivers/hdf_core/framework/test/unittest/platform/virtual/
H A Dadc_linux_virtual_iio_driver.c104 .sign = 's',
119 .sign = 's',
/drivers/peripheral/user_auth/hdi_service/common/inc/
H A Duser_sign_centre.h60 uint8_t sign[SHA256_DIGEST_SIZE]; member
/drivers/hdf_core/framework/model/sensor/driver/common/include/
H A Dsensor_config_parser.h72 uint32_t sign[MAX_SENSOR_AXIS_NUM]; member
/drivers/peripheral/pin_auth/hdi_service/main/src/
H A Dexecutor_func_common.c120 Buffer *sign = NULL; in GetRootMsg() local
122 result = Ed25519Sign(keyPair, &dataBuf, &sign); in GetRootMsg()
139 result = SetBufferToAttribute(attribute, ATTR_SIGNATURE, sign); in GetRootMsg()
141 LOG_ERROR("set sign fail!"); in GetRootMsg()
152 DestroyBuffer(sign); in GetRootMsg()
257 LOG_ERROR("get data or sign buffer fail!"); in VerifyAndGetDataAttribute()
/drivers/hdf_core/framework/model/sensor/driver/common/src/
H A Dsensor_config_parser.c502 config->direction->sign[AXIS_X] = buf[index + SIGN_X_INDEX]; in ParseSensorDirection()
503 config->direction->sign[AXIS_Y] = buf[index + SIGN_Y_INDEX]; in ParseSensorDirection()
504 config->direction->sign[AXIS_Z] = buf[index + SIGN_Z_INDEX]; in ParseSensorDirection()
527 if (direction->sign[axis] == 0) { in SensorRawDataToRemapData()
/drivers/peripheral/user_auth/test/unittest/user_auth_test/
H A Duser_sign_centre_test.cpp105 .sign = DEFAULT_SIGN, in HWTEST_F()
/drivers/peripheral/user_auth/hdi_service/coauth/src/
H A Dexecutor_message.c55 LOG_ERROR("copy sign to signDtaTlv failed"); in SignData()
60 LOG_INFO("sign data success"); in SignData()
168 Buffer sign = GetTmpBuffer(signTlv.data, signTlv.len, signTlv.len); in Ed25519VerifyData() local
169 if (!IsBufferValid(publicKey) || !IsBufferValid(&data) || !IsBufferValid(&sign)) { in Ed25519VerifyData()
170 LOG_ERROR("data or sign is invalid"); in Ed25519VerifyData()
173 result = (ResultCode)Ed25519Verify(publicKey, &data, &sign); in Ed25519VerifyData()
175 LOG_ERROR("verify sign failed"); in Ed25519VerifyData()
204 Buffer sign = GetTmpBuffer(signTlv.data, signTlv.len, signTlv.len); in VerifyDataTlvSignature() local
205 result = HmacVerify(&data, &sign, signParam); in VerifyDataTlvSignature()

Completed in 8 milliseconds