Home
last modified time | relevance | path

Searched refs:inputData (Results 1 - 11 of 11) sorted by relevance

/base/security/device_auth/services/session_manager/inc/session/v2/
H A Ddev_session_util.h27 int32_t FillPeerAuthIdIfNeeded(bool isClient, const CJson *context, CJson *inputData);
30 int32_t SetPeerInfoToContext(CJson *context, const CJson *inputData);
32 int32_t CheckPeerPkInfoForPdid(const CJson *context, const CJson *inputData);
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/
H A Ddl_speke_protocol.c101 int32_t (*stateProcessFunc)(DlSpekeProtocol *impl, const CJson *inputData, CJson **outputData);
134 static int32_t GetAuthIdPeerFromInput(const CJson *inputData, DlSpekeParams *params, bool isClient) in GetAuthIdPeerFromInput() argument
136 const char *authIdPeerStr = isClient ? GetStringFromJson(inputData, FIELD_AUTH_ID_SERVER) : in GetAuthIdPeerFromInput()
137 GetStringFromJson(inputData, FIELD_AUTH_ID_CLIENT); in GetAuthIdPeerFromInput()
139 LOGE("get authIdPeerStr from inputData fail."); in GetAuthIdPeerFromInput()
158 static int32_t GetSaltFromInput(const CJson *inputData, DlSpekeParams *params) in GetSaltFromInput() argument
164 if (GetByteFromJson(inputData, FIELD_SALT, params->salt.val, params->salt.length) != HC_SUCCESS) { in GetSaltFromInput()
165 LOGE("get salt from inputData fail."); in GetSaltFromInput()
171 static int32_t GetEpkPeerFromInput(const CJson *inputData, DlSpekeParams *params, bool isClient) in GetEpkPeerFromInput() argument
173 const char *epkPeerStr = isClient ? GetStringFromJson(inputData, FIELD_EPK_SERVE in GetEpkPeerFromInput()
190 GetKcfDataPeerFromInput(const CJson *inputData, DlSpekeParams *params, bool isClient) GetKcfDataPeerFromInput() argument
204 DlSpekeClientStartReq(DlSpekeProtocol *impl, const CJson *inputData, CJson **outputData) DlSpekeClientStartReq() argument
210 SetSelfKeyLenByMod(const CJson *inputData, DlSpekeParams *params) SetSelfKeyLenByMod() argument
233 DlSpekeServerStartRspParseEvent(const CJson *inputData, DlSpekeParams *params) DlSpekeServerStartRspParseEvent() argument
726 DlSpekeServerStartRsp(DlSpekeProtocol *impl, const CJson *inputData, CJson **outputData) DlSpekeServerStartRsp() argument
739 DlSpekeClientFinishReqParseEvent(const CJson *inputData, DlSpekeParams *params) DlSpekeClientFinishReqParseEvent() argument
811 DlSpekeClientFinishReq(DlSpekeProtocol *impl, const CJson *inputData, CJson **outputData) DlSpekeClientFinishReq() argument
828 DlSpekeServerFinishRspParseEvent(const CJson *inputData, DlSpekeParams *params) DlSpekeServerFinishRspParseEvent() argument
880 DlSpekeServerFinishRsp(DlSpekeProtocol *impl, const CJson *inputData, CJson **outputData) DlSpekeServerFinishRsp() argument
893 DlSpekeClientFinishParseEvent(const CJson *inputData, DlSpekeParams *params) DlSpekeClientFinishParseEvent() argument
907 DlSpekeClientFinish(DlSpekeProtocol *impl, const CJson *inputData, CJson **outputData) DlSpekeClientFinish() argument
945 ThrowException(DlSpekeProtocol *impl, const CJson *inputData, CJson **outputData) ThrowException() argument
[all...]
/base/security/device_auth/services/session_manager/src/session/v2/
H A Ddev_session_util.c201 static bool IsPeerPseudonym(const CJson *inputData) in IsPeerPseudonym() argument
203 const char *pkInfoStr = GetStringFromJson(inputData, FIELD_PK_INFO); in IsPeerPseudonym()
245 int32_t FillPeerAuthIdIfNeeded(bool isClient, const CJson *context, CJson *inputData) in FillPeerAuthIdIfNeeded() argument
252 CJson *authData = GetObjFromJson(inputData, FIELD_AUTH_DATA); in FillPeerAuthIdIfNeeded()
323 int32_t SetPeerInfoToContext(CJson *context, const CJson *inputData) in SetPeerInfoToContext() argument
325 if (IsPeerPseudonym(inputData)) { in SetPeerInfoToContext()
329 const char *pkInfoStr = GetStringFromJson(inputData, FIELD_PK_INFO); in SetPeerInfoToContext()
394 int32_t CheckPeerPkInfoForPdid(const CJson *context, const CJson *inputData) in CheckPeerPkInfoForPdid() argument
401 const char *pkInfo = GetStringFromJson(inputData, FIELD_PK_INFO); in CheckPeerPkInfoForPdid()
H A Ddev_session_v2.c698 static int32_t GetSelfCredByInput(SessionImpl *impl, const CJson *inputData) in GetSelfCredByInput() argument
701 if (GetIntFromJson(inputData, FIELD_TYPE, &credType) != HC_SUCCESS) { in GetSelfCredByInput()
708 res = GetPreSharedCredInfo(impl, inputData, &info); in GetSelfCredByInput()
710 res = GetCertCredInfo(impl, inputData, &info); in GetSelfCredByInput()
1410 static int32_t GetSessionSaltFromInput(SessionImpl *impl, const CJson *inputData) in GetSessionSaltFromInput() argument
1416 if (GetByteFromJson(inputData, FIELD_SALT, impl->salt.val, impl->salt.length) != HC_SUCCESS) { in GetSessionSaltFromInput()
1431 static int32_t GetSharedSecret(SessionImpl *impl, const CJson *inputData, IdentityInfo *selfCred, Uint8Buff *psk) in GetSharedSecret() argument
1437 int32_t res = SetPeerInfoToContext(impl->context, inputData); in GetSharedSecret()
1442 res = GetPeerCertInfo(impl->context, inputData, &peerCert); in GetSharedSecret()
1451 static int32_t SetPeerUserIdToContext(CJson *context, const CJson *inputData, cons argument
1484 ServerCreateAuthSubSessionByCred(SessionImpl *impl, const CJson *inputData, IdentityInfo *cred) ServerCreateAuthSubSessionByCred() argument
1497 SyncCredState(SessionImpl *impl, const CJson *inputData) SyncCredState() argument
1670 CredNegotiate(SessionImpl *impl, const CJson *inputData, IdentityInfo *selfCred) CredNegotiate() argument
1694 SetAuthPsk(SessionImpl *impl, const CJson *inputData, IdentityInfo *cred) SetAuthPsk() argument
[all...]
/base/startup/appspawn/test/unittest/app_spawn_client_test/
H A Dapp_spawn_interface_test.cpp427 const uint8_t *inputData[] = {data.data(), data.data(), data.data(), data.data(), nullptr}; in HWTEST_F() local
435 for (size_t k = 0; k < ARRAY_LENGTH(inputData); k++) { in HWTEST_F()
438 inputName[j], inputData[k], static_cast<uint32_t>(inputvalueLen[l])); in HWTEST_F()
445 for (size_t k = 0; k < ARRAY_LENGTH(inputData); k++) { in HWTEST_F()
448 inputName[j], inputData[k], static_cast<uint32_t>(inputvalueLen[l])); in HWTEST_F()
480 const char *inputData[] = {name1.data(), name2.data(), name3.data(), name4.data(), nullptr}; in HWTEST_F() local
483 for (size_t k = 0; k < ARRAY_LENGTH(inputData); k++) { in HWTEST_F()
485 ret = AppSpawnReqMsgAddStringInfo(reqHandle, inputName[j], inputData[k]); in HWTEST_F()
491 for (size_t k = 0; k < ARRAY_LENGTH(inputData); k++) { in HWTEST_F()
492 ret = AppSpawnReqMsgAddStringInfo(nullptr, inputName[j], inputData[ in HWTEST_F()
[all...]
/base/security/device_security_level/oem_property/ohos/common/
H A Dexternal_interface_adapter.c118 struct HksParam inputData[] = { in DslmCredAttestAdapter() local
136 if (FillHksParamSet(&inputParam, inputData, sizeof(inputData) / sizeof(inputData[0])) != SUCCESS) { in DslmCredAttestAdapter()
/base/security/huks/frameworks/huks_standard/main/os_dependency/ipc/include/
H A Dhks_client_ipc_serialization.h56 int32_t HksOnceDataPack(struct HksBlob *destData, const struct HksBlob *inputData, const struct HksBlob *rsvData,
/base/security/huks/services/huks_standard/huks_service/main/os_dependency/idl/ipc/
H A Dhks_service_ipc_serialization.h63 struct HksBlob *inputData, struct HksBlob *mac);
H A Dhks_service_ipc_serialization.c309 struct HksBlob *inputData, uint32_t *offset) in SignVerifyMacUnpack()
314 ret = GetBlobFromBuffer(inputData, srcData, offset); in SignVerifyMacUnpack()
395 struct HksBlob *inputData, struct HksBlob *mac) in HksHmacUnpack()
398 int32_t ret = SignVerifyMacUnpack(srcData, key, paramSet, inputData, &offset); in HksHmacUnpack()
308 SignVerifyMacUnpack(const struct HksBlob *srcData, struct HksBlob *key, struct HksParamSet **paramSet, struct HksBlob *inputData, uint32_t *offset) SignVerifyMacUnpack() argument
394 HksHmacUnpack(const struct HksBlob *srcData, struct HksBlob *key, struct HksParamSet **paramSet, struct HksBlob *inputData, struct HksBlob *mac) HksHmacUnpack() argument
H A Dhks_ipc_service.c543 struct HksBlob inputData = { 0, NULL }; in HksIpcServiceMac() local
549 ret = HksHmacUnpack(srcData, &key, &inParamSet, &inputData, &mac); in HksIpcServiceMac()
558 ret = HksServiceMac(&processInfo, &key, inParamSet, &inputData, &mac); in HksIpcServiceMac()
/base/security/huks/frameworks/huks_standard/main/os_dependency/ipc/src/
H A Dhks_client_ipc_serialization.c230 int32_t HksOnceDataPack(struct HksBlob *destData, const struct HksBlob *inputData, const struct HksBlob *rsvData, in HksOnceDataPack() argument
233 int32_t ret = CopyBlobToBuffer(inputData, destData, offset); in HksOnceDataPack()
234 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "copy inputData failed") in HksOnceDataPack()

Completed in 12 milliseconds