Home
last modified time | relevance | path

Searched refs:pkInfoSignature (Results 1 - 10 of 10) sorted by relevance

/base/security/device_auth/services/identity_manager/src/
H A Dcert_operation.c121 if (AddByteToJson(out, FIELD_PK_INFO_SIGNATURE, certInfo->pkInfoSignature.val, in AddCertInfoToJson()
122 certInfo->pkInfoSignature.length) != HC_SUCCESS) { in AddCertInfoToJson()
271 &keyParams, &certInfo->pkInfoStr, certInfo->signAlg, &certInfo->pkInfoSignature); in VerifyPeerCertInfo()
354 int32_t GenerateCertInfo(const Uint8Buff *pkInfoStr, const Uint8Buff *pkInfoSignature, CertInfo *certInfo) in GenerateCertInfo() argument
369 uint32_t signatureLen = pkInfoSignature->length; in GenerateCertInfo()
370 certInfo->pkInfoSignature.val = (uint8_t *)HcMalloc(signatureLen, 0); in GenerateCertInfo()
371 if (certInfo->pkInfoSignature.val == NULL) { in GenerateCertInfo()
372 LOGE("Failed to alloc pkInfoSignature memory!"); in GenerateCertInfo()
376 if (memcpy_s(certInfo->pkInfoSignature.val, signatureLen, pkInfoSignature in GenerateCertInfo()
[all...]
H A Didentity_common.c161 FreeBuffData(&info->proof.certInfo.pkInfoSignature); in DestroyIdentityInfo()
/base/security/device_auth/services/legacy/authenticators/inc/account_related/creds_manager/
H A Dasy_token_manager.h34 Uint8Buff pkInfoSignature; member
/base/security/device_auth/services/legacy/authenticators/src/account_related/creds_manager/
H A Dasy_token_manager.c157 if (GetByteFromJson(tokenJson, FIELD_PK_INFO_SIGNATURE, token->pkInfoSignature.val, in GenerateTokenFromJson()
158 token->pkInfoSignature.length) != HC_SUCCESS) { in GenerateTokenFromJson()
159 LOGE("Get pkInfoSignature failed"); in GenerateTokenFromJson()
163 token->pkInfoSignature.length = HcStrlen(signatureStr) / BYTE_TO_HEX_OPER_LENGTH; in GenerateTokenFromJson()
293 if (AddByteToJson(tokenJson, FIELD_PK_INFO_SIGNATURE, token->pkInfoSignature.val, in GenerateJsonFromToken()
294 token->pkInfoSignature.length) != HC_SUCCESS) { in GenerateJsonFromToken()
295 LOGE("Add pkInfoSignature to json failed"); in GenerateJsonFromToken()
496 LOGE("Verify pkInfoSignature failed"); in DoImportServerPkAndVerify()
510 LOGE("get pkInfoSignature fail"); in VerifySignature()
537 LOGE("Verify pkInfoSignature faile in VerifySignature()
[all...]
/base/security/device_auth/services/identity_manager/inc/
H A Didentity_defines.h97 Uint8Buff pkInfoSignature; member
/base/security/device_auth/test/unittest/deviceauth/source/
H A Didentity_manager_test.cpp37 extern "C" int32_t GenerateCertInfo(const Uint8Buff *pkInfoStr, const Uint8Buff *pkInfoSignature, CertInfo *certInfo);
81 info.pkInfoSignature.val = testSignature; in HWTEST_F()
82 info.pkInfoSignature.length = TEST_SIGNATURE_LEN; in HWTEST_F()
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/
H A Dpake_v2_auth_task_common.c381 if (memcpy_s(params->pkInfoSignSelf.val, params->pkInfoSignSelf.length, token->pkInfoSignature.val, in GetAsyPubKeyInfo()
382 token->pkInfoSignature.length) != EOK) { in GetAsyPubKeyInfo()
386 params->pkInfoSignSelf.length = token->pkInfoSignature.length; in GetAsyPubKeyInfo()
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/creds_manager/
H A Dcreds_manager_test.cpp566 certInfo->pkInfoSignature.val = (uint8_t *)HcMalloc(token->pkInfoSignature.length, 0); in GetCertInfo()
567 ASSERT_NE(certInfo->pkInfoSignature.val, nullptr); in GetCertInfo()
568 certInfo->pkInfoSignature.length = token->pkInfoSignature.length; in GetCertInfo()
569 (void)memcpy_s(certInfo->pkInfoSignature.val, certInfo->pkInfoSignature.length, token->pkInfoSignature.val, in GetCertInfo()
570 token->pkInfoSignature.length); in GetCertInfo()
1944 HcFree(certInfo.pkInfoSignature in HWTEST_F()
[all...]
/base/security/device_auth/test/fuzztest/creds_manager/credsmanager_fuzzer/
H A Dcredsmanager_fuzzer.cpp552 certInfo->pkInfoSignature.val = reinterpret_cast<uint8_t *>(HcMalloc(token->pkInfoSignature.length, 0)); in GetCertInfo()
553 certInfo->pkInfoSignature.length = token->pkInfoSignature.length; in GetCertInfo()
554 (void)memcpy_s(certInfo->pkInfoSignature.val, certInfo->pkInfoSignature.length, token->pkInfoSignature.val, in GetCertInfo()
555 token->pkInfoSignature.length); in GetCertInfo()
1821 HcFree(certInfo.pkInfoSignature.val); in CredsManagerTest64()
/base/security/device_auth/services/session_manager/src/session/v2/
H A Ddev_session_v2.c532 if (AddByteToJson(credInfo, FIELD_PK_INFO_SIGNATURE, cred->proof.certInfo.pkInfoSignature.val, in AddCertCredInfo()
533 cred->proof.certInfo.pkInfoSignature.length) != HC_SUCCESS) { in AddCertCredInfo()
534 LOGE("add pkInfoSignature to json fail."); in AddCertCredInfo()
593 if (InitUint8Buff(&peerCert->pkInfoSignature, pkInfoSignatureLen) != HC_SUCCESS) { in BuildPeerCertInfo()
594 LOGE("allocate pkInfoSignature memory fail."); in BuildPeerCertInfo()
598 if (HexStringToByte(pkInfoSignHexStr, peerCert->pkInfoSignature.val, in BuildPeerCertInfo()
599 peerCert->pkInfoSignature.length) != HC_SUCCESS) { in BuildPeerCertInfo()
600 LOGE("get pkInfoSignature from json fail."); in BuildPeerCertInfo()
602 ClearFreeUint8Buff(&peerCert->pkInfoSignature); in BuildPeerCertInfo()
611 ClearFreeUint8Buff(&certInfo->pkInfoSignature); in DestroyCertInfo()
[all...]

Completed in 14 milliseconds