/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | identity_manager_test.cpp | 37 extern "C" int32_t GenerateCertInfo(const Uint8Buff *pkInfoStr, const Uint8Buff *pkInfoSignature, CertInfo *certInfo); 70 char *pkInfoStr = PackJsonToString(pkInfoJson); in HWTEST_F() local 72 ASSERT_NE(pkInfoStr, nullptr); in HWTEST_F() 73 info.pkInfoStr.val = (uint8_t *)pkInfoStr; in HWTEST_F() 74 info.pkInfoStr.length = strlen(pkInfoStr) + 1; in HWTEST_F() 85 FreeJsonString(pkInfoStr); in HWTEST_F() 97 char *pkInfoStr = PackJsonToString(pkInfoJson); in HWTEST_F() local 99 pkInfoBuf.val = (uint8_t *)pkInfoStr; in HWTEST_F() [all...] |
H A D | deviceauth_interface_test.cpp | 1293 char *pkInfoStr = PackJsonToString(pkInfoJson); in HWTEST_F() local 1295 (void)AddStringToJson(credJson, FIELD_PK_INFO, pkInfoStr); in HWTEST_F() 1296 FreeJsonString(pkInfoStr); in HWTEST_F() 1402 char *pkInfoStr = PackJsonToString(pkInfoJson); in HWTEST_F() local 1404 (void)AddStringToJson(inputDataJson, FIELD_PK_INFO, pkInfoStr); in HWTEST_F() 1405 FreeJsonString(pkInfoStr); in HWTEST_F() 1417 pkInfoStr = PackJsonToString(pkInfoJson); in HWTEST_F() 1419 (void)AddStringToJson(inputDataJson, FIELD_PK_INFO, pkInfoStr); in HWTEST_F() 1420 FreeJsonString(pkInfoStr); in HWTEST_F()
|
/base/security/device_auth/services/session_manager/src/session/v2/ |
H A D | dev_session_util.c | 203 const char *pkInfoStr = GetStringFromJson(inputData, FIELD_PK_INFO); in IsPeerPseudonym() local 204 if (pkInfoStr == NULL) { in IsPeerPseudonym() 208 CJson *pkInfoJson = CreateJsonFromString(pkInfoStr); in IsPeerPseudonym() 329 const char *pkInfoStr = GetStringFromJson(inputData, FIELD_PK_INFO); in SetPeerInfoToContext() local 330 if (pkInfoStr == NULL) { in SetPeerInfoToContext() 334 CJson *pkInfoJson = CreateJsonFromString(pkInfoStr); in SetPeerInfoToContext() 436 const char *pkInfoStr = GetStringFromJson(credInfo, FIELD_PK_INFO); in GetRealPkInfoStr() local 437 if (pkInfoStr == NULL) { in GetRealPkInfoStr() 441 CJson *pkInfoJson = CreateJsonFromString(pkInfoStr); in GetRealPkInfoStr() 451 if (DeepCopyString(pkInfoStr, returnPkInfoSt in GetRealPkInfoStr() [all...] |
H A D | dev_session_v2.c | 525 res = AddPkInfoWithPdid(impl->context, credInfo, (const char *)cred->proof.certInfo.pkInfoStr.val); in AddCertCredInfo() 528 (const char *)cred->proof.certInfo.pkInfoStr.val) != HC_SUCCESS) { in AddCertCredInfo() 529 LOGE("add pkInfoStr to json fail."); in AddCertCredInfo() 584 static int32_t BuildPeerCertInfo(const char *pkInfoStr, const char *pkInfoSignHexStr, int32_t signAlg, in BuildPeerCertInfo() argument 587 Uint8Buff pkInfoStrBuff = { (uint8_t *)pkInfoStr, HcStrlen(pkInfoStr) + 1 }; in BuildPeerCertInfo() 589 if (DeepCopyUint8Buff(&pkInfoStrBuff, &peerCert->pkInfoStr) != HC_SUCCESS) { in BuildPeerCertInfo() 590 LOGE("copy pkInfoStr fail."); in BuildPeerCertInfo() 595 ClearFreeUint8Buff(&peerCert->pkInfoStr); in BuildPeerCertInfo() 601 ClearFreeUint8Buff(&peerCert->pkInfoStr); in BuildPeerCertInfo() 627 char *pkInfoStr = NULL; GetPeerCertInfo() local [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_related/creds_manager/ |
H A D | asy_token_manager.c | 145 char *pkInfoStr = PackJsonToString(pkInfoJson); in GenerateTokenFromJson() local 146 if (pkInfoStr == NULL) { in GenerateTokenFromJson() 147 LOGE("Pack pkInfoStr failed"); in GenerateTokenFromJson() 150 if (memcpy_s(token->pkInfoStr.val, token->pkInfoStr.length, pkInfoStr, HcStrlen(pkInfoStr) + 1) != EOK) { in GenerateTokenFromJson() 151 LOGE("Memcpy failed for pkInfoStr"); in GenerateTokenFromJson() 152 FreeJsonString(pkInfoStr); in GenerateTokenFromJson() 155 token->pkInfoStr in GenerateTokenFromJson() 431 char *pkInfoStr = PackJsonToString(pkInfoJson); VerifyPkInfoSignature() local [all...] |
/base/security/device_auth/services/identity_manager/src/ |
H A D | cert_operation.c | 117 if (AddStringToJson(out, FIELD_PK_INFO, (const char *)certInfo->pkInfoStr.val) != HC_SUCCESS) { in AddCertInfoToJson() 190 CJson *peerPkInfoJson = CreateJsonFromString((const char *)certInfo->pkInfoStr.val); in GetSelfGroupEntryByPeerCert() 271 &keyParams, &certInfo->pkInfoStr, certInfo->signAlg, &certInfo->pkInfoSignature); in VerifyPeerCertInfo() 281 CJson *pkInfoPeer = CreateJsonFromString((const char *)peerCertInfo->pkInfoStr.val); in GetPeerPubKeyFromCert() 354 int32_t GenerateCertInfo(const Uint8Buff *pkInfoStr, const Uint8Buff *pkInfoSignature, CertInfo *certInfo) in GenerateCertInfo() argument 356 uint32_t pkInfoLen = pkInfoStr->length; in GenerateCertInfo() 357 certInfo->pkInfoStr.val = (uint8_t *)HcMalloc(pkInfoLen, 0); in GenerateCertInfo() 358 if (certInfo->pkInfoStr.val == NULL) { in GenerateCertInfo() 362 if (memcpy_s(certInfo->pkInfoStr.val, pkInfoLen, pkInfoStr in GenerateCertInfo() [all...] |
H A D | identity_common.c | 160 FreeBuffData(&info->proof.certInfo.pkInfoStr); in DestroyIdentityInfo()
|
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/creds_manager/ |
H A D | creds_manager_test.cpp | 562 certInfo->pkInfoStr.val = (uint8_t *)HcMalloc(token->pkInfoStr.length, 0); in GetCertInfo() 563 ASSERT_NE(certInfo->pkInfoStr.val, nullptr); in GetCertInfo() 564 certInfo->pkInfoStr.length = token->pkInfoStr.length; in GetCertInfo() 565 (void)memcpy_s(certInfo->pkInfoStr.val, certInfo->pkInfoStr.length, token->pkInfoStr.val, token->pkInfoStr.length); in GetCertInfo() 1213 char *pkInfoStr in HWTEST_F() local 1245 char *pkInfoStr = PackJsonToString(pkInfoJson); HWTEST_F() local 1267 char *pkInfoStr = PackJsonToString(pkInfoJson); HWTEST_F() local 1917 char *pkInfoStr = PackJsonToString(pkInfoJson); HWTEST_F() local [all...] |
/base/security/device_auth/test/fuzztest/creds_manager/credsmanager_fuzzer/ |
H A D | credsmanager_fuzzer.cpp | 549 certInfo->pkInfoStr.val = reinterpret_cast<uint8_t *>(HcMalloc(token->pkInfoStr.length, 0)); in GetCertInfo() 550 certInfo->pkInfoStr.length = token->pkInfoStr.length; in GetCertInfo() 551 (void)memcpy_s(certInfo->pkInfoStr.val, certInfo->pkInfoStr.length, token->pkInfoStr.val, token->pkInfoStr.length); in GetCertInfo() 1090 char *pkInfoStr = PackJsonToString(pkInfoJson); in CredsManagerTestInner() local 1092 certInfo->pkInfoStr in CredsManagerTestInner() 1151 char *pkInfoStr = PackJsonToString(pkInfoJson); CredsManagerTest36() local 1169 char *pkInfoStr = PackJsonToString(pkInfoJson); CredsManagerTest37() local 1798 char *pkInfoStr = PackJsonToString(pkInfoJson); CredsManagerTest63() local [all...] |
/base/security/device_auth/services/legacy/authenticators/inc/account_related/creds_manager/ |
H A D | asy_token_manager.h | 32 Uint8Buff pkInfoStr; member
|
/base/security/device_auth/services/identity_manager/inc/ |
H A D | identity_defines.h | 96 Uint8Buff pkInfoStr; member
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_task_common.c | 263 static int32_t GetPeerPkFromPkInfo(PakeAuthParams *params, const char *pkInfoStr) in GetPeerPkFromPkInfo() argument 265 CJson *info = CreateJsonFromString(pkInfoStr); in GetPeerPkFromPkInfo() 364 uint32_t pkInfoLen = token->pkInfoStr.length; in GetAsyPubKeyInfo() 373 if (memcpy_s(params->pkInfoSelf.val, params->pkInfoSelf.length, token->pkInfoStr.val, pkInfoLen) != EOK) { in GetAsyPubKeyInfo()
|
/base/security/device_auth/services/session_manager/src/session/ |
H A D | dev_session_fwk.c | 450 const char *pkInfoStr = GetStringFromJson(receviedMsg, FIELD_AUTH_PK_INFO); in GenerateErrorReturn() local 451 if (pkInfoStr == NULL) { in GenerateErrorReturn() 455 CJson *pkInfoJson = CreateJsonFromString(pkInfoStr); in GenerateErrorReturn()
|