Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 412) sorted by relevance

12345678910>>...17

/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/source/key_agreement/
H A Dpake_client.c257 struct challenge challenge = { 0, {0} }; in build_end_request_data() local
262 if (memcpy_s(challenge.challenge, sizeof(challenge.challenge), rand.random_value, in build_end_request_data()
271 send->challenge = challenge; in build_end_request_data()
345 challenge.val = (uint8_t *)MALLOC(challenge.size); in generate_proof()
350 (void)memset_s(challenge.val, challenge.size, 0, challenge.size); in generate_proof()
351 …(void)memcpy_s(challenge.val, challenge.size, pake_client->self_challenge.challenge, CHALLENGE_BUF… in generate_proof()
353 (void)memcpy_s(challenge.val + challenge.length, challenge.size - challenge.length, in generate_proof()
358 FREE(challenge.val); in generate_proof()
371 challenge.val = (uint8_t *)MALLOC(challenge.size); in verify_proof_is_ok()
377 …(void)memcpy_s(challenge.val, challenge.size, pake_client->peer_challenge.challenge, CHALLENGE_BUF… in verify_proof_is_ok()
[all …]
/ohos5.0/base/useriam/user_auth_framework/test/unittest/services/src/
H A Duser_idm_session_controller_test.cpp49 std::vector<uint8_t> challenge; variable
54 EXPECT_EQ(true, UserIdmSessionController::Instance().OpenSession(userId, challenge));
62 std::vector<uint8_t> challenge; variable
75 std::vector<uint8_t> challenge; variable
88 std::vector<uint8_t> challenge; variable
90 auto fillUpChallenge = [&nonce](std::vector<uint8_t> &challenge) { challenge = nonce; }; in __anonad6838d20102() argument
98 EXPECT_THAT(challenge, ElementsAreArray(nonce));
108 std::vector<uint8_t> challenge; variable
110 auto fillUpChallenge = [&nonce](std::vector<uint8_t> &challenge) { challenge = nonce; }; in __anonad6838d20202() argument
129 std::vector<uint8_t> challenge; variable
[all …]
H A Duser_auth_service_test.cpp557 .challenge = {1, 2, 3, 4},
580 .challenge = {1, 2, 3, 4},
606 .challenge = {1, 2, 3, 4},
819 authParam.challenge.push_back(1);
820 authParam.challenge.push_back(2);
821 authParam.challenge.push_back(3);
822 authParam.challenge.push_back(4);
838 authParam.challenge.push_back(1);
839 authParam.challenge.push_back(2);
840 authParam.challenge.push_back(3);
[all …]
/ohos5.0/base/security/code_signature/test/unittest/
H A Dcert_chain_verifier_test.cpp208 ByteBuffer cert, challenge, certBuffer; variable
209 EXPECT_EQ(GetVerifiedCert(cert, challenge, certBuffer), false);
220 ByteBuffer cert, challenge, certBuffer; variable
235 ByteBuffer cert, challenge, certBuffer; variable
269 ByteBuffer formattedCert, challenge, certBuffer; variable
287 ByteBuffer formattedCert, challenge, certBuffer; variable
305 ByteBuffer formattedCert, challenge, certBuffer; variable
323 ByteBuffer challenge; variable
339 challenge.CopyFrom(CHALLENGE, sizeof(CHALLENGE));
353 ByteBuffer formattedCert, challenge, certBuffer; variable
[all …]
/ohos5.0/drivers/peripheral/user_auth/hdi_service/idm/src/
H A Didm_session.c44 uint8_t challenge[CHALLENGE_LEN]; member
70 if (SecureRandom(challenge, challengeLen) != RESULT_SUCCESS) { in GenerateChallenge()
75 if (challenge[j] != 0) { in GenerateChallenge()
87 if (challenge == NULL || challengeLen != CHALLENGE_LEN) { in OpenEditSession()
91 (void)memset_s(challenge, CHALLENGE_LEN, 0, CHALLENGE_LEN); in OpenEditSession()
117 if (memcpy_s(challenge, CHALLENGE_LEN, g_session->challenge, CHALLENGE_LEN) != EOK) { in OpenEditSession()
169 if (challenge == NULL || challengeLen != CHALLENGE_LEN) { in CheckChallenge()
177 if (memcmp(challenge, g_session->challenge, CHALLENGE_LEN) != EOK) { in CheckChallenge()
305 ResultCode GetChallenge(uint8_t *challenge, uint32_t challengeLen) in GetChallenge() argument
307 if ((challenge == NULL) || (challengeLen != CHALLENGE_LEN)) { in GetChallenge()
[all …]
/ohos5.0/base/security/device_security_level/services/dslm/
H A Ddslm_msg_utils.c33 static uint8_t *GenerateSecInfoResponseJson(uint64_t challenge, const DslmCredBuff *cred) in GenerateSecInfoResponseJson() argument
57 …DslmByteToHexString((uint8_t *)&challenge, sizeof(challenge), (uint8_t *)nonce, CHALLENGE_STRING_L… in GenerateSecInfoResponseJson()
80 static uint8_t *GenerateSecInfoRequestJson(uint64_t challenge) in GenerateSecInfoRequestJson() argument
94 …DslmByteToHexString((uint8_t *)&challenge, sizeof(challenge), (uint8_t *)nonce, CHALLENGE_STRING_L… in GenerateSecInfoRequestJson()
120 int32_t BuildDeviceSecInfoRequest(uint64_t challenge, MessageBuff **msg) in BuildDeviceSecInfoRequest() argument
132 out->buff = GenerateSecInfoRequestJson(challenge); in BuildDeviceSecInfoRequest()
160 …slmHexStringToByte(nonceStr, strlen(nonceStr), (uint8_t *)&obj->challenge, sizeof(obj->challenge)); in ParseDeviceSecInfoRequest()
174 int32_t BuildDeviceSecInfoResponse(uint64_t challenge, const DslmCredBuff *cred, MessageBuff **msg) in BuildDeviceSecInfoResponse() argument
184 out->buff = GenerateSecInfoResponseJson(challenge, cred); in BuildDeviceSecInfoResponse()
197 if (msg == NULL || challenge == NULL || version == NULL || cred == NULL) { in ParseDeviceSecInfoResponse()
[all …]
/ohos5.0/base/security/asset/test/unittest/kits_ndk/src/
H A Dasset_auth_query_test.cpp73 Asset_Blob challenge = { 0 }; variable
74 ASSERT_EQ(ASSET_SUCCESS, OH_Asset_PreQuery(preQueryAttr, ARRAY_SIZE(preQueryAttr), &challenge));
80 { .tag = ASSET_TAG_AUTH_CHALLENGE, .value.blob = challenge },
86 { .tag = ASSET_TAG_AUTH_CHALLENGE, .value.blob = challenge },
119 Asset_Blob challenge = { 0 }; variable
120 ASSERT_EQ(ASSET_SUCCESS, OH_Asset_PreQuery(preQueryAttr, ARRAY_SIZE(preQueryAttr), &challenge));
126 { .tag = ASSET_TAG_AUTH_CHALLENGE, .value.blob = challenge },
131 { .tag = ASSET_TAG_AUTH_CHALLENGE, .value.blob = challenge },
154 Asset_Blob challenge = { 0 }; variable
183 Asset_Blob challenge = { 0 }; variable
[all …]
/ohos5.0/drivers/peripheral/user_auth/test/unittest/service_test/src/
H A Duser_auth_interface_service_test.cpp127 authParam.baseParam.challenge = challenge; in DoOnceAuth()
156 std::vector<uint8_t> challenge; variable
301 std::vector<uint8_t> challenge; variable
323 std::vector<uint8_t> challenge; variable
346 std::vector<uint8_t> challenge; variable
385 std::vector<uint8_t> challenge; variable
467 std::vector<uint8_t> challenge; variable
486 std::vector<uint8_t> challenge; variable
524 std::vector<uint8_t> challenge; variable
728 authParam.baseParam.challenge = challenge;
[all …]
/ohos5.0/base/security/asset/test/unittest/inner_kits_rust/src/
H A Dpre_query.rs88 let challenge = asset_sdk::Manager::build().unwrap().pre_query(&query).unwrap(); in pre_query_batch_data() localVariable
89 assert_eq!(CHALLENGE_SIZE, challenge.len()); in pre_query_batch_data()
91 query.insert_attr(Tag::AuthChallenge, challenge); in pre_query_batch_data()
107 let challenge = asset_sdk::Manager::build().unwrap().pre_query(&query).unwrap(); in pre_query_single_data() localVariable
108 assert_eq!(CHALLENGE_SIZE, challenge.len()); in pre_query_single_data()
111 query.insert_attr(Tag::AuthChallenge, challenge); in pre_query_single_data()
125 let challenge = asset_sdk::Manager::build().unwrap().pre_query(&query).unwrap(); in pre_query_max_times() localVariable
126 assert_eq!(CHALLENGE_SIZE, challenge.len()); in pre_query_max_times()
127 challenges.push(challenge); in pre_query_max_times()
131 for challenge in challenges.into_iter() { in pre_query_max_times()
[all …]
/ohos5.0/base/security/device_security_level/oem_property/ohos/common/
H A Ddslm_ohos_verify.c41 uint64_t challenge; member
82 …ToByte(challengeStr, strlen(challengeStr), (uint8_t *)&nonce->challenge, sizeof(nonce->challenge)); in ParseNonceOfCertChain()
154 static int32_t CheckNonceOfCertChain(const struct NonceOfCertChain *nonce, uint64_t challenge, cons… in CheckNonceOfCertChain() argument
156 if (challenge != nonce->challenge) { in CheckNonceOfCertChain()
169 …erifyNonceOfCertChain(const char *jsonStr, const struct DeviceIdentify *device, uint64_t challenge) in VerifyNonceOfCertChain() argument
194 ret = CheckNonceOfCertChain(&nonce, challenge, pkInfoListStr); in VerifyNonceOfCertChain()
231 static int32_t VerifyStandardDslmCred(const DeviceIdentify *device, uint64_t challenge, const DslmC… in VerifyStandardDslmCred() argument
250 ret = VerifyNonceOfCertChain(resultInfo.nonceStr, device, challenge); in VerifyStandardDslmCred()
276 int32_t VerifyOhosDslmCred(const DeviceIdentify *device, uint64_t challenge, const DslmCredBuff *cr… in VerifyOhosDslmCred() argument
287 return VerifyStandardDslmCred(device, challenge, credBuff, credInfo); in VerifyOhosDslmCred()
/ohos5.0/base/security/code_signature/utils/src/
H A Dhuks_attest_verifier.cpp178 return (static_cast<uint32_t>(size) == challenge.GetSize()) in CompareTargetValue()
179 && (memcmp(data, challenge.GetBuffer(), size) == 0); in CompareTargetValue()
184 static bool ParseASN1Sequence(uint8_t *data, int size, const ByteBuffer &challenge) in ParseASN1Sequence() argument
199 challenge); in ParseASN1Sequence()
205 ret = CompareTargetValue(curNid, value->data, value->length, challenge); in ParseASN1Sequence()
215 static bool VerifyExtension(X509 *cert, const ByteBuffer &challenge) in VerifyExtension() argument
217 if (challenge.GetBuffer() == nullptr) { in VerifyExtension()
240 if (!ParseASN1Sequence(extData->data, extData->length, challenge)) { in VerifyExtension()
271 bool VerifyCertAndExtension(X509 *signCert, X509 *issuerCert, const ByteBuffer &challenge) in VerifyCertAndExtension() argument
278 if (!VerifyExtension(signCert, challenge)) { in VerifyCertAndExtension()
[all …]
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/inc/key_agreement/
H A Dpake_server.h75 struct challenge self_challenge;
76 struct challenge peer_challenge;
99 struct challenge challenge; member
105 struct challenge challenge; member
H A Dsts_server.h64 struct challenge challenge; member
82 struct challenge peer_challenge;
83 struct challenge my_challenge;
104 struct challenge challenge; member
/ohos5.0/drivers/peripheral/user_auth/test/unittest/idm_test/
H A Didm_session_test.cpp30 uint8_t challenge[CHALLENGE_LEN]; member
35 extern ResultCode GenerateChallenge(uint8_t *challenge, uint32_t challengeLen);
89 uint8_t challenge = 0; variable
90 EXPECT_EQ(CheckChallenge(&challenge, 0), RESULT_BAD_PARAM);
91 EXPECT_EQ(CheckChallenge(&challenge, CHALLENGE_LEN), RESULT_NEED_INIT);
96 uint8_t challenge[CHALLENGE_LEN]; variable
97 EXPECT_EQ(memset_s(challenge, CHALLENGE_LEN, 0, CHALLENGE_LEN), EOK);
99 EXPECT_EQ(GenerateChallenge(session.challenge, CHALLENGE_LEN), RESULT_SUCCESS);
101 EXPECT_EQ(CheckChallenge(challenge, CHALLENGE_LEN), RESULT_BAD_MATCH);
/ohos5.0/base/security/asset/services/crypto_manager/src/
H A Dcrypto_manager.rs58 pub fn find(&mut self, calling_info: &CallingInfo, challenge: &Vec<u8>) -> Result<&Crypto> { in find()
61 if crypto.challenge().eq(challenge) && crypto.calling_info().eq(calling_info) { in find()
69 pub fn remove(&mut self, calling_info: &CallingInfo, challenge: &Vec<u8>) { in remove()
70 …ryptos.retain(|crypto| crypto.calling_info() != calling_info || !crypto.challenge().eq(challenge)); in remove()
H A Dcrypto.rs28 …fn InitKey(keyId: *const KeyId, valid_time: u32, challenge: *mut OutBlob, handle: *mut OutBlob) ->… in InitKey()
48 challenge: Vec<u8>, field
60 challenge: vec![0; CHALLENGE_LEN], in build()
70 …let mut challenge = OutBlob { size: self.challenge.len() as u32, data: self.challenge.as_mut_ptr()… in init_key() localVariable
78 &mut challenge as *mut OutBlob, in init_key()
83 SUCCESS => Ok(&self.challenge), in init_key()
174 pub(crate) fn challenge(&self) -> &Vec<u8> { in challenge() method
175 &self.challenge in challenge()
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/source/auth_info/
H A Dexchange_auth_info_client.c244 typedef void (*COPY_CHALLENGE)(struct uint8_buff *sign_src_data, const struct challenge *peer_chall…
245 const struct challenge *self_challenge);
248 static void copy_peer_self_challenge(struct uint8_buff *sign_src_data, const struct challenge *peer…
249 const struct challenge *self_challenge);
272 const struct challenge *self_challenge);
340 const struct challenge *self_challenge) in copy_peer_self_challenge()
349 self_challenge->challenge, CHALLENGE_BUFF_LENGTH) != EOK) { in copy_peer_self_challenge()
358 const struct challenge *self_challenge) in copy_self_peer_challenge()
367 peer_challenge->challenge, CHALLENGE_BUFF_LENGTH) != EOK) { in copy_self_peer_challenge()
378 const struct challenge *peer_challenge = &hichain->pake_client->peer_challenge; in generate_sign_src_data()
[all …]
/ohos5.0/base/useriam/user_auth_framework/test/fuzztest/services/userauthservice_fuzzer/
H A Duser_auth_service_fuzzer.cpp218 std::vector<uint8_t> challenge; in FuzzAuth() local
219 FillFuzzUint8Vector(parcel, challenge); in FuzzAuth()
233 std::vector<uint8_t> challenge; in FuzzAuthUser() local
234 FillFuzzUint8Vector(parcel, challenge); in FuzzAuthUser()
241 .challenge = challenge, in FuzzAuthUser()
253 std::vector<uint8_t> challenge; in FuzzIdentify() local
254 FillFuzzUint8Vector(parcel, challenge); in FuzzIdentify()
379 std::vector<uint8_t> challenge; in FuzzCheckValidSolution() local
383 .challenge = challenge, in FuzzCheckValidSolution()
469 std::vector<uint8_t> challenge; in FuzzAuthRemoteUser() local
[all …]
/ohos5.0/docs/zh-cn/application-dev/reference/apis-universal-keystore-kit/
H A D_huks_type_api.md87 …HUKS_CHALLENGE_POS_2, <br/>OH_HUKS_CHALLENGE_POS_3 <br/>} | challenge类型为用户自定义类型时,生成的challenge有效长度仅…
159 challenge类型为用户自定义类型时,生成的challenge有效长度仅为8字节连续的数据,且仅支持4种位置。
165 | OH_HUKS_CHALLENGE_POS_0 | 0~7字节为当前密钥的有效challenge。 |
166 | OH_HUKS_CHALLENGE_POS_1 | 8~15字节为当前密钥的有效challenge。 |
167 | OH_HUKS_CHALLENGE_POS_2 | 16~23字节为当前密钥的有效challenge。 |
168 | OH_HUKS_CHALLENGE_POS_3 | 24~31字节为当前密钥的有效challenge。 |
179 密钥使用时生成challenge的类型
189 | OH_HUKS_CHALLENGE_TYPE_NORMAL | challenge为普通类型,默认32字节。 |
190 | OH_HUKS_CHALLENGE_TYPE_CUSTOM | challenge为用户自定义类型。支持使用多个密钥仅一次认证,challenge长度8字节有效。 |
191 | OH_HUKS_CHALLENGE_TYPE_NONE | 免challenge类型。 |
[all …]
/ohos5.0/docs/zh-cn/application-dev/security/AssetStoreKit/
H A Dasset-js-query-auth.md102 async function userAuthenticate(challenge: Uint8Array): Promise<Uint8Array> {
105 challenge: challenge,
137 asset.preQuery(query).then((challenge: Uint8Array) => {
138 resolve(challenge);
150 async function postQueryAsset(challenge: Uint8Array) {
152 handle.set(asset.Tag.AUTH_CHALLENGE, challenge);
164 preQueryAsset().then(async (challenge: Uint8Array) => {
167 let authToken: Uint8Array = await userAuthenticate(challenge);
172 query.set(asset.Tag.AUTH_CHALLENGE, challenge);
182 postQueryAsset(challenge);
[all …]
/ohos5.0/docs/zh-cn/device-dev/reference/hdi-apis/userauth/
H A D_auth_solution_v10.md24 | unsigned char[] [challenge](#challenge) | 挑战值,用于签发认证令牌。 |
54 ### challenge subsection
57 unsigned char [] AuthSolution::challenge
H A D_auth_solution_v12.md28 | unsigned char[] [challenge](#challenge) | 挑战值,用于签发认证令牌。 |
54 ### challenge subsection
57 unsigned char [] AuthSolution::challenge
H A D_auth_solution_v1__2_v12.md24 | unsigned char[] [challenge](#challenge) | 挑战值,用于签发认证令牌。 |
72 ### challenge subsection
75 unsigned char [] AuthSolutionV1_2::challenge
/ohos5.0/base/security/device_security_level/test/dslm_unit_test/
H A Ddslm_test.cpp835 uint64_t challenge; variable
861 uint64_t challenge; variable
877 uint64_t challenge; variable
893 uint64_t challenge; variable
910 uint64_t challenge; variable
927 uint64_t challenge; variable
964 uint64_t challenge; variable
1000 uint64_t challenge; variable
1712 uint64_t challenge = 0x1234; variable
1724 uint64_t challenge = 0x1234; variable
[all …]
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/lite_exchange_task/
H A Diso_server_bind_exchange_task.c76 static int DecryptChallenge(const IsoParams *params, const CJson *in, uint8_t *challenge, uint32_t … in DecryptChallenge() argument
101 Uint8Buff challengeBuf = { challenge, CHALLENGE_SIZE }; in DecryptChallenge()
186 static int GenerateAuthCodeAndImport(const IsoParams *params, CJson *out, uint8_t *challenge, uint3… in GenerateAuthCodeAndImport() argument
206 Uint8Buff challengeBuf = { challenge, challengeLen }; in GenerateAuthCodeAndImport()
241 uint8_t *challenge = (uint8_t *)HcMalloc(CHALLENGE_SIZE, 0); in ServerBindExchangeStart() local
242 if (challenge == NULL) { in ServerBindExchangeStart()
246 res = DecryptChallenge(params, in, challenge, CHALLENGE_SIZE); in ServerBindExchangeStart()
251 res = GenerateAuthCodeAndImport(params, out, challenge, CHALLENGE_SIZE); in ServerBindExchangeStart()
259 HcFree(challenge); in ServerBindExchangeStart()

12345678910>>...17