/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/source/key_agreement/ |
H A D | pake_client.c | 257 struct challenge challenge = { 0, {0} }; in build_end_request_data() local 262 if (memcpy_s(challenge.challenge, sizeof(challenge.challenge), rand.random_value, in build_end_request_data() 271 send->challenge = challenge; in build_end_request_data() 345 challenge.val = (uint8_t *)MALLOC(challenge.size); in generate_proof() 350 (void)memset_s(challenge.val, challenge.size, 0, challenge.size); in generate_proof() 351 …(void)memcpy_s(challenge.val, challenge.size, pake_client->self_challenge.challenge, CHALLENGE_BUF… in generate_proof() 353 (void)memcpy_s(challenge.val + challenge.length, challenge.size - challenge.length, in generate_proof() 358 FREE(challenge.val); in generate_proof() 371 challenge.val = (uint8_t *)MALLOC(challenge.size); in verify_proof_is_ok() 377 …(void)memcpy_s(challenge.val, challenge.size, pake_client->peer_challenge.challenge, CHALLENGE_BUF… in verify_proof_is_ok() [all …]
|
/ohos5.0/base/useriam/user_auth_framework/test/unittest/services/src/ |
H A D | user_idm_session_controller_test.cpp | 49 std::vector<uint8_t> challenge; variable 54 EXPECT_EQ(true, UserIdmSessionController::Instance().OpenSession(userId, challenge)); 62 std::vector<uint8_t> challenge; variable 75 std::vector<uint8_t> challenge; variable 88 std::vector<uint8_t> challenge; variable 90 auto fillUpChallenge = [&nonce](std::vector<uint8_t> &challenge) { challenge = nonce; }; in __anonad6838d20102() argument 98 EXPECT_THAT(challenge, ElementsAreArray(nonce)); 108 std::vector<uint8_t> challenge; variable 110 auto fillUpChallenge = [&nonce](std::vector<uint8_t> &challenge) { challenge = nonce; }; in __anonad6838d20202() argument 129 std::vector<uint8_t> challenge; variable [all …]
|
H A D | user_auth_service_test.cpp | 557 .challenge = {1, 2, 3, 4}, 580 .challenge = {1, 2, 3, 4}, 606 .challenge = {1, 2, 3, 4}, 819 authParam.challenge.push_back(1); 820 authParam.challenge.push_back(2); 821 authParam.challenge.push_back(3); 822 authParam.challenge.push_back(4); 838 authParam.challenge.push_back(1); 839 authParam.challenge.push_back(2); 840 authParam.challenge.push_back(3); [all …]
|
/ohos5.0/base/security/code_signature/test/unittest/ |
H A D | cert_chain_verifier_test.cpp | 208 ByteBuffer cert, challenge, certBuffer; variable 209 EXPECT_EQ(GetVerifiedCert(cert, challenge, certBuffer), false); 220 ByteBuffer cert, challenge, certBuffer; variable 235 ByteBuffer cert, challenge, certBuffer; variable 269 ByteBuffer formattedCert, challenge, certBuffer; variable 287 ByteBuffer formattedCert, challenge, certBuffer; variable 305 ByteBuffer formattedCert, challenge, certBuffer; variable 323 ByteBuffer challenge; variable 339 challenge.CopyFrom(CHALLENGE, sizeof(CHALLENGE)); 353 ByteBuffer formattedCert, challenge, certBuffer; variable [all …]
|
/ohos5.0/drivers/peripheral/user_auth/hdi_service/idm/src/ |
H A D | idm_session.c | 44 uint8_t challenge[CHALLENGE_LEN]; member 70 if (SecureRandom(challenge, challengeLen) != RESULT_SUCCESS) { in GenerateChallenge() 75 if (challenge[j] != 0) { in GenerateChallenge() 87 if (challenge == NULL || challengeLen != CHALLENGE_LEN) { in OpenEditSession() 91 (void)memset_s(challenge, CHALLENGE_LEN, 0, CHALLENGE_LEN); in OpenEditSession() 117 if (memcpy_s(challenge, CHALLENGE_LEN, g_session->challenge, CHALLENGE_LEN) != EOK) { in OpenEditSession() 169 if (challenge == NULL || challengeLen != CHALLENGE_LEN) { in CheckChallenge() 177 if (memcmp(challenge, g_session->challenge, CHALLENGE_LEN) != EOK) { in CheckChallenge() 305 ResultCode GetChallenge(uint8_t *challenge, uint32_t challengeLen) in GetChallenge() argument 307 if ((challenge == NULL) || (challengeLen != CHALLENGE_LEN)) { in GetChallenge() [all …]
|
/ohos5.0/base/security/device_security_level/services/dslm/ |
H A D | dslm_msg_utils.c | 33 static uint8_t *GenerateSecInfoResponseJson(uint64_t challenge, const DslmCredBuff *cred) in GenerateSecInfoResponseJson() argument 57 …DslmByteToHexString((uint8_t *)&challenge, sizeof(challenge), (uint8_t *)nonce, CHALLENGE_STRING_L… in GenerateSecInfoResponseJson() 80 static uint8_t *GenerateSecInfoRequestJson(uint64_t challenge) in GenerateSecInfoRequestJson() argument 94 …DslmByteToHexString((uint8_t *)&challenge, sizeof(challenge), (uint8_t *)nonce, CHALLENGE_STRING_L… in GenerateSecInfoRequestJson() 120 int32_t BuildDeviceSecInfoRequest(uint64_t challenge, MessageBuff **msg) in BuildDeviceSecInfoRequest() argument 132 out->buff = GenerateSecInfoRequestJson(challenge); in BuildDeviceSecInfoRequest() 160 …slmHexStringToByte(nonceStr, strlen(nonceStr), (uint8_t *)&obj->challenge, sizeof(obj->challenge)); in ParseDeviceSecInfoRequest() 174 int32_t BuildDeviceSecInfoResponse(uint64_t challenge, const DslmCredBuff *cred, MessageBuff **msg) in BuildDeviceSecInfoResponse() argument 184 out->buff = GenerateSecInfoResponseJson(challenge, cred); in BuildDeviceSecInfoResponse() 197 if (msg == NULL || challenge == NULL || version == NULL || cred == NULL) { in ParseDeviceSecInfoResponse() [all …]
|
/ohos5.0/base/security/asset/test/unittest/kits_ndk/src/ |
H A D | asset_auth_query_test.cpp | 73 Asset_Blob challenge = { 0 }; variable 74 ASSERT_EQ(ASSET_SUCCESS, OH_Asset_PreQuery(preQueryAttr, ARRAY_SIZE(preQueryAttr), &challenge)); 80 { .tag = ASSET_TAG_AUTH_CHALLENGE, .value.blob = challenge }, 86 { .tag = ASSET_TAG_AUTH_CHALLENGE, .value.blob = challenge }, 119 Asset_Blob challenge = { 0 }; variable 120 ASSERT_EQ(ASSET_SUCCESS, OH_Asset_PreQuery(preQueryAttr, ARRAY_SIZE(preQueryAttr), &challenge)); 126 { .tag = ASSET_TAG_AUTH_CHALLENGE, .value.blob = challenge }, 131 { .tag = ASSET_TAG_AUTH_CHALLENGE, .value.blob = challenge }, 154 Asset_Blob challenge = { 0 }; variable 183 Asset_Blob challenge = { 0 }; variable [all …]
|
/ohos5.0/drivers/peripheral/user_auth/test/unittest/service_test/src/ |
H A D | user_auth_interface_service_test.cpp | 127 authParam.baseParam.challenge = challenge; in DoOnceAuth() 156 std::vector<uint8_t> challenge; variable 301 std::vector<uint8_t> challenge; variable 323 std::vector<uint8_t> challenge; variable 346 std::vector<uint8_t> challenge; variable 385 std::vector<uint8_t> challenge; variable 467 std::vector<uint8_t> challenge; variable 486 std::vector<uint8_t> challenge; variable 524 std::vector<uint8_t> challenge; variable 728 authParam.baseParam.challenge = challenge; [all …]
|
/ohos5.0/base/security/asset/test/unittest/inner_kits_rust/src/ |
H A D | pre_query.rs | 88 let challenge = asset_sdk::Manager::build().unwrap().pre_query(&query).unwrap(); in pre_query_batch_data() localVariable 89 assert_eq!(CHALLENGE_SIZE, challenge.len()); in pre_query_batch_data() 91 query.insert_attr(Tag::AuthChallenge, challenge); in pre_query_batch_data() 107 let challenge = asset_sdk::Manager::build().unwrap().pre_query(&query).unwrap(); in pre_query_single_data() localVariable 108 assert_eq!(CHALLENGE_SIZE, challenge.len()); in pre_query_single_data() 111 query.insert_attr(Tag::AuthChallenge, challenge); in pre_query_single_data() 125 let challenge = asset_sdk::Manager::build().unwrap().pre_query(&query).unwrap(); in pre_query_max_times() localVariable 126 assert_eq!(CHALLENGE_SIZE, challenge.len()); in pre_query_max_times() 127 challenges.push(challenge); in pre_query_max_times() 131 for challenge in challenges.into_iter() { in pre_query_max_times() [all …]
|
/ohos5.0/base/security/device_security_level/oem_property/ohos/common/ |
H A D | dslm_ohos_verify.c | 41 uint64_t challenge; member 82 …ToByte(challengeStr, strlen(challengeStr), (uint8_t *)&nonce->challenge, sizeof(nonce->challenge)); in ParseNonceOfCertChain() 154 static int32_t CheckNonceOfCertChain(const struct NonceOfCertChain *nonce, uint64_t challenge, cons… in CheckNonceOfCertChain() argument 156 if (challenge != nonce->challenge) { in CheckNonceOfCertChain() 169 …erifyNonceOfCertChain(const char *jsonStr, const struct DeviceIdentify *device, uint64_t challenge) in VerifyNonceOfCertChain() argument 194 ret = CheckNonceOfCertChain(&nonce, challenge, pkInfoListStr); in VerifyNonceOfCertChain() 231 static int32_t VerifyStandardDslmCred(const DeviceIdentify *device, uint64_t challenge, const DslmC… in VerifyStandardDslmCred() argument 250 ret = VerifyNonceOfCertChain(resultInfo.nonceStr, device, challenge); in VerifyStandardDslmCred() 276 int32_t VerifyOhosDslmCred(const DeviceIdentify *device, uint64_t challenge, const DslmCredBuff *cr… in VerifyOhosDslmCred() argument 287 return VerifyStandardDslmCred(device, challenge, credBuff, credInfo); in VerifyOhosDslmCred()
|
/ohos5.0/base/security/code_signature/utils/src/ |
H A D | huks_attest_verifier.cpp | 178 return (static_cast<uint32_t>(size) == challenge.GetSize()) in CompareTargetValue() 179 && (memcmp(data, challenge.GetBuffer(), size) == 0); in CompareTargetValue() 184 static bool ParseASN1Sequence(uint8_t *data, int size, const ByteBuffer &challenge) in ParseASN1Sequence() argument 199 challenge); in ParseASN1Sequence() 205 ret = CompareTargetValue(curNid, value->data, value->length, challenge); in ParseASN1Sequence() 215 static bool VerifyExtension(X509 *cert, const ByteBuffer &challenge) in VerifyExtension() argument 217 if (challenge.GetBuffer() == nullptr) { in VerifyExtension() 240 if (!ParseASN1Sequence(extData->data, extData->length, challenge)) { in VerifyExtension() 271 bool VerifyCertAndExtension(X509 *signCert, X509 *issuerCert, const ByteBuffer &challenge) in VerifyCertAndExtension() argument 278 if (!VerifyExtension(signCert, challenge)) { in VerifyCertAndExtension() [all …]
|
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/inc/key_agreement/ |
H A D | pake_server.h | 75 struct challenge self_challenge; 76 struct challenge peer_challenge; 99 struct challenge challenge; member 105 struct challenge challenge; member
|
H A D | sts_server.h | 64 struct challenge challenge; member 82 struct challenge peer_challenge; 83 struct challenge my_challenge; 104 struct challenge challenge; member
|
/ohos5.0/drivers/peripheral/user_auth/test/unittest/idm_test/ |
H A D | idm_session_test.cpp | 30 uint8_t challenge[CHALLENGE_LEN]; member 35 extern ResultCode GenerateChallenge(uint8_t *challenge, uint32_t challengeLen); 89 uint8_t challenge = 0; variable 90 EXPECT_EQ(CheckChallenge(&challenge, 0), RESULT_BAD_PARAM); 91 EXPECT_EQ(CheckChallenge(&challenge, CHALLENGE_LEN), RESULT_NEED_INIT); 96 uint8_t challenge[CHALLENGE_LEN]; variable 97 EXPECT_EQ(memset_s(challenge, CHALLENGE_LEN, 0, CHALLENGE_LEN), EOK); 99 EXPECT_EQ(GenerateChallenge(session.challenge, CHALLENGE_LEN), RESULT_SUCCESS); 101 EXPECT_EQ(CheckChallenge(challenge, CHALLENGE_LEN), RESULT_BAD_MATCH);
|
/ohos5.0/base/security/asset/services/crypto_manager/src/ |
H A D | crypto_manager.rs | 58 pub fn find(&mut self, calling_info: &CallingInfo, challenge: &Vec<u8>) -> Result<&Crypto> { in find() 61 if crypto.challenge().eq(challenge) && crypto.calling_info().eq(calling_info) { in find() 69 pub fn remove(&mut self, calling_info: &CallingInfo, challenge: &Vec<u8>) { in remove() 70 …ryptos.retain(|crypto| crypto.calling_info() != calling_info || !crypto.challenge().eq(challenge)); in remove()
|
H A D | crypto.rs | 28 …fn InitKey(keyId: *const KeyId, valid_time: u32, challenge: *mut OutBlob, handle: *mut OutBlob) ->… in InitKey() 48 challenge: Vec<u8>, field 60 challenge: vec![0; CHALLENGE_LEN], in build() 70 …let mut challenge = OutBlob { size: self.challenge.len() as u32, data: self.challenge.as_mut_ptr()… in init_key() localVariable 78 &mut challenge as *mut OutBlob, in init_key() 83 SUCCESS => Ok(&self.challenge), in init_key() 174 pub(crate) fn challenge(&self) -> &Vec<u8> { in challenge() method 175 &self.challenge in challenge()
|
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/source/auth_info/ |
H A D | exchange_auth_info_client.c | 244 typedef void (*COPY_CHALLENGE)(struct uint8_buff *sign_src_data, const struct challenge *peer_chall… 245 const struct challenge *self_challenge); 248 static void copy_peer_self_challenge(struct uint8_buff *sign_src_data, const struct challenge *peer… 249 const struct challenge *self_challenge); 272 const struct challenge *self_challenge); 340 const struct challenge *self_challenge) in copy_peer_self_challenge() 349 self_challenge->challenge, CHALLENGE_BUFF_LENGTH) != EOK) { in copy_peer_self_challenge() 358 const struct challenge *self_challenge) in copy_self_peer_challenge() 367 peer_challenge->challenge, CHALLENGE_BUFF_LENGTH) != EOK) { in copy_self_peer_challenge() 378 const struct challenge *peer_challenge = &hichain->pake_client->peer_challenge; in generate_sign_src_data() [all …]
|
/ohos5.0/base/useriam/user_auth_framework/test/fuzztest/services/userauthservice_fuzzer/ |
H A D | user_auth_service_fuzzer.cpp | 218 std::vector<uint8_t> challenge; in FuzzAuth() local 219 FillFuzzUint8Vector(parcel, challenge); in FuzzAuth() 233 std::vector<uint8_t> challenge; in FuzzAuthUser() local 234 FillFuzzUint8Vector(parcel, challenge); in FuzzAuthUser() 241 .challenge = challenge, in FuzzAuthUser() 253 std::vector<uint8_t> challenge; in FuzzIdentify() local 254 FillFuzzUint8Vector(parcel, challenge); in FuzzIdentify() 379 std::vector<uint8_t> challenge; in FuzzCheckValidSolution() local 383 .challenge = challenge, in FuzzCheckValidSolution() 469 std::vector<uint8_t> challenge; in FuzzAuthRemoteUser() local [all …]
|
/ohos5.0/docs/zh-cn/application-dev/reference/apis-universal-keystore-kit/ |
H A D | _huks_type_api.md | 87 …HUKS_CHALLENGE_POS_2, <br/>OH_HUKS_CHALLENGE_POS_3 <br/>} | challenge类型为用户自定义类型时,生成的challenge有效长度仅… 159 challenge类型为用户自定义类型时,生成的challenge有效长度仅为8字节连续的数据,且仅支持4种位置。 165 | OH_HUKS_CHALLENGE_POS_0 | 0~7字节为当前密钥的有效challenge。 | 166 | OH_HUKS_CHALLENGE_POS_1 | 8~15字节为当前密钥的有效challenge。 | 167 | OH_HUKS_CHALLENGE_POS_2 | 16~23字节为当前密钥的有效challenge。 | 168 | OH_HUKS_CHALLENGE_POS_3 | 24~31字节为当前密钥的有效challenge。 | 179 密钥使用时生成challenge的类型 189 | OH_HUKS_CHALLENGE_TYPE_NORMAL | challenge为普通类型,默认32字节。 | 190 | OH_HUKS_CHALLENGE_TYPE_CUSTOM | challenge为用户自定义类型。支持使用多个密钥仅一次认证,challenge长度8字节有效。 | 191 | OH_HUKS_CHALLENGE_TYPE_NONE | 免challenge类型。 | [all …]
|
/ohos5.0/docs/zh-cn/application-dev/security/AssetStoreKit/ |
H A D | asset-js-query-auth.md | 102 async function userAuthenticate(challenge: Uint8Array): Promise<Uint8Array> { 105 challenge: challenge, 137 asset.preQuery(query).then((challenge: Uint8Array) => { 138 resolve(challenge); 150 async function postQueryAsset(challenge: Uint8Array) { 152 handle.set(asset.Tag.AUTH_CHALLENGE, challenge); 164 preQueryAsset().then(async (challenge: Uint8Array) => { 167 let authToken: Uint8Array = await userAuthenticate(challenge); 172 query.set(asset.Tag.AUTH_CHALLENGE, challenge); 182 postQueryAsset(challenge); [all …]
|
/ohos5.0/docs/zh-cn/device-dev/reference/hdi-apis/userauth/ |
H A D | _auth_solution_v10.md | 24 | unsigned char[] [challenge](#challenge) | 挑战值,用于签发认证令牌。 | 54 ### challenge subsection 57 unsigned char [] AuthSolution::challenge
|
H A D | _auth_solution_v12.md | 28 | unsigned char[] [challenge](#challenge) | 挑战值,用于签发认证令牌。 | 54 ### challenge subsection 57 unsigned char [] AuthSolution::challenge
|
H A D | _auth_solution_v1__2_v12.md | 24 | unsigned char[] [challenge](#challenge) | 挑战值,用于签发认证令牌。 | 72 ### challenge subsection 75 unsigned char [] AuthSolutionV1_2::challenge
|
/ohos5.0/base/security/device_security_level/test/dslm_unit_test/ |
H A D | dslm_test.cpp | 835 uint64_t challenge; variable 861 uint64_t challenge; variable 877 uint64_t challenge; variable 893 uint64_t challenge; variable 910 uint64_t challenge; variable 927 uint64_t challenge; variable 964 uint64_t challenge; variable 1000 uint64_t challenge; variable 1712 uint64_t challenge = 0x1234; variable 1724 uint64_t challenge = 0x1234; variable [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/lite_exchange_task/ |
H A D | iso_server_bind_exchange_task.c | 76 static int DecryptChallenge(const IsoParams *params, const CJson *in, uint8_t *challenge, uint32_t … in DecryptChallenge() argument 101 Uint8Buff challengeBuf = { challenge, CHALLENGE_SIZE }; in DecryptChallenge() 186 static int GenerateAuthCodeAndImport(const IsoParams *params, CJson *out, uint8_t *challenge, uint3… in GenerateAuthCodeAndImport() argument 206 Uint8Buff challengeBuf = { challenge, challengeLen }; in GenerateAuthCodeAndImport() 241 uint8_t *challenge = (uint8_t *)HcMalloc(CHALLENGE_SIZE, 0); in ServerBindExchangeStart() local 242 if (challenge == NULL) { in ServerBindExchangeStart() 246 res = DecryptChallenge(params, in, challenge, CHALLENGE_SIZE); in ServerBindExchangeStart() 251 res = GenerateAuthCodeAndImport(params, out, challenge, CHALLENGE_SIZE); in ServerBindExchangeStart() 259 HcFree(challenge); in ServerBindExchangeStart()
|