/ohos5.0/base/security/device_auth/services/mk_agree/src/ |
H A D | mk_agree_task.c | 37 Uint8Buff devicePk = { NULL, 0 }; in GeneratePakeRequestPayload() local 45 FreeUint8Buff(&devicePk); in GeneratePakeRequestPayload() 50 ClearFreeUint8Buff(&devicePk); in GeneratePakeRequestPayload() 53 if (AddByteToJson(payload, FIELD_PUBLIC_KEY, devicePk.val, devicePk.length) != HC_SUCCESS) { in GeneratePakeRequestPayload() 55 ClearFreeUint8Buff(&devicePk); in GeneratePakeRequestPayload() 58 ClearFreeUint8Buff(&devicePk); in GeneratePakeRequestPayload() 99 Uint8Buff devicePk = { NULL, 0 }; in GeneratePakeResponsePayload() local 107 FreeUint8Buff(&devicePk); in GeneratePakeResponsePayload() 112 ClearFreeUint8Buff(&devicePk); in GeneratePakeResponsePayload() 115 if (AddByteToJson(payload, FIELD_PUBLIC_KEY, devicePk.val, devicePk.length) != HC_SUCCESS) { in GeneratePakeResponsePayload() [all …]
|
H A D | key_manager.c | 371 int32_t GetDevicePubKey(int32_t osAccountId, Uint8Buff *devicePk) in GetDevicePubKey() argument 373 if (devicePk == NULL) { in GetDevicePubKey() 385 res = GetLoaderInstance()->exportPublicKey(&keyParams, devicePk); in GetDevicePubKey()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/creds_manager/ |
H A D | asy_token_manager.c | 55 …if (GetByteFromJson(pkInfoJson, FIELD_DEVICE_PK, info->devicePk.val, info->devicePk.length) != HC_… in GeneratePkInfoFromJson() 60 info->devicePk.length = HcStrlen(devicePk) / BYTE_TO_HEX_OPER_LENGTH; in GeneratePkInfoFromJson() 558 if (memcpy_s(desInfo->devicePk.val, desInfo->devicePk.length, in GeneratePkInfoFromInfo() 559 srcInfo->devicePk.val, srcInfo->devicePk.length) != EOK) { in GeneratePkInfoFromInfo() 563 desInfo->devicePk.length = srcInfo->devicePk.length; in GeneratePkInfoFromInfo() 717 if (devicePk == NULL) { in CheckDevicePk() 723 HcFree(devicePk); in CheckDevicePk() 729 HcFree(devicePk); in CheckDevicePk() 737 HcFree(devicePk); in CheckDevicePk() 1353 token->pkInfo.devicePk.val = NULL; in InitTokenData() [all …]
|
/ohos5.0/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | mk_agree_test.cpp | 262 Uint8Buff devicePk = { NULL, 0 }; variable 263 ret = InitUint8Buff(&devicePk, PAKE_X25519_KEY_PAIR_LEN); 265 ret = GetDevicePubKey(DEFAULT_OS_ACCOUNT, &devicePk); 267 FreeUint8Buff(&devicePk); 272 Uint8Buff devicePk = { NULL, 0 }; variable 273 int32_t ret = GetDevicePubKey(DEFAULT_OS_ACCOUNT, &devicePk);
|
/ohos5.0/base/security/device_auth/services/mk_agree/src/mock/ |
H A D | key_manager_mock.c | 66 int32_t GetDevicePubKey(int32_t osAccountId, Uint8Buff *devicePk) in GetDevicePubKey() argument 69 (void)devicePk; in GetDevicePubKey()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_task_common.c | 270 const char *devicePk = GetStringFromJson(info, FIELD_DEVICE_PK); in GetPeerPkFromPkInfo() local 271 if (devicePk == NULL) { in GetPeerPkFromPkInfo() 276 uint32_t pkSize = HcStrlen(devicePk) / BYTE_TO_HEX_OPER_LENGTH; in GetPeerPkFromPkInfo() 377 …if (memcpy_s(params->pkSelf, PK_SIZE, token->pkInfo.devicePk.val, token->pkInfo.devicePk.length) !… in GetAsyPubKeyInfo()
|
/ohos5.0/base/security/device_auth/services/mk_agree/inc/ |
H A D | key_manager.h | 37 int32_t GetDevicePubKey(int32_t osAccountId, Uint8Buff *devicePk);
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/inc/account_related/creds_manager/ |
H A D | asy_token_manager.h | 28 Uint8Buff devicePk; member
|
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/ |
H A D | dev_session_util.c | 90 const char *devicePk = GetStringFromJson(pkInfoJson, FIELD_DEVICE_PK); in BuildRealPkInfoJson() local 91 if (devicePk == NULL) { in BuildRealPkInfoJson() 110 if (AddStringToJson(realPkInfoJson, FIELD_DEVICE_PK, devicePk) != HC_SUCCESS) { in BuildRealPkInfoJson()
|
/ohos5.0/foundation/distributedhardware/device_manager/test/commonunittest/ |
H A D | UTTest_dm_credential_manager.cpp | 1388 "devicePk" : "0000", 1431 "devicePk" : "0000", 1474 "devicePk" : "0000", 1517 "devicePk" : "0000", 1604 "devicePk" : "0000",
|
/ohos5.0/base/security/device_auth/services/identity_manager/src/ |
H A D | cert_operation.c | 282 const char *devicePk = GetStringFromJson(pkInfoPeer, FIELD_DEVICE_PK); in GetPeerPubKeyFromCert() local 283 if (devicePk == NULL) { in GetPeerPubKeyFromCert() 288 uint32_t pkSize = HcStrlen(devicePk) / BYTE_TO_HEX_OPER_LENGTH; in GetPeerPubKeyFromCert()
|
/ohos5.0/foundation/distributedhardware/device_manager/services/implementation/src/credential/ |
H A D | dm_credential_manager.cpp | 315 std::string devicePk = jsonObject[FIELD_DEVICE_PK].get<std::string>(); in GetCredentialData() local 320 jsonPkInfo[FIELD_DEVICE_PK] = devicePk; in GetCredentialData()
|
/ohos5.0/docs/zh-cn/application-dev/reference/apis-distributedservice-kit/ |
H A D | js-apis-device-manager-sys.md | 1415 devicePk : string; 1436 devicePk : "0000",
|
/ohos5.0/docs/en/application-dev/reference/apis-distributedservice-kit/ |
H A D | js-apis-device-manager-sys.md | 1415 devicePk : string; 1436 devicePk : "0000",
|