/ohos5.0/foundation/distributedhardware/device_manager/test/commonunittest/ |
H A D | UTTest_dm_credential_manager.cpp | 267 "pkInfoSignature" : "", 356 "pkInfoSignature" : "", 389 "pkInfoSignature" : "", 436 "pkInfoSignature" : "", 445 "pkInfoSignature" : "", 494 "pkInfoSignature" : "", 525 "pkInfoSignature" : "", 577 "pkInfoSignature" : "", 586 "pkInfoSignature" : "", 618 "pkInfoSignature" : "", [all …]
|
H A D | UTTest_dm_anonymous.cpp | 317 "pkInfoSignature" : "",
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/creds_manager/ |
H A D | asy_token_manager.c | 158 token->pkInfoSignature.length) != HC_SUCCESS) { in GenerateTokenFromJson() 591 if (memcpy_s(returnToken->pkInfoSignature.val, returnToken->pkInfoSignature.length, in GenerateAccountTokenFromToken() 592 token->pkInfoSignature.val, token->pkInfoSignature.length) != EOK) { in GenerateAccountTokenFromToken() 596 returnToken->pkInfoSignature.length = token->pkInfoSignature.length; in GenerateAccountTokenFromToken() 1117 GOTO_ERR_AND_SET_RET(memcpy_s(token->pkInfoSignature.val, token->pkInfoSignature.length, in GetToken() 1118 existToken->pkInfoSignature.val, existToken->pkInfoSignature.length), ret); in GetToken() 1119 token->pkInfoSignature.length = existToken->pkInfoSignature.length; in GetToken() 1348 token->pkInfoSignature.val = NULL; in InitTokenData() 1369 token->pkInfoSignature.length = SIGNATURE_SIZE; in CreateAccountToken() 1399 HcFree(token->pkInfoSignature.val); in DestroyAccountToken() [all …]
|
/ohos5.0/base/security/device_auth/services/identity_manager/src/ |
H A D | cert_operation.c | 117 if (AddByteToJson(out, FIELD_PK_INFO_SIGNATURE, certInfo->pkInfoSignature.val, in AddCertInfoToJson() 118 certInfo->pkInfoSignature.length) != HC_SUCCESS) { in AddCertInfoToJson() 267 &keyParams, &certInfo->pkInfoStr, certInfo->signAlg, &certInfo->pkInfoSignature); in VerifyPeerCertInfo() 350 int32_t GenerateCertInfo(const Uint8Buff *pkInfoStr, const Uint8Buff *pkInfoSignature, CertInfo *ce… in GenerateCertInfo() argument 365 uint32_t signatureLen = pkInfoSignature->length; in GenerateCertInfo() 366 certInfo->pkInfoSignature.val = (uint8_t *)HcMalloc(signatureLen, 0); in GenerateCertInfo() 367 if (certInfo->pkInfoSignature.val == NULL) { in GenerateCertInfo() 372 …if (memcpy_s(certInfo->pkInfoSignature.val, signatureLen, pkInfoSignature->val, signatureLen) != E… in GenerateCertInfo() 375 FreeBuffData(&certInfo->pkInfoSignature); in GenerateCertInfo() 378 certInfo->pkInfoSignature.length = signatureLen; in GenerateCertInfo() [all …]
|
H A D | identity_common.c | 161 FreeBuffData(&info->proof.certInfo.pkInfoSignature); in DestroyIdentityInfo()
|
/ohos5.0/foundation/distributedhardware/device_manager/services/implementation/src/credential/ |
H A D | dm_credential_manager.cpp | 49 std::string pkInfoSignature; member 76 credentialData.pkInfoSignature = jsonObject[FIELD_PKINFO_SIGNATURE].get<std::string>(); in from_json() 323 jsonCreObj[FIELD_PKINFO_SIGNATURE] = inputCreData.pkInfoSignature; in GetCredentialData() 349 … credentialDataInfo.pkInfoSignature = jsonObject[FIELD_PKINFO_SIGNATURE].get<std::string>(); in from_json() 377 jsonObject[FIELD_PKINFO_SIGNATURE] = credentialDataInfo.pkInfoSignature; in to_json()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/inc/account_related/creds_manager/ |
H A D | asy_token_manager.h | 34 Uint8Buff pkInfoSignature; member
|
/ohos5.0/base/security/device_auth/services/identity_manager/inc/ |
H A D | identity_defines.h | 97 Uint8Buff pkInfoSignature; member
|
/ohos5.0/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | identity_manager_test.cpp | 37 extern "C" int32_t GenerateCertInfo(const Uint8Buff *pkInfoStr, const Uint8Buff *pkInfoSignature, C… 81 info.pkInfoSignature.val = testSignature; 82 info.pkInfoSignature.length = TEST_SIGNATURE_LEN;
|
/ohos5.0/foundation/distributedhardware/device_manager/services/implementation/include/credential/ |
H A D | dm_credential_manager.h | 29 std::string pkInfoSignature; member
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_task_common.c | 381 …if (memcpy_s(params->pkInfoSignSelf.val, params->pkInfoSignSelf.length, token->pkInfoSignature.val, in GetAsyPubKeyInfo() 382 token->pkInfoSignature.length) != EOK) { in GetAsyPubKeyInfo() 386 params->pkInfoSignSelf.length = token->pkInfoSignature.length; in GetAsyPubKeyInfo()
|
/ohos5.0/base/security/device_auth/test/fuzztest/creds_manager/credsmanager_fuzzer/ |
H A D | credsmanager_fuzzer.cpp | 543 certInfo->pkInfoSignature.val = (uint8_t *)HcMalloc(token->pkInfoSignature.length, 0); in GetCertInfo() 544 certInfo->pkInfoSignature.length = token->pkInfoSignature.length; in GetCertInfo() 545 …(void)memcpy_s(certInfo->pkInfoSignature.val, certInfo->pkInfoSignature.length, token->pkInfoSigna… in GetCertInfo() 546 token->pkInfoSignature.length); in GetCertInfo() 1791 HcFree(certInfo.pkInfoSignature.val); in CredsManagerTest64()
|
/ohos5.0/foundation/distributedhardware/device_manager/test/commonfuzztest/authenticatedeviceserviceimpl_fuzzer/ |
H A D | authenticate_device_service_impl_fuzzer.cpp | 68 "pkInfoSignature" : "",
|
/ohos5.0/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/creds_manager/ |
H A D | creds_manager_test.cpp | 566 certInfo->pkInfoSignature.val = (uint8_t *)HcMalloc(token->pkInfoSignature.length, 0); in GetCertInfo() 567 ASSERT_NE(certInfo->pkInfoSignature.val, nullptr); in GetCertInfo() 568 certInfo->pkInfoSignature.length = token->pkInfoSignature.length; in GetCertInfo() 569 …(void)memcpy_s(certInfo->pkInfoSignature.val, certInfo->pkInfoSignature.length, token->pkInfoSigna… in GetCertInfo() 570 token->pkInfoSignature.length); in GetCertInfo() 1944 HcFree(certInfo.pkInfoSignature.val);
|
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/ |
H A D | dev_session_v2.c | 532 if (AddByteToJson(credInfo, FIELD_PK_INFO_SIGNATURE, cred->proof.certInfo.pkInfoSignature.val, in AddCertCredInfo() 533 cred->proof.certInfo.pkInfoSignature.length) != HC_SUCCESS) { in AddCertCredInfo() 593 if (InitUint8Buff(&peerCert->pkInfoSignature, pkInfoSignatureLen) != HC_SUCCESS) { in BuildPeerCertInfo() 598 if (HexStringToByte(pkInfoSignHexStr, peerCert->pkInfoSignature.val, in BuildPeerCertInfo() 599 peerCert->pkInfoSignature.length) != HC_SUCCESS) { in BuildPeerCertInfo() 602 ClearFreeUint8Buff(&peerCert->pkInfoSignature); in BuildPeerCertInfo() 611 ClearFreeUint8Buff(&certInfo->pkInfoSignature); in DestroyCertInfo()
|
/ohos5.0/foundation/distributedhardware/device_manager/test/unittest/ |
H A D | UTTest_device_manager_impl_three.cpp | 204 "pkInfoSignature": "", 247 "pkInfoSignature": "", 290 "pkInfoSignature": "", 922 "pkInfoSignature": "",
|
H A D | UTTest_device_manager_service.cpp | 1424 "pkInfoSignature" : "world",
|
/ohos5.0/foundation/distributedhardware/device_manager/test/smallunittest/ |
H A D | device_manager_linux_test.cpp | 117 "pkInfoSignature": "",
|
/ohos5.0/foundation/distributedhardware/device_manager/test/commonfuzztest/authenticatedevice_fuzzer/ |
H A D | authenticate_device_fuzzer.cpp | 106 "pkInfoSignature" : "",
|
/ohos5.0/docs/zh-cn/application-dev/reference/apis-distributedservice-kit/ |
H A D | js-apis-device-manager-sys.md | 1403 pkInfoSignature : string; 1423 pkInfoSignature : "30440220490BCB4F822004C9A76AB8D97F80041FC0E",
|
/ohos5.0/docs/en/application-dev/reference/apis-distributedservice-kit/ |
H A D | js-apis-device-manager-sys.md | 1403 pkInfoSignature : string; 1423 pkInfoSignature : "30440220490BCB4F822004C9A76AB8D97F80041FC0E",
|