Searched refs:sigData (Results 1 – 2 of 2) sorted by relevance
/base/security/device_security_level/test/dslm_unit_test/ |
D | dslm_oem_property_test.cpp | 41 extern int32_t EcdsaVerify(const struct DataBuffer *srcData, const struct DataBuffer *sigData, 686 const DataBuffer sigData = {.length = length, .data = (uint8_t *)data}; variable 690 int32_t ret = EcdsaVerify(&srcData, &sigData, pbkData, algorithm); 703 const DataBuffer sigData = {.length = length, .data = (uint8_t *)data}; variable 706 int32_t ret = EcdsaVerify(&srcData, &sigData, &pbkData, algorithm); 713 const DataBuffer sigData = {.length = length, .data = nullptr}; variable 716 int32_t ret = EcdsaVerify(&srcData, &sigData, &pbkData, algorithm); 722 const DataBuffer sigData = {.length = length, .data = (uint8_t *)data}; variable 726 int32_t ret = EcdsaVerify(&srcData, &sigData, &pbkData, algorithm); 740 const DataBuffer sigData = {.length = length, .data = (uint8_t *)data}; variable [all …]
|
/base/security/device_security_level/oem_property/common/ |
D | dslm_credential_utils.c | 97 int32_t EcdsaVerify(const struct DataBuffer *srcData, const struct DataBuffer *sigData, 367 const char *sigData = GetJsonFieldString(item, JSON_KEY_SIGNATURE); in ParsePublicKeyAttestation() local 368 if (sigData == NULL) { in ParsePublicKeyAttestation() 371 …attestation->signature.length = (uint32_t)Base64UrlDecodeApp((uint8_t *)sigData, &attestation->sig… in ParsePublicKeyAttestation() 521 int32_t EcdsaVerify(const struct DataBuffer *srcData, const struct DataBuffer *sigData, in EcdsaVerify() argument 525 if (srcData == NULL || sigData == NULL || pbkData == NULL) { in EcdsaVerify() 528 …if (srcData->data == NULL || sigData->data == NULL || pbkData->data == NULL || srcData->length == … in EcdsaVerify() 529 sigData->length == 0 || pbkData->length == 0) { in EcdsaVerify() 562 if (EVP_DigestVerifyFinal(ctx, sigData->data, sigData->length) <= 0) { in EcdsaVerify()
|