Home
last modified time | relevance | path

Searched refs:sigData (Results 1 – 2 of 2) sorted by relevance

/base/security/device_security_level/test/dslm_unit_test/
Ddslm_oem_property_test.cpp41 extern int32_t EcdsaVerify(const struct DataBuffer *srcData, const struct DataBuffer *sigData,
686 const DataBuffer sigData = {.length = length, .data = (uint8_t *)data}; variable
690 int32_t ret = EcdsaVerify(&srcData, &sigData, pbkData, algorithm);
703 const DataBuffer sigData = {.length = length, .data = (uint8_t *)data}; variable
706 int32_t ret = EcdsaVerify(&srcData, &sigData, &pbkData, algorithm);
713 const DataBuffer sigData = {.length = length, .data = nullptr}; variable
716 int32_t ret = EcdsaVerify(&srcData, &sigData, &pbkData, algorithm);
722 const DataBuffer sigData = {.length = length, .data = (uint8_t *)data}; variable
726 int32_t ret = EcdsaVerify(&srcData, &sigData, &pbkData, algorithm);
740 const DataBuffer sigData = {.length = length, .data = (uint8_t *)data}; variable
[all …]
/base/security/device_security_level/oem_property/common/
Ddslm_credential_utils.c97 int32_t EcdsaVerify(const struct DataBuffer *srcData, const struct DataBuffer *sigData,
367 const char *sigData = GetJsonFieldString(item, JSON_KEY_SIGNATURE); in ParsePublicKeyAttestation() local
368 if (sigData == NULL) { in ParsePublicKeyAttestation()
371 …attestation->signature.length = (uint32_t)Base64UrlDecodeApp((uint8_t *)sigData, &attestation->sig… in ParsePublicKeyAttestation()
521 int32_t EcdsaVerify(const struct DataBuffer *srcData, const struct DataBuffer *sigData, in EcdsaVerify() argument
525 if (srcData == NULL || sigData == NULL || pbkData == NULL) { in EcdsaVerify()
528 …if (srcData->data == NULL || sigData->data == NULL || pbkData->data == NULL || srcData->length == … in EcdsaVerify()
529 sigData->length == 0 || pbkData->length == 0) { in EcdsaVerify()
562 if (EVP_DigestVerifyFinal(ctx, sigData->data, sigData->length) <= 0) { in EcdsaVerify()