/drivers/peripheral/user_auth/hdi_service/adaptor/src/ |
D | adaptor_algorithm.c | 50 keyPair->pubKey = CreateBufferBySize(ED25519_FIX_PUBKEY_BUFFER_SIZE); in CreateEd25519KeyPair() 51 if (keyPair->pubKey == NULL) { in CreateEd25519KeyPair() 59 DestoryBuffer(keyPair->pubKey); in CreateEd25519KeyPair() 71 if (keyPair->pubKey != NULL) { in DestoryKeyPair() 72 DestoryBuffer(keyPair->pubKey); in DestoryKeyPair() 86 if (!CheckBufferWithSize(keyPair->pubKey, ED25519_FIX_PUBKEY_BUFFER_SIZE)) { in IsEd25519KeyPairValid() 118 size_t pubKeySize = keyPair->pubKey->maxSize; in GenerateEd25519KeyPair() 119 if (EVP_PKEY_get_raw_public_key(key, keyPair->pubKey->buf, &pubKeySize) != OPENSSL_SUCCESS) { in GenerateEd25519KeyPair() 123 keyPair->pubKey->contentSize = pubKeySize; in GenerateEd25519KeyPair() 189 int32_t Ed25519Verify(const Buffer *pubKey, const Buffer *data, const Buffer *sign) in Ed25519Verify() argument [all …]
|
/drivers/peripheral/user_auth/test/unittest/service_test/src/ |
D | signature_operation.cpp | 235 Buffer *pubKey = g_keyPair->pubKey; in GetExecutorPublicKey() local 236 vPubKey.resize(pubKey->contentSize); in GetExecutorPublicKey() 237 if (memcpy_s(&vPubKey[0], pubKey->contentSize, pubKey->buf, pubKey->contentSize) != EOK) { in GetExecutorPublicKey()
|
/drivers/peripheral/pin_auth/test/uinttest/pin_auth/adaptor/src/ |
D | adaptor_algorithm_test.cpp | 58 keyPair2.pubKey = nullptr; 67 keyPair3.pubKey = CopyBuffer(data); 68 EXPECT_NE(keyPair3.pubKey, nullptr); 71 DestoryBuffer(keyPair3.pubKey); 135 result = Ed25519Verify(keyPair->pubKey, nullptr, signContent); 138 result = Ed25519Verify(keyPair->pubKey, data, nullptr); 144 result = Ed25519Verify(keyPair->pubKey, data, signContent);
|
/drivers/peripheral/user_auth/hdi_service/adaptor/inc/ |
D | adaptor_algorithm.h | 33 Buffer *pubKey; member 47 int32_t Ed25519Verify(const Buffer *pubKey, const Buffer *data, const Buffer *sign);
|
/drivers/peripheral/pin_auth/hdi_service/adaptor/inc/ |
D | adaptor_algorithm.h | 39 Buffer *pubKey; member 47 int32_t Ed25519Verify(const Buffer *pubKey, const Buffer *data, const Buffer *sign);
|
/drivers/peripheral/pin_auth/hdi_service/adaptor/src/ |
D | adaptor_algorithm.c | 43 keyPair->pubKey = CreateBufferBySize(ED25519_FIX_PUBKEY_BUFFER_SIZE); in CreateEd25519KeyPair() 44 if (keyPair->pubKey == NULL) { in CreateEd25519KeyPair() 52 DestoryBuffer(keyPair->pubKey); in CreateEd25519KeyPair() 64 if (keyPair->pubKey != NULL) { in DestoryKeyPair() 65 DestoryBuffer(keyPair->pubKey); in DestoryKeyPair() 79 if (!CheckBufferWithSize(keyPair->pubKey, ED25519_FIX_PUBKEY_BUFFER_SIZE)) { in IsEd25519KeyPairValid() 111 size_t pubKeySize = keyPair->pubKey->maxSize; in GenerateEd25519KeyPair() 112 if (EVP_PKEY_get_raw_public_key(key, keyPair->pubKey->buf, &pubKeySize) != OPENSSL_SUCCESS) { in GenerateEd25519KeyPair() 116 keyPair->pubKey->contentSize = pubKeySize; in GenerateEd25519KeyPair() 182 int32_t Ed25519Verify(const Buffer *pubKey, const Buffer *data, const Buffer *sign) in Ed25519Verify() argument [all …]
|
/drivers/peripheral/user_auth/test/unittest/base_test/src/ |
D | adaptor_algorithm_test.cpp | 56 keyPair2.pubKey = nullptr; 65 keyPair3.pubKey = CopyBuffer(data); 66 EXPECT_NE(keyPair3.pubKey, nullptr); 69 DestoryBuffer(keyPair3.pubKey); 133 result = Ed25519Verify(keyPair->pubKey, nullptr, signContent); 136 result = Ed25519Verify(keyPair->pubKey, data, nullptr); 142 result = Ed25519Verify(keyPair->pubKey, data, signContent);
|
/drivers/peripheral/pin_auth/hdi_service/main/src/ |
D | pin_auth.cpp | 217 int32_t PinAuth::GetExecutorInfo(std::vector<uint8_t> &pubKey, uint32_t &esl) in GetExecutorInfo() argument 228 pubKey.resize(CONST_PUB_KEY_LEN); in GetExecutorInfo() 229 …if (memcpy_s(pubKey.data(), CONST_PUB_KEY_LEN, &(pinExecutorInfo.pubKey[0]), CONST_PUB_KEY_LEN) !=… in GetExecutorInfo() 236 …static_cast<void>(memset_s(&(pinExecutorInfo.pubKey[0]), CONST_PUB_KEY_LEN, 0, CONST_PUB_KEY_LEN)); in GetExecutorInfo()
|
D | pin_func.c | 183 if (GetBufferData(g_keyPair->pubKey, pinExecutorInfo->pubKey, &pubKeyLen) != RESULT_SUCCESS) { in DoGetExecutorInfo()
|
/drivers/peripheral/user_auth/hdi_service/key_mgr/src/ |
D | ed25519_key.c | 53 return g_keyPair->pubKey; in GetPubKey()
|
/drivers/peripheral/pin_auth/test/uinttest/pin_auth/main/src/ |
D | pin_auth_test.cpp | 160 std::vector<uint8_t> pubKey; variable 162 int32_t result = pinAuth->GetExecutorInfo(pubKey, esl); 216 std::vector<uint8_t> pubKey; variable 218 result = pinAuth->GetExecutorInfo(pubKey, esl);
|
/drivers/peripheral/pin_auth/hdi_service/main/inc/ |
D | pin_auth.h | 48 int32_t GetExecutorInfo(std::vector<uint8_t> &pubKey, uint32_t &esl);
|
D | pin_func.h | 107 uint8_t pubKey[CONST_PUB_KEY_LEN]; member
|
/drivers/peripheral/user_auth/hdi_service/coauth/inc/ |
D | pool.h | 42 uint8_t pubKey[PUBLIC_KEY_LEN]; member
|
/drivers/peripheral/user_auth/hdi_service/service/ |
D | user_auth_interface_service.cpp | 95 in->executors[i].pubKey, PUBLIC_KEY_LEN) != EOK) { in CopyScheduleInfoV1_1() 796 if (memcpy_s(out.pubKey, PUBLIC_KEY_LEN, &in.publicKey[0], in.publicKey.size()) != EOK) { in CopyExecutorInfo()
|
/drivers/peripheral/user_auth/hdi_service/coauth/src/ |
D | executor_message.c | 163 publicKey = CreateBufferByData(executor->pubKey, PUBLIC_KEY_LEN); in Ed25519VerifyData()
|