diff options
author | Daniel Norman <danielnorman@google.com> | 2020-08-31 12:05:36 -0700 |
---|---|---|
committer | Daniel Norman <danielnorman@google.com> | 2020-09-02 14:25:33 -0700 |
commit | 10a34cdcea4289a87fe7a85251004e75888cc442 (patch) | |
tree | 988f7afa6d334b6f13ec18854971d3fa9f33b6a1 /identity/aidl/default/WritableIdentityCredential.cpp | |
parent | fac069f841464af83720724e79297db3260a5aa8 (diff) | |
parent | 0e32fba1de48a9cd4a160929863e8b1ef17fc7da (diff) |
Merge SP1A.200727.001
Change-Id: Ia3b7d4eba938bb8d176ba2b02a4e194288372de2
Diffstat (limited to 'identity/aidl/default/WritableIdentityCredential.cpp')
-rw-r--r-- | identity/aidl/default/WritableIdentityCredential.cpp | 26 |
1 files changed, 12 insertions, 14 deletions
diff --git a/identity/aidl/default/WritableIdentityCredential.cpp b/identity/aidl/default/WritableIdentityCredential.cpp index c218866ace..fea289b9ef 100644 --- a/identity/aidl/default/WritableIdentityCredential.cpp +++ b/identity/aidl/default/WritableIdentityCredential.cpp @@ -57,8 +57,8 @@ bool WritableIdentityCredential::initialize() { // attestation certificate with current time and expires one year from now. The // certificate shall contain all values as specified in hal. ndk::ScopedAStatus WritableIdentityCredential::getAttestationCertificate( - const vector<int8_t>& attestationApplicationId, // - const vector<int8_t>& attestationChallenge, // + const vector<uint8_t>& attestationApplicationId, // + const vector<uint8_t>& attestationChallenge, // vector<Certificate>* outCertificateChain) { if (!credentialPrivKey_.empty() || !credentialPubKey_.empty() || !certificateChain_.empty()) { return ndk::ScopedAStatus(AStatus_fromServiceSpecificErrorWithMessage( @@ -105,7 +105,7 @@ ndk::ScopedAStatus WritableIdentityCredential::getAttestationCertificate( *outCertificateChain = vector<Certificate>(); for (const vector<uint8_t>& cert : certificateChain_) { Certificate c = Certificate(); - c.encodedCertificate = byteStringToSigned(cert); + c.encodedCertificate = cert; outCertificateChain->push_back(std::move(c)); } return ndk::ScopedAStatus::ok(); @@ -186,14 +186,13 @@ ndk::ScopedAStatus WritableIdentityCredential::addAccessControlProfile( return ndk::ScopedAStatus(AStatus_fromServiceSpecificErrorWithMessage( IIdentityCredentialStore::STATUS_FAILED, "Error calculating MAC for profile")); } - profile.mac = byteStringToSigned(mac.value()); + profile.mac = mac.value(); cppbor::Map profileMap; profileMap.add("id", profile.id); if (profile.readerCertificate.encodedCertificate.size() > 0) { - profileMap.add( - "readerCertificate", - cppbor::Bstr(byteStringToUnsigned(profile.readerCertificate.encodedCertificate))); + profileMap.add("readerCertificate", + cppbor::Bstr(profile.readerCertificate.encodedCertificate)); } if (profile.userAuthenticationRequired) { profileMap.add("userAuthenticationRequired", profile.userAuthenticationRequired); @@ -273,9 +272,8 @@ ndk::ScopedAStatus WritableIdentityCredential::beginAddEntry( return ndk::ScopedAStatus::ok(); } -ndk::ScopedAStatus WritableIdentityCredential::addEntryValue(const vector<int8_t>& contentS, - vector<int8_t>* outEncryptedContentS) { - auto content = byteStringToUnsigned(contentS); +ndk::ScopedAStatus WritableIdentityCredential::addEntryValue(const vector<uint8_t>& content, + vector<uint8_t>* outEncryptedContent) { size_t contentSize = content.size(); if (contentSize > IdentityCredentialStore::kGcmChunkSize) { @@ -330,7 +328,7 @@ ndk::ScopedAStatus WritableIdentityCredential::addEntryValue(const vector<int8_t signedDataCurrentNamespace_.add(std::move(entryMap)); } - *outEncryptedContentS = byteStringToSigned(encryptedContent.value()); + *outEncryptedContent = encryptedContent.value(); return ndk::ScopedAStatus::ok(); } @@ -379,7 +377,7 @@ bool generateCredentialData(const vector<uint8_t>& hardwareBoundKey, const strin } ndk::ScopedAStatus WritableIdentityCredential::finishAddingEntries( - vector<int8_t>* outCredentialData, vector<int8_t>* outProofOfProvisioningSignature) { + vector<uint8_t>* outCredentialData, vector<uint8_t>* outProofOfProvisioningSignature) { if (numAccessControlProfileRemaining_ != 0) { return ndk::ScopedAStatus(AStatus_fromServiceSpecificErrorWithMessage( IIdentityCredentialStore::STATUS_INVALID_DATA, @@ -436,8 +434,8 @@ ndk::ScopedAStatus WritableIdentityCredential::finishAddingEntries( IIdentityCredentialStore::STATUS_FAILED, "Error generating CredentialData")); } - *outCredentialData = byteStringToSigned(credentialData); - *outProofOfProvisioningSignature = byteStringToSigned(signature.value()); + *outCredentialData = credentialData; + *outProofOfProvisioningSignature = signature.value(); return ndk::ScopedAStatus::ok(); } |