synchronize with tizen 2.4 54/51254/1 accepted/tizen_3.0_common accepted/tizen_mobile accepted/tizen_tv accepted/tizen_wearable tizen tizen_3.0.m2 accepted/tizen/3.0/common/20161114.105954 accepted/tizen/mobile/20151106.050008 accepted/tizen/tv/20151106.050014 accepted/tizen/wearable/20151106.050025 submit/tizen/20151106.011028 submit/tizen_3.0_common/20161104.104000 submit/tizen_common/20151229.142028 submit/tizen_common/20151229.144031 submit/tizen_common/20151229.154718
authorDongsun Lee <ds73.lee@samsung.com>
Fri, 6 Nov 2015 00:21:28 +0000 (09:21 +0900)
committerDongsun Lee <ds73.lee@samsung.com>
Fri, 6 Nov 2015 00:21:28 +0000 (09:21 +0900)
Change-Id: I459c4c0aeacec20bf8002d19d9e4b34b77a4e4b9
Signed-off-by: Dongsun Lee <ds73.lee@samsung.com>
src/dukgen.c

index 6a76c68..2fdd4e1 100644 (file)
 #include <SecCryptoSvc.h>
 #include <dukgen.h>
 
-char* GetDeviceUniqueKey(char* pAppId, int idLen, int keyLen)
+char *GetDeviceUniqueKey(char *pAppId, int idLen, int keyLen)
 {
-       unsigned char* pUniqueKey = NULL;
-       char* pDuk = NULL;
-       bool result = true;
+       unsigned char *pUniqueKey = NULL;
+       char *pDuk = NULL;
 
-       pUniqueKey = (unsigned char*)calloc(keyLen,1);
-       if (pUniqueKey == NULL)
-               return NULL;
-       result = SecFrameGeneratePlatformUniqueKey((unsigned int)keyLen , pUniqueKey);
-       if(result == false)
-       {
-               free(pUniqueKey);
-               return NULL;
-       }
+       if (!(pUniqueKey = (unsigned char *)calloc(keyLen, 1)))
+               goto exit;
 
-       pDuk = (char*)calloc(keyLen, 1);
-       if (pDuk == NULL)
-       {
-               free(pUniqueKey);
-               return NULL;
-       }
-       PKCS5_PBKDF2_HMAC_SHA1(pAppId, idLen, (unsigned char*)pUniqueKey, keyLen, 1, keyLen, (unsigned char*)pDuk);
-       free(pUniqueKey);
+       if (!SecFrameGeneratePlatformUniqueKey((unsigned int)keyLen , pUniqueKey))
+               goto exit;
+
+       if (!(pDuk = (char *)calloc(keyLen, 1)))
+               goto exit;
 
+       PKCS5_PBKDF2_HMAC_SHA1(pAppId, idLen, (unsigned char *)pUniqueKey, keyLen, 1, keyLen, (unsigned char *)pDuk);
+
+exit:
+       free(pUniqueKey);
        return pDuk;
 }