/ohos5.0/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/ |
H A D | hks_batch_test.cpp | 110 .data = (uint8_t *)AesCipher::AAD 143 .data = (uint8_t *)AesCipher::AAD 222 .data = (uint8_t *)AesCipher::AAD 255 .data = (uint8_t *)AesCipher::AAD 335 .data = (uint8_t *)AesCipher::AAD 369 .data = (uint8_t *)AesCipher::AAD 409 .data = (uint8_t *)AesCipher::AAD 488 .data = (uint8_t *)AesCipher::AAD 521 .data = (uint8_t *)AesCipher::AAD 600 .data = (uint8_t *)AesCipher::AAD [all …]
|
H A D | hks_import_wrapped_test_common.cpp | 37 … .data = (uint8_t *) Unittest::ImportWrappedKey::AAD} 188 … .data = reinterpret_cast<uint8_t *>(Unittest::ImportWrappedKey::AAD)}; in ImportWrappedKey()
|
H A D | hks_access_control_test_common.cpp | 25 static const uint8_t AAD[HKS_AE_AAD_LEN + 1] = "OH_authToken"; variable 102 .data = (uint8_t *)AAD
|
H A D | hks_import_wrapped_x25519_suite_test.cpp | 121 … .data = (uint8_t *) Unittest::ImportWrappedKey::AAD}
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/symmetric_alg_test/ |
H A D | hks_aes_cipher_part4_test.cpp | 99 .data = (uint8_t *)AAD 132 .data = (uint8_t *)AAD 224 .data = (uint8_t *)AAD 257 .data = (uint8_t *)AAD 342 .data = (uint8_t *)AAD 375 .data = (uint8_t *)AAD
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/three_stage_test/include/ |
H A D | hks_sm4_cipher_test_common.h | 31 static uint8_t AAD[AAD_SIZE] = {0}; variable
|
H A D | hks_import_wrapped_test_common.h | 48 static uint8_t AAD[AAD_SIZE] = "abababababababa"; variable
|
/ohos5.0/docs/zh-cn/application-dev/security/UniversalKeystoreKit/ |
H A D | huks-key-use-overview.md | 24 …别名和密钥操作参数,初始化一个密钥会话并获取会话句柄。其中密钥操作参数中必须包含对应密码算法所必须的参数,包括密码算法、密钥大小、密钥目的、工作模式、填充模式、散列模式、IV、Nonce、AAD等。
|
H A D | huks-import-wrapped-key-arkts.md | 36 let AAD = "abababababababab"; 232 value: stringToUint8Array(AAD) 529 FILED_LENGTH + AAD.length + 533 FILED_LENGTH + AAD.length + 540 let AADUint8Array = stringToUint8Array(AAD);
|
H A D | huks-encryption-decryption-arkts.md | 27 - 使用AES算法加密,用例中选取的分组模式为GCM时,必须要填参数NONCE,AAD可选,请见[开发案例:AES/GCM/NoPadding](#aesgcmnopadding)。 46 … - 使用AES算法解密,用例中选取的分组模式为GCM时,必须要填参数NONCE和参数AEAD,AAD可选,请见[开发案例:AES/GCM/NoPadding](#aesgcmnopadding)。 280 let AAD = '1234567890123456'; 335 value: StringToUint8Array(AAD) 362 value: StringToUint8Array(AAD)
|
H A D | huks-import-wrapped-key-ndk.md | 82 static uint8_t AAD[AAD_SIZE] = "abababababababa"; // 此处仅为测试数据,实际使用时该值每次应该不同 111 .blob = {.size = AAD_SIZE, .data = (uint8_t *)AAD}}, // 此处仅为测试数据,实际使用时该值应与调用者信息相关 145 .blob = {.size = AAD_SIZE, .data = (uint8_t *)AAD}}, // 此处仅为测试数据,实际使用时该值应与调用者信息相关 395 struct OH_Huks_Blob commonAad = {.size = AAD_SIZE, .data = reinterpret_cast<uint8_t *>(AAD)};
|
/ohos5.0/base/security/huks/test/unittest/huks_common_test/include/ |
H A D | hks_aes_cipher_part_test_c.h | 40 .data = (uint8_t *)AAD \
|
/ohos5.0/foundation/communication/wifi/wifi/services/wifi_standard/wifi_framework/wifi_toolkit/utils/ |
H A D | wifi_encryption_util.h | 33 const uint8_t AAD[AAD_SIZE] = {0}; variable
|
H A D | wifi_encryption_util.cpp | 36 { .tag = HKS_TAG_ASSOCIATED_DATA, .blob = { .size = AAD_SIZE, .data = (uint8_t *)AAD } },
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/three_stage_test/include/symmetric_alg_test/ |
H A D | hks_aes_cipher_test_common.h | 30 static uint8_t AAD[AAD_SIZE] = {0}; variable
|
/ohos5.0/base/telephony/core_service/utils/common/src/ |
H A D | tel_aes_crypto_util.cpp | 30 constexpr uint8_t AAD[AAD_SIZE] = {0}; variable 66 .data = (uint8_t *)AAD \
|
/ohos5.0/docs/en/application-dev/security/UniversalKeystoreKit/ |
H A D | huks-import-wrapped-key-arkts.md | 36 let AAD = "abababababababab"; 232 value: stringToUint8Array(AAD) 529 FILED_LENGTH + AAD.length + 533 FILED_LENGTH + AAD.length + 540 let AADUint8Array = stringToUint8Array(AAD);
|
H A D | huks-key-use-overview.md | 24 …cipher algorithm, key size, key purpose, working mode, padding mode, hash mode, IV, nonce, and AAD.
|
H A D | huks-import-wrapped-key-ndk.md | 82 static uint8_t AAD[AAD_SIZE] = "abababababababa"; // Test data only. The value must be different ea… 111 ….blob = {.size = AAD_SIZE, .data = (uint8_t *)AAD}}, // Test data only. The value varies with the … 145 ….blob = {.size = AAD_SIZE, .data = (uint8_t *)AAD}}, // Test data only. The value varies with the … 395 struct OH_Huks_Blob commonAad = {.size = AAD_SIZE, .data = reinterpret_cast<uint8_t *>(AAD)};
|
H A D | huks-encryption-decryption-arkts.md | 27 …k mode are used for encryption, the **NONCE** parameter is mandatory and **AAD** is optional. For … 46 …k mode are used for encryption, **NONCE** and **AEAD** are mandatory and **AAD** is optional. For … 280 let AAD = '1234567890123456'; 335 value: StringToUint8Array(AAD) 362 value: StringToUint8Array(AAD)
|
/ohos5.0/foundation/communication/wifi/wifi/test/wifi_standard/wifi_framework/wifi_toolkit/unittest/ |
H A D | wifi_encryption_util_test.cpp | 35 { .tag = HKS_TAG_ASSOCIATED_DATA, .blob = { .size = AAD_SIZE, .data = (uint8_t *)AAD } },
|
/ohos5.0/docs/en/application-dev/reference/apis-crypto-architecture-kit/ |
H A D | _crypto_sym_cipher_api.md | 98 | CRYPTO_AAD_DATABLOB | Additional authentication data (AAD). |
|
/ohos5.0/docs/zh-cn/release-notes/ |
H A D | OpenHarmony-v4.1-release.md | 216 - 加解密算法库框架支持PBKDF2算法、支持对称密钥可选AAD参数、支持可变长度密钥HMAC、支持DH/25519算法、支持brainpool曲线、支持SM2密钥解析和参数处理能力、支持基于曲线名…
|
H A D | OpenHarmony-v4.1-beta1.md | 293 - 加解密算法库框架支持PBKDF2算法、支持对称密钥可选AAD参数、支持可变长度密钥HMAC、支持DH/25519算法、支持brainpool曲线、支持SM2密钥解析和参数处理能力、支持基于曲线名…
|
/ohos5.0/docs/en/application-dev/security/CryptoArchitectureKit/ |
H A D | crypto-sym-encrypt-decrypt-spec.md | 21 > - In CCM encryption mode, the additional authentication data (AAD) must be specified and its leng…
|