/ohos5.0/base/security/huks/interfaces/inner_api/huks_standard/main/include/ |
H A D | hks_type.h | 56 #define HKS_AE_TAG_LEN 16 macro 59 #define HKS_AE_TAG_LEN 16 macro 244 uint8_t tag[HKS_AE_TAG_LEN]; 292 #define HKS_MAX_KEY_MATERIAL_LEN (sizeof(struct HksPubKeyInfo) + HKS_MAX_KEY_LEN + HKS_AE_TAG_LEN)
|
/ohos5.0/base/security/huks/services/huks_standard/huks_engine/main/core/src/ |
H A D | hks_keyblob_lite.c | 128 aeadParam->payloadLen = keyInfo->keySize - HKS_AE_TAG_LEN; in BuildKeyBlobUsageSpec() 131 aeadParam->tagLenEnc = HKS_AE_TAG_LEN; in BuildKeyBlobUsageSpec() 133 …aeadParam->tagDec.data = cipherKey->data + keyInfo->keyInfoLen - HKS_AE_TAG_LEN; /* the last 16 by… in BuildKeyBlobUsageSpec() 134 aeadParam->tagDec.size = HKS_AE_TAG_LEN; in BuildKeyBlobUsageSpec() 169 … struct HksBlob tag = { HKS_AE_TAG_LEN, cipherKey->data + keyInfo->keyInfoLen - HKS_AE_TAG_LEN }; in EncryptAndDecryptKeyBlob() 172 encKey.size -= HKS_AE_TAG_LEN; /* the decrypt len should remove the tag len */ in EncryptAndDecryptKeyBlob() 396 keyInfo->keySize = key->size + HKS_AE_TAG_LEN; in FillStoreKeyInfo()
|
H A D | hks_core_service_three_stage.c | 124 if (outData->size < (inData->size + HKS_AE_TAG_LEN)) { in CheckAesCipherAead() 827 if (outData->size < (inData->size + HKS_AE_TAG_LEN + HKS_AES_GCM_NONCE_LEN)) { in CoreAesEncryptFinish() 906 if (outData->size < (inData->size + HKS_AE_TAG_LEN + HKS_AES_CCM_NONCE_LEN)) { in CoreAesCcmCipherFinish()
|
H A D | hks_keyblob.c | 188 aeadParam->tagLenEnc = HKS_AE_TAG_LEN; in BuildKeyBlobUsageSpec()
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/common/src/ |
H A D | hks_crypto_adapter.c | 138 if (inputText->size <= HKS_AE_TAG_LEN) { in HksFillAeadParam() 142 inputText->size -= HKS_AE_TAG_LEN; in HksFillAeadParam() 144 tagParam.blob.size = HKS_AE_TAG_LEN; in HksFillAeadParam() 154 aeadParam->tagLenEnc = HKS_AE_TAG_LEN; in HksFillAeadParam() 238 if (outData->size < (inData->size + HKS_AE_TAG_LEN)) { in HksGetEncryptAeTag() 244 tagAead->size = HKS_AE_TAG_LEN; in HksGetEncryptAeTag()
|
H A D | hks_base_check.c | 1404 if (inData->size > (UINT32_MAX - HKS_AE_TAG_LEN)) { in CheckAesAeCipherData() 1408 if (outData->size < (inData->size + HKS_AE_TAG_LEN)) { in CheckAesAeCipherData() 1415 … if ((inData->size < HKS_AE_TAG_LEN) || (outData->size < inData->size - HKS_AE_TAG_LEN)) { in CheckAesAeCipherData()
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/rkc/src/ |
H A D | hks_rkc.c | 250 aeadParam.tagLenEnc = HKS_AE_TAG_LEN; in ExecuteMkCrypt() 251 struct HksBlob tag = { HKS_AE_TAG_LEN, cipherText->data + key.size }; in ExecuteMkCrypt() 254 aeadParam.tagDec.size = HKS_AE_TAG_LEN; in ExecuteMkCrypt() 255 aeadParam.tagDec.data = cipherText->data + cipherText->size - HKS_AE_TAG_LEN; in ExecuteMkCrypt() 256 cipherText->size -= HKS_AE_TAG_LEN; /* the decrypt len should remove the tag len */ in ExecuteMkCrypt()
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/ |
H A D | hks_access_control_test_common.cpp | 26 static uint8_t TAG[HKS_AE_TAG_LEN] = { 0 }; 113 .size = HKS_AE_TAG_LEN, 150 (void)memcpy_s(authTokenHal->tag, HKS_AE_TAG_LEN, in AssignAuthToken() 151 cipherTextOutData->data + cipherTextOutData->size, HKS_AE_TAG_LEN); in AssignAuthToken() 209 cipherTextOutData.size -= HKS_AE_TAG_LEN; in AuthTokenEncrypt()
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/ |
H A D | huks_master.cpp | 460 if (cipherText.size <= HKS_AE_TAG_LEN) { in AppendAeTag() 472 { HKS_AE_TAG_LEN, cipherText.data.get() + cipherText.size - HKS_AE_TAG_LEN } in AppendAeTag() 475 cipherText.size -= HKS_AE_TAG_LEN; in AppendAeTag()
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/ |
H A D | openssl_aes_helper.c | 27 #define HKS_AE_TAG_LEN 16 macro 280 if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, HKS_AE_TAG_LEN, tagAead->data) != 1) { in AesGcmEncrypt()
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
H A D | hks_openssl_aes.c | 417 …if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, HKS_AE_TAG_LEN, tagAead->data) != HKS_OPENSSL_… in OpensslAesAeadEncryptFinal() 615 …if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, HKS_AE_TAG_LEN, tagAead->data) != HKS_OPENSSL_… in OpensslAesAeadEncryptFinalGCM() 737 …if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, HKS_AE_TAG_LEN, NULL) != HKS_OPENSSL_SUCCESS) { in OpensslAesAeadCipherInit() 854 …if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, HKS_AE_TAG_LEN, tagAead->data) != HKS_OPENSSL_… in OpensslAesAeadCipherFinal()
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/os_dependency/ipc/src/ |
H A D | hks_client_service_ipc.c | 355 if (inText->size <= HKS_AE_TAG_LEN) { in AddAeTag() 362 aeParam.blob.data = inText->data + inText->size - HKS_AE_TAG_LEN; in AddAeTag() 363 aeParam.blob.size = HKS_AE_TAG_LEN; in AddAeTag()
|
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/test/unittest/unittest_mock/ |
H A D | huks_adapter_mock_for_pake.c | 597 plain_text.data = (uint8_t *)MALLOC(cipher_text_with_tag.size - HKS_AE_TAG_LEN); in aes_gcm_decrypt() 599 plain_text.size = cipher_text_with_tag.size - HKS_AE_TAG_LEN; in aes_gcm_decrypt()
|
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/source/huks_adapter/ |
H A D | huks_adapter.c | 653 plain_text.data = (uint8_t *)MALLOC(cipher_text_with_tag.size - HKS_AE_TAG_LEN); in aes_gcm_decrypt() 655 plain_text.size = cipher_text_with_tag.size - HKS_AE_TAG_LEN; in aes_gcm_decrypt()
|
/ohos5.0/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/ |
H A D | huks_adapter.c | 981 CHECK_LEN_LOWER_RETURN(outCipher->length, plain->length + HKS_AE_TAG_LEN, "outCipher"); in CheckAesGcmEncryptParam() 1069 CHECK_LEN_LOWER_RETURN(outPlain->length, cipher->length - HKS_AE_TAG_LEN, "outPlain"); in CheckAesGcmDecryptParam()
|