/ohos5.0/drivers/hdf_core/adapter/khdf/linux/model/network/wifi/vendor/hi3881/ |
H A D | Makefile | 32 HMAC_PATH := $(HDF_WIFI_VENDOR_ROOT)/$(WIFI_DRIVER_DIR)/mac/hmac/ 79 hmac-objs := hmac_11i.o hmac_blockack.o hmac_chan_mgmt.o hmac_config.o hmac_crypto_tkip.o hmac_even… 86 hmac-objs += hmac_edca_opt.o 89 hmac-objs += hmac_p2p.o 92 hmac-objs += hmac_tcp_opt.o 95 hmac-objs += hmac_traffic_classify.o 98 hmac-objs += hmac_wow.o 101 hmac-objs += hmac_any.o 104 hmac-objs += hmac_wapi.o hmac_wapi_wpi.o hmac_wapi_sms4.o 106 hmac-objs := $(addprefix $(HMAC_PATH),$(hmac-objs)) [all …]
|
/ohos5.0/drivers/peripheral/pin_auth/hdi_service/adaptor/src/ |
H A D | adaptor_algorithm.c | 220 !IsBufferValid(data) || !IsBufferValid(hmac) || hmac->maxSize > UINT_MAX) { in IamHmac() 224 unsigned int hmacSize = hmac->maxSize; in IamHmac() 226 hmac->buf, &hmacSize); in IamHmac() 231 hmac->contentSize = hmacSize; in IamHmac() 242 *hmac = CreateBufferBySize(SHA256_DIGEST_SIZE); in HmacSha256() 243 if (*hmac == NULL) { in HmacSha256() 248 DestroyBuffer(*hmac); in HmacSha256() 249 *hmac = NULL; in HmacSha256() 264 if (*hmac == NULL) { in HmacSha512() 269 DestroyBuffer(*hmac); in HmacSha512() [all …]
|
/ohos5.0/drivers/peripheral/user_auth/hdi_service/adaptor/src/ |
H A D | adaptor_algorithm.c | 228 !IsBufferValid(data) || !IsBufferValid(hmac) || hmac->maxSize > UINT_MAX) { in IamHmac() 232 uint32_t hmacSize = hmac->maxSize; in IamHmac() 234 hmac->buf, &hmacSize); in IamHmac() 239 hmac->contentSize = hmacSize; in IamHmac() 243 int32_t HmacSha256(const Buffer *hmacKey, const Buffer *data, Buffer **hmac) in HmacSha256() argument 245 if (hmac == NULL) { in HmacSha256() 254 *hmac = CreateBufferBySize(SHA256_DIGEST_SIZE); in HmacSha256() 255 if (*hmac == NULL) { in HmacSha256() 259 if (IamHmac(alg, hmacKey, data, *hmac) != RESULT_SUCCESS) { in HmacSha256() 260 DestoryBuffer(*hmac); in HmacSha256() [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_protocol_task/ |
H A D | iso_client_protocol_task.c | 215 uint8_t *hmac = (uint8_t *)HcMalloc(HMAC_LEN, 0); in GenerateSessionKey() local 216 if (hmac == NULL) { in GenerateSessionKey() 221 if (GetByteFromJson(in, FIELD_RETURN_CODE_MAC, hmac, HMAC_LEN) != 0) { in GenerateSessionKey() 228 res = IsoClientGenSessionKey(¶ms->baseParams, 0, hmac, HMAC_LEN); in GenerateSessionKey() 237 HcFree(hmac); in GenerateSessionKey()
|
/ohos5.0/docs/zh-cn/application-dev/security/UniversalKeystoreKit/ |
H A D | Readme-CN.md | 46 - [HMAC介绍及算法规格](huks-hmac-overview.md) 48 - [HMAC(ArkTS)](huks-hmac-arkts.md) 49 - [HMAC(C/C++)](huks-hmac-ndk.md)
|
H A D | huks-hmac-arkts.md | 4 …证码(Hash-based Message Authentication Code)。具体的场景介绍及支持的算法规格,请参考[HMAC介绍与算法规格](huks-hmac-overview.md)。
|
H A D | huks-hmac-ndk.md | 4 …证码(Hash-based Message Authentication Code)。具体的场景介绍及支持的算法规格,请参考[HMAC介绍与算法规格](huks-hmac-overview.md)。
|
/ohos5.0/drivers/peripheral/pin_auth/hdi_service/adaptor/inc/ |
H A D | adaptor_algorithm.h | 63 int32_t HmacSha256(const Buffer *hmacKey, const Buffer *data, Buffer **hmac); 64 int32_t HmacSha512(const Buffer *hmacKey, const Buffer *data, Buffer **hmac);
|
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/source/key_agreement/ |
H A D | pake_client.c | 247 static struct hmac generate_proof(struct pake_client *pake_client); 278 static bool verify_proof_is_ok(struct pake_client *pake_client, struct hmac *kcf_data); 336 static struct hmac generate_proof(struct pake_client *pake_client) in generate_proof() 338 struct hmac proof = { 0, {0} }; in generate_proof() 367 static bool verify_proof_is_ok(struct pake_client *pake_client, struct hmac *kcf_data) in verify_proof_is_ok() 382 struct hmac verify_proof = { 0, {0} }; in verify_proof_is_ok()
|
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/inc/key_agreement/ |
H A D | pake_server.h | 107 struct hmac kcf_data; 111 struct hmac kcf_data;
|
H A D | pake_client.h | 44 struct hmac kcf_data;
|
/ohos5.0/drivers/peripheral/user_auth/test/unittest/base_test/src/ |
H A D | adaptor_algorithm_test.cpp | 155 Buffer **hmac = nullptr; variable 156 EXPECT_EQ(HmacSha256(hmacKey, data, hmac), RESULT_BAD_PARAM); 158 hmac = &temp; 159 EXPECT_EQ(HmacSha256(hmacKey, data, hmac), RESULT_GENERAL_ERROR);
|
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/inc/base/ |
H A D | base.h | 206 struct hmac { struct 208 uint8_t hmac[HC_HMAC_LEN]; argument
|
/ohos5.0/docs/en/application-dev/security/UniversalKeystoreKit/ |
H A D | Readme-EN.md | 46 - [HMAC Overview and Algorithm Specifications](huks-hmac-overview.md) 48 - [HMAC(ArkTS)](huks-hmac-arkts.md) 49 - [HMAC(C/C++)](huks-hmac-ndk.md)
|
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/source/struct/ |
H A D | pake_server_confirm.c | 41 int32_t result = byte_convert(obj, FIELD_KCF_DATA, pake_server_confirm->kcf_data.hmac, in parse_pake_server_confirm()
|
H A D | pake_client_confirm.c | 38 uint8_t *tmp_kcf_data_hex = raw_byte_to_hex_string(pake_client_confirm->kcf_data.hmac, in make_pake_client_confirm()
|
/ohos5.0/base/security/device_auth/services/protocol/inc/iso_protocol/ |
H A D | iso_protocol_common.h | 49 int IsoClientGenSessionKey(IsoBaseParams *params, int returnResult, const uint8_t *hmac, uint32_t h…
|
/ohos5.0/base/security/crypto_framework/plugin/ |
H A D | plugin.gni | 24 "${plugin_path}/openssl_plugin/crypto_operation/hmac/inc", 82 [ "${plugin_path}/openssl_plugin/crypto_operation/hmac/src/mac_openssl.c" ]
|
/ohos5.0/drivers/peripheral/user_auth/hdi_service/adaptor/inc/ |
H A D | adaptor_algorithm.h | 53 int32_t HmacSha256(const Buffer *hmacKey, const Buffer *data, Buffer **hmac);
|
/ohos5.0/base/security/device_auth/services/protocol/src/iso_protocol/ |
H A D | iso_protocol_common.c | 287 int IsoClientGenSessionKey(IsoBaseParams *params, int returnResult, const uint8_t *hmac, uint32_t h… in IsoClientGenSessionKey() argument 293 if (hmac == NULL) { in IsoClientGenSessionKey() 310 if (memcmp(outHmacBuf.val, hmac, hmacLen) != 0) { in IsoClientGenSessionKey()
|
/ohos5.0/docs/zh-cn/application-dev/security/CryptoArchitectureKit/ |
H A D | crypto-compute-mac.md | 29 在调用update接口传入数据时,可以[一次性传入所有数据](#hmac一次性传入),也可以把数据人工分段,然后[分段update](#分段hmac)。对于同一段数据而言,是否分段,计算结果没有差异…
|
H A D | crypto-convert-binary-data-to-sym-key-ndk.md | 60 对应的算法规格请查看[对称密钥生成和转换规格:HMAC](crypto-sym-key-generation-conversion-spec.md#hmac)。
|
/ohos5.0/base/security/crypto_framework/frameworks/ |
H A D | frameworks.gni | 31 "${plugin_path}/openssl_plugin/crypto_operation/hmac/inc",
|
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/inc/huks_adapter/ |
H A D | huks_adapter.h | 245 int32_t compute_hmac(struct var_buffer *key, const struct uint8_buff *message, struct hmac *out_hma…
|
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/test/unittest/ |
H A D | huks_adapter_test.h | 249 int32_t compute_hmac(struct var_buffer *key, const struct uint8_buff *message, struct hmac *out_hma…
|