/ohos5.0/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/ |
H A D | openssl_aes_helper.c | 33 uint32_t keySize = keyLen / BIT_NUM_OF_UINT8; in GenerateAesKey() 56 if (keyLen == HKS_AES_KEY_SIZE_128) { in AesCbcCrypt() 58 } else if (keyLen == HKS_AES_KEY_SIZE_192) { in AesCbcCrypt() 60 } else if (keyLen == HKS_AES_KEY_SIZE_256) { in AesCbcCrypt() 68 if (keyLen == HKS_AES_KEY_SIZE_128) { in AesEcbCrypt() 70 } else if (keyLen == HKS_AES_KEY_SIZE_192) { in AesEcbCrypt() 72 } else if (keyLen == HKS_AES_KEY_SIZE_256) { in AesEcbCrypt() 80 if (keyLen == HKS_AES_KEY_SIZE_128) { in AesCtrCrypt() 82 } else if (keyLen == HKS_AES_KEY_SIZE_192) { in AesCtrCrypt() 92 if (keyLen == HKS_AES_KEY_SIZE_128) { in AesGcmCrypt() [all …]
|
H A D | openssl_ecc_helper.c | 31 static int32_t GetCurveId(uint32_t keyLen, int *nid) in GetCurveId() argument 33 switch (keyLen) { in GetCurveId() 82 keyMaterial->keySize = keyLen; in EccSaveKeyMaterial() 83 keyMaterial->xSize = HKS_KEY_BYTES(keyLen); in EccSaveKeyMaterial() 84 keyMaterial->ySize = HKS_KEY_BYTES(keyLen); in EccSaveKeyMaterial() 85 keyMaterial->zSize = HKS_KEY_BYTES(keyLen); in EccSaveKeyMaterial() 472 if ((keyLen == 0) || (keyLen > HKS_ECC_KEY_SIZE_521)) { in EcKeyToPublicKey() 484 pubKeyInfo->keySize = keyLen; in EcKeyToPublicKey() 630 size_t keyLen = 0; in EcdhDerive() local 634 sharedKey->size = keyLen; in EcdhDerive() [all …]
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/ |
H A D | hks_crypto_hal_rsa_sign.cpp | 49 .keyLen = HKS_RSA_KEY_SIZE_512, 69 .keyLen = HKS_RSA_KEY_SIZE_768, 89 .keyLen = HKS_RSA_KEY_SIZE_1024, 109 .keyLen = HKS_RSA_KEY_SIZE_2048, 129 .keyLen = HKS_RSA_KEY_SIZE_3072, 149 .keyLen = HKS_RSA_KEY_SIZE_4096, 169 .keyLen = HKS_RSA_KEY_SIZE_512, 189 .keyLen = HKS_RSA_KEY_SIZE_768, 209 .keyLen = HKS_RSA_KEY_SIZE_1024, 291 .keyLen = HKS_RSA_KEY_SIZE_512, [all …]
|
H A D | hks_crypto_hal_rsa_cipher.cpp | 46 .keyLen = HKS_RSA_KEY_SIZE_512, 73 .keyLen = HKS_RSA_KEY_SIZE_768, 101 .keyLen = HKS_RSA_KEY_SIZE_1024, 130 .keyLen = HKS_RSA_KEY_SIZE_2048, 161 .keyLen = HKS_RSA_KEY_SIZE_3072, 194 .keyLen = HKS_RSA_KEY_SIZE_4096, 231 .keyLen = HKS_RSA_KEY_SIZE_512, 252 .keyLen = HKS_RSA_KEY_SIZE_768, 359 .keyLen = HKS_RSA_KEY_SIZE_512, 380 .keyLen = HKS_RSA_KEY_SIZE_768, [all …]
|
H A D | hks_crypto_hal_ecdsa_sign.cpp | 50 .keyLen = HKS_ECC_KEY_SIZE_224, 70 .keyLen = HKS_ECC_KEY_SIZE_256, 89 .keyLen = HKS_ECC_KEY_SIZE_384, 108 .keyLen = HKS_ECC_KEY_SIZE_521, 128 .keyLen = HKS_ECC_KEY_SIZE_224, 147 .keyLen = HKS_ECC_KEY_SIZE_256, 166 .keyLen = HKS_ECC_KEY_SIZE_384, 185 .keyLen = HKS_ECC_KEY_SIZE_521, 204 .keyLen = HKS_ECC_KEY_SIZE_224, 223 .keyLen = HKS_ECC_KEY_SIZE_256, [all …]
|
H A D | hks_crypto_hal_ecdh_agree.cpp | 46 .keyLen = HKS_ECC_KEY_SIZE_224, 51 .keyLen = HKS_ECC_KEY_SIZE_224, 62 .keyLen = HKS_ECC_KEY_SIZE_256, 67 .keyLen = HKS_ECC_KEY_SIZE_256, 77 .keyLen = HKS_ECC_KEY_SIZE_384, 82 .keyLen = HKS_ECC_KEY_SIZE_384, 92 .keyLen = HKS_ECC_KEY_SIZE_521, 97 .keyLen = HKS_ECC_KEY_SIZE_521,
|
H A D | hks_crypto_hal_rsa_key.cpp | 42 .keyLen = HKS_RSA_KEY_SIZE_512, 55 .keyLen = HKS_RSA_KEY_SIZE_768, 68 .keyLen = HKS_RSA_KEY_SIZE_1024, 82 .keyLen = HKS_RSA_KEY_SIZE_2048, 95 .keyLen = HKS_RSA_KEY_SIZE_3072, 108 .keyLen = HKS_RSA_KEY_SIZE_4096, 228 .keyLen = HKS_RSA_KEY_SIZE_2048,
|
H A D | hks_crypto_hal_api_mbedtls.cpp | 69 .keyLen = HKS_AES_KEY_SIZE_128, 88 .keyLen = 0, 109 .keyLen = 0, 301 key = { .size = keyLen, .data = (uint8_t *)HksMalloc(keyLen) }; 372 .keyLen = HKS_ECC_KEY_SIZE_256, 376 spec.keyLen += 1; 392 .keyLen = HKS_ECC_KEY_SIZE_256, 437 .keyLen = HKS_DH_KEY_SIZE_2048, 441 spec.keyLen += 1; 457 .keyLen = HKS_DH_KEY_SIZE_2048, [all …]
|
/ohos5.0/base/startup/init/services/param/base/ |
H A D | param_trie.c | 72 uint32_t len = keyLen + sizeof(ParamTrieNode) + 1; in AllocateParamTrieNode() 78 node->length = keyLen; in AllocateParamTrieNode() 79 int ret = PARAM_MEMCPY(node->key, keyLen, key, keyLen); in AllocateParamTrieNode() 81 node->key[keyLen] = '\0'; in AllocateParamTrieNode() 132 if (node->length > keyLen) { in CompareParamTrieNode() 134 } else if (node->length < keyLen) { in CompareParamTrieNode() 137 return memcmp(node->key, key, keyLen); in CompareParamTrieNode() 146 int ret = CompareParamTrieNode(current, key, keyLen); in AddToSubTrie() 280 realLen += keyLen + valueLen; in AddParamNode() 282 realLen += keyLen + GetParamMaxLen(type); in AddParamNode() [all …]
|
H A D | param_include.h | 39 ParamTrieNode *current, const char *key, uint32_t keyLen, uint32_t *matchLabel) in FindSubTrie() argument 44 if (subTrie->length > keyLen) { in FindSubTrie() 46 } else if (subTrie->length < keyLen) { in FindSubTrie() 49 ret = memcmp(subTrie->key, key, keyLen); in FindSubTrie() 72 const WorkSpace *workSpace, const char *key, uint32_t keyLen, uint32_t *matchLabel) in FindTrieNode_() argument 78 const char *end = key + keyLen; in FindTrieNode_()
|
/ohos5.0/base/security/dlp_permission_service/frameworks/common/src/ |
H A D | permission_policy.cpp | 185 FreeUint8Buffer(key, keyLen); in SetKey() 189 DLP_LOG_ERROR(LABEL, "Key len invalid, len=%{public}u", keyLen); in SetKey() 192 FreeUint8Buffer(key, keyLen); in SetKey() 195 DLP_LOG_ERROR(LABEL, "Alloc %{public}u buff for key fail", keyLen); in SetKey() 198 keyLen = originalKeyLen; in SetKey() 199 if (memcpy_s(*key, keyLen, originalKey, originalKeyLen) != EOK) { in SetKey() 201 FreeUint8Buffer(key, keyLen); in SetKey() 206 void PermissionPolicy::SetAeskey(const uint8_t* key, uint32_t keyLen) in SetAeskey() argument 209 SetKey(key, keyLen, &aeskey_, aeskeyLen_); in SetAeskey() 238 void PermissionPolicy::SetHmacKey(const uint8_t* key, uint32_t keyLen) in SetHmacKey() argument [all …]
|
/ohos5.0/base/security/huks/frameworks/crypto_lite/cipher/src/ |
H A D | cipher_rsa.c | 38 static char *RsaMallocPrivateKey(const unsigned char *key, size_t *keyLen) in RsaMallocPrivateKey() argument 45 size_t keyFinalLen = *keyLen + startLen + endLen + 1; in RsaMallocPrivateKey() 67 ret = memcpy_s(privateKey + startLen + *keyLen, keyFinalLen - startLen - *keyLen, end, endLen); in RsaMallocPrivateKey() 75 *keyLen = keyFinalLen; in RsaMallocPrivateKey() 79 static char *RsaMallocPublicKey(const unsigned char *key, size_t *keyLen) in RsaMallocPublicKey() argument 86 size_t keyFinalLen = *keyLen + startLen + endLen + 1; in RsaMallocPublicKey() 101 ret = memcpy_s(pubKey + startLen, keyFinalLen - startLen, key, *keyLen); in RsaMallocPublicKey() 108 ret = memcpy_s(pubKey + startLen + *keyLen, keyFinalLen - startLen - *keyLen, end, endLen); in RsaMallocPublicKey() 116 *keyLen = keyFinalLen; in RsaMallocPublicKey() 130 size_t finalKeyLen = keyLen; in RsaLoadPrivateKey() [all …]
|
H A D | cipher_aes.c | 232 size_t keyLen = (size_t)data->keyLen; in InitAesData() local 233 data->key = MallocDecodeData(key, &keyLen); in InitAesData() 237 if (keyLen != KEY_LEN) { in InitAesData() 239 keyLen, KEY_LEN); in InitAesData() 240 (void)memset_s(data->key, keyLen, 0, keyLen); in InitAesData() 245 data->keyLen = KEY_LEN; in InitAesData() 266 … (void)memset_s(aesCryptCxt->data.key, aesCryptCxt->data.keyLen, 0, aesCryptCxt->data.keyLen); in DeinitAesCryptData()
|
/ohos5.0/foundation/communication/dsoftbus/adapter/common/openssl/ |
H A D | softbus_aes_encrypt.c | 101 switch (cipherKey->keyLen) { in OpensslAesCfbEncrypt() 154 cipherKey->keyLen = AES_SESSION_KEY_LENGTH; in GenerateIvAndSessionKey() 156 cipherKey->key = (uint8_t *)SoftBusCalloc(cipherKey->keyLen); in GenerateIvAndSessionKey() 167 (void)memset_s(cipherKey->key, cipherKey->keyLen, 0, cipherKey->keyLen); in GenerateIvAndSessionKey() 197 (void)memset_s(cipherKey.key, cipherKey.keyLen, 0, cipherKey.keyLen); in SoftBusAesCfbRootEncrypt() 205 (void)memset_s(cipherKey.key, cipherKey.keyLen, 0, cipherKey.keyLen); in SoftBusAesCfbRootEncrypt() 229 EncryptKey key = { cipherKey->key, cipherKey->keyLen }; in SoftBusAesCfbEncrypt() 235 (void)memset_s(cipherKey->key, cipherKey->keyLen, 0, cipherKey->keyLen); in SoftBusAesCfbEncrypt() 263 static EVP_CIPHER *GetSslGcmAlgorithmByKeyLen(uint32_t keyLen) in GetSslGcmAlgorithmByKeyLen() argument 265 switch (keyLen) { in GetSslGcmAlgorithmByKeyLen() [all …]
|
/ohos5.0/foundation/communication/dsoftbus/core/adapter/bus_center/src/ |
H A D | lnn_kv_adapter_wrapper_virtual.cpp | 35 int32_t LnnPutDBData(int32_t dbId, const char *key, int32_t keyLen, const char *value, int32_t valu… in LnnPutDBData() argument 39 (void)keyLen; in LnnPutDBData() 45 int32_t LnnDeleteDBData(int32_t dbId, const char *key, int32_t keyLen) in LnnDeleteDBData() argument 49 (void)keyLen; in LnnDeleteDBData() 53 int32_t LnnGetDBData(int32_t dbId, const char *key, int32_t keyLen, char **value) in LnnGetDBData() argument 57 (void)keyLen; in LnnGetDBData()
|
H A D | lnn_kv_adapter_wrapper.cpp | 120 int32_t LnnPutDBData(int32_t dbId, const char *key, int32_t keyLen, const char *value, int32_t valu… in LnnPutDBData() argument 125 … if (key == nullptr || keyLen < MIN_STRING_LEN || keyLen > MAX_STRING_LEN || value == nullptr || in LnnPutDBData() 130 std::string keyStr(key, keyLen); in LnnPutDBData() 147 int32_t LnnDeleteDBData(int32_t dbId, const char *key, int32_t keyLen) in LnnDeleteDBData() argument 152 …if (key == nullptr || keyLen < MIN_STRING_LEN || keyLen > MAX_STRING_LEN || dbId < MIN_DBID_COUNT … in LnnDeleteDBData() 157 std::string keyStr(key, keyLen); in LnnDeleteDBData() 173 int32_t LnnGetDBData(int32_t dbId, const char *key, int32_t keyLen, char **value) in LnnGetDBData() argument 179 … if (value == nullptr || key == nullptr || keyLen < MIN_STRING_LEN || keyLen > MAX_STRING_LEN || in LnnGetDBData() 184 std::string keyStr(key, keyLen); in LnnGetDBData()
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/ |
H A D | hks_mbedtls_dh.c | 131 ret = GetDhParam(spec->keyLen, ¶mP, ¶mG); in HksMbedtlsDhGenerateKey() 133 uint32_t keyLen = HKS_KEY_BYTES(spec->keyLen); in HksMbedtlsDhGenerateKey() 140 ctx.len = keyLen; in HksMbedtlsDhGenerateKey() 142 uint8_t *output = (uint8_t *)HksMalloc(keyLen); in HksMbedtlsDhGenerateKey() 144 … ret = mbedtls_dhm_make_public(&ctx, keyLen, output, keyLen, mbedtls_ctr_drbg_random, &ctrDrbg); in HksMbedtlsDhGenerateKey() 148 ret = DhSaveKeyMaterial(&ctx, spec->keyLen, key); in HksMbedtlsDhGenerateKey() 230 if (HKS_KEY_BYTES(spec->keyLen) > sharedKey->size) { in HksMbedtlsDhAgreeKey() 261 size_t keyLen; in HksMbedtlsDhAgreeKey() local 263 …mbedtls_dhm_calc_secret(&ctx, sharedKey->data, sharedKey->size, &keyLen, mbedtls_ctr_drbg_random, … in HksMbedtlsDhAgreeKey() 269 sharedKey->size = keyLen; in HksMbedtlsDhAgreeKey()
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
H A D | hks_openssl_dsa.c | 157 *ylen = keyLen; in DsaGetKeyParamLen() 158 *plen = keyLen; in DsaGetKeyParamLen() 160 *glen = keyLen; in DsaGetKeyParamLen() 190 keyMaterial->keySize = keyLen * HKS_BITS_PER_BYTE; in DsaKeyMaterialParam() 191 DsaGetKeyParamLen(keyLen, in DsaKeyMaterialParam() 245 uint32_t keyLen; in DsaSaveKeyMaterial() local 246 uint32_t rawMaterialLen = DsaCalculateMaterialLen(keySize, &keyLen); in DsaSaveKeyMaterial() 252 if (DsaKeyMaterialParam(rawMaterial, dsa, keyLen) != HKS_SUCCESS) { in DsaSaveKeyMaterial() 269 if ((spec->keyLen == 0) || (spec->keyLen % HKS_BITS_PER_BYTE != 0)) { in HksOpensslDsaGenerateKey() 277 HKS_LOG_I("spec->keyLen = %" LOG_PUBLIC "u", spec->keyLen); in HksOpensslDsaGenerateKey() [all …]
|
H A D | hks_openssl_sm3.c | 33 if ((spec->keyLen == 0) || (spec->keyLen % BIT_NUM_OF_UINT8 != 0)) { in Sm3GenKeyCheckParam() 34 HKS_LOG_E("keyLen is wrong, len = %" LOG_PUBLIC "u", spec->keyLen); in Sm3GenKeyCheckParam() 44 return HksOpensslGenerateRandomKey(spec->keyLen, key); in HksOpensslSm3GenerateKey()
|
H A D | hks_openssl_ecc.c | 39 static int32_t HksOpensslEccCheckKeyLen(uint32_t keyLen) in HksOpensslEccCheckKeyLen() argument 41 …if ((keyLen != HKS_ECC_KEY_SIZE_224) && (keyLen != HKS_ECC_KEY_SIZE_256) && (keyLen != HKS_ECC_KEY… in HksOpensslEccCheckKeyLen() 42 (keyLen != HKS_ECC_KEY_SIZE_521)) { in HksOpensslEccCheckKeyLen() 43 HKS_LOG_E("invalid param keyLen(0x%" LOG_PUBLIC "x)!", keyLen); in HksOpensslEccCheckKeyLen() 49 static int32_t HksOpensslGetCurveId(uint32_t keyLen, int *nid) in HksOpensslGetCurveId() argument 51 switch (keyLen) { in HksOpensslGetCurveId() 112 uint32_t keySize = spec->keyLen; in EccSaveKeyMaterial() 169 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslEccCheckKeyLen(spec->keyLen), in HksOpensslEccGenerateKey() 173 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslGetCurveId(spec->keyLen, &curveId), in HksOpensslEccGenerateKey() 438 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslEccCheckKeyLen(spec->keyLen), in HksOpensslEcdhAgreeKey()
|
/ohos5.0/base/security/device_auth/services/legacy/group_auth/src/group_auth_manager/account_unrelated_group_auth/ |
H A D | account_unrelated_group_auth.c | 52 uint32_t keyLen = (HcStrlen(returnSessionKeyStr) / BYTE_TO_HEX_OPER_LENGTH); in ReturnSessionKey() local 53 uint8_t *sessionKey = (uint8_t *)HcMalloc(keyLen, 0); in ReturnSessionKey() 73 callback->onSessionKeyReturned(requestId, sessionKey, keyLen); in ReturnSessionKey() 76 (void)memset_s(sessionKey, keyLen, 0, keyLen); in ReturnSessionKey() 155 int32_t keyLen = DEFAULT_RETURN_KEY_LENGTH; in AddSessionKeyToSelfData() local 156 (void)GetIntFromJson(authParam, FIELD_KEY_LENGTH, &keyLen); in AddSessionKeyToSelfData() 157 uint8_t *sessionKey = (uint8_t *)HcMalloc(keyLen, 0); in AddSessionKeyToSelfData() 175 (void)memset_s(sessionKey, keyLen, 0, keyLen); in AddSessionKeyToSelfData() 329 int32_t keyLen = DEFAULT_RETURN_KEY_LENGTH; in AddNonAccountAuthInfo() local 330 (void)GetIntFromJson(paramsData, FIELD_KEY_LENGTH, &keyLen); in AddNonAccountAuthInfo() [all …]
|
/ohos5.0/foundation/communication/dsoftbus/core/bus_center/utils/src/ |
H A D | lnn_common_utils.c | 65 AesGcmCipherKey cipherKey = {.keyLen = in->keyLen}; in LnnEncryptAesGcm() 66 if (memcpy_s(cipherKey.key, sizeof(cipherKey.key), in->key, in->keyLen) != EOK) { in LnnEncryptAesGcm() 98 AesGcmCipherKey cipherKey = {.keyLen = in->keyLen}; in LnnDecryptAesGcm() 99 if (memcpy_s(cipherKey.key, sizeof(cipherKey.key), in->key, in->keyLen) != EOK) { in LnnDecryptAesGcm()
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/crypto_engine_test/src/ |
H A D | hks_openssl_rsa_test.cpp | 73 .keyLen = HKS_RSA_KEY_SIZE_768, 79 spec.keyLen = HKS_RSA_KEY_SIZE_1024; 83 spec.keyLen = HKS_RSA_KEY_SIZE_2048; 87 spec.keyLen = HKS_RSA_KEY_SIZE_3072; 91 spec.keyLen = HKS_RSA_KEY_SIZE_4096;
|
/ohos5.0/foundation/communication/dsoftbus/sdk/transmission/trans_channel/udp/stream/adaptor/src/ |
H A D | stream_adaptor.cpp | 90 sessionKey_.first = new uint8_t[param->keyLen]; in InitAdaptor() 92 if (memcpy_s(sessionKey_.first, param->keyLen, param->sessionKey, param->keyLen) != EOK) { in InitAdaptor() 97 sessionKey_.second = param->keyLen; in InitAdaptor() 126 cipherKey.keyLen = SESSION_KEY_LENGTH; in Encrypt() 153 cipherKey.keyLen = SESSION_KEY_LENGTH; // 256 bit encryption in Decrypt()
|
/ohos5.0/foundation/distributeddatamgr/kv_store/frameworks/native/kv_store/src/kvstore_common/ |
H A D | kvstore_common.c | 53 size_t keyLen = strnlen(key, MAX_KEY_LEN); in IsValidKey() local 54 for (size_t i = 0; i < keyLen; i++) { in IsValidKey() 113 size_t keyLen = strnlen(key, MAX_KEY_LEN); in AddKVCache() local 115 if ((keyLen >= MAX_KEY_LEN) || (valueLen >= MAX_VALUE_LEN)) { in AddKVCache() 126 item->key = (char *)malloc(keyLen + 1); in AddKVCache() 132 if ((strcpy_s(item->key, keyLen + 1, key) != EOK) || in AddKVCache()
|