Home
last modified time | relevance | path

Searched refs:keyLen (Results 1 – 25 of 218) sorted by relevance

123456789

/ohos5.0/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/
H A Dopenssl_aes_helper.c33 uint32_t keySize = keyLen / BIT_NUM_OF_UINT8; in GenerateAesKey()
56 if (keyLen == HKS_AES_KEY_SIZE_128) { in AesCbcCrypt()
58 } else if (keyLen == HKS_AES_KEY_SIZE_192) { in AesCbcCrypt()
60 } else if (keyLen == HKS_AES_KEY_SIZE_256) { in AesCbcCrypt()
68 if (keyLen == HKS_AES_KEY_SIZE_128) { in AesEcbCrypt()
70 } else if (keyLen == HKS_AES_KEY_SIZE_192) { in AesEcbCrypt()
72 } else if (keyLen == HKS_AES_KEY_SIZE_256) { in AesEcbCrypt()
80 if (keyLen == HKS_AES_KEY_SIZE_128) { in AesCtrCrypt()
82 } else if (keyLen == HKS_AES_KEY_SIZE_192) { in AesCtrCrypt()
92 if (keyLen == HKS_AES_KEY_SIZE_128) { in AesGcmCrypt()
[all …]
H A Dopenssl_ecc_helper.c31 static int32_t GetCurveId(uint32_t keyLen, int *nid) in GetCurveId() argument
33 switch (keyLen) { in GetCurveId()
82 keyMaterial->keySize = keyLen; in EccSaveKeyMaterial()
83 keyMaterial->xSize = HKS_KEY_BYTES(keyLen); in EccSaveKeyMaterial()
84 keyMaterial->ySize = HKS_KEY_BYTES(keyLen); in EccSaveKeyMaterial()
85 keyMaterial->zSize = HKS_KEY_BYTES(keyLen); in EccSaveKeyMaterial()
472 if ((keyLen == 0) || (keyLen > HKS_ECC_KEY_SIZE_521)) { in EcKeyToPublicKey()
484 pubKeyInfo->keySize = keyLen; in EcKeyToPublicKey()
630 size_t keyLen = 0; in EcdhDerive() local
634 sharedKey->size = keyLen; in EcdhDerive()
[all …]
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/
H A Dhks_crypto_hal_rsa_sign.cpp49 .keyLen = HKS_RSA_KEY_SIZE_512,
69 .keyLen = HKS_RSA_KEY_SIZE_768,
89 .keyLen = HKS_RSA_KEY_SIZE_1024,
109 .keyLen = HKS_RSA_KEY_SIZE_2048,
129 .keyLen = HKS_RSA_KEY_SIZE_3072,
149 .keyLen = HKS_RSA_KEY_SIZE_4096,
169 .keyLen = HKS_RSA_KEY_SIZE_512,
189 .keyLen = HKS_RSA_KEY_SIZE_768,
209 .keyLen = HKS_RSA_KEY_SIZE_1024,
291 .keyLen = HKS_RSA_KEY_SIZE_512,
[all …]
H A Dhks_crypto_hal_rsa_cipher.cpp46 .keyLen = HKS_RSA_KEY_SIZE_512,
73 .keyLen = HKS_RSA_KEY_SIZE_768,
101 .keyLen = HKS_RSA_KEY_SIZE_1024,
130 .keyLen = HKS_RSA_KEY_SIZE_2048,
161 .keyLen = HKS_RSA_KEY_SIZE_3072,
194 .keyLen = HKS_RSA_KEY_SIZE_4096,
231 .keyLen = HKS_RSA_KEY_SIZE_512,
252 .keyLen = HKS_RSA_KEY_SIZE_768,
359 .keyLen = HKS_RSA_KEY_SIZE_512,
380 .keyLen = HKS_RSA_KEY_SIZE_768,
[all …]
H A Dhks_crypto_hal_ecdsa_sign.cpp50 .keyLen = HKS_ECC_KEY_SIZE_224,
70 .keyLen = HKS_ECC_KEY_SIZE_256,
89 .keyLen = HKS_ECC_KEY_SIZE_384,
108 .keyLen = HKS_ECC_KEY_SIZE_521,
128 .keyLen = HKS_ECC_KEY_SIZE_224,
147 .keyLen = HKS_ECC_KEY_SIZE_256,
166 .keyLen = HKS_ECC_KEY_SIZE_384,
185 .keyLen = HKS_ECC_KEY_SIZE_521,
204 .keyLen = HKS_ECC_KEY_SIZE_224,
223 .keyLen = HKS_ECC_KEY_SIZE_256,
[all …]
H A Dhks_crypto_hal_ecdh_agree.cpp46 .keyLen = HKS_ECC_KEY_SIZE_224,
51 .keyLen = HKS_ECC_KEY_SIZE_224,
62 .keyLen = HKS_ECC_KEY_SIZE_256,
67 .keyLen = HKS_ECC_KEY_SIZE_256,
77 .keyLen = HKS_ECC_KEY_SIZE_384,
82 .keyLen = HKS_ECC_KEY_SIZE_384,
92 .keyLen = HKS_ECC_KEY_SIZE_521,
97 .keyLen = HKS_ECC_KEY_SIZE_521,
H A Dhks_crypto_hal_rsa_key.cpp42 .keyLen = HKS_RSA_KEY_SIZE_512,
55 .keyLen = HKS_RSA_KEY_SIZE_768,
68 .keyLen = HKS_RSA_KEY_SIZE_1024,
82 .keyLen = HKS_RSA_KEY_SIZE_2048,
95 .keyLen = HKS_RSA_KEY_SIZE_3072,
108 .keyLen = HKS_RSA_KEY_SIZE_4096,
228 .keyLen = HKS_RSA_KEY_SIZE_2048,
H A Dhks_crypto_hal_api_mbedtls.cpp69 .keyLen = HKS_AES_KEY_SIZE_128,
88 .keyLen = 0,
109 .keyLen = 0,
301 key = { .size = keyLen, .data = (uint8_t *)HksMalloc(keyLen) };
372 .keyLen = HKS_ECC_KEY_SIZE_256,
376 spec.keyLen += 1;
392 .keyLen = HKS_ECC_KEY_SIZE_256,
437 .keyLen = HKS_DH_KEY_SIZE_2048,
441 spec.keyLen += 1;
457 .keyLen = HKS_DH_KEY_SIZE_2048,
[all …]
/ohos5.0/base/startup/init/services/param/base/
H A Dparam_trie.c72 uint32_t len = keyLen + sizeof(ParamTrieNode) + 1; in AllocateParamTrieNode()
78 node->length = keyLen; in AllocateParamTrieNode()
79 int ret = PARAM_MEMCPY(node->key, keyLen, key, keyLen); in AllocateParamTrieNode()
81 node->key[keyLen] = '\0'; in AllocateParamTrieNode()
132 if (node->length > keyLen) { in CompareParamTrieNode()
134 } else if (node->length < keyLen) { in CompareParamTrieNode()
137 return memcmp(node->key, key, keyLen); in CompareParamTrieNode()
146 int ret = CompareParamTrieNode(current, key, keyLen); in AddToSubTrie()
280 realLen += keyLen + valueLen; in AddParamNode()
282 realLen += keyLen + GetParamMaxLen(type); in AddParamNode()
[all …]
H A Dparam_include.h39 ParamTrieNode *current, const char *key, uint32_t keyLen, uint32_t *matchLabel) in FindSubTrie() argument
44 if (subTrie->length > keyLen) { in FindSubTrie()
46 } else if (subTrie->length < keyLen) { in FindSubTrie()
49 ret = memcmp(subTrie->key, key, keyLen); in FindSubTrie()
72 const WorkSpace *workSpace, const char *key, uint32_t keyLen, uint32_t *matchLabel) in FindTrieNode_() argument
78 const char *end = key + keyLen; in FindTrieNode_()
/ohos5.0/base/security/dlp_permission_service/frameworks/common/src/
H A Dpermission_policy.cpp185 FreeUint8Buffer(key, keyLen); in SetKey()
189 DLP_LOG_ERROR(LABEL, "Key len invalid, len=%{public}u", keyLen); in SetKey()
192 FreeUint8Buffer(key, keyLen); in SetKey()
195 DLP_LOG_ERROR(LABEL, "Alloc %{public}u buff for key fail", keyLen); in SetKey()
198 keyLen = originalKeyLen; in SetKey()
199 if (memcpy_s(*key, keyLen, originalKey, originalKeyLen) != EOK) { in SetKey()
201 FreeUint8Buffer(key, keyLen); in SetKey()
206 void PermissionPolicy::SetAeskey(const uint8_t* key, uint32_t keyLen) in SetAeskey() argument
209 SetKey(key, keyLen, &aeskey_, aeskeyLen_); in SetAeskey()
238 void PermissionPolicy::SetHmacKey(const uint8_t* key, uint32_t keyLen) in SetHmacKey() argument
[all …]
/ohos5.0/base/security/huks/frameworks/crypto_lite/cipher/src/
H A Dcipher_rsa.c38 static char *RsaMallocPrivateKey(const unsigned char *key, size_t *keyLen) in RsaMallocPrivateKey() argument
45 size_t keyFinalLen = *keyLen + startLen + endLen + 1; in RsaMallocPrivateKey()
67 ret = memcpy_s(privateKey + startLen + *keyLen, keyFinalLen - startLen - *keyLen, end, endLen); in RsaMallocPrivateKey()
75 *keyLen = keyFinalLen; in RsaMallocPrivateKey()
79 static char *RsaMallocPublicKey(const unsigned char *key, size_t *keyLen) in RsaMallocPublicKey() argument
86 size_t keyFinalLen = *keyLen + startLen + endLen + 1; in RsaMallocPublicKey()
101 ret = memcpy_s(pubKey + startLen, keyFinalLen - startLen, key, *keyLen); in RsaMallocPublicKey()
108 ret = memcpy_s(pubKey + startLen + *keyLen, keyFinalLen - startLen - *keyLen, end, endLen); in RsaMallocPublicKey()
116 *keyLen = keyFinalLen; in RsaMallocPublicKey()
130 size_t finalKeyLen = keyLen; in RsaLoadPrivateKey()
[all …]
H A Dcipher_aes.c232 size_t keyLen = (size_t)data->keyLen; in InitAesData() local
233 data->key = MallocDecodeData(key, &keyLen); in InitAesData()
237 if (keyLen != KEY_LEN) { in InitAesData()
239 keyLen, KEY_LEN); in InitAesData()
240 (void)memset_s(data->key, keyLen, 0, keyLen); in InitAesData()
245 data->keyLen = KEY_LEN; in InitAesData()
266 … (void)memset_s(aesCryptCxt->data.key, aesCryptCxt->data.keyLen, 0, aesCryptCxt->data.keyLen); in DeinitAesCryptData()
/ohos5.0/foundation/communication/dsoftbus/adapter/common/openssl/
H A Dsoftbus_aes_encrypt.c101 switch (cipherKey->keyLen) { in OpensslAesCfbEncrypt()
154 cipherKey->keyLen = AES_SESSION_KEY_LENGTH; in GenerateIvAndSessionKey()
156 cipherKey->key = (uint8_t *)SoftBusCalloc(cipherKey->keyLen); in GenerateIvAndSessionKey()
167 (void)memset_s(cipherKey->key, cipherKey->keyLen, 0, cipherKey->keyLen); in GenerateIvAndSessionKey()
197 (void)memset_s(cipherKey.key, cipherKey.keyLen, 0, cipherKey.keyLen); in SoftBusAesCfbRootEncrypt()
205 (void)memset_s(cipherKey.key, cipherKey.keyLen, 0, cipherKey.keyLen); in SoftBusAesCfbRootEncrypt()
229 EncryptKey key = { cipherKey->key, cipherKey->keyLen }; in SoftBusAesCfbEncrypt()
235 (void)memset_s(cipherKey->key, cipherKey->keyLen, 0, cipherKey->keyLen); in SoftBusAesCfbEncrypt()
263 static EVP_CIPHER *GetSslGcmAlgorithmByKeyLen(uint32_t keyLen) in GetSslGcmAlgorithmByKeyLen() argument
265 switch (keyLen) { in GetSslGcmAlgorithmByKeyLen()
[all …]
/ohos5.0/foundation/communication/dsoftbus/core/adapter/bus_center/src/
H A Dlnn_kv_adapter_wrapper_virtual.cpp35 int32_t LnnPutDBData(int32_t dbId, const char *key, int32_t keyLen, const char *value, int32_t valu… in LnnPutDBData() argument
39 (void)keyLen; in LnnPutDBData()
45 int32_t LnnDeleteDBData(int32_t dbId, const char *key, int32_t keyLen) in LnnDeleteDBData() argument
49 (void)keyLen; in LnnDeleteDBData()
53 int32_t LnnGetDBData(int32_t dbId, const char *key, int32_t keyLen, char **value) in LnnGetDBData() argument
57 (void)keyLen; in LnnGetDBData()
H A Dlnn_kv_adapter_wrapper.cpp120 int32_t LnnPutDBData(int32_t dbId, const char *key, int32_t keyLen, const char *value, int32_t valu… in LnnPutDBData() argument
125 … if (key == nullptr || keyLen < MIN_STRING_LEN || keyLen > MAX_STRING_LEN || value == nullptr || in LnnPutDBData()
130 std::string keyStr(key, keyLen); in LnnPutDBData()
147 int32_t LnnDeleteDBData(int32_t dbId, const char *key, int32_t keyLen) in LnnDeleteDBData() argument
152 …if (key == nullptr || keyLen < MIN_STRING_LEN || keyLen > MAX_STRING_LEN || dbId < MIN_DBID_COUNT … in LnnDeleteDBData()
157 std::string keyStr(key, keyLen); in LnnDeleteDBData()
173 int32_t LnnGetDBData(int32_t dbId, const char *key, int32_t keyLen, char **value) in LnnGetDBData() argument
179 … if (value == nullptr || key == nullptr || keyLen < MIN_STRING_LEN || keyLen > MAX_STRING_LEN || in LnnGetDBData()
184 std::string keyStr(key, keyLen); in LnnGetDBData()
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/
H A Dhks_mbedtls_dh.c131 ret = GetDhParam(spec->keyLen, &paramP, &paramG); in HksMbedtlsDhGenerateKey()
133 uint32_t keyLen = HKS_KEY_BYTES(spec->keyLen); in HksMbedtlsDhGenerateKey()
140 ctx.len = keyLen; in HksMbedtlsDhGenerateKey()
142 uint8_t *output = (uint8_t *)HksMalloc(keyLen); in HksMbedtlsDhGenerateKey()
144 … ret = mbedtls_dhm_make_public(&ctx, keyLen, output, keyLen, mbedtls_ctr_drbg_random, &ctrDrbg); in HksMbedtlsDhGenerateKey()
148 ret = DhSaveKeyMaterial(&ctx, spec->keyLen, key); in HksMbedtlsDhGenerateKey()
230 if (HKS_KEY_BYTES(spec->keyLen) > sharedKey->size) { in HksMbedtlsDhAgreeKey()
261 size_t keyLen; in HksMbedtlsDhAgreeKey() local
263 …mbedtls_dhm_calc_secret(&ctx, sharedKey->data, sharedKey->size, &keyLen, mbedtls_ctr_drbg_random, … in HksMbedtlsDhAgreeKey()
269 sharedKey->size = keyLen; in HksMbedtlsDhAgreeKey()
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/
H A Dhks_openssl_dsa.c157 *ylen = keyLen; in DsaGetKeyParamLen()
158 *plen = keyLen; in DsaGetKeyParamLen()
160 *glen = keyLen; in DsaGetKeyParamLen()
190 keyMaterial->keySize = keyLen * HKS_BITS_PER_BYTE; in DsaKeyMaterialParam()
191 DsaGetKeyParamLen(keyLen, in DsaKeyMaterialParam()
245 uint32_t keyLen; in DsaSaveKeyMaterial() local
246 uint32_t rawMaterialLen = DsaCalculateMaterialLen(keySize, &keyLen); in DsaSaveKeyMaterial()
252 if (DsaKeyMaterialParam(rawMaterial, dsa, keyLen) != HKS_SUCCESS) { in DsaSaveKeyMaterial()
269 if ((spec->keyLen == 0) || (spec->keyLen % HKS_BITS_PER_BYTE != 0)) { in HksOpensslDsaGenerateKey()
277 HKS_LOG_I("spec->keyLen = %" LOG_PUBLIC "u", spec->keyLen); in HksOpensslDsaGenerateKey()
[all …]
H A Dhks_openssl_sm3.c33 if ((spec->keyLen == 0) || (spec->keyLen % BIT_NUM_OF_UINT8 != 0)) { in Sm3GenKeyCheckParam()
34 HKS_LOG_E("keyLen is wrong, len = %" LOG_PUBLIC "u", spec->keyLen); in Sm3GenKeyCheckParam()
44 return HksOpensslGenerateRandomKey(spec->keyLen, key); in HksOpensslSm3GenerateKey()
H A Dhks_openssl_ecc.c39 static int32_t HksOpensslEccCheckKeyLen(uint32_t keyLen) in HksOpensslEccCheckKeyLen() argument
41 …if ((keyLen != HKS_ECC_KEY_SIZE_224) && (keyLen != HKS_ECC_KEY_SIZE_256) && (keyLen != HKS_ECC_KEY… in HksOpensslEccCheckKeyLen()
42 (keyLen != HKS_ECC_KEY_SIZE_521)) { in HksOpensslEccCheckKeyLen()
43 HKS_LOG_E("invalid param keyLen(0x%" LOG_PUBLIC "x)!", keyLen); in HksOpensslEccCheckKeyLen()
49 static int32_t HksOpensslGetCurveId(uint32_t keyLen, int *nid) in HksOpensslGetCurveId() argument
51 switch (keyLen) { in HksOpensslGetCurveId()
112 uint32_t keySize = spec->keyLen; in EccSaveKeyMaterial()
169 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslEccCheckKeyLen(spec->keyLen), in HksOpensslEccGenerateKey()
173 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslGetCurveId(spec->keyLen, &curveId), in HksOpensslEccGenerateKey()
438 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslEccCheckKeyLen(spec->keyLen), in HksOpensslEcdhAgreeKey()
/ohos5.0/base/security/device_auth/services/legacy/group_auth/src/group_auth_manager/account_unrelated_group_auth/
H A Daccount_unrelated_group_auth.c52 uint32_t keyLen = (HcStrlen(returnSessionKeyStr) / BYTE_TO_HEX_OPER_LENGTH); in ReturnSessionKey() local
53 uint8_t *sessionKey = (uint8_t *)HcMalloc(keyLen, 0); in ReturnSessionKey()
73 callback->onSessionKeyReturned(requestId, sessionKey, keyLen); in ReturnSessionKey()
76 (void)memset_s(sessionKey, keyLen, 0, keyLen); in ReturnSessionKey()
155 int32_t keyLen = DEFAULT_RETURN_KEY_LENGTH; in AddSessionKeyToSelfData() local
156 (void)GetIntFromJson(authParam, FIELD_KEY_LENGTH, &keyLen); in AddSessionKeyToSelfData()
157 uint8_t *sessionKey = (uint8_t *)HcMalloc(keyLen, 0); in AddSessionKeyToSelfData()
175 (void)memset_s(sessionKey, keyLen, 0, keyLen); in AddSessionKeyToSelfData()
329 int32_t keyLen = DEFAULT_RETURN_KEY_LENGTH; in AddNonAccountAuthInfo() local
330 (void)GetIntFromJson(paramsData, FIELD_KEY_LENGTH, &keyLen); in AddNonAccountAuthInfo()
[all …]
/ohos5.0/foundation/communication/dsoftbus/core/bus_center/utils/src/
H A Dlnn_common_utils.c65 AesGcmCipherKey cipherKey = {.keyLen = in->keyLen}; in LnnEncryptAesGcm()
66 if (memcpy_s(cipherKey.key, sizeof(cipherKey.key), in->key, in->keyLen) != EOK) { in LnnEncryptAesGcm()
98 AesGcmCipherKey cipherKey = {.keyLen = in->keyLen}; in LnnDecryptAesGcm()
99 if (memcpy_s(cipherKey.key, sizeof(cipherKey.key), in->key, in->keyLen) != EOK) { in LnnDecryptAesGcm()
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/crypto_engine_test/src/
H A Dhks_openssl_rsa_test.cpp73 .keyLen = HKS_RSA_KEY_SIZE_768,
79 spec.keyLen = HKS_RSA_KEY_SIZE_1024;
83 spec.keyLen = HKS_RSA_KEY_SIZE_2048;
87 spec.keyLen = HKS_RSA_KEY_SIZE_3072;
91 spec.keyLen = HKS_RSA_KEY_SIZE_4096;
/ohos5.0/foundation/communication/dsoftbus/sdk/transmission/trans_channel/udp/stream/adaptor/src/
H A Dstream_adaptor.cpp90 sessionKey_.first = new uint8_t[param->keyLen]; in InitAdaptor()
92 if (memcpy_s(sessionKey_.first, param->keyLen, param->sessionKey, param->keyLen) != EOK) { in InitAdaptor()
97 sessionKey_.second = param->keyLen; in InitAdaptor()
126 cipherKey.keyLen = SESSION_KEY_LENGTH; in Encrypt()
153 cipherKey.keyLen = SESSION_KEY_LENGTH; // 256 bit encryption in Decrypt()
/ohos5.0/foundation/distributeddatamgr/kv_store/frameworks/native/kv_store/src/kvstore_common/
H A Dkvstore_common.c53 size_t keyLen = strnlen(key, MAX_KEY_LEN); in IsValidKey() local
54 for (size_t i = 0; i < keyLen; i++) { in IsValidKey()
113 size_t keyLen = strnlen(key, MAX_KEY_LEN); in AddKVCache() local
115 if ((keyLen >= MAX_KEY_LEN) || (valueLen >= MAX_VALUE_LEN)) { in AddKVCache()
126 item->key = (char *)malloc(keyLen + 1); in AddKVCache()
132 if ((strcpy_s(item->key, keyLen + 1, key) != EOK) || in AddKVCache()

123456789