/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
H A D | pake_v1_protocol_common.c | 71 params->salt.val = (uint8_t *)HcMalloc(params->salt.length, 0); in AllocDefaultParams() 99 params->hmacKey.val = (uint8_t *)HcMalloc(params->hmacKey.length, 0); in AllocDefaultParams() 182 res = params->loader->generateRandom(&(params->salt)); in GeneratePakeParams() 189 res = params->loader->generateRandom(&(params->challengeSelf)); in GeneratePakeParams() 196 …KeyParams keyParams = { { params->psk.val, params->psk.length, false }, false, params->osAccountId… in GeneratePakeParams() 248 …if (memcpy_s(params->sessionKey.val, params->sessionKey.length, unionKey.val, params->sessionKey.l… in DeriveKeyFromSharedSecret() 253 if (memcpy_s(params->hmacKey.val, params->hmacKey.length, in DeriveKeyFromSharedSecret() 273 res = AgreeEcSharedSecret(params, ¶ms->sharedSecret); in GenerateSessionKey() 275 res = AgreeDlSharedSecret(params, ¶ms->sharedSecret); in GenerateSessionKey() 313 …KeyParams keyParams = { { params->hmacKey.val, params->hmacKey.length, false }, false, params->osA… in GenerateProof() [all …]
|
/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
H A D | pake_v2_protocol_common.c | 75 params->salt.val = (uint8_t *)HcMalloc(params->salt.length, 0); in AllocDefaultParams() 176 res = params->loader->generateRandom(&(params->salt)); in GeneratePakeParams() 184 …KeyParams keyParams = { { params->psk.val, params->psk.length, false }, false, params->osAccountId… in GeneratePakeParams() 387 …tmpSharedSecret.length = (params->curveType == CURVE_256) ? (params->innerKeyLen * 2) : (params->i… in GenerateSharedSecret() 466 … res = CombineEpk(¶ms->epkSelf, ¶ms->epkPeer, params->innerKeyLen, proofMsg, &usedLen); in CombineProofMsg() 468 … res = CombineEpk(¶ms->epkPeer, ¶ms->epkSelf, params->innerKeyLen, proofMsg, &usedLen); in CombineProofMsg() 487 params->extraData.val, params->extraData.length) != EOK)) { in CombineProofMsg() 503 params->sharedSecret.length + params->innerKeyLen + params->extraData.length; in GenerateProof() 515 res = params->loader->sha256(&proofMsg, ¶ms->kcfData); in GenerateProof() 533 params->sharedSecret.length + params->innerKeyLen + params->extraData.length; in VerifyProof() [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_task_common.c | 152 …(void)memcpy_s(params->pakeParams.idPeer.val, params->pakeParams.idPeer.length, params->devIdPeer.… in ExtractPakePeerId() 154 (void)memcpy_s(params->pakeParams.idPeer.val + params->devIdPeer.length, in ExtractPakePeerId() 155 …params->pakeParams.idPeer.length - params->devIdPeer.length, params->deviceIdPeer.val, deviceIdPee… in ExtractPakePeerId() 172 …(void)memcpy_s(params->pakeParams.idSelf.val, params->pakeParams.idSelf.length, params->devIdSelf.… in ExtractPakeSelfId() 175 …params->pakeParams.idSelf.length - params->devIdSelf.length, params->deviceIdSelf.val, deviceIdSel… in ExtractPakeSelfId() 201 if (memcpy_s(params->deviceIdSelf.val, params->deviceIdSelf.length + 1, in ExtractSelfDeviceId() 455 (void)memset_s(params->userIdSelf, sizeof(params->userIdSelf), 0, sizeof(params->userIdSelf)); in DestroyPakeAuthParams() 456 (void)memset_s(params->userIdPeer, sizeof(params->userIdPeer), 0, sizeof(params->userIdPeer)); in DestroyPakeAuthParams() 457 (void)memset_s(params->pkSelf, sizeof(params->pkSelf), 0, sizeof(params->pkSelf)); in DestroyPakeAuthParams() 458 (void)memset_s(params->pkPeer, sizeof(params->pkPeer), 0, sizeof(params->pkPeer)); in DestroyPakeAuthParams() [all …]
|
/ohos5.0/base/security/device_auth/services/protocol/src/iso_protocol/ |
H A D | iso_protocol_common.c | 37 params->randSelf.val = (uint8_t *)HcMalloc(params->randSelf.length, 0); in InitIsoBaseParams() 44 params->randPeer.val = (uint8_t *)HcMalloc(params->randPeer.length, 0); in InitIsoBaseParams() 78 (void)memset_s(params->psk, sizeof(params->psk), 0, PSK_LEN); in DestroyIsoBaseParams() 96 int length = params->randSelf.length + params->randPeer.length + params->authIdSelf.length + in IsoCalSelfToken() 142 int length = params->randSelf.length + params->randPeer.length + params->authIdPeer.length + in IsoCalPeerToken() 195 params->randPeer.val, params->randPeer.length) != EOK) { in IsoCombineHkdfSalt() 205 params->randSelf.val, params->randSelf.length) != EOK) { in IsoCombineHkdfSalt() 246 int32_t res = params->loader->generateRandom(¶ms->randSelf); in IsoClientGenRandom() 299 Uint8Buff pskBuf = { params->psk, sizeof(params->psk) }; in IsoClientGenSessionKey() 336 int res = params->loader->generateRandom(¶ms->randSelf); in IsoServerGenRandomAndToken() [all …]
|
/ohos5.0/foundation/communication/dsoftbus/tests/core/common/dfx/event/unittest/mock/ |
H A D | trans_hisysevent_matcher.h | 29 EXPECT_EQ(params[index].t, TRANS_ASSIGNERS[index].type); in MatchTransEventNameTypeExtraInt32Param() 30 EXPECT_EQ(params[index].v.i32, extraParam); in MatchTransEventNameTypeExtraInt32Param() 37 EXPECT_EQ(params[index].t, TRANS_ASSIGNERS[index].type); in MatchTransEventNameTypeExtraStrParam() 38 EXPECT_STREQ(params[index].v.s, extraParam); in MatchTransEventNameTypeExtraStrParam() 46 EXPECT_EQ(params[index].t, TRANS_ASSIGNERS[index].type); in MatchTransEventNameTypeExtraStrParamAnony() 106 EXPECT_EQ(params[index].t, TRANS_ASSIGNERS[num].type); 107 EXPECT_EQ(params[index].v.i32, extra.firstTokenId); 116 EXPECT_EQ(params[index].v.i32, extraParam); in MatchTransAlarmNameTypeExtraInt32Param() 123 EXPECT_STREQ(params[index].v.s, extraParam); in MatchTransAlarmNameTypeExtraStrParam() 172 EXPECT_EQ(params[index].v.i32, extraParam); in MatchTransAuditNameTypeExtraInt32Param() [all …]
|
H A D | conn_hisysevent_matcher.h | 29 EXPECT_EQ(params[index].t, g_connAssigners[index].type); in MatchConnEventNameTypeExtraInt32Param() 30 EXPECT_EQ(params[index].v.i32, extraParam); in MatchConnEventNameTypeExtraInt32Param() 36 EXPECT_EQ(params[index].t, g_connAssigners[index].type); in MatchConnEventNameTypeExtraUint32Param() 37 EXPECT_EQ(params[index].v.ui32, extraParam); in MatchConnEventNameTypeExtraUint32Param() 43 EXPECT_EQ(params[index].t, g_connAssigners[index].type); in MatchConnEventNameTypeExtraUint64Param() 44 EXPECT_EQ(params[index].v.ui64, extraParam); in MatchConnEventNameTypeExtraUint64Param() 50 EXPECT_EQ(params[index].t, g_connAssigners[index].type); in MatchConnEventNameTypeExtraStrParam() 51 EXPECT_STREQ(params[index].v.s, extraParam); in MatchConnEventNameTypeExtraStrParam() 59 EXPECT_EQ(params[index].t, g_connAssigners[index].type); in MatchConnEventNameTypeExtraStrParamAnony() 131 EXPECT_EQ(params[index].v.i32, extraParam); in MatchConnAuditNameTypeExtraInt32Param() [all …]
|
H A D | lnn_hisysevent_matcher.h | 29 EXPECT_EQ(params[index].t, g_lnnAssigners[index].type); in MatchLnnEventNameTypeExtraInt32Param() 30 EXPECT_EQ(params[index].v.i32, extraParam); in MatchLnnEventNameTypeExtraInt32Param() 36 EXPECT_EQ(params[index].t, g_lnnAssigners[index].type); in MatchLnnEventNameTypeExtraUint32Param() 37 EXPECT_EQ(params[index].v.ui32, extraParam); in MatchLnnEventNameTypeExtraUint32Param() 43 EXPECT_EQ(params[index].t, g_lnnAssigners[index].type); in MatchLnnEventNameTypeExtraStrParam() 44 EXPECT_STREQ(params[index].v.s, extraParam); in MatchLnnEventNameTypeExtraStrParam() 52 EXPECT_EQ(params[index].t, g_lnnAssigners[index].type); in MatchLnnEventNameTypeExtraStrParamAnony() 127 EXPECT_EQ(params[index].v.i32, extraParam); in MatchLnnAuditNameTypeInt32Param() 134 EXPECT_EQ(params[index].v.ui32, extraParam); in MatchLnnAuditNameTypeUint32Param() 141 EXPECT_EQ(params[index].v.ui64, extraParam); in MatchLnnAuditNameTypeUint64Param() [all …]
|
H A D | disc_hisysevent_matcher.h | 27 EXPECT_STREQ(params[index].name, g_discAssigners[index].name); in MatchDiscEventNameTypeExtraInt32Param() 28 EXPECT_EQ(params[index].t, g_discAssigners[index].type); in MatchDiscEventNameTypeExtraInt32Param() 29 EXPECT_EQ(params[index].v.i32, extraParam); in MatchDiscEventNameTypeExtraInt32Param() 34 EXPECT_STREQ(params[index].name, g_discAssigners[index].name); in MatchDiscEventNameTypeExtraStrParam() 35 EXPECT_EQ(params[index].t, g_discAssigners[index].type); in MatchDiscEventNameTypeExtraStrParam() 36 EXPECT_STREQ(params[index].v.s, extraParam); in MatchDiscEventNameTypeExtraStrParam() 43 EXPECT_STREQ(params[index].name, g_discAssigners[index].name); in MatchDiscEventNameTypeExtraStrParamAnony() 44 EXPECT_EQ(params[index].t, g_discAssigners[index].type); in MatchDiscEventNameTypeExtraStrParamAnony() 46 EXPECT_STREQ(params[index].v.s, AnonymizeWrapper(anonyStr)); in MatchDiscEventNameTypeExtraStrParamAnony() 52 const auto *params = static_cast<const HiSysEventParam *>(arg); variable [all …]
|
/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common/ |
H A D | pake_protocol_dl_common.c | 54 int res = params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk() 98 if (params->isClient) { in InitDlPakeParams() 107 res = InitSingleParam(&(params->eskSelf), params->eskSelf.length); in InitDlPakeParams() 112 res = InitSingleParam(&(params->epkSelf), params->innerKeyLen); in InitDlPakeParams() 117 res = InitSingleParam(&(params->base), params->innerKeyLen); in InitDlPakeParams() 132 res = GenerateEsk(params); in GenerateDlPakeParams() 139 params->largePrimeNumHex = (params->innerKeyLen == PAKE_DL_PRIME_SMALL_LEN) ? in GenerateDlPakeParams() 141 res = params->loader->bigNumExpMod(secret, &exp, params->largePrimeNumHex, ¶ms->base); in GenerateDlPakeParams() 147 …res = params->loader->bigNumExpMod(¶ms->base, &(params->eskSelf), params->largePrimeNumHex, &(… in GenerateDlPakeParams() 179 if (!params->loader->checkDlPublicKey(&(params->epkPeer), params->largePrimeNumHex)) { in AgreeDlSharedSecret() [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/iso_auth_task/ |
H A D | iso_auth_task_common.c | 103 …params->isoBaseParams.authIdSelf.length = params->devIdSelf.length + HcStrlen(params->deviceIdSelf… in FillPayload() 108 if (memcpy_s(params->isoBaseParams.authIdSelf.val, params->isoBaseParams.authIdSelf.length, in FillPayload() 109 params->devIdSelf.val, params->devIdSelf.length) != EOK) { in FillPayload() 113 if (memcpy_s(params->isoBaseParams.authIdSelf.val + params->devIdSelf.length, in FillPayload() 114 params->isoBaseParams.authIdSelf.length - params->devIdSelf.length, in FillPayload() 126 params->challenge.val = (uint8_t *)HcMalloc(params->challenge.length, 0); in SetChallenge() 205 Uint8Buff seedBuf = { params->seed, sizeof(params->seed) }; in AccountAuthGeneratePsk() 266 if (params == NULL) { in DestroyIsoAuthParams() 275 params->userIdSelf = NULL; in DestroyIsoAuthParams() 278 params->userIdPeer = NULL; in DestroyIsoAuthParams() [all …]
|
/ohos5.0/foundation/graphic/graphic_2d/rosen/test/render_service/render_service_base/unittest/params/ |
H A D | rs_display_render_params_test.cpp | 53 params.OnSync(target); 67 params.SetMainAndLeashSurfaceDirty(params.GetMainAndLeashSurfaceDirty()); 84 params.SetRotationChanged(params.IsRotationChanged()); 101 params.SetHDRPresent(params.GetHDRPresent()); 104 params.SetHDRPresent(true); 135 params.SetNewPixelFormat(params.GetNewPixelFormat()); 155 params.displayHasSecSurface_[params.screenId_] = true; 171 params.displayHasSkipSurface_[params.screenId_] = true; 187 params.displayHasProtectedSurface_[params.screenId_] = true; 204 params.hasCaptureWindow_[params.screenId_] = true; [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/ |
H A D | iso_task_common.c | 153 res = GenerateReturnKey(params, returnSessionKey, params->keyLen); in SendResultToFinalSelf() 197 res = GenerateReturnKey(params, returnKey, params->keyLen); in GenEncResult() 213 (void)memset_s(returnKey, params->keyLen, 0, params->keyLen); in GenEncResult() 333 …(void)memset_s(params->pinCodeString, HcStrlen(params->pinCodeString), 0, HcStrlen(params->pinCode… in DestroyIsoParams() 503 if (params->opCode == OP_UNBIND || params->opCode == OP_BIND) { in GetUpgradeFlagAndKeyLength() 526 … if (params->opCode != OP_BIND && params->opCode != OP_UNBIND && params->opCode != AUTHENTICATE) { in InitIsoParams() 643 res = AuthGeneratePsk(¶ms->seed, params); in GeneratePsk() 645 res = AuthGeneratePskUsePin(¶ms->seed, params, params->pinCodeString); in GeneratePsk() 647 …(void)memset_s(params->pinCodeString, HcStrlen(params->pinCodeString), 0, HcStrlen(params->pinCode… in GeneratePsk() 656 …(void)memset_s(params->baseParams.psk, sizeof(params->baseParams.psk), 0, sizeof(params->baseParam… in GeneratePsk() [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_task_common.c | 69 { params->baseParams.sessionKey.val, params->baseParams.sessionKey.length, false }, in GenerateOutputKey() 73 int32_t res = params->baseParams.loader->computeHkdf(&keyParam, &(params->baseParams.salt), in GenerateOutputKey() 130 if (memcpy_s(params->baseParams.psk.val, params->baseParams.psk.length, in FillPskWithPin() 153 params->baseParams.idSelf.val = (uint8_t *)HcMalloc(params->baseParams.idSelf.length, 0); in FillAuthId() 163 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in FillAuthId() 180 if (memcpy_s(params->baseParams.idPeer.val, params->baseParams.idPeer.length, in FillAuthId() 241 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in FillNonce() 243 params->nonce.val = (uint8_t *)HcMalloc(params->nonce.length, 0); in FillNonce() 261 if (params->opCode != OP_BIND && params->opCode != OP_UNBIND && in FillDasPakeParams() 262 params->opCode != AUTHENTICATE && params->opCode != AUTH_KEY_AGREEMENT) { in FillDasPakeParams() [all …]
|
H A D | pake_message_util.c | 37 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PackagePakeRequestData() 72 if (params->opCode == AUTHENTICATE || params->opCode == AUTH_KEY_AGREEMENT) { in ParsePakeRequestMessage() 85 …int32_t res = AddByteToJson(payload, FIELD_SALT, params->baseParams.salt.val, params->baseParams.s… in PackagePakeResponseData() 90 …res = AddByteToJson(payload, FIELD_EPK, params->baseParams.epkSelf.val, params->baseParams.epkSelf… in PackagePakeResponseData() 95 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PackagePakeResponseData() 96 res = AddByteToJson(payload, FIELD_NONCE, params->nonce.val, params->nonce.length); in PackagePakeResponseData() 122 …res = HexStringToByte(epkPeerHex, params->baseParams.epkPeer.val, params->baseParams.epkPeer.lengt… in GetDasEpkPeerFromJson() 132 …int32_t res = GetByteFromJson(in, FIELD_SALT, params->baseParams.salt.val, params->baseParams.salt… in ParsePakeResponseMessage() 142 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in ParsePakeResponseMessage() 143 res = GetByteFromJson(in, FIELD_NONCE, params->nonce.val, params->nonce.length); in ParsePakeResponseMessage() [all …]
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/ |
H A D | crypto_key_test.cpp | 1004 params.clear(); 1008 params.clear(); 1019 params.clear(); 1022 params.clear(); 1027 params.clear(); 1032 params.clear(); 1038 params.clear(); 1042 params.clear(); 1045 params.clear(); 1053 params.clear(); [all …]
|
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/ |
H A D | save_trusted_info.c | 68 CmdParams params; member 122 (void)params; in CheckGroupValidity() 125 if (params->isBind) { in CheckGroupValidity() 367 if (params->userIdSelf == NULL || params->userIdPeer == NULL) { in IsAcrossAccount() 371 if (!params->isBind && strcmp(params->userIdSelf, params->userIdPeer) != 0) { in IsAcrossAccount() 809 …return ((params != NULL) && (params->appId != NULL) && (params->authId != NULL) && (params->groupI… in IsSaveTrustedInfoParamsValid() 829 instance->params.isBind = params->isBind; in InitSaveTrustedInfoCmd() 830 instance->params.osAccountId = params->osAccountId; in InitSaveTrustedInfoCmd() 831 instance->params.credType = params->credType; in InitSaveTrustedInfoCmd() 832 instance->params.userTypeSelf = params->userType; in InitSaveTrustedInfoCmd() [all …]
|
/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/ |
H A D | pake_protocol_ec_common.c | 36 return params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk() 38 res = params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk() 58 …uint32_t keyBufferLen = (params->curveType == CURVE_256) ? (params->innerKeyLen * 2) : (params->in… in InitEcPakeParams() 59 int32_t res = InitSingleParam(&(params->eskSelf), params->eskSelf.length); in InitEcPakeParams() 85 res = GenerateEsk(params); in GenerateEcPakeParams() 92 res = params->loader->hashToPoint(secret, alg, ¶ms->base); in GenerateEcPakeParams() 97 …KeyParams eskSelfParams = { { params->eskSelf.val, params->eskSelf.length, false }, false, params-… in GenerateEcPakeParams() 98 KeyBuff baseBuff = { params->base.val, params->base.length, false }; in GenerateEcPakeParams() 122 if (!params->loader->checkEcPublicKey(&(params->epkPeer), alg)) { in AgreeEcSharedSecret() 127 …KeyParams eskSelfParams = { { params->eskSelf.val, params->eskSelf.length, false }, false, params-… in AgreeEcSharedSecret() [all …]
|
/ohos5.0/foundation/ability/ability_runtime/test/unittest/cj_want_ffi_test/ |
H A D | cj_want_ffi_test.cpp | 76 CJWantParams params; variable 78 params.flags = 123; 80 params.uri = new char[URI_SIZE]; 109 CJWantParams params; variable 111 params.flags = 123; 113 params.uri = new char[URI_SIZE]; 142 CJWantParams params; variable 144 params.flags = 123; 146 params.uri = new char[URI_SIZE]; 178 CJWantParams params; variable [all …]
|
/ohos5.0/foundation/resourceschedule/device_usage_statistics/frameworks/src/ |
H A D | bundle_state_query.cpp | 101 return BundleStateCommon::JSParaError(env, params.callback, params.errorCode); in IsIdleState() 108 return BundleStateCommon::JSParaError(env, params.callback, params.errorCode); in IsIdleState() 142 params.bundleName = ""; in ParsePriorityGroupParameters() 256 if ((params.errorCode == ERR_OK) && (params.endTime <= params.beginTime)) { in ParseStatesParameters() 258 (long long)params.endTime, (long long)params.beginTime); in ParseStatesParameters() 446 if ((params.errorCode == ERR_OK) && (params.endTime <= params.beginTime)) { in ParseAppUsageParametersByInterval() 448 (long long)params.endTime, (long long)params.beginTime); in ParseAppUsageParametersByInterval() 544 if ((params.errorCode == ERR_OK) && (params.beginTime < TIME_NUMBER_MIN)) { in ParseAppUsageParameters() 555 if ((params.errorCode == ERR_OK) && (params.endTime < TIME_NUMBER_MIN)) { in ParseAppUsageParameters() 559 if ((params.errorCode == ERR_OK) && (params.endTime <= params.beginTime)) { in ParseAppUsageParameters() [all …]
|
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
H A D | dl_speke_protocol.c | 95 DlSpekeParams params; member 197 params->kcfDataPeer.val, params->kcfDataPeer.length) != HC_SUCCESS) { in GetKcfDataPeerFromInput() 259 …KeyParams keyParams = { { params->psk.val, params->psk.length, false }, false, params->osAccountId… in CalSecret() 289 if (InitUint8Buff(¶ms->base, params->innerKeyLen) != HC_SUCCESS) { in DlSpekeCalBase() 324 params->largePrimeNumHex, &(params->epkSelf)); in DlSpekeCalEpkSelf() 554 DlSpekeParams *params = &impl->params; in GenerateKcfDataMsg() local 561 Uint8Buff *epkClient = isClient ? ¶ms->epkSelf : ¶ms->epkPeer; in GenerateKcfDataMsg() 562 Uint8Buff *epkServer = isClient ? ¶ms->epkPeer : ¶ms->epkSelf; in GenerateKcfDataMsg() 576 params->sharedSecret.val, params->sharedSecret.length) != EOK) { in GenerateKcfDataMsg() 1113 instance->params.osAccountId = params->osAccountId; in BuildDlSpekeProtocolObj() [all …]
|
H A D | ec_speke_protocol.c | 74 EcSpekeParams params; member 170 params->kcfDataPeer.val, params->kcfDataPeer.length) != HC_SUCCESS) { in GetKcfDataPeerFromInput() 205 …KeyParams keyParams = { { params->psk.val, params->psk.length, false }, false, params->osAccountId… in CalSecret() 290 …KeyParams eskSelfParams = { { params->eskSelf.val, params->eskSelf.length, false }, false, params-… in EcSpekeCalEpkSelf() 291 KeyBuff baseBuff = { params->base.val, params->base.length, false }; in EcSpekeCalEpkSelf() 319 …KeyParams eskSelfParams = { { params->eskSelf.val, params->eskSelf.length, false }, false, params-… in CalP() 531 EcSpekeParams *params = &impl->params; in GenerateKcfDataMsg() local 538 Uint8Buff *epkClient = isClient ? ¶ms->epkSelf : ¶ms->epkPeer; in GenerateKcfDataMsg() 553 params->sharedSecret.val, params->sharedSecret.length) != EOK) { in GenerateKcfDataMsg() 1095 instance->params.osAccountId = params->osAccountId; in BuildEcSpekeProtocolObj() [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_protocol_task_common.c | 30 if (params == NULL) { in DestroyDasPakeV1Params() 37 … (void)memset_s(params->returnKey.val, params->returnKey.length, 0, params->returnKey.length); in DestroyDasPakeV1Params() 57 HcFree(params->packageName); in DestroyDasPakeV1Params() 58 params->packageName = NULL; in DestroyDasPakeV1Params() 61 params->serviceType = NULL; in DestroyDasPakeV1Params() 63 HcFree(params->nonce.val); in DestroyDasPakeV1Params() 64 params->nonce.val = NULL; in DestroyDasPakeV1Params() 83 res = InitSingleParam(¶ms->returnKey, params->returnKey.length); in AllocReturnKey() 219 if (params->opCode == AUTHENTICATE && params->isPeerFromUpgrade) { in InitDasPakeV1Params() 286 res = params->baseParams.loader->generateRandom(&(params->nonce)); in FillPskWithDerivedKeyHex() [all …]
|
/ohos5.0/docs/zh-cn/application-dev/dfx/ |
H A D | hiappevent-watcher-freeze-events-arkts.md | 71 … hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.time=${eventInfo.params['time']}`); 73 …hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.foreground=${eventInfo.params['foregrou… 77 …hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.bundle_name=${eventInfo.params['bundle_… 81 … hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.pid=${eventInfo.params['pid']}`); 82 … hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.uid=${eventInfo.params['uid']}`); 83 … hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.uuid=${eventInfo.params['uuid']}`); 87 …hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.hilog.size=${eventInfo.params['hilog'].… 102 …hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.test_data=${eventInfo.params['test_data… 135 HiAppEvent eventInfo.params.pid=3197 136 HiAppEvent eventInfo.params.uid=20010043 [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/ |
H A D | das_standard_token_manager.c | 23 Uint8Buff pkgNameBuff = { params->pkgName.val, params->pkgName.length }; in RegisterLocalIdentityStd() 24 Uint8Buff serviceTypeBuff = { params->serviceType.val, params->serviceType.length }; in RegisterLocalIdentityStd() 28 Uint8Buff authIdBuff = { params->authId.val, params->authId.length }; in RegisterLocalIdentityStd() 56 Uint8Buff pkgNameBuff = { params->pkgName.val, params->pkgName.length }; in UnregisterLocalIdentityStd() 57 Uint8Buff serviceTypeBuff = { params->serviceType.val, params->serviceType.length }; in UnregisterLocalIdentityStd() 61 Uint8Buff authIdBuff = { params->authId.val, params->authId.length }; in UnregisterLocalIdentityStd() 199 Uint8Buff pkgNameBuff = { params->pkgName.val, params->pkgName.length }; in DeletePeerAuthInfoStd() 200 Uint8Buff serviceTypeBuff = { params->serviceType.val, params->serviceType.length }; in DeletePeerAuthInfoStd() 206 Uint8Buff authIdBuff = { params->authId.val, params->authId.length }; in DeletePeerAuthInfoStd() 373 Uint8Buff pkgNameBuff = { params->pkgName.val, params->pkgName.length }; in GetPublicKeyStd() [all …]
|
/ohos5.0/foundation/graphic/graphic_2d/rosen/test/render_service/render_service/unittest/drawable/ |
H A D | rs_render_node_drawable_test.cpp | 257 params.isOpincRootFlag_ = true; 418 params.freezeFlag_ = true; 435 params.freezeFlag_ = false; 447 params.freezeFlag_ = true; 525 drawable->UpdateCacheInfoForDfx(canvas, params.GetBounds(), params.GetId()); 527 drawable->UpdateCacheInfoForDfx(canvas, params.GetBounds(), params.GetId()); 672 params.cacheSize_.x_ = 1.f; 677 params.cacheSize_.y_ = 1.f; 678 params.needFilter_ = true; 703 params.needFilter_ = true; [all …]
|