Home
last modified time | relevance | path

Searched refs:params (Results 1 – 25 of 2533) sorted by relevance

12345678910>>...102

/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/
H A Dpake_v1_protocol_common.c71 params->salt.val = (uint8_t *)HcMalloc(params->salt.length, 0); in AllocDefaultParams()
99 params->hmacKey.val = (uint8_t *)HcMalloc(params->hmacKey.length, 0); in AllocDefaultParams()
182 res = params->loader->generateRandom(&(params->salt)); in GeneratePakeParams()
189 res = params->loader->generateRandom(&(params->challengeSelf)); in GeneratePakeParams()
196 …KeyParams keyParams = { { params->psk.val, params->psk.length, false }, false, params->osAccountId… in GeneratePakeParams()
248 …if (memcpy_s(params->sessionKey.val, params->sessionKey.length, unionKey.val, params->sessionKey.l… in DeriveKeyFromSharedSecret()
253 if (memcpy_s(params->hmacKey.val, params->hmacKey.length, in DeriveKeyFromSharedSecret()
273 res = AgreeEcSharedSecret(params, &params->sharedSecret); in GenerateSessionKey()
275 res = AgreeDlSharedSecret(params, &params->sharedSecret); in GenerateSessionKey()
313 …KeyParams keyParams = { { params->hmacKey.val, params->hmacKey.length, false }, false, params->osA… in GenerateProof()
[all …]
/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
H A Dpake_v2_protocol_common.c75 params->salt.val = (uint8_t *)HcMalloc(params->salt.length, 0); in AllocDefaultParams()
176 res = params->loader->generateRandom(&(params->salt)); in GeneratePakeParams()
184 …KeyParams keyParams = { { params->psk.val, params->psk.length, false }, false, params->osAccountId… in GeneratePakeParams()
387 …tmpSharedSecret.length = (params->curveType == CURVE_256) ? (params->innerKeyLen * 2) : (params->i… in GenerateSharedSecret()
466 … res = CombineEpk(&params->epkSelf, &params->epkPeer, params->innerKeyLen, proofMsg, &usedLen); in CombineProofMsg()
468 … res = CombineEpk(&params->epkPeer, &params->epkSelf, params->innerKeyLen, proofMsg, &usedLen); in CombineProofMsg()
487 params->extraData.val, params->extraData.length) != EOK)) { in CombineProofMsg()
503 params->sharedSecret.length + params->innerKeyLen + params->extraData.length; in GenerateProof()
515 res = params->loader->sha256(&proofMsg, &params->kcfData); in GenerateProof()
533 params->sharedSecret.length + params->innerKeyLen + params->extraData.length; in VerifyProof()
[all …]
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/
H A Dpake_v2_auth_task_common.c152 …(void)memcpy_s(params->pakeParams.idPeer.val, params->pakeParams.idPeer.length, params->devIdPeer.… in ExtractPakePeerId()
154 (void)memcpy_s(params->pakeParams.idPeer.val + params->devIdPeer.length, in ExtractPakePeerId()
155params->pakeParams.idPeer.length - params->devIdPeer.length, params->deviceIdPeer.val, deviceIdPee… in ExtractPakePeerId()
172 …(void)memcpy_s(params->pakeParams.idSelf.val, params->pakeParams.idSelf.length, params->devIdSelf.… in ExtractPakeSelfId()
175params->pakeParams.idSelf.length - params->devIdSelf.length, params->deviceIdSelf.val, deviceIdSel… in ExtractPakeSelfId()
201 if (memcpy_s(params->deviceIdSelf.val, params->deviceIdSelf.length + 1, in ExtractSelfDeviceId()
455 (void)memset_s(params->userIdSelf, sizeof(params->userIdSelf), 0, sizeof(params->userIdSelf)); in DestroyPakeAuthParams()
456 (void)memset_s(params->userIdPeer, sizeof(params->userIdPeer), 0, sizeof(params->userIdPeer)); in DestroyPakeAuthParams()
457 (void)memset_s(params->pkSelf, sizeof(params->pkSelf), 0, sizeof(params->pkSelf)); in DestroyPakeAuthParams()
458 (void)memset_s(params->pkPeer, sizeof(params->pkPeer), 0, sizeof(params->pkPeer)); in DestroyPakeAuthParams()
[all …]
/ohos5.0/base/security/device_auth/services/protocol/src/iso_protocol/
H A Diso_protocol_common.c37 params->randSelf.val = (uint8_t *)HcMalloc(params->randSelf.length, 0); in InitIsoBaseParams()
44 params->randPeer.val = (uint8_t *)HcMalloc(params->randPeer.length, 0); in InitIsoBaseParams()
78 (void)memset_s(params->psk, sizeof(params->psk), 0, PSK_LEN); in DestroyIsoBaseParams()
96 int length = params->randSelf.length + params->randPeer.length + params->authIdSelf.length + in IsoCalSelfToken()
142 int length = params->randSelf.length + params->randPeer.length + params->authIdPeer.length + in IsoCalPeerToken()
195 params->randPeer.val, params->randPeer.length) != EOK) { in IsoCombineHkdfSalt()
205 params->randSelf.val, params->randSelf.length) != EOK) { in IsoCombineHkdfSalt()
246 int32_t res = params->loader->generateRandom(&params->randSelf); in IsoClientGenRandom()
299 Uint8Buff pskBuf = { params->psk, sizeof(params->psk) }; in IsoClientGenSessionKey()
336 int res = params->loader->generateRandom(&params->randSelf); in IsoServerGenRandomAndToken()
[all …]
/ohos5.0/foundation/communication/dsoftbus/tests/core/common/dfx/event/unittest/mock/
H A Dtrans_hisysevent_matcher.h29 EXPECT_EQ(params[index].t, TRANS_ASSIGNERS[index].type); in MatchTransEventNameTypeExtraInt32Param()
30 EXPECT_EQ(params[index].v.i32, extraParam); in MatchTransEventNameTypeExtraInt32Param()
37 EXPECT_EQ(params[index].t, TRANS_ASSIGNERS[index].type); in MatchTransEventNameTypeExtraStrParam()
38 EXPECT_STREQ(params[index].v.s, extraParam); in MatchTransEventNameTypeExtraStrParam()
46 EXPECT_EQ(params[index].t, TRANS_ASSIGNERS[index].type); in MatchTransEventNameTypeExtraStrParamAnony()
106 EXPECT_EQ(params[index].t, TRANS_ASSIGNERS[num].type);
107 EXPECT_EQ(params[index].v.i32, extra.firstTokenId);
116 EXPECT_EQ(params[index].v.i32, extraParam); in MatchTransAlarmNameTypeExtraInt32Param()
123 EXPECT_STREQ(params[index].v.s, extraParam); in MatchTransAlarmNameTypeExtraStrParam()
172 EXPECT_EQ(params[index].v.i32, extraParam); in MatchTransAuditNameTypeExtraInt32Param()
[all …]
H A Dconn_hisysevent_matcher.h29 EXPECT_EQ(params[index].t, g_connAssigners[index].type); in MatchConnEventNameTypeExtraInt32Param()
30 EXPECT_EQ(params[index].v.i32, extraParam); in MatchConnEventNameTypeExtraInt32Param()
36 EXPECT_EQ(params[index].t, g_connAssigners[index].type); in MatchConnEventNameTypeExtraUint32Param()
37 EXPECT_EQ(params[index].v.ui32, extraParam); in MatchConnEventNameTypeExtraUint32Param()
43 EXPECT_EQ(params[index].t, g_connAssigners[index].type); in MatchConnEventNameTypeExtraUint64Param()
44 EXPECT_EQ(params[index].v.ui64, extraParam); in MatchConnEventNameTypeExtraUint64Param()
50 EXPECT_EQ(params[index].t, g_connAssigners[index].type); in MatchConnEventNameTypeExtraStrParam()
51 EXPECT_STREQ(params[index].v.s, extraParam); in MatchConnEventNameTypeExtraStrParam()
59 EXPECT_EQ(params[index].t, g_connAssigners[index].type); in MatchConnEventNameTypeExtraStrParamAnony()
131 EXPECT_EQ(params[index].v.i32, extraParam); in MatchConnAuditNameTypeExtraInt32Param()
[all …]
H A Dlnn_hisysevent_matcher.h29 EXPECT_EQ(params[index].t, g_lnnAssigners[index].type); in MatchLnnEventNameTypeExtraInt32Param()
30 EXPECT_EQ(params[index].v.i32, extraParam); in MatchLnnEventNameTypeExtraInt32Param()
36 EXPECT_EQ(params[index].t, g_lnnAssigners[index].type); in MatchLnnEventNameTypeExtraUint32Param()
37 EXPECT_EQ(params[index].v.ui32, extraParam); in MatchLnnEventNameTypeExtraUint32Param()
43 EXPECT_EQ(params[index].t, g_lnnAssigners[index].type); in MatchLnnEventNameTypeExtraStrParam()
44 EXPECT_STREQ(params[index].v.s, extraParam); in MatchLnnEventNameTypeExtraStrParam()
52 EXPECT_EQ(params[index].t, g_lnnAssigners[index].type); in MatchLnnEventNameTypeExtraStrParamAnony()
127 EXPECT_EQ(params[index].v.i32, extraParam); in MatchLnnAuditNameTypeInt32Param()
134 EXPECT_EQ(params[index].v.ui32, extraParam); in MatchLnnAuditNameTypeUint32Param()
141 EXPECT_EQ(params[index].v.ui64, extraParam); in MatchLnnAuditNameTypeUint64Param()
[all …]
H A Ddisc_hisysevent_matcher.h27 EXPECT_STREQ(params[index].name, g_discAssigners[index].name); in MatchDiscEventNameTypeExtraInt32Param()
28 EXPECT_EQ(params[index].t, g_discAssigners[index].type); in MatchDiscEventNameTypeExtraInt32Param()
29 EXPECT_EQ(params[index].v.i32, extraParam); in MatchDiscEventNameTypeExtraInt32Param()
34 EXPECT_STREQ(params[index].name, g_discAssigners[index].name); in MatchDiscEventNameTypeExtraStrParam()
35 EXPECT_EQ(params[index].t, g_discAssigners[index].type); in MatchDiscEventNameTypeExtraStrParam()
36 EXPECT_STREQ(params[index].v.s, extraParam); in MatchDiscEventNameTypeExtraStrParam()
43 EXPECT_STREQ(params[index].name, g_discAssigners[index].name); in MatchDiscEventNameTypeExtraStrParamAnony()
44 EXPECT_EQ(params[index].t, g_discAssigners[index].type); in MatchDiscEventNameTypeExtraStrParamAnony()
46 EXPECT_STREQ(params[index].v.s, AnonymizeWrapper(anonyStr)); in MatchDiscEventNameTypeExtraStrParamAnony()
52 const auto *params = static_cast<const HiSysEventParam *>(arg); variable
[all …]
/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common/
H A Dpake_protocol_dl_common.c54 int res = params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk()
98 if (params->isClient) { in InitDlPakeParams()
107 res = InitSingleParam(&(params->eskSelf), params->eskSelf.length); in InitDlPakeParams()
112 res = InitSingleParam(&(params->epkSelf), params->innerKeyLen); in InitDlPakeParams()
117 res = InitSingleParam(&(params->base), params->innerKeyLen); in InitDlPakeParams()
132 res = GenerateEsk(params); in GenerateDlPakeParams()
139 params->largePrimeNumHex = (params->innerKeyLen == PAKE_DL_PRIME_SMALL_LEN) ? in GenerateDlPakeParams()
141 res = params->loader->bigNumExpMod(secret, &exp, params->largePrimeNumHex, &params->base); in GenerateDlPakeParams()
147 …res = params->loader->bigNumExpMod(&params->base, &(params->eskSelf), params->largePrimeNumHex, &( in GenerateDlPakeParams()
179 if (!params->loader->checkDlPublicKey(&(params->epkPeer), params->largePrimeNumHex)) { in AgreeDlSharedSecret()
[all …]
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/iso_auth_task/
H A Diso_auth_task_common.c103params->isoBaseParams.authIdSelf.length = params->devIdSelf.length + HcStrlen(params->deviceIdSelf… in FillPayload()
108 if (memcpy_s(params->isoBaseParams.authIdSelf.val, params->isoBaseParams.authIdSelf.length, in FillPayload()
109 params->devIdSelf.val, params->devIdSelf.length) != EOK) { in FillPayload()
113 if (memcpy_s(params->isoBaseParams.authIdSelf.val + params->devIdSelf.length, in FillPayload()
114 params->isoBaseParams.authIdSelf.length - params->devIdSelf.length, in FillPayload()
126 params->challenge.val = (uint8_t *)HcMalloc(params->challenge.length, 0); in SetChallenge()
205 Uint8Buff seedBuf = { params->seed, sizeof(params->seed) }; in AccountAuthGeneratePsk()
266 if (params == NULL) { in DestroyIsoAuthParams()
275 params->userIdSelf = NULL; in DestroyIsoAuthParams()
278 params->userIdPeer = NULL; in DestroyIsoAuthParams()
[all …]
/ohos5.0/foundation/graphic/graphic_2d/rosen/test/render_service/render_service_base/unittest/params/
H A Drs_display_render_params_test.cpp53 params.OnSync(target);
67 params.SetMainAndLeashSurfaceDirty(params.GetMainAndLeashSurfaceDirty());
84 params.SetRotationChanged(params.IsRotationChanged());
101 params.SetHDRPresent(params.GetHDRPresent());
104 params.SetHDRPresent(true);
135 params.SetNewPixelFormat(params.GetNewPixelFormat());
155 params.displayHasSecSurface_[params.screenId_] = true;
171 params.displayHasSkipSurface_[params.screenId_] = true;
187 params.displayHasProtectedSurface_[params.screenId_] = true;
204 params.hasCaptureWindow_[params.screenId_] = true;
[all …]
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/
H A Diso_task_common.c153 res = GenerateReturnKey(params, returnSessionKey, params->keyLen); in SendResultToFinalSelf()
197 res = GenerateReturnKey(params, returnKey, params->keyLen); in GenEncResult()
213 (void)memset_s(returnKey, params->keyLen, 0, params->keyLen); in GenEncResult()
333 …(void)memset_s(params->pinCodeString, HcStrlen(params->pinCodeString), 0, HcStrlen(params->pinCode… in DestroyIsoParams()
503 if (params->opCode == OP_UNBIND || params->opCode == OP_BIND) { in GetUpgradeFlagAndKeyLength()
526 … if (params->opCode != OP_BIND && params->opCode != OP_UNBIND && params->opCode != AUTHENTICATE) { in InitIsoParams()
643 res = AuthGeneratePsk(&params->seed, params); in GeneratePsk()
645 res = AuthGeneratePskUsePin(&params->seed, params, params->pinCodeString); in GeneratePsk()
647 …(void)memset_s(params->pinCodeString, HcStrlen(params->pinCodeString), 0, HcStrlen(params->pinCode… in GeneratePsk()
656 …(void)memset_s(params->baseParams.psk, sizeof(params->baseParams.psk), 0, sizeof(params->baseParam… in GeneratePsk()
[all …]
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/
H A Dpake_task_common.c69 { params->baseParams.sessionKey.val, params->baseParams.sessionKey.length, false }, in GenerateOutputKey()
73 int32_t res = params->baseParams.loader->computeHkdf(&keyParam, &(params->baseParams.salt), in GenerateOutputKey()
130 if (memcpy_s(params->baseParams.psk.val, params->baseParams.psk.length, in FillPskWithPin()
153 params->baseParams.idSelf.val = (uint8_t *)HcMalloc(params->baseParams.idSelf.length, 0); in FillAuthId()
163 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in FillAuthId()
180 if (memcpy_s(params->baseParams.idPeer.val, params->baseParams.idPeer.length, in FillAuthId()
241 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in FillNonce()
243 params->nonce.val = (uint8_t *)HcMalloc(params->nonce.length, 0); in FillNonce()
261 if (params->opCode != OP_BIND && params->opCode != OP_UNBIND && in FillDasPakeParams()
262 params->opCode != AUTHENTICATE && params->opCode != AUTH_KEY_AGREEMENT) { in FillDasPakeParams()
[all …]
H A Dpake_message_util.c37 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PackagePakeRequestData()
72 if (params->opCode == AUTHENTICATE || params->opCode == AUTH_KEY_AGREEMENT) { in ParsePakeRequestMessage()
85 …int32_t res = AddByteToJson(payload, FIELD_SALT, params->baseParams.salt.val, params->baseParams.s… in PackagePakeResponseData()
90 …res = AddByteToJson(payload, FIELD_EPK, params->baseParams.epkSelf.val, params->baseParams.epkSelf… in PackagePakeResponseData()
95 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PackagePakeResponseData()
96 res = AddByteToJson(payload, FIELD_NONCE, params->nonce.val, params->nonce.length); in PackagePakeResponseData()
122 …res = HexStringToByte(epkPeerHex, params->baseParams.epkPeer.val, params->baseParams.epkPeer.lengt… in GetDasEpkPeerFromJson()
132 …int32_t res = GetByteFromJson(in, FIELD_SALT, params->baseParams.salt.val, params->baseParams.salt… in ParsePakeResponseMessage()
142 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in ParsePakeResponseMessage()
143 res = GetByteFromJson(in, FIELD_NONCE, params->nonce.val, params->nonce.length); in ParsePakeResponseMessage()
[all …]
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/
H A Dcrypto_key_test.cpp1004 params.clear();
1008 params.clear();
1019 params.clear();
1022 params.clear();
1027 params.clear();
1032 params.clear();
1038 params.clear();
1042 params.clear();
1045 params.clear();
1053 params.clear();
[all …]
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/
H A Dsave_trusted_info.c68 CmdParams params; member
122 (void)params; in CheckGroupValidity()
125 if (params->isBind) { in CheckGroupValidity()
367 if (params->userIdSelf == NULL || params->userIdPeer == NULL) { in IsAcrossAccount()
371 if (!params->isBind && strcmp(params->userIdSelf, params->userIdPeer) != 0) { in IsAcrossAccount()
809 …return ((params != NULL) && (params->appId != NULL) && (params->authId != NULL) && (params->groupI… in IsSaveTrustedInfoParamsValid()
829 instance->params.isBind = params->isBind; in InitSaveTrustedInfoCmd()
830 instance->params.osAccountId = params->osAccountId; in InitSaveTrustedInfoCmd()
831 instance->params.credType = params->credType; in InitSaveTrustedInfoCmd()
832 instance->params.userTypeSelf = params->userType; in InitSaveTrustedInfoCmd()
[all …]
/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/
H A Dpake_protocol_ec_common.c36 return params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk()
38 res = params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk()
58 …uint32_t keyBufferLen = (params->curveType == CURVE_256) ? (params->innerKeyLen * 2) : (params->in… in InitEcPakeParams()
59 int32_t res = InitSingleParam(&(params->eskSelf), params->eskSelf.length); in InitEcPakeParams()
85 res = GenerateEsk(params); in GenerateEcPakeParams()
92 res = params->loader->hashToPoint(secret, alg, &params->base); in GenerateEcPakeParams()
97 …KeyParams eskSelfParams = { { params->eskSelf.val, params->eskSelf.length, false }, false, params-… in GenerateEcPakeParams()
98 KeyBuff baseBuff = { params->base.val, params->base.length, false }; in GenerateEcPakeParams()
122 if (!params->loader->checkEcPublicKey(&(params->epkPeer), alg)) { in AgreeEcSharedSecret()
127 …KeyParams eskSelfParams = { { params->eskSelf.val, params->eskSelf.length, false }, false, params-… in AgreeEcSharedSecret()
[all …]
/ohos5.0/foundation/ability/ability_runtime/test/unittest/cj_want_ffi_test/
H A Dcj_want_ffi_test.cpp76 CJWantParams params; variable
78 params.flags = 123;
80 params.uri = new char[URI_SIZE];
109 CJWantParams params; variable
111 params.flags = 123;
113 params.uri = new char[URI_SIZE];
142 CJWantParams params; variable
144 params.flags = 123;
146 params.uri = new char[URI_SIZE];
178 CJWantParams params; variable
[all …]
/ohos5.0/foundation/resourceschedule/device_usage_statistics/frameworks/src/
H A Dbundle_state_query.cpp101 return BundleStateCommon::JSParaError(env, params.callback, params.errorCode); in IsIdleState()
108 return BundleStateCommon::JSParaError(env, params.callback, params.errorCode); in IsIdleState()
142 params.bundleName = ""; in ParsePriorityGroupParameters()
256 if ((params.errorCode == ERR_OK) && (params.endTime <= params.beginTime)) { in ParseStatesParameters()
258 (long long)params.endTime, (long long)params.beginTime); in ParseStatesParameters()
446 if ((params.errorCode == ERR_OK) && (params.endTime <= params.beginTime)) { in ParseAppUsageParametersByInterval()
448 (long long)params.endTime, (long long)params.beginTime); in ParseAppUsageParametersByInterval()
544 if ((params.errorCode == ERR_OK) && (params.beginTime < TIME_NUMBER_MIN)) { in ParseAppUsageParameters()
555 if ((params.errorCode == ERR_OK) && (params.endTime < TIME_NUMBER_MIN)) { in ParseAppUsageParameters()
559 if ((params.errorCode == ERR_OK) && (params.endTime <= params.beginTime)) { in ParseAppUsageParameters()
[all …]
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/
H A Ddl_speke_protocol.c95 DlSpekeParams params; member
197 params->kcfDataPeer.val, params->kcfDataPeer.length) != HC_SUCCESS) { in GetKcfDataPeerFromInput()
259 …KeyParams keyParams = { { params->psk.val, params->psk.length, false }, false, params->osAccountId… in CalSecret()
289 if (InitUint8Buff(&params->base, params->innerKeyLen) != HC_SUCCESS) { in DlSpekeCalBase()
324 params->largePrimeNumHex, &(params->epkSelf)); in DlSpekeCalEpkSelf()
554 DlSpekeParams *params = &impl->params; in GenerateKcfDataMsg() local
561 Uint8Buff *epkClient = isClient ? &params->epkSelf : &params->epkPeer; in GenerateKcfDataMsg()
562 Uint8Buff *epkServer = isClient ? &params->epkPeer : &params->epkSelf; in GenerateKcfDataMsg()
576 params->sharedSecret.val, params->sharedSecret.length) != EOK) { in GenerateKcfDataMsg()
1113 instance->params.osAccountId = params->osAccountId; in BuildDlSpekeProtocolObj()
[all …]
H A Dec_speke_protocol.c74 EcSpekeParams params; member
170 params->kcfDataPeer.val, params->kcfDataPeer.length) != HC_SUCCESS) { in GetKcfDataPeerFromInput()
205 …KeyParams keyParams = { { params->psk.val, params->psk.length, false }, false, params->osAccountId… in CalSecret()
290 …KeyParams eskSelfParams = { { params->eskSelf.val, params->eskSelf.length, false }, false, params-… in EcSpekeCalEpkSelf()
291 KeyBuff baseBuff = { params->base.val, params->base.length, false }; in EcSpekeCalEpkSelf()
319 …KeyParams eskSelfParams = { { params->eskSelf.val, params->eskSelf.length, false }, false, params-… in CalP()
531 EcSpekeParams *params = &impl->params; in GenerateKcfDataMsg() local
538 Uint8Buff *epkClient = isClient ? &params->epkSelf : &params->epkPeer; in GenerateKcfDataMsg()
553 params->sharedSecret.val, params->sharedSecret.length) != EOK) { in GenerateKcfDataMsg()
1095 instance->params.osAccountId = params->osAccountId; in BuildEcSpekeProtocolObj()
[all …]
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/
H A Dpake_v1_protocol_task_common.c30 if (params == NULL) { in DestroyDasPakeV1Params()
37 … (void)memset_s(params->returnKey.val, params->returnKey.length, 0, params->returnKey.length); in DestroyDasPakeV1Params()
57 HcFree(params->packageName); in DestroyDasPakeV1Params()
58 params->packageName = NULL; in DestroyDasPakeV1Params()
61 params->serviceType = NULL; in DestroyDasPakeV1Params()
63 HcFree(params->nonce.val); in DestroyDasPakeV1Params()
64 params->nonce.val = NULL; in DestroyDasPakeV1Params()
83 res = InitSingleParam(&params->returnKey, params->returnKey.length); in AllocReturnKey()
219 if (params->opCode == AUTHENTICATE && params->isPeerFromUpgrade) { in InitDasPakeV1Params()
286 res = params->baseParams.loader->generateRandom(&(params->nonce)); in FillPskWithDerivedKeyHex()
[all …]
/ohos5.0/docs/zh-cn/application-dev/dfx/
H A Dhiappevent-watcher-freeze-events-arkts.md71 … hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.time=${eventInfo.params['time']}`);
73 …hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.foreground=${eventInfo.params['foregrou…
77 …hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.bundle_name=${eventInfo.params['bundle_…
81 … hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.pid=${eventInfo.params['pid']}`);
82 … hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.uid=${eventInfo.params['uid']}`);
83 … hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.uuid=${eventInfo.params['uuid']}`);
87 …hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.hilog.size=${eventInfo.params['hilog'].…
102 …hilog.info(0x0000, 'testTag', `HiAppEvent eventInfo.params.test_data=${eventInfo.params['test_data…
135 HiAppEvent eventInfo.params.pid=3197
136 HiAppEvent eventInfo.params.uid=20010043
[all …]
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/
H A Ddas_standard_token_manager.c23 Uint8Buff pkgNameBuff = { params->pkgName.val, params->pkgName.length }; in RegisterLocalIdentityStd()
24 Uint8Buff serviceTypeBuff = { params->serviceType.val, params->serviceType.length }; in RegisterLocalIdentityStd()
28 Uint8Buff authIdBuff = { params->authId.val, params->authId.length }; in RegisterLocalIdentityStd()
56 Uint8Buff pkgNameBuff = { params->pkgName.val, params->pkgName.length }; in UnregisterLocalIdentityStd()
57 Uint8Buff serviceTypeBuff = { params->serviceType.val, params->serviceType.length }; in UnregisterLocalIdentityStd()
61 Uint8Buff authIdBuff = { params->authId.val, params->authId.length }; in UnregisterLocalIdentityStd()
199 Uint8Buff pkgNameBuff = { params->pkgName.val, params->pkgName.length }; in DeletePeerAuthInfoStd()
200 Uint8Buff serviceTypeBuff = { params->serviceType.val, params->serviceType.length }; in DeletePeerAuthInfoStd()
206 Uint8Buff authIdBuff = { params->authId.val, params->authId.length }; in DeletePeerAuthInfoStd()
373 Uint8Buff pkgNameBuff = { params->pkgName.val, params->pkgName.length }; in GetPublicKeyStd()
[all …]
/ohos5.0/foundation/graphic/graphic_2d/rosen/test/render_service/render_service/unittest/drawable/
H A Drs_render_node_drawable_test.cpp257 params.isOpincRootFlag_ = true;
418 params.freezeFlag_ = true;
435 params.freezeFlag_ = false;
447 params.freezeFlag_ = true;
525 drawable->UpdateCacheInfoForDfx(canvas, params.GetBounds(), params.GetId());
527 drawable->UpdateCacheInfoForDfx(canvas, params.GetBounds(), params.GetId());
672 params.cacheSize_.x_ = 1.f;
677 params.cacheSize_.y_ = 1.f;
678 params.needFilter_ = true;
703 params.needFilter_ = true;
[all …]

12345678910>>...102