/ohos5.0/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/ |
H A D | hks_crypto_hal_api_openssl.cpp | 152 HksBlob tagAead = { .size = 0, .data = nullptr }; variable 170 ret = HksCryptoHalEncrypt(&key, &spec, &message, &cipherText, &tagAead); 222 HksBlob tagAead = { .size = 1, .data = buff }; variable 224 ret = HksCryptoHalEncrypt(&key, &spec, &message, &cipherText, &tagAead); 228 ret = HksCryptoHalEncrypt(&key, &spec, &message, &cipherText, &tagAead); 232 ret = HksCryptoHalEncrypt(&key, &spec, &message, &cipherText, &tagAead); 236 ret = HksCryptoHalEncrypt(&key, &spec, &message, &cipherText, &tagAead); 733 HksBlob tagAead = { .size = 0, .data = nullptr }; variable 753 tagAead = { .size = 1, .data = buff }; 844 HksBlob tagAead = { .size = 0, .data = nullptr }; variable [all …]
|
H A D | hks_crypto_hal_aes_cipher.cpp | 493 struct HksBlob *encryptOut, struct HksBlob *tagAead) in RunTestEncrypt() argument 554 struct HksBlob *tagAead, struct HksBlob *decryptOut) in RunTestDecrypt() argument 629 ASSERT_EQ(tagAead.data == nullptr || encryptAll.data == nullptr || in RunTestCaseThreeStage() 634 RunTestEncrypt(&key, testCaseParams, &message, &encryptAll, &tagAead); in RunTestCaseThreeStage() 645 HKS_FREE(tagAead.data); in RunTestCaseThreeStage() 649 struct HksBlob *tagAead, struct HksBlob *decryptOut) in RunTestGcmDecrypt() argument 723 ASSERT_EQ(tagAead.data == nullptr, false) << "tagAead malloc failed."; in RunTestCaseThreeStageGCM() 734 aeadParamForGcm.tagDec = tagAead; in RunTestCaseThreeStageGCM() 752 HKS_FREE(tagAead.data); in RunTestCaseThreeStageGCM() 782 aeadParamForGcm.tagDec = tagAead; in RunTestCase() [all …]
|
H A D | hks_crypto_hal_aes_encrypt.cpp | 349 struct HksBlob *encryptOut, struct HksBlob *tagAead) const in RunTestEncrypt() 385 … EXPECT_EQ(HksCryptoHalEncryptFinal(&enMessageLast, &encryptCtx, &enMessageLastOut, tagAead, in RunTestEncrypt() 398 EXPECT_EQ(HksCryptoHalEncryptFinal(&enMessageLast, &encryptCtx, encryptOut, tagAead, in RunTestEncrypt() 423 HksBlob tagAead = { .size = AEAD_SIZE, .data = (uint8_t *)HksMalloc(AEAD_SIZE) }; in RunTestCase() local 425 ASSERT_EQ(tagAead.data == nullptr, false) << "tagAead malloc failed."; in RunTestCase() 428 RunTestEncrypt(&key, testCaseParams, &message, &cipherText, &tagAead); in RunTestCase() 430 … EXPECT_EQ(HksCryptoHalEncrypt(&key, &testCaseParams.usageSpec, &message, &cipherText, &tagAead), in RunTestCase() 437 HKS_FREE(tagAead.data); in RunTestCase()
|
H A D | hks_crypto_hal_api_mbedtls.cpp | 132 HksBlob tagAead = { .size = 0, .data = nullptr }; variable 135 ret = HksCryptoHalEncrypt(&key, nullptr, &message, &cipherTextTest, &tagAead); 139 ret = HksCryptoHalEncrypt(&key, nullptr, &message, &cipherTextTest, &tagAead); 143 ret = HksCryptoHalEncrypt(&key, nullptr, &message, &cipherTextTest, &tagAead); 147 ret = HksCryptoHalEncrypt(&key, nullptr, &message, &cipherTextTest, &tagAead); 150 ret = HksCryptoHalEncrypt(&key, &spec, &message, &cipherTextTest, &tagAead); 202 HksBlob tagAead = { .size = 1, .data = buff }; variable 204 ret = HksCryptoHalEncrypt(&key, &spec, &message, &cipherText, &tagAead); 208 ret = HksCryptoHalEncrypt(&key, &spec, &message, &cipherText, &tagAead);
|
H A D | hks_crypto_hal_aes_decrypt.cpp | 365 struct HksBlob *decryptOut, struct HksBlob *tagAead) const in RunTestAesDecrypt() 397 EXPECT_EQ(HksCryptoHalDecryptFinal(&messageLast, &decryptCtx, &outLast, tagAead, in RunTestAesDecrypt() 408 EXPECT_EQ(HksCryptoHalDecryptFinal(&deMessageLast, &decryptCtx, decryptOut, tagAead, in RunTestAesDecrypt() 416 struct HksBlob *decryptOut, struct HksBlob *tagAead) const in RunTestAesGcmDecrypt() 445 EXPECT_EQ(HksCryptoHalDecryptFinal(&messageLast, &decryptCtx, &outLast, tagAead, in RunTestAesGcmDecrypt() 455 EXPECT_EQ(HksCryptoHalDecryptFinal(&deMessageLast, &decryptCtx, decryptOut, tagAead, in RunTestAesGcmDecrypt()
|
H A D | hks_crypto_hal_rsa_encrypt.cpp | 329 HksBlob tagAead = { .size = 0, .data = nullptr }; in RunTestCase() local 331 … EXPECT_EQ(HksCryptoHalEncrypt(&key, &testCaseParams.usageSpec, &message, &cipherText, &tagAead), in RunTestCase()
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/ |
H A D | hks_mbedtls_aes.c | 564 tagAead->size, in AesEncryptGcm() 565 tagAead->data); in AesEncryptGcm() 569 (void)memset_s(tagAead->data, tagAead->size, 0, tagAead->size); in AesEncryptGcm() 685 struct HksBlob *tagAead) in AesEncryptGcmFinal() argument 704 ret = MbedtlsGcmFinish(gcmCtx, tagAead->data, tagAead->size, true); in AesEncryptGcmFinal() 846 diff |= tagAead->data[i] ^ check_tag[i]; in AesDecryptGcmFinal() 891 tagAead->data, in AesEncryptCcm() 892 tagAead->size); in AesEncryptCcm() 896 (void)memset_s(tagAead->data, tagAead->size, 0, tagAead->size); in AesEncryptCcm() 1546 struct HksBlob *tagAead) in HksMbedtlsAesEncryptFinal() argument [all …]
|
H A D | hks_mbedtls_engine.c | 263 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead) in HksCryptoHalEncrypt() argument 270 return func(key, usageSpec, message, cipherText, tagAead); in HksCryptoHalEncrypt() 298 struct HksBlob *tagAead, const uint32_t algtype) in HksCryptoHalEncryptFinal() argument 310 return func(ctx, message, cipherText, tagAead, true); in HksCryptoHalEncryptFinal() 359 struct HksBlob *tagAead, const uint32_t algtype) in HksCryptoHalDecryptFinal() argument 371 return func(ctx, message, cipherText, tagAead, false); in HksCryptoHalDecryptFinal()
|
H A D | hks_mbedtls_rsa.c | 319 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead) in HksMbedtlsRsaEncrypt() argument 321 (void)tagAead; in HksMbedtlsRsaEncrypt()
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
H A D | hks_openssl_aes.c | 393 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead) in OpensslAesAeadEncryptFinal() argument 584 struct HksBlob *cipherText, struct HksBlob *tagAead) in OpensslAesAeadEncryptFinalGCM() argument 630 struct HksBlob *plainText, struct HksBlob *tagAead) in OpensslAesAeadDecryptFinalGCM() argument 655 if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, tagAead->size, tagAead->data) != in OpensslAesAeadDecryptFinalGCM() 814 const struct HksBlob *input, struct HksBlob *output, struct HksBlob *tagAead) in OpensslAesAeadCipherFinal() argument 836 if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, tagAead->size, tagAead->data) != in OpensslAesAeadCipherFinal() 1038 struct HksBlob *tagAead) in HksOpensslAesEncryptFinal() argument 1047 ret = OpensslAesAeadEncryptFinalGCM(cryptoCtx, message, cipherText, tagAead); in HksOpensslAesEncryptFinal() 1124 struct HksBlob *tagAead) in HksOpensslAesDecryptFinal() argument 1133 ret = OpensslAesAeadDecryptFinalGCM(cryptoCtx, message, cipherText, tagAead); in HksOpensslAesDecryptFinal() [all …]
|
H A D | hks_openssl_engine.c | 380 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead) in HksCryptoHalEncrypt() argument 387 return func(key, usageSpec, message, cipherText, tagAead); in HksCryptoHalEncrypt() 421 struct HksBlob *tagAead, const uint32_t algtype) in HksCryptoHalEncryptFinal() argument 433 return func(ctx, message, cipherText, tagAead, true); in HksCryptoHalEncryptFinal() 485 struct HksBlob *tagAead, const uint32_t algtype) in HksCryptoHalDecryptFinal() argument 497 return func(ctx, message, cipherText, tagAead, false); in HksCryptoHalDecryptFinal()
|
H A D | hks_openssl_sm4.c | 136 struct HksBlob *tagAead) in HksOpensslSm4EncryptFinal() argument 138 (void)(tagAead); // sm4 do not support CCM or GCM, therefore tag is not used in HksOpensslSm4EncryptFinal() 223 struct HksBlob *tagAead) in HksOpensslSm4DecryptFinal() argument
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/include/ |
H A D | hks_openssl_aes.h | 43 struct HksBlob *tagAead); 50 struct HksBlob *tagAead); 55 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead);
|
H A D | hks_openssl_sm4.h | 38 struct HksBlob *tagAead); 45 struct HksBlob *tagAead);
|
H A D | hks_openssl_rsa.h | 41 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead);
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/include/ |
H A D | hks_mbedtls_aes.h | 38 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead); 50 struct HksBlob *tagAead, const bool encrypt);
|
H A D | hks_mbedtls_rsa.h | 38 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead);
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/common/include/ |
H A D | hks_crypto_hal.h | 228 struct HksBlob *tagAead, const uint32_t algtype); 233 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead); 241 struct HksBlob *tagAead, const uint32_t algtype);
|
H A D | hks_crypto_adapter.h | 46 struct HksBlob *tagAead);
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/common/src/ |
H A D | hks_crypto_adapter.c | 225 …ParamSet *paramSet, const struct HksBlob *inData, struct HksBlob *outData, struct HksBlob *tagAead) in HksGetEncryptAeTag() argument 233 tagAead->data = NULL; in HksGetEncryptAeTag() 234 tagAead->size = 0; in HksGetEncryptAeTag() 243 tagAead->data = outData->data + inData->size; in HksGetEncryptAeTag() 244 tagAead->size = HKS_AE_TAG_LEN; in HksGetEncryptAeTag()
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/ |
H A D | hks_aes_decrypt_mt.cpp | 509 HksBlob tagAead = { .size = AAD_SIZE, .data = (uint8_t *)HksMalloc(AAD_SIZE) }; in RunTestCase() local 510 ASSERT_NE(tagAead.data, nullptr); in RunTestCase() 512 …AesGcmEncrypt(paramInSet, &plainText, &cipherText, &authId, &tagAead), testCaseParams.encryptResul… in RunTestCase() 514 EXPECT_EQ(memcpy_s(cipherText.data + AAD_SIZE, AAD_SIZE, tagAead.data, AAD_SIZE), 0); in RunTestCase() 515 HKS_FREE(tagAead.data); in RunTestCase()
|
H A D | hks_aes_encrypt_mt.cpp | 472 HksBlob tagAead = { .size = AAD_SIZE, .data = (uint8_t *)HksMalloc(AAD_SIZE) }; in RunTestCase() local 473 ASSERT_NE(tagAead.data, nullptr); in RunTestCase() 474 (void)memcpy_s(tagAead.data, AAD_SIZE, cipherText.data + AAD_SIZE, AAD_SIZE); in RunTestCase() 476 … EXPECT_EQ(AesGcmDecrypt(paramInSet, &cipherText, &plainTextDecrypt, &authId, &tagAead), in RunTestCase() 478 HKS_FREE(tagAead.data); in RunTestCase()
|
H A D | hks_aes_key_mt.cpp | 469 HksBlob tagAead = { .size = AAD_SIZE, .data = (uint8_t *)HksMalloc(AAD_SIZE) }; in RunTestCase() local 470 ASSERT_NE(tagAead.data, nullptr); in RunTestCase() 471 EXPECT_EQ(AesGcmEncrypt(paramInSet, &plainText, &cipherText, &symmetricKey, &tagAead), in RunTestCase() 473 … EXPECT_EQ(AesGcmDecrypt(paramInSet, &cipherText, &plainTextDecrypt, &symmetricKey, &tagAead), in RunTestCase() 475 HKS_FREE(tagAead.data); in RunTestCase()
|
H A D | openssl_aes_helper.c | 234 const struct HksBlob *randomKey, const struct HksBlob *tagAead) in AesGcmEncrypt() argument 280 if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, HKS_AE_TAG_LEN, tagAead->data) != 1) { in AesGcmEncrypt()
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/include/ |
H A D | openssl_aes_helper.h | 40 const struct HksBlob *randomKey, const struct HksBlob *tagAead);
|