/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
H A D | hks_openssl_dsa.c | 53 uint8_t *buff = (uint8_t *)HksMalloc(HKS_KEY_BYTES(keyMaterial->keySize)); in InitDsaStructKey() 62 …if (memcpy_s(buff, HKS_KEY_BYTES(keyMaterial->keySize), key->data + *offset, keyMaterial->xSize) !… in InitDsaStructKey() 70 …if (memcpy_s(buff, HKS_KEY_BYTES(keyMaterial->keySize), key->data + *offset, keyMaterial->ySize) !… in InitDsaStructKey() 85 … (void)memset_s(buff, HKS_KEY_BYTES(keyMaterial->keySize), 0, HKS_KEY_BYTES(keyMaterial->keySize)); in InitDsaStructKey() 94 uint8_t *buff = HksMalloc(HKS_KEY_BYTES(keyMaterial->keySize)); in InitDsaStructParameter() 97 …if (memcpy_s(buff, HKS_KEY_BYTES(keyMaterial->keySize), key->data + *offset, keyMaterial->pSize) !… in InitDsaStructParameter() 103 …if (memcpy_s(buff, HKS_KEY_BYTES(keyMaterial->keySize), key->data + *offset, keyMaterial->qSize) !… in InitDsaStructParameter() 110 …if (memcpy_s(buff, HKS_KEY_BYTES(keyMaterial->keySize), key->data + *offset, keyMaterial->gSize) !… in InitDsaStructParameter() 111 … (void)memset_s(buff, HKS_KEY_BYTES(keyMaterial->keySize), 0, HKS_KEY_BYTES(keyMaterial->keySize)); in InitDsaStructParameter() 128 … (void)memset_s(buff, HKS_KEY_BYTES(keyMaterial->keySize), 0, HKS_KEY_BYTES(keyMaterial->keySize)); in InitDsaStructParameter() [all …]
|
H A D | hks_openssl_dh.c | 276 if (HKS_KEY_BYTES(spec->keyLen) > sharedKey->size) { in HksOpensslDhAgreeKey() 306 if (HKS_KEY_BYTES(spec->keyLen) > (uint32_t)DH_size(dh)) { in HksOpensslDhAgreeKey() 309 … if (memcpy_s(sharedKey->data, sharedKey->size, computeKey, HKS_KEY_BYTES(spec->keyLen)) != EOK) { in HksOpensslDhAgreeKey() 312 HKS_LOG_I("get agreed key size %" LOG_PUBLIC "u", HKS_KEY_BYTES(spec->keyLen)); in HksOpensslDhAgreeKey() 313 sharedKey->size = HKS_KEY_BYTES(spec->keyLen); in HksOpensslDhAgreeKey()
|
H A D | hks_openssl_sm2.c | 167 (keyMaterial->xSize > HKS_KEY_BYTES(keyMaterial->keySize)) || in GetSm2Modules() 168 (keyMaterial->ySize > HKS_KEY_BYTES(keyMaterial->keySize)) || in GetSm2Modules() 169 (keyMaterial->zSize > HKS_KEY_BYTES(keyMaterial->keySize)) || in GetSm2Modules() 197 … uncompressedPublicKey + 1 + HKS_KEY_BYTES(material->keySize) - material->xSize, material->xSize, in PushPubKeyToParam() 240 … uint32_t fullSize = 1 + HKS_KEY_BYTES(material->keySize) + HKS_KEY_BYTES(material->keySize); in ConstructSm2ParamsFromRawKey()
|
H A D | hks_openssl_ecc.c | 114 …uint32_t rawMaterialLen = sizeof(struct KeyMaterialEcc) + HKS_KEY_BYTES(keySize) * ECC_KEYPAIR_CNT; in EccSaveKeyMaterial() 127 keyMaterial->xSize = HKS_KEY_BYTES(keySize); in EccSaveKeyMaterial() 128 keyMaterial->ySize = HKS_KEY_BYTES(keySize); in EccSaveKeyMaterial() 129 keyMaterial->zSize = HKS_KEY_BYTES(keySize); in EccSaveKeyMaterial()
|
H A D | hks_openssl_aes.c | 261 case HKS_KEY_BYTES(HKS_AES_KEY_SIZE_128): in GetAesCbcCipherType() 263 case HKS_KEY_BYTES(HKS_AES_KEY_SIZE_192): in GetAesCbcCipherType() 265 case HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256): in GetAesCbcCipherType() 275 case HKS_KEY_BYTES(HKS_AES_KEY_SIZE_128): in GetAesCtrCipherType() 277 case HKS_KEY_BYTES(HKS_AES_KEY_SIZE_192): in GetAesCtrCipherType() 279 case HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256): in GetAesCtrCipherType() 289 case HKS_KEY_BYTES(HKS_AES_KEY_SIZE_128): in GetAesEcbCipherType() 291 case HKS_KEY_BYTES(HKS_AES_KEY_SIZE_192): in GetAesEcbCipherType() 293 case HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256): in GetAesEcbCipherType()
|
H A D | hks_openssl_sm4.c | 58 if (keySize != HKS_KEY_BYTES(HKS_SM4_KEY_SIZE_128)) { in GetSm4CipherType()
|
/ohos5.0/base/security/huks/services/huks_standard/huks_engine/main/core/src/ |
H A D | hks_keyblob_lite.c | 69 uint8_t keyBuf[HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256)] = {0}; in GetDeriveMaterial() 70 struct HksBlob mk = { HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256), keyBuf }; in GetDeriveMaterial() 152 uint8_t kekBuf[HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256)] = {0}; in EncryptAndDecryptKeyBlob() 153 struct HksBlob kek = { HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256), kekBuf }; in EncryptAndDecryptKeyBlob() 162 …(void)memset_s(kekBuf, HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256), 0, HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256)… in EncryptAndDecryptKeyBlob() 178 …(void)memset_s(kekBuf, HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256), 0, HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256)… in EncryptAndDecryptKeyBlob() 207 if (key->size != (HKS_KEY_BYTES(HKS_CURVE25519_KEY_SIZE_256) << 1)) { in Ed25519BlobToKeyMaterial() 213 (HKS_KEY_BYTES(HKS_CURVE25519_KEY_SIZE_256) << 1)); in Ed25519BlobToKeyMaterial() 221 keyMaterial->pubKeySize = HKS_KEY_BYTES(HKS_CURVE25519_KEY_SIZE_256); in Ed25519BlobToKeyMaterial() 222 keyMaterial->priKeySize = HKS_KEY_BYTES(HKS_CURVE25519_KEY_SIZE_256); in Ed25519BlobToKeyMaterial() [all …]
|
H A D | hks_core_service_key_other.c | 103 uint8_t keyBuf[HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256)] = {0}; in GetMacKey() 104 struct HksBlob mk = { HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256), keyBuf }; in GetMacKey() 114 …struct HksKeySpec derivationSpec = { HKS_ALG_PBKDF2, HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256), &derPara… in GetMacKey() 126 uint8_t keyBuf[HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256)] = {0}; in HksCoreCalcMacHeader() 127 struct HksBlob macKey = { HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256), keyBuf }; in HksCoreCalcMacHeader()
|
H A D | hks_core_service_key_generate.c | 179 agreedKey->size = HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256); in GenAgreeKey() 421 sharedSecret.size = HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256); in AgreeSharedSecretWithPeerPublicKey() 490 kek.size = HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256); in DecryptKekWithAgreeSharedSecret() 708 if (key->size != HKS_KEY_BYTES(HKS_CURVE25519_KEY_SIZE_256)) { in GetCurve25519PrivateOrPairInnerFormat()
|
H A D | hks_sm_import_wrap_key.c | 322 deriveBlob.size = HKS_KEY_BYTES(HKS_SM4_KEY_SIZE_128); in DeriveKeyBySm3() 330 …struct HksKeySpec derivationSpec = { HKS_ALG_GMKDF, HKS_KEY_BYTES(HKS_SM4_KEY_SIZE_128), &derParam… in DeriveKeyBySm3()
|
H A D | hks_keyblob.c | 136 …struct HksKeySpec derivationSpec = { HKS_ALG_HKDF, HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256), &derParam … in GetDeriveKey() 148 derivedKey->size = HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256); in GetDeriveKey()
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/ |
H A D | hks_crypto_hal_api_mbedtls.cpp | 197 uint8_t buff[HKS_KEY_BYTES(HKS_AES_KEY_SIZE_128)] = {0}; 221 uint8_t buff[HKS_KEY_BYTES(HKS_AES_KEY_SIZE_128)] = {0}; 244 uint8_t buff[HKS_KEY_BYTES(HKS_AES_KEY_SIZE_128)] = {0}; 267 uint8_t buff[HKS_KEY_BYTES(HKS_AES_KEY_SIZE_128)] = {0}; 289 uint8_t buff[HKS_KEY_BYTES(HKS_AES_KEY_SIZE_128)] = {0}; 299 HKS_KEY_BYTES(HKS_RSA_KEY_SIZE_4096) + 300 (HKS_KEY_BYTES(HKS_RSA_KEY_SIZE_4096) + HKS_KEY_BYTES(HKS_RSA_KEY_SIZE_4096)); 306 keyMaterial->nSize = HKS_KEY_BYTES(HKS_RSA_KEY_SIZE_4096); 308 … keyMaterial->dSize = HKS_KEY_BYTES(HKS_RSA_KEY_SIZE_4096) + HKS_KEY_BYTES(HKS_RSA_KEY_SIZE_4096); 313 key.size -= HKS_KEY_BYTES(HKS_RSA_KEY_SIZE_4096); [all …]
|
H A D | hks_crypto_hal_api_openssl.cpp | 217 uint8_t buff[HKS_KEY_BYTES(HKS_AES_KEY_SIZE_128)] = {0}; 253 uint8_t buff[HKS_KEY_BYTES(HKS_AES_KEY_SIZE_128)] = {0}; 281 uint8_t buff[HKS_KEY_BYTES(HKS_AES_KEY_SIZE_128)] = {0}; 365 uint8_t buff[HKS_KEY_BYTES(HKS_RSA_KEY_SIZE_512)] = {0}; 388 uint8_t buff[HKS_KEY_BYTES(HKS_RSA_KEY_SIZE_512)] = {0}; 412 uint8_t buff[HKS_KEY_BYTES(DSA_KEY_LEN_512)] = {0}; 432 uint8_t buff[HKS_KEY_BYTES(DSA_KEY_LEN_512)] = {0}; 449 uint8_t buff[HKS_KEY_BYTES(HKS_ECC_KEY_SIZE_256)] = {0}; 471 uint8_t buff[HKS_KEY_BYTES(KEY_LEN_256)] = {0}; 523 uint8_t buff[HKS_KEY_BYTES(HKS_RSA_KEY_SIZE_512)] = {0}; [all …]
|
H A D | hks_crypto_hal_sm3_cipher.cpp | 55 …struct HksKeySpec derivationSpec = { HKS_ALG_GMKDF, HKS_KEY_BYTES(HKS_SM4_KEY_SIZE_128), &derParam… in RunTestCase()
|
H A D | hks_crypto_hal_rsa_encrypt.cpp | 318 outLen = HKS_KEY_BYTES(testCaseParams.keySize); in RunTestCase()
|
/ohos5.0/base/security/huks/utils/crypto_adapter/ |
H A D | hks_client_service_adapter_common.c | 54 if (key->size != HKS_KEY_BYTES(HKS_CURVE25519_KEY_SIZE_256)) { in TranslateToInnerCurve25519Format() 93 if ((key->size != HKS_KEY_BYTES(HKS_AES_KEY_SIZE_128)) && in GetHksPubKeyInnerFormat() 94 (key->size != HKS_KEY_BYTES(HKS_AES_KEY_SIZE_192)) && in GetHksPubKeyInnerFormat() 95 (key->size != HKS_KEY_BYTES(HKS_AES_KEY_SIZE_256))) { in GetHksPubKeyInnerFormat()
|
H A D | hks_client_service_adapter.c | 366 if (publicKey->size != HKS_KEY_BYTES(HKS_CURVE25519_KEY_SIZE_256)) { in Curve25519ToX509PublicKey() 509 uint32_t xSize = HKS_KEY_BYTES(keyLen); in EcKeyToPublicKey() 510 uint32_t ySize = HKS_KEY_BYTES(keyLen); in EcKeyToPublicKey()
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/ |
H A D | hks_mbedtls_dh.c | 73 const uint32_t keyByteLen = HKS_KEY_BYTES(keySize); in DhSaveKeyMaterial() 133 uint32_t keyLen = HKS_KEY_BYTES(spec->keyLen); in HksMbedtlsDhGenerateKey() 201 ctx->len = HKS_KEY_BYTES(keyMaterial->keySize); in DhKeyMaterialToCtx() 230 if (HKS_KEY_BYTES(spec->keyLen) > sharedKey->size) { in HksMbedtlsDhAgreeKey()
|
H A D | hks_mbedtls_ecc.c | 77 const uint32_t maxKeyByteLen = HKS_KEY_BYTES(HKS_ECC_KEY_SIZE_521); in EccKeyMaterialXyzSizeCheck() 164 const uint32_t keyByteLen = HKS_KEY_BYTES(keySize); in EccSaveKeyMaterial()
|
H A D | hks_mbedtls_ecdh.c | 92 const uint32_t keyByteLen = HKS_KEY_BYTES(spec->keyLen); in HksMbedtlsEcdh()
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/ |
H A D | openssl_ecc_helper.c | 75 … uint32_t rawMaterialLen = sizeof(struct KeyMaterialEcc) + HKS_KEY_BYTES(keyLen) * ECC_KEYPAIR_CNT; in EccSaveKeyMaterial() 83 keyMaterial->xSize = HKS_KEY_BYTES(keyLen); in EccSaveKeyMaterial() 84 keyMaterial->ySize = HKS_KEY_BYTES(keyLen); in EccSaveKeyMaterial() 85 keyMaterial->zSize = HKS_KEY_BYTES(keyLen); in EccSaveKeyMaterial() 470 uint32_t xSize = HKS_KEY_BYTES(keyLen); in EcKeyToPublicKey() 471 uint32_t ySize = HKS_KEY_BYTES(keyLen); in EcKeyToPublicKey()
|
H A D | openssl_dh_helper.c | 148 if ((uint32_t)HKS_KEY_BYTES(keyLen) > sharedKey->size) { in DhAgreeKey() 178 if (HKS_KEY_BYTES(keyLen) > DH_size(dh)) { in DhAgreeKey() 181 if (memcpy_s(sharedKey->data, sharedKey->size, computeKey, HKS_KEY_BYTES(keyLen)) != 0) { in DhAgreeKey()
|
H A D | openssl_rsa_helper.c | 166 uint8_t *buff = (uint8_t *)HksMalloc(HKS_KEY_BYTES(keyMaterial->keySize)); in InitRsa() 176 …if (memcpy_s(buff, HKS_KEY_BYTES(keyMaterial->keySize), key->data + offset, keyMaterial->nSize) ==… in InitRsa() 181 …if (memcpy_s(buff, HKS_KEY_BYTES(keyMaterial->keySize), key->data + offset, keyMaterial->eSize) ==… in InitRsa() 187 …if (memcpy_s(buff, HKS_KEY_BYTES(keyMaterial->keySize), key->data + offset, keyMaterial->dSize) ==… in InitRsa()
|
/ohos5.0/base/security/huks/interfaces/inner_api/huks_standard/main/include/ |
H A D | hks_type.h | 64 #define HKS_KEY_BYTES(keySize) (((keySize) + HKS_BITS_PER_BYTE - 1) / HKS_BITS_PER_BYTE) macro 291 #define HKS_MAX_KEY_LEN (HKS_KEY_BYTES(HKS_RSA_KEY_SIZE_4096) * HKS_KEY_MATERIAL_NUM)
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/common/src/ |
H A D | hks_check_paramset.c | 753 if (key->size != HKS_KEY_BYTES(params->keyLen.value)) { in CheckImportSymmetricKeySize() 922 if ((privateKey->size != HKS_KEY_BYTES(HKS_CURVE25519_KEY_SIZE_256)) || in HksCoreCheckAgreeKeyParams() 923 (peerPublicKey->size != HKS_KEY_BYTES(HKS_CURVE25519_KEY_SIZE_256))) { in HksCoreCheckAgreeKeyParams() 1121 if (HKS_KEY_BYTES(keySize->uint32Param) != key->size) { in HksCoreCheckAgreeDeriveFinishParams() 1123 … "u not equals to real key size %" LOG_PUBLIC "u", HKS_KEY_BYTES(keySize->uint32Param), key->size); in HksCoreCheckAgreeDeriveFinishParams()
|