Lines Matching refs:keyLen
101 switch (cipherKey->keyLen) {
109 COMM_LOGE(COMM_ADAPTER, "cipherKey->keyLen unable to get encryption bits.");
133 if (memcpy_s(cipherKey->key, cipherKey->keyLen, result, AES_SESSION_KEY_LENGTH) != EOK) {
154 cipherKey->keyLen = AES_SESSION_KEY_LENGTH;
156 cipherKey->key = (uint8_t *)SoftBusCalloc(cipherKey->keyLen);
167 (void)memset_s(cipherKey->key, cipherKey->keyLen, 0, cipherKey->keyLen);
197 (void)memset_s(cipherKey.key, cipherKey.keyLen, 0, cipherKey.keyLen);
205 (void)memset_s(cipherKey.key, cipherKey.keyLen, 0, cipherKey.keyLen);
229 EncryptKey key = { cipherKey->key, cipherKey->keyLen };
235 (void)memset_s(cipherKey->key, cipherKey->keyLen, 0, cipherKey->keyLen);
236 if (memcpy_s(cipherKey->key, cipherKey->keyLen, result, SHA256_MAC_LEN) != EOK) {
263 static EVP_CIPHER *GetSslGcmAlgorithmByKeyLen(uint32_t keyLen)
265 switch (keyLen) {
277 static int32_t GcmOpensslEvpInit(EVP_CIPHER_CTX **ctx, uint32_t keyLen, int32_t encMode)
279 if (ctx == NULL || keyLen == 0 || (encMode != ENCRYPT_MODE && encMode != DECRYPT_MODE)) {
283 EVP_CIPHER *cipher = GetSslGcmAlgorithmByKeyLen(keyLen);
327 int32_t ret = GcmOpensslEvpInit(&ctx, cipherKey->keyLen, ENCRYPT_MODE);
380 if (GcmOpensslEvpInit(&ctx, cipherKey->keyLen, DECRYPT_MODE) != SOFTBUS_OK) {