Home
last modified time | relevance | path

Searched defs:HKS_ERROR_INVALID_ARGUMENT (Results 1 - 25 of 30) sorted by relevance

12

/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/
H A Dhks_openssl_sm3.c43 HKS_ERROR_INVALID_ARGUMENT, "sm3 generate key invalid params!") in HksOpensslSm3GenerateKey() local
H A Dhks_openssl_hash.c70 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(hash), HKS_ERROR_INVALID_ARGUMENT, "Invalid param hash!") in HashCheckParam() local
72 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(msg), HKS_ERROR_INVALID_ARGUMENT, "Invalid param msg!") in HashCheckParam() local
124 HKS_ERROR_INVALID_ARGUMENT, "Invalid param msg!") in HksOpensslHashUpdate() local
H A Dhks_openssl_hmac.c45 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid key point") in HmacCheckBuffer() local
46 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(msg), HKS_ERROR_INVALID_ARGUMENT, "Invalid msg") in HmacCheckBuffer() local
47 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(mac), HKS_ERROR_INVALID_ARGUMENT, "Invalid mac") in HmacCheckBuffer() local
64 HKS_ERROR_INVALID_ARGUMENT, "aes generate key invalid params!") in HksOpensslHmacGenerateKey() local
73 HKS_IF_NOT_SUCC_LOGE_RETURN(HmacCheckBuffer(key, msg, mac), HKS_ERROR_INVALID_ARGUMENT, "Invalid Buffer Info") in HmacCheckParam() local
83 HKS_ERROR_INVALID_ARGUMENT, "Invalid alg(0x%" LOG_PUBLIC "x)", alg) in HmacCheckParam() local
114 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid key point") HksOpensslHmacInit() local
133 HKS_ERROR_INVALID_ARGUMENT, "Invalid alg(0x%" LOG_PUBLIC "x)", digestAlg) HksOpensslHmacInit() local
163 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(msg), HKS_ERROR_INVALID_ARGUMENT, "Invalid key point") HksOpensslHmacUpdate() local
[all...]
H A Dhks_openssl_sm4.c50 HKS_ERROR_INVALID_ARGUMENT, "sm4 generate key invalid params!") in HksOpensslSm4GenerateKey() local
[all...]
H A Dhks_openssl_kdf.c110 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(factor), HKS_ERROR_INVALID_ARGUMENT, "Invalid param mainKey!"); in AppendKekAndFactor() local
111 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(kekData), HKS_ERROR_INVALID_ARGUMENT, "Invalid param derivedKey!"); in AppendKekAndFactor() local
126 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(mainKey), HKS_ERROR_INVALID_ARGUMENT, "Invalid param mainKey!"); in HksOpensslSmKdf() local
128 HKS_ERROR_INVALID_ARGUMENT, "Invalid param derivedKey!"); in HksOpensslSmKdf() local
H A Dhks_openssl_rsa.c229 HKS_ERROR_INVALID_ARGUMENT, "rsa generate key invalid params!") in HksOpensslRsaGenerateKey() local
H A Dhks_openssl_sm2.c496 HKS_ERROR_INVALID_ARGUMENT, "Invalid param cipherBlob!"); HksOpensslSm2Decrypt() local
497 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(plainBlob), HKS_ERROR_INVALID_ARGUMENT, "Invalid param plainBlob!"); HksOpensslSm2Decrypt() local
[all...]
H A Dhks_openssl_engine.c67 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid param key!") in SignVerifyCheckParam() local
69 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(message), HKS_ERROR_INVALID_ARGUMENT, "Invalid param message!") in SignVerifyCheckParam() local
71 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(signature), HKS_ERROR_INVALID_ARGUMENT, "Invalid param signature!") in SignVerifyCheckParam() local
81 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(mainKey), HKS_ERROR_INVALID_ARGUMENT, in DeriveKeyCheckParam() local
98 HKS_ERROR_INVALID_ARGUMENT, "Invali in AgreeKeyCheckParam() local
100 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(pubKey), HKS_ERROR_INVALID_ARGUMENT, "Invalid pubKey params!") AgreeKeyCheckParam() local
112 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid param key!") EncryptCheckParam() local
114 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(message), HKS_ERROR_INVALID_ARGUMENT, "Invalid param message!") EncryptCheckParam() local
117 HKS_ERROR_INVALID_ARGUMENT, "Invalid param cipherText!") EncryptCheckParam() local
175 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(randomData), HKS_ERROR_INVALID_ARGUMENT, "Invalid params!") HksCryptoHalFillRandom() local
184 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(randomData), HKS_ERROR_INVALID_ARGUMENT, "Invalid params!") HksCryptoHalFillPrivRandom() local
290 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(msg), HKS_ERROR_INVALID_ARGUMENT, "Invalid params!") HksCryptoHalHashUpdate() local
408 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(message), HKS_ERROR_INVALID_ARGUMENT, "Invalid param message!") HksCryptoHalEncryptUpdate() local
410 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(out), HKS_ERROR_INVALID_ARGUMENT, "Invalid param outdata!") HksCryptoHalEncryptUpdate() local
460 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid param key!") HksCryptoHalDecryptInit() local
473 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(message), HKS_ERROR_INVALID_ARGUMENT, "Invalid param message!") HksCryptoHalDecryptUpdate() local
475 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(out), HKS_ERROR_INVALID_ARGUMENT, "Invalid param outdata!") HksCryptoHalDecryptUpdate() local
[all...]
H A Dhks_openssl_aes.c251 HKS_IF_NOT_SUCC_LOGE_RETURN(AesGenKeyCheckParam(spec), HKS_ERROR_INVALID_ARGUMENT, in HksOpensslAesGenerateKey() local
[all...]
/base/security/huks/services/huks_standard/huks_service/main/systemapi_wrap/dcm/src/
H A Dhks_client_service_dcm.cpp37 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(cert), HKS_ERROR_INVALID_ARGUMENT, "invalid in cert"); in DcmGenerateCertChain() local
/base/security/huks/services/huks_standard/huks_engine/main/core/src/
H A Dhks_core_service_key_attest.c59 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "invalid key!") in CheckAttestKeyParams() local
66 HKS_IF_NOT_SUCC_LOGE_RETURN(HksCheckParamSetValidity(paramSet), HKS_ERROR_INVALID_ARGUMENT, "invalid paramSet!") in CheckAttestKeyParams() local
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/asymmetric_alg_test/
H A Dhks_export_test_mt.cpp134 EXPECT_EQ(HksExportPublicKeyForDe(&testAlias, nullptr, &publicKey), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F() local
152 EXPECT_EQ(HksExportPublicKeyForDe(&testAlias, nullptr, &publicKey), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F() local
168 EXPECT_EQ(HksExportPublicKeyForDe(&testAlias, nullptr, &publicKey), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F() local
/base/security/huks/frameworks/huks_standard/main/os_dependency/ipc/src/
H A Dhks_request.cpp83 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(outBlob), HKS_ERROR_INVALID_ARGUMENT, "invalid outBlob"); in HksSendAnonAttestRequestAndWaitAsyncReply() local
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/
H A Dhks_access_control_cipher_test.cpp523 ASSERT_EQ(CheckAccessCipherTest(testAccessCaseParams, testIDMParams), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F() local
/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/
H A Dhks_crypto_hal_api_openssl.cpp312 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
315 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
318 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
321 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
323 EXPECT_EQ(HksCryptoHalSign(&key, &spec, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
339 EXPECT_EQ(HksCryptoHalVerify(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
342 EXPECT_EQ(HksCryptoHalVerify(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
345 EXPECT_EQ(HksCryptoHalVerify(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
348 EXPECT_EQ(HksCryptoHalVerify(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
350 EXPECT_EQ(HksCryptoHalVerify(&key, &spec, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
497 EXPECT_EQ(HksCryptoHalAgreeKey(&key, &pubKey, nullptr, &agreeKey), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
500 EXPECT_EQ(HksCryptoHalAgreeKey(&key, &pubKey, nullptr, &agreeKey), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
503 EXPECT_EQ(HksCryptoHalAgreeKey(&key, &pubKey, nullptr, &agreeKey), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
505 EXPECT_EQ(HksCryptoHalAgreeKey(&key, &pubKey, &spec, &agreeKey), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
508 EXPECT_EQ(HksCryptoHalAgreeKey(&key, &pubKey, &spec, &agreeKey), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
529 EXPECT_EQ(HksCryptoHalAgreeKey(&key, &pubKey, &spec, &agreeKey), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
582 EXPECT_EQ(HksCryptoHalHmac(&key, 0, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
585 EXPECT_EQ(HksCryptoHalHmac(&key, 0, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
588 EXPECT_EQ(HksCryptoHalHmac(&key, 0, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
591 EXPECT_EQ(HksCryptoHalHmac(&key, 0, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
593 EXPECT_EQ(HksCryptoHalHmac(&key, HKS_DIGEST_SHA512, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
608 EXPECT_EQ(HksCryptoHalHmacInit(&key, 0, &hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
611 EXPECT_EQ(HksCryptoHalHmacInit(&key, 0, &hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
613 EXPECT_EQ(HksCryptoHalHmacInit(&key, HKS_DIGEST_NONE, &hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
617 EXPECT_EQ(HksCryptoHalHmacInit(&key, HKS_DIGEST_SHA512, NULL), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
633 EXPECT_EQ(HksCryptoHalHmacUpdate(&message, hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
643 EXPECT_EQ(HksCryptoHalHmacUpdate(&message, hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
647 EXPECT_EQ(HksCryptoHalHmacUpdate(&message, NULL), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
[all...]
H A Dhks_crypto_hal_api_mbedtls.cpp528 ASSERT_EQ(HksCryptoHalHmacInit(&key, NULL, &hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
535 ASSERT_EQ(HksCryptoHalHmacInit(&key, HKS_DIGEST_SHA512, NULL), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
551 ASSERT_EQ(HksCryptoHalHmacUpdate(&message, hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
561 ASSERT_EQ(HksCryptoHalHmacUpdate(&message, hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
565 ASSERT_EQ(HksCryptoHalHmacUpdate(&message, NULL), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
593 ASSERT_EQ(HksCryptoHalHmacFinal(NULL, &hmactestctx, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
595 ASSERT_EQ(HksCryptoHalHmacFinal(&message, NULL, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
598 ASSERT_EQ(HksCryptoHalHmacFinal(&message, &hmactestctx, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
615 ASSERT_EQ(HksCryptoHalHmac(&key, NULL, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
618 ASSERT_EQ(HksCryptoHalHmac(&key, NULL, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
621 ASSERT_EQ(HksCryptoHalHmac(&key, NULL, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local
[all...]
/base/security/huks/services/huks_standard/huks_engine/main/device_cert_manager/src/
H A Ddcm_asn1.c122 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(final), HKS_ERROR_INVALID_ARGUMENT, "invalid asn1 final buf.") in DcmAsn1WriteFinal() local
/base/security/huks/frameworks/huks_standard/main/common/src/
H A Dhks_common_check.c28 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data1), HKS_ERROR_INVALID_ARGUMENT, "invalid data1.") in HksCheckBlob4() local
30 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data2), HKS_ERROR_INVALID_ARGUMENT, "invalid data2.") in HksCheckBlob4() local
32 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data3), HKS_ERROR_INVALID_ARGUMENT, "invalid data3.") in HksCheckBlob4() local
34 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data4), HKS_ERROR_INVALID_ARGUMENT, "invalid data4.") in HksCheckBlob4() local
41 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data1), HKS_ERROR_INVALID_ARGUMENT, "invalid data1.") in HksCheckBlob3() local
43 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data2), HKS_ERROR_INVALID_ARGUMENT, "invalid data2.") in HksCheckBlob3() local
45 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data3), HKS_ERROR_INVALID_ARGUMENT, "invalid data3.") in HksCheckBlob3() local
52 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data1), HKS_ERROR_INVALID_ARGUMENT, "invalid data1.") in HksCheckBlob2() local
54 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data2), HKS_ERROR_INVALID_ARGUMENT, "invalid data2.") in HksCheckBlob2() local
[all...]
H A Dhks_check_paramset.c867 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "wrapping key is invalid") in HksCoreCheckImportWrappedKeyParams() local
/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/
H A Dhks_mbedtls_3des.c602 CheckKeySize(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid des3 keySize = 0x%" LOG_PUBLIC "X", key->size) in HksMbedtls3DesDecryptInit() local
[all...]
H A Dhks_mbedtls_des.c589 CheckKeySize(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid des keySize = 0x%" LOG_PUBLIC "X", key->size) in HksMbedtlsDesDecryptInit() local
[all...]
H A Dhks_mbedtls_engine.c32 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid param key!") in EncryptCheckParam() local
33 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(message), HKS_ERROR_INVALID_ARGUMENT, "Invalid param message!") in EncryptCheckParam() local
34 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(cipherText), HKS_ERROR_INVALID_ARGUMENT, "Invalid param cipherText!") in EncryptCheckParam() local
357 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid param key!") HksCryptoHalEncryptInit() local
368 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(message), HKS_ERROR_INVALID_ARGUMENT, "Invalid param message!") HksCryptoHalEncryptUpdate() local
369 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(out), HKS_ERROR_INVALID_ARGUMENT, "Invalid param out!") HksCryptoHalEncryptUpdate() local
419 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid param key!") HksCryptoHalDecryptInit() local
430 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(message), HKS_ERROR_INVALID_ARGUMENT, "Invalid param message!") HksCryptoHalDecryptUpdate() local
431 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(out), HKS_ERROR_INVALID_ARGUMENT, "Invalid param out!") HksCryptoHalDecryptUpdate() local
[all...]
/base/security/huks/interfaces/inner_api/huks_lite/
H A Dhks_errno.h30 #define HKS_ERROR_INVALID_ARGUMENT ((int32_t)-135) macro
/base/security/huks/services/huks_standard/huks_service/main/core/src/
H A Dhks_client_check.c124 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(processName), HKS_ERROR_INVALID_ARGUMENT, "invalid processName") in HksCheckGetKeyInfoListParams() local
315 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(processName), HKS_ERROR_INVALID_ARGUMENT, "invalid processName"); HksCheckListAliasesParam() local
[all...]
/base/security/huks/utils/crypto_adapter/
H A Dhks_client_service_adapter.c152 HKS_IF_NOT_SUCC_LOGE_RETURN(GetEccNid(keySize, &nid), HKS_ERROR_INVALID_ARGUMENT, "GetNidFromKeySize fail") in EccToX509PublicKey() local
[all...]

Completed in 22 milliseconds

12