/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
H A D | hks_openssl_sm3.c | 43 HKS_ERROR_INVALID_ARGUMENT, "sm3 generate key invalid params!")
in HksOpensslSm3GenerateKey() local
|
H A D | hks_openssl_hash.c | 70 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(hash), HKS_ERROR_INVALID_ARGUMENT, "Invalid param hash!")
in HashCheckParam() local 72 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(msg), HKS_ERROR_INVALID_ARGUMENT, "Invalid param msg!")
in HashCheckParam() local 124 HKS_ERROR_INVALID_ARGUMENT, "Invalid param msg!")
in HksOpensslHashUpdate() local
|
H A D | hks_openssl_hmac.c | 45 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid key point")
in HmacCheckBuffer() local 46 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(msg), HKS_ERROR_INVALID_ARGUMENT, "Invalid msg")
in HmacCheckBuffer() local 47 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(mac), HKS_ERROR_INVALID_ARGUMENT, "Invalid mac")
in HmacCheckBuffer() local 64 HKS_ERROR_INVALID_ARGUMENT, "aes generate key invalid params!")
in HksOpensslHmacGenerateKey() local 73 HKS_IF_NOT_SUCC_LOGE_RETURN(HmacCheckBuffer(key, msg, mac), HKS_ERROR_INVALID_ARGUMENT, "Invalid Buffer Info")
in HmacCheckParam() local 83 HKS_ERROR_INVALID_ARGUMENT, "Invalid alg(0x%" LOG_PUBLIC "x)", alg)
in HmacCheckParam() local 114 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid key point") HksOpensslHmacInit() local 133 HKS_ERROR_INVALID_ARGUMENT, "Invalid alg(0x%" LOG_PUBLIC "x)", digestAlg) HksOpensslHmacInit() local 163 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(msg), HKS_ERROR_INVALID_ARGUMENT, "Invalid key point") HksOpensslHmacUpdate() local [all...] |
H A D | hks_openssl_sm4.c | 50 HKS_ERROR_INVALID_ARGUMENT, "sm4 generate key invalid params!")
in HksOpensslSm4GenerateKey() local [all...] |
H A D | hks_openssl_kdf.c | 110 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(factor), HKS_ERROR_INVALID_ARGUMENT, "Invalid param mainKey!");
in AppendKekAndFactor() local 111 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(kekData), HKS_ERROR_INVALID_ARGUMENT, "Invalid param derivedKey!");
in AppendKekAndFactor() local 126 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(mainKey), HKS_ERROR_INVALID_ARGUMENT, "Invalid param mainKey!");
in HksOpensslSmKdf() local 128 HKS_ERROR_INVALID_ARGUMENT, "Invalid param derivedKey!");
in HksOpensslSmKdf() local
|
H A D | hks_openssl_rsa.c | 229 HKS_ERROR_INVALID_ARGUMENT, "rsa generate key invalid params!") in HksOpensslRsaGenerateKey() local
|
H A D | hks_openssl_sm2.c | 496 HKS_ERROR_INVALID_ARGUMENT, "Invalid param cipherBlob!"); HksOpensslSm2Decrypt() local 497 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(plainBlob), HKS_ERROR_INVALID_ARGUMENT, "Invalid param plainBlob!"); HksOpensslSm2Decrypt() local [all...] |
H A D | hks_openssl_engine.c | 67 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid param key!") in SignVerifyCheckParam() local 69 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(message), HKS_ERROR_INVALID_ARGUMENT, "Invalid param message!") in SignVerifyCheckParam() local 71 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(signature), HKS_ERROR_INVALID_ARGUMENT, "Invalid param signature!") in SignVerifyCheckParam() local 81 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(mainKey), HKS_ERROR_INVALID_ARGUMENT, in DeriveKeyCheckParam() local 98 HKS_ERROR_INVALID_ARGUMENT, "Invali in AgreeKeyCheckParam() local 100 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(pubKey), HKS_ERROR_INVALID_ARGUMENT, "Invalid pubKey params!") AgreeKeyCheckParam() local 112 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid param key!") EncryptCheckParam() local 114 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(message), HKS_ERROR_INVALID_ARGUMENT, "Invalid param message!") EncryptCheckParam() local 117 HKS_ERROR_INVALID_ARGUMENT, "Invalid param cipherText!") EncryptCheckParam() local 175 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(randomData), HKS_ERROR_INVALID_ARGUMENT, "Invalid params!") HksCryptoHalFillRandom() local 184 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(randomData), HKS_ERROR_INVALID_ARGUMENT, "Invalid params!") HksCryptoHalFillPrivRandom() local 290 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(msg), HKS_ERROR_INVALID_ARGUMENT, "Invalid params!") HksCryptoHalHashUpdate() local 408 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(message), HKS_ERROR_INVALID_ARGUMENT, "Invalid param message!") HksCryptoHalEncryptUpdate() local 410 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(out), HKS_ERROR_INVALID_ARGUMENT, "Invalid param outdata!") HksCryptoHalEncryptUpdate() local 460 HKS_IF_NOT_SUCC_LOGE_RETURN(HksOpensslCheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid param key!") HksCryptoHalDecryptInit() local 473 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(message), HKS_ERROR_INVALID_ARGUMENT, "Invalid param message!") HksCryptoHalDecryptUpdate() local 475 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(out), HKS_ERROR_INVALID_ARGUMENT, "Invalid param outdata!") HksCryptoHalDecryptUpdate() local [all...] |
H A D | hks_openssl_aes.c | 251 HKS_IF_NOT_SUCC_LOGE_RETURN(AesGenKeyCheckParam(spec), HKS_ERROR_INVALID_ARGUMENT,
in HksOpensslAesGenerateKey() local [all...] |
/base/security/huks/services/huks_standard/huks_service/main/systemapi_wrap/dcm/src/ |
H A D | hks_client_service_dcm.cpp | 37 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(cert), HKS_ERROR_INVALID_ARGUMENT, "invalid in cert"); in DcmGenerateCertChain() local
|
/base/security/huks/services/huks_standard/huks_engine/main/core/src/ |
H A D | hks_core_service_key_attest.c | 59 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "invalid key!") in CheckAttestKeyParams() local 66 HKS_IF_NOT_SUCC_LOGE_RETURN(HksCheckParamSetValidity(paramSet), HKS_ERROR_INVALID_ARGUMENT, "invalid paramSet!") in CheckAttestKeyParams() local
|
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/asymmetric_alg_test/ |
H A D | hks_export_test_mt.cpp | 134 EXPECT_EQ(HksExportPublicKeyForDe(&testAlias, nullptr, &publicKey), HKS_ERROR_INVALID_ARGUMENT);
in HWTEST_F() local 152 EXPECT_EQ(HksExportPublicKeyForDe(&testAlias, nullptr, &publicKey), HKS_ERROR_INVALID_ARGUMENT);
in HWTEST_F() local 168 EXPECT_EQ(HksExportPublicKeyForDe(&testAlias, nullptr, &publicKey), HKS_ERROR_INVALID_ARGUMENT);
in HWTEST_F() local
|
/base/security/huks/frameworks/huks_standard/main/os_dependency/ipc/src/ |
H A D | hks_request.cpp | 83 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(outBlob), HKS_ERROR_INVALID_ARGUMENT, "invalid outBlob");
in HksSendAnonAttestRequestAndWaitAsyncReply() local
|
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/ |
H A D | hks_access_control_cipher_test.cpp | 523 ASSERT_EQ(CheckAccessCipherTest(testAccessCaseParams, testIDMParams), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F() local
|
/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/ |
H A D | hks_crypto_hal_api_openssl.cpp | 312 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 315 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 318 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 321 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 323 EXPECT_EQ(HksCryptoHalSign(&key, &spec, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 339 EXPECT_EQ(HksCryptoHalVerify(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 342 EXPECT_EQ(HksCryptoHalVerify(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 345 EXPECT_EQ(HksCryptoHalVerify(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 348 EXPECT_EQ(HksCryptoHalVerify(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 350 EXPECT_EQ(HksCryptoHalVerify(&key, &spec, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 497 EXPECT_EQ(HksCryptoHalAgreeKey(&key, &pubKey, nullptr, &agreeKey), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 500 EXPECT_EQ(HksCryptoHalAgreeKey(&key, &pubKey, nullptr, &agreeKey), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 503 EXPECT_EQ(HksCryptoHalAgreeKey(&key, &pubKey, nullptr, &agreeKey), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 505 EXPECT_EQ(HksCryptoHalAgreeKey(&key, &pubKey, &spec, &agreeKey), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 508 EXPECT_EQ(HksCryptoHalAgreeKey(&key, &pubKey, &spec, &agreeKey), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 529 EXPECT_EQ(HksCryptoHalAgreeKey(&key, &pubKey, &spec, &agreeKey), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 582 EXPECT_EQ(HksCryptoHalHmac(&key, 0, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 585 EXPECT_EQ(HksCryptoHalHmac(&key, 0, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 588 EXPECT_EQ(HksCryptoHalHmac(&key, 0, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 591 EXPECT_EQ(HksCryptoHalHmac(&key, 0, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 593 EXPECT_EQ(HksCryptoHalHmac(&key, HKS_DIGEST_SHA512, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 608 EXPECT_EQ(HksCryptoHalHmacInit(&key, 0, &hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 611 EXPECT_EQ(HksCryptoHalHmacInit(&key, 0, &hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 613 EXPECT_EQ(HksCryptoHalHmacInit(&key, HKS_DIGEST_NONE, &hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 617 EXPECT_EQ(HksCryptoHalHmacInit(&key, HKS_DIGEST_SHA512, NULL), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 633 EXPECT_EQ(HksCryptoHalHmacUpdate(&message, hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 643 EXPECT_EQ(HksCryptoHalHmacUpdate(&message, hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 647 EXPECT_EQ(HksCryptoHalHmacUpdate(&message, NULL), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local [all...] |
H A D | hks_crypto_hal_api_mbedtls.cpp | 528 ASSERT_EQ(HksCryptoHalHmacInit(&key, NULL, &hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 535 ASSERT_EQ(HksCryptoHalHmacInit(&key, HKS_DIGEST_SHA512, NULL), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 551 ASSERT_EQ(HksCryptoHalHmacUpdate(&message, hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 561 ASSERT_EQ(HksCryptoHalHmacUpdate(&message, hmactestctx), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 565 ASSERT_EQ(HksCryptoHalHmacUpdate(&message, NULL), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 593 ASSERT_EQ(HksCryptoHalHmacFinal(NULL, &hmactestctx, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 595 ASSERT_EQ(HksCryptoHalHmacFinal(&message, NULL, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 598 ASSERT_EQ(HksCryptoHalHmacFinal(&message, &hmactestctx, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 615 ASSERT_EQ(HksCryptoHalHmac(&key, NULL, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 618 ASSERT_EQ(HksCryptoHalHmac(&key, NULL, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local 621 ASSERT_EQ(HksCryptoHalHmac(&key, NULL, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); HWTEST_F() local [all...] |
/base/security/huks/services/huks_standard/huks_engine/main/device_cert_manager/src/ |
H A D | dcm_asn1.c | 122 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(final), HKS_ERROR_INVALID_ARGUMENT, "invalid asn1 final buf.")
in DcmAsn1WriteFinal() local
|
/base/security/huks/frameworks/huks_standard/main/common/src/ |
H A D | hks_common_check.c | 28 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data1), HKS_ERROR_INVALID_ARGUMENT, "invalid data1.") in HksCheckBlob4() local 30 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data2), HKS_ERROR_INVALID_ARGUMENT, "invalid data2.") in HksCheckBlob4() local 32 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data3), HKS_ERROR_INVALID_ARGUMENT, "invalid data3.") in HksCheckBlob4() local 34 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data4), HKS_ERROR_INVALID_ARGUMENT, "invalid data4.") in HksCheckBlob4() local 41 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data1), HKS_ERROR_INVALID_ARGUMENT, "invalid data1.") in HksCheckBlob3() local 43 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data2), HKS_ERROR_INVALID_ARGUMENT, "invalid data2.") in HksCheckBlob3() local 45 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data3), HKS_ERROR_INVALID_ARGUMENT, "invalid data3.") in HksCheckBlob3() local 52 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data1), HKS_ERROR_INVALID_ARGUMENT, "invalid data1.") in HksCheckBlob2() local 54 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(data2), HKS_ERROR_INVALID_ARGUMENT, "invalid data2.") in HksCheckBlob2() local [all...] |
H A D | hks_check_paramset.c | 867 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "wrapping key is invalid") in HksCoreCheckImportWrappedKeyParams() local
|
/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/ |
H A D | hks_mbedtls_3des.c | 602 CheckKeySize(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid des3 keySize = 0x%" LOG_PUBLIC "X", key->size) in HksMbedtls3DesDecryptInit() local [all...] |
H A D | hks_mbedtls_des.c | 589 CheckKeySize(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid des keySize = 0x%" LOG_PUBLIC "X", key->size) in HksMbedtlsDesDecryptInit() local [all...] |
H A D | hks_mbedtls_engine.c | 32 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid param key!") in EncryptCheckParam() local 33 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(message), HKS_ERROR_INVALID_ARGUMENT, "Invalid param message!") in EncryptCheckParam() local 34 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(cipherText), HKS_ERROR_INVALID_ARGUMENT, "Invalid param cipherText!") in EncryptCheckParam() local 357 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid param key!") HksCryptoHalEncryptInit() local 368 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(message), HKS_ERROR_INVALID_ARGUMENT, "Invalid param message!") HksCryptoHalEncryptUpdate() local 369 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(out), HKS_ERROR_INVALID_ARGUMENT, "Invalid param out!") HksCryptoHalEncryptUpdate() local 419 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(key), HKS_ERROR_INVALID_ARGUMENT, "Invalid param key!") HksCryptoHalDecryptInit() local 430 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(message), HKS_ERROR_INVALID_ARGUMENT, "Invalid param message!") HksCryptoHalDecryptUpdate() local 431 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(out), HKS_ERROR_INVALID_ARGUMENT, "Invalid param out!") HksCryptoHalDecryptUpdate() local [all...] |
/base/security/huks/interfaces/inner_api/huks_lite/ |
H A D | hks_errno.h | 30 #define HKS_ERROR_INVALID_ARGUMENT ((int32_t)-135) macro
|
/base/security/huks/services/huks_standard/huks_service/main/core/src/ |
H A D | hks_client_check.c | 124 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(processName), HKS_ERROR_INVALID_ARGUMENT, "invalid processName") in HksCheckGetKeyInfoListParams() local 315 HKS_IF_NOT_SUCC_LOGE_RETURN(CheckBlob(processName), HKS_ERROR_INVALID_ARGUMENT, "invalid processName"); HksCheckListAliasesParam() local [all...] |
/base/security/huks/utils/crypto_adapter/ |
H A D | hks_client_service_adapter.c | 152 HKS_IF_NOT_SUCC_LOGE_RETURN(GetEccNid(keySize, &nid), HKS_ERROR_INVALID_ARGUMENT, "GetNidFromKeySize fail")
in EccToX509PublicKey() local [all...] |