Home
last modified time | relevance | path

Searched refs:P256 (Results 1 - 18 of 18) sorted by relevance

/base/security/device_auth/test/unittest/deviceauth/source/
H A Didentity_manager_test.cpp65 CertInfo info = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F()
75 info.signAlg = P256; in HWTEST_F()
92 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F()
124 CertInfo peerCertInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F()
141 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F()
197 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F()
204 CertInfo peerCertInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F()
H A Ddeviceauth_func_test.cpp935 ret = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN, P256, in GenerateTempKeyPair()
984 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson()
H A Ddeviceauth_standard_auth_test.cpp238 ret = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN, P256, in GenerateTempKeyPair()
287 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson()
H A Ddeviceauth_standard_test.cpp165 ret = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN, P256, in GenerateTempKeyPair()
214 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson()
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/
H A Dpake_protocol_ec_common.c57 /* P256 requires buffer for both X and Y coordinates. */ in InitEcPakeParams()
91 Algorithm alg = (params->curveType == CURVE_256) ? P256 : X25519; in GenerateEcPakeParams()
116 /* P256 requires buffer for both X and Y coordinates. */ in AgreeEcSharedSecret()
124 Algorithm alg = (params->curveType == CURVE_256) ? P256 : X25519; in AgreeEcSharedSecret()
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/frameworks/os_account_adapter/
H A Dos_account_adapter_test.cpp148 res = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN, P256, in GenerateTempKeyPair()
191 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/
H A Dcommon_standard_bind_exchange.c101 Algorithm alg = (pakeParams->baseParams.curveType == CURVE_256) ? P256 : ED25519; in GenerateKeyPairIfNotExist()
202 Algorithm alg = (pakeParams->baseParams.curveType == CURVE_256) ? P256 : ED25519; in GenerateSignInfo()
382 Algorithm alg = (pakeParams->baseParams.curveType == CURVE_256) ? P256 : ED25519; in VerifySignInfo()
417 Algorithm alg = (pakeParams->baseParams.curveType == CURVE_256) ? P256 : ED25519; in SaveAuthInfo()
/base/security/device_auth/deps_adapter/key_management_adapter/interfaces/
H A Dalg_defs.h44 P256 = 2, enumerator
/base/security/device_auth/test/unittest/deviceauth/unit_test/source/
H A Dkey_management_test.cpp136 ret = GetLoaderInstance()->agreeSharedSecretWithStorage(&privKeyParams, &pubKeyBuff, P256, P256_PUBLIC_SIZE, in HWTEST_F()
/base/security/device_auth/test/fuzztest/creds_manager/credsmanager_fuzzer/
H A Dcredsmanager_fuzzer.cpp296 res = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN, P256, in GenerateTempKeyPair()
339 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson()
556 certInfo->signAlg = P256; in GetCertInfo()
1121 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in CredsManagerTest35()
1148 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in CredsManagerTest36()
1166 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in CredsManagerTest37()
1764 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in CredsManagerTest62()
1795 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in CredsManagerTest63()
1816 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in CredsManagerTest64()
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/creds_manager/
H A Dcreds_manager_test.cpp296 res = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN, P256, in GenerateTempKeyPair()
339 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson()
571 certInfo->signAlg = P256; in GetCertInfo()
1202 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F()
1241 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F()
1263 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F()
1893 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F()
1913 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F()
1938 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F()
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/
H A Dec_speke_protocol.c225 algo = P256; in EcSpekeCalBase()
226 /* P256 requires buffer for both X and Y coordinates. */ in EcSpekeCalBase()
283 algo = P256; in EcSpekeCalEpkSelf()
284 /* P256 requires buffer for both X and Y coordinates. */ in EcSpekeCalEpkSelf()
310 /* P256 requires buffer for both X and Y coordinates. */ in CheckEpkPeerValid()
317 Algorithm algo = (params->curveType == CURVE_TYPE_256) ? P256 : X25519; in CheckEpkPeerValid()
329 Algorithm algo = (params->curveType == CURVE_TYPE_256) ? P256 : X25519; in CalP()
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/
H A Dpake_v2_auth_task_common.c84 res = params->pakeParams.loader->verify(&keyParams, &messageBuff, P256, &peerSignBuff); in VerifyPkSignPeer()
122 P256, P256_SHARED_SECRET_KEY_SIZE, &(params->pakeParams.psk)); in GenerateEcdhSharedKey()
/base/security/device_auth/services/identity_manager/src/
H A Dcert_operation.c344 &privKeyParams, &pubKeyBuff, P256, P256_SHARED_SECRET_KEY_SIZE, sharedSecret); in GetSharedSecretForAccountInPake()
405 certInfo->signAlg = P256; in GetCertInfo()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/
H A Ddas_standard_token_manager.c299 Algorithm alg = (params->baseParams.curveType == CURVE_256) ? P256 : ED25519; in ComputeAndSavePskInner()
/base/security/device_auth/test/fuzztest/devauthfunc_fuzzer/
H A Ddevauthfunc_fuzzer.cpp241 ret = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN, P256, in GenerateTempKeyPair()
280 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson()
/base/security/device_auth/services/legacy/authenticators/src/account_related/creds_manager/
H A Dasy_token_manager.c452 int32_t ret = g_algLoader->verify(&keyParams, &messageBuff, P256, &signatureBuff); in VerifyPkInfoSignature()
484 ret = ImportServerPk(osAccountId, credJson, &keyAlias, serverPk, P256); in DoImportServerPkAndVerify()
809 ret = g_algLoader->generateKeyPairWithStorage(&keyParams, SELF_ECC_KEY_LEN, P256, in DoGenerateAndExportPk()
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/
H A Dhuks_adapter.c1146 if (algo != X25519 && algo != P256) { in HashToPoint()
1150 if (algo == P256) { in HashToPoint()
1151 LOGI("Compute HashToPoint for P256"); in HashToPoint()
1241 LOGE("Huks agree P256 key: HksInit failed, res = %d", res); in AgreeSharedSecretWithStorageP256()
1247 LOGE("Huks agree P256 key: HksUpdate failed, res = %d", res); in AgreeSharedSecretWithStorageP256()
1338 LOGI("Hks agree key with storage for P256."); in AgreeSharedSecretWithStorage()
1432 LOGI("Hks agree key for P256."); in AgreeSharedSecret()

Completed in 35 milliseconds