/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | identity_manager_test.cpp | 65 CertInfo info = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F() 75 info.signAlg = P256; in HWTEST_F() 92 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F() 124 CertInfo peerCertInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F() 141 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F() 197 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F() 204 CertInfo peerCertInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F()
|
H A D | deviceauth_func_test.cpp | 935 ret = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN, P256, in GenerateTempKeyPair() 984 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson()
|
H A D | deviceauth_standard_auth_test.cpp | 238 ret = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN, P256, in GenerateTempKeyPair() 287 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson()
|
H A D | deviceauth_standard_test.cpp | 165 ret = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN, P256, in GenerateTempKeyPair() 214 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/ |
H A D | pake_protocol_ec_common.c | 57 /* P256 requires buffer for both X and Y coordinates. */ in InitEcPakeParams() 91 Algorithm alg = (params->curveType == CURVE_256) ? P256 : X25519; in GenerateEcPakeParams() 116 /* P256 requires buffer for both X and Y coordinates. */ in AgreeEcSharedSecret() 124 Algorithm alg = (params->curveType == CURVE_256) ? P256 : X25519; in AgreeEcSharedSecret()
|
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/frameworks/os_account_adapter/ |
H A D | os_account_adapter_test.cpp | 148 res = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN, P256, in GenerateTempKeyPair() 191 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/ |
H A D | common_standard_bind_exchange.c | 101 Algorithm alg = (pakeParams->baseParams.curveType == CURVE_256) ? P256 : ED25519; in GenerateKeyPairIfNotExist() 202 Algorithm alg = (pakeParams->baseParams.curveType == CURVE_256) ? P256 : ED25519; in GenerateSignInfo() 382 Algorithm alg = (pakeParams->baseParams.curveType == CURVE_256) ? P256 : ED25519; in VerifySignInfo() 417 Algorithm alg = (pakeParams->baseParams.curveType == CURVE_256) ? P256 : ED25519; in SaveAuthInfo()
|
/base/security/device_auth/deps_adapter/key_management_adapter/interfaces/ |
H A D | alg_defs.h | 44 P256 = 2, enumerator
|
/base/security/device_auth/test/unittest/deviceauth/unit_test/source/ |
H A D | key_management_test.cpp | 136 ret = GetLoaderInstance()->agreeSharedSecretWithStorage(&privKeyParams, &pubKeyBuff, P256, P256_PUBLIC_SIZE, in HWTEST_F()
|
/base/security/device_auth/test/fuzztest/creds_manager/credsmanager_fuzzer/ |
H A D | credsmanager_fuzzer.cpp | 296 res = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN, P256, in GenerateTempKeyPair() 339 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson() 556 certInfo->signAlg = P256; in GetCertInfo() 1121 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in CredsManagerTest35() 1148 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in CredsManagerTest36() 1166 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in CredsManagerTest37() 1764 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in CredsManagerTest62() 1795 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in CredsManagerTest63() 1816 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in CredsManagerTest64()
|
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/creds_manager/ |
H A D | creds_manager_test.cpp | 296 res = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN, P256, in GenerateTempKeyPair() 339 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson() 571 certInfo->signAlg = P256; in GetCertInfo() 1202 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F() 1241 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F() 1263 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F() 1893 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F() 1913 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F() 1938 CertInfo certInfo = { { nullptr, 0 }, { nullptr, 0 }, P256 }; in HWTEST_F()
|
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
H A D | ec_speke_protocol.c | 225 algo = P256; in EcSpekeCalBase() 226 /* P256 requires buffer for both X and Y coordinates. */ in EcSpekeCalBase() 283 algo = P256; in EcSpekeCalEpkSelf() 284 /* P256 requires buffer for both X and Y coordinates. */ in EcSpekeCalEpkSelf() 310 /* P256 requires buffer for both X and Y coordinates. */ in CheckEpkPeerValid() 317 Algorithm algo = (params->curveType == CURVE_TYPE_256) ? P256 : X25519; in CheckEpkPeerValid() 329 Algorithm algo = (params->curveType == CURVE_TYPE_256) ? P256 : X25519; in CalP()
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_task_common.c | 84 res = params->pakeParams.loader->verify(&keyParams, &messageBuff, P256, &peerSignBuff); in VerifyPkSignPeer() 122 P256, P256_SHARED_SECRET_KEY_SIZE, &(params->pakeParams.psk)); in GenerateEcdhSharedKey()
|
/base/security/device_auth/services/identity_manager/src/ |
H A D | cert_operation.c | 344 &privKeyParams, &pubKeyBuff, P256, P256_SHARED_SECRET_KEY_SIZE, sharedSecret); in GetSharedSecretForAccountInPake() 405 certInfo->signAlg = P256; in GetCertInfo()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/ |
H A D | das_standard_token_manager.c | 299 Algorithm alg = (params->baseParams.curveType == CURVE_256) ? P256 : ED25519; in ComputeAndSavePskInner()
|
/base/security/device_auth/test/fuzztest/devauthfunc_fuzzer/ |
H A D | devauthfunc_fuzzer.cpp | 241 ret = GetLoaderInstance()->generateKeyPairWithStorage(&keyParams, TEST_DEV_AUTH_TEMP_KEY_PAIR_LEN, P256, in GenerateTempKeyPair() 280 ret = GetLoaderInstance()->sign(&keyAliasParams, &messageBuff, P256, &signature); in GetAsyCredentialJson()
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/creds_manager/ |
H A D | asy_token_manager.c | 452 int32_t ret = g_algLoader->verify(&keyParams, &messageBuff, P256, &signatureBuff); in VerifyPkInfoSignature() 484 ret = ImportServerPk(osAccountId, credJson, &keyAlias, serverPk, P256); in DoImportServerPkAndVerify() 809 ret = g_algLoader->generateKeyPairWithStorage(&keyParams, SELF_ECC_KEY_LEN, P256, in DoGenerateAndExportPk()
|
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/ |
H A D | huks_adapter.c | 1146 if (algo != X25519 && algo != P256) { in HashToPoint() 1150 if (algo == P256) { in HashToPoint() 1151 LOGI("Compute HashToPoint for P256"); in HashToPoint() 1241 LOGE("Huks agree P256 key: HksInit failed, res = %d", res); in AgreeSharedSecretWithStorageP256() 1247 LOGE("Huks agree P256 key: HksUpdate failed, res = %d", res); in AgreeSharedSecretWithStorageP256() 1338 LOGI("Hks agree key with storage for P256."); in AgreeSharedSecretWithStorage() 1432 LOGI("Hks agree key for P256."); in AgreeSharedSecret()
|