/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_message_util.c | 28 (((uint32_t)params->baseParams.supportedDlPrimeMod | DL_PRIME_MOD_256) == DL_PRIME_MOD_256); in PackagePakeRequestData() 61 params->baseParams.supportedDlPrimeMod = is256ModSupported ? in ParsePakeRequestMessage() 62 (params->baseParams.supportedDlPrimeMod & DL_PRIME_MOD_256) : in ParsePakeRequestMessage() 63 (params->baseParams.supportedDlPrimeMod & DL_PRIME_MOD_384); in ParsePakeRequestMessage() 85 int32_t res = AddByteToJson(payload, FIELD_SALT, params->baseParams.salt.val, params->baseParams.salt.length); in PackagePakeResponseData() 90 res = AddByteToJson(payload, FIELD_EPK, params->baseParams.epkSelf.val, params->baseParams.epkSelf.length); in PackagePakeResponseData() 117 int res = InitSingleParam(&(params->baseParams.epkPeer), HcStrlen(epkPeerHex) / BYTE_TO_HEX_OPER_LENGTH); in GetDasEpkPeerFromJson() 122 res = HexStringToByte(epkPeerHex, params->baseParams in GetDasEpkPeerFromJson() [all...] |
H A D | pake_task_common.c | 69 { params->baseParams.sessionKey.val, params->baseParams.sessionKey.length, false }, in GenerateOutputKey() 71 params->baseParams.osAccountId in GenerateOutputKey() 73 int32_t res = params->baseParams.loader->computeHkdf(&keyParam, &(params->baseParams.salt), in GenerateOutputKey() 79 FreeAndCleanKey(&(params->baseParams.sessionKey)); in GenerateOutputKey() 125 int res = InitSingleParam(&(params->baseParams.psk), HcStrlen(pinString)); in FillPskWithPin() 130 if (memcpy_s(params->baseParams.psk.val, params->baseParams.psk.length, in FillPskWithPin() 133 FreeAndCleanKey(¶ms->baseParams in FillPskWithPin() [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/ |
H A D | iso_task_common.c | 29 .keyBuff = { params->baseParams.sessionKey.val, params->baseParams.sessionKey.length, false }, in ComputeHkdfByParams() 31 .osAccountId = params->baseParams.osAccountId in ComputeHkdfByParams() 33 return params->baseParams.loader->computeHkdf(&keyParam, hkdfSaltBuf, &keyInfoBuf, returnKeyBuf); in ComputeHkdfByParams() 38 uint32_t hkdfSaltLen = params->baseParams.randPeer.length + params->baseParams.randSelf.length; in GenerateReturnKey() 45 if (memcpy_s(hkdfSalt, hkdfSaltLen, params->baseParams.randSelf.val, in GenerateReturnKey() 46 params->baseParams.randSelf.length) != EOK) { in GenerateReturnKey() 51 if (memcpy_s(hkdfSalt + params->baseParams.randSelf.length, hkdfSaltLen - params->baseParams in GenerateReturnKey() [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/ |
H A D | common_standard_bind_exchange.c | 93 int32_t res = pakeParams->baseParams.loader->checkKeyExist(keyAlias, pakeParams->isSelfFromUpgrade, in GenerateKeyPairIfNotExist() 94 pakeParams->baseParams.osAccountId); in GenerateKeyPairIfNotExist() 101 Algorithm alg = (pakeParams->baseParams.curveType == CURVE_256) ? P256 : ED25519; in GenerateKeyPairIfNotExist() 103 ExtraInfo exInfo = { pakeParams->baseParams.idSelf, -1, -1 }; in GenerateKeyPairIfNotExist() 104 KeyParams keyParams = { { keyAlias->val, keyAlias->length, true }, false, pakeParams->baseParams.osAccountId }; in GenerateKeyPairIfNotExist() 105 res = pakeParams->baseParams.loader->generateKeyPairWithStorage(&keyParams, PAKE_ED25519_KEY_PAIR_LEN, alg, in GenerateKeyPairIfNotExist() 127 pakeParams->baseParams.osAccountId in PackageAuthInfo() 129 res = pakeParams->baseParams.loader->exportPublicKey(&keyParams, &(exchangeParams->pubKeySelf)); in PackageAuthInfo() 137 GOTO_ERR_AND_SET_RET(AddByteToJson(authInfoJson, FIELD_AUTH_ID, pakeParams->baseParams.idSelf.val, in PackageAuthInfo() 138 pakeParams->baseParams in PackageAuthInfo() [all...] |
H A D | standard_exchange_message_util.c | 98 int res = InitSingleParam(&(params->baseParams.challengeSelf), PAKE_CHALLENGE_LEN); in GenerateSelfChallenge() 103 res = params->baseParams.loader->generateRandom(&(params->baseParams.challengeSelf)); in GenerateSelfChallenge() 113 int res = InitSingleParam(&(params->baseParams.challengePeer), PAKE_CHALLENGE_LEN); in GetPeerChallenge() 119 params->baseParams.challengePeer.val, params->baseParams.challengePeer.length); in GetPeerChallenge()
|
H A D | standard_server_bind_exchange_task.c | 42 if (params->baseParams.challengeSelf.val == NULL) { in ExchangeStart() 54 params->baseParams.challengeSelf.val, params->baseParams.challengeSelf.length) != HC_SUCCESS) { in ExchangeStart() 88 if (params->baseParams.challengePeer.val == NULL) { in ExchangeResponse() 156 FreeAndCleanKey(&(params->baseParams.sessionKey)); in Process()
|
H A D | standard_client_bind_exchange_task.c | 53 if (params->baseParams.challengePeer.val == NULL) { in ExchangeRequest() 56 GOTO_ERR_AND_SET_RET(AddByteToJson(data, FIELD_CHALLENGE, params->baseParams.challengeSelf.val, in ExchangeRequest() 57 params->baseParams.challengeSelf.length), res); in ExchangeRequest() 144 FreeAndCleanKey(&(params->baseParams.sessionKey)); in Process()
|
/base/security/device_auth/test/fuzztest/authenticators/account_unrelated/pake/standardexchangetask_fuzzer/ |
H A D | standardexchangetask_fuzzer.cpp | 69 pakeParams.baseParams.idSelf.val = authId; in StandardExchangeTaskTest003() 70 pakeParams.baseParams.idSelf.length = AUTH_ID_LENGTH; in StandardExchangeTaskTest003() 71 pakeParams.baseParams.loader = GetLoaderInstance(); in StandardExchangeTaskTest003() 93 pakeParams.baseParams.challengeSelf.val = challengeVal; in StandardExchangeTaskTest003() 94 pakeParams.baseParams.challengeSelf.length = challengeLen; in StandardExchangeTaskTest003() 101 pakeParams.baseParams.challengePeer.val = challengeVal; in StandardExchangeTaskTest003() 102 pakeParams.baseParams.challengePeer.length = challengeLen; in StandardExchangeTaskTest003() 131 pakeParams.baseParams.idSelf.val = authId; in StandardExchangeTaskTest004() 132 pakeParams.baseParams.idSelf.length = AUTH_ID_LENGTH; in StandardExchangeTaskTest004() 133 pakeParams.baseParams in StandardExchangeTaskTest004() [all...] |
/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | standard_exchange_task_test.cpp | 77 pakeParams.baseParams.idSelf.val = authId; in HWTEST_F() 78 pakeParams.baseParams.idSelf.length = AUTH_ID_LENGTH; in HWTEST_F() 79 pakeParams.baseParams.loader = GetLoaderInstance(); in HWTEST_F() 98 pakeParams.baseParams.challengeSelf.val = challengeVal; in HWTEST_F() 99 pakeParams.baseParams.challengeSelf.length = challengeLen; in HWTEST_F() 104 pakeParams.baseParams.challengePeer.val = challengeVal; in HWTEST_F() 105 pakeParams.baseParams.challengePeer.length = challengeLen; in HWTEST_F() 129 pakeParams.baseParams.idSelf.val = authId; in HWTEST_F() 130 pakeParams.baseParams.idSelf.length = AUTH_ID_LENGTH; in HWTEST_F() 131 pakeParams.baseParams in HWTEST_F() [all...] |
H A D | deviceauth_interface_test.cpp | 197 PakeBaseParams *baseParams = (PakeBaseParams *)HcMalloc(sizeof(PakeBaseParams), 0); in HWTEST_F() local 198 baseParams->loader = GetLoaderInstance(); in HWTEST_F() 199 baseParams->isClient = true; in HWTEST_F() 200 int32_t res = GenerateDlPakeParams(baseParams, nullptr); in HWTEST_F() 202 baseParams->epkPeer.length = PAKE_DL_PRIME_LEN; in HWTEST_F() 203 baseParams->supportedDlPrimeMod = DL_PRIME_MOD_384; in HWTEST_F() 204 res = GenerateDlPakeParams(baseParams, nullptr); in HWTEST_F() 206 baseParams->epkPeer.length = PAKE_DL_PRIME_SMALL_LEN; in HWTEST_F() 207 baseParams->supportedDlPrimeMod = DL_PRIME_MOD_256; in HWTEST_F() 209 baseParams in HWTEST_F() 841 IsoBaseParams *baseParams = (IsoBaseParams *)HcMalloc(sizeof(IsoBaseParams), 0); HWTEST_F() local [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_client_protocol_task.c | 70 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.idSelf.val, in PakeRequest() 71 params->baseParams.idSelf.length); in PakeRequest() 99 res = GetByteFromJson(in, FIELD_CHALLENGE, params->baseParams.challengePeer.val, in ParseMsgForClientConfirm() 100 params->baseParams.challengePeer.length); in ParseMsgForClientConfirm() 105 PRINT_DEBUG_MSG(params->baseParams.challengePeer.val, params->baseParams.challengePeer.length, "challengePeer"); in ParseMsgForClientConfirm() 110 res = GetAndCheckAuthIdPeer(in, &(params->baseParams.idSelf), &(params->baseParams.idPeer)); in ParseMsgForClientConfirm() 138 res = AddByteToJson(payload, FIELD_CHALLENGE, params->baseParams.challengeSelf.val, in PackageMsgForClientConfirm() 139 params->baseParams in PackageMsgForClientConfirm() [all...] |
H A D | pake_v1_server_protocol_task.c | 59 res = AddByteToJson(payload, FIELD_CHALLENGE, params->baseParams.challengeSelf.val, in PackageMsgForResponse() 60 params->baseParams.challengeSelf.length); in PackageMsgForResponse() 69 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.idSelf.val, in PackageMsgForResponse() 70 params->baseParams.idSelf.length); in PackageMsgForResponse() 99 res = GetAndCheckAuthIdPeer(in, &(params->baseParams.idSelf), &(params->baseParams.idPeer)); in PakeResponse() 116 res = ServerResponsePakeV1Protocol(¶ms->baseParams); in PakeResponse() 154 if (GetByteFromJson(in, FIELD_CHALLENGE, params->baseParams.challengePeer.val, in PakeServerConfirm() 155 params->baseParams.challengePeer.length) != HC_SUCCESS) { in PakeServerConfirm() 159 PRINT_DEBUG_MSG(params->baseParams in PakeServerConfirm() [all...] |
H A D | pake_v1_protocol_task_common.c | 34 DestroyPakeV1BaseParams(&(params->baseParams)); in DestroyDasPakeV1Params() 144 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyTypePeer, &(params->baseParams.idPeer), in LoadPseudonymFlagIfNeed() 156 KeyParams keyParams = { { peerKeyAlias.val, peerKeyAlias.length, true }, true, params->baseParams.osAccountId }; in LoadPseudonymFlagIfNeed() 157 res = params->baseParams.loader->getKeyExtInfo(&keyParams, &extInfoBuff); in LoadPseudonymFlagIfNeed() 196 int32_t res = InitPakeV1BaseParams(osAccountId, &(params->baseParams)); in InitDasPakeV1Params() 246 int res = InitSingleParam(&(params->baseParams.psk), PAKE_PSK_LEN * BYTE_TO_HEX_OPER_LENGTH + 1); in ConvertPakeV1Psk() 252 if (ByteToHexString(srcPsk->val, srcPsk->length, (char *)params->baseParams.psk.val, in ConvertPakeV1Psk() 253 params->baseParams.psk.length) != HC_SUCCESS) { in ConvertPakeV1Psk() 257 params->baseParams.psk.length = params->baseParams in ConvertPakeV1Psk() [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_protocol_task/ |
H A D | iso_client_protocol_task.c | 60 GOTO_ERR_AND_SET_RET(AddByteToJson(payload, FIELD_ISO_SALT, params->baseParams.randSelf.val, in IsoClientStartPackData() 61 params->baseParams.randSelf.length), res); in IsoClientStartPackData() 62 GOTO_ERR_AND_SET_RET(AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.authIdSelf.val, in IsoClientStartPackData() 63 params->baseParams.authIdSelf.length), res); in IsoClientStartPackData() 87 int res = IsoClientGenRandom(¶ms->baseParams); in IsoClientStart() 127 GOTO_ERR_AND_SET_RET(AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.authIdSelf.val, in PackDataForCalToken() 128 params->baseParams.authIdSelf.length), res); in PackDataForCalToken() 141 RETURN_IF_ERR(GetAuthIdPeerFromPayload(in, &(params->baseParams.authIdSelf), &(params->baseParams.authIdPeer))); in ParseServerStartMessage() 143 RETURN_IF_ERR(GetAndCheckAuthIdPeer(in, &(params->baseParams in ParseServerStartMessage() [all...] |
H A D | iso_server_protocol_task.c | 59 GOTO_ERR_AND_SET_RET(AddByteToJson(payload, FIELD_ISO_SALT, params->baseParams.randSelf.val, in PackageServerStartMessage() 60 params->baseParams.randSelf.length), res); in PackageServerStartMessage() 62 GOTO_ERR_AND_SET_RET(AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.authIdSelf.val, in PackageServerStartMessage() 63 params->baseParams.authIdSelf.length), res); in PackageServerStartMessage() 90 GOTO_ERR_AND_SET_RET(GetAuthIdPeerFromPayload(in, &(params->baseParams.authIdSelf), in IsoServerStart() 91 &(params->baseParams.authIdPeer)), res); in IsoServerStart() 93 GOTO_ERR_AND_SET_RET(GetAndCheckAuthIdPeer(in, &(params->baseParams.authIdSelf), in IsoServerStart() 94 &(params->baseParams.authIdPeer)), res); in IsoServerStart() 97 GOTO_ERR_AND_SET_RET(GetByteFromJson(in, FIELD_ISO_SALT, params->baseParams.randPeer.val, in IsoServerStart() 98 params->baseParams in IsoServerStart() [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/lite_exchange_task/ |
H A D | iso_client_bind_exchange_task.c | 57 { params->baseParams.sessionKey.val, params->baseParams.sessionKey.length, false }, in DecAndImportInner() 59 params->baseParams.osAccountId in DecAndImportInner() 61 res = params->baseParams.loader->aesGcmDecrypt(&keyParams, encDataBuf, &gcmParam, authCodeBuf); in DecAndImportInner() 74 ExtraInfo exInfo = { { params->baseParams.authIdPeer.val, params->baseParams.authIdPeer.length }, in DecAndImportInner() 76 KeyParams keyAliasParams = { { keyAlias.val, keyAlias.length, true }, false, params->baseParams.osAccountId }; in DecAndImportInner() 77 res = params->baseParams.loader->importSymmetricKey(&keyAliasParams, authCodeBuf, KEY_PURPOSE_MAC, &exInfo); in DecAndImportInner() 166 int res = params->baseParams.loader->generateRandom(&challengeBuf); in ClientBindAesEncrypt() 177 res = params->baseParams in ClientBindAesEncrypt() [all...] |
H A D | iso_server_bind_exchange_task.c | 103 { params->baseParams.sessionKey.val, params->baseParams.sessionKey.length, false }, in DecryptChallenge() 105 params->baseParams.osAccountId in DecryptChallenge() 107 res = params->baseParams.loader->aesGcmDecrypt(&keyParams, &encDataBuf, &gcmParam, &challengeBuf); in DecryptChallenge() 135 ExtraInfo exInfo = { { params->baseParams.authIdPeer.val, params->baseParams.authIdPeer.length }, in ImportAuthCode() 137 KeyParams keyAliasParams = { { keyAliasBuf.val, keyAliasBuf.length, true }, false, params->baseParams.osAccountId }; in ImportAuthCode() 138 res = params->baseParams.loader->importSymmetricKey(&keyAliasParams, authCodeBuf, KEY_PURPOSE_MAC, &exInfo); in ImportAuthCode() 153 res = params->baseParams.loader->generateRandom(&authCodeBuf); in GenAndEncAuthCode() 159 res = params->baseParams in GenAndEncAuthCode() [all...] |
/base/security/device_auth/services/key_agree_sdk/src/ |
H A D | key_agree_session.c | 30 typedef int32_t (*PackageExtraData)(const PakeBaseParams *baseParams, CJson *payload); 274 static int32_t ParsePakeServerConfirmMessage(PakeBaseParams *baseParams, const CJson *in) in ParsePakeServerConfirmMessage() argument 276 int32_t res = GetByteFromJson(in, FIELD_KCF_DATA, baseParams->kcfDataPeer.val, in ParsePakeServerConfirmMessage() 277 baseParams->kcfDataPeer.length); in ParsePakeServerConfirmMessage() 285 static int32_t PackagePakeServerConfirmData(const PakeBaseParams *baseParams, CJson *payload) in PackagePakeServerConfirmData() argument 287 int32_t res = AddByteToJson(payload, FIELD_KCF_DATA, baseParams->kcfData.val, baseParams->kcfData.length); in PackagePakeServerConfirmData() 295 static int32_t GetDasEpkPeerFromJson(PakeBaseParams *baseParams, const CJson *in) in GetDasEpkPeerFromJson() argument 302 int32_t res = InitSingleParam(&(baseParams->epkPeer), HcStrlen(epkPeerHex) / BYTE_TO_HEX_OPER_LENGTH); in GetDasEpkPeerFromJson() 307 res = HexStringToByte(epkPeerHex, baseParams in GetDasEpkPeerFromJson() 315 ParsePakeClientConfirmMessage(PakeBaseParams *baseParams, const CJson *in) ParsePakeClientConfirmMessage() argument 329 PackagePakeClientConfirmData(const PakeBaseParams *baseParams, CJson *payload) PackagePakeClientConfirmData() argument 349 ParsePakeResponseMessage(PakeBaseParams *baseParams, const CJson *in) ParsePakeResponseMessage() argument 466 PackagePakeResponseData(const PakeBaseParams *baseParams, CJson *payload) PackagePakeResponseData() argument [all...] |
/base/hiviewdfx/hiappevent/frameworks/native/libhiappevent/ |
H A D | hiappevent_verify.cpp | 176 bool CheckParamsNum(std::list<AppEventParam>& baseParams)
in CheckParamsNum() argument 178 if (baseParams.size() == 0) {
in CheckParamsNum() 182 auto listSize = baseParams.size();
in CheckParamsNum() 184 auto delStartPtr = baseParams.begin();
in CheckParamsNum() 186 baseParams.erase(delStartPtr, baseParams.end());
in CheckParamsNum() 409 std::list<AppEventParam>& baseParams = event->baseParams_;
in VerifyAppEvent() local 411 for (auto it = baseParams.begin(); it != baseParams.end();) {
in VerifyAppEvent() 413 baseParams in VerifyAppEvent() 443 std::list<AppEventParam>& baseParams = event->baseParams_; VerifyCustomEventParams() local [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/ |
H A D | das_standard_token_manager.c | 230 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyType, &(params->baseParams.idSelf), selfKeyAlias); in GenerateSelfKeyAlias() 254 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyTypePeer, &(params->baseParams.idPeer), peerKeyAlias); in GeneratePeerKeyAlias() 273 int32_t res = GenerateKeyAlias(&packageName, &serviceType, KEY_ALIAS_PSK, &(params->baseParams.idPeer), in GenerateSharedKeyAlias() 295 params->baseParams.osAccountId in ComputeAndSavePskInner() 299 Algorithm alg = (params->baseParams.curveType == CURVE_256) ? P256 : ED25519; in ComputeAndSavePskInner() 306 .osAccountId = params->baseParams.osAccountId in ComputeAndSavePskInner() 308 res = params->baseParams.loader->exportPublicKey(&peerKeyParams, &peerPubKeyBuff); in ComputeAndSavePskInner() 317 res = params->baseParams.loader->agreeSharedSecretWithStorage(&selfKeyParams, &peerKeyBuff, alg, in ComputeAndSavePskInner() 341 res = params->baseParams.loader->checkKeyExist(&selfKeyAlias, params->isSelfFromUpgrade, in ComputeAndSavePskStd() 342 params->baseParams in ComputeAndSavePskStd() [all...] |
/base/security/device_auth/services/session_manager/inc/session/v2/auth_sub_session/protocol_lib/ |
H A D | iso_protocol.h | 34 int32_t CreateIsoProtocol(const void *baseParams, bool isClient, BaseProtocol **returnObj);
|
H A D | dl_speke_protocol.h | 41 int32_t CreateDlSpekeProtocol(const void *baseParams, bool isClient, BaseProtocol **returnObj);
|
H A D | ec_speke_protocol.h | 40 int32_t CreateEcSpekeProtocol(const void *baseParams, bool isClient, BaseProtocol **returnObj);
|
/base/security/device_auth/services/session_manager/inc/session/v2/expand_sub_session/expand_process_lib/ |
H A D | mk_agree.h | 35 BaseCmd *CreateMkAgreeCmd(const void *baseParams, bool isCaller, int32_t strategy);
|
H A D | save_trusted_info.h | 40 BaseCmd *CreateSaveTrustedInfoCmd(const void *baseParams, bool isCaller, int32_t strategy);
|