Home
last modified time | relevance | path

Searched refs:baseParams (Results 1 - 25 of 39) sorted by relevance

12

/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/
H A Dpake_message_util.c28 (((uint32_t)params->baseParams.supportedDlPrimeMod | DL_PRIME_MOD_256) == DL_PRIME_MOD_256); in PackagePakeRequestData()
61 params->baseParams.supportedDlPrimeMod = is256ModSupported ? in ParsePakeRequestMessage()
62 (params->baseParams.supportedDlPrimeMod & DL_PRIME_MOD_256) : in ParsePakeRequestMessage()
63 (params->baseParams.supportedDlPrimeMod & DL_PRIME_MOD_384); in ParsePakeRequestMessage()
85 int32_t res = AddByteToJson(payload, FIELD_SALT, params->baseParams.salt.val, params->baseParams.salt.length); in PackagePakeResponseData()
90 res = AddByteToJson(payload, FIELD_EPK, params->baseParams.epkSelf.val, params->baseParams.epkSelf.length); in PackagePakeResponseData()
117 int res = InitSingleParam(&(params->baseParams.epkPeer), HcStrlen(epkPeerHex) / BYTE_TO_HEX_OPER_LENGTH); in GetDasEpkPeerFromJson()
122 res = HexStringToByte(epkPeerHex, params->baseParams in GetDasEpkPeerFromJson()
[all...]
H A Dpake_task_common.c69 { params->baseParams.sessionKey.val, params->baseParams.sessionKey.length, false }, in GenerateOutputKey()
71 params->baseParams.osAccountId in GenerateOutputKey()
73 int32_t res = params->baseParams.loader->computeHkdf(&keyParam, &(params->baseParams.salt), in GenerateOutputKey()
79 FreeAndCleanKey(&(params->baseParams.sessionKey)); in GenerateOutputKey()
125 int res = InitSingleParam(&(params->baseParams.psk), HcStrlen(pinString)); in FillPskWithPin()
130 if (memcpy_s(params->baseParams.psk.val, params->baseParams.psk.length, in FillPskWithPin()
133 FreeAndCleanKey(&params->baseParams in FillPskWithPin()
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/
H A Diso_task_common.c29 .keyBuff = { params->baseParams.sessionKey.val, params->baseParams.sessionKey.length, false }, in ComputeHkdfByParams()
31 .osAccountId = params->baseParams.osAccountId in ComputeHkdfByParams()
33 return params->baseParams.loader->computeHkdf(&keyParam, hkdfSaltBuf, &keyInfoBuf, returnKeyBuf); in ComputeHkdfByParams()
38 uint32_t hkdfSaltLen = params->baseParams.randPeer.length + params->baseParams.randSelf.length; in GenerateReturnKey()
45 if (memcpy_s(hkdfSalt, hkdfSaltLen, params->baseParams.randSelf.val, in GenerateReturnKey()
46 params->baseParams.randSelf.length) != EOK) { in GenerateReturnKey()
51 if (memcpy_s(hkdfSalt + params->baseParams.randSelf.length, hkdfSaltLen - params->baseParams in GenerateReturnKey()
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/
H A Dcommon_standard_bind_exchange.c93 int32_t res = pakeParams->baseParams.loader->checkKeyExist(keyAlias, pakeParams->isSelfFromUpgrade, in GenerateKeyPairIfNotExist()
94 pakeParams->baseParams.osAccountId); in GenerateKeyPairIfNotExist()
101 Algorithm alg = (pakeParams->baseParams.curveType == CURVE_256) ? P256 : ED25519; in GenerateKeyPairIfNotExist()
103 ExtraInfo exInfo = { pakeParams->baseParams.idSelf, -1, -1 }; in GenerateKeyPairIfNotExist()
104 KeyParams keyParams = { { keyAlias->val, keyAlias->length, true }, false, pakeParams->baseParams.osAccountId }; in GenerateKeyPairIfNotExist()
105 res = pakeParams->baseParams.loader->generateKeyPairWithStorage(&keyParams, PAKE_ED25519_KEY_PAIR_LEN, alg, in GenerateKeyPairIfNotExist()
127 pakeParams->baseParams.osAccountId in PackageAuthInfo()
129 res = pakeParams->baseParams.loader->exportPublicKey(&keyParams, &(exchangeParams->pubKeySelf)); in PackageAuthInfo()
137 GOTO_ERR_AND_SET_RET(AddByteToJson(authInfoJson, FIELD_AUTH_ID, pakeParams->baseParams.idSelf.val, in PackageAuthInfo()
138 pakeParams->baseParams in PackageAuthInfo()
[all...]
H A Dstandard_exchange_message_util.c98 int res = InitSingleParam(&(params->baseParams.challengeSelf), PAKE_CHALLENGE_LEN); in GenerateSelfChallenge()
103 res = params->baseParams.loader->generateRandom(&(params->baseParams.challengeSelf)); in GenerateSelfChallenge()
113 int res = InitSingleParam(&(params->baseParams.challengePeer), PAKE_CHALLENGE_LEN); in GetPeerChallenge()
119 params->baseParams.challengePeer.val, params->baseParams.challengePeer.length); in GetPeerChallenge()
H A Dstandard_server_bind_exchange_task.c42 if (params->baseParams.challengeSelf.val == NULL) { in ExchangeStart()
54 params->baseParams.challengeSelf.val, params->baseParams.challengeSelf.length) != HC_SUCCESS) { in ExchangeStart()
88 if (params->baseParams.challengePeer.val == NULL) { in ExchangeResponse()
156 FreeAndCleanKey(&(params->baseParams.sessionKey)); in Process()
H A Dstandard_client_bind_exchange_task.c53 if (params->baseParams.challengePeer.val == NULL) { in ExchangeRequest()
56 GOTO_ERR_AND_SET_RET(AddByteToJson(data, FIELD_CHALLENGE, params->baseParams.challengeSelf.val, in ExchangeRequest()
57 params->baseParams.challengeSelf.length), res); in ExchangeRequest()
144 FreeAndCleanKey(&(params->baseParams.sessionKey)); in Process()
/base/security/device_auth/test/fuzztest/authenticators/account_unrelated/pake/standardexchangetask_fuzzer/
H A Dstandardexchangetask_fuzzer.cpp69 pakeParams.baseParams.idSelf.val = authId; in StandardExchangeTaskTest003()
70 pakeParams.baseParams.idSelf.length = AUTH_ID_LENGTH; in StandardExchangeTaskTest003()
71 pakeParams.baseParams.loader = GetLoaderInstance(); in StandardExchangeTaskTest003()
93 pakeParams.baseParams.challengeSelf.val = challengeVal; in StandardExchangeTaskTest003()
94 pakeParams.baseParams.challengeSelf.length = challengeLen; in StandardExchangeTaskTest003()
101 pakeParams.baseParams.challengePeer.val = challengeVal; in StandardExchangeTaskTest003()
102 pakeParams.baseParams.challengePeer.length = challengeLen; in StandardExchangeTaskTest003()
131 pakeParams.baseParams.idSelf.val = authId; in StandardExchangeTaskTest004()
132 pakeParams.baseParams.idSelf.length = AUTH_ID_LENGTH; in StandardExchangeTaskTest004()
133 pakeParams.baseParams in StandardExchangeTaskTest004()
[all...]
/base/security/device_auth/test/unittest/deviceauth/source/
H A Dstandard_exchange_task_test.cpp77 pakeParams.baseParams.idSelf.val = authId; in HWTEST_F()
78 pakeParams.baseParams.idSelf.length = AUTH_ID_LENGTH; in HWTEST_F()
79 pakeParams.baseParams.loader = GetLoaderInstance(); in HWTEST_F()
98 pakeParams.baseParams.challengeSelf.val = challengeVal; in HWTEST_F()
99 pakeParams.baseParams.challengeSelf.length = challengeLen; in HWTEST_F()
104 pakeParams.baseParams.challengePeer.val = challengeVal; in HWTEST_F()
105 pakeParams.baseParams.challengePeer.length = challengeLen; in HWTEST_F()
129 pakeParams.baseParams.idSelf.val = authId; in HWTEST_F()
130 pakeParams.baseParams.idSelf.length = AUTH_ID_LENGTH; in HWTEST_F()
131 pakeParams.baseParams in HWTEST_F()
[all...]
H A Ddeviceauth_interface_test.cpp197 PakeBaseParams *baseParams = (PakeBaseParams *)HcMalloc(sizeof(PakeBaseParams), 0); in HWTEST_F() local
198 baseParams->loader = GetLoaderInstance(); in HWTEST_F()
199 baseParams->isClient = true; in HWTEST_F()
200 int32_t res = GenerateDlPakeParams(baseParams, nullptr); in HWTEST_F()
202 baseParams->epkPeer.length = PAKE_DL_PRIME_LEN; in HWTEST_F()
203 baseParams->supportedDlPrimeMod = DL_PRIME_MOD_384; in HWTEST_F()
204 res = GenerateDlPakeParams(baseParams, nullptr); in HWTEST_F()
206 baseParams->epkPeer.length = PAKE_DL_PRIME_SMALL_LEN; in HWTEST_F()
207 baseParams->supportedDlPrimeMod = DL_PRIME_MOD_256; in HWTEST_F()
209 baseParams in HWTEST_F()
841 IsoBaseParams *baseParams = (IsoBaseParams *)HcMalloc(sizeof(IsoBaseParams), 0); HWTEST_F() local
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/
H A Dpake_v1_client_protocol_task.c70 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.idSelf.val, in PakeRequest()
71 params->baseParams.idSelf.length); in PakeRequest()
99 res = GetByteFromJson(in, FIELD_CHALLENGE, params->baseParams.challengePeer.val, in ParseMsgForClientConfirm()
100 params->baseParams.challengePeer.length); in ParseMsgForClientConfirm()
105 PRINT_DEBUG_MSG(params->baseParams.challengePeer.val, params->baseParams.challengePeer.length, "challengePeer"); in ParseMsgForClientConfirm()
110 res = GetAndCheckAuthIdPeer(in, &(params->baseParams.idSelf), &(params->baseParams.idPeer)); in ParseMsgForClientConfirm()
138 res = AddByteToJson(payload, FIELD_CHALLENGE, params->baseParams.challengeSelf.val, in PackageMsgForClientConfirm()
139 params->baseParams in PackageMsgForClientConfirm()
[all...]
H A Dpake_v1_server_protocol_task.c59 res = AddByteToJson(payload, FIELD_CHALLENGE, params->baseParams.challengeSelf.val, in PackageMsgForResponse()
60 params->baseParams.challengeSelf.length); in PackageMsgForResponse()
69 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.idSelf.val, in PackageMsgForResponse()
70 params->baseParams.idSelf.length); in PackageMsgForResponse()
99 res = GetAndCheckAuthIdPeer(in, &(params->baseParams.idSelf), &(params->baseParams.idPeer)); in PakeResponse()
116 res = ServerResponsePakeV1Protocol(&params->baseParams); in PakeResponse()
154 if (GetByteFromJson(in, FIELD_CHALLENGE, params->baseParams.challengePeer.val, in PakeServerConfirm()
155 params->baseParams.challengePeer.length) != HC_SUCCESS) { in PakeServerConfirm()
159 PRINT_DEBUG_MSG(params->baseParams in PakeServerConfirm()
[all...]
H A Dpake_v1_protocol_task_common.c34 DestroyPakeV1BaseParams(&(params->baseParams)); in DestroyDasPakeV1Params()
144 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyTypePeer, &(params->baseParams.idPeer), in LoadPseudonymFlagIfNeed()
156 KeyParams keyParams = { { peerKeyAlias.val, peerKeyAlias.length, true }, true, params->baseParams.osAccountId }; in LoadPseudonymFlagIfNeed()
157 res = params->baseParams.loader->getKeyExtInfo(&keyParams, &extInfoBuff); in LoadPseudonymFlagIfNeed()
196 int32_t res = InitPakeV1BaseParams(osAccountId, &(params->baseParams)); in InitDasPakeV1Params()
246 int res = InitSingleParam(&(params->baseParams.psk), PAKE_PSK_LEN * BYTE_TO_HEX_OPER_LENGTH + 1); in ConvertPakeV1Psk()
252 if (ByteToHexString(srcPsk->val, srcPsk->length, (char *)params->baseParams.psk.val, in ConvertPakeV1Psk()
253 params->baseParams.psk.length) != HC_SUCCESS) { in ConvertPakeV1Psk()
257 params->baseParams.psk.length = params->baseParams in ConvertPakeV1Psk()
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_protocol_task/
H A Diso_client_protocol_task.c60 GOTO_ERR_AND_SET_RET(AddByteToJson(payload, FIELD_ISO_SALT, params->baseParams.randSelf.val, in IsoClientStartPackData()
61 params->baseParams.randSelf.length), res); in IsoClientStartPackData()
62 GOTO_ERR_AND_SET_RET(AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.authIdSelf.val, in IsoClientStartPackData()
63 params->baseParams.authIdSelf.length), res); in IsoClientStartPackData()
87 int res = IsoClientGenRandom(&params->baseParams); in IsoClientStart()
127 GOTO_ERR_AND_SET_RET(AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.authIdSelf.val, in PackDataForCalToken()
128 params->baseParams.authIdSelf.length), res); in PackDataForCalToken()
141 RETURN_IF_ERR(GetAuthIdPeerFromPayload(in, &(params->baseParams.authIdSelf), &(params->baseParams.authIdPeer))); in ParseServerStartMessage()
143 RETURN_IF_ERR(GetAndCheckAuthIdPeer(in, &(params->baseParams in ParseServerStartMessage()
[all...]
H A Diso_server_protocol_task.c59 GOTO_ERR_AND_SET_RET(AddByteToJson(payload, FIELD_ISO_SALT, params->baseParams.randSelf.val, in PackageServerStartMessage()
60 params->baseParams.randSelf.length), res); in PackageServerStartMessage()
62 GOTO_ERR_AND_SET_RET(AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.authIdSelf.val, in PackageServerStartMessage()
63 params->baseParams.authIdSelf.length), res); in PackageServerStartMessage()
90 GOTO_ERR_AND_SET_RET(GetAuthIdPeerFromPayload(in, &(params->baseParams.authIdSelf), in IsoServerStart()
91 &(params->baseParams.authIdPeer)), res); in IsoServerStart()
93 GOTO_ERR_AND_SET_RET(GetAndCheckAuthIdPeer(in, &(params->baseParams.authIdSelf), in IsoServerStart()
94 &(params->baseParams.authIdPeer)), res); in IsoServerStart()
97 GOTO_ERR_AND_SET_RET(GetByteFromJson(in, FIELD_ISO_SALT, params->baseParams.randPeer.val, in IsoServerStart()
98 params->baseParams in IsoServerStart()
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/lite_exchange_task/
H A Diso_client_bind_exchange_task.c57 { params->baseParams.sessionKey.val, params->baseParams.sessionKey.length, false }, in DecAndImportInner()
59 params->baseParams.osAccountId in DecAndImportInner()
61 res = params->baseParams.loader->aesGcmDecrypt(&keyParams, encDataBuf, &gcmParam, authCodeBuf); in DecAndImportInner()
74 ExtraInfo exInfo = { { params->baseParams.authIdPeer.val, params->baseParams.authIdPeer.length }, in DecAndImportInner()
76 KeyParams keyAliasParams = { { keyAlias.val, keyAlias.length, true }, false, params->baseParams.osAccountId }; in DecAndImportInner()
77 res = params->baseParams.loader->importSymmetricKey(&keyAliasParams, authCodeBuf, KEY_PURPOSE_MAC, &exInfo); in DecAndImportInner()
166 int res = params->baseParams.loader->generateRandom(&challengeBuf); in ClientBindAesEncrypt()
177 res = params->baseParams in ClientBindAesEncrypt()
[all...]
H A Diso_server_bind_exchange_task.c103 { params->baseParams.sessionKey.val, params->baseParams.sessionKey.length, false }, in DecryptChallenge()
105 params->baseParams.osAccountId in DecryptChallenge()
107 res = params->baseParams.loader->aesGcmDecrypt(&keyParams, &encDataBuf, &gcmParam, &challengeBuf); in DecryptChallenge()
135 ExtraInfo exInfo = { { params->baseParams.authIdPeer.val, params->baseParams.authIdPeer.length }, in ImportAuthCode()
137 KeyParams keyAliasParams = { { keyAliasBuf.val, keyAliasBuf.length, true }, false, params->baseParams.osAccountId }; in ImportAuthCode()
138 res = params->baseParams.loader->importSymmetricKey(&keyAliasParams, authCodeBuf, KEY_PURPOSE_MAC, &exInfo); in ImportAuthCode()
153 res = params->baseParams.loader->generateRandom(&authCodeBuf); in GenAndEncAuthCode()
159 res = params->baseParams in GenAndEncAuthCode()
[all...]
/base/security/device_auth/services/key_agree_sdk/src/
H A Dkey_agree_session.c30 typedef int32_t (*PackageExtraData)(const PakeBaseParams *baseParams, CJson *payload);
274 static int32_t ParsePakeServerConfirmMessage(PakeBaseParams *baseParams, const CJson *in) in ParsePakeServerConfirmMessage() argument
276 int32_t res = GetByteFromJson(in, FIELD_KCF_DATA, baseParams->kcfDataPeer.val, in ParsePakeServerConfirmMessage()
277 baseParams->kcfDataPeer.length); in ParsePakeServerConfirmMessage()
285 static int32_t PackagePakeServerConfirmData(const PakeBaseParams *baseParams, CJson *payload) in PackagePakeServerConfirmData() argument
287 int32_t res = AddByteToJson(payload, FIELD_KCF_DATA, baseParams->kcfData.val, baseParams->kcfData.length); in PackagePakeServerConfirmData()
295 static int32_t GetDasEpkPeerFromJson(PakeBaseParams *baseParams, const CJson *in) in GetDasEpkPeerFromJson() argument
302 int32_t res = InitSingleParam(&(baseParams->epkPeer), HcStrlen(epkPeerHex) / BYTE_TO_HEX_OPER_LENGTH); in GetDasEpkPeerFromJson()
307 res = HexStringToByte(epkPeerHex, baseParams in GetDasEpkPeerFromJson()
315 ParsePakeClientConfirmMessage(PakeBaseParams *baseParams, const CJson *in) ParsePakeClientConfirmMessage() argument
329 PackagePakeClientConfirmData(const PakeBaseParams *baseParams, CJson *payload) PackagePakeClientConfirmData() argument
349 ParsePakeResponseMessage(PakeBaseParams *baseParams, const CJson *in) ParsePakeResponseMessage() argument
466 PackagePakeResponseData(const PakeBaseParams *baseParams, CJson *payload) PackagePakeResponseData() argument
[all...]
/base/hiviewdfx/hiappevent/frameworks/native/libhiappevent/
H A Dhiappevent_verify.cpp176 bool CheckParamsNum(std::list<AppEventParam>& baseParams) in CheckParamsNum() argument
178 if (baseParams.size() == 0) { in CheckParamsNum()
182 auto listSize = baseParams.size(); in CheckParamsNum()
184 auto delStartPtr = baseParams.begin(); in CheckParamsNum()
186 baseParams.erase(delStartPtr, baseParams.end()); in CheckParamsNum()
409 std::list<AppEventParam>& baseParams = event->baseParams_; in VerifyAppEvent() local
411 for (auto it = baseParams.begin(); it != baseParams.end();) { in VerifyAppEvent()
413 baseParams in VerifyAppEvent()
443 std::list<AppEventParam>& baseParams = event->baseParams_; VerifyCustomEventParams() local
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/
H A Ddas_standard_token_manager.c230 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyType, &(params->baseParams.idSelf), selfKeyAlias); in GenerateSelfKeyAlias()
254 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyTypePeer, &(params->baseParams.idPeer), peerKeyAlias); in GeneratePeerKeyAlias()
273 int32_t res = GenerateKeyAlias(&packageName, &serviceType, KEY_ALIAS_PSK, &(params->baseParams.idPeer), in GenerateSharedKeyAlias()
295 params->baseParams.osAccountId in ComputeAndSavePskInner()
299 Algorithm alg = (params->baseParams.curveType == CURVE_256) ? P256 : ED25519; in ComputeAndSavePskInner()
306 .osAccountId = params->baseParams.osAccountId in ComputeAndSavePskInner()
308 res = params->baseParams.loader->exportPublicKey(&peerKeyParams, &peerPubKeyBuff); in ComputeAndSavePskInner()
317 res = params->baseParams.loader->agreeSharedSecretWithStorage(&selfKeyParams, &peerKeyBuff, alg, in ComputeAndSavePskInner()
341 res = params->baseParams.loader->checkKeyExist(&selfKeyAlias, params->isSelfFromUpgrade, in ComputeAndSavePskStd()
342 params->baseParams in ComputeAndSavePskStd()
[all...]
/base/security/device_auth/services/session_manager/inc/session/v2/auth_sub_session/protocol_lib/
H A Diso_protocol.h34 int32_t CreateIsoProtocol(const void *baseParams, bool isClient, BaseProtocol **returnObj);
H A Ddl_speke_protocol.h41 int32_t CreateDlSpekeProtocol(const void *baseParams, bool isClient, BaseProtocol **returnObj);
H A Dec_speke_protocol.h40 int32_t CreateEcSpekeProtocol(const void *baseParams, bool isClient, BaseProtocol **returnObj);
/base/security/device_auth/services/session_manager/inc/session/v2/expand_sub_session/expand_process_lib/
H A Dmk_agree.h35 BaseCmd *CreateMkAgreeCmd(const void *baseParams, bool isCaller, int32_t strategy);
H A Dsave_trusted_info.h40 BaseCmd *CreateSaveTrustedInfoCmd(const void *baseParams, bool isCaller, int32_t strategy);

Completed in 11 milliseconds

12