/base/security/access_token/services/common/screenlock_manager/src/ |
H A D | screenlock_manager_loader.cpp | 34 ScreenLockManagerAccessLoaderInterface* loader = in Destroy() local 36 if (loader != nullptr) { in Destroy() 37 delete loader; in Destroy()
|
/base/security/access_token/services/common/ability_manager/src/ |
H A D | ability_manager_access_loader.cpp | 40 AbilityManagerAccessLoaderInterface* loader = reinterpret_cast<AbilityManagerAccessLoaderInterface*>(loaderPtr); in Destroy() local 41 if (loader != nullptr) { in Destroy() 42 delete loader; in Destroy()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/ |
H A D | das_standard_token_manager.c | 35 const AlgLoader *loader = GetLoaderInstance(); in RegisterLocalIdentityStd() local 36 res = loader->checkKeyExist(&keyAliasBuff, false, params->osAccountId); in RegisterLocalIdentityStd() 44 res = loader->generateKeyPairWithStorage(&keyParams, PAKE_ED25519_KEY_PAIR_LEN, ED25519, in RegisterLocalIdentityStd() 70 const AlgLoader *loader = GetLoaderInstance(); in UnregisterLocalIdentityStd() local 71 res = loader->deleteKey(&pakeKeyAliasBuff, false, params->osAccountId); in UnregisterLocalIdentityStd() 93 res = loader->deleteKey(&pakeKeyAliasBuff, true, params->osAccountId); in UnregisterLocalIdentityStd() 116 const AlgLoader *loader = GetLoaderInstance(); in DeletePeerPubKey() local 117 res = loader->deleteKey(&pakeKeyAliasBuff, false, osAccountId); in DeletePeerPubKey() 129 res = loader->deleteKey(&pakeKeyAliasBuff, true, osAccountId); in DeletePeerPubKey() 148 const AlgLoader *loader in DeleteAuthPsk() local 386 const AlgLoader *loader = GetLoaderInstance(); GetPublicKeyStd() local [all...] |
H A D | das_lite_token_manager.c | 39 const AlgLoader *loader = GetLoaderInstance(); in UnregisterLocalIdentityLite() local 40 res = loader->deleteKey(&isoKeyAliasBuff, false, params->osAccountId); in UnregisterLocalIdentityLite() 67 const AlgLoader *loader = GetLoaderInstance(); in DeletePeerAuthInfoLite() local 68 res = loader->deleteKey(&isoKeyAliasBuff, false, params->osAccountId); in DeletePeerAuthInfoLite() 91 res = loader->deleteKey(&isoUpgradeKeyAliasBuff, true, params->osAccountId); in DeletePeerAuthInfoLite()
|
/base/security/security_guard/services/security_collector/src/ |
H A D | data_collection.cpp | 110 auto loader = eventIdToLoaderMap_.find(eventId); in StopCollectors() local 111 if (loader == eventIdToLoaderMap_.end()) { in StopCollectors() 115 ICollector* collector = loader->second.CallGetCollector(); in StopCollectors() 130 eventIdToLoaderMap_.erase(loader); in StopCollectors() 148 LibLoader loader(path); in LoadCollector() 149 ErrorCode ret = loader.LoadLib(); in LoadCollector() 156 needCloseLibMap_.emplace(eventId, loader); in LoadCollector() 158 ICollector* collector = loader.CallGetCollector(); in LoadCollector() 173 eventIdToLoaderMap_.emplace(eventId, loader); in LoadCollector() 295 LibLoader loader(pat in LoadCollector() [all...] |
/base/security/access_token/services/common/window_manager/src/ |
H A D | window_manager_loader.cpp | 85 WindowManagerLoaderInterface* loader = reinterpret_cast<WindowManagerLoaderInterface*>(loaderPtr); in Destroy() local 86 if (loader != nullptr) { in Destroy() 87 delete loader; in Destroy()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/ |
H A D | pake_protocol_ec_common.c | 36 return params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk() 38 res = params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk() 92 res = params->loader->hashToPoint(secret, alg, ¶ms->base); in GenerateEcPakeParams() 101 res = params->loader->agreeSharedSecret(&eskSelfParams, &baseBuff, alg, ¶ms->epkSelf); in GenerateEcPakeParams() 125 if (!params->loader->checkEcPublicKey(&(params->epkPeer), alg)) { in AgreeEcSharedSecret() 133 res = params->loader->agreeSharedSecret(&eskSelfParams, &epkPeerBuff, alg, sharedSecret); in AgreeEcSharedSecret()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common/ |
H A D | pake_protocol_dl_common.c | 54 int res = params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk() 141 res = params->loader->bigNumExpMod(secret, &exp, params->largePrimeNumHex, ¶ms->base); in GenerateDlPakeParams() 147 res = params->loader->bigNumExpMod(¶ms->base, &(params->eskSelf), params->largePrimeNumHex, &(params->epkSelf)); in GenerateDlPakeParams() 179 if (!params->loader->checkDlPublicKey(&(params->epkPeer), params->largePrimeNumHex)) { in AgreeDlSharedSecret() 184 res = params->loader->bigNumExpMod(&(params->epkPeer), &(params->eskSelf), params->largePrimeNumHex, sharedSecret); in AgreeDlSharedSecret()
|
/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | deviceauth_interface_test.cpp | 198 baseParams->loader = GetLoaderInstance(); in HWTEST_F() 842 baseParams->loader = GetLoaderInstance(); in HWTEST_F() 904 pakeParams->baseParams.loader = GetLoaderInstance(); in HWTEST_F() 1192 params->loader = GetLoaderInstance(); in HWTEST_F() 1213 const AlgLoader *loader = GetLoaderInstance(); in HWTEST_F() local 1214 ASSERT_NE(loader, nullptr); in HWTEST_F() 1215 int32_t res = loader->importSymmetricKey(nullptr, nullptr, KEY_PURPOSE_SIGN_VERIFY, nullptr); in HWTEST_F() 1217 bool ret = loader->checkDlPublicKey(nullptr, nullptr); in HWTEST_F() 1220 ret = loader->checkDlPublicKey(&key, nullptr); in HWTEST_F() 1225 ret = loader in HWTEST_F() 1429 const AlgLoader *loader = GetLoaderInstance(); HWTEST_F() local [all...] |
/base/msdp/device_status/rust/plugin_manager/src/ |
H A D | lib.rs | 98 Some(loader) => { in do_load_plugin() 100 loader.get::<libloading::Symbol<unsafe extern "C" fn() -> *mut dyn IPlugin>>(b"_create_plugin") in do_load_plugin() 121 error!(LOG_LABEL, "Can not instantiate loader"); in do_load_plugin() 144 if let Some(loader) = self.loaders.remove(&intention) { in unload_plugin()
|
/base/security/device_auth/services/protocol/src/iso_protocol/ |
H A D | iso_protocol_common.c | 59 params->loader = GetLoaderInstance(); in InitIsoBaseParams() 60 if (params->loader == NULL) { in InitIsoBaseParams() 130 res = params->loader->computeHmac(&keyParams, &messageBuf, outHmac); in IsoCalSelfToken() 177 res = params->loader->computeHmac(&keyParams, &messageBufSelf, selfToken); in IsoCalPeerToken() 231 res = params->loader->computeHkdf(&keyParams, &hkdfSaltBuf, &keyInfoBuf, ¶ms->sessionKey); in IsoGenSessionKey() 246 int32_t res = params->loader->generateRandom(¶ms->randSelf); in IsoClientGenRandom() 304 int res = params->loader->computeHmac(&keyParams, &hmacMessage, &outHmacBuf); in IsoClientGenSessionKey() 336 int res = params->loader->generateRandom(¶ms->randSelf); in IsoServerGenRandomAndToken() 387 res = params->loader->computeHmac(&keyParams, &messageBuf, tokenToPeer); in IsoServerGenSessionKeyAndCalToken()
|
/base/security/access_token/services/accesstokenmanager/main/cpp/src/token/ |
H A D | token_modify_notifier.cpp | 116 LibraryLoader loader(TOKEN_SYNC_LIBPATH); in NotifyTokenSyncTask() 117 TokenSyncKitInterface* tokenSyncKit = loader.GetObject<TokenSyncKitInterface>(); in NotifyTokenSyncTask() 164 LibraryLoader loader(TOKEN_SYNC_LIBPATH); in GetRemoteHapTokenInfo() 165 TokenSyncKitInterface* tokenSyncKit = loader.GetObject<TokenSyncKitInterface>(); in GetRemoteHapTokenInfo()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
H A D | pake_v1_protocol_common.c | 164 params->loader = GetLoaderInstance(); in InitPakeV1BaseParams() 165 if (params->loader == NULL) { in InitPakeV1BaseParams() 182 res = params->loader->generateRandom(&(params->salt)); in GeneratePakeParams() 190 res = params->loader->generateRandom(&(params->challengeSelf)); in GeneratePakeParams() 199 res = params->loader->computeHkdf(&keyParams, &(params->salt), &keyInfo, &secret); in GeneratePakeParams() 246 res = params->loader->computeHkdf(&keyParams, &(params->salt), &keyInfo, &unionKey); in DeriveKeyFromSharedSecret() 323 res = params->loader->computeHmac(&keyParams, &challenge, &(params->kcfData)); in GenerateProof() 356 res = params->loader->computeHmac(&keyParams, &challenge, &verifyProof); in VerifyProof()
|
/base/security/access_token/services/common/config_policy/src/ |
H A D | config_policy_loader.cpp | 190 ConfigPolicyLoaderInterface* loader = reinterpret_cast<ConfigPolicyLoaderInterface*>(loaderPtr); in Destroy() local 191 if (loader != nullptr) { in Destroy() 192 delete loader; in Destroy()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/lite_exchange_task/ |
H A D | iso_client_bind_exchange_task.c | 61 res = params->baseParams.loader->aesGcmDecrypt(&keyParams, encDataBuf, &gcmParam, authCodeBuf); in DecAndImportInner() 77 res = params->baseParams.loader->importSymmetricKey(&keyAliasParams, authCodeBuf, KEY_PURPOSE_MAC, &exInfo); in DecAndImportInner() 166 int res = params->baseParams.loader->generateRandom(&challengeBuf); in ClientBindAesEncrypt() 177 res = params->baseParams.loader->generateRandom(&nonceBuf); in ClientBindAesEncrypt() 197 res = params->baseParams.loader->aesGcmEncrypt(&keyParams, &challengeBuf, &gcmParams, &outBuf); in ClientBindAesEncrypt()
|
H A D | iso_server_bind_exchange_task.c | 107 res = params->baseParams.loader->aesGcmDecrypt(&keyParams, &encDataBuf, &gcmParam, &challengeBuf); in DecryptChallenge() 138 res = params->baseParams.loader->importSymmetricKey(&keyAliasParams, authCodeBuf, KEY_PURPOSE_MAC, &exInfo); in ImportAuthCode() 153 res = params->baseParams.loader->generateRandom(&authCodeBuf); in GenAndEncAuthCode() 159 res = params->baseParams.loader->generateRandom(nonceBuf); in GenAndEncAuthCode() 170 res = params->baseParams.loader->aesGcmEncrypt(&keyParams, &authCodeBuf, &gcmParam, encAuthCodeBuf); in GenAndEncAuthCode()
|
/base/security/device_auth/services/mk_agree/inc/ |
H A D | mk_agree_task.h | 52 const AlgLoader *loader; member
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/ |
H A D | iso_task_common.c | 33 return params->baseParams.loader->computeHkdf(&keyParam, hkdfSaltBuf, &keyInfoBuf, returnKeyBuf); in ComputeHkdfByParams() 90 int ret = params->baseParams.loader->generateRandom(&nonceBuf); in GenerateEncResult() 114 ret = params->baseParams.loader->aesGcmEncrypt(&keyParams, &plainBuf, &encryptInfo, &outBuf); in GenerateEncResult() 251 res = params->baseParams.loader->aesGcmDecrypt(&keyParams, &encResultBuf, &gcmParam, &outBuf); in CheckEncResult() 305 res = params->baseParams.loader->deleteKey(&keyAliasBuff, params->isPeerFromUpgrade, in DeleteAuthCode() 591 return params->baseParams.loader->computeHmacWithThreeStage(&keyAliasParams, seed, &pskBuf); in AuthGeneratePsk() 594 return params->baseParams.loader->computeHmac(&keyAliasParams, seed, &pskBuf); in AuthGeneratePsk() 604 int res = params->baseParams.loader->sha256(&messageBuf, &hashBuf); in AuthGeneratePskUsePin() 610 return params->baseParams.loader->computeHmac(&keyParams, seed, &pskBuf); in AuthGeneratePskUsePin() 668 int res = params->baseParams.loader in GenerateSeed() [all...] |
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
H A D | pake_v2_protocol_common.c | 158 params->loader = GetLoaderInstance();
in InitPakeV2BaseParams() 159 if (params->loader == NULL) {
in InitPakeV2BaseParams() 176 res = params->loader->generateRandom(&(params->salt));
in GeneratePakeParams() 185 res = params->loader->computeHkdf(&keyParams, &(params->salt), &keyInfo, &secret);
in GeneratePakeParams() 233 res = params->loader->sha256(&idSelfMsg, sidSelf);
in ComputeSidSelf() 265 res = params->loader->sha256(&idPeerMsg, sidPeer);
in ComputeSidPeer() 306 int result = params->loader->bigNumCompare(&sidSelf, &sidPeer);
in ComputeSid() 363 res = params->loader->sha256(&sharedSecretMsg, ¶ms->sharedSecret);
in ComputeSharedSecret() 515 res = params->loader->sha256(&proofMsg, ¶ms->kcfData);
in GenerateProof() 548 res = params->loader in VerifyProof() [all...] |
/base/security/device_auth/services/protocol/inc/pake_protocol/ |
H A D | pake_defs.h | 73 const AlgLoader *loader; member
|
/base/security/device_auth/services/protocol/inc/iso_protocol/ |
H A D | iso_protocol_common.h | 36 const AlgLoader *loader; member
|
/base/security/security_guard/test/fuzztest/security_collector/securitycollector_fuzzer/ |
H A D | security_collector_fuzzer.cpp | 84 LibLoader loader{string}; in LibLoaderFuzzTest() 85 loader.LoadLib(); in LibLoaderFuzzTest() 86 loader.CallGetCollector(); in LibLoaderFuzzTest() 87 loader.UnLoadLib(); in LibLoaderFuzzTest()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_protocol_task_common.c | 157 res = params->baseParams.loader->getKeyExtInfo(&keyParams, &extInfoBuff); in LoadPseudonymFlagIfNeed() 288 res = params->baseParams.loader->generateRandom(&(params->nonce)); in FillPskWithDerivedKeyHex() 304 if (params->baseParams.loader->checkKeyExist(&pskAlias, isDeStorage, params->baseParams.osAccountId) != in FillPskWithDerivedKeyHex() 318 res = params->baseParams.loader->computeHkdf(&keyParams, &(params->nonce), &keyInfo, &pskByte); in FillPskWithDerivedKeyHex() 402 res = params->baseParams.loader->getKeyExtInfo(&keyParams, &extInfoBuff); in LoadPseudonymExtInfoIfNeed() 477 if (params->baseParams.loader->checkKeyExist(&pskAliasBuff, true, params->baseParams.osAccountId) == HC_SUCCESS) { in GeneratePseudonymPskIfNotExist() 484 res = params->baseParams.loader->computePseudonymPsk(&keyParams, &pskAliasBuff, NULL, &outKeyBuff); in GeneratePseudonymPskIfNotExist() 564 res = params->baseParams.loader->generateRandom(pseudonymChlgBuff); in GenerateSelfPseudonymChlgAndId() 583 res = params->baseParams.loader->computeHmacWithThreeStage(&pskAliasParams, pseudonymChlgBuff, pseudonymIdBuff); in GenerateSelfPseudonymChlgAndId() 630 res = params->baseParams.loader in AddPseudonymIdAndChallenge() [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/ |
H A D | common_standard_bind_exchange.c | 93 int32_t res = pakeParams->baseParams.loader->checkKeyExist(keyAlias, pakeParams->isSelfFromUpgrade, in GenerateKeyPairIfNotExist() 105 res = pakeParams->baseParams.loader->generateKeyPairWithStorage(&keyParams, PAKE_ED25519_KEY_PAIR_LEN, alg, in GenerateKeyPairIfNotExist() 129 res = pakeParams->baseParams.loader->exportPublicKey(&keyParams, &(exchangeParams->pubKeySelf)); in PackageAuthInfo() 208 res = pakeParams->baseParams.loader->sign(&keyAliasParams, &msgInfo, alg, signInfo); in GenerateSignInfo() 248 res = pakeParams->baseParams.loader->generateRandom(&(exchangeParams->nonce)); in EncryptAuthAndSignInfo() 265 res = pakeParams->baseParams.loader->aesGcmEncrypt(&keyParams, &exchangeInfo, &encryptInfo, in EncryptAuthAndSignInfo() 299 int32_t res = pakeParams->baseParams.loader->aesGcmDecrypt(&keyParams, &(exchangeParams->exInfoCipher), in DecryptAuthAndSignInfo() 388 res = pakeParams->baseParams.loader->verify(&keyParams, &verifyMsg, alg, signInfo); in VerifySignInfo() 420 res = pakeParams->baseParams.loader->importPublicKey(&keyParams, &(exchangeParams->pubKeyPeer), alg, &exInfo); in SaveAuthInfo()
|
/base/security/device_auth/test/fuzztest/authenticators/account_unrelated/pake/standardexchangetask_fuzzer/ |
H A D | standardexchangetask_fuzzer.cpp | 71 pakeParams.baseParams.loader = GetLoaderInstance(); in StandardExchangeTaskTest003() 133 pakeParams.baseParams.loader = GetLoaderInstance(); in StandardExchangeTaskTest004()
|