Home
last modified time | relevance | path

Searched refs:params (Results 1 - 25 of 678) sorted by relevance

12345678910>>...28

/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/
H A Dpake_v1_protocol_common.c29 void DestroyPakeV1BaseParams(PakeBaseParams *params) in DestroyPakeV1BaseParams() argument
31 if (params == NULL) { in DestroyPakeV1BaseParams()
35 CleanPakeSensitiveKeys(params); in DestroyPakeV1BaseParams()
37 HcFree(params->salt.val); in DestroyPakeV1BaseParams()
38 params->salt.val = NULL; in DestroyPakeV1BaseParams()
40 HcFree(params->challengeSelf.val); in DestroyPakeV1BaseParams()
41 params->challengeSelf.val = NULL; in DestroyPakeV1BaseParams()
43 HcFree(params->challengePeer.val); in DestroyPakeV1BaseParams()
44 params->challengePeer.val = NULL; in DestroyPakeV1BaseParams()
46 HcFree(params in DestroyPakeV1BaseParams()
68 AllocDefaultParams(PakeBaseParams *params) AllocDefaultParams() argument
121 FillDefaultValue(PakeBaseParams *params) FillDefaultValue() argument
149 InitPakeV1BaseParams(int32_t osAccountId, PakeBaseParams *params) InitPakeV1BaseParams() argument
176 GeneratePakeParams(PakeBaseParams *params) GeneratePakeParams() argument
228 DeriveKeyFromSharedSecret(PakeBaseParams *params) DeriveKeyFromSharedSecret() argument
271 GenerateSessionKey(PakeBaseParams *params) GenerateSessionKey() argument
303 GenerateProof(PakeBaseParams *params) GenerateProof() argument
335 VerifyProof(PakeBaseParams *params) VerifyProof() argument
374 ClientConfirmPakeV1Protocol(PakeBaseParams *params) ClientConfirmPakeV1Protocol() argument
403 ClientVerifyConfirmPakeV1Protocol(PakeBaseParams *params) ClientVerifyConfirmPakeV1Protocol() argument
417 ServerResponsePakeV1Protocol(PakeBaseParams *params) ServerResponsePakeV1Protocol() argument
431 ServerConfirmPakeV1Protocol(PakeBaseParams *params) ServerConfirmPakeV1Protocol() argument
[all...]
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common/
H A Dpake_protocol_dl_common.c52 static int32_t GenerateEsk(PakeBaseParams *params) in GenerateEsk() argument
54 int res = params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk()
61 static int FillDlKeysLenAccordingToEpkPeer(PakeBaseParams *params) in FillDlKeysLenAccordingToEpkPeer() argument
63 if ((params->epkPeer.length == PAKE_DL_PRIME_LEN) && in FillDlKeysLenAccordingToEpkPeer()
64 (((uint32_t)params->supportedDlPrimeMod & DL_PRIME_MOD_384) != 0)) { in FillDlKeysLenAccordingToEpkPeer()
65 params->eskSelf.length = PAKE_DL_ESK_LEN; in FillDlKeysLenAccordingToEpkPeer()
66 params->innerKeyLen = PAKE_DL_PRIME_LEN; in FillDlKeysLenAccordingToEpkPeer()
69 if ((params->epkPeer.length == PAKE_DL_PRIME_SMALL_LEN) && in FillDlKeysLenAccordingToEpkPeer()
70 (((uint32_t)params in FillDlKeysLenAccordingToEpkPeer()
79 FillDlKeysLenAccordingToMod(PakeBaseParams *params) FillDlKeysLenAccordingToMod() argument
95 InitDlPakeParams(PakeBaseParams *params) InitDlPakeParams() argument
125 GenerateDlPakeParams(PakeBaseParams *params, const Uint8Buff *secret) GenerateDlPakeParams() argument
158 IsEpkPeerLenInvalid(PakeBaseParams *params) IsEpkPeerLenInvalid() argument
172 AgreeDlSharedSecret(PakeBaseParams *params, Uint8Buff *sharedSecret) AgreeDlSharedSecret() argument
[all...]
/base/security/device_auth/services/protocol/src/iso_protocol/
H A Diso_protocol_common.c24 int32_t InitIsoBaseParams(const CJson *in, IsoBaseParams *params) in InitIsoBaseParams() argument
26 if (in == NULL || params == NULL) { in InitIsoBaseParams()
30 if (GetIntFromJson(in, FIELD_OS_ACCOUNT_ID, &params->osAccountId) != HC_SUCCESS) { in InitIsoBaseParams()
36 params->randSelf.length = RAND_BYTE_LEN; in InitIsoBaseParams()
37 params->randSelf.val = (uint8_t *)HcMalloc(params->randSelf.length, 0); in InitIsoBaseParams()
38 if (params->randSelf.val == NULL) { in InitIsoBaseParams()
43 params->randPeer.length = RAND_BYTE_LEN; in InitIsoBaseParams()
44 params->randPeer.val = (uint8_t *)HcMalloc(params in InitIsoBaseParams()
71 DestroyIsoBaseParams(IsoBaseParams *params) DestroyIsoBaseParams() argument
93 IsoCalSelfToken(const IsoBaseParams *params, Uint8Buff *outHmac) IsoCalSelfToken() argument
140 IsoCalPeerToken(const IsoBaseParams *params, Uint8Buff *selfToken) IsoCalPeerToken() argument
187 IsoCombineHkdfSalt(IsoBaseParams *params, Uint8Buff *hkdfSaltBuf, bool isClient) IsoCombineHkdfSalt() argument
213 IsoGenSessionKey(IsoBaseParams *params, Uint8Buff *pskBuf, bool isClient) IsoGenSessionKey() argument
240 IsoClientGenRandom(IsoBaseParams *params) IsoClientGenRandom() argument
254 IsoClientCheckAndGenToken(IsoBaseParams *params, const Uint8Buff *peerToken, Uint8Buff *selfToken) IsoClientCheckAndGenToken() argument
287 IsoClientGenSessionKey(IsoBaseParams *params, int returnResult, const uint8_t *hmac, uint32_t hmacLen) IsoClientGenSessionKey() argument
325 IsoServerGenRandomAndToken(IsoBaseParams *params, Uint8Buff *selfTokenBuf) IsoServerGenRandomAndToken() argument
350 IsoServerGenSessionKeyAndCalToken(IsoBaseParams *params, const Uint8Buff *tokenFromPeer, Uint8Buff *tokenToPeer) IsoServerGenSessionKeyAndCalToken() argument
[all...]
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/
H A Dpake_protocol_ec_common.c32 static int32_t GenerateEsk(PakeBaseParams *params) in GenerateEsk() argument
35 if (params->curveType == CURVE_256) { in GenerateEsk()
36 return params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk()
37 } else if (params->curveType == CURVE_25519) { in GenerateEsk()
38 res = params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk()
43 params->eskSelf.val[PAKE_EC_KEY_LEN - 1] &= PAKE_PRIVATE_KEY_AND_MASK_HIGH; in GenerateEsk()
44 params->eskSelf.val[0] &= PAKE_PRIVATE_KEY_AND_MASK_LOW; in GenerateEsk()
45 params in GenerateEsk()
53 InitEcPakeParams(PakeBaseParams *params) InitEcPakeParams() argument
77 GenerateEcPakeParams(PakeBaseParams *params, Uint8Buff *secret) GenerateEcPakeParams() argument
113 AgreeEcSharedSecret(PakeBaseParams *params, Uint8Buff *sharedSecret) AgreeEcSharedSecret() argument
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/
H A Dpake_v2_auth_task_common.c56 int32_t VerifyPkSignPeer(const PakeAuthParams *params) in VerifyPkSignPeer() argument
68 int32_t res = GetAccountAuthTokenManager()->generateKeyAlias((const char *)(params->userIdSelf), in VerifyPkSignPeer()
69 (const char *)params->devIdSelf.val, &serverPkAliasBuff, true); in VerifyPkSignPeer()
76 .val = params->pkInfoPeer.val, in VerifyPkSignPeer()
77 .length = params->pkInfoPeer.length in VerifyPkSignPeer()
80 .val = params->pkInfoSignPeer.val, in VerifyPkSignPeer()
81 .length = params->pkInfoSignPeer.length in VerifyPkSignPeer()
83 KeyParams keyParams = { { serverPkAliasBuff.val, serverPkAliasBuff.length, true }, false, params->osAccountId }; in VerifyPkSignPeer()
84 res = params->pakeParams.loader->verify(&keyParams, &messageBuff, P256, &peerSignBuff); in VerifyPkSignPeer()
93 int32_t GenerateEcdhSharedKey(PakeAuthParams *params) in GenerateEcdhSharedKey() argument
140 ExtractPakePeerId(PakeAuthParams *params, const CJson *in) ExtractPakePeerId() argument
159 ExtractPakeSelfId(PakeAuthParams *params) ExtractPakeSelfId() argument
179 ExtractSelfDeviceId(PakeAuthParams *params, const CJson *in, bool useSelfPrefix) ExtractSelfDeviceId() argument
209 ExtractPeerDeviceId(PakeAuthParams *params, const CJson *in) ExtractPeerDeviceId() argument
238 ExtractSelfDevId(PakeAuthParams *params, const CJson *in) ExtractSelfDevId() argument
263 GetPeerPkFromPkInfo(PakeAuthParams *params, const char *pkInfoStr) GetPeerPkFromPkInfo() argument
295 ExtractPeerDevId(PakeAuthParams *params, const CJson *in) ExtractPeerDevId() argument
319 GetPkInfoPeer(PakeAuthParams *params, const CJson *in) GetPkInfoPeer() argument
350 GetAsyPubKeyInfo(PakeAuthParams *params) GetAsyPubKeyInfo() argument
393 FillUserIdForAuth(const CJson *in, PakeAuthParams *params) FillUserIdForAuth() argument
408 InitPakeAuthParams(const CJson *in, PakeAuthParams *params, const AccountVersionInfo *verInfo) InitPakeAuthParams() argument
449 DestroyPakeAuthParams(PakeAuthParams *params) DestroyPakeAuthParams() argument
[all...]
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
H A Dpake_v2_protocol_common.c33 void DestroyPakeV2BaseParams(PakeBaseParams *params) in DestroyPakeV2BaseParams() argument
35 if (params == NULL) { in DestroyPakeV2BaseParams()
39 CleanPakeSensitiveKeys(params); in DestroyPakeV2BaseParams()
41 HcFree(params->salt.val); in DestroyPakeV2BaseParams()
42 params->salt.val = NULL; in DestroyPakeV2BaseParams()
44 HcFree(params->challengeSelf.val); in DestroyPakeV2BaseParams()
45 params->challengeSelf.val = NULL; in DestroyPakeV2BaseParams()
47 HcFree(params->challengePeer.val); in DestroyPakeV2BaseParams()
48 params->challengePeer.val = NULL; in DestroyPakeV2BaseParams()
50 HcFree(params in DestroyPakeV2BaseParams()
72 AllocDefaultParams(PakeBaseParams *params) AllocDefaultParams() argument
111 FillDefaultValue(PakeBaseParams *params) FillDefaultValue() argument
143 InitPakeV2BaseParams(int32_t osAccountId, PakeBaseParams *params) InitPakeV2BaseParams() argument
170 GeneratePakeParams(PakeBaseParams *params) GeneratePakeParams() argument
211 ComputeSidSelf(const PakeBaseParams *params, Uint8Buff *sidSelf) ComputeSidSelf() argument
243 ComputeSidPeer(const PakeBaseParams *params, Uint8Buff *sidPeer) ComputeSidPeer() argument
275 ComputeSid(const PakeBaseParams *params, Uint8Buff *sid) ComputeSid() argument
331 ComputeSharedSecret(PakeBaseParams *params, const Uint8Buff *sid, const Uint8Buff *tmpSharedSecret) ComputeSharedSecret() argument
381 GenerateSharedSecret(PakeBaseParams *params) GenerateSharedSecret() argument
449 CombineProofMsg(const PakeBaseParams *params, Uint8Buff *proofMsg, bool isVerify) CombineProofMsg() argument
498 GenerateProof(PakeBaseParams *params) GenerateProof() argument
528 VerifyProof(PakeBaseParams *params) VerifyProof() argument
566 GenerateSessionKey(PakeBaseParams *params) GenerateSessionKey() argument
584 ClientConfirmPakeV2Protocol(PakeBaseParams *params) ClientConfirmPakeV2Protocol() argument
611 ClientVerifyConfirmPakeV2Protocol(PakeBaseParams *params) ClientVerifyConfirmPakeV2Protocol() argument
634 ServerResponsePakeV2Protocol(PakeBaseParams *params) ServerResponsePakeV2Protocol() argument
648 ServerConfirmPakeV2Protocol(PakeBaseParams *params) ServerConfirmPakeV2Protocol() argument
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/
H A Dpake_task_common.c22 int32_t ConstructOutJson(const PakeParams *params, CJson *out) in ConstructOutJson() argument
41 if (params->opCode == AUTHENTICATE) { in ConstructOutJson()
65 static int32_t GenerateOutputKey(PakeParams *params) in GenerateOutputKey() argument
69 { params->baseParams.sessionKey.val, params->baseParams.sessionKey.length, false }, in GenerateOutputKey()
71 params->baseParams.osAccountId in GenerateOutputKey()
73 int32_t res = params->baseParams.loader->computeHkdf(&keyParam, &(params->baseParams.salt), in GenerateOutputKey()
74 &keyInfo, &(params->returnKey)); in GenerateOutputKey()
77 FreeAndCleanKey(&(params in GenerateOutputKey()
83 SendResultToSelf(PakeParams *params, CJson *out) SendResultToSelf() argument
113 FillPskWithPin(PakeParams *params, const CJson *in) FillPskWithPin() argument
140 FillAuthId(PakeParams *params, const CJson *in) FillAuthId() argument
190 FillUserType(PakeParams *params, const CJson *in) FillUserType() argument
204 FillPkgNameAndServiceType(PakeParams *params, const CJson *in) FillPkgNameAndServiceType() argument
239 FillNonce(PakeParams *params) FillNonce() argument
255 FillDasPakeParams(PakeParams *params, const CJson *in) FillDasPakeParams() argument
[all...]
H A Dpake_message_util.c24 int32_t PackagePakeRequestData(const PakeParams *params, CJson *payload) in PackagePakeRequestData() argument
28 (((uint32_t)params->baseParams.supportedDlPrimeMod | DL_PRIME_MOD_256) == DL_PRIME_MOD_256); in PackagePakeRequestData()
33 if (AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode) != HC_SUCCESS) { in PackagePakeRequestData()
37 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PackagePakeRequestData()
38 if (AddStringToJson(payload, FIELD_PKG_NAME, params->packageName) != HC_SUCCESS) { in PackagePakeRequestData()
42 if (AddStringToJson(payload, FIELD_SERVICE_TYPE, params->serviceType) != HC_SUCCESS) { in PackagePakeRequestData()
46 if (AddIntToJson(payload, FIELD_PEER_USER_TYPE, params->userType) != HC_SUCCESS) { in PackagePakeRequestData()
54 int32_t ParsePakeRequestMessage(PakeParams *params, const CJson *in) in ParsePakeRequestMessage() argument
61 params in ParsePakeRequestMessage()
83 PackagePakeResponseData(const PakeParams *params, CJson *payload) PackagePakeResponseData() argument
110 GetDasEpkPeerFromJson(PakeParams *params, const CJson *in) GetDasEpkPeerFromJson() argument
131 ParsePakeResponseMessage(PakeParams *params, const CJson *in) ParsePakeResponseMessage() argument
154 PackagePakeClientConfirmData(const PakeParams *params, CJson *payload) PackagePakeClientConfirmData() argument
170 ParsePakeClientConfirmMessage(PakeParams *params, const CJson *in) ParsePakeClientConfirmMessage() argument
187 PackagePakeServerConfirmData(const PakeParams *params, CJson *payload) PackagePakeServerConfirmData() argument
198 ParsePakeServerConfirmMessage(PakeParams *params, const CJson *in) ParsePakeServerConfirmMessage() argument
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/iso_auth_task/
H A Diso_auth_task_common.c46 static int32_t FillUserId(const CJson *in, IsoAuthParams *params) in FillUserId() argument
48 params->userIdSelf = (char *)HcMalloc(DEV_AUTH_USER_ID_SIZE, 0); in FillUserId()
49 if (params->userIdSelf == NULL) { in FillUserId()
53 params->userIdPeer = (char *)HcMalloc(DEV_AUTH_USER_ID_SIZE, 0); in FillUserId()
54 if (params->userIdPeer == NULL) { in FillUserId()
64 if (strcpy_s(params->userIdSelf, DEV_AUTH_USER_ID_SIZE, userIdSelf) != EOK) { in FillUserId()
71 static int32_t FillPayload(const CJson *in, IsoAuthParams *params) in FillPayload() argument
73 int32_t res = InitSingleParam(&params->devIdSelf, DEV_AUTH_DEVICE_ID_SIZE); in FillPayload()
83 if (memcpy_s(params->devIdSelf.val, params in FillPayload()
122 SetChallenge(IsoAuthParams *params) SetChallenge() argument
142 GenerateAuthTokenForAccessory(const IsoAuthParams *params, Uint8Buff *outKey) GenerateAuthTokenForAccessory() argument
170 GenerateTokenAliasForController(const IsoAuthParams *params, Uint8Buff *authTokenAlias) GenerateTokenAliasForController() argument
187 AccountAuthGeneratePsk(IsoAuthParams *params) AccountAuthGeneratePsk() argument
219 InitIsoAuthParams(const CJson *in, IsoAuthParams *params, const AccountVersionInfo *verInfo) InitIsoAuthParams() argument
263 DestroyIsoAuthParams(IsoAuthParams *params) DestroyIsoAuthParams() argument
293 GetPayloadValue(IsoAuthParams *params, const CJson *in) GetPayloadValue() argument
330 ExtractPeerAuthId(IsoAuthParams *params, const CJson *in) ExtractPeerAuthId() argument
350 ExtractAndVerifyPayload(IsoAuthParams *params, const CJson *in) ExtractAndVerifyPayload() argument
389 AuthIsoSendFinalToOut(IsoAuthParams *params, CJson *out) AuthIsoSendFinalToOut() argument
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/
H A Diso_task_common.c25 static int32_t ComputeHkdfByParams(const IsoParams *params, const Uint8Buff *hkdfSaltBuf, Uint8Buff *returnKeyBuf) in ComputeHkdfByParams() argument
29 .keyBuff = { params->baseParams.sessionKey.val, params->baseParams.sessionKey.length, false }, in ComputeHkdfByParams()
31 .osAccountId = params->baseParams.osAccountId in ComputeHkdfByParams()
33 return params->baseParams.loader->computeHkdf(&keyParam, hkdfSaltBuf, &keyInfoBuf, returnKeyBuf); in ComputeHkdfByParams()
36 static int GenerateReturnKey(IsoParams *params, uint8_t *returnKey, uint32_t returnKeyLen) in GenerateReturnKey() argument
38 uint32_t hkdfSaltLen = params->baseParams.randPeer.length + params->baseParams.randSelf.length; in GenerateReturnKey()
44 if (params->isClient) { in GenerateReturnKey()
45 if (memcpy_s(hkdfSalt, hkdfSaltLen, params in GenerateReturnKey()
84 GenerateEncResult(const IsoParams *params, int message, CJson *sendToPeer, const char *aad) GenerateEncResult() argument
135 SendResultToFinalSelf(IsoParams *params, CJson *out, bool isNeedReturnKey) SendResultToFinalSelf() argument
171 GenEncResult(IsoParams *params, int message, CJson *out, const char *aad, bool isNeedReturnKey) GenEncResult() argument
219 CheckEncResult(IsoParams *params, const CJson *in, const char *aad) CheckEncResult() argument
262 GenerateKeyAliasForIso(const IsoParams *params, Uint8Buff *keyAliasBuff) GenerateKeyAliasForIso() argument
289 DeleteAuthCode(const IsoParams *params) DeleteAuthCode() argument
312 DestroyIsoParams(IsoParams *params) DestroyIsoParams() argument
340 FillAuthId(IsoParams *params, const CJson *in) FillAuthId() argument
394 FillPkgNameAndServiceType(IsoParams *params, const CJson *in) FillPkgNameAndServiceType() argument
440 FillPin(IsoParams *params, const CJson *in) FillPin() argument
472 AllocSeed(IsoParams *params) AllocSeed() argument
483 GetUserType(IsoParams *params, const CJson *in) GetUserType() argument
500 GetUpgradeFlagAndKeyLength(IsoParams *params, const CJson *in) GetUpgradeFlagAndKeyLength() argument
519 InitIsoParams(IsoParams *params, const CJson *in) InitIsoParams() argument
571 AuthGeneratePsk(const Uint8Buff *seed, IsoParams *params) AuthGeneratePsk() argument
598 AuthGeneratePskUsePin(const Uint8Buff *seed, IsoParams *params, const char *pinString) AuthGeneratePskUsePin() argument
613 GenerateKeyAliasInIso(const IsoParams *params, uint8_t *keyAlias, uint32_t keyAliasLen, bool useOpposite) GenerateKeyAliasInIso() argument
633 GeneratePsk(const CJson *in, IsoParams *params) GeneratePsk() argument
660 GenerateSeed(IsoParams *params) GenerateSeed() argument
[all...]
/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/
H A Dsave_trusted_info.c68 CmdParams params; member
101 QueryGroupParams params = InitQueryGroupParams(); in GetGroupEntryById() local
102 params.groupId = groupId; in GetGroupEntryById()
103 if (QueryGroups(osAccountId, &params, &groupEntryVec) != HC_SUCCESS) { in GetGroupEntryById()
119 static int32_t CheckGroupValidity(const CmdParams *params) in CheckGroupValidity() argument
122 (void)params; in CheckGroupValidity()
125 if (params->isBind) { in CheckGroupValidity()
128 TrustedGroupEntry *entry = GetGroupEntryById(params->osAccountId, params->groupId); in CheckGroupValidity()
138 static int32_t ClientSendTrustedInfoProcEvent(CmdParams *params) in ClientSendTrustedInfoProcEvent() argument
175 ClientSendTrustedInfoBuildEvent(const CmdParams *params, CJson **outputEvent) ClientSendTrustedInfoBuildEvent() argument
220 ServerSendTrustedInfoParseEvent(const CJson *inputEvent, CmdParams *params) ServerSendTrustedInfoParseEvent() argument
266 GenerateGroupParams(const CmdParams *params, TrustedGroupEntry *groupParams) GenerateGroupParams() argument
293 GeneratePeerDevParams(const CmdParams *params, TrustedDeviceEntry *devParams) GeneratePeerDevParams() argument
321 GenerateSelfDevParams(const CmdParams *params, TrustedDeviceEntry *devParams) GenerateSelfDevParams() argument
345 AddTrustedGroup(const CmdParams *params) AddTrustedGroup() argument
365 IsAcrossAccount(const CmdParams *params) IsAcrossAccount() argument
378 AddPeerTrustedDevice(const CmdParams *params) AddPeerTrustedDevice() argument
406 AddSelfTrustedDevice(const CmdParams *params) AddSelfTrustedDevice() argument
426 CreatePeerToPeerGroup(const CmdParams *params) CreatePeerToPeerGroup() argument
438 QueryDeviceParams params = InitQueryDeviceParams(); GetTrustedDeviceEntryById() local
457 IsDeviceImportedByCloud(const CmdParams *params) IsDeviceImportedByCloud() argument
469 ServerSendTrustedInfoProcEvent(CmdParams *params) ServerSendTrustedInfoProcEvent() argument
520 ServerSendTrustedInfoBuildEvent(const CmdParams *params, CJson **outputEvent) ServerSendTrustedInfoBuildEvent() argument
565 ClientFinishProcParseEvent(const CJson *inputEvent, CmdParams *params) ClientFinishProcParseEvent() argument
612 ClientFinishProcProcEvent(const CmdParams *params) ClientFinishProcProcEvent() argument
807 IsSaveTrustedInfoParamsValid(const SaveTrustedInfoParams *params) IsSaveTrustedInfoParamsValid() argument
812 InitSaveTrustedInfoCmd(SaveTrustedInfoCmd *instance, const SaveTrustedInfoParams *params, bool isCaller, int32_t strategy) InitSaveTrustedInfoCmd() argument
849 const SaveTrustedInfoParams *params = (const SaveTrustedInfoParams *)baseParams; CreateSaveTrustedInfoCmd() local
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/
H A Dpake_v1_client_protocol_task.c42 static int PakeRequest(AsyBaseCurTask *task, PakeParams *params, CJson *out, int *status) in PakeRequest() argument
50 int res = ConstructOutJson(params, out); in PakeRequest()
60 res = PackagePakeRequestData(params, payload); in PakeRequest()
66 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PakeRequest()
67 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in PakeRequest()
68 res = AddPseudonymIdAndChallenge(params, payload); in PakeRequest()
70 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.idSelf.val, in PakeRequest()
71 params in PakeRequest()
91 ParseMsgForClientConfirm(PakeParams *params, const CJson *in) ParseMsgForClientConfirm() argument
120 PackageMsgForClientConfirm(PakeParams *params, CJson *out) PackageMsgForClientConfirm() argument
147 PakeClientConfirm(AsyBaseCurTask *task, PakeParams *params, const CJson *in, CJson *out, int *status) PakeClientConfirm() argument
191 PakeClientVerifyConfirm(AsyBaseCurTask *task, PakeParams *params, const CJson *in, int *status) PakeClientVerifyConfirm() argument
222 Process(struct AsyBaseCurTaskT *task, PakeParams *params, const CJson *in, CJson *out, int *status) Process() argument
[all...]
H A Dpake_v1_server_protocol_task.c41 static int PackageMsgForResponse(PakeParams *params, CJson *out) in PackageMsgForResponse() argument
43 int res = ConstructOutJson(params, out); in PackageMsgForResponse()
53 res = PackagePakeResponseData(params, payload); in PackageMsgForResponse()
59 res = AddByteToJson(payload, FIELD_CHALLENGE, params->baseParams.challengeSelf.val, in PackageMsgForResponse()
60 params->baseParams.challengeSelf.length); in PackageMsgForResponse()
65 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PackageMsgForResponse()
66 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in PackageMsgForResponse()
67 res = AddPseudonymIdAndChallenge(params, payloa in PackageMsgForResponse()
80 PakeResponse(AsyBaseCurTask *task, PakeParams *params, const CJson *in, CJson *out, int *status) PakeResponse() argument
134 PakeServerConfirm(AsyBaseCurTask *task, PakeParams *params, const CJson *in, CJson *out, int *status) PakeServerConfirm() argument
190 Process(struct AsyBaseCurTaskT *task, PakeParams *params, const CJson *in, CJson *out, int *status) Process() argument
[all...]
H A Dpake_v1_protocol_task_common.c28 void DestroyDasPakeV1Params(PakeParams *params) in DestroyDasPakeV1Params() argument
30 if (params == NULL) { in DestroyDasPakeV1Params()
34 DestroyPakeV1BaseParams(&(params->baseParams)); in DestroyDasPakeV1Params()
36 if (params->returnKey.val != NULL) { in DestroyDasPakeV1Params()
37 (void)memset_s(params->returnKey.val, params->returnKey.length, 0, params->returnKey.length); in DestroyDasPakeV1Params()
38 HcFree(params->returnKey.val); in DestroyDasPakeV1Params()
39 params->returnKey.val = NULL; in DestroyDasPakeV1Params()
42 if (params in DestroyDasPakeV1Params()
67 AllocReturnKey(PakeParams *params, const CJson *in) AllocReturnKey() argument
137 LoadPseudonymFlagIfNeed(PakeParams *params) LoadPseudonymFlagIfNeed() argument
189 InitDasPakeV1Params(PakeParams *params, const CJson *in) InitDasPakeV1Params() argument
244 ConvertPakeV1Psk(const Uint8Buff *srcPsk, PakeParams *params) ConvertPakeV1Psk() argument
264 GeneratePskAlias(const PakeParams *params, Uint8Buff *pskKeyAlias) GeneratePskAlias() argument
284 FillPskWithDerivedKeyHex(PakeParams *params) FillPskWithDerivedKeyHex() argument
381 LoadPseudonymExtInfoIfNeed(PakeParams *params) LoadPseudonymExtInfoIfNeed() argument
448 GeneratePseudonymPskIfNotExist(const PakeParams *params) GeneratePseudonymPskIfNotExist() argument
557 GenerateSelfPseudonymChlgAndId(const PakeParams *params, Uint8Buff *pseudonymChlgBuff, Uint8Buff *pseudonymIdBuff) GenerateSelfPseudonymChlgAndId() argument
590 GetSelfPseudonymChlgAndIdByExtInfo(const PakeParams *params, Uint8Buff *pseudonymChallengeBuff, Uint8Buff *pseudonymIdBuff) GetSelfPseudonymChlgAndIdByExtInfo() argument
607 AddPseudonymIdAndChallenge(PakeParams *params, CJson *payload) AddPseudonymIdAndChallenge() argument
654 CheckPseudonymIdByCompute(const PakeParams *params, const Uint8Buff *peerPseudonymChallengeBuff, const Uint8Buff *peerPseudonymIdBuff, bool *isEqual) CheckPseudonymIdByCompute() argument
688 GetPeerChallenge(const CJson *payload, Uint8Buff *peerPseudonymChallengeBuff, PakeParams *params) GetPeerChallenge() argument
709 CheckPseudonymId(PakeParams *params, const CJson *in) CheckPseudonymId() argument
751 GeneratePseudonymPskExtInfo(const PakeParams *params, const Uint8Buff *selfNextPseudonymIdBuff, const Uint8Buff *peerNextPseudonymIdBuff, Uint8Buff *extInfoBuff) GeneratePseudonymPskExtInfo() argument
788 SaveExtInfoToPseudonymPsk(const PakeParams *params, const Uint8Buff *extInfoStrBuff, const Uint8Buff *pskAliasBuff) SaveExtInfoToPseudonymPsk() argument
817 SaveNextPseudonymIdAndChallenge(PakeParams *params) SaveNextPseudonymIdAndChallenge() argument
[all...]
/base/hiviewdfx/hiview/interfaces/js/napi/src/
H A Dhiview_napi_adapter.cpp30 void HiviewNapiAdapter::Copy(napi_env env, HiviewFileParams* params) in Copy() argument
35 FileOperationCompleteCallback, reinterpret_cast<void*>(params), &params->asyncWork); in Copy()
36 napi_queue_async_work_with_qos(env, params->asyncWork, napi_qos_default); in Copy()
41 HiviewFileParams* params = reinterpret_cast<HiviewFileParams*>(data); in CopyFileExecution() local
42 params->result = HiviewServiceAgent::GetInstance().Copy(params->logType, params->logName, params->destDir); in CopyFileExecution()
45 void HiviewNapiAdapter::Move(napi_env env, HiviewFileParams* params) in Move() argument
56 HiviewFileParams* params = reinterpret_cast<HiviewFileParams*>(data); MoveFileExecution() local
62 HiviewFileParams* params = reinterpret_cast<HiviewFileParams*>(data); FileOperationCompleteCallback() local
[all...]
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/
H A Ddl_speke_protocol.c95 DlSpekeParams params; member
106 static int32_t DlSpekeClientStartReqBuildEvent(const DlSpekeParams *params, CJson **outputData) in DlSpekeClientStartReqBuildEvent() argument
118 if (AddByteToJson(json, FIELD_AUTH_ID_CLIENT, params->authIdSelf.val, in DlSpekeClientStartReqBuildEvent()
119 params->authIdSelf.length) != HC_SUCCESS) { in DlSpekeClientStartReqBuildEvent()
124 bool isOnly256ModSupported = (((uint32_t)params->primeMod | DL_SPEKE_PRIME_MOD_256) == DL_SPEKE_PRIME_MOD_256); in DlSpekeClientStartReqBuildEvent()
134 static int32_t GetAuthIdPeerFromInput(const CJson *inputData, DlSpekeParams *params, bool isClient) in GetAuthIdPeerFromInput() argument
147 if (InitUint8Buff(&params->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
151 if (HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
158 static int32_t GetSaltFromInput(const CJson *inputData, DlSpekeParams *params) in GetSaltFromInput() argument
171 GetEpkPeerFromInput(const CJson *inputData, DlSpekeParams *params, bool isClient) GetEpkPeerFromInput() argument
190 GetKcfDataPeerFromInput(const CJson *inputData, DlSpekeParams *params, bool isClient) GetKcfDataPeerFromInput() argument
210 SetSelfKeyLenByMod(const CJson *inputData, DlSpekeParams *params) SetSelfKeyLenByMod() argument
233 DlSpekeServerStartRspParseEvent(const CJson *inputData, DlSpekeParams *params) DlSpekeServerStartRspParseEvent() argument
242 CalSalt(DlSpekeParams *params) CalSalt() argument
256 CalSecret(DlSpekeParams *params, Uint8Buff *secret) CalSecret() argument
269 SetSelfKeyLenByEpkPeerAndMod(DlSpekeParams *params) SetSelfKeyLenByEpkPeerAndMod() argument
287 DlSpekeCalBase(DlSpekeParams *params, Uint8Buff *secret) DlSpekeCalBase() argument
304 DlSpekeCalEskSelf(DlSpekeParams *params) DlSpekeCalEskSelf() argument
317 DlSpekeCalEpkSelf(DlSpekeParams *params) DlSpekeCalEpkSelf() argument
331 IsEpkPeerLenValid(DlSpekeParams *params) IsEpkPeerLenValid() argument
345 CheckEpkPeerValid(DlSpekeParams *params) CheckEpkPeerValid() argument
357 CalTmpSharedSecret(DlSpekeParams *params, Uint8Buff *tmpSharedSecret) CalTmpSharedSecret() argument
367 CalSidSelf(DlSpekeParams *params, Uint8Buff *sidSelf) CalSidSelf() argument
395 CalSidPeer(DlSpekeParams *params, Uint8Buff *sidPeer) CalSidPeer() argument
423 CalSid(DlSpekeParams *params, Uint8Buff *sid) CalSid() argument
454 CombineSharedSecretMsg(DlSpekeParams *params, const Uint8Buff *tmpSharedSecret, const Uint8Buff *sid, Uint8Buff *sharedSecretMsg) CombineSharedSecretMsg() argument
478 GenerateSharedSecretMsg(DlSpekeParams *params, Uint8Buff *sharedSecretMsg) GenerateSharedSecretMsg() argument
504 CalSharedSecret(DlSpekeParams *params) CalSharedSecret() argument
554 DlSpekeParams *params = &impl->params; GenerateKcfDataMsg() local
694 DlSpekeServerStartRspBuildEvent(const DlSpekeParams *params, CJson **outputData) DlSpekeServerStartRspBuildEvent() argument
739 DlSpekeClientFinishReqParseEvent(const CJson *inputData, DlSpekeParams *params) DlSpekeClientFinishReqParseEvent() argument
784 DlSpekeClientFinishReqBuildEvent(DlSpekeParams *params, CJson **outputData) DlSpekeClientFinishReqBuildEvent() argument
828 DlSpekeServerFinishRspParseEvent(const CJson *inputData, DlSpekeParams *params) DlSpekeServerFinishRspParseEvent() argument
858 DlSpekeServerFinishRspBuildEvent(DlSpekeParams *params, CJson **outputData) DlSpekeServerFinishRspBuildEvent() argument
893 DlSpekeClientFinishParseEvent(const CJson *inputData, DlSpekeParams *params) DlSpekeClientFinishParseEvent() argument
1107 BuildDlSpekeProtocolObj(const DlSpekeInitParams *params, bool isClient, DlSpekeProtocol *instance) BuildDlSpekeProtocolObj() argument
1136 const DlSpekeInitParams *params = (const DlSpekeInitParams *)baseParams; CreateDlSpekeProtocol() local
[all...]
H A Dec_speke_protocol.c74 EcSpekeParams params; member
85 static int32_t EcSpekeClientStartReqBuildEvent(const EcSpekeParams *params, CJson **outputEvent) in EcSpekeClientStartReqBuildEvent() argument
97 if (AddByteToJson(json, FIELD_AUTH_ID_CLIENT, params->authIdSelf.val, in EcSpekeClientStartReqBuildEvent()
98 params->authIdSelf.length) != HC_SUCCESS) { in EcSpekeClientStartReqBuildEvent()
107 static int32_t GetAuthIdPeerFromInput(const CJson *inputEvent, EcSpekeParams *params, bool isClient) in GetAuthIdPeerFromInput() argument
120 if (InitUint8Buff(&params->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
124 if (HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
131 static int32_t GetSaltFromInput(const CJson *inputEvent, EcSpekeParams *params) in GetSaltFromInput() argument
133 if (InitUint8Buff(&params in GetSaltFromInput()
145 GetEpkPeerFromInput(const CJson *inputEvent, EcSpekeParams *params, bool isClient) GetEpkPeerFromInput() argument
165 GetKcfDataPeerFromInput(const CJson *inputEvent, EcSpekeParams *params, bool isClient) GetKcfDataPeerFromInput() argument
186 EcSpekeServerStartRspParseEvent(const CJson *inputEvent, EcSpekeParams *params) EcSpekeServerStartRspParseEvent() argument
191 CalSalt(EcSpekeParams *params) CalSalt() argument
206 CalSecret(EcSpekeParams *params, Uint8Buff *secret) CalSecret() argument
220 EcSpekeCalBase(EcSpekeParams *params, Uint8Buff *secret) EcSpekeCalBase() argument
248 EcSpekeCalEskSelf(EcSpekeParams *params) EcSpekeCalEskSelf() argument
278 EcSpekeCalEpkSelf(EcSpekeParams *params) EcSpekeCalEpkSelf() argument
308 CheckEpkPeerValid(EcSpekeParams *params) CheckEpkPeerValid() argument
325 CalP(EcSpekeParams *params, Uint8Buff *p) CalP() argument
339 CalSidSelf(EcSpekeParams *params, Uint8Buff *sidSelf) CalSidSelf() argument
367 CalSidPeer(EcSpekeParams *params, Uint8Buff *sidPeer) CalSidPeer() argument
395 CalSid(EcSpekeParams *params, Uint8Buff *sid) CalSid() argument
449 GenerateSharedSecretMsg(EcSpekeParams *params, Uint8Buff *sharedSecretMsg) GenerateSharedSecretMsg() argument
488 CalSharedSecret(EcSpekeParams *params) CalSharedSecret() argument
540 EcSpekeParams *params = &impl->params; GenerateKcfDataMsg() local
693 EcSpekeServerStartRspBuildEvent(const EcSpekeParams *params, CJson **outputEvent) EcSpekeServerStartRspBuildEvent() argument
738 EcSpekeClientFinishReqParseEvent(const CJson *inputEvent, EcSpekeParams *params) EcSpekeClientFinishReqParseEvent() argument
783 EcSpekeClientFinishReqBuildEvent(EcSpekeParams *params, CJson **outputEvent) EcSpekeClientFinishReqBuildEvent() argument
823 EcSpekeServerFinishRspParseEvent(const CJson *inputEvent, EcSpekeParams *params) EcSpekeServerFinishRspParseEvent() argument
853 EcSpekeServerFinishRspBuildEvent(EcSpekeParams *params, CJson **outputEvent) EcSpekeServerFinishRspBuildEvent() argument
888 EcSpekeClientFinishParseEvent(const CJson *inputEvent, EcSpekeParams *params) EcSpekeClientFinishParseEvent() argument
1105 BuildEcSpekeProtocolObj(const EcSpekeInitParams *params, bool isClient, EcSpekeProtocol *instance) BuildEcSpekeProtocolObj() argument
1134 const EcSpekeInitParams *params = (const EcSpekeInitParams *)baseParams; CreateEcSpekeProtocol() local
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/
H A Ddas_standard_token_manager.c21 static int32_t RegisterLocalIdentityStd(const TokenManagerParams *params) in RegisterLocalIdentityStd() argument
23 Uint8Buff pkgNameBuff = { params->pkgName.val, params->pkgName.length }; in RegisterLocalIdentityStd()
24 Uint8Buff serviceTypeBuff = { params->serviceType.val, params->serviceType.length }; in RegisterLocalIdentityStd()
25 KeyAliasType keyType = (KeyAliasType)params->userType; in RegisterLocalIdentityStd()
28 Uint8Buff authIdBuff = { params->authId.val, params->authId.length }; in RegisterLocalIdentityStd()
36 res = loader->checkKeyExist(&keyAliasBuff, false, params->osAccountId); in RegisterLocalIdentityStd()
43 KeyParams keyParams = { { keyAliasBuff.val, keyAliasBuff.length, true }, false, params in RegisterLocalIdentityStd()
54 UnregisterLocalIdentityStd(const TokenManagerParams *params) UnregisterLocalIdentityStd() argument
197 DeletePeerAuthInfoStd(const TokenManagerParams *params) DeletePeerAuthInfoStd() argument
221 GenerateSelfKeyAlias(const PakeParams *params, Uint8Buff *selfKeyAlias) GenerateSelfKeyAlias() argument
245 GeneratePeerKeyAlias(const PakeParams *params, Uint8Buff *peerKeyAlias) GeneratePeerKeyAlias() argument
269 GenerateSharedKeyAlias(const PakeParams *params, Uint8Buff *sharedKeyAlias) GenerateSharedKeyAlias() argument
289 ComputeAndSavePskInner(const PakeParams *params, const Uint8Buff *selfKeyAlias, const Uint8Buff *peerKeyAlias, Uint8Buff *sharedKeyAlias) ComputeAndSavePskInner() argument
325 ComputeAndSavePskStd(const PakeParams *params) ComputeAndSavePskStd() argument
371 GetPublicKeyStd(const TokenManagerParams *params, Uint8Buff *returnPk) GetPublicKeyStd() argument
[all...]
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/kdf/src/
H A Dpbkdf2_openssl.c101 static bool CheckPBKDF2Params(HcfPBKDF2ParamsSpec *params) in CheckPBKDF2Params() argument
103 if (params->iterations < 1) { in CheckPBKDF2Params()
108 if (params->output.len > INT_MAX || params->salt.len > INT_MAX || params->password.len > INT_MAX) { in CheckPBKDF2Params()
112 // when params password == nullptr, the size will be set 0 by openssl; in CheckPBKDF2Params()
113 if (params->output.data == NULL || params->output.len == 0) { in CheckPBKDF2Params()
117 if (params->salt.data == NULL && params in CheckPBKDF2Params()
127 GetPBKDF2PasswordFromSpec(HcfKdfData *data, HcfPBKDF2ParamsSpec *params) GetPBKDF2PasswordFromSpec() argument
143 GetPBKDF2SaltFromSpec(HcfKdfData *data, HcfPBKDF2ParamsSpec *params) GetPBKDF2SaltFromSpec() argument
160 InitPBKDF2Data(OpensslKdfSpiImpl *self, HcfPBKDF2ParamsSpec *params) InitPBKDF2Data() argument
190 OpensslPBKDF2(OpensslKdfSpiImpl *self, HcfPBKDF2ParamsSpec *params) OpensslPBKDF2() argument
217 HcfPBKDF2ParamsSpec *params = (HcfPBKDF2ParamsSpec *)paramsSpec; EngineGenerateSecret() local
232 HcfKdfPBKDF2SpiCreate(HcfKdfDeriveParams *params, HcfKdfSpi **spiObj) HcfKdfPBKDF2SpiCreate() argument
[all...]
H A Dhkdf_openssl.c92 static bool CheckHkdfParams(HcfHkdfParamsSpec *params) in CheckHkdfParams() argument
95 if (params->output.len > INT_MAX || params->salt.len > INT_MAX || params->key.len > INT_MAX || in CheckHkdfParams()
96 params->info.len > INT_MAX) { in CheckHkdfParams()
100 if (params->key.data == NULL && params->key.len == 0) { in CheckHkdfParams()
101 LOGE("check params failed, key is NULL"); in CheckHkdfParams()
104 if (params->output.data == NULL || params in CheckHkdfParams()
117 GetHkdfKeyFromSpec(HcfHkdfData *data, HcfHkdfParamsSpec *params) GetHkdfKeyFromSpec() argument
142 GetHkdfInfoFromSpec(OpensslHkdfSpiImpl *self, HcfHkdfData *data, HcfHkdfParamsSpec *params) GetHkdfInfoFromSpec() argument
163 GetHkdfSaltFromSpec(OpensslHkdfSpiImpl *self, HcfHkdfData *data, HcfHkdfParamsSpec *params) GetHkdfSaltFromSpec() argument
184 InitHkdfData(OpensslHkdfSpiImpl *self, HcfHkdfParamsSpec *params) InitHkdfData() argument
247 OSSL_PARAM params[6] = {}; OpensslHkdf() local
295 HcfHkdfParamsSpec *params = (HcfHkdfParamsSpec *)paramsSpec; EngineGenerateSecret() local
310 HcfKdfHkdfSpiCreate(HcfKdfDeriveParams *params, HcfKdfSpi **spiObj) HcfKdfHkdfSpiCreate() argument
[all...]
/base/security/device_auth/services/protocol/src/pake_protocol/
H A Dpake_common.c20 void CleanPakeSensitiveKeys(PakeBaseParams *params) in CleanPakeSensitiveKeys() argument
22 if (params == NULL) { in CleanPakeSensitiveKeys()
25 FreeAndCleanKey(&params->psk); in CleanPakeSensitiveKeys()
26 FreeAndCleanKey(&params->base); in CleanPakeSensitiveKeys()
27 FreeAndCleanKey(&params->eskSelf); in CleanPakeSensitiveKeys()
28 FreeAndCleanKey(&params->sharedSecret); in CleanPakeSensitiveKeys()
29 FreeAndCleanKey(&params->sessionKey); in CleanPakeSensitiveKeys()
30 FreeAndCleanKey(&params->hmacKey); in CleanPakeSensitiveKeys()
/base/update/updater/services/applypatch/
H A Dcommand_process.cpp38 CommandResult AbortCommandFn::Execute(const Command &params) in Execute() argument
43 CommandResult NewCommandFn::Execute(const Command &params) in Execute() argument
46 bs.ParserAndInsert(params.GetArgumentByPos(1)); in Execute()
48 auto writerThreadInfo = params.GetTransferParams()->writerThreadInfo.get(); in Execute()
50 writerThreadInfo->writer = std::make_unique<BlockWriter>(params.GetFileDescriptor(), bs); in Execute()
68 params.GetTransferParams()->written += bs.TotalBlockSize(); in Execute()
72 CommandResult ZeroAndEraseCommandFn::Execute(const Command &params) in Execute() argument
75 if (params.GetCommandType() == CommandType::ERASE) { in Execute()
81 if (fstat(params.GetFileDescriptor(), &statBlock) == -1) { in Execute()
94 blk.ParserAndInsert(params in Execute()
103 LoadTarget(const Command &params, size_t &pos, std::vector<uint8_t> &buffer, BlockSet &targetBlock, CommandResult &result) LoadTarget() argument
143 WriteDiffToBlock(const Command &params, std::vector<uint8_t> &srcBuffer, uint8_t *patchBuffer, size_t patchLength, BlockSet &targetBlock) WriteDiffToBlock() argument
150 Execute(const Command &params) Execute() argument
194 Execute(const Command &params) Execute() argument
204 Execute(const Command &params) Execute() argument
[all...]
/base/security/device_auth/services/legacy/authenticators/inc/account_unrelated/iso_task/
H A Diso_task_common.h26 void DestroyIsoParams(IsoParams *params);
27 int InitIsoParams(IsoParams *params, const CJson *in);
29 int GenerateSeed(IsoParams *params);
31 int GenerateKeyAliasInIso(const IsoParams *params, uint8_t *keyAlias, uint32_t keyAliasLen, bool useOpposite);
32 int GeneratePsk(const CJson *in, IsoParams *params);
34 int GenerateEncResult(const IsoParams *params, int message, CJson *sendToPeer, const char *aad);
35 int GenEncResult(IsoParams *params, int message, CJson *out, const char *aad, bool isNeedReturnKey);
36 int SendResultToFinalSelf(IsoParams *params, CJson *out, bool isNeedReturnKey);
37 int CheckEncResult(IsoParams *params, const CJson *in, const char *aad);
38 void DeleteAuthCode(const IsoParams *params);
[all...]
/base/update/updater/services/script/script_interpreter/
H A Dscript_param.cpp33 auto params = new(std::nothrow) ScriptParams(); in CreateParams() local
34 if (params == nullptr) { in CreateParams()
35 USCRIPT_LOGE("Create params failed"); in CreateParams()
38 params->AddParams(expression); in CreateParams()
39 return params; in CreateParams()
42 ScriptParams* ScriptParams::AddParams(ScriptParams *params, UScriptExpression *expression) in AddParams() argument
44 if (params == nullptr) { in AddParams()
45 params = new(std::nothrow) ScriptParams(); in AddParams()
46 if (params == nullptr) { in AddParams()
47 USCRIPT_LOGE("Create params faile in AddParams()
[all...]
/base/security/certificate_framework/test/unittest/cf_sdk_test/src/
H A Dcf_extension_test.cpp109 if (paramSet->params[i + 1].tag != CF_TAG_RESULT_BYTES) { in CompareArray()
113 if (CompareBlob(&array->data[i], &paramSet->params[i + 1].blob) != true) { in CompareArray()
171 static void ExtensionTest(int32_t type, int32_t typeValue, const CfParam *params, uint32_t cnt) in ExtensionTest() argument
174 int32_t ret = CommonTest(CF_OBJ_TYPE_EXTENSION, &g_extensionBlob[0], params, cnt, &outParamSet); in ExtensionTest()
197 static void ExtensionCheckTest(int32_t type, int32_t typeValue, const CfParam *params, uint32_t cnt) in ExtensionCheckTest() argument
200 int32_t ret = CommonTest(CF_OBJ_TYPE_EXTENSION, &g_extensionBlob[0], params, cnt, &outParamSet); in ExtensionCheckTest()
225 CfParam params[] = { in HWTEST_F() local
229 ExtensionTest(CF_GET_TYPE_EXT_ITEM, CF_ITEM_ENCODED, params, sizeof(params) / sizeof(CfParam)); in HWTEST_F()
240 CfParam params[] in HWTEST_F() local
255 CfParam params[] = { HWTEST_F() local
270 CfParam params[] = { HWTEST_F() local
288 CfParam params[] = { HWTEST_F() local
307 CfParam params[] = { HWTEST_F() local
326 CfParam params[] = { HWTEST_F() local
342 CfParam params[] = { HWTEST_F() local
430 CfParam params[] = { /* not set CF_TAG_CHECK_TYPE */ HWTEST_F() local
447 CfParam params[] = { /* CF_TAG_CHECK_TYPE is not CF_CHECK_TYPE_EXT_CA */ HWTEST_F() local
464 CfParam params[] = { HWTEST_F() local
484 CfParam params[] = { /* not set CF_TAG_GET_TYPE */ HWTEST_F() local
501 CfParam params[] = { /* CF_TAG_GET_TYPE not valid */ HWTEST_F() local
518 CfParam params[] = { /* not set CF_TAG_PARAM0_INT32 */ HWTEST_F() local
535 CfParam params[] = { HWTEST_F() local
553 CfParam params[] = { /* not set CF_TAG_PARAM0_INT32 */ HWTEST_F() local
570 CfParam params[] = { HWTEST_F() local
588 CfParam params[] = { /* not set CF_TAG_PARAM0_INT32 */ HWTEST_F() local
605 CfParam params[] = { /* not set CF_TAG_PARAM1_BUFFER */ HWTEST_F() local
625 CfParam params[] = { HWTEST_F() local
643 CfParam params[] = { HWTEST_F() local
[all...]

Completed in 14 milliseconds

12345678910>>...28