/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
H A D | pake_v1_protocol_common.c | 29 void DestroyPakeV1BaseParams(PakeBaseParams *params) in DestroyPakeV1BaseParams() argument 31 if (params == NULL) { in DestroyPakeV1BaseParams() 35 CleanPakeSensitiveKeys(params); in DestroyPakeV1BaseParams() 37 HcFree(params->salt.val); in DestroyPakeV1BaseParams() 38 params->salt.val = NULL; in DestroyPakeV1BaseParams() 40 HcFree(params->challengeSelf.val); in DestroyPakeV1BaseParams() 41 params->challengeSelf.val = NULL; in DestroyPakeV1BaseParams() 43 HcFree(params->challengePeer.val); in DestroyPakeV1BaseParams() 44 params->challengePeer.val = NULL; in DestroyPakeV1BaseParams() 46 HcFree(params in DestroyPakeV1BaseParams() 68 AllocDefaultParams(PakeBaseParams *params) AllocDefaultParams() argument 121 FillDefaultValue(PakeBaseParams *params) FillDefaultValue() argument 149 InitPakeV1BaseParams(int32_t osAccountId, PakeBaseParams *params) InitPakeV1BaseParams() argument 176 GeneratePakeParams(PakeBaseParams *params) GeneratePakeParams() argument 228 DeriveKeyFromSharedSecret(PakeBaseParams *params) DeriveKeyFromSharedSecret() argument 271 GenerateSessionKey(PakeBaseParams *params) GenerateSessionKey() argument 303 GenerateProof(PakeBaseParams *params) GenerateProof() argument 335 VerifyProof(PakeBaseParams *params) VerifyProof() argument 374 ClientConfirmPakeV1Protocol(PakeBaseParams *params) ClientConfirmPakeV1Protocol() argument 403 ClientVerifyConfirmPakeV1Protocol(PakeBaseParams *params) ClientVerifyConfirmPakeV1Protocol() argument 417 ServerResponsePakeV1Protocol(PakeBaseParams *params) ServerResponsePakeV1Protocol() argument 431 ServerConfirmPakeV1Protocol(PakeBaseParams *params) ServerConfirmPakeV1Protocol() argument [all...] |
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common/ |
H A D | pake_protocol_dl_common.c | 52 static int32_t GenerateEsk(PakeBaseParams *params) in GenerateEsk() argument 54 int res = params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk() 61 static int FillDlKeysLenAccordingToEpkPeer(PakeBaseParams *params) in FillDlKeysLenAccordingToEpkPeer() argument 63 if ((params->epkPeer.length == PAKE_DL_PRIME_LEN) && in FillDlKeysLenAccordingToEpkPeer() 64 (((uint32_t)params->supportedDlPrimeMod & DL_PRIME_MOD_384) != 0)) { in FillDlKeysLenAccordingToEpkPeer() 65 params->eskSelf.length = PAKE_DL_ESK_LEN; in FillDlKeysLenAccordingToEpkPeer() 66 params->innerKeyLen = PAKE_DL_PRIME_LEN; in FillDlKeysLenAccordingToEpkPeer() 69 if ((params->epkPeer.length == PAKE_DL_PRIME_SMALL_LEN) && in FillDlKeysLenAccordingToEpkPeer() 70 (((uint32_t)params in FillDlKeysLenAccordingToEpkPeer() 79 FillDlKeysLenAccordingToMod(PakeBaseParams *params) FillDlKeysLenAccordingToMod() argument 95 InitDlPakeParams(PakeBaseParams *params) InitDlPakeParams() argument 125 GenerateDlPakeParams(PakeBaseParams *params, const Uint8Buff *secret) GenerateDlPakeParams() argument 158 IsEpkPeerLenInvalid(PakeBaseParams *params) IsEpkPeerLenInvalid() argument 172 AgreeDlSharedSecret(PakeBaseParams *params, Uint8Buff *sharedSecret) AgreeDlSharedSecret() argument [all...] |
/base/security/device_auth/services/protocol/src/iso_protocol/ |
H A D | iso_protocol_common.c | 24 int32_t InitIsoBaseParams(const CJson *in, IsoBaseParams *params) in InitIsoBaseParams() argument 26 if (in == NULL || params == NULL) { in InitIsoBaseParams() 30 if (GetIntFromJson(in, FIELD_OS_ACCOUNT_ID, ¶ms->osAccountId) != HC_SUCCESS) { in InitIsoBaseParams() 36 params->randSelf.length = RAND_BYTE_LEN; in InitIsoBaseParams() 37 params->randSelf.val = (uint8_t *)HcMalloc(params->randSelf.length, 0); in InitIsoBaseParams() 38 if (params->randSelf.val == NULL) { in InitIsoBaseParams() 43 params->randPeer.length = RAND_BYTE_LEN; in InitIsoBaseParams() 44 params->randPeer.val = (uint8_t *)HcMalloc(params in InitIsoBaseParams() 71 DestroyIsoBaseParams(IsoBaseParams *params) DestroyIsoBaseParams() argument 93 IsoCalSelfToken(const IsoBaseParams *params, Uint8Buff *outHmac) IsoCalSelfToken() argument 140 IsoCalPeerToken(const IsoBaseParams *params, Uint8Buff *selfToken) IsoCalPeerToken() argument 187 IsoCombineHkdfSalt(IsoBaseParams *params, Uint8Buff *hkdfSaltBuf, bool isClient) IsoCombineHkdfSalt() argument 213 IsoGenSessionKey(IsoBaseParams *params, Uint8Buff *pskBuf, bool isClient) IsoGenSessionKey() argument 240 IsoClientGenRandom(IsoBaseParams *params) IsoClientGenRandom() argument 254 IsoClientCheckAndGenToken(IsoBaseParams *params, const Uint8Buff *peerToken, Uint8Buff *selfToken) IsoClientCheckAndGenToken() argument 287 IsoClientGenSessionKey(IsoBaseParams *params, int returnResult, const uint8_t *hmac, uint32_t hmacLen) IsoClientGenSessionKey() argument 325 IsoServerGenRandomAndToken(IsoBaseParams *params, Uint8Buff *selfTokenBuf) IsoServerGenRandomAndToken() argument 350 IsoServerGenSessionKeyAndCalToken(IsoBaseParams *params, const Uint8Buff *tokenFromPeer, Uint8Buff *tokenToPeer) IsoServerGenSessionKeyAndCalToken() argument [all...] |
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/ |
H A D | pake_protocol_ec_common.c | 32 static int32_t GenerateEsk(PakeBaseParams *params) in GenerateEsk() argument 35 if (params->curveType == CURVE_256) { in GenerateEsk() 36 return params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk() 37 } else if (params->curveType == CURVE_25519) { in GenerateEsk() 38 res = params->loader->generateRandom(&(params->eskSelf)); in GenerateEsk() 43 params->eskSelf.val[PAKE_EC_KEY_LEN - 1] &= PAKE_PRIVATE_KEY_AND_MASK_HIGH; in GenerateEsk() 44 params->eskSelf.val[0] &= PAKE_PRIVATE_KEY_AND_MASK_LOW; in GenerateEsk() 45 params in GenerateEsk() 53 InitEcPakeParams(PakeBaseParams *params) InitEcPakeParams() argument 77 GenerateEcPakeParams(PakeBaseParams *params, Uint8Buff *secret) GenerateEcPakeParams() argument 113 AgreeEcSharedSecret(PakeBaseParams *params, Uint8Buff *sharedSecret) AgreeEcSharedSecret() argument [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_task_common.c | 56 int32_t VerifyPkSignPeer(const PakeAuthParams *params) in VerifyPkSignPeer() argument 68 int32_t res = GetAccountAuthTokenManager()->generateKeyAlias((const char *)(params->userIdSelf), in VerifyPkSignPeer() 69 (const char *)params->devIdSelf.val, &serverPkAliasBuff, true); in VerifyPkSignPeer() 76 .val = params->pkInfoPeer.val, in VerifyPkSignPeer() 77 .length = params->pkInfoPeer.length in VerifyPkSignPeer() 80 .val = params->pkInfoSignPeer.val, in VerifyPkSignPeer() 81 .length = params->pkInfoSignPeer.length in VerifyPkSignPeer() 83 KeyParams keyParams = { { serverPkAliasBuff.val, serverPkAliasBuff.length, true }, false, params->osAccountId }; in VerifyPkSignPeer() 84 res = params->pakeParams.loader->verify(&keyParams, &messageBuff, P256, &peerSignBuff); in VerifyPkSignPeer() 93 int32_t GenerateEcdhSharedKey(PakeAuthParams *params) in GenerateEcdhSharedKey() argument 140 ExtractPakePeerId(PakeAuthParams *params, const CJson *in) ExtractPakePeerId() argument 159 ExtractPakeSelfId(PakeAuthParams *params) ExtractPakeSelfId() argument 179 ExtractSelfDeviceId(PakeAuthParams *params, const CJson *in, bool useSelfPrefix) ExtractSelfDeviceId() argument 209 ExtractPeerDeviceId(PakeAuthParams *params, const CJson *in) ExtractPeerDeviceId() argument 238 ExtractSelfDevId(PakeAuthParams *params, const CJson *in) ExtractSelfDevId() argument 263 GetPeerPkFromPkInfo(PakeAuthParams *params, const char *pkInfoStr) GetPeerPkFromPkInfo() argument 295 ExtractPeerDevId(PakeAuthParams *params, const CJson *in) ExtractPeerDevId() argument 319 GetPkInfoPeer(PakeAuthParams *params, const CJson *in) GetPkInfoPeer() argument 350 GetAsyPubKeyInfo(PakeAuthParams *params) GetAsyPubKeyInfo() argument 393 FillUserIdForAuth(const CJson *in, PakeAuthParams *params) FillUserIdForAuth() argument 408 InitPakeAuthParams(const CJson *in, PakeAuthParams *params, const AccountVersionInfo *verInfo) InitPakeAuthParams() argument 449 DestroyPakeAuthParams(PakeAuthParams *params) DestroyPakeAuthParams() argument [all...] |
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
H A D | pake_v2_protocol_common.c | 33 void DestroyPakeV2BaseParams(PakeBaseParams *params)
in DestroyPakeV2BaseParams() argument 35 if (params == NULL) {
in DestroyPakeV2BaseParams() 39 CleanPakeSensitiveKeys(params);
in DestroyPakeV2BaseParams() 41 HcFree(params->salt.val);
in DestroyPakeV2BaseParams() 42 params->salt.val = NULL;
in DestroyPakeV2BaseParams() 44 HcFree(params->challengeSelf.val);
in DestroyPakeV2BaseParams() 45 params->challengeSelf.val = NULL;
in DestroyPakeV2BaseParams() 47 HcFree(params->challengePeer.val);
in DestroyPakeV2BaseParams() 48 params->challengePeer.val = NULL;
in DestroyPakeV2BaseParams() 50 HcFree(params in DestroyPakeV2BaseParams() 72 AllocDefaultParams(PakeBaseParams *params) AllocDefaultParams() argument 111 FillDefaultValue(PakeBaseParams *params) FillDefaultValue() argument 143 InitPakeV2BaseParams(int32_t osAccountId, PakeBaseParams *params) InitPakeV2BaseParams() argument 170 GeneratePakeParams(PakeBaseParams *params) GeneratePakeParams() argument 211 ComputeSidSelf(const PakeBaseParams *params, Uint8Buff *sidSelf) ComputeSidSelf() argument 243 ComputeSidPeer(const PakeBaseParams *params, Uint8Buff *sidPeer) ComputeSidPeer() argument 275 ComputeSid(const PakeBaseParams *params, Uint8Buff *sid) ComputeSid() argument 331 ComputeSharedSecret(PakeBaseParams *params, const Uint8Buff *sid, const Uint8Buff *tmpSharedSecret) ComputeSharedSecret() argument 381 GenerateSharedSecret(PakeBaseParams *params) GenerateSharedSecret() argument 449 CombineProofMsg(const PakeBaseParams *params, Uint8Buff *proofMsg, bool isVerify) CombineProofMsg() argument 498 GenerateProof(PakeBaseParams *params) GenerateProof() argument 528 VerifyProof(PakeBaseParams *params) VerifyProof() argument 566 GenerateSessionKey(PakeBaseParams *params) GenerateSessionKey() argument 584 ClientConfirmPakeV2Protocol(PakeBaseParams *params) ClientConfirmPakeV2Protocol() argument 611 ClientVerifyConfirmPakeV2Protocol(PakeBaseParams *params) ClientVerifyConfirmPakeV2Protocol() argument 634 ServerResponsePakeV2Protocol(PakeBaseParams *params) ServerResponsePakeV2Protocol() argument 648 ServerConfirmPakeV2Protocol(PakeBaseParams *params) ServerConfirmPakeV2Protocol() argument [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_task_common.c | 22 int32_t ConstructOutJson(const PakeParams *params, CJson *out) in ConstructOutJson() argument 41 if (params->opCode == AUTHENTICATE) { in ConstructOutJson() 65 static int32_t GenerateOutputKey(PakeParams *params) in GenerateOutputKey() argument 69 { params->baseParams.sessionKey.val, params->baseParams.sessionKey.length, false }, in GenerateOutputKey() 71 params->baseParams.osAccountId in GenerateOutputKey() 73 int32_t res = params->baseParams.loader->computeHkdf(&keyParam, &(params->baseParams.salt), in GenerateOutputKey() 74 &keyInfo, &(params->returnKey)); in GenerateOutputKey() 77 FreeAndCleanKey(&(params in GenerateOutputKey() 83 SendResultToSelf(PakeParams *params, CJson *out) SendResultToSelf() argument 113 FillPskWithPin(PakeParams *params, const CJson *in) FillPskWithPin() argument 140 FillAuthId(PakeParams *params, const CJson *in) FillAuthId() argument 190 FillUserType(PakeParams *params, const CJson *in) FillUserType() argument 204 FillPkgNameAndServiceType(PakeParams *params, const CJson *in) FillPkgNameAndServiceType() argument 239 FillNonce(PakeParams *params) FillNonce() argument 255 FillDasPakeParams(PakeParams *params, const CJson *in) FillDasPakeParams() argument [all...] |
H A D | pake_message_util.c | 24 int32_t PackagePakeRequestData(const PakeParams *params, CJson *payload) in PackagePakeRequestData() argument 28 (((uint32_t)params->baseParams.supportedDlPrimeMod | DL_PRIME_MOD_256) == DL_PRIME_MOD_256); in PackagePakeRequestData() 33 if (AddIntToJson(payload, FIELD_OPERATION_CODE, params->opCode) != HC_SUCCESS) { in PackagePakeRequestData() 37 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PackagePakeRequestData() 38 if (AddStringToJson(payload, FIELD_PKG_NAME, params->packageName) != HC_SUCCESS) { in PackagePakeRequestData() 42 if (AddStringToJson(payload, FIELD_SERVICE_TYPE, params->serviceType) != HC_SUCCESS) { in PackagePakeRequestData() 46 if (AddIntToJson(payload, FIELD_PEER_USER_TYPE, params->userType) != HC_SUCCESS) { in PackagePakeRequestData() 54 int32_t ParsePakeRequestMessage(PakeParams *params, const CJson *in) in ParsePakeRequestMessage() argument 61 params in ParsePakeRequestMessage() 83 PackagePakeResponseData(const PakeParams *params, CJson *payload) PackagePakeResponseData() argument 110 GetDasEpkPeerFromJson(PakeParams *params, const CJson *in) GetDasEpkPeerFromJson() argument 131 ParsePakeResponseMessage(PakeParams *params, const CJson *in) ParsePakeResponseMessage() argument 154 PackagePakeClientConfirmData(const PakeParams *params, CJson *payload) PackagePakeClientConfirmData() argument 170 ParsePakeClientConfirmMessage(PakeParams *params, const CJson *in) ParsePakeClientConfirmMessage() argument 187 PackagePakeServerConfirmData(const PakeParams *params, CJson *payload) PackagePakeServerConfirmData() argument 198 ParsePakeServerConfirmMessage(PakeParams *params, const CJson *in) ParsePakeServerConfirmMessage() argument [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/iso_auth_task/ |
H A D | iso_auth_task_common.c | 46 static int32_t FillUserId(const CJson *in, IsoAuthParams *params) in FillUserId() argument 48 params->userIdSelf = (char *)HcMalloc(DEV_AUTH_USER_ID_SIZE, 0); in FillUserId() 49 if (params->userIdSelf == NULL) { in FillUserId() 53 params->userIdPeer = (char *)HcMalloc(DEV_AUTH_USER_ID_SIZE, 0); in FillUserId() 54 if (params->userIdPeer == NULL) { in FillUserId() 64 if (strcpy_s(params->userIdSelf, DEV_AUTH_USER_ID_SIZE, userIdSelf) != EOK) { in FillUserId() 71 static int32_t FillPayload(const CJson *in, IsoAuthParams *params) in FillPayload() argument 73 int32_t res = InitSingleParam(¶ms->devIdSelf, DEV_AUTH_DEVICE_ID_SIZE); in FillPayload() 83 if (memcpy_s(params->devIdSelf.val, params in FillPayload() 122 SetChallenge(IsoAuthParams *params) SetChallenge() argument 142 GenerateAuthTokenForAccessory(const IsoAuthParams *params, Uint8Buff *outKey) GenerateAuthTokenForAccessory() argument 170 GenerateTokenAliasForController(const IsoAuthParams *params, Uint8Buff *authTokenAlias) GenerateTokenAliasForController() argument 187 AccountAuthGeneratePsk(IsoAuthParams *params) AccountAuthGeneratePsk() argument 219 InitIsoAuthParams(const CJson *in, IsoAuthParams *params, const AccountVersionInfo *verInfo) InitIsoAuthParams() argument 263 DestroyIsoAuthParams(IsoAuthParams *params) DestroyIsoAuthParams() argument 293 GetPayloadValue(IsoAuthParams *params, const CJson *in) GetPayloadValue() argument 330 ExtractPeerAuthId(IsoAuthParams *params, const CJson *in) ExtractPeerAuthId() argument 350 ExtractAndVerifyPayload(IsoAuthParams *params, const CJson *in) ExtractAndVerifyPayload() argument 389 AuthIsoSendFinalToOut(IsoAuthParams *params, CJson *out) AuthIsoSendFinalToOut() argument [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/ |
H A D | iso_task_common.c | 25 static int32_t ComputeHkdfByParams(const IsoParams *params, const Uint8Buff *hkdfSaltBuf, Uint8Buff *returnKeyBuf) in ComputeHkdfByParams() argument 29 .keyBuff = { params->baseParams.sessionKey.val, params->baseParams.sessionKey.length, false }, in ComputeHkdfByParams() 31 .osAccountId = params->baseParams.osAccountId in ComputeHkdfByParams() 33 return params->baseParams.loader->computeHkdf(&keyParam, hkdfSaltBuf, &keyInfoBuf, returnKeyBuf); in ComputeHkdfByParams() 36 static int GenerateReturnKey(IsoParams *params, uint8_t *returnKey, uint32_t returnKeyLen) in GenerateReturnKey() argument 38 uint32_t hkdfSaltLen = params->baseParams.randPeer.length + params->baseParams.randSelf.length; in GenerateReturnKey() 44 if (params->isClient) { in GenerateReturnKey() 45 if (memcpy_s(hkdfSalt, hkdfSaltLen, params in GenerateReturnKey() 84 GenerateEncResult(const IsoParams *params, int message, CJson *sendToPeer, const char *aad) GenerateEncResult() argument 135 SendResultToFinalSelf(IsoParams *params, CJson *out, bool isNeedReturnKey) SendResultToFinalSelf() argument 171 GenEncResult(IsoParams *params, int message, CJson *out, const char *aad, bool isNeedReturnKey) GenEncResult() argument 219 CheckEncResult(IsoParams *params, const CJson *in, const char *aad) CheckEncResult() argument 262 GenerateKeyAliasForIso(const IsoParams *params, Uint8Buff *keyAliasBuff) GenerateKeyAliasForIso() argument 289 DeleteAuthCode(const IsoParams *params) DeleteAuthCode() argument 312 DestroyIsoParams(IsoParams *params) DestroyIsoParams() argument 340 FillAuthId(IsoParams *params, const CJson *in) FillAuthId() argument 394 FillPkgNameAndServiceType(IsoParams *params, const CJson *in) FillPkgNameAndServiceType() argument 440 FillPin(IsoParams *params, const CJson *in) FillPin() argument 472 AllocSeed(IsoParams *params) AllocSeed() argument 483 GetUserType(IsoParams *params, const CJson *in) GetUserType() argument 500 GetUpgradeFlagAndKeyLength(IsoParams *params, const CJson *in) GetUpgradeFlagAndKeyLength() argument 519 InitIsoParams(IsoParams *params, const CJson *in) InitIsoParams() argument 571 AuthGeneratePsk(const Uint8Buff *seed, IsoParams *params) AuthGeneratePsk() argument 598 AuthGeneratePskUsePin(const Uint8Buff *seed, IsoParams *params, const char *pinString) AuthGeneratePskUsePin() argument 613 GenerateKeyAliasInIso(const IsoParams *params, uint8_t *keyAlias, uint32_t keyAliasLen, bool useOpposite) GenerateKeyAliasInIso() argument 633 GeneratePsk(const CJson *in, IsoParams *params) GeneratePsk() argument 660 GenerateSeed(IsoParams *params) GenerateSeed() argument [all...] |
/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/ |
H A D | save_trusted_info.c | 68 CmdParams params; member 101 QueryGroupParams params = InitQueryGroupParams(); in GetGroupEntryById() local 102 params.groupId = groupId; in GetGroupEntryById() 103 if (QueryGroups(osAccountId, ¶ms, &groupEntryVec) != HC_SUCCESS) { in GetGroupEntryById() 119 static int32_t CheckGroupValidity(const CmdParams *params) in CheckGroupValidity() argument 122 (void)params; in CheckGroupValidity() 125 if (params->isBind) { in CheckGroupValidity() 128 TrustedGroupEntry *entry = GetGroupEntryById(params->osAccountId, params->groupId); in CheckGroupValidity() 138 static int32_t ClientSendTrustedInfoProcEvent(CmdParams *params) in ClientSendTrustedInfoProcEvent() argument 175 ClientSendTrustedInfoBuildEvent(const CmdParams *params, CJson **outputEvent) ClientSendTrustedInfoBuildEvent() argument 220 ServerSendTrustedInfoParseEvent(const CJson *inputEvent, CmdParams *params) ServerSendTrustedInfoParseEvent() argument 266 GenerateGroupParams(const CmdParams *params, TrustedGroupEntry *groupParams) GenerateGroupParams() argument 293 GeneratePeerDevParams(const CmdParams *params, TrustedDeviceEntry *devParams) GeneratePeerDevParams() argument 321 GenerateSelfDevParams(const CmdParams *params, TrustedDeviceEntry *devParams) GenerateSelfDevParams() argument 345 AddTrustedGroup(const CmdParams *params) AddTrustedGroup() argument 365 IsAcrossAccount(const CmdParams *params) IsAcrossAccount() argument 378 AddPeerTrustedDevice(const CmdParams *params) AddPeerTrustedDevice() argument 406 AddSelfTrustedDevice(const CmdParams *params) AddSelfTrustedDevice() argument 426 CreatePeerToPeerGroup(const CmdParams *params) CreatePeerToPeerGroup() argument 438 QueryDeviceParams params = InitQueryDeviceParams(); GetTrustedDeviceEntryById() local 457 IsDeviceImportedByCloud(const CmdParams *params) IsDeviceImportedByCloud() argument 469 ServerSendTrustedInfoProcEvent(CmdParams *params) ServerSendTrustedInfoProcEvent() argument 520 ServerSendTrustedInfoBuildEvent(const CmdParams *params, CJson **outputEvent) ServerSendTrustedInfoBuildEvent() argument 565 ClientFinishProcParseEvent(const CJson *inputEvent, CmdParams *params) ClientFinishProcParseEvent() argument 612 ClientFinishProcProcEvent(const CmdParams *params) ClientFinishProcProcEvent() argument 807 IsSaveTrustedInfoParamsValid(const SaveTrustedInfoParams *params) IsSaveTrustedInfoParamsValid() argument 812 InitSaveTrustedInfoCmd(SaveTrustedInfoCmd *instance, const SaveTrustedInfoParams *params, bool isCaller, int32_t strategy) InitSaveTrustedInfoCmd() argument 849 const SaveTrustedInfoParams *params = (const SaveTrustedInfoParams *)baseParams; CreateSaveTrustedInfoCmd() local [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_client_protocol_task.c | 42 static int PakeRequest(AsyBaseCurTask *task, PakeParams *params, CJson *out, int *status) in PakeRequest() argument 50 int res = ConstructOutJson(params, out); in PakeRequest() 60 res = PackagePakeRequestData(params, payload); in PakeRequest() 66 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PakeRequest() 67 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in PakeRequest() 68 res = AddPseudonymIdAndChallenge(params, payload); in PakeRequest() 70 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.idSelf.val, in PakeRequest() 71 params in PakeRequest() 91 ParseMsgForClientConfirm(PakeParams *params, const CJson *in) ParseMsgForClientConfirm() argument 120 PackageMsgForClientConfirm(PakeParams *params, CJson *out) PackageMsgForClientConfirm() argument 147 PakeClientConfirm(AsyBaseCurTask *task, PakeParams *params, const CJson *in, CJson *out, int *status) PakeClientConfirm() argument 191 PakeClientVerifyConfirm(AsyBaseCurTask *task, PakeParams *params, const CJson *in, int *status) PakeClientVerifyConfirm() argument 222 Process(struct AsyBaseCurTaskT *task, PakeParams *params, const CJson *in, CJson *out, int *status) Process() argument [all...] |
H A D | pake_v1_server_protocol_task.c | 41 static int PackageMsgForResponse(PakeParams *params, CJson *out) in PackageMsgForResponse() argument 43 int res = ConstructOutJson(params, out); in PackageMsgForResponse() 53 res = PackagePakeResponseData(params, payload); in PackageMsgForResponse() 59 res = AddByteToJson(payload, FIELD_CHALLENGE, params->baseParams.challengeSelf.val, in PackageMsgForResponse() 60 params->baseParams.challengeSelf.length); in PackageMsgForResponse() 65 if (params->opCode == AUTHENTICATE || params->opCode == OP_UNBIND) { in PackageMsgForResponse() 66 if (params->opCode == AUTHENTICATE && params->isPseudonym) { in PackageMsgForResponse() 67 res = AddPseudonymIdAndChallenge(params, payloa in PackageMsgForResponse() 80 PakeResponse(AsyBaseCurTask *task, PakeParams *params, const CJson *in, CJson *out, int *status) PakeResponse() argument 134 PakeServerConfirm(AsyBaseCurTask *task, PakeParams *params, const CJson *in, CJson *out, int *status) PakeServerConfirm() argument 190 Process(struct AsyBaseCurTaskT *task, PakeParams *params, const CJson *in, CJson *out, int *status) Process() argument [all...] |
H A D | pake_v1_protocol_task_common.c | 28 void DestroyDasPakeV1Params(PakeParams *params) in DestroyDasPakeV1Params() argument 30 if (params == NULL) { in DestroyDasPakeV1Params() 34 DestroyPakeV1BaseParams(&(params->baseParams)); in DestroyDasPakeV1Params() 36 if (params->returnKey.val != NULL) { in DestroyDasPakeV1Params() 37 (void)memset_s(params->returnKey.val, params->returnKey.length, 0, params->returnKey.length); in DestroyDasPakeV1Params() 38 HcFree(params->returnKey.val); in DestroyDasPakeV1Params() 39 params->returnKey.val = NULL; in DestroyDasPakeV1Params() 42 if (params in DestroyDasPakeV1Params() 67 AllocReturnKey(PakeParams *params, const CJson *in) AllocReturnKey() argument 137 LoadPseudonymFlagIfNeed(PakeParams *params) LoadPseudonymFlagIfNeed() argument 189 InitDasPakeV1Params(PakeParams *params, const CJson *in) InitDasPakeV1Params() argument 244 ConvertPakeV1Psk(const Uint8Buff *srcPsk, PakeParams *params) ConvertPakeV1Psk() argument 264 GeneratePskAlias(const PakeParams *params, Uint8Buff *pskKeyAlias) GeneratePskAlias() argument 284 FillPskWithDerivedKeyHex(PakeParams *params) FillPskWithDerivedKeyHex() argument 381 LoadPseudonymExtInfoIfNeed(PakeParams *params) LoadPseudonymExtInfoIfNeed() argument 448 GeneratePseudonymPskIfNotExist(const PakeParams *params) GeneratePseudonymPskIfNotExist() argument 557 GenerateSelfPseudonymChlgAndId(const PakeParams *params, Uint8Buff *pseudonymChlgBuff, Uint8Buff *pseudonymIdBuff) GenerateSelfPseudonymChlgAndId() argument 590 GetSelfPseudonymChlgAndIdByExtInfo(const PakeParams *params, Uint8Buff *pseudonymChallengeBuff, Uint8Buff *pseudonymIdBuff) GetSelfPseudonymChlgAndIdByExtInfo() argument 607 AddPseudonymIdAndChallenge(PakeParams *params, CJson *payload) AddPseudonymIdAndChallenge() argument 654 CheckPseudonymIdByCompute(const PakeParams *params, const Uint8Buff *peerPseudonymChallengeBuff, const Uint8Buff *peerPseudonymIdBuff, bool *isEqual) CheckPseudonymIdByCompute() argument 688 GetPeerChallenge(const CJson *payload, Uint8Buff *peerPseudonymChallengeBuff, PakeParams *params) GetPeerChallenge() argument 709 CheckPseudonymId(PakeParams *params, const CJson *in) CheckPseudonymId() argument 751 GeneratePseudonymPskExtInfo(const PakeParams *params, const Uint8Buff *selfNextPseudonymIdBuff, const Uint8Buff *peerNextPseudonymIdBuff, Uint8Buff *extInfoBuff) GeneratePseudonymPskExtInfo() argument 788 SaveExtInfoToPseudonymPsk(const PakeParams *params, const Uint8Buff *extInfoStrBuff, const Uint8Buff *pskAliasBuff) SaveExtInfoToPseudonymPsk() argument 817 SaveNextPseudonymIdAndChallenge(PakeParams *params) SaveNextPseudonymIdAndChallenge() argument [all...] |
/base/hiviewdfx/hiview/interfaces/js/napi/src/ |
H A D | hiview_napi_adapter.cpp | 30 void HiviewNapiAdapter::Copy(napi_env env, HiviewFileParams* params)
in Copy() argument 35 FileOperationCompleteCallback, reinterpret_cast<void*>(params), ¶ms->asyncWork);
in Copy() 36 napi_queue_async_work_with_qos(env, params->asyncWork, napi_qos_default);
in Copy() 41 HiviewFileParams* params = reinterpret_cast<HiviewFileParams*>(data);
in CopyFileExecution() local 42 params->result = HiviewServiceAgent::GetInstance().Copy(params->logType, params->logName, params->destDir);
in CopyFileExecution() 45 void HiviewNapiAdapter::Move(napi_env env, HiviewFileParams* params)
in Move() argument 56 HiviewFileParams* params = reinterpret_cast<HiviewFileParams*>(data); MoveFileExecution() local 62 HiviewFileParams* params = reinterpret_cast<HiviewFileParams*>(data); FileOperationCompleteCallback() local [all...] |
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
H A D | dl_speke_protocol.c | 95 DlSpekeParams params; member 106 static int32_t DlSpekeClientStartReqBuildEvent(const DlSpekeParams *params, CJson **outputData) in DlSpekeClientStartReqBuildEvent() argument 118 if (AddByteToJson(json, FIELD_AUTH_ID_CLIENT, params->authIdSelf.val, in DlSpekeClientStartReqBuildEvent() 119 params->authIdSelf.length) != HC_SUCCESS) { in DlSpekeClientStartReqBuildEvent() 124 bool isOnly256ModSupported = (((uint32_t)params->primeMod | DL_SPEKE_PRIME_MOD_256) == DL_SPEKE_PRIME_MOD_256); in DlSpekeClientStartReqBuildEvent() 134 static int32_t GetAuthIdPeerFromInput(const CJson *inputData, DlSpekeParams *params, bool isClient) in GetAuthIdPeerFromInput() argument 147 if (InitUint8Buff(¶ms->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput() 151 if (HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCESS) { in GetAuthIdPeerFromInput() 158 static int32_t GetSaltFromInput(const CJson *inputData, DlSpekeParams *params) in GetSaltFromInput() argument 171 GetEpkPeerFromInput(const CJson *inputData, DlSpekeParams *params, bool isClient) GetEpkPeerFromInput() argument 190 GetKcfDataPeerFromInput(const CJson *inputData, DlSpekeParams *params, bool isClient) GetKcfDataPeerFromInput() argument 210 SetSelfKeyLenByMod(const CJson *inputData, DlSpekeParams *params) SetSelfKeyLenByMod() argument 233 DlSpekeServerStartRspParseEvent(const CJson *inputData, DlSpekeParams *params) DlSpekeServerStartRspParseEvent() argument 242 CalSalt(DlSpekeParams *params) CalSalt() argument 256 CalSecret(DlSpekeParams *params, Uint8Buff *secret) CalSecret() argument 269 SetSelfKeyLenByEpkPeerAndMod(DlSpekeParams *params) SetSelfKeyLenByEpkPeerAndMod() argument 287 DlSpekeCalBase(DlSpekeParams *params, Uint8Buff *secret) DlSpekeCalBase() argument 304 DlSpekeCalEskSelf(DlSpekeParams *params) DlSpekeCalEskSelf() argument 317 DlSpekeCalEpkSelf(DlSpekeParams *params) DlSpekeCalEpkSelf() argument 331 IsEpkPeerLenValid(DlSpekeParams *params) IsEpkPeerLenValid() argument 345 CheckEpkPeerValid(DlSpekeParams *params) CheckEpkPeerValid() argument 357 CalTmpSharedSecret(DlSpekeParams *params, Uint8Buff *tmpSharedSecret) CalTmpSharedSecret() argument 367 CalSidSelf(DlSpekeParams *params, Uint8Buff *sidSelf) CalSidSelf() argument 395 CalSidPeer(DlSpekeParams *params, Uint8Buff *sidPeer) CalSidPeer() argument 423 CalSid(DlSpekeParams *params, Uint8Buff *sid) CalSid() argument 454 CombineSharedSecretMsg(DlSpekeParams *params, const Uint8Buff *tmpSharedSecret, const Uint8Buff *sid, Uint8Buff *sharedSecretMsg) CombineSharedSecretMsg() argument 478 GenerateSharedSecretMsg(DlSpekeParams *params, Uint8Buff *sharedSecretMsg) GenerateSharedSecretMsg() argument 504 CalSharedSecret(DlSpekeParams *params) CalSharedSecret() argument 554 DlSpekeParams *params = &impl->params; GenerateKcfDataMsg() local 694 DlSpekeServerStartRspBuildEvent(const DlSpekeParams *params, CJson **outputData) DlSpekeServerStartRspBuildEvent() argument 739 DlSpekeClientFinishReqParseEvent(const CJson *inputData, DlSpekeParams *params) DlSpekeClientFinishReqParseEvent() argument 784 DlSpekeClientFinishReqBuildEvent(DlSpekeParams *params, CJson **outputData) DlSpekeClientFinishReqBuildEvent() argument 828 DlSpekeServerFinishRspParseEvent(const CJson *inputData, DlSpekeParams *params) DlSpekeServerFinishRspParseEvent() argument 858 DlSpekeServerFinishRspBuildEvent(DlSpekeParams *params, CJson **outputData) DlSpekeServerFinishRspBuildEvent() argument 893 DlSpekeClientFinishParseEvent(const CJson *inputData, DlSpekeParams *params) DlSpekeClientFinishParseEvent() argument 1107 BuildDlSpekeProtocolObj(const DlSpekeInitParams *params, bool isClient, DlSpekeProtocol *instance) BuildDlSpekeProtocolObj() argument 1136 const DlSpekeInitParams *params = (const DlSpekeInitParams *)baseParams; CreateDlSpekeProtocol() local [all...] |
H A D | ec_speke_protocol.c | 74 EcSpekeParams params; member 85 static int32_t EcSpekeClientStartReqBuildEvent(const EcSpekeParams *params, CJson **outputEvent) in EcSpekeClientStartReqBuildEvent() argument 97 if (AddByteToJson(json, FIELD_AUTH_ID_CLIENT, params->authIdSelf.val, in EcSpekeClientStartReqBuildEvent() 98 params->authIdSelf.length) != HC_SUCCESS) { in EcSpekeClientStartReqBuildEvent() 107 static int32_t GetAuthIdPeerFromInput(const CJson *inputEvent, EcSpekeParams *params, bool isClient) in GetAuthIdPeerFromInput() argument 120 if (InitUint8Buff(¶ms->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput() 124 if (HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCESS) { in GetAuthIdPeerFromInput() 131 static int32_t GetSaltFromInput(const CJson *inputEvent, EcSpekeParams *params) in GetSaltFromInput() argument 133 if (InitUint8Buff(¶ms in GetSaltFromInput() 145 GetEpkPeerFromInput(const CJson *inputEvent, EcSpekeParams *params, bool isClient) GetEpkPeerFromInput() argument 165 GetKcfDataPeerFromInput(const CJson *inputEvent, EcSpekeParams *params, bool isClient) GetKcfDataPeerFromInput() argument 186 EcSpekeServerStartRspParseEvent(const CJson *inputEvent, EcSpekeParams *params) EcSpekeServerStartRspParseEvent() argument 191 CalSalt(EcSpekeParams *params) CalSalt() argument 206 CalSecret(EcSpekeParams *params, Uint8Buff *secret) CalSecret() argument 220 EcSpekeCalBase(EcSpekeParams *params, Uint8Buff *secret) EcSpekeCalBase() argument 248 EcSpekeCalEskSelf(EcSpekeParams *params) EcSpekeCalEskSelf() argument 278 EcSpekeCalEpkSelf(EcSpekeParams *params) EcSpekeCalEpkSelf() argument 308 CheckEpkPeerValid(EcSpekeParams *params) CheckEpkPeerValid() argument 325 CalP(EcSpekeParams *params, Uint8Buff *p) CalP() argument 339 CalSidSelf(EcSpekeParams *params, Uint8Buff *sidSelf) CalSidSelf() argument 367 CalSidPeer(EcSpekeParams *params, Uint8Buff *sidPeer) CalSidPeer() argument 395 CalSid(EcSpekeParams *params, Uint8Buff *sid) CalSid() argument 449 GenerateSharedSecretMsg(EcSpekeParams *params, Uint8Buff *sharedSecretMsg) GenerateSharedSecretMsg() argument 488 CalSharedSecret(EcSpekeParams *params) CalSharedSecret() argument 540 EcSpekeParams *params = &impl->params; GenerateKcfDataMsg() local 693 EcSpekeServerStartRspBuildEvent(const EcSpekeParams *params, CJson **outputEvent) EcSpekeServerStartRspBuildEvent() argument 738 EcSpekeClientFinishReqParseEvent(const CJson *inputEvent, EcSpekeParams *params) EcSpekeClientFinishReqParseEvent() argument 783 EcSpekeClientFinishReqBuildEvent(EcSpekeParams *params, CJson **outputEvent) EcSpekeClientFinishReqBuildEvent() argument 823 EcSpekeServerFinishRspParseEvent(const CJson *inputEvent, EcSpekeParams *params) EcSpekeServerFinishRspParseEvent() argument 853 EcSpekeServerFinishRspBuildEvent(EcSpekeParams *params, CJson **outputEvent) EcSpekeServerFinishRspBuildEvent() argument 888 EcSpekeClientFinishParseEvent(const CJson *inputEvent, EcSpekeParams *params) EcSpekeClientFinishParseEvent() argument 1105 BuildEcSpekeProtocolObj(const EcSpekeInitParams *params, bool isClient, EcSpekeProtocol *instance) BuildEcSpekeProtocolObj() argument 1134 const EcSpekeInitParams *params = (const EcSpekeInitParams *)baseParams; CreateEcSpekeProtocol() local [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/ |
H A D | das_standard_token_manager.c | 21 static int32_t RegisterLocalIdentityStd(const TokenManagerParams *params) in RegisterLocalIdentityStd() argument 23 Uint8Buff pkgNameBuff = { params->pkgName.val, params->pkgName.length }; in RegisterLocalIdentityStd() 24 Uint8Buff serviceTypeBuff = { params->serviceType.val, params->serviceType.length }; in RegisterLocalIdentityStd() 25 KeyAliasType keyType = (KeyAliasType)params->userType; in RegisterLocalIdentityStd() 28 Uint8Buff authIdBuff = { params->authId.val, params->authId.length }; in RegisterLocalIdentityStd() 36 res = loader->checkKeyExist(&keyAliasBuff, false, params->osAccountId); in RegisterLocalIdentityStd() 43 KeyParams keyParams = { { keyAliasBuff.val, keyAliasBuff.length, true }, false, params in RegisterLocalIdentityStd() 54 UnregisterLocalIdentityStd(const TokenManagerParams *params) UnregisterLocalIdentityStd() argument 197 DeletePeerAuthInfoStd(const TokenManagerParams *params) DeletePeerAuthInfoStd() argument 221 GenerateSelfKeyAlias(const PakeParams *params, Uint8Buff *selfKeyAlias) GenerateSelfKeyAlias() argument 245 GeneratePeerKeyAlias(const PakeParams *params, Uint8Buff *peerKeyAlias) GeneratePeerKeyAlias() argument 269 GenerateSharedKeyAlias(const PakeParams *params, Uint8Buff *sharedKeyAlias) GenerateSharedKeyAlias() argument 289 ComputeAndSavePskInner(const PakeParams *params, const Uint8Buff *selfKeyAlias, const Uint8Buff *peerKeyAlias, Uint8Buff *sharedKeyAlias) ComputeAndSavePskInner() argument 325 ComputeAndSavePskStd(const PakeParams *params) ComputeAndSavePskStd() argument 371 GetPublicKeyStd(const TokenManagerParams *params, Uint8Buff *returnPk) GetPublicKeyStd() argument [all...] |
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/kdf/src/ |
H A D | pbkdf2_openssl.c | 101 static bool CheckPBKDF2Params(HcfPBKDF2ParamsSpec *params)
in CheckPBKDF2Params() argument 103 if (params->iterations < 1) {
in CheckPBKDF2Params() 108 if (params->output.len > INT_MAX || params->salt.len > INT_MAX || params->password.len > INT_MAX) {
in CheckPBKDF2Params() 112 // when params password == nullptr, the size will be set 0 by openssl;
in CheckPBKDF2Params() 113 if (params->output.data == NULL || params->output.len == 0) {
in CheckPBKDF2Params() 117 if (params->salt.data == NULL && params in CheckPBKDF2Params() 127 GetPBKDF2PasswordFromSpec(HcfKdfData *data, HcfPBKDF2ParamsSpec *params) GetPBKDF2PasswordFromSpec() argument 143 GetPBKDF2SaltFromSpec(HcfKdfData *data, HcfPBKDF2ParamsSpec *params) GetPBKDF2SaltFromSpec() argument 160 InitPBKDF2Data(OpensslKdfSpiImpl *self, HcfPBKDF2ParamsSpec *params) InitPBKDF2Data() argument 190 OpensslPBKDF2(OpensslKdfSpiImpl *self, HcfPBKDF2ParamsSpec *params) OpensslPBKDF2() argument 217 HcfPBKDF2ParamsSpec *params = (HcfPBKDF2ParamsSpec *)paramsSpec; EngineGenerateSecret() local 232 HcfKdfPBKDF2SpiCreate(HcfKdfDeriveParams *params, HcfKdfSpi **spiObj) HcfKdfPBKDF2SpiCreate() argument [all...] |
H A D | hkdf_openssl.c | 92 static bool CheckHkdfParams(HcfHkdfParamsSpec *params) in CheckHkdfParams() argument 95 if (params->output.len > INT_MAX || params->salt.len > INT_MAX || params->key.len > INT_MAX || in CheckHkdfParams() 96 params->info.len > INT_MAX) { in CheckHkdfParams() 100 if (params->key.data == NULL && params->key.len == 0) { in CheckHkdfParams() 101 LOGE("check params failed, key is NULL"); in CheckHkdfParams() 104 if (params->output.data == NULL || params in CheckHkdfParams() 117 GetHkdfKeyFromSpec(HcfHkdfData *data, HcfHkdfParamsSpec *params) GetHkdfKeyFromSpec() argument 142 GetHkdfInfoFromSpec(OpensslHkdfSpiImpl *self, HcfHkdfData *data, HcfHkdfParamsSpec *params) GetHkdfInfoFromSpec() argument 163 GetHkdfSaltFromSpec(OpensslHkdfSpiImpl *self, HcfHkdfData *data, HcfHkdfParamsSpec *params) GetHkdfSaltFromSpec() argument 184 InitHkdfData(OpensslHkdfSpiImpl *self, HcfHkdfParamsSpec *params) InitHkdfData() argument 247 OSSL_PARAM params[6] = {}; OpensslHkdf() local 295 HcfHkdfParamsSpec *params = (HcfHkdfParamsSpec *)paramsSpec; EngineGenerateSecret() local 310 HcfKdfHkdfSpiCreate(HcfKdfDeriveParams *params, HcfKdfSpi **spiObj) HcfKdfHkdfSpiCreate() argument [all...] |
/base/security/device_auth/services/protocol/src/pake_protocol/ |
H A D | pake_common.c | 20 void CleanPakeSensitiveKeys(PakeBaseParams *params) in CleanPakeSensitiveKeys() argument 22 if (params == NULL) { in CleanPakeSensitiveKeys() 25 FreeAndCleanKey(¶ms->psk); in CleanPakeSensitiveKeys() 26 FreeAndCleanKey(¶ms->base); in CleanPakeSensitiveKeys() 27 FreeAndCleanKey(¶ms->eskSelf); in CleanPakeSensitiveKeys() 28 FreeAndCleanKey(¶ms->sharedSecret); in CleanPakeSensitiveKeys() 29 FreeAndCleanKey(¶ms->sessionKey); in CleanPakeSensitiveKeys() 30 FreeAndCleanKey(¶ms->hmacKey); in CleanPakeSensitiveKeys()
|
/base/update/updater/services/applypatch/ |
H A D | command_process.cpp | 38 CommandResult AbortCommandFn::Execute(const Command ¶ms)
in Execute() argument 43 CommandResult NewCommandFn::Execute(const Command ¶ms)
in Execute() argument 46 bs.ParserAndInsert(params.GetArgumentByPos(1));
in Execute() 48 auto writerThreadInfo = params.GetTransferParams()->writerThreadInfo.get();
in Execute() 50 writerThreadInfo->writer = std::make_unique<BlockWriter>(params.GetFileDescriptor(), bs);
in Execute() 68 params.GetTransferParams()->written += bs.TotalBlockSize();
in Execute() 72 CommandResult ZeroAndEraseCommandFn::Execute(const Command ¶ms)
in Execute() argument 75 if (params.GetCommandType() == CommandType::ERASE) {
in Execute() 81 if (fstat(params.GetFileDescriptor(), &statBlock) == -1) {
in Execute() 94 blk.ParserAndInsert(params in Execute() 103 LoadTarget(const Command ¶ms, size_t &pos, std::vector<uint8_t> &buffer, BlockSet &targetBlock, CommandResult &result) LoadTarget() argument 143 WriteDiffToBlock(const Command ¶ms, std::vector<uint8_t> &srcBuffer, uint8_t *patchBuffer, size_t patchLength, BlockSet &targetBlock) WriteDiffToBlock() argument 150 Execute(const Command ¶ms) Execute() argument 194 Execute(const Command ¶ms) Execute() argument 204 Execute(const Command ¶ms) Execute() argument [all...] |
/base/security/device_auth/services/legacy/authenticators/inc/account_unrelated/iso_task/ |
H A D | iso_task_common.h | 26 void DestroyIsoParams(IsoParams *params); 27 int InitIsoParams(IsoParams *params, const CJson *in); 29 int GenerateSeed(IsoParams *params); 31 int GenerateKeyAliasInIso(const IsoParams *params, uint8_t *keyAlias, uint32_t keyAliasLen, bool useOpposite); 32 int GeneratePsk(const CJson *in, IsoParams *params); 34 int GenerateEncResult(const IsoParams *params, int message, CJson *sendToPeer, const char *aad); 35 int GenEncResult(IsoParams *params, int message, CJson *out, const char *aad, bool isNeedReturnKey); 36 int SendResultToFinalSelf(IsoParams *params, CJson *out, bool isNeedReturnKey); 37 int CheckEncResult(IsoParams *params, const CJson *in, const char *aad); 38 void DeleteAuthCode(const IsoParams *params); [all...] |
/base/update/updater/services/script/script_interpreter/ |
H A D | script_param.cpp | 33 auto params = new(std::nothrow) ScriptParams();
in CreateParams() local 34 if (params == nullptr) {
in CreateParams() 35 USCRIPT_LOGE("Create params failed");
in CreateParams() 38 params->AddParams(expression);
in CreateParams() 39 return params;
in CreateParams() 42 ScriptParams* ScriptParams::AddParams(ScriptParams *params, UScriptExpression *expression)
in AddParams() argument 44 if (params == nullptr) {
in AddParams() 45 params = new(std::nothrow) ScriptParams();
in AddParams() 46 if (params == nullptr) {
in AddParams() 47 USCRIPT_LOGE("Create params faile in AddParams() [all...] |
/base/security/certificate_framework/test/unittest/cf_sdk_test/src/ |
H A D | cf_extension_test.cpp | 109 if (paramSet->params[i + 1].tag != CF_TAG_RESULT_BYTES) {
in CompareArray() 113 if (CompareBlob(&array->data[i], ¶mSet->params[i + 1].blob) != true) {
in CompareArray() 171 static void ExtensionTest(int32_t type, int32_t typeValue, const CfParam *params, uint32_t cnt)
in ExtensionTest() argument 174 int32_t ret = CommonTest(CF_OBJ_TYPE_EXTENSION, &g_extensionBlob[0], params, cnt, &outParamSet);
in ExtensionTest() 197 static void ExtensionCheckTest(int32_t type, int32_t typeValue, const CfParam *params, uint32_t cnt)
in ExtensionCheckTest() argument 200 int32_t ret = CommonTest(CF_OBJ_TYPE_EXTENSION, &g_extensionBlob[0], params, cnt, &outParamSet);
in ExtensionCheckTest() 225 CfParam params[] = {
in HWTEST_F() local 229 ExtensionTest(CF_GET_TYPE_EXT_ITEM, CF_ITEM_ENCODED, params, sizeof(params) / sizeof(CfParam));
in HWTEST_F() 240 CfParam params[] in HWTEST_F() local 255 CfParam params[] = { HWTEST_F() local 270 CfParam params[] = { HWTEST_F() local 288 CfParam params[] = { HWTEST_F() local 307 CfParam params[] = { HWTEST_F() local 326 CfParam params[] = { HWTEST_F() local 342 CfParam params[] = { HWTEST_F() local 430 CfParam params[] = { /* not set CF_TAG_CHECK_TYPE */ HWTEST_F() local 447 CfParam params[] = { /* CF_TAG_CHECK_TYPE is not CF_CHECK_TYPE_EXT_CA */ HWTEST_F() local 464 CfParam params[] = { HWTEST_F() local 484 CfParam params[] = { /* not set CF_TAG_GET_TYPE */ HWTEST_F() local 501 CfParam params[] = { /* CF_TAG_GET_TYPE not valid */ HWTEST_F() local 518 CfParam params[] = { /* not set CF_TAG_PARAM0_INT32 */ HWTEST_F() local 535 CfParam params[] = { HWTEST_F() local 553 CfParam params[] = { /* not set CF_TAG_PARAM0_INT32 */ HWTEST_F() local 570 CfParam params[] = { HWTEST_F() local 588 CfParam params[] = { /* not set CF_TAG_PARAM0_INT32 */ HWTEST_F() local 605 CfParam params[] = { /* not set CF_TAG_PARAM1_BUFFER */ HWTEST_F() local 625 CfParam params[] = { HWTEST_F() local 643 CfParam params[] = { HWTEST_F() local [all...] |