/base/security/device_auth/frameworks/deviceauth_lite/source/auth_info/ |
H A D | remove_auth_info_client.c | 76 struct uint8_buff plain = { NULL, 0, 0 }; in build_remove_request_data() local 98 plain.val = tmp; in build_remove_request_data() 99 plain.length = strlen((const char *)tmp); in build_remove_request_data() 100 plain.size = plain.length + 1; in build_remove_request_data() 111 &plain, "hichain_remove_info_request", &payload); in build_remove_request_data() 125 struct uint8_buff plain = { 0, 0, 0 }; in parse_remove_response_data() local 127 &receive->cipher, "hichain_remove_info_response", &plain); in parse_remove_response_data() 129 (void)memset_s(plain.val, plain in parse_remove_response_data() [all...] |
H A D | auth_info.c | 75 int32_t encrypt_payload(const struct var_buffer *key, const struct uint8_buff *plain, in encrypt_payload() argument 84 int32_t ret = aes_gcm_encrypt((struct var_buffer *)key, plain, &aes_aad, payload); in encrypt_payload() 94 const char *aad, struct uint8_buff *plain) in decrypt_payload() 96 plain->val = (uint8_t *)MALLOC(HC_AUTH_DECRYPT_LEN); in decrypt_payload() 97 if (plain->val == NULL) { in decrypt_payload() 101 plain->size = HC_AUTH_DECRYPT_LEN; in decrypt_payload() 102 plain->length = 0; in decrypt_payload() 103 (void)memset_s(plain->val, plain->size, 0, plain in decrypt_payload() 93 decrypt_payload(const struct var_buffer *key, const struct uint8_buff *payload, const char *aad, struct uint8_buff *plain) decrypt_payload() argument [all...] |
H A D | exchange_auth_info_client.c | 99 struct uint8_buff plain = { 0, 0, 0 }; in parse_exchange_response_data() local 100 int32_t ret = decrypt_payload((struct var_buffer *)key, &receive->cipher, HICHAIN_EXCHANGE_RESPONSE, &plain); in parse_exchange_response_data() 107 ret = get_field_from_request_payload(&plain, &sign_result, &cache->auth_id, &cache->ltpk); in parse_exchange_response_data() 110 (void)memset_s(plain.val, plain.size, 0, plain.size); in parse_exchange_response_data() 111 FREE(plain.val); in parse_exchange_response_data() 114 struct uint8_buff *auth_info = &plain; in parse_exchange_response_data() 116 (void)memset_s(plain.val, plain in parse_exchange_response_data() 153 struct uint8_buff plain; build_exchange_request() local [all...] |
H A D | remove_auth_info.c | 78 struct uint8_buff plain = { 0, 0, 0 }; in parse_remove_request_data() local 80 HICHAIN_REMOVE_INFO_REQUEST, &plain); in parse_remove_request_data() 85 ret = get_field_from_request_payload(&plain, &cache->user_type, &cache->auth_id); in parse_remove_request_data() 86 (void)memset_s(plain.val, plain.size, 0, plain.size); in parse_remove_request_data() 87 FREE(plain.val); in parse_remove_request_data() 88 plain.val = NULL; in parse_remove_request_data() 101 struct uint8_buff plain = { in build_remove_response_data() local 108 int32_t ret = encrypt_payload((const struct var_buffer *)key, &plain, in build_remove_response_data() [all...] |
/base/security/asset/test/unittest/module_test/src/ |
H A D | huks_wrapper_test.cpp | 107 uint8_t plain[6 + TAG_SIZE + NONCE_SIZE] = { 0 }; in HWTEST_F() local 108 struct HksBlob outData = { 6 + TAG_SIZE + NONCE_SIZE, plain }; in HWTEST_F() 132 uint8_t plain[6 + TAG_SIZE + NONCE_SIZE] = { 0 }; in HWTEST_F() local 133 struct HksBlob outData = { 6 + TAG_SIZE + NONCE_SIZE, plain }; in HWTEST_F()
|
/base/security/huks/frameworks/crypto_lite/cipher/src/ |
H A D | cipher_rsa.c | 322 static int32_t RsaEncrypt(RsaKeyData *key, const RsaData *plain, RsaData *cipher) in RsaEncrypt() argument 348 size_t count = plain->length / rsaContentLen; in RsaEncrypt() 349 size_t remain = plain->length % rsaContentLen; in RsaEncrypt() 357 if (RsaEncryptMultipleBlock(rsa, plain->data, cipher->data, cipher->length) != 0) { in RsaEncrypt() 385 static int32_t RsaPkcs1Decrypt(mbedtls_rsa_context *rsa, size_t rsaLen, RsaData *cipher, RsaData *plain) in RsaPkcs1Decrypt() argument 418 if (memcpy_s(plain->data + totalPlainLen, plain->length - totalPlainLen, buf, plainLen)) { in RsaPkcs1Decrypt() 427 plain->length = totalPlainLen; in RsaPkcs1Decrypt() 440 static int32_t RsaDecrypt(RsaKeyData *key, RsaData *cipher, RsaData *plain) in RsaDecrypt() argument 446 if (plain in RsaDecrypt() [all...] |
/base/security/device_auth/frameworks/deviceauth_lite/inc/auth_info/ |
H A D | auth_info.h | 59 int32_t encrypt_payload(const struct var_buffer *key, const struct uint8_buff *plain, 62 const char *aad, struct uint8_buff *plain);
|
/base/security/device_auth/frameworks/deviceauth_lite/test/unittest/ |
H A D | auth_info_test.h | 63 int32_t encrypt_payload(const struct var_buffer *key, const struct uint8_buff *plain, 66 const char *aad, struct uint8_buff *plain);
|
H A D | huks_adapter_test.h | 266 * @param plain: data to be encrypted 271 int32_t aes_gcm_encrypt(struct var_buffer *key, const struct uint8_buff *plain,
|
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/ |
H A D | hks_sm4_cipher_test_common.cpp | 96 uint8_t plain[SM4_COMMON_SIZE] = {0}; in HksSm4CipherTestCaseOther() local 97 struct HksBlob plainText = { SM4_COMMON_SIZE, plain }; in HksSm4CipherTestCaseOther() 160 uint8_t plain[SM4_COMMON_SIZE] = {0}; in HksSm4CipherTestCaseGcm() local 161 struct HksBlob plainText = { SM4_COMMON_SIZE, plain }; in HksSm4CipherTestCaseGcm()
|
H A D | hks_cross_test.cpp | 81 uint8_t plain[CROSS_COMMON_SIZE] = {0}; in HWTEST_F() local 82 struct HksBlob plainText = { CROSS_COMMON_SIZE, plain }; in HWTEST_F() 124 uint8_t plain[CROSS_COMMON_SIZE] = {0}; in HWTEST_F() local 125 struct HksBlob plainText = { CROSS_COMMON_SIZE, plain }; in HWTEST_F() 171 uint8_t plain[CROSS_COMMON_SIZE] = {0}; in HWTEST_F() local 172 struct HksBlob plainText = { CROSS_COMMON_SIZE, plain }; in HWTEST_F() 219 uint8_t plain[CROSS_COMMON_SIZE] = {0}; in HWTEST_F() local 220 struct HksBlob plainText = { CROSS_COMMON_SIZE, plain }; in HWTEST_F()
|
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/symmetric_alg_test/ |
H A D | hks_aes_cipher_test_common.cpp | 181 uint8_t plain[AES_COMMON_SIZE] = {0}; in HksAesCipherTestCaseOther() local 182 struct HksBlob plainText = { AES_COMMON_SIZE, plain }; in HksAesCipherTestCaseOther() 237 uint8_t plain[AES_COMMON_SIZE] = {0}; in HksAesCipherTestCaseGcm2() local 238 struct HksBlob plainText = { AES_COMMON_SIZE, plain }; in HksAesCipherTestCaseGcm2() 300 uint8_t plain[AES_COMMON_SIZE] = {0}; in HksAesCipherTestCaseGcm3() local 301 struct HksBlob plainText = { AES_COMMON_SIZE, plain }; in HksAesCipherTestCaseGcm3() 378 uint8_t plain[AES_COMMON_SIZE] = {0}; in HksAesCipherTestCaseGcm4() local 379 struct HksBlob plainText = { AES_COMMON_SIZE, plain }; in HksAesCipherTestCaseGcm4() 545 uint8_t plain[AES_COMMON_SIZE] = {0}; 546 struct HksBlob plainText = { AES_COMMON_SIZE, plain }; [all...] |
/base/web/webview/ohos_interface/ohos_glue/ohos_adapter/bridge/webview/ |
H A D | ark_paste_data_record_adapter_impl.cpp | 35 std::shared_ptr<std::string>* plain = static_cast<std::shared_ptr<std::string>*>(plainText); in NewRecord() local 37 NWeb::PasteDataRecordAdapter::NewRecord(ArkWebStringStructToClass(mimeType), *html, *plain); in NewRecord()
|
/base/security/asset/services/crypto_manager/src/ |
H A D | crypto.rs | 145 let mut plain: Vec<u8> = vec![0; cipher.len() - TAG_SIZE - NONCE_SIZE]; in decrypt() variables 149 let mut out_data = OutBlob { size: plain.len() as u32, data: plain.as_mut_ptr() }; in decrypt() 161 SUCCESS => Ok(plain), in decrypt()
|
/base/telephony/core_service/utils/common/src/ |
H A D | tel_aes_crypto_util.cpp | 278 uint8_t *plain = (uint8_t *)calloc(decryptDataPair.second, sizeof(uint8_t)); in AesCryptoDecryptInner() local 279 if (plain == nullptr) { in AesCryptoDecryptInner() 284 struct HksBlob plainText = { decryptDataPair.second, plain }; in AesCryptoDecryptInner() 289 free(plain); in AesCryptoDecryptInner() 294 free(plain); in AesCryptoDecryptInner()
|
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/asymmetric_alg_test/ |
H A D | hks_rsa_cipher_test_common.cpp | 137 uint8_t plain[Unittest::RsaCipher::RSA_COMMON_SIZE] = {0}; in HksRsaCipherTestCase() local 138 struct HksBlob plainText = { Unittest::RsaCipher::RSA_COMMON_SIZE, plain }; in HksRsaCipherTestCase()
|
H A D | hks_sm2_cipher_test.cpp | 466 uint8_t plain[SM2_COMMON_SIZE] = {0}; in HksSm2CipherTestRun() local 467 struct HksBlob plainText = { SM2_COMMON_SIZE, plain }; in HksSm2CipherTestRun() 671 uint8_t plain[SM2_COMMON_SIZE] = {0}; in HksSm2CipherTestRunByNdk() local 672 struct OH_Huks_Blob plainText = { SM2_COMMON_SIZE, plain }; in HksSm2CipherTestRunByNdk()
|
/base/web/webview/ohos_adapter/keystore_adapter/src/ |
H A D | keystore_adapter_impl.cpp | 195 uint8_t plain[AES_COMMON_SIZE] = {0}; in DecryptKey() local 196 struct HksBlob plainText = {AES_COMMON_SIZE, plain}; in DecryptKey()
|
/base/security/device_auth/frameworks/deviceauth_lite/inc/huks_adapter/ |
H A D | huks_adapter.h | 262 * @param plain: data to be encrypted 267 int32_t aes_gcm_encrypt(struct var_buffer *key, const struct uint8_buff *plain,
|
/base/security/device_auth/deps_adapter/key_management_adapter/interfaces/ |
H A D | alg_defs.h | 105 typedef int32_t (*AesGcmEncryptFunc)(const KeyParams *keyParams, const Uint8Buff *plain, const GcmParam *encryptInfo,
|
/base/security/device_auth/frameworks/deviceauth_lite/source/key_agreement/ |
H A D | sts_client.c | 369 struct uint8_buff plain = {request_sign.signature, request_sign.length, request_sign.length}; in build_end_request_data() local 370 ret = aes_gcm_encrypt((struct var_buffer *)&sts_client->session_key, &plain, &aes_aad, &out_auth_data); in build_end_request_data()
|
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/ |
H A D | huks_adapter.c | 962 static int32_t CheckAesGcmEncryptParam(const KeyParams *keyParams, const Uint8Buff *plain, in CheckAesGcmEncryptParam() argument 969 const Uint8Buff *inParams[] = { plain, outCipher }; in CheckAesGcmEncryptParam() 970 const char* paramTags[] = { "plain", "outCipher" }; in CheckAesGcmEncryptParam() 981 CHECK_LEN_LOWER_RETURN(outCipher->length, plain->length + HKS_AE_TAG_LEN, "outCipher"); in CheckAesGcmEncryptParam() 1021 static int32_t AesGcmEncrypt(const KeyParams *keyParams, const Uint8Buff *plain, const GcmParam *encryptInfo, in AesGcmEncrypt() argument 1024 int32_t res = CheckAesGcmEncryptParam(keyParams, plain, encryptInfo, outCipher); in AesGcmEncrypt() 1030 struct HksBlob plainBlob = { plain->length, plain->val }; in AesGcmEncrypt()
|
/base/web/webview/test/unittest/pasteboard_adapter/ |
H A D | pasteboard_client_adapter_test.cpp | 328 std::shared_ptr<std::string> plain = g_pasternull->GetPlainText(); in HWTEST_F() local 329 if (plain == nullptr) { in HWTEST_F()
|
/base/security/device_auth/frameworks/deviceauth_lite/source/huks_adapter/ |
H A D | huks_adapter.c | 548 int32_t aes_gcm_encrypt(struct var_buffer *key, const struct uint8_buff *plain, in aes_gcm_encrypt() argument 552 check_ptr_return_val(plain, HC_INPUT_ERROR); in aes_gcm_encrypt() 562 struct HksBlob hks_plain_text = { plain->length, plain->val }; in aes_gcm_encrypt()
|
/base/security/device_auth/frameworks/deviceauth_lite/test/unittest/unittest_mock/ |
H A D | huks_adapter_mock_for_pake.c | 502 int32_t aes_gcm_encrypt(struct var_buffer *key, const struct uint8_buff *plain, in aes_gcm_encrypt() argument 506 check_ptr_return_val(plain, HC_INPUT_ERROR); in aes_gcm_encrypt() 516 struct HksBlob hks_plain_text = { plain->length, plain->val }; in aes_gcm_encrypt()
|