Home
last modified time | relevance | path

Searched refs:salt (Results 1 - 25 of 79) sorted by relevance

1234

/base/security/crypto_framework/test/unittest/src/
H A Dcrypto_pbkdf2_test.cpp67 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; in HWTEST_F() local
73 .salt = salt, in HWTEST_F()
90 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; in HWTEST_F() local
96 .salt = salt, in HWTEST_F()
113 HcfBlob salt = {.data = nullptr, .len = 0}; in HWTEST_F() local
118 .salt = salt, in HWTEST_F()
134 HcfBlob salt in HWTEST_F() local
158 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local
182 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local
205 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local
228 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local
251 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local
274 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local
297 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local
320 HcfBlob salt = {.data = nullptr, .len = 0}; HWTEST_F() local
341 HcfBlob salt = {.data = nullptr, .len = 0}; HWTEST_F() local
363 HcfBlob salt = {.data = nullptr, .len = 0}; HWTEST_F() local
384 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local
405 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local
427 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local
[all...]
H A Dcrypto_hkdf_test.cpp64 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), in HWTEST_F() local
73 .salt = salt, in HWTEST_F()
89 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), in HWTEST_F() local
98 .salt = salt, in HWTEST_F()
116 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), in HWTEST_F() local
124 .salt = salt, in HWTEST_F()
145 HcfBlob salt in HWTEST_F() local
184 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local
229 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local
254 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local
279 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local
304 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local
329 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local
376 HcfBlob salt = {.data = nullptr, .len = 0}; HWTEST_F() local
397 HcfBlob salt = {.data = nullptr, .len = 0}; HWTEST_F() local
420 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local
444 HcfBlob salt = {.data = nullptr, .len = 0}; HWTEST_F() local
517 HcfBlob salt = {.data = saltData, .len = sizeof(saltData)}; HWTEST_F() local
565 HcfBlob salt = {.data = saltData, .len = sizeof(saltData)}; HWTEST_F() local
588 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local
[all...]
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/kdf/src/
H A Dpbkdf2_openssl.c33 unsigned char *salt; member
71 if ((*data)->salt != NULL) { in FreeKdfData()
72 HcfClearAndFreeUnsignedChar((*data)->salt, (*data)->saltLen); in FreeKdfData()
73 (*data)->salt = NULL; in FreeKdfData()
108 if (params->output.len > INT_MAX || params->salt.len > INT_MAX || params->password.len > INT_MAX) { in CheckPBKDF2Params()
117 if (params->salt.data == NULL && params->salt.len == 0) { in CheckPBKDF2Params()
118 LOGD("empty salt"); in CheckPBKDF2Params()
121 if (params->salt.data != NULL && params->salt in CheckPBKDF2Params()
[all...]
H A Dhkdf_openssl.c31 unsigned char *salt; member
69 HcfClearAndFree((*data)->salt, (*data)->saltLen); in FreeHkdfData()
95 if (params->output.len > INT_MAX || params->salt.len > INT_MAX || params->key.len > INT_MAX || in CheckHkdfParams()
108 if (params->salt.data == NULL && params->salt.len == 0) { in CheckHkdfParams()
109 LOGD("empty salt"); in CheckHkdfParams()
166 LOGD("EXPAND_ONLY mode does not require salt"); in GetHkdfSaltFromSpec()
170 if (params->salt.len == 0) { in GetHkdfSaltFromSpec()
171 LOGD("salt can be empty."); in GetHkdfSaltFromSpec()
175 data->salt in GetHkdfSaltFromSpec()
[all...]
/base/security/crypto_framework/test/fuzztest/crypto_operation/hcfkdfcreate_fuzzer/
H A Dhcfkdfcreate_fuzzer.cpp49 HcfBlob salt = {.data = const_cast<uint8_t *>(data), .len = size}; in TestHkdfGenerateSecretSalt() local
57 .salt = salt, in TestHkdfGenerateSecretSalt()
77 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), in TestHkdfGenerateSecretKey() local
84 .salt = salt, in TestHkdfGenerateSecretKey()
106 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), in TestHkdfGenerateSecretInfo() local
111 .salt = salt, in TestHkdfGenerateSecretInfo()
131 HcfBlob salt in TestPbkdfGenerateSecretWithoutInfo() local
[all...]
/base/security/device_auth/test/unittest/deviceauth/source/
H A Dmk_agree_test.cpp155 Uint8Buff salt = { peerDevPkVal, peerDevPkLen }; in HWTEST_F() local
156 ret = GeneratePseudonymPsk(DEFAULT_OS_ACCOUNT, TEST_DEVICE_ID, &salt); in HWTEST_F()
166 Uint8Buff salt = { nullptr, 0 }; in HWTEST_F() local
167 int32_t ret = GeneratePseudonymPsk(DEFAULT_OS_ACCOUNT, TEST_DEVICE_ID, &salt); in HWTEST_F()
178 Uint8Buff salt = { peerDevPkVal, peerDevPkLen }; in HWTEST_F() local
179 ret = GeneratePseudonymPsk(DEFAULT_OS_ACCOUNT, nullptr, &salt); in HWTEST_F()
191 Uint8Buff salt = { peerDevPkVal, peerDevPkLen }; in HWTEST_F() local
195 &info, &salt, &tmpKcfData); in HWTEST_F()
207 Uint8Buff salt = { peerDevPkVal, peerDevPkLen }; in HWTEST_F() local
211 &info, &salt, in HWTEST_F()
223 Uint8Buff salt = { peerDevPkVal, peerDevPkLen }; HWTEST_F() local
239 Uint8Buff salt = { peerDevPkVal, 0 }; HWTEST_F() local
250 Uint8Buff salt = { nullptr, 0 }; HWTEST_F() local
[all...]
/base/security/huks/services/huks_standard/huks_engine/main/core_dependency/include/
H A Dhks_chipset_platform_key.h27 int32_t HksChipsetPlatformDeriveKeyAndEcdh(const struct HksBlob *peerPk, const struct HksBlob *salt,
30 int32_t HksChipsetPlatformDerivePubKey(const struct HksBlob *salt, struct HksBlob *pubKey);
/base/security/code_signature/interfaces/innerkits/code_sign_utils/src/
H A Dcode_sign_helper.cpp74 uint8_t *salt = reinterpret_cast<uint8_t *>(arg.salt_ptr); in ShowCodeSignInfo() local
84 "data_size:%{public}lld salt_size:%{public}d salt:[%{public}d, ..., %{public}d, ..., %{public}d] " in ShowCodeSignInfo()
88 arg.data_size, arg.salt_size, salt[0], salt[16], salt[31], arg.flags, arg.tree_offset, // 16, 31 data index in ShowCodeSignInfo()
/base/security/device_auth/frameworks/deviceauth_lite/source/struct/
H A Dpake_response.c47 /* salt */ in parse_pake_response()
48 result = byte_convert(obj, FIELD_SALT, pake_response->salt.salt, in parse_pake_response()
49 (uint32_t *)&pake_response->salt.length, HC_SALT_BUFF_LEN); in parse_pake_response()
51 LOGE("Parse Pake Response failed, field is null in salt"); in parse_pake_response()
H A Dauth_start_response.c56 /* salt */ in parse_auth_start_response()
57 result = byte_convert(obj, FIELD_SALT, auth_start_response->salt.salt, in parse_auth_start_response()
58 (uint32_t *)&auth_start_response->salt.length, HC_SALT_BUFF_LEN); in parse_auth_start_response()
60 LOGE("Parse AuthStart Response failed, field is null in salt"); in parse_auth_start_response()
/base/security/huks/services/huks_standard/huks_engine/main/core/src/
H A Dhks_core_service_key_other.c100 static int32_t GetMacKey(const struct HksBlob *salt, struct HksBlob *macKey) in GetMacKey() argument
109 .salt = *salt, in GetMacKey()
121 int32_t HksCoreCalcMacHeader(const struct HksParamSet *paramSet, const struct HksBlob *salt, in HksCoreCalcMacHeader() argument
124 /* 1. get mac key by derive from salt */ in HksCoreCalcMacHeader()
127 int32_t ret = GetMacKey(salt, &macKey); in HksCoreCalcMacHeader()
H A Dhks_keyblob.c44 uint8_t salt[HKS_KEY_BLOB_DERIVE_SALT_SIZE]; member
84 struct HksBlob *salt) in GetSalt()
95 salt->size = appIdParam->blob.size + HKS_KEY_BLOB_DERIVE_SALT_SIZE; in GetSalt()
96 salt->data = (uint8_t *)HksMalloc(salt->size); in GetSalt()
97 HKS_IF_NULL_LOGE_RETURN(salt->data, HKS_ERROR_MALLOC_FAIL, "malloc failed") in GetSalt()
99 (void)memcpy_s(salt->data, salt->size, appIdParam->blob.data, appIdParam->blob.size); in GetSalt()
101 (void)memcpy_s(salt->data + appIdParam->blob.size, salt in GetSalt()
83 GetSalt(const struct HksParamSet *paramSet, const struct HksKeyBlobInfo *keyBlobInfo, struct HksBlob *salt) GetSalt() argument
126 struct HksBlob salt = { 0, NULL }; GetDeriveKey() local
290 struct HksBlob salt = { HKS_KEY_BLOB_DERIVE_SALT_SIZE, keyBlobInfo->salt }; InitKeyBlobInfo() local
[all...]
H A Dhks_keyblob_lite.c45 static int32_t GetSalt(enum DeriveType type, const struct HksBlob *random, struct HksBlob *salt) in GetSalt() argument
56 int32_t ret = HksBlobInit(salt, random->size + tag.size); in GetSalt()
59 if ((memcpy_s(salt->data, salt->size, random->data, random->size) != EOK) || in GetSalt()
60 (memcpy_s(salt->data + random->size, salt->size - random->size, tag.data, tag.size) != EOK)) { in GetSalt()
61 HKS_FREE(salt->data); in GetSalt()
75 struct HksBlob salt = { 0, NULL }; in GetDeriveMaterial() local
76 ret = GetSalt(type, random, &salt); in GetDeriveMaterial()
78 HKS_LOG_E("get salt faile in GetDeriveMaterial()
[all...]
/base/security/crypto_framework/frameworks/js/napi/crypto/src/
H A Dnapi_kdf.cpp56 HcfBlobDataClearAndFree(&(tmp->salt)); in FreeKdfParamsSpec()
62 HcfBlobDataClearAndFree(&(tmp->salt)); in FreeKdfParamsSpec()
274 LOGE("failed to get valid salt"); in GetBlobFromKdfParamsSpec()
281 static void SetPBKDF2ParamsSpecAttribute(int iter, const HcfBlob &out, HcfBlob *salt, const HcfBlob &password, in SetPBKDF2ParamsSpecAttribute() argument
286 tmp->salt.data = salt->data; in SetPBKDF2ParamsSpecAttribute()
287 tmp->salt.len = salt->len; in SetPBKDF2ParamsSpecAttribute()
292 static void SetHkdfParamsSpecAttribute(const HcfBlob &out, const HcfBlob *salt, const HcfBlob &key, in SetHkdfParamsSpecAttribute() argument
296 tmpParams->salt in SetHkdfParamsSpecAttribute()
323 HcfBlob *salt = nullptr; GetPBKDF2ParamsSpec() local
373 HcfBlob *salt = nullptr; GetHkdfParamsSpec() local
[all...]
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/include/
H A Dhks_chipset_platform_test.h29 std::vector<uint8_t> salt {};
43 // user info as derive salt, the salt will be used to derive a pair of platform keys.
44 // the salt length MUST be 16 bytes, and the last byte will be ignored.
46 std::vector<uint8_t> salt; member
59 return {{ .tag = HKS_TAG_SALT, .blob = { .size = t.salt.size(), .data = t.salt.data() } }, in CipherMaterialsToDecryptInputParams()
/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/
H A Dhks_mbedtls_kdf.c55 ret = mbedtls_pkcs5_pbkdf2_hmac(&ctx, mainKey->data, mainKey->size, derParam->salt.data, in DeriveKeyPbkdf2()
56 derParam->salt.size, derParam->iterations, derivedKey->size, derivedKey->data); in DeriveKeyPbkdf2()
72 int32_t ret = mbedtls_hkdf(info, derParam->salt.data, derParam->salt.size, mainKey->data, mainKey->size, in DeriveKeyHkdf()
/base/security/device_auth/services/mk_agree/src/mock/
H A Dkey_manager_mock.c40 int32_t GeneratePseudonymPsk(int32_t osAccountId, const char *peerDeviceId, const Uint8Buff *salt) in GeneratePseudonymPsk() argument
44 (void)salt; in GeneratePseudonymPsk()
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/
H A Dpake_v1_protocol_common.c37 HcFree(params->salt.val); in DestroyPakeV1BaseParams()
38 params->salt.val = NULL; in DestroyPakeV1BaseParams()
70 params->salt.length = PAKE_SALT_LEN; in AllocDefaultParams()
71 params->salt.val = (uint8_t *)HcMalloc(params->salt.length, 0); in AllocDefaultParams()
72 if (params->salt.val == NULL) { in AllocDefaultParams()
73 LOGE("Malloc for salt failed."); in AllocDefaultParams()
182 res = params->loader->generateRandom(&(params->salt)); in GeneratePakeParams()
184 LOGE("Generate salt failed, res: %x.", res); in GeneratePakeParams()
188 PRINT_DEBUG_MSG(params->salt in GeneratePakeParams()
[all...]
/base/security/crypto_framework/interfaces/inner_api/algorithm_parameter/
H A Ddetailed_hkdf_params.h27 HcfBlob salt; member
H A Ddetailed_pbkdf2_params.h27 HcfBlob salt; member
/base/security/device_auth/frameworks/deviceauth_lite/inc/key_agreement/
H A Dsts_server.h65 struct hc_salt salt; member
87 struct hc_salt salt; member
H A Dpake_server.h72 struct hc_salt salt; member
100 struct hc_salt salt; member
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/
H A Dpake_message_util.c85 int32_t res = AddByteToJson(payload, FIELD_SALT, params->baseParams.salt.val, params->baseParams.salt.length); in PackagePakeResponseData()
87 LOGE("Add salt failed, res: %d.", res); in PackagePakeResponseData()
133 int32_t res = GetByteFromJson(in, FIELD_SALT, params->baseParams.salt.val, params->baseParams.salt.length); in ParsePakeResponseMessage()
135 LOGE("Get salt failed, res: %d.", res); in ParsePakeResponseMessage()
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/
H A Dhks_openssl_kdf.c56 if (PKCS5_PBKDF2_HMAC((char *)mainKey->data, mainKey->size, deriveParam->salt.data, deriveParam->salt.size, in HksOpensslPbkdf2()
81 if (EVP_PKEY_CTX_set1_hkdf_salt(pctx, deriveParam->salt.data, deriveParam->salt.size) <= 0) { in HksOpensslHkdf()
/base/security/huks/services/huks_standard/huks_engine/main/core/include/
H A Dhks_core_service_key_other.h33 int32_t HksCoreCalcMacHeader(const struct HksParamSet *paramSet, const struct HksBlob *salt,

Completed in 10 milliseconds

1234