/base/security/crypto_framework/test/unittest/src/ |
H A D | crypto_pbkdf2_test.cpp | 67 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; in HWTEST_F() local 73 .salt = salt, in HWTEST_F() 90 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; in HWTEST_F() local 96 .salt = salt, in HWTEST_F() 113 HcfBlob salt = {.data = nullptr, .len = 0}; in HWTEST_F() local 118 .salt = salt, in HWTEST_F() 134 HcfBlob salt in HWTEST_F() local 158 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local 182 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local 205 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local 228 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local 251 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local 274 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local 297 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local 320 HcfBlob salt = {.data = nullptr, .len = 0}; HWTEST_F() local 341 HcfBlob salt = {.data = nullptr, .len = 0}; HWTEST_F() local 363 HcfBlob salt = {.data = nullptr, .len = 0}; HWTEST_F() local 384 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local 405 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local 427 HcfBlob salt = {.data = saltData, .len = SALT_NORMAL_LENGTH}; HWTEST_F() local [all...] |
H A D | crypto_hkdf_test.cpp | 64 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), in HWTEST_F() local 73 .salt = salt, in HWTEST_F() 89 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), in HWTEST_F() local 98 .salt = salt, in HWTEST_F() 116 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), in HWTEST_F() local 124 .salt = salt, in HWTEST_F() 145 HcfBlob salt in HWTEST_F() local 184 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local 229 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local 254 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local 279 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local 304 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local 329 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local 376 HcfBlob salt = {.data = nullptr, .len = 0}; HWTEST_F() local 397 HcfBlob salt = {.data = nullptr, .len = 0}; HWTEST_F() local 420 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local 444 HcfBlob salt = {.data = nullptr, .len = 0}; HWTEST_F() local 517 HcfBlob salt = {.data = saltData, .len = sizeof(saltData)}; HWTEST_F() local 565 HcfBlob salt = {.data = saltData, .len = sizeof(saltData)}; HWTEST_F() local 588 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), HWTEST_F() local [all...] |
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/kdf/src/ |
H A D | pbkdf2_openssl.c | 33 unsigned char *salt;
member 71 if ((*data)->salt != NULL) {
in FreeKdfData() 72 HcfClearAndFreeUnsignedChar((*data)->salt, (*data)->saltLen);
in FreeKdfData() 73 (*data)->salt = NULL;
in FreeKdfData() 108 if (params->output.len > INT_MAX || params->salt.len > INT_MAX || params->password.len > INT_MAX) {
in CheckPBKDF2Params() 117 if (params->salt.data == NULL && params->salt.len == 0) {
in CheckPBKDF2Params() 118 LOGD("empty salt");
in CheckPBKDF2Params() 121 if (params->salt.data != NULL && params->salt in CheckPBKDF2Params() [all...] |
H A D | hkdf_openssl.c | 31 unsigned char *salt; member 69 HcfClearAndFree((*data)->salt, (*data)->saltLen); in FreeHkdfData() 95 if (params->output.len > INT_MAX || params->salt.len > INT_MAX || params->key.len > INT_MAX || in CheckHkdfParams() 108 if (params->salt.data == NULL && params->salt.len == 0) { in CheckHkdfParams() 109 LOGD("empty salt"); in CheckHkdfParams() 166 LOGD("EXPAND_ONLY mode does not require salt"); in GetHkdfSaltFromSpec() 170 if (params->salt.len == 0) { in GetHkdfSaltFromSpec() 171 LOGD("salt can be empty."); in GetHkdfSaltFromSpec() 175 data->salt in GetHkdfSaltFromSpec() [all...] |
/base/security/crypto_framework/test/fuzztest/crypto_operation/hcfkdfcreate_fuzzer/ |
H A D | hcfkdfcreate_fuzzer.cpp | 49 HcfBlob salt = {.data = const_cast<uint8_t *>(data), .len = size}; in TestHkdfGenerateSecretSalt() local 57 .salt = salt, in TestHkdfGenerateSecretSalt() 77 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), in TestHkdfGenerateSecretKey() local 84 .salt = salt, in TestHkdfGenerateSecretKey() 106 HcfBlob salt = {.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_saltData)), in TestHkdfGenerateSecretInfo() local 111 .salt = salt, in TestHkdfGenerateSecretInfo() 131 HcfBlob salt in TestPbkdfGenerateSecretWithoutInfo() local [all...] |
/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | mk_agree_test.cpp | 155 Uint8Buff salt = { peerDevPkVal, peerDevPkLen }; in HWTEST_F() local 156 ret = GeneratePseudonymPsk(DEFAULT_OS_ACCOUNT, TEST_DEVICE_ID, &salt); in HWTEST_F() 166 Uint8Buff salt = { nullptr, 0 }; in HWTEST_F() local 167 int32_t ret = GeneratePseudonymPsk(DEFAULT_OS_ACCOUNT, TEST_DEVICE_ID, &salt); in HWTEST_F() 178 Uint8Buff salt = { peerDevPkVal, peerDevPkLen }; in HWTEST_F() local 179 ret = GeneratePseudonymPsk(DEFAULT_OS_ACCOUNT, nullptr, &salt); in HWTEST_F() 191 Uint8Buff salt = { peerDevPkVal, peerDevPkLen }; in HWTEST_F() local 195 &info, &salt, &tmpKcfData); in HWTEST_F() 207 Uint8Buff salt = { peerDevPkVal, peerDevPkLen }; in HWTEST_F() local 211 &info, &salt, in HWTEST_F() 223 Uint8Buff salt = { peerDevPkVal, peerDevPkLen }; HWTEST_F() local 239 Uint8Buff salt = { peerDevPkVal, 0 }; HWTEST_F() local 250 Uint8Buff salt = { nullptr, 0 }; HWTEST_F() local [all...] |
/base/security/huks/services/huks_standard/huks_engine/main/core_dependency/include/ |
H A D | hks_chipset_platform_key.h | 27 int32_t HksChipsetPlatformDeriveKeyAndEcdh(const struct HksBlob *peerPk, const struct HksBlob *salt,
30 int32_t HksChipsetPlatformDerivePubKey(const struct HksBlob *salt, struct HksBlob *pubKey);
|
/base/security/code_signature/interfaces/innerkits/code_sign_utils/src/ |
H A D | code_sign_helper.cpp | 74 uint8_t *salt = reinterpret_cast<uint8_t *>(arg.salt_ptr);
in ShowCodeSignInfo() local 84 "data_size:%{public}lld salt_size:%{public}d salt:[%{public}d, ..., %{public}d, ..., %{public}d] "
in ShowCodeSignInfo() 88 arg.data_size, arg.salt_size, salt[0], salt[16], salt[31], arg.flags, arg.tree_offset, // 16, 31 data index
in ShowCodeSignInfo()
|
/base/security/device_auth/frameworks/deviceauth_lite/source/struct/ |
H A D | pake_response.c | 47 /* salt */ in parse_pake_response() 48 result = byte_convert(obj, FIELD_SALT, pake_response->salt.salt, in parse_pake_response() 49 (uint32_t *)&pake_response->salt.length, HC_SALT_BUFF_LEN); in parse_pake_response() 51 LOGE("Parse Pake Response failed, field is null in salt"); in parse_pake_response()
|
H A D | auth_start_response.c | 56 /* salt */ in parse_auth_start_response() 57 result = byte_convert(obj, FIELD_SALT, auth_start_response->salt.salt, in parse_auth_start_response() 58 (uint32_t *)&auth_start_response->salt.length, HC_SALT_BUFF_LEN); in parse_auth_start_response() 60 LOGE("Parse AuthStart Response failed, field is null in salt"); in parse_auth_start_response()
|
/base/security/huks/services/huks_standard/huks_engine/main/core/src/ |
H A D | hks_core_service_key_other.c | 100 static int32_t GetMacKey(const struct HksBlob *salt, struct HksBlob *macKey) in GetMacKey() argument 109 .salt = *salt, in GetMacKey() 121 int32_t HksCoreCalcMacHeader(const struct HksParamSet *paramSet, const struct HksBlob *salt, in HksCoreCalcMacHeader() argument 124 /* 1. get mac key by derive from salt */ in HksCoreCalcMacHeader() 127 int32_t ret = GetMacKey(salt, &macKey); in HksCoreCalcMacHeader()
|
H A D | hks_keyblob.c | 44 uint8_t salt[HKS_KEY_BLOB_DERIVE_SALT_SIZE];
member 84 struct HksBlob *salt)
in GetSalt() 95 salt->size = appIdParam->blob.size + HKS_KEY_BLOB_DERIVE_SALT_SIZE;
in GetSalt() 96 salt->data = (uint8_t *)HksMalloc(salt->size);
in GetSalt() 97 HKS_IF_NULL_LOGE_RETURN(salt->data, HKS_ERROR_MALLOC_FAIL, "malloc failed")
in GetSalt() 99 (void)memcpy_s(salt->data, salt->size, appIdParam->blob.data, appIdParam->blob.size);
in GetSalt() 101 (void)memcpy_s(salt->data + appIdParam->blob.size, salt in GetSalt() 83 GetSalt(const struct HksParamSet *paramSet, const struct HksKeyBlobInfo *keyBlobInfo, struct HksBlob *salt) GetSalt() argument 126 struct HksBlob salt = { 0, NULL }; GetDeriveKey() local 290 struct HksBlob salt = { HKS_KEY_BLOB_DERIVE_SALT_SIZE, keyBlobInfo->salt }; InitKeyBlobInfo() local [all...] |
H A D | hks_keyblob_lite.c | 45 static int32_t GetSalt(enum DeriveType type, const struct HksBlob *random, struct HksBlob *salt)
in GetSalt() argument 56 int32_t ret = HksBlobInit(salt, random->size + tag.size);
in GetSalt() 59 if ((memcpy_s(salt->data, salt->size, random->data, random->size) != EOK) ||
in GetSalt() 60 (memcpy_s(salt->data + random->size, salt->size - random->size, tag.data, tag.size) != EOK)) {
in GetSalt() 61 HKS_FREE(salt->data);
in GetSalt() 75 struct HksBlob salt = { 0, NULL };
in GetDeriveMaterial() local 76 ret = GetSalt(type, random, &salt);
in GetDeriveMaterial() 78 HKS_LOG_E("get salt faile in GetDeriveMaterial() [all...] |
/base/security/crypto_framework/frameworks/js/napi/crypto/src/ |
H A D | napi_kdf.cpp | 56 HcfBlobDataClearAndFree(&(tmp->salt));
in FreeKdfParamsSpec() 62 HcfBlobDataClearAndFree(&(tmp->salt));
in FreeKdfParamsSpec() 274 LOGE("failed to get valid salt");
in GetBlobFromKdfParamsSpec() 281 static void SetPBKDF2ParamsSpecAttribute(int iter, const HcfBlob &out, HcfBlob *salt, const HcfBlob &password,
in SetPBKDF2ParamsSpecAttribute() argument 286 tmp->salt.data = salt->data;
in SetPBKDF2ParamsSpecAttribute() 287 tmp->salt.len = salt->len;
in SetPBKDF2ParamsSpecAttribute() 292 static void SetHkdfParamsSpecAttribute(const HcfBlob &out, const HcfBlob *salt, const HcfBlob &key,
in SetHkdfParamsSpecAttribute() argument 296 tmpParams->salt in SetHkdfParamsSpecAttribute() 323 HcfBlob *salt = nullptr; GetPBKDF2ParamsSpec() local 373 HcfBlob *salt = nullptr; GetHkdfParamsSpec() local [all...] |
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/include/ |
H A D | hks_chipset_platform_test.h | 29 std::vector<uint8_t> salt {}; 43 // user info as derive salt, the salt will be used to derive a pair of platform keys. 44 // the salt length MUST be 16 bytes, and the last byte will be ignored. 46 std::vector<uint8_t> salt; member 59 return {{ .tag = HKS_TAG_SALT, .blob = { .size = t.salt.size(), .data = t.salt.data() } }, in CipherMaterialsToDecryptInputParams()
|
/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/ |
H A D | hks_mbedtls_kdf.c | 55 ret = mbedtls_pkcs5_pbkdf2_hmac(&ctx, mainKey->data, mainKey->size, derParam->salt.data, in DeriveKeyPbkdf2() 56 derParam->salt.size, derParam->iterations, derivedKey->size, derivedKey->data); in DeriveKeyPbkdf2() 72 int32_t ret = mbedtls_hkdf(info, derParam->salt.data, derParam->salt.size, mainKey->data, mainKey->size, in DeriveKeyHkdf()
|
/base/security/device_auth/services/mk_agree/src/mock/ |
H A D | key_manager_mock.c | 40 int32_t GeneratePseudonymPsk(int32_t osAccountId, const char *peerDeviceId, const Uint8Buff *salt) in GeneratePseudonymPsk() argument 44 (void)salt; in GeneratePseudonymPsk()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
H A D | pake_v1_protocol_common.c | 37 HcFree(params->salt.val); in DestroyPakeV1BaseParams() 38 params->salt.val = NULL; in DestroyPakeV1BaseParams() 70 params->salt.length = PAKE_SALT_LEN; in AllocDefaultParams() 71 params->salt.val = (uint8_t *)HcMalloc(params->salt.length, 0); in AllocDefaultParams() 72 if (params->salt.val == NULL) { in AllocDefaultParams() 73 LOGE("Malloc for salt failed."); in AllocDefaultParams() 182 res = params->loader->generateRandom(&(params->salt)); in GeneratePakeParams() 184 LOGE("Generate salt failed, res: %x.", res); in GeneratePakeParams() 188 PRINT_DEBUG_MSG(params->salt in GeneratePakeParams() [all...] |
/base/security/crypto_framework/interfaces/inner_api/algorithm_parameter/ |
H A D | detailed_hkdf_params.h | 27 HcfBlob salt; member
|
H A D | detailed_pbkdf2_params.h | 27 HcfBlob salt; member
|
/base/security/device_auth/frameworks/deviceauth_lite/inc/key_agreement/ |
H A D | sts_server.h | 65 struct hc_salt salt; member 87 struct hc_salt salt; member
|
H A D | pake_server.h | 72 struct hc_salt salt; member 100 struct hc_salt salt; member
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_message_util.c | 85 int32_t res = AddByteToJson(payload, FIELD_SALT, params->baseParams.salt.val, params->baseParams.salt.length); in PackagePakeResponseData() 87 LOGE("Add salt failed, res: %d.", res); in PackagePakeResponseData() 133 int32_t res = GetByteFromJson(in, FIELD_SALT, params->baseParams.salt.val, params->baseParams.salt.length); in ParsePakeResponseMessage() 135 LOGE("Get salt failed, res: %d.", res); in ParsePakeResponseMessage()
|
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
H A D | hks_openssl_kdf.c | 56 if (PKCS5_PBKDF2_HMAC((char *)mainKey->data, mainKey->size, deriveParam->salt.data, deriveParam->salt.size,
in HksOpensslPbkdf2() 81 if (EVP_PKEY_CTX_set1_hkdf_salt(pctx, deriveParam->salt.data, deriveParam->salt.size) <= 0) {
in HksOpensslHkdf()
|
/base/security/huks/services/huks_standard/huks_engine/main/core/include/ |
H A D | hks_core_service_key_other.h | 33 int32_t HksCoreCalcMacHeader(const struct HksParamSet *paramSet, const struct HksBlob *salt,
|