/drivers/peripheral/user_auth/hdi_service/common/src/ |
H A D | user_sign_centre.c | 78 DestoryBuffer(aesGcmParam->iv); in DeinitAesGcmParam() 88 .iv = CreateBufferByData(userAuthToken->iv, sizeof(userAuthToken->iv)), in DecryptTokenCipher() 93 if (!IsBufferValid(aesGcmParam.key) || !IsBufferValid(aesGcmParam.iv) || !IsBufferValid(aesGcmParam.aad)) { in DecryptTokenCipher() 181 aesGcmParam->iv = CreateBufferBySize(AES_GCM_IV_SIZE); in InitAesGcmParam() 183 if (!IsBufferValid(aesGcmParam->key) || !IsBufferValid(aesGcmParam->iv) || !IsBufferValid(aesGcmParam->aad)) { in InitAesGcmParam() 187 ret = SecureRandom(aesGcmParam->iv->buf, aesGcmParam->iv->maxSize); in InitAesGcmParam() 192 aesGcmParam->iv in InitAesGcmParam() 199 CopyTokenCipherParam(const Buffer *ciphertext, const Buffer *tag, const Buffer *iv, UserAuthTokenHal *authToken) CopyTokenCipherParam() argument [all...] |
/drivers/peripheral/clearplay/hdi_service/src/ |
H A D | media_decrypt_module_service.cpp | 102 ret = DecryptByAesCbc(key, cryptoInfo.iv, srcData, destData, cryptoInfo.subSamples); in DecryptMediaData() 105 ret = DecryptByAesCbc(key, cryptoInfo.iv, srcData, destData, cryptoInfo.subSamples); in DecryptMediaData() 109 ret = DecryptBySM4Cbc(key, cryptoInfo.iv, srcData, destData, cryptoInfo.subSamples); in DecryptMediaData() 136 int32_t MediaDecryptModuleService::DecryptBySM4Cbc(const std::vector<uint8_t> &key, const std::vector<uint8_t> &iv, in DecryptBySM4Cbc() argument 144 if (key.size() != BLOCK_SIZE || iv.size() != BLOCK_SIZE) { in DecryptBySM4Cbc() 145 HDF_LOGE("key or iv length error"); in DecryptBySM4Cbc() 150 EVP_DecryptInit_ex(ctx, EVP_sm4_cbc(), nullptr, key.data(), iv.data()); in DecryptBySM4Cbc() 183 int32_t MediaDecryptModuleService::DecryptByAesCbc(const std::vector<uint8_t> &key, const std::vector<uint8_t> &iv, in DecryptByAesCbc() argument 190 if (key.size() != BLOCK_SIZE || iv.size() != BLOCK_SIZE) { in DecryptByAesCbc() 191 HDF_LOGE("key or iv lengt in DecryptByAesCbc() [all...] |
/drivers/peripheral/clearplay/hdi_service/include/drm/v1_0/ |
H A D | media_decrypt_module_service.h | 39 int32_t DecryptByAesCbc(const std::vector<uint8_t>& key, const std::vector<uint8_t>& iv, 41 int32_t DecryptBySM4Cbc(const std::vector<uint8_t> &key, const std::vector<uint8_t> &iv,
|
/drivers/peripheral/pin_auth/hdi_service/main/src/ |
H A D | collector_func.c | 311 DestroyBuffer(aesGcmParam->iv); in DestroyAesGcmParam() 312 aesGcmParam->iv = NULL; in DestroyAesGcmParam() 325 aesGcmParam->iv = CreateBufferBySize(AES_GCM_256_IV_SIZE); in GetAesGcmParam() 326 if (aesGcmParam->iv == NULL) { in GetAesGcmParam() 327 LOG_ERROR("create iv buffer fail"); in GetAesGcmParam() 330 if (SecureRandom(aesGcmParam->iv->buf, aesGcmParam->iv->maxSize) != RESULT_SUCCESS) { in GetAesGcmParam() 331 LOG_ERROR("SecureRandom iv fail"); in GetAesGcmParam() 334 aesGcmParam->iv->contentSize = aesGcmParam->iv in GetAesGcmParam() [all...] |
H A D | verifier_func.c | 391 DestroyBuffer(aesGcmParam->iv); in DestroyAesGcmParam() 392 aesGcmParam->iv = NULL; in DestroyAesGcmParam() 405 aesGcmParam->iv = GetBufferFromAttribute(attribute, PIN_ATTR_KEK_IV, AES_GCM_256_IV_SIZE); in GetAesGcmParam() 406 if (aesGcmParam->iv == NULL) { in GetAesGcmParam() 407 LOG_ERROR("create iv buffer fail"); in GetAesGcmParam()
|
/drivers/peripheral/user_auth/test/unittest/base_test/src/ |
H A D | adaptor_algorithm_test.cpp | 192 aesGcmParam.iv = CreateBufferBySize(gcmIvLen); in HWTEST_F() 193 aesGcmParam.iv->contentSize = gcmIvLen; in HWTEST_F() 198 DestoryBuffer(aesGcmParam.iv); in HWTEST_F() 224 aesGcmParam.iv = CreateBufferBySize(gcmIvLen); in HWTEST_F() 225 aesGcmParam.iv->contentSize = gcmIvLen; in HWTEST_F() 237 DestoryBuffer(aesGcmParam.iv); in HWTEST_F() 252 aesGcmParam.iv = CreateBufferBySize(gcmIvSize); in HWTEST_F() 253 aesGcmParam.iv->contentSize = gcmIvSize; in HWTEST_F() 276 DestoryBuffer(aesGcmParam.iv); in HWTEST_F()
|
/drivers/peripheral/pin_auth/hdi_service/database/src/ |
H A D | pin_db.c | 465 static Buffer *SplicePinCiperInfo(const Buffer *iv, const Buffer *tag, const Buffer *ciphertext) in SplicePinCiperInfo() argument 467 Buffer *cipherInfo = CreateBufferBySize(iv->contentSize + tag->contentSize + ciphertext->contentSize); in SplicePinCiperInfo() 472 if (memcpy_s(cipherInfo->buf, cipherInfo->maxSize, iv->buf, iv->contentSize) != EOK) { in SplicePinCiperInfo() 473 LOG_ERROR("failed to copy iv"); in SplicePinCiperInfo() 476 cipherInfo->contentSize += iv->contentSize; in SplicePinCiperInfo() 503 param.iv = CreateBufferBySize(AES_GCM_256_IV_SIZE); in GetPinCiperInfo() 504 if (!IsBufferValid(param.iv)) { in GetPinCiperInfo() 505 LOG_ERROR("create iv fail."); in GetPinCiperInfo() 508 if (SecureRandom(param.iv in GetPinCiperInfo() 921 Buffer iv = GetTmpBuffer(pinData->buf, AES_GCM_256_IV_SIZE, AES_GCM_256_IV_SIZE); GenerateDecodeCredential() local [all...] |
/drivers/peripheral/user_auth/hdi_service/adaptor/inc/ |
H A D | adaptor_algorithm.h | 43 Buffer *iv; member
|
/drivers/peripheral/user_auth/hdi_service/common/inc/ |
H A D | user_sign_centre.h | 59 uint8_t iv[AES_GCM_IV_SIZE]; member
|
/drivers/peripheral/user_auth/hdi_service/adaptor/src/ |
H A D | adaptor_algorithm.c | 291 if (!CheckBufferWithSize(aesGcmParam->iv, AES_GCM_IV_SIZE)) { in CheckAesGcmParam() 292 LOG_ERROR("invalid iv"); in CheckAesGcmParam() 316 if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_IVLEN, aesGcmParam->iv->contentSize, NULL) != OPENSSL_SUCCESS) { in SetAesEncryptParam() 317 LOG_ERROR("failed to set iv len"); in SetAesEncryptParam() 320 if (EVP_EncryptInit_ex(ctx, NULL, NULL, NULL, aesGcmParam->iv->buf) != OPENSSL_SUCCESS) { in SetAesEncryptParam() 321 LOG_ERROR("failed to init iv"); in SetAesEncryptParam() 398 if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_IVLEN, aesGcmParam->iv->contentSize, NULL) != OPENSSL_SUCCESS) { in SetAesDecryptParam() 399 LOG_ERROR("failed to set iv len"); in SetAesDecryptParam() 402 if (EVP_DecryptInit_ex(ctx, NULL, NULL, NULL, aesGcmParam->iv->buf) != OPENSSL_SUCCESS) { in SetAesDecryptParam() 403 LOG_ERROR("failed to init iv"); in SetAesDecryptParam() [all...] |
/drivers/peripheral/pin_auth/test/unittest/pin_auth/adaptor/src/ |
H A D | adaptor_algorithm_test.cpp | 203 param.iv = RandomBuffer(AES_GCM_256_IV_SIZE); in HWTEST_F() 204 ASSERT_NE(param.iv, nullptr); in HWTEST_F() 219 DestroyBuffer(param.iv); in HWTEST_F()
|
/drivers/peripheral/pin_auth/hdi_service/adaptor/inc/ |
H A D | adaptor_algorithm.h | 46 Buffer *iv; member
|
/drivers/peripheral/pin_auth/hdi_service/adaptor/src/ |
H A D | adaptor_algorithm.c | 403 if (!CheckBufferWithSize(param->iv, AES_GCM_256_IV_SIZE)) { in CheckAes256GcmParams() 404 LOG_ERROR("invalid iv"); in CheckAes256GcmParams() 428 if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_IVLEN, param->iv->contentSize, NULL) != OPENSSL_SUCCESS) { in SetAesEncryptParam() 429 LOG_ERROR("failed to set iv len"); in SetAesEncryptParam() 432 if (EVP_EncryptInit_ex(ctx, NULL, NULL, NULL, param->iv->buf) != OPENSSL_SUCCESS) { in SetAesEncryptParam() 433 LOG_ERROR("failed to init iv"); in SetAesEncryptParam() 529 if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_IVLEN, param->iv->contentSize, NULL) != OPENSSL_SUCCESS) { in SetAesDecryptParam() 530 LOG_ERROR("failed to set iv len"); in SetAesDecryptParam() 533 if (EVP_DecryptInit_ex(ctx, NULL, NULL, NULL, param->iv->buf) != OPENSSL_SUCCESS) { in SetAesDecryptParam() 534 LOG_ERROR("failed to init iv"); in SetAesDecryptParam() [all...] |
/drivers/peripheral/clearplay/interfaces/include/drm/v1_0/ |
H A D | media_key_system_types.h | 146 std::vector<uint8_t> iv; member
|
/drivers/peripheral/user_auth/test/unittest/user_auth_test/ |
H A D | user_sign_centre_test.cpp | 104 .iv = DEFAULT_IV, in HWTEST_F()
|