/foundation/communication/dsoftbus/tests/sdk/transmission/fuzztest/clienttranssessionservice_fuzzer/ |
H A D | clienttranssessionservice_fuzzer.cpp | 27 #define SESSION_KEY_LENGTH 32 in GetSessionKeyTest() macro 31 if (size > SESSION_KEY_LENGTH) { in GetSessionKeyTest() 34 unsigned int len = SESSION_KEY_LENGTH; in GetSessionKeyTest() 36 char tmp[SESSION_KEY_LENGTH + 1] = {0}; in GetSessionKeyTest()
|
/foundation/communication/dsoftbus/tests/adapter/unittest/ |
H A D | dsoftbus_crypto_test.cpp | 281 cipherKey.keyLen = SESSION_KEY_LENGTH; in HWTEST_F() 282 int32_t ret = SoftBusGenerateRandomArray(cipherKey.key, SESSION_KEY_LENGTH); in HWTEST_F() 346 cipherKey.keyLen = SESSION_KEY_LENGTH; in HWTEST_F() 347 int32_t ret = SoftBusGenerateRandomArray(cipherKey.key, SESSION_KEY_LENGTH); in HWTEST_F() 434 cipherKey.keyLen = SESSION_KEY_LENGTH; in HWTEST_F() 435 int32_t ret = SoftBusGenerateRandomArray(cipherKey.key, SESSION_KEY_LENGTH); in HWTEST_F() 461 cipherKey.keyLen = SESSION_KEY_LENGTH; in HWTEST_F() 462 int32_t ret = SoftBusGenerateRandomArray(cipherKey.key, SESSION_KEY_LENGTH); in HWTEST_F() 495 cipherKey.keyLen = SESSION_KEY_LENGTH; in HWTEST_F() 496 int32_t ret = SoftBusGenerateRandomArray(cipherKey.key, SESSION_KEY_LENGTH); in HWTEST_F() [all...] |
/foundation/communication/dsoftbus/tests/sdk/transmission/trans_channel/udp/stream/ |
H A D | dstream_adaptor_server_test.c | 26 #define SESSION_KEY_LENGTH 32 macro 64 SESSION_KEY_LENGTH, in main() 74 SESSION_KEY_LENGTH, in main()
|
H A D | dstream_adaptor_client_test.c | 33 #define SESSION_KEY_LENGTH 32 macro 70 p1->keyLen = SESSION_KEY_LENGTH; in ConstructVtpStreamOpenParam() 78 p2->keyLen = SESSION_KEY_LENGTH; in ConstructVtpStreamOpenParam()
|
H A D | client_trans_udp_stream_interface_test.cpp | 66 SESSION_KEY_LENGTH, 76 SESSION_KEY_LENGTH,
|
/foundation/CastEngine/castengine_cast_framework/service/src/session/src/rtsp/src/ |
H A D | rtsp_channel_manager.cpp | 38 !Utils::IsArrayAllZero(channelManager_->sessionKeys_, SESSION_KEY_LENGTH))) { in OnDataReceived() 68 memset_s(sessionKeys_, SESSION_KEY_LENGTH, 0, SESSION_KEY_LENGTH); in ~RtspChannelManager() 109 memset_s(sessionKeys_, SESSION_KEY_LENGTH, 0, SESSION_KEY_LENGTH); in StopSession() 167 Utils::IsArrayAllZero(sessionKeys_, SESSION_KEY_LENGTH) || algorithmId_ <= 0) { in SendData()
|
H A D | rtsp_channel_manager.h | 81 constexpr static int SESSION_KEY_LENGTH = 16; member in OHOS::CastEngine::CastEngineService::CastSessionRtsp::RtspChannelManager 86 uint8_t sessionKeys_[SESSION_KEY_LENGTH] = {0};
|
/foundation/CastEngine/castengine_cast_plus_stream/src/rtsp/src/ |
H A D | rtsp_channel_manager.cpp | 38 !Utils::IsArrayAllZero(channelManager_->sessionKeys_, SESSION_KEY_LENGTH))) { in OnDataReceived() 68 memset_s(sessionKeys_, SESSION_KEY_LENGTH, 0, SESSION_KEY_LENGTH); in ~RtspChannelManager() 109 memset_s(sessionKeys_, SESSION_KEY_LENGTH, 0, SESSION_KEY_LENGTH); in StopSession() 167 Utils::IsArrayAllZero(sessionKeys_, SESSION_KEY_LENGTH) || algorithmId_ <= 0) { in SendData()
|
H A D | rtsp_channel_manager.h | 81 constexpr static int SESSION_KEY_LENGTH = 16; member in OHOS::CastEngine::CastEngineService::CastSessionRtsp::RtspChannelManager 86 uint8_t sessionKeys_[SESSION_KEY_LENGTH] = {0};
|
/foundation/communication/dsoftbus/sdk/transmission/trans_channel/udp/stream/adaptor/src/ |
H A D | stream_adaptor.cpp | 126 cipherKey.keyLen = SESSION_KEY_LENGTH; in Encrypt() 127 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey.first, sessionKey.second) != EOK) { in Encrypt() 153 cipherKey.keyLen = SESSION_KEY_LENGTH; // 256 bit encryption in Decrypt() 154 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey.first, sessionKey.second) != EOK) { in Decrypt()
|
/foundation/communication/dsoftbus/adapter/common/include/ |
H A D | softbus_adapter_crypto.h | 55 unsigned char key[SESSION_KEY_LENGTH]; 61 unsigned char key[SESSION_KEY_LENGTH];
|
/foundation/communication/dsoftbus/tests/core/authentication/unittest/ |
H A D | auth_hichain_test.cpp | 124 uint8_t sessionKey[SESSION_KEY_LENGTH] = {0}; in HWTEST_F() 125 OnSessionKeyReturned(authSeq, nullptr, SESSION_KEY_LENGTH + 1); in HWTEST_F() 126 OnSessionKeyReturned(authSeq, nullptr, SESSION_KEY_LENGTH); in HWTEST_F() 127 OnSessionKeyReturned(authSeq, sessionKey, SESSION_KEY_LENGTH + 1); in HWTEST_F()
|
H A D | auth_session_message_test.cpp | 34 constexpr char DEVICE_KEY[SESSION_KEY_LENGTH] = "11111"; 43 constexpr char KEY_TEST[SESSION_KEY_LENGTH] = "123456keytest"; 105 ASSERT_TRUE(memcpy_s(deviceCommKey.deviceKey, SESSION_KEY_LENGTH, in HWTEST_F() 196 ASSERT_TRUE(memcpy_s(deviceKey.deviceKey, SESSION_KEY_LENGTH, in HWTEST_F() 412 ASSERT_TRUE(memcpy_s(info.cipherInfo.key, SESSION_KEY_LENGTH, KEY_TEST, strlen(KEY_TEST)) == EOK); in HWTEST_F() 803 EXPECT_EQ(SOFTBUS_OK, SoftBusGenerateRandomArray(deviceCommKey.deviceKey, SESSION_KEY_LENGTH)); in HWTEST_F() 804 deviceCommKey.keyLen = SESSION_KEY_LENGTH; in HWTEST_F() 846 SessionKey sessionKey = { .len = SESSION_KEY_LENGTH, }; in HWTEST_F() 847 EXPECT_EQ(SOFTBUS_OK, SoftBusGenerateRandomArray(sessionKey.value, SESSION_KEY_LENGTH)); in HWTEST_F() 884 SessionKey sessionKey = { .len = SESSION_KEY_LENGTH, }; in HWTEST_F() [all...] |
/foundation/communication/dsoftbus/core/authentication/include/ |
H A D | auth_device_common_key.h | 37 uint8_t deviceKey[SESSION_KEY_LENGTH];
|
/foundation/communication/dsoftbus/sdk/transmission/trans_channel/proxy/src/ |
H A D | client_trans_proxy_manager.c | 306 if (memcpy_s(info->detail.sessionKey, SESSION_KEY_LENGTH, channel->sessionKey, SESSION_KEY_LENGTH) != EOK) { in ClientTransProxyCreateChannelInfo() 335 (void)memset_s(info->detail.sessionKey, SESSION_KEY_LENGTH, 0, SESSION_KEY_LENGTH); in ClientTransProxyOnChannelOpened() 410 cipherKey.keyLen = SESSION_KEY_LENGTH; in ClientTransProxyDecryptPacketData() 411 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, info.sessionKey, SESSION_KEY_LENGTH) != EOK) { in ClientTransProxyDecryptPacketData() 930 cipherKey.keyLen = SESSION_KEY_LENGTH; in ClientTransProxyPackBytes() 931 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey, SESSION_KEY_LENGTH) ! in ClientTransProxyPackBytes() [all...] |
/foundation/communication/dsoftbus/core/transmission/common/src/ |
H A D | softbus_message_open_channel.c | 154 &keyLen, (unsigned char *)appInfo->sessionKey, SESSION_KEY_LENGTH); in PackRequest() 237 int32_t ret = SoftBusBase64Decode((unsigned char *)appInfo->sessionKey, SESSION_KEY_LENGTH, in ParseMessageToAppInfo() 240 if (len != SESSION_KEY_LENGTH) { in ParseMessageToAppInfo() 421 cipherKey.keyLen = SESSION_KEY_LENGTH; in TransTdcEncrypt() 422 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey, SESSION_KEY_LENGTH) != EOK) { in TransTdcEncrypt()
|
/foundation/communication/dsoftbus/core/bus_center/lnn/net_builder/include/ |
H A D | lnn_data_cloud_sync.h | 60 unsigned char cipherKey[SESSION_KEY_LENGTH];
|
/foundation/communication/dsoftbus/sdk/transmission/trans_channel/tcp_direct/include/ |
H A D | client_trans_tcp_direct_manager.h | 37 char sessionKey[SESSION_KEY_LENGTH];
|
/foundation/communication/dsoftbus/core/bus_center/lnn/net_ledger/common/src/ |
H A D | lnn_net_ledger.c | 708 unsigned char broadcastCipher[SESSION_KEY_LENGTH] = {0}; in SoftbusDumpPrintBroadcastCipher() 710 (uint8_t *)&broadcastCipher, SESSION_KEY_LENGTH) != SOFTBUS_OK) { in SoftbusDumpPrintBroadcastCipher() 716 broadcastCipher, SESSION_KEY_LENGTH) != SOFTBUS_OK) { in SoftbusDumpPrintBroadcastCipher() 717 (void)memset_s(broadcastCipher, SESSION_KEY_LENGTH, 0, SESSION_KEY_LENGTH); in SoftbusDumpPrintBroadcastCipher() 725 (void)memset_s(broadcastCipher, SESSION_KEY_LENGTH, 0, SESSION_KEY_LENGTH); in SoftbusDumpPrintBroadcastCipher()
|
/foundation/CastEngine/castengine_cast_framework/service/src/device_manager/src/ |
H A D | cast_device_data_manager.cpp | 35 constexpr int SESSION_KEY_LENGTH = 16; member 417 if (memcpy_s(it->device.sessionKey, SESSION_KEY_LENGTH, sessionKey, SESSION_KEY_LENGTH) != 0) { in SetDeviceSessionKey() 420 it->device.sessionKeyLength = SESSION_KEY_LENGTH; in SetDeviceSessionKey()
|
H A D | connection_manager.cpp | 74 constexpr int SESSION_KEY_LENGTH = 16; member 592 EncryptDecrypt::GetInstance().EncryptData(EncryptDecrypt::CTR_CODE, sessionKey, SESSION_KEY_LENGTH, inputData, in EncryptPort() 634 EncryptDecrypt::GetInstance().EncryptData(EncryptDecrypt::CTR_CODE, sessionKey, SESSION_KEY_LENGTH, inputData, in EncryptIp() 1071 uint8_t sessionKey[SESSION_KEY_LENGTH] = {0}; in HandleConnectDeviceAction() 1081 uint8_t sessionKey[SESSION_KEY_LENGTH] = {0}; in HandleConnectDeviceAction() 1082 RAND_bytes(sessionKey, SESSION_KEY_LENGTH); in HandleConnectDeviceAction() 1093 for (int i = 0; i < SESSION_KEY_LENGTH; i++) { in GetSessionKey()
|
/foundation/communication/dsoftbus/core/transmission/common/include/ |
H A D | softbus_app_info.h | 97 char sessionKey[SESSION_KEY_LENGTH];
|
/foundation/communication/dsoftbus/sdk/transmission/trans_channel/proxy/include/ |
H A D | client_trans_proxy_manager.h | 30 char sessionKey[SESSION_KEY_LENGTH];
|
/foundation/communication/dsoftbus/sdk/transmission/trans_channel/tcp_direct/src/ |
H A D | client_trans_tcp_direct_message.c | 76 cipherKey.keyLen = SESSION_KEY_LENGTH; // 256 bit encryption in TransTdcDecrypt() 77 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey, SESSION_KEY_LENGTH) != EOK) { in TransTdcDecrypt() 94 cipherKey.keyLen = SESSION_KEY_LENGTH; in TransTdcEncryptWithSeq() 95 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey, SESSION_KEY_LENGTH) != EOK) { in TransTdcEncryptWithSeq()
|
H A D | client_trans_tcp_direct_manager.c | 192 if (memcpy_s(item->detail.sessionKey, SESSION_KEY_LENGTH, channel->sessionKey, SESSION_KEY_LENGTH) != EOK) { in TransGetNewTcpChannel() 416 if (memcpy_s(key, len, channel.detail.sessionKey, SESSION_KEY_LENGTH) != EOK) { in TransTdcGetSessionKey()
|