Home
last modified time | relevance | path

Searched refs:iv (Results 1 - 25 of 61) sorted by relevance

123

/foundation/CastEngine/castengine_cast_plus_stream/src/utils/src/
H A Dencrypt_decrypt.cpp41 void EncryptDecrypt::GetAESIv(uint8_t iv[], int ivLen) in GetAESIv() argument
44 if (iv == nullptr || ivLen < AES_KEY_SIZE) { in GetAESIv()
45 CLOGE("iv is null or ivLen error"); in GetAESIv()
48 errno_t ret = memset_s(iv, ivLen, 0, ivLen); in GetAESIv()
58 ret = memcpy_s(iv, ivLen, buffer, ivLen); in GetAESIv()
70 const uint8_t *iv = sessionIV.data; in AES128Encry() local
71 if ((inputData.data == nullptr) || (outputData.data == nullptr) || (key == nullptr) || (iv == nullptr) in AES128Encry()
81 int ret = EVP_EncryptInit_ex(ctx, EVP_aes_128_ctr(), nullptr, key, iv); in AES128Encry()
117 const uint8_t *iv = sessionIV.data; in AES128Decrypt() local
118 if ((outputData.data == nullptr) || (inputData.data == nullptr) || (key == nullptr) || (iv in AES128Decrypt()
422 ConstPacketData iv = { sessionIV, AES_IV_LEN }; EncryptData() local
474 ConstPacketData iv = { sessionIV, AES_IV_LEN }; DecryptData() local
[all...]
/foundation/CastEngine/castengine_cast_framework/service/src/session/src/utils/src/
H A Dencrypt_decrypt.cpp41 void EncryptDecrypt::GetAESIv(uint8_t iv[], int ivLen) in GetAESIv() argument
44 if (iv == nullptr || ivLen < AES_KEY_SIZE) { in GetAESIv()
45 CLOGE("iv is null or ivLen error"); in GetAESIv()
48 errno_t ret = memset_s(iv, ivLen, 0, ivLen); in GetAESIv()
58 ret = memcpy_s(iv, ivLen, buffer, ivLen); in GetAESIv()
70 const uint8_t *iv = sessionIV.data; in AES128Encry() local
71 if ((inputData.data == nullptr) || (outputData.data == nullptr) || (key == nullptr) || (iv == nullptr) in AES128Encry()
81 int ret = EVP_EncryptInit_ex(ctx, EVP_aes_128_ctr(), nullptr, key, iv); in AES128Encry()
117 const uint8_t *iv = sessionIV.data; in AES128Decrypt() local
118 if ((outputData.data == nullptr) || (inputData.data == nullptr) || (key == nullptr) || (iv in AES128Decrypt()
422 ConstPacketData iv = { sessionIV, AES_IV_LEN }; EncryptData() local
474 ConstPacketData iv = { sessionIV, AES_IV_LEN }; DecryptData() local
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/
H A Dfbex.cpp64 uint8_t iv[OHOS::StorageDaemon::FBEX_IV_SIZE] = {0}; member
126 static inline bool CheckIvValid(const uint8_t *iv, uint32_t size) in CheckIvValid() argument
128 return (iv != nullptr) && (size == FBEX_IV_SIZE); in CheckIvValid()
190 int FBEX::InstallKeyToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, uint8_t flag) in InstallKeyToKernel() argument
193 if (!CheckIvValid(iv, size)) { in InstallKeyToKernel()
210 auto err = memcpy_s(ops.iv, sizeof(ops.iv), iv, size); in InstallKeyToKernel()
224 auto errops = memcpy_s(iv, size, ops.iv, sizeo in InstallKeyToKernel()
234 UninstallOrLockUserKeyToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, bool destroy) UninstallOrLockUserKeyToKernel() argument
444 UnlockScreenToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size) UnlockScreenToKernel() argument
[all...]
/foundation/ai/ai_engine/test/common/queuepool/
H A Dqueuepool_test.cpp218 int iv = TEST_QUEUE_SINGLE_ELEMENT; in HWTEST_F() local
219 queue->PushBack(iv); in HWTEST_F()
277 int iv = TEST_QUEUE_SINGLE_ELEMENT; in HWTEST_F() local
278 queue->PushBack(iv); in HWTEST_F()
297 int iv = TEST_QUEUE_SINGLE_ELEMENT; in HWTEST_F() local
298 int result = queue->PushBack(iv); in HWTEST_F()
323 int iv = TEST_QUEUE_SINGLE_ELEMENT; in HWTEST_F() local
324 result = queue->PushBack(iv); in HWTEST_F()
343 int iv; in HWTEST_F() local
344 int result = queue->PopFront(iv); in HWTEST_F()
363 int iv = TEST_QUEUE_SINGLE_ELEMENT; HWTEST_F() local
391 int iv = 0; HWTEST_F() local
464 int iv; HWTEST_F() local
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/mock/
H A Dfbex_mock.cpp33 int FBEX::InstallKeyToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, uint8_t flag) in InstallKeyToKernel() argument
35 return IFbexMoc::fbexMoc->InstallKeyToKernel(userId, type, iv, size, flag); in InstallKeyToKernel()
38 int FBEX::UninstallOrLockUserKeyToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, bool destroy) in UninstallOrLockUserKeyToKernel() argument
40 return IFbexMoc::fbexMoc->UninstallOrLockUserKeyToKernel(userId, type, iv, size, destroy); in UninstallOrLockUserKeyToKernel()
71 int FBEX::UnlockScreenToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size) in UnlockScreenToKernel() argument
73 return IFbexMoc::fbexMoc->UnlockScreenToKernel(userId, type, iv, size); in UnlockScreenToKernel()
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/fbex_test/
H A Dfbex_test.cpp124 uint8_t *iv = new uint8_t[PARAMS_SIZE_1]; in HWTEST_F() local
125 ret = fbex.InstallKeyToKernel(userId, type, iv, FBEX_IV_SIZE, flag); in HWTEST_F()
130 ret = fbex.InstallKeyToKernel(userId, type, iv, FBEX_IV_SIZE, flag); in HWTEST_F()
133 delete[] iv; in HWTEST_F()
134 iv = nullptr; in HWTEST_F()
154 uint8_t *iv = new uint8_t[FBEX_IV_SIZE]; in HWTEST_F() local
156 ret = fbex.UninstallOrLockUserKeyToKernel(userId, type, iv, FBEX_IV_SIZE, destroy); in HWTEST_F()
159 delete[] iv; in HWTEST_F()
160 iv = nullptr; in HWTEST_F()
326 uint8_t *iv in HWTEST_F() local
[all...]
/foundation/multimedia/drm_framework/services/drm_service/client/src/
H A Dmedia_decrypt_module_service_proxy.cpp126 DRM_CHECK_AND_RETURN_RET_LOG(data.WriteUint32(cryptInfo.iv.size()), IPC_PROXY_ERR, in DecryptMediaData()
127 "MediaDecryptModuleServiceProxy DecryptMediaData Write cryptInfo.iv size failed."); in DecryptMediaData()
128 DRM_CHECK_AND_RETURN_RET_LOG(cryptInfo.iv.size() <= IV_MAX_LEN, DRM_MEMORY_ERROR, "The size of iv is too large."); in DecryptMediaData()
130 if (cryptInfo.iv.size() != 0) { in DecryptMediaData()
131 DRM_CHECK_AND_RETURN_RET_LOG(data.WriteBuffer(cryptInfo.iv.data(), cryptInfo.iv.size()), IPC_PROXY_ERR, in DecryptMediaData()
132 "MediaDecryptModuleServiceProxy DecryptMediaData Write cryptInfo.iv failed."); in DecryptMediaData()
/foundation/multimedia/av_codec/test/unittest/avcenc_info_test/
H A Dcenc_info_capi_unit_test.cpp124 * @tc.desc: Set keyId and iv
134 uint8_t iv[] = { in HWTEST_F() local
140 errNo = OH_AVCencInfo_SetKeyIdAndIv(cencInfo, keyId, keyIdLen, iv, ivLen); in HWTEST_F()
158 uint8_t iv[] = { in HWTEST_F() local
161 errNo = OH_AVCencInfo_SetKeyIdAndIv(nullptr, keyId, keyIdLen, iv, ivLen); in HWTEST_F()
174 uint8_t iv[] = { in HWTEST_F() local
180 errNo = OH_AVCencInfo_SetKeyIdAndIv(cencInfo, nullptr, keyIdLen, iv, ivLen); in HWTEST_F()
198 uint8_t iv[] = { in HWTEST_F() local
204 errNo = OH_AVCencInfo_SetKeyIdAndIv(cencInfo, keyId, keyIdLen + 1, iv, ivLen); in HWTEST_F()
212 * @tc.desc: Set the null iv
243 uint8_t iv[] = { HWTEST_F() local
386 uint8_t iv[] = { HWTEST_F() local
[all...]
/foundation/communication/dsoftbus/adapter/common/openssl/
H A Dsoftbus_aes_encrypt.c117 AES_cfb128_encrypt(inData->data, outData->data, inData->len, &aes, cipherKey->iv, &num, ENCRYPT_MODE); in OpensslAesCfbEncrypt()
119 AES_cfb128_encrypt(inData->data, outData->data, inData->len, &aes, cipherKey->iv, &num, DECRYPT_MODE); in OpensslAesCfbEncrypt()
138 if (memcpy_s(cipherKey->iv, cipherKey->ivLen, result + AES_SESSION_KEY_LENGTH, in RootKeyGenerateIvAndSessionKey()
140 COMM_LOGE(COMM_ADAPTER, "RootKeyGenerateIvAndSessionKey fill iv failed!"); in RootKeyGenerateIvAndSessionKey()
160 cipherKey->iv = (uint8_t *)SoftBusCalloc(cipherKey->ivLen); in GenerateIvAndSessionKey()
161 if (cipherKey->iv == NULL) { in GenerateIvAndSessionKey()
168 (void)memset_s(cipherKey->iv, cipherKey->ivLen, 0, cipherKey->ivLen); in GenerateIvAndSessionKey()
170 SoftBusFree(cipherKey->iv); in GenerateIvAndSessionKey()
198 (void)memset_s(cipherKey.iv, cipherKey.ivLen, 0, cipherKey.ivLen); in SoftBusAesCfbRootEncrypt()
200 SoftBusFree(cipherKey.iv); in SoftBusAesCfbRootEncrypt()
[all...]
H A Dsoftbus_adapter_crypto.c96 COMM_LOGE(COMM_ADAPTER, "Set iv len fail."); in OpensslEvpInit()
110 if (memcpy_s(cipherText, cipherTextLen - dataLen, cipherkey->iv, GCM_IV_LEN) != EOK) { in PackIvAndTag()
111 COMM_LOGE(COMM_ADAPTER, "EVP memcpy iv fail."); in PackIvAndTag()
144 ret = EVP_EncryptInit_ex(ctx, NULL, NULL, cipherkey->key, cipherkey->iv); in SslAesGcmEncrypt()
166 COMM_LOGE(COMM_ADAPTER, "pack iv and tag fail."); in SslAesGcmEncrypt()
190 ret = EVP_DecryptInit_ex(ctx, NULL, NULL, cipherkey->key, cipherkey->iv); in SslAesGcmDecrypt()
404 if (SoftBusGenerateRandomArray(cipherKey->iv, sizeof(cipherKey->iv)) != SOFTBUS_OK) { in SoftBusEncryptData()
405 COMM_LOGE(COMM_ADAPTER, "generate random iv error."); in SoftBusEncryptData()
423 if (SoftBusGenerateRandomArray(cipherKey->iv, sizeo in SoftBusEncryptDataWithSeq()
[all...]
/foundation/filemanagement/storage_service/services/storage_daemon/include/mock/
H A Dfbex_mock.h30 virtual int InstallKeyToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, uint8_t flag) = 0;
33 virtual int UnlockScreenToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size) = 0;
50 MOCK_METHOD5(InstallKeyToKernel, int(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, uint8_t flag));
53 MOCK_METHOD4(UnlockScreenToKernel, int(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size));
/foundation/multimedia/av_codec/frameworks/native/capi/avcencinfo/
H A Dnative_cencinfo.cpp42 cencInfo_.iv[i] = 0; in OH_AVCencInfo()
115 uint32_t keyIdLen, uint8_t *iv, uint32_t ivLen) in OH_AVCencInfo_SetKeyIdAndIv()
120 CHECK_AND_RETURN_RET_LOG(iv != nullptr, AV_ERR_INVALID_VAL, "input iv is nullptr!"); in OH_AVCencInfo_SetKeyIdAndIv()
132 ret = memcpy_s(cencInfoObject->cencInfo_.iv, sizeof(cencInfoObject->cencInfo_.iv), iv, ivLen); in OH_AVCencInfo_SetKeyIdAndIv()
134 AVCODEC_LOGE("failed to memcpy iv"); in OH_AVCencInfo_SetKeyIdAndIv()
114 OH_AVCencInfo_SetKeyIdAndIv(OH_AVCencInfo *cencInfo, uint8_t *keyId, uint32_t keyIdLen, uint8_t *iv, uint32_t ivLen) OH_AVCencInfo_SetKeyIdAndIv() argument
/foundation/communication/dsoftbus/components/nstackx/nstackx_util/core/
H A Dnstackx_mbedtls.c110 ret = mbedtls_gcm_crypt_and_tag(&aesContext, MBEDTLS_GCM_ENCRYPT, inLen, cryptPara->iv, in MbedAesGcmEncrypt()
122 if (memcpy_s(outBuf + inLen + GCM_TAG_LENGTH, GCM_IV_LENGTH, cryptPara->iv, GCM_IV_LENGTH) != 0) { in MbedAesGcmEncrypt()
143 ret = mbedtls_chachapoly_encrypt_and_tag(&ctx, inLen, cryptPara->iv, in MbedChaChaEncrypt()
156 if (memcpy_s(outBuf + inLen + GCM_TAG_LENGTH, GCM_IV_LENGTH, cryptPara->iv, GCM_IV_LENGTH) != 0) { in MbedChaChaEncrypt()
173 if (GetRandBytes(cryptPara->iv, cryptPara->ivLen) != NSTACKX_EOK) { in AesGcmEncrypt()
174 LOGE(TAG, "get rand iv failed"); in AesGcmEncrypt()
203 ret = mbedtls_gcm_auth_decrypt(&aesContext, inLen - GCM_ADDED_LEN, cryptPara->iv, GCM_IV_LENGTH, in MbedAesGcmDecrypt()
228 ret = mbedtls_chachapoly_encrypt_and_tag(&ctx, inLen - GCM_ADDED_LEN, cryptPara->iv, in MbedChaChaDecrypt()
248 if (memcpy_s(cryptPara->iv, cryptPara->ivLen, inBuf + (inLen - GCM_IV_LENGTH), GCM_IV_LENGTH) != EOK) { in AesGcmDecrypt()
H A Dnstackx_openssl.c106 if (GetRandBytes(cryptPara->iv, cryptPara->ivLen) != NSTACKX_EOK) { in InitEncryptCtx()
107 LOGE(TAG, "get rand iv failed"); in InitEncryptCtx()
111 if (EVP_EncryptInit_ex(cryptPara->ctx, cipher, NULL, cryptPara->key, cryptPara->iv) == 0) { in InitEncryptCtx()
158 if (memcpy_s(outBuf + retLen, outLen - retLen, cryptPara->iv, cryptPara->ivLen) != EOK) { in AesGcmEncryptVec()
159 LOGE(TAG, "pad iv error."); in AesGcmEncryptVec()
184 if (EVP_DecryptInit_ex(cryptPara->ctx, cipher, NULL, cryptPara->key, cryptPara->iv) == 0) { in InitDecryptCtx()
208 if (memcpy_s(cryptPara->iv, cryptPara->ivLen, inBuf + (inLen - GCM_IV_LENGTH), GCM_IV_LENGTH) != EOK) { in AesGcmDecrypt()
/foundation/communication/wifi/wifi/test/wifi_standard/wifi_base/security_utils/
H A Dwifi_openssl_utils_test.cpp50 const uint8_t iv[AES_IV_LEN] = {0xa8, 0x2b, 0xce, 0x21, 0xa8, 0x2b, 0xce, 0x21, 0xa8, 0x2b, 0xce, 0x21}; member
61 memcpy_s(info.iv, AES_IV_LEN, iv, AES_IV_LEN); in HWTEST_F()
/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/
H A Dfbex.h51 static int InstallKeyToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, uint8_t flag);
52 static int UninstallOrLockUserKeyToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, bool destroy);
54 static int UnlockScreenToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size);
H A Dfscrypt_key_v1_ext.h34 bool ActiveKeyExt(uint32_t flag, uint8_t *iv, uint32_t size, uint32_t &elType);
37 bool UnlockUserScreenExt(uint32_t flag, uint8_t *iv, uint32_t size);
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/mock/
H A Dfscrypt_key_v1_ext_mock.cpp32 bool FscryptKeyV1Ext::ActiveKeyExt(uint32_t flag, uint8_t *iv, uint32_t size, uint32_t &elType) in ActiveKeyExt() argument
42 bool FscryptKeyV1Ext::UnlockUserScreenExt(uint32_t flag, uint8_t *iv, uint32_t size) in UnlockUserScreenExt() argument
44 return IFscryptKeyV1Ext::fscryptKeyV1ExtMock->UnlockUserScreenExt(flag, iv, size); in UnlockUserScreenExt()
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/gaussdb_rd/src/interface/src/
H A Ddocument_key.cpp35 uint16_t iv = g_oIdIncNum++; in InitDocIdFromOid() local
41 if (sprintf_s(idTemp, GRD_DOC_OID_HEX_SIZE + 1, "%08x%04x", now, iv) < 0) { in InitDocIdFromOid()
/foundation/communication/dsoftbus/adapter/common/mbedtls/
H A Dsoftbus_adapter_crypto.c98 ret = mbedtls_gcm_crypt_and_tag(&aesContext, MBEDTLS_GCM_ENCRYPT, plainTextSize, cipherKey->iv, GCM_IV_LEN, NULL, 0, in MbedAesGcmEncrypt()
105 if (memcpy_s(cipherText, cipherTextLen, cipherKey->iv, GCM_IV_LEN) != EOK) { in MbedAesGcmEncrypt()
140 ret = mbedtls_gcm_auth_decrypt(&aesContext, cipherTextSize - OVERHEAD_LEN, cipherKey->iv, GCM_IV_LEN, NULL, 0, in MbedAesGcmDecrypt()
276 if (SoftBusGenerateRandomArray(cipherKey->iv, sizeof(cipherKey->iv)) != SOFTBUS_OK) { in SoftBusEncryptData()
277 COMM_LOGE(COMM_ADAPTER, "generate random iv error."); in SoftBusEncryptData()
295 if (SoftBusGenerateRandomArray(cipherKey->iv, sizeof(cipherKey->iv)) != SOFTBUS_OK) { in SoftBusEncryptDataWithSeq()
296 COMM_LOGE(COMM_ADAPTER, "generate random iv error."); in SoftBusEncryptDataWithSeq()
299 if (memcpy_s(cipherKey->iv, sizeo in SoftBusEncryptDataWithSeq()
[all...]
/foundation/communication/dsoftbus/adapter/common/include/
H A Dsoftbus_adapter_crypto.h56 unsigned char iv[GCM_IV_LEN]; member
62 unsigned char iv[BLE_BROADCAST_IV_LEN]; member
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/fscrypt_key_v1_ext_test/
H A Dfscrypt_key_v1_ext_test.cpp158 uint8_t iv = 1; in HWTEST_F() local
165 EXPECT_EQ(ext.ActiveKeyExt(0, &iv, size, elType), true); in HWTEST_F()
170 EXPECT_EQ(ext.ActiveKeyExt(0, &iv, size, elType), false); in HWTEST_F()
175 EXPECT_EQ(ext.ActiveKeyExt(0, &iv, size, elType), true); in HWTEST_F()
189 uint8_t iv = 1; in HWTEST_F() local
195 EXPECT_EQ(ext.UnlockUserScreenExt(0, &iv, size), true); in HWTEST_F()
199 EXPECT_EQ(ext.UnlockUserScreenExt(0, &iv, size), true); in HWTEST_F()
203 EXPECT_EQ(ext.UnlockUserScreenExt(0, &iv, size), false); in HWTEST_F()
/foundation/CastEngine/castengine_cast_plus_stream/src/utils/include/
H A Dencrypt_decrypt.h38 ConstPacketData iv; member
107 void GetAESIv(uint8_t iv[], int ivLen);
/foundation/CastEngine/castengine_cast_framework/service/src/session/src/utils/include/
H A Dencrypt_decrypt.h38 ConstPacketData iv; member
107 void GetAESIv(uint8_t iv[], int ivLen);
/foundation/multimedia/drm_framework/services/drm_service/server/src/
H A Dmedia_decrypt_module_service.cpp106 CastToHexString(cryptInfoTmp.keyId), CastToHexString(cryptInfoTmp.iv)); in DecryptMediaData()
118 cryptInfoTmp.iv.assign(cryptInfo.iv.begin(), cryptInfo.iv.end()); in SetCryptInfo()

Completed in 17 milliseconds

123