/foundation/CastEngine/castengine_cast_plus_stream/src/utils/src/ |
H A D | encrypt_decrypt.cpp | 41 void EncryptDecrypt::GetAESIv(uint8_t iv[], int ivLen) in GetAESIv() argument 44 if (iv == nullptr || ivLen < AES_KEY_SIZE) { in GetAESIv() 45 CLOGE("iv is null or ivLen error"); in GetAESIv() 48 errno_t ret = memset_s(iv, ivLen, 0, ivLen); in GetAESIv() 58 ret = memcpy_s(iv, ivLen, buffer, ivLen); in GetAESIv() 70 const uint8_t *iv = sessionIV.data; in AES128Encry() local 71 if ((inputData.data == nullptr) || (outputData.data == nullptr) || (key == nullptr) || (iv == nullptr) in AES128Encry() 81 int ret = EVP_EncryptInit_ex(ctx, EVP_aes_128_ctr(), nullptr, key, iv); in AES128Encry() 117 const uint8_t *iv = sessionIV.data; in AES128Decrypt() local 118 if ((outputData.data == nullptr) || (inputData.data == nullptr) || (key == nullptr) || (iv in AES128Decrypt() 422 ConstPacketData iv = { sessionIV, AES_IV_LEN }; EncryptData() local 474 ConstPacketData iv = { sessionIV, AES_IV_LEN }; DecryptData() local [all...] |
/foundation/CastEngine/castengine_cast_framework/service/src/session/src/utils/src/ |
H A D | encrypt_decrypt.cpp | 41 void EncryptDecrypt::GetAESIv(uint8_t iv[], int ivLen)
in GetAESIv() argument 44 if (iv == nullptr || ivLen < AES_KEY_SIZE) {
in GetAESIv() 45 CLOGE("iv is null or ivLen error");
in GetAESIv() 48 errno_t ret = memset_s(iv, ivLen, 0, ivLen);
in GetAESIv() 58 ret = memcpy_s(iv, ivLen, buffer, ivLen);
in GetAESIv() 70 const uint8_t *iv = sessionIV.data;
in AES128Encry() local 71 if ((inputData.data == nullptr) || (outputData.data == nullptr) || (key == nullptr) || (iv == nullptr)
in AES128Encry() 81 int ret = EVP_EncryptInit_ex(ctx, EVP_aes_128_ctr(), nullptr, key, iv);
in AES128Encry() 117 const uint8_t *iv = sessionIV.data;
in AES128Decrypt() local 118 if ((outputData.data == nullptr) || (inputData.data == nullptr) || (key == nullptr) || (iv in AES128Decrypt() 422 ConstPacketData iv = { sessionIV, AES_IV_LEN }; EncryptData() local 474 ConstPacketData iv = { sessionIV, AES_IV_LEN }; DecryptData() local [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/ |
H A D | fbex.cpp | 64 uint8_t iv[OHOS::StorageDaemon::FBEX_IV_SIZE] = {0}; member 126 static inline bool CheckIvValid(const uint8_t *iv, uint32_t size) in CheckIvValid() argument 128 return (iv != nullptr) && (size == FBEX_IV_SIZE); in CheckIvValid() 190 int FBEX::InstallKeyToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, uint8_t flag) in InstallKeyToKernel() argument 193 if (!CheckIvValid(iv, size)) { in InstallKeyToKernel() 210 auto err = memcpy_s(ops.iv, sizeof(ops.iv), iv, size); in InstallKeyToKernel() 224 auto errops = memcpy_s(iv, size, ops.iv, sizeo in InstallKeyToKernel() 234 UninstallOrLockUserKeyToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, bool destroy) UninstallOrLockUserKeyToKernel() argument 444 UnlockScreenToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size) UnlockScreenToKernel() argument [all...] |
/foundation/ai/ai_engine/test/common/queuepool/ |
H A D | queuepool_test.cpp | 218 int iv = TEST_QUEUE_SINGLE_ELEMENT; in HWTEST_F() local 219 queue->PushBack(iv); in HWTEST_F() 277 int iv = TEST_QUEUE_SINGLE_ELEMENT; in HWTEST_F() local 278 queue->PushBack(iv); in HWTEST_F() 297 int iv = TEST_QUEUE_SINGLE_ELEMENT; in HWTEST_F() local 298 int result = queue->PushBack(iv); in HWTEST_F() 323 int iv = TEST_QUEUE_SINGLE_ELEMENT; in HWTEST_F() local 324 result = queue->PushBack(iv); in HWTEST_F() 343 int iv; in HWTEST_F() local 344 int result = queue->PopFront(iv); in HWTEST_F() 363 int iv = TEST_QUEUE_SINGLE_ELEMENT; HWTEST_F() local 391 int iv = 0; HWTEST_F() local 464 int iv; HWTEST_F() local [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/mock/ |
H A D | fbex_mock.cpp | 33 int FBEX::InstallKeyToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, uint8_t flag) in InstallKeyToKernel() argument 35 return IFbexMoc::fbexMoc->InstallKeyToKernel(userId, type, iv, size, flag); in InstallKeyToKernel() 38 int FBEX::UninstallOrLockUserKeyToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, bool destroy) in UninstallOrLockUserKeyToKernel() argument 40 return IFbexMoc::fbexMoc->UninstallOrLockUserKeyToKernel(userId, type, iv, size, destroy); in UninstallOrLockUserKeyToKernel() 71 int FBEX::UnlockScreenToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size) in UnlockScreenToKernel() argument 73 return IFbexMoc::fbexMoc->UnlockScreenToKernel(userId, type, iv, size); in UnlockScreenToKernel()
|
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/fbex_test/ |
H A D | fbex_test.cpp | 124 uint8_t *iv = new uint8_t[PARAMS_SIZE_1]; in HWTEST_F() local 125 ret = fbex.InstallKeyToKernel(userId, type, iv, FBEX_IV_SIZE, flag); in HWTEST_F() 130 ret = fbex.InstallKeyToKernel(userId, type, iv, FBEX_IV_SIZE, flag); in HWTEST_F() 133 delete[] iv; in HWTEST_F() 134 iv = nullptr; in HWTEST_F() 154 uint8_t *iv = new uint8_t[FBEX_IV_SIZE]; in HWTEST_F() local 156 ret = fbex.UninstallOrLockUserKeyToKernel(userId, type, iv, FBEX_IV_SIZE, destroy); in HWTEST_F() 159 delete[] iv; in HWTEST_F() 160 iv = nullptr; in HWTEST_F() 326 uint8_t *iv in HWTEST_F() local [all...] |
/foundation/multimedia/drm_framework/services/drm_service/client/src/ |
H A D | media_decrypt_module_service_proxy.cpp | 126 DRM_CHECK_AND_RETURN_RET_LOG(data.WriteUint32(cryptInfo.iv.size()), IPC_PROXY_ERR,
in DecryptMediaData() 127 "MediaDecryptModuleServiceProxy DecryptMediaData Write cryptInfo.iv size failed.");
in DecryptMediaData() 128 DRM_CHECK_AND_RETURN_RET_LOG(cryptInfo.iv.size() <= IV_MAX_LEN, DRM_MEMORY_ERROR, "The size of iv is too large.");
in DecryptMediaData() 130 if (cryptInfo.iv.size() != 0) {
in DecryptMediaData() 131 DRM_CHECK_AND_RETURN_RET_LOG(data.WriteBuffer(cryptInfo.iv.data(), cryptInfo.iv.size()), IPC_PROXY_ERR,
in DecryptMediaData() 132 "MediaDecryptModuleServiceProxy DecryptMediaData Write cryptInfo.iv failed.");
in DecryptMediaData()
|
/foundation/multimedia/av_codec/test/unittest/avcenc_info_test/ |
H A D | cenc_info_capi_unit_test.cpp | 124 * @tc.desc: Set keyId and iv 134 uint8_t iv[] = { in HWTEST_F() local 140 errNo = OH_AVCencInfo_SetKeyIdAndIv(cencInfo, keyId, keyIdLen, iv, ivLen); in HWTEST_F() 158 uint8_t iv[] = { in HWTEST_F() local 161 errNo = OH_AVCencInfo_SetKeyIdAndIv(nullptr, keyId, keyIdLen, iv, ivLen); in HWTEST_F() 174 uint8_t iv[] = { in HWTEST_F() local 180 errNo = OH_AVCencInfo_SetKeyIdAndIv(cencInfo, nullptr, keyIdLen, iv, ivLen); in HWTEST_F() 198 uint8_t iv[] = { in HWTEST_F() local 204 errNo = OH_AVCencInfo_SetKeyIdAndIv(cencInfo, keyId, keyIdLen + 1, iv, ivLen); in HWTEST_F() 212 * @tc.desc: Set the null iv 243 uint8_t iv[] = { HWTEST_F() local 386 uint8_t iv[] = { HWTEST_F() local [all...] |
/foundation/communication/dsoftbus/adapter/common/openssl/ |
H A D | softbus_aes_encrypt.c | 117 AES_cfb128_encrypt(inData->data, outData->data, inData->len, &aes, cipherKey->iv, &num, ENCRYPT_MODE); in OpensslAesCfbEncrypt() 119 AES_cfb128_encrypt(inData->data, outData->data, inData->len, &aes, cipherKey->iv, &num, DECRYPT_MODE); in OpensslAesCfbEncrypt() 138 if (memcpy_s(cipherKey->iv, cipherKey->ivLen, result + AES_SESSION_KEY_LENGTH, in RootKeyGenerateIvAndSessionKey() 140 COMM_LOGE(COMM_ADAPTER, "RootKeyGenerateIvAndSessionKey fill iv failed!"); in RootKeyGenerateIvAndSessionKey() 160 cipherKey->iv = (uint8_t *)SoftBusCalloc(cipherKey->ivLen); in GenerateIvAndSessionKey() 161 if (cipherKey->iv == NULL) { in GenerateIvAndSessionKey() 168 (void)memset_s(cipherKey->iv, cipherKey->ivLen, 0, cipherKey->ivLen); in GenerateIvAndSessionKey() 170 SoftBusFree(cipherKey->iv); in GenerateIvAndSessionKey() 198 (void)memset_s(cipherKey.iv, cipherKey.ivLen, 0, cipherKey.ivLen); in SoftBusAesCfbRootEncrypt() 200 SoftBusFree(cipherKey.iv); in SoftBusAesCfbRootEncrypt() [all...] |
H A D | softbus_adapter_crypto.c | 96 COMM_LOGE(COMM_ADAPTER, "Set iv len fail."); in OpensslEvpInit() 110 if (memcpy_s(cipherText, cipherTextLen - dataLen, cipherkey->iv, GCM_IV_LEN) != EOK) { in PackIvAndTag() 111 COMM_LOGE(COMM_ADAPTER, "EVP memcpy iv fail."); in PackIvAndTag() 144 ret = EVP_EncryptInit_ex(ctx, NULL, NULL, cipherkey->key, cipherkey->iv); in SslAesGcmEncrypt() 166 COMM_LOGE(COMM_ADAPTER, "pack iv and tag fail."); in SslAesGcmEncrypt() 190 ret = EVP_DecryptInit_ex(ctx, NULL, NULL, cipherkey->key, cipherkey->iv); in SslAesGcmDecrypt() 404 if (SoftBusGenerateRandomArray(cipherKey->iv, sizeof(cipherKey->iv)) != SOFTBUS_OK) { in SoftBusEncryptData() 405 COMM_LOGE(COMM_ADAPTER, "generate random iv error."); in SoftBusEncryptData() 423 if (SoftBusGenerateRandomArray(cipherKey->iv, sizeo in SoftBusEncryptDataWithSeq() [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/include/mock/ |
H A D | fbex_mock.h | 30 virtual int InstallKeyToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, uint8_t flag) = 0; 33 virtual int UnlockScreenToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size) = 0; 50 MOCK_METHOD5(InstallKeyToKernel, int(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, uint8_t flag)); 53 MOCK_METHOD4(UnlockScreenToKernel, int(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size));
|
/foundation/multimedia/av_codec/frameworks/native/capi/avcencinfo/ |
H A D | native_cencinfo.cpp | 42 cencInfo_.iv[i] = 0; in OH_AVCencInfo() 115 uint32_t keyIdLen, uint8_t *iv, uint32_t ivLen) in OH_AVCencInfo_SetKeyIdAndIv() 120 CHECK_AND_RETURN_RET_LOG(iv != nullptr, AV_ERR_INVALID_VAL, "input iv is nullptr!"); in OH_AVCencInfo_SetKeyIdAndIv() 132 ret = memcpy_s(cencInfoObject->cencInfo_.iv, sizeof(cencInfoObject->cencInfo_.iv), iv, ivLen); in OH_AVCencInfo_SetKeyIdAndIv() 134 AVCODEC_LOGE("failed to memcpy iv"); in OH_AVCencInfo_SetKeyIdAndIv() 114 OH_AVCencInfo_SetKeyIdAndIv(OH_AVCencInfo *cencInfo, uint8_t *keyId, uint32_t keyIdLen, uint8_t *iv, uint32_t ivLen) OH_AVCencInfo_SetKeyIdAndIv() argument
|
/foundation/communication/dsoftbus/components/nstackx/nstackx_util/core/ |
H A D | nstackx_mbedtls.c | 110 ret = mbedtls_gcm_crypt_and_tag(&aesContext, MBEDTLS_GCM_ENCRYPT, inLen, cryptPara->iv, in MbedAesGcmEncrypt() 122 if (memcpy_s(outBuf + inLen + GCM_TAG_LENGTH, GCM_IV_LENGTH, cryptPara->iv, GCM_IV_LENGTH) != 0) { in MbedAesGcmEncrypt() 143 ret = mbedtls_chachapoly_encrypt_and_tag(&ctx, inLen, cryptPara->iv, in MbedChaChaEncrypt() 156 if (memcpy_s(outBuf + inLen + GCM_TAG_LENGTH, GCM_IV_LENGTH, cryptPara->iv, GCM_IV_LENGTH) != 0) { in MbedChaChaEncrypt() 173 if (GetRandBytes(cryptPara->iv, cryptPara->ivLen) != NSTACKX_EOK) { in AesGcmEncrypt() 174 LOGE(TAG, "get rand iv failed"); in AesGcmEncrypt() 203 ret = mbedtls_gcm_auth_decrypt(&aesContext, inLen - GCM_ADDED_LEN, cryptPara->iv, GCM_IV_LENGTH, in MbedAesGcmDecrypt() 228 ret = mbedtls_chachapoly_encrypt_and_tag(&ctx, inLen - GCM_ADDED_LEN, cryptPara->iv, in MbedChaChaDecrypt() 248 if (memcpy_s(cryptPara->iv, cryptPara->ivLen, inBuf + (inLen - GCM_IV_LENGTH), GCM_IV_LENGTH) != EOK) { in AesGcmDecrypt()
|
H A D | nstackx_openssl.c | 106 if (GetRandBytes(cryptPara->iv, cryptPara->ivLen) != NSTACKX_EOK) { in InitEncryptCtx() 107 LOGE(TAG, "get rand iv failed"); in InitEncryptCtx() 111 if (EVP_EncryptInit_ex(cryptPara->ctx, cipher, NULL, cryptPara->key, cryptPara->iv) == 0) { in InitEncryptCtx() 158 if (memcpy_s(outBuf + retLen, outLen - retLen, cryptPara->iv, cryptPara->ivLen) != EOK) { in AesGcmEncryptVec() 159 LOGE(TAG, "pad iv error."); in AesGcmEncryptVec() 184 if (EVP_DecryptInit_ex(cryptPara->ctx, cipher, NULL, cryptPara->key, cryptPara->iv) == 0) { in InitDecryptCtx() 208 if (memcpy_s(cryptPara->iv, cryptPara->ivLen, inBuf + (inLen - GCM_IV_LENGTH), GCM_IV_LENGTH) != EOK) { in AesGcmDecrypt()
|
/foundation/communication/wifi/wifi/test/wifi_standard/wifi_base/security_utils/ |
H A D | wifi_openssl_utils_test.cpp | 50 const uint8_t iv[AES_IV_LEN] = {0xa8, 0x2b, 0xce, 0x21, 0xa8, 0x2b, 0xce, 0x21, 0xa8, 0x2b, 0xce, 0x21};
member 61 memcpy_s(info.iv, AES_IV_LEN, iv, AES_IV_LEN);
in HWTEST_F()
|
/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/ |
H A D | fbex.h | 51 static int InstallKeyToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, uint8_t flag); 52 static int UninstallOrLockUserKeyToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size, bool destroy); 54 static int UnlockScreenToKernel(uint32_t userId, uint32_t type, uint8_t *iv, uint32_t size);
|
H A D | fscrypt_key_v1_ext.h | 34 bool ActiveKeyExt(uint32_t flag, uint8_t *iv, uint32_t size, uint32_t &elType); 37 bool UnlockUserScreenExt(uint32_t flag, uint8_t *iv, uint32_t size);
|
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/mock/ |
H A D | fscrypt_key_v1_ext_mock.cpp | 32 bool FscryptKeyV1Ext::ActiveKeyExt(uint32_t flag, uint8_t *iv, uint32_t size, uint32_t &elType) in ActiveKeyExt() argument 42 bool FscryptKeyV1Ext::UnlockUserScreenExt(uint32_t flag, uint8_t *iv, uint32_t size) in UnlockUserScreenExt() argument 44 return IFscryptKeyV1Ext::fscryptKeyV1ExtMock->UnlockUserScreenExt(flag, iv, size); in UnlockUserScreenExt()
|
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/gaussdb_rd/src/interface/src/ |
H A D | document_key.cpp | 35 uint16_t iv = g_oIdIncNum++; in InitDocIdFromOid() local 41 if (sprintf_s(idTemp, GRD_DOC_OID_HEX_SIZE + 1, "%08x%04x", now, iv) < 0) { in InitDocIdFromOid()
|
/foundation/communication/dsoftbus/adapter/common/mbedtls/ |
H A D | softbus_adapter_crypto.c | 98 ret = mbedtls_gcm_crypt_and_tag(&aesContext, MBEDTLS_GCM_ENCRYPT, plainTextSize, cipherKey->iv, GCM_IV_LEN, NULL, 0, in MbedAesGcmEncrypt() 105 if (memcpy_s(cipherText, cipherTextLen, cipherKey->iv, GCM_IV_LEN) != EOK) { in MbedAesGcmEncrypt() 140 ret = mbedtls_gcm_auth_decrypt(&aesContext, cipherTextSize - OVERHEAD_LEN, cipherKey->iv, GCM_IV_LEN, NULL, 0, in MbedAesGcmDecrypt() 276 if (SoftBusGenerateRandomArray(cipherKey->iv, sizeof(cipherKey->iv)) != SOFTBUS_OK) { in SoftBusEncryptData() 277 COMM_LOGE(COMM_ADAPTER, "generate random iv error."); in SoftBusEncryptData() 295 if (SoftBusGenerateRandomArray(cipherKey->iv, sizeof(cipherKey->iv)) != SOFTBUS_OK) { in SoftBusEncryptDataWithSeq() 296 COMM_LOGE(COMM_ADAPTER, "generate random iv error."); in SoftBusEncryptDataWithSeq() 299 if (memcpy_s(cipherKey->iv, sizeo in SoftBusEncryptDataWithSeq() [all...] |
/foundation/communication/dsoftbus/adapter/common/include/ |
H A D | softbus_adapter_crypto.h | 56 unsigned char iv[GCM_IV_LEN]; member 62 unsigned char iv[BLE_BROADCAST_IV_LEN]; member
|
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/fscrypt_key_v1_ext_test/ |
H A D | fscrypt_key_v1_ext_test.cpp | 158 uint8_t iv = 1; in HWTEST_F() local 165 EXPECT_EQ(ext.ActiveKeyExt(0, &iv, size, elType), true); in HWTEST_F() 170 EXPECT_EQ(ext.ActiveKeyExt(0, &iv, size, elType), false); in HWTEST_F() 175 EXPECT_EQ(ext.ActiveKeyExt(0, &iv, size, elType), true); in HWTEST_F() 189 uint8_t iv = 1; in HWTEST_F() local 195 EXPECT_EQ(ext.UnlockUserScreenExt(0, &iv, size), true); in HWTEST_F() 199 EXPECT_EQ(ext.UnlockUserScreenExt(0, &iv, size), true); in HWTEST_F() 203 EXPECT_EQ(ext.UnlockUserScreenExt(0, &iv, size), false); in HWTEST_F()
|
/foundation/CastEngine/castengine_cast_plus_stream/src/utils/include/ |
H A D | encrypt_decrypt.h | 38 ConstPacketData iv; member 107 void GetAESIv(uint8_t iv[], int ivLen);
|
/foundation/CastEngine/castengine_cast_framework/service/src/session/src/utils/include/ |
H A D | encrypt_decrypt.h | 38 ConstPacketData iv;
member 107 void GetAESIv(uint8_t iv[], int ivLen);
|
/foundation/multimedia/drm_framework/services/drm_service/server/src/ |
H A D | media_decrypt_module_service.cpp | 106 CastToHexString(cryptInfoTmp.keyId), CastToHexString(cryptInfoTmp.iv));
in DecryptMediaData() 118 cryptInfoTmp.iv.assign(cryptInfo.iv.begin(), cryptInfo.iv.end());
in SetCryptInfo()
|