Home
last modified time | relevance | path

Searched refs:plain (Results 1 - 25 of 28) sorted by relevance

12

/base/security/device_auth/frameworks/deviceauth_lite/source/auth_info/
H A Dremove_auth_info_client.c76 struct uint8_buff plain = { NULL, 0, 0 }; in build_remove_request_data() local
98 plain.val = tmp; in build_remove_request_data()
99 plain.length = strlen((const char *)tmp); in build_remove_request_data()
100 plain.size = plain.length + 1; in build_remove_request_data()
111 &plain, "hichain_remove_info_request", &payload); in build_remove_request_data()
125 struct uint8_buff plain = { 0, 0, 0 }; in parse_remove_response_data() local
127 &receive->cipher, "hichain_remove_info_response", &plain); in parse_remove_response_data()
129 (void)memset_s(plain.val, plain in parse_remove_response_data()
[all...]
H A Dauth_info.c75 int32_t encrypt_payload(const struct var_buffer *key, const struct uint8_buff *plain, in encrypt_payload() argument
84 int32_t ret = aes_gcm_encrypt((struct var_buffer *)key, plain, &aes_aad, payload); in encrypt_payload()
94 const char *aad, struct uint8_buff *plain) in decrypt_payload()
96 plain->val = (uint8_t *)MALLOC(HC_AUTH_DECRYPT_LEN); in decrypt_payload()
97 if (plain->val == NULL) { in decrypt_payload()
101 plain->size = HC_AUTH_DECRYPT_LEN; in decrypt_payload()
102 plain->length = 0; in decrypt_payload()
103 (void)memset_s(plain->val, plain->size, 0, plain in decrypt_payload()
93 decrypt_payload(const struct var_buffer *key, const struct uint8_buff *payload, const char *aad, struct uint8_buff *plain) decrypt_payload() argument
[all...]
H A Dexchange_auth_info_client.c99 struct uint8_buff plain = { 0, 0, 0 }; in parse_exchange_response_data() local
100 int32_t ret = decrypt_payload((struct var_buffer *)key, &receive->cipher, HICHAIN_EXCHANGE_RESPONSE, &plain); in parse_exchange_response_data()
107 ret = get_field_from_request_payload(&plain, &sign_result, &cache->auth_id, &cache->ltpk); in parse_exchange_response_data()
110 (void)memset_s(plain.val, plain.size, 0, plain.size); in parse_exchange_response_data()
111 FREE(plain.val); in parse_exchange_response_data()
114 struct uint8_buff *auth_info = &plain; in parse_exchange_response_data()
116 (void)memset_s(plain.val, plain in parse_exchange_response_data()
153 struct uint8_buff plain; build_exchange_request() local
[all...]
H A Dremove_auth_info.c78 struct uint8_buff plain = { 0, 0, 0 }; in parse_remove_request_data() local
80 HICHAIN_REMOVE_INFO_REQUEST, &plain); in parse_remove_request_data()
85 ret = get_field_from_request_payload(&plain, &cache->user_type, &cache->auth_id); in parse_remove_request_data()
86 (void)memset_s(plain.val, plain.size, 0, plain.size); in parse_remove_request_data()
87 FREE(plain.val); in parse_remove_request_data()
88 plain.val = NULL; in parse_remove_request_data()
101 struct uint8_buff plain = { in build_remove_response_data() local
108 int32_t ret = encrypt_payload((const struct var_buffer *)key, &plain, in build_remove_response_data()
[all...]
/base/security/asset/test/unittest/module_test/src/
H A Dhuks_wrapper_test.cpp107 uint8_t plain[6 + TAG_SIZE + NONCE_SIZE] = { 0 }; in HWTEST_F() local
108 struct HksBlob outData = { 6 + TAG_SIZE + NONCE_SIZE, plain }; in HWTEST_F()
132 uint8_t plain[6 + TAG_SIZE + NONCE_SIZE] = { 0 }; in HWTEST_F() local
133 struct HksBlob outData = { 6 + TAG_SIZE + NONCE_SIZE, plain }; in HWTEST_F()
/base/security/huks/frameworks/crypto_lite/cipher/src/
H A Dcipher_rsa.c322 static int32_t RsaEncrypt(RsaKeyData *key, const RsaData *plain, RsaData *cipher) in RsaEncrypt() argument
348 size_t count = plain->length / rsaContentLen; in RsaEncrypt()
349 size_t remain = plain->length % rsaContentLen; in RsaEncrypt()
357 if (RsaEncryptMultipleBlock(rsa, plain->data, cipher->data, cipher->length) != 0) { in RsaEncrypt()
385 static int32_t RsaPkcs1Decrypt(mbedtls_rsa_context *rsa, size_t rsaLen, RsaData *cipher, RsaData *plain) in RsaPkcs1Decrypt() argument
418 if (memcpy_s(plain->data + totalPlainLen, plain->length - totalPlainLen, buf, plainLen)) { in RsaPkcs1Decrypt()
427 plain->length = totalPlainLen; in RsaPkcs1Decrypt()
440 static int32_t RsaDecrypt(RsaKeyData *key, RsaData *cipher, RsaData *plain) in RsaDecrypt() argument
446 if (plain in RsaDecrypt()
[all...]
/base/security/device_auth/frameworks/deviceauth_lite/inc/auth_info/
H A Dauth_info.h59 int32_t encrypt_payload(const struct var_buffer *key, const struct uint8_buff *plain,
62 const char *aad, struct uint8_buff *plain);
/base/security/device_auth/frameworks/deviceauth_lite/test/unittest/
H A Dauth_info_test.h63 int32_t encrypt_payload(const struct var_buffer *key, const struct uint8_buff *plain,
66 const char *aad, struct uint8_buff *plain);
H A Dhuks_adapter_test.h266 * @param plain: data to be encrypted
271 int32_t aes_gcm_encrypt(struct var_buffer *key, const struct uint8_buff *plain,
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/
H A Dhks_sm4_cipher_test_common.cpp96 uint8_t plain[SM4_COMMON_SIZE] = {0}; in HksSm4CipherTestCaseOther() local
97 struct HksBlob plainText = { SM4_COMMON_SIZE, plain }; in HksSm4CipherTestCaseOther()
160 uint8_t plain[SM4_COMMON_SIZE] = {0}; in HksSm4CipherTestCaseGcm() local
161 struct HksBlob plainText = { SM4_COMMON_SIZE, plain }; in HksSm4CipherTestCaseGcm()
H A Dhks_cross_test.cpp81 uint8_t plain[CROSS_COMMON_SIZE] = {0}; in HWTEST_F() local
82 struct HksBlob plainText = { CROSS_COMMON_SIZE, plain }; in HWTEST_F()
124 uint8_t plain[CROSS_COMMON_SIZE] = {0}; in HWTEST_F() local
125 struct HksBlob plainText = { CROSS_COMMON_SIZE, plain }; in HWTEST_F()
171 uint8_t plain[CROSS_COMMON_SIZE] = {0}; in HWTEST_F() local
172 struct HksBlob plainText = { CROSS_COMMON_SIZE, plain }; in HWTEST_F()
219 uint8_t plain[CROSS_COMMON_SIZE] = {0}; in HWTEST_F() local
220 struct HksBlob plainText = { CROSS_COMMON_SIZE, plain }; in HWTEST_F()
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/symmetric_alg_test/
H A Dhks_aes_cipher_test_common.cpp181 uint8_t plain[AES_COMMON_SIZE] = {0}; in HksAesCipherTestCaseOther() local
182 struct HksBlob plainText = { AES_COMMON_SIZE, plain }; in HksAesCipherTestCaseOther()
237 uint8_t plain[AES_COMMON_SIZE] = {0}; in HksAesCipherTestCaseGcm2() local
238 struct HksBlob plainText = { AES_COMMON_SIZE, plain }; in HksAesCipherTestCaseGcm2()
300 uint8_t plain[AES_COMMON_SIZE] = {0}; in HksAesCipherTestCaseGcm3() local
301 struct HksBlob plainText = { AES_COMMON_SIZE, plain }; in HksAesCipherTestCaseGcm3()
378 uint8_t plain[AES_COMMON_SIZE] = {0}; in HksAesCipherTestCaseGcm4() local
379 struct HksBlob plainText = { AES_COMMON_SIZE, plain }; in HksAesCipherTestCaseGcm4()
545 uint8_t plain[AES_COMMON_SIZE] = {0};
546 struct HksBlob plainText = { AES_COMMON_SIZE, plain };
[all...]
/base/web/webview/ohos_interface/ohos_glue/ohos_adapter/bridge/webview/
H A Dark_paste_data_record_adapter_impl.cpp35 std::shared_ptr<std::string>* plain = static_cast<std::shared_ptr<std::string>*>(plainText); in NewRecord() local
37 NWeb::PasteDataRecordAdapter::NewRecord(ArkWebStringStructToClass(mimeType), *html, *plain); in NewRecord()
/base/security/asset/services/crypto_manager/src/
H A Dcrypto.rs145 let mut plain: Vec<u8> = vec![0; cipher.len() - TAG_SIZE - NONCE_SIZE]; in decrypt() variables
149 let mut out_data = OutBlob { size: plain.len() as u32, data: plain.as_mut_ptr() }; in decrypt()
161 SUCCESS => Ok(plain), in decrypt()
/base/telephony/core_service/utils/common/src/
H A Dtel_aes_crypto_util.cpp278 uint8_t *plain = (uint8_t *)calloc(decryptDataPair.second, sizeof(uint8_t)); in AesCryptoDecryptInner() local
279 if (plain == nullptr) { in AesCryptoDecryptInner()
284 struct HksBlob plainText = { decryptDataPair.second, plain }; in AesCryptoDecryptInner()
289 free(plain); in AesCryptoDecryptInner()
294 free(plain); in AesCryptoDecryptInner()
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/asymmetric_alg_test/
H A Dhks_rsa_cipher_test_common.cpp137 uint8_t plain[Unittest::RsaCipher::RSA_COMMON_SIZE] = {0}; in HksRsaCipherTestCase() local
138 struct HksBlob plainText = { Unittest::RsaCipher::RSA_COMMON_SIZE, plain }; in HksRsaCipherTestCase()
H A Dhks_sm2_cipher_test.cpp466 uint8_t plain[SM2_COMMON_SIZE] = {0}; in HksSm2CipherTestRun() local
467 struct HksBlob plainText = { SM2_COMMON_SIZE, plain }; in HksSm2CipherTestRun()
671 uint8_t plain[SM2_COMMON_SIZE] = {0}; in HksSm2CipherTestRunByNdk() local
672 struct OH_Huks_Blob plainText = { SM2_COMMON_SIZE, plain }; in HksSm2CipherTestRunByNdk()
/base/web/webview/ohos_adapter/keystore_adapter/src/
H A Dkeystore_adapter_impl.cpp195 uint8_t plain[AES_COMMON_SIZE] = {0}; in DecryptKey() local
196 struct HksBlob plainText = {AES_COMMON_SIZE, plain}; in DecryptKey()
/base/security/device_auth/frameworks/deviceauth_lite/inc/huks_adapter/
H A Dhuks_adapter.h262 * @param plain: data to be encrypted
267 int32_t aes_gcm_encrypt(struct var_buffer *key, const struct uint8_buff *plain,
/base/security/device_auth/deps_adapter/key_management_adapter/interfaces/
H A Dalg_defs.h105 typedef int32_t (*AesGcmEncryptFunc)(const KeyParams *keyParams, const Uint8Buff *plain, const GcmParam *encryptInfo,
/base/security/device_auth/frameworks/deviceauth_lite/source/key_agreement/
H A Dsts_client.c369 struct uint8_buff plain = {request_sign.signature, request_sign.length, request_sign.length}; in build_end_request_data() local
370 ret = aes_gcm_encrypt((struct var_buffer *)&sts_client->session_key, &plain, &aes_aad, &out_auth_data); in build_end_request_data()
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/
H A Dhuks_adapter.c962 static int32_t CheckAesGcmEncryptParam(const KeyParams *keyParams, const Uint8Buff *plain, in CheckAesGcmEncryptParam() argument
969 const Uint8Buff *inParams[] = { plain, outCipher }; in CheckAesGcmEncryptParam()
970 const char* paramTags[] = { "plain", "outCipher" }; in CheckAesGcmEncryptParam()
981 CHECK_LEN_LOWER_RETURN(outCipher->length, plain->length + HKS_AE_TAG_LEN, "outCipher"); in CheckAesGcmEncryptParam()
1021 static int32_t AesGcmEncrypt(const KeyParams *keyParams, const Uint8Buff *plain, const GcmParam *encryptInfo, in AesGcmEncrypt() argument
1024 int32_t res = CheckAesGcmEncryptParam(keyParams, plain, encryptInfo, outCipher); in AesGcmEncrypt()
1030 struct HksBlob plainBlob = { plain->length, plain->val }; in AesGcmEncrypt()
/base/web/webview/test/unittest/pasteboard_adapter/
H A Dpasteboard_client_adapter_test.cpp328 std::shared_ptr<std::string> plain = g_pasternull->GetPlainText(); in HWTEST_F() local
329 if (plain == nullptr) { in HWTEST_F()
/base/security/device_auth/frameworks/deviceauth_lite/source/huks_adapter/
H A Dhuks_adapter.c548 int32_t aes_gcm_encrypt(struct var_buffer *key, const struct uint8_buff *plain, in aes_gcm_encrypt() argument
552 check_ptr_return_val(plain, HC_INPUT_ERROR); in aes_gcm_encrypt()
562 struct HksBlob hks_plain_text = { plain->length, plain->val }; in aes_gcm_encrypt()
/base/security/device_auth/frameworks/deviceauth_lite/test/unittest/unittest_mock/
H A Dhuks_adapter_mock_for_pake.c502 int32_t aes_gcm_encrypt(struct var_buffer *key, const struct uint8_buff *plain, in aes_gcm_encrypt() argument
506 check_ptr_return_val(plain, HC_INPUT_ERROR); in aes_gcm_encrypt()
516 struct HksBlob hks_plain_text = { plain->length, plain->val }; in aes_gcm_encrypt()

Completed in 22 milliseconds

12