Home
last modified time | relevance | path

Searched refs:SESSION_KEY_LENGTH (Results 1 - 25 of 56) sorted by relevance

123

/foundation/communication/dsoftbus/tests/sdk/transmission/fuzztest/clienttranssessionservice_fuzzer/
H A Dclienttranssessionservice_fuzzer.cpp27 #define SESSION_KEY_LENGTH 32 in GetSessionKeyTest() macro
31 if (size > SESSION_KEY_LENGTH) { in GetSessionKeyTest()
34 unsigned int len = SESSION_KEY_LENGTH; in GetSessionKeyTest()
36 char tmp[SESSION_KEY_LENGTH + 1] = {0}; in GetSessionKeyTest()
/foundation/communication/dsoftbus/tests/adapter/unittest/
H A Ddsoftbus_crypto_test.cpp281 cipherKey.keyLen = SESSION_KEY_LENGTH; in HWTEST_F()
282 int32_t ret = SoftBusGenerateRandomArray(cipherKey.key, SESSION_KEY_LENGTH); in HWTEST_F()
346 cipherKey.keyLen = SESSION_KEY_LENGTH; in HWTEST_F()
347 int32_t ret = SoftBusGenerateRandomArray(cipherKey.key, SESSION_KEY_LENGTH); in HWTEST_F()
434 cipherKey.keyLen = SESSION_KEY_LENGTH; in HWTEST_F()
435 int32_t ret = SoftBusGenerateRandomArray(cipherKey.key, SESSION_KEY_LENGTH); in HWTEST_F()
461 cipherKey.keyLen = SESSION_KEY_LENGTH; in HWTEST_F()
462 int32_t ret = SoftBusGenerateRandomArray(cipherKey.key, SESSION_KEY_LENGTH); in HWTEST_F()
495 cipherKey.keyLen = SESSION_KEY_LENGTH; in HWTEST_F()
496 int32_t ret = SoftBusGenerateRandomArray(cipherKey.key, SESSION_KEY_LENGTH); in HWTEST_F()
[all...]
/foundation/communication/dsoftbus/tests/sdk/transmission/trans_channel/udp/stream/
H A Ddstream_adaptor_server_test.c26 #define SESSION_KEY_LENGTH 32 macro
64 SESSION_KEY_LENGTH, in main()
74 SESSION_KEY_LENGTH, in main()
H A Ddstream_adaptor_client_test.c33 #define SESSION_KEY_LENGTH 32 macro
70 p1->keyLen = SESSION_KEY_LENGTH; in ConstructVtpStreamOpenParam()
78 p2->keyLen = SESSION_KEY_LENGTH; in ConstructVtpStreamOpenParam()
H A Dclient_trans_udp_stream_interface_test.cpp66 SESSION_KEY_LENGTH,
76 SESSION_KEY_LENGTH,
/foundation/CastEngine/castengine_cast_framework/service/src/session/src/rtsp/src/
H A Drtsp_channel_manager.cpp38 !Utils::IsArrayAllZero(channelManager_->sessionKeys_, SESSION_KEY_LENGTH))) { in OnDataReceived()
68 memset_s(sessionKeys_, SESSION_KEY_LENGTH, 0, SESSION_KEY_LENGTH); in ~RtspChannelManager()
109 memset_s(sessionKeys_, SESSION_KEY_LENGTH, 0, SESSION_KEY_LENGTH); in StopSession()
167 Utils::IsArrayAllZero(sessionKeys_, SESSION_KEY_LENGTH) || algorithmId_ <= 0) { in SendData()
H A Drtsp_channel_manager.h81 constexpr static int SESSION_KEY_LENGTH = 16; member in OHOS::CastEngine::CastEngineService::CastSessionRtsp::RtspChannelManager
86 uint8_t sessionKeys_[SESSION_KEY_LENGTH] = {0};
/foundation/CastEngine/castengine_cast_plus_stream/src/rtsp/src/
H A Drtsp_channel_manager.cpp38 !Utils::IsArrayAllZero(channelManager_->sessionKeys_, SESSION_KEY_LENGTH))) { in OnDataReceived()
68 memset_s(sessionKeys_, SESSION_KEY_LENGTH, 0, SESSION_KEY_LENGTH); in ~RtspChannelManager()
109 memset_s(sessionKeys_, SESSION_KEY_LENGTH, 0, SESSION_KEY_LENGTH); in StopSession()
167 Utils::IsArrayAllZero(sessionKeys_, SESSION_KEY_LENGTH) || algorithmId_ <= 0) { in SendData()
H A Drtsp_channel_manager.h81 constexpr static int SESSION_KEY_LENGTH = 16; member in OHOS::CastEngine::CastEngineService::CastSessionRtsp::RtspChannelManager
86 uint8_t sessionKeys_[SESSION_KEY_LENGTH] = {0};
/foundation/communication/dsoftbus/sdk/transmission/trans_channel/udp/stream/adaptor/src/
H A Dstream_adaptor.cpp126 cipherKey.keyLen = SESSION_KEY_LENGTH; in Encrypt()
127 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey.first, sessionKey.second) != EOK) { in Encrypt()
153 cipherKey.keyLen = SESSION_KEY_LENGTH; // 256 bit encryption in Decrypt()
154 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey.first, sessionKey.second) != EOK) { in Decrypt()
/foundation/communication/dsoftbus/adapter/common/include/
H A Dsoftbus_adapter_crypto.h55 unsigned char key[SESSION_KEY_LENGTH];
61 unsigned char key[SESSION_KEY_LENGTH];
/foundation/communication/dsoftbus/tests/core/authentication/unittest/
H A Dauth_hichain_test.cpp124 uint8_t sessionKey[SESSION_KEY_LENGTH] = {0}; in HWTEST_F()
125 OnSessionKeyReturned(authSeq, nullptr, SESSION_KEY_LENGTH + 1); in HWTEST_F()
126 OnSessionKeyReturned(authSeq, nullptr, SESSION_KEY_LENGTH); in HWTEST_F()
127 OnSessionKeyReturned(authSeq, sessionKey, SESSION_KEY_LENGTH + 1); in HWTEST_F()
H A Dauth_session_message_test.cpp34 constexpr char DEVICE_KEY[SESSION_KEY_LENGTH] = "11111";
43 constexpr char KEY_TEST[SESSION_KEY_LENGTH] = "123456keytest";
105 ASSERT_TRUE(memcpy_s(deviceCommKey.deviceKey, SESSION_KEY_LENGTH, in HWTEST_F()
196 ASSERT_TRUE(memcpy_s(deviceKey.deviceKey, SESSION_KEY_LENGTH, in HWTEST_F()
412 ASSERT_TRUE(memcpy_s(info.cipherInfo.key, SESSION_KEY_LENGTH, KEY_TEST, strlen(KEY_TEST)) == EOK); in HWTEST_F()
803 EXPECT_EQ(SOFTBUS_OK, SoftBusGenerateRandomArray(deviceCommKey.deviceKey, SESSION_KEY_LENGTH)); in HWTEST_F()
804 deviceCommKey.keyLen = SESSION_KEY_LENGTH; in HWTEST_F()
846 SessionKey sessionKey = { .len = SESSION_KEY_LENGTH, }; in HWTEST_F()
847 EXPECT_EQ(SOFTBUS_OK, SoftBusGenerateRandomArray(sessionKey.value, SESSION_KEY_LENGTH)); in HWTEST_F()
884 SessionKey sessionKey = { .len = SESSION_KEY_LENGTH, }; in HWTEST_F()
[all...]
/foundation/communication/dsoftbus/core/authentication/include/
H A Dauth_device_common_key.h37 uint8_t deviceKey[SESSION_KEY_LENGTH];
/foundation/communication/dsoftbus/sdk/transmission/trans_channel/proxy/src/
H A Dclient_trans_proxy_manager.c306 if (memcpy_s(info->detail.sessionKey, SESSION_KEY_LENGTH, channel->sessionKey, SESSION_KEY_LENGTH) != EOK) { in ClientTransProxyCreateChannelInfo()
335 (void)memset_s(info->detail.sessionKey, SESSION_KEY_LENGTH, 0, SESSION_KEY_LENGTH); in ClientTransProxyOnChannelOpened()
410 cipherKey.keyLen = SESSION_KEY_LENGTH; in ClientTransProxyDecryptPacketData()
411 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, info.sessionKey, SESSION_KEY_LENGTH) != EOK) { in ClientTransProxyDecryptPacketData()
930 cipherKey.keyLen = SESSION_KEY_LENGTH; in ClientTransProxyPackBytes()
931 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey, SESSION_KEY_LENGTH) ! in ClientTransProxyPackBytes()
[all...]
/foundation/communication/dsoftbus/core/transmission/common/src/
H A Dsoftbus_message_open_channel.c154 &keyLen, (unsigned char *)appInfo->sessionKey, SESSION_KEY_LENGTH); in PackRequest()
237 int32_t ret = SoftBusBase64Decode((unsigned char *)appInfo->sessionKey, SESSION_KEY_LENGTH, in ParseMessageToAppInfo()
240 if (len != SESSION_KEY_LENGTH) { in ParseMessageToAppInfo()
421 cipherKey.keyLen = SESSION_KEY_LENGTH; in TransTdcEncrypt()
422 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey, SESSION_KEY_LENGTH) != EOK) { in TransTdcEncrypt()
/foundation/communication/dsoftbus/core/bus_center/lnn/net_builder/include/
H A Dlnn_data_cloud_sync.h60 unsigned char cipherKey[SESSION_KEY_LENGTH];
/foundation/communication/dsoftbus/sdk/transmission/trans_channel/tcp_direct/include/
H A Dclient_trans_tcp_direct_manager.h37 char sessionKey[SESSION_KEY_LENGTH];
/foundation/communication/dsoftbus/core/bus_center/lnn/net_ledger/common/src/
H A Dlnn_net_ledger.c708 unsigned char broadcastCipher[SESSION_KEY_LENGTH] = {0}; in SoftbusDumpPrintBroadcastCipher()
710 (uint8_t *)&broadcastCipher, SESSION_KEY_LENGTH) != SOFTBUS_OK) { in SoftbusDumpPrintBroadcastCipher()
716 broadcastCipher, SESSION_KEY_LENGTH) != SOFTBUS_OK) { in SoftbusDumpPrintBroadcastCipher()
717 (void)memset_s(broadcastCipher, SESSION_KEY_LENGTH, 0, SESSION_KEY_LENGTH); in SoftbusDumpPrintBroadcastCipher()
725 (void)memset_s(broadcastCipher, SESSION_KEY_LENGTH, 0, SESSION_KEY_LENGTH); in SoftbusDumpPrintBroadcastCipher()
/foundation/CastEngine/castengine_cast_framework/service/src/device_manager/src/
H A Dcast_device_data_manager.cpp35 constexpr int SESSION_KEY_LENGTH = 16; member
417 if (memcpy_s(it->device.sessionKey, SESSION_KEY_LENGTH, sessionKey, SESSION_KEY_LENGTH) != 0) { in SetDeviceSessionKey()
420 it->device.sessionKeyLength = SESSION_KEY_LENGTH; in SetDeviceSessionKey()
H A Dconnection_manager.cpp74 constexpr int SESSION_KEY_LENGTH = 16; member
592 EncryptDecrypt::GetInstance().EncryptData(EncryptDecrypt::CTR_CODE, sessionKey, SESSION_KEY_LENGTH, inputData, in EncryptPort()
634 EncryptDecrypt::GetInstance().EncryptData(EncryptDecrypt::CTR_CODE, sessionKey, SESSION_KEY_LENGTH, inputData, in EncryptIp()
1071 uint8_t sessionKey[SESSION_KEY_LENGTH] = {0}; in HandleConnectDeviceAction()
1081 uint8_t sessionKey[SESSION_KEY_LENGTH] = {0}; in HandleConnectDeviceAction()
1082 RAND_bytes(sessionKey, SESSION_KEY_LENGTH); in HandleConnectDeviceAction()
1093 for (int i = 0; i < SESSION_KEY_LENGTH; i++) { in GetSessionKey()
/foundation/communication/dsoftbus/core/transmission/common/include/
H A Dsoftbus_app_info.h97 char sessionKey[SESSION_KEY_LENGTH];
/foundation/communication/dsoftbus/sdk/transmission/trans_channel/proxy/include/
H A Dclient_trans_proxy_manager.h30 char sessionKey[SESSION_KEY_LENGTH];
/foundation/communication/dsoftbus/sdk/transmission/trans_channel/tcp_direct/src/
H A Dclient_trans_tcp_direct_message.c76 cipherKey.keyLen = SESSION_KEY_LENGTH; // 256 bit encryption in TransTdcDecrypt()
77 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey, SESSION_KEY_LENGTH) != EOK) { in TransTdcDecrypt()
94 cipherKey.keyLen = SESSION_KEY_LENGTH; in TransTdcEncryptWithSeq()
95 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey, SESSION_KEY_LENGTH) != EOK) { in TransTdcEncryptWithSeq()
H A Dclient_trans_tcp_direct_manager.c192 if (memcpy_s(item->detail.sessionKey, SESSION_KEY_LENGTH, channel->sessionKey, SESSION_KEY_LENGTH) != EOK) { in TransGetNewTcpChannel()
416 if (memcpy_s(key, len, channel.detail.sessionKey, SESSION_KEY_LENGTH) != EOK) { in TransTdcGetSessionKey()

Completed in 16 milliseconds

123