/base/security/device_auth/frameworks/deviceauth_lite/source/struct/ |
D | pake_server_confirm.c | 41 int32_t result = byte_convert(obj, FIELD_KCF_DATA, pake_server_confirm->kcf_data.hmac, in parse_pake_server_confirm() 66 uint8_t *tmp_kcf_data_hex = raw_byte_to_hex_string(pake_server_confirm->kcf_data.hmac, in make_pake_server_confirm()
|
D | pake_client_confirm.c | 48 result = byte_convert(obj, FIELD_KCF_DATA, pake_client_confirm->kcf_data.hmac, in parse_pake_client_confirm() 80 uint8_t *tmp_kcf_data_hex = raw_byte_to_hex_string(pake_client_confirm->kcf_data.hmac, in make_pake_client_confirm()
|
/base/security/device_auth/frameworks/deviceauth_lite/source/key_agreement/ |
D | pake_server.h | 107 struct hmac kcf_data; 111 struct hmac kcf_data;
|
D | pake_server.c | 185 static bool verify_proof_is_ok(struct pake_server *pake_server, struct hmac *kcf_data); 208 static struct hmac generate_proof(struct pake_server *pake_server); 303 static bool verify_proof_is_ok(struct pake_server *pake_server, struct hmac *kcf_data) in verify_proof_is_ok() 317 struct hmac verify_proof = { 0, {0} }; in verify_proof_is_ok() 332 static struct hmac generate_proof(struct pake_server *pake_server) in generate_proof() 334 struct hmac proof = { 0, {0} }; in generate_proof()
|
D | pake_client.c | 247 static struct hmac generate_proof(struct pake_client *pake_client); 278 static bool verify_proof_is_ok(struct pake_client *pake_client, struct hmac *kcf_data); 336 static struct hmac generate_proof(struct pake_client *pake_client) in generate_proof() 338 struct hmac proof = { 0, {0} }; in generate_proof() 367 static bool verify_proof_is_ok(struct pake_client *pake_client, struct hmac *kcf_data) in verify_proof_is_ok() 382 struct hmac verify_proof = { 0, {0} }; in verify_proof_is_ok()
|
D | pake_client.h | 44 struct hmac kcf_data;
|
/base/security/device_auth/services/authenticators/src/account_unrelated/iso_task/iso_protocol_task/ |
D | iso_client_protocol_task.c | 215 uint8_t *hmac = (uint8_t *)HcMalloc(HMAC_LEN, 0); in GenerateSessionKey() local 216 if (hmac == NULL) { in GenerateSessionKey() 221 if (GetByteFromJson(in, FIELD_RETURN_CODE_MAC, hmac, HMAC_LEN) != 0) { in GenerateSessionKey() 228 res = IsoClientGenSessionKey(¶ms->baseParams, 0, hmac, HMAC_LEN); in GenerateSessionKey() 237 HcFree(hmac); in GenerateSessionKey()
|
/base/security/device_auth/services/protocol/inc/iso_protocol/ |
D | iso_protocol_common.h | 47 int IsoClientGenSessionKey(IsoBaseParams *params, int returnResult, const uint8_t *hmac, uint32_t h…
|
/base/security/device_auth/frameworks/deviceauth_lite/source/base/ |
D | base.h | 206 struct hmac { struct 208 uint8_t hmac[HC_HMAC_LEN]; argument
|
/base/security/crypto_framework/plugin/ |
D | plugin.gni | 24 "${plugin_path}/openssl_plugin/crypto_operation/hmac/inc", 69 [ "${plugin_path}/openssl_plugin/crypto_operation/hmac/src/mac_openssl.c" ]
|
/base/security/crypto_framework/frameworks/ |
D | frameworks.gni | 30 "${plugin_path}/openssl_plugin/crypto_operation/hmac/inc",
|
/base/security/device_auth/services/protocol/src/iso_protocol/ |
D | iso_protocol_common.c | 279 int IsoClientGenSessionKey(IsoBaseParams *params, int returnResult, const uint8_t *hmac, uint32_t h… in IsoClientGenSessionKey() argument 285 if (hmac == NULL) { in IsoClientGenSessionKey() 301 if (memcmp(outHmacBuf.val, hmac, hmacLen) != 0) { in IsoClientGenSessionKey()
|
/base/security/device_auth/frameworks/deviceauth_lite/source/huks_adapter/ |
D | huks_adapter.h | 245 int32_t compute_hmac(struct var_buffer *key, const struct uint8_buff *message, struct hmac *out_hma…
|
D | huks_adapter.c | 375 int32_t compute_hmac(struct var_buffer *key, const struct uint8_buff *message, struct hmac *out_hma… in compute_hmac() 383 struct HksBlob output = { HC_HMAC_LEN, out_hmac->hmac }; in compute_hmac()
|
/base/security/huks/services/huks_standard/huks_service/main/core/src/ |
D | hks_storage_lite.c | 116 struct HksBlob mac = { HKS_HMAC_DIGEST_SHA512_LEN, keyInfoHead->hmac }; in InitImageBuffer() 206 if (HksMemCmp(mac.data, keyInfoHead->hmac, HKS_HMAC_DIGEST_SHA512_LEN) != 0) { in CheckKeyInfoHeaderValid() 216 struct HksBlob mac = { HKS_HMAC_DIGEST_SHA512_LEN, keyInfoHead->hmac }; in RefreshKeyInfoHeaderHmac()
|
/base/security/huks/interfaces/inner_api/huks_standard/main/include/ |
D | hks_type.h | 834 uint8_t hmac[HKS_HMAC_DIGEST_SHA512_LEN]; member
|
/base/security/selinux_adapter/sepolicy/ohos_policy/filemanagement/storage_service/system/ |
D | storage_daemon.te | 161 #avc: denied { module_request } for pid=255 comm="storage_daemon" kmod="crypto-hmac(sha512)" sco…
|