Home
last modified time | relevance | path

Searched refs:SHA256_LEN (Results 1 – 25 of 35) sorted by relevance

12

/base/security/device_auth/services/mk_agree/src/
Dkey_manager.c103 uint8_t hashValue[SHA256_LEN] = { 0 }; in GenerateDevKeyAlias()
104 Uint8Buff keyAliasHash = { hashValue, SHA256_LEN }; in GenerateDevKeyAlias()
121 uint8_t hashValue[SHA256_LEN] = { 0 }; in GenerateMkAlias()
122 Uint8Buff keyAliasHash = { hashValue, SHA256_LEN }; in GenerateMkAlias()
137 uint8_t hashValue[SHA256_LEN] = { 0 }; in GeneratePseudonymPskAlias()
138 Uint8Buff keyAliasHash = { hashValue, SHA256_LEN }; in GeneratePseudonymPskAlias()
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/
Diso_protocol.c354 uint8_t tokenValS[SHA256_LEN] = { 0 }; in ServerGenTokenProcEvent()
355 Uint8Buff tokenS = { tokenValS, SHA256_LEN }; in ServerGenTokenProcEvent()
460 uint8_t tokenValS[SHA256_LEN] = { 0 }; in ClientGenTokenProcEvent()
461 Uint8Buff tokenS = { tokenValS, SHA256_LEN }; in ClientGenTokenProcEvent()
472 uint8_t tokenValC[SHA256_LEN] = { 0 }; in ClientGenTokenProcEvent()
473 Uint8Buff tokenC = { tokenValC, SHA256_LEN }; in ClientGenTokenProcEvent()
537 uint8_t tokenValC[SHA256_LEN] = { 0 }; in ServerGenSessKeyProcEvent()
538 Uint8Buff tokenC = { tokenValC, SHA256_LEN }; in ServerGenSessKeyProcEvent()
549 uint8_t authResultMacVal[SHA256_LEN] = { 0 }; in ServerGenSessKeyProcEvent()
550 Uint8Buff authResultMac = { authResultMacVal, SHA256_LEN }; in ServerGenSessKeyProcEvent()
[all …]
Ddl_speke_protocol.c191 if (InitUint8Buff(&params->kcfDataPeer, SHA256_LEN) != HC_SUCCESS) { in GetKcfDataPeerFromInput()
423 uint8_t sidSelfVal[SHA256_LEN] = { 0 }; in CalSid()
424 uint8_t sidPeerVal[SHA256_LEN] = { 0 }; in CalSid()
425 Uint8Buff sidSelf = { sidSelfVal, SHA256_LEN }; in CalSid()
426 Uint8Buff sidPeer = { sidPeerVal, SHA256_LEN }; in CalSid()
489 uint8_t sidVal[SHA256_LEN * 2] = { 0 }; in GenerateSharedSecretMsg()
490 Uint8Buff sid = { sidVal, SHA256_LEN * 2 }; in GenerateSharedSecretMsg()
504 …uint32_t sharedSecretMsgLen = SHA256_LEN * 2 + params->innerKeyLen + HcStrlen(SHARED_SECRET_DERIVE… in CalSharedSecret()
515 if (InitUint8Buff(&params->sharedSecret, SHA256_LEN)) { in CalSharedSecret()
591 SHA256_LEN + impl->params.innerKeyLen + impl->base.protectedMsg.selfMsg.length + in CalKcfDataSelf()
[all …]
Dec_speke_protocol.c164 if (InitUint8Buff(&params->kcfDataPeer, SHA256_LEN) != HC_SUCCESS) { in GetKcfDataPeerFromInput()
387 uint8_t sidSelfVal[SHA256_LEN] = { 0 }; in CalSid()
388 uint8_t sidPeerVal[SHA256_LEN] = { 0 }; in CalSid()
389 Uint8Buff sidSelf = { sidSelfVal, SHA256_LEN }; in CalSid()
390 Uint8Buff sidPeer = { sidPeerVal, SHA256_LEN }; in CalSid()
453 uint8_t sidVal[SHA256_LEN * 2] = { 0 }; in GenerateSharedSecretMsg()
454 Uint8Buff sid = { sidVal, SHA256_LEN * 2 }; in GenerateSharedSecretMsg()
480 …uint32_t sharedSecretMsgLen = SHA256_LEN * 2 + EC_SPEKE_EC_KEY_LEN + HcStrlen(SHARED_SECRET_DERIVE… in CalSharedSecret()
491 if (InitUint8Buff(&params->sharedSecret, SHA256_LEN)) { in CalSharedSecret()
572 SHA256_LEN + EC_SPEKE_EC_KEY_LEN + impl->base.protectedMsg.selfMsg.length + in CalKcfDataSelf()
[all …]
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/standard/
Dhuks_adapter_diff_impl.c40 if (res != HAL_SUCCESS || pointBlob.size != SHA256_LEN) { in HashToPointX25519()
/base/security/asset/frameworks/utils/src/
Dhasher.rs21 const SHA256_LEN: usize = 32; constant
126 let mut ret = [0; SHA256_LEN];
/base/security/device_auth/services/identity_manager/src/
Dcert_operation.c188 uint8_t *keyAliasValue = (uint8_t *)HcMalloc(SHA256_LEN, 0); in VerifyPeerCertInfo()
193 Uint8Buff keyAlias = { .val = keyAliasValue, .length = SHA256_LEN }; in VerifyPeerCertInfo()
243 uint8_t *priAliasVal = (uint8_t *)HcMalloc(SHA256_LEN, 0); in GetSharedSecretForAccountInPake()
248 Uint8Buff aliasBuff = { priAliasVal, SHA256_LEN }; in GetSharedSecretForAccountInPake()
409 uint8_t keyAliasVal[SHA256_LEN] = { 0 }; in GenerateAuthTokenForAccessory()
410 Uint8Buff keyAlias = { keyAliasVal, SHA256_LEN }; in GenerateAuthTokenForAccessory()
450 authTokenAlias->val = (uint8_t *)HcMalloc(SHA256_LEN, 0); in GenerateTokenAliasForController()
456 authTokenAlias->length = SHA256_LEN; in GenerateTokenAliasForController()
Dcredential_operator.c109 Uint8Buff keyAliasHash = { NULL, SHA256_LEN }; in CombineKeyAliasForPake()
111 if (outKeyAlias->length != SHA256_LEN * BYTE_TO_HEX_OPER_LENGTH) { in CombineKeyAliasForPake()
175 uint8_t serviceId[SHA256_LEN] = { 0 }; in GenerateKeyAliasInner()
176 Uint8Buff serviceIdBuff = { serviceId, SHA256_LEN }; in GenerateKeyAliasInner()
323 char returnPkHexStr[SHA256_LEN * BYTE_TO_HEX_OPER_LENGTH + 1] = { 0 }; in PackPublicKeyToJson()
Didentity_pin.c234 uint8_t hash[SHA256_LEN] = { 0 }; in AuthGeneratePskUsePin()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/
Ddas_task_common.c233 if (outKeyAlias->length != SHA256_LEN) { in CombineKeyAliasForIso()
248 Uint8Buff keyAliasHash = { NULL, SHA256_LEN }; in CombineKeyAliasForPake()
250 if (outKeyAlias->length != SHA256_LEN * BYTE_TO_HEX_OPER_LENGTH) { in CombineKeyAliasForPake()
305 Uint8Buff serviceId = { NULL, SHA256_LEN }; in GenerateKeyAlias()
/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/
Dpub_key_exchange.c157 uint8_t serviceIdVal[SHA256_LEN] = { 0 }; in GenerateKeyAlias()
158 Uint8Buff serviceId = { serviceIdVal, SHA256_LEN }; in GenerateKeyAlias()
172 uint8_t keyAliasByteVal[SHA256_LEN] = { 0 }; in GenerateKeyAlias()
173 Uint8Buff keyAliasByte = { keyAliasByteVal, SHA256_LEN }; in GenerateKeyAlias()
179 uint32_t keyAliasHexStrLen = SHA256_LEN * BYTE_TO_HEX_OPER_LENGTH + 1; in GenerateKeyAlias()
180 char keyAliasHexStr[SHA256_LEN * BYTE_TO_HEX_OPER_LENGTH + 1] = { 0 }; in GenerateKeyAlias()
Dauth_code_import.c158 uint8_t serviceIdVal[SHA256_LEN] = { 0 }; in GenerateKeyAlias()
159 Uint8Buff serviceId = { serviceIdVal, SHA256_LEN }; in GenerateKeyAlias()
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
Dpake_v2_protocol_common.c81 params->sharedSecret.length = SHA256_LEN; in AllocDefaultParams()
276 Uint8Buff sidSelf = { NULL, SHA256_LEN }; in ComputeSid()
277 Uint8Buff sidPeer = { NULL, SHA256_LEN }; in ComputeSid()
383 …Uint8Buff sid = { NULL, SHA256_LEN * 2 }; // sid is composed of client sid and server sid, so need… in GenerateSharedSecret()
544 uint8_t tmpKcfDataVal[SHA256_LEN] = { 0 }; in VerifyProof()
545 Uint8Buff tmpKcfData = { tmpKcfDataVal, SHA256_LEN }; in VerifyProof()
/base/security/device_auth/test/unittest/deviceauth/unit_test/source/
Dkey_management_test.cpp71 uint8_t hashData[SHA256_LEN] = { 0 };
73 Uint8Buff hashBuffer = { hashData, SHA256_LEN };
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/
Dpake_v2_auth_task_common.c58 uint8_t *serverPkAlias = (uint8_t *)HcMalloc(SHA256_LEN, 0); in VerifyPkSignPeer()
65 .length = SHA256_LEN in VerifyPkSignPeer()
94 uint8_t *priAliasVal = (uint8_t *)HcMalloc(SHA256_LEN, 0); in GenerateEcdhSharedKey()
101 .length = SHA256_LEN in GenerateEcdhSharedKey()
/base/security/device_auth/test/unittest/deviceauth/source/
Dgroup_operation_common_test.cpp496 int32_t ret = GetHashResult(nullptr, SHA256_LEN, hash, SHA256_LEN);
503 int32_t ret = GetHashResult(info, SHA256_LEN, nullptr, SHA256_LEN);
/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/include/
Ddlp_crypt.h39 SHA256_LEN = 32, enumerator
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/iso_auth_task/
Diso_auth_task_common.c144 uint8_t keyAliasVal[SHA256_LEN] = { 0 }; in GenerateAuthTokenForAccessory()
145 Uint8Buff keyAlias = { keyAliasVal, SHA256_LEN }; in GenerateAuthTokenForAccessory()
171 int32_t res = InitSingleParam(authTokenAlias, SHA256_LEN); in GenerateTokenAliasForController()
/base/security/device_auth/services/protocol/src/iso_protocol/
Diso_protocol_common.c258 uint8_t hmacPeer[SHA256_LEN] = { 0 }; in IsoClientCheckAndGenToken()
293 uint8_t hmacSelf[SHA256_LEN] = { 0 }; in IsoClientGenSessionKey()
353 uint8_t hmacPeer[SHA256_LEN] = { 0 }; in IsoServerGenSessionKeyAndCalToken()
/base/security/device_auth/services/legacy/authenticators/src/account_related/creds_manager/
Dasy_token_manager.c457 uint8_t *keyAliasValue = (uint8_t *)HcMalloc(SHA256_LEN, 0); in DoImportServerPkAndVerify()
464 .length = SHA256_LEN in DoImportServerPkAndVerify()
722 uint8_t *keyAliasValue = (uint8_t *)HcMalloc(SHA256_LEN, 0); in CheckDevicePk()
730 .length = SHA256_LEN in CheckDevicePk()
836 uint8_t *keyAliasValue = (uint8_t *)HcMalloc(SHA256_LEN, 0); in GetRegisterProof()
843 .length = SHA256_LEN in GetRegisterProof()
873 uint8_t *keyAliasValue = (uint8_t *)HcMalloc(SHA256_LEN, 0); in DeleteKeyPair()
880 .length = SHA256_LEN in DeleteKeyPair()
Dsym_token_manager.c363 uint8_t *keyAliasVal = (uint8_t *)HcMalloc(SHA256_LEN, 0); in ImportSymTokenToKeyManager()
370 .length = SHA256_LEN in ImportSymTokenToKeyManager()
401 uint8_t *keyAliasVal = (uint8_t *)HcMalloc(SHA256_LEN, 0); in DeleteSymTokenFromKeyManager()
408 .length = SHA256_LEN in DeleteSymTokenFromKeyManager()
/base/security/device_auth/deps_adapter/key_management_adapter/interfaces/
Dalg_defs.h22 #define SHA256_LEN 32 macro
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/
Dhuks_adapter.c88 CHECK_LEN_EQUAL_RETURN(hash->length, SHA256_LEN, "hash->length"); in Sha256()
106 if (res != HKS_SUCCESS || hashBlob.size != SHA256_LEN) { in Sha256()
420 CHECK_LEN_EQUAL_RETURN(hash->length, SHA256_LEN, "hash->length"); in HashToPoint()
433 CHECK_LEN_EQUAL_RETURN(outEcPoint->length, SHA256_LEN, "outEcPoint->length"); in HashToPoint()
964 messageHash.length = SHA256_LEN; in Sign()
1039 messageHash.length = SHA256_LEN; in Verify()
/base/security/crypto_framework/test/unittest/src/
Dcrypto_md_test.cpp41 constexpr uint32_t SHA256_LEN = 32; variable
298 EXPECT_EQ(len, SHA256_LEN);
Dcrypto_mac_test.cpp43 constexpr uint32_t SHA256_LEN = 32; variable
503 EXPECT_EQ(len, SHA256_LEN);
610 EXPECT_EQ(len, SHA256_LEN);
703 EXPECT_EQ(len, SHA256_LEN);

12