/base/security/device_auth/services/mk_agree/src/ |
D | key_manager.c | 103 uint8_t hashValue[SHA256_LEN] = { 0 }; in GenerateDevKeyAlias() 104 Uint8Buff keyAliasHash = { hashValue, SHA256_LEN }; in GenerateDevKeyAlias() 121 uint8_t hashValue[SHA256_LEN] = { 0 }; in GenerateMkAlias() 122 Uint8Buff keyAliasHash = { hashValue, SHA256_LEN }; in GenerateMkAlias() 137 uint8_t hashValue[SHA256_LEN] = { 0 }; in GeneratePseudonymPskAlias() 138 Uint8Buff keyAliasHash = { hashValue, SHA256_LEN }; in GeneratePseudonymPskAlias()
|
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
D | iso_protocol.c | 354 uint8_t tokenValS[SHA256_LEN] = { 0 }; in ServerGenTokenProcEvent() 355 Uint8Buff tokenS = { tokenValS, SHA256_LEN }; in ServerGenTokenProcEvent() 460 uint8_t tokenValS[SHA256_LEN] = { 0 }; in ClientGenTokenProcEvent() 461 Uint8Buff tokenS = { tokenValS, SHA256_LEN }; in ClientGenTokenProcEvent() 472 uint8_t tokenValC[SHA256_LEN] = { 0 }; in ClientGenTokenProcEvent() 473 Uint8Buff tokenC = { tokenValC, SHA256_LEN }; in ClientGenTokenProcEvent() 537 uint8_t tokenValC[SHA256_LEN] = { 0 }; in ServerGenSessKeyProcEvent() 538 Uint8Buff tokenC = { tokenValC, SHA256_LEN }; in ServerGenSessKeyProcEvent() 549 uint8_t authResultMacVal[SHA256_LEN] = { 0 }; in ServerGenSessKeyProcEvent() 550 Uint8Buff authResultMac = { authResultMacVal, SHA256_LEN }; in ServerGenSessKeyProcEvent() [all …]
|
D | dl_speke_protocol.c | 191 if (InitUint8Buff(¶ms->kcfDataPeer, SHA256_LEN) != HC_SUCCESS) { in GetKcfDataPeerFromInput() 423 uint8_t sidSelfVal[SHA256_LEN] = { 0 }; in CalSid() 424 uint8_t sidPeerVal[SHA256_LEN] = { 0 }; in CalSid() 425 Uint8Buff sidSelf = { sidSelfVal, SHA256_LEN }; in CalSid() 426 Uint8Buff sidPeer = { sidPeerVal, SHA256_LEN }; in CalSid() 489 uint8_t sidVal[SHA256_LEN * 2] = { 0 }; in GenerateSharedSecretMsg() 490 Uint8Buff sid = { sidVal, SHA256_LEN * 2 }; in GenerateSharedSecretMsg() 504 …uint32_t sharedSecretMsgLen = SHA256_LEN * 2 + params->innerKeyLen + HcStrlen(SHARED_SECRET_DERIVE… in CalSharedSecret() 515 if (InitUint8Buff(¶ms->sharedSecret, SHA256_LEN)) { in CalSharedSecret() 591 SHA256_LEN + impl->params.innerKeyLen + impl->base.protectedMsg.selfMsg.length + in CalKcfDataSelf() [all …]
|
D | ec_speke_protocol.c | 164 if (InitUint8Buff(¶ms->kcfDataPeer, SHA256_LEN) != HC_SUCCESS) { in GetKcfDataPeerFromInput() 387 uint8_t sidSelfVal[SHA256_LEN] = { 0 }; in CalSid() 388 uint8_t sidPeerVal[SHA256_LEN] = { 0 }; in CalSid() 389 Uint8Buff sidSelf = { sidSelfVal, SHA256_LEN }; in CalSid() 390 Uint8Buff sidPeer = { sidPeerVal, SHA256_LEN }; in CalSid() 453 uint8_t sidVal[SHA256_LEN * 2] = { 0 }; in GenerateSharedSecretMsg() 454 Uint8Buff sid = { sidVal, SHA256_LEN * 2 }; in GenerateSharedSecretMsg() 480 …uint32_t sharedSecretMsgLen = SHA256_LEN * 2 + EC_SPEKE_EC_KEY_LEN + HcStrlen(SHARED_SECRET_DERIVE… in CalSharedSecret() 491 if (InitUint8Buff(¶ms->sharedSecret, SHA256_LEN)) { in CalSharedSecret() 572 SHA256_LEN + EC_SPEKE_EC_KEY_LEN + impl->base.protectedMsg.selfMsg.length + in CalKcfDataSelf() [all …]
|
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/standard/ |
D | huks_adapter_diff_impl.c | 40 if (res != HAL_SUCCESS || pointBlob.size != SHA256_LEN) { in HashToPointX25519()
|
/base/security/asset/frameworks/utils/src/ |
D | hasher.rs | 21 const SHA256_LEN: usize = 32; constant 126 let mut ret = [0; SHA256_LEN];
|
/base/security/device_auth/services/identity_manager/src/ |
D | cert_operation.c | 188 uint8_t *keyAliasValue = (uint8_t *)HcMalloc(SHA256_LEN, 0); in VerifyPeerCertInfo() 193 Uint8Buff keyAlias = { .val = keyAliasValue, .length = SHA256_LEN }; in VerifyPeerCertInfo() 243 uint8_t *priAliasVal = (uint8_t *)HcMalloc(SHA256_LEN, 0); in GetSharedSecretForAccountInPake() 248 Uint8Buff aliasBuff = { priAliasVal, SHA256_LEN }; in GetSharedSecretForAccountInPake() 409 uint8_t keyAliasVal[SHA256_LEN] = { 0 }; in GenerateAuthTokenForAccessory() 410 Uint8Buff keyAlias = { keyAliasVal, SHA256_LEN }; in GenerateAuthTokenForAccessory() 450 authTokenAlias->val = (uint8_t *)HcMalloc(SHA256_LEN, 0); in GenerateTokenAliasForController() 456 authTokenAlias->length = SHA256_LEN; in GenerateTokenAliasForController()
|
D | credential_operator.c | 109 Uint8Buff keyAliasHash = { NULL, SHA256_LEN }; in CombineKeyAliasForPake() 111 if (outKeyAlias->length != SHA256_LEN * BYTE_TO_HEX_OPER_LENGTH) { in CombineKeyAliasForPake() 175 uint8_t serviceId[SHA256_LEN] = { 0 }; in GenerateKeyAliasInner() 176 Uint8Buff serviceIdBuff = { serviceId, SHA256_LEN }; in GenerateKeyAliasInner() 323 char returnPkHexStr[SHA256_LEN * BYTE_TO_HEX_OPER_LENGTH + 1] = { 0 }; in PackPublicKeyToJson()
|
D | identity_pin.c | 234 uint8_t hash[SHA256_LEN] = { 0 }; in AuthGeneratePskUsePin()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/ |
D | das_task_common.c | 233 if (outKeyAlias->length != SHA256_LEN) { in CombineKeyAliasForIso() 248 Uint8Buff keyAliasHash = { NULL, SHA256_LEN }; in CombineKeyAliasForPake() 250 if (outKeyAlias->length != SHA256_LEN * BYTE_TO_HEX_OPER_LENGTH) { in CombineKeyAliasForPake() 305 Uint8Buff serviceId = { NULL, SHA256_LEN }; in GenerateKeyAlias()
|
/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/ |
D | pub_key_exchange.c | 157 uint8_t serviceIdVal[SHA256_LEN] = { 0 }; in GenerateKeyAlias() 158 Uint8Buff serviceId = { serviceIdVal, SHA256_LEN }; in GenerateKeyAlias() 172 uint8_t keyAliasByteVal[SHA256_LEN] = { 0 }; in GenerateKeyAlias() 173 Uint8Buff keyAliasByte = { keyAliasByteVal, SHA256_LEN }; in GenerateKeyAlias() 179 uint32_t keyAliasHexStrLen = SHA256_LEN * BYTE_TO_HEX_OPER_LENGTH + 1; in GenerateKeyAlias() 180 char keyAliasHexStr[SHA256_LEN * BYTE_TO_HEX_OPER_LENGTH + 1] = { 0 }; in GenerateKeyAlias()
|
D | auth_code_import.c | 158 uint8_t serviceIdVal[SHA256_LEN] = { 0 }; in GenerateKeyAlias() 159 Uint8Buff serviceId = { serviceIdVal, SHA256_LEN }; in GenerateKeyAlias()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
D | pake_v2_protocol_common.c | 81 params->sharedSecret.length = SHA256_LEN; in AllocDefaultParams() 276 Uint8Buff sidSelf = { NULL, SHA256_LEN }; in ComputeSid() 277 Uint8Buff sidPeer = { NULL, SHA256_LEN }; in ComputeSid() 383 …Uint8Buff sid = { NULL, SHA256_LEN * 2 }; // sid is composed of client sid and server sid, so need… in GenerateSharedSecret() 544 uint8_t tmpKcfDataVal[SHA256_LEN] = { 0 }; in VerifyProof() 545 Uint8Buff tmpKcfData = { tmpKcfDataVal, SHA256_LEN }; in VerifyProof()
|
/base/security/device_auth/test/unittest/deviceauth/unit_test/source/ |
D | key_management_test.cpp | 71 uint8_t hashData[SHA256_LEN] = { 0 }; 73 Uint8Buff hashBuffer = { hashData, SHA256_LEN };
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
D | pake_v2_auth_task_common.c | 58 uint8_t *serverPkAlias = (uint8_t *)HcMalloc(SHA256_LEN, 0); in VerifyPkSignPeer() 65 .length = SHA256_LEN in VerifyPkSignPeer() 94 uint8_t *priAliasVal = (uint8_t *)HcMalloc(SHA256_LEN, 0); in GenerateEcdhSharedKey() 101 .length = SHA256_LEN in GenerateEcdhSharedKey()
|
/base/security/device_auth/test/unittest/deviceauth/source/ |
D | group_operation_common_test.cpp | 496 int32_t ret = GetHashResult(nullptr, SHA256_LEN, hash, SHA256_LEN); 503 int32_t ret = GetHashResult(info, SHA256_LEN, nullptr, SHA256_LEN);
|
/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/include/ |
D | dlp_crypt.h | 39 SHA256_LEN = 32, enumerator
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/iso_auth_task/ |
D | iso_auth_task_common.c | 144 uint8_t keyAliasVal[SHA256_LEN] = { 0 }; in GenerateAuthTokenForAccessory() 145 Uint8Buff keyAlias = { keyAliasVal, SHA256_LEN }; in GenerateAuthTokenForAccessory() 171 int32_t res = InitSingleParam(authTokenAlias, SHA256_LEN); in GenerateTokenAliasForController()
|
/base/security/device_auth/services/protocol/src/iso_protocol/ |
D | iso_protocol_common.c | 258 uint8_t hmacPeer[SHA256_LEN] = { 0 }; in IsoClientCheckAndGenToken() 293 uint8_t hmacSelf[SHA256_LEN] = { 0 }; in IsoClientGenSessionKey() 353 uint8_t hmacPeer[SHA256_LEN] = { 0 }; in IsoServerGenSessionKeyAndCalToken()
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/creds_manager/ |
D | asy_token_manager.c | 457 uint8_t *keyAliasValue = (uint8_t *)HcMalloc(SHA256_LEN, 0); in DoImportServerPkAndVerify() 464 .length = SHA256_LEN in DoImportServerPkAndVerify() 722 uint8_t *keyAliasValue = (uint8_t *)HcMalloc(SHA256_LEN, 0); in CheckDevicePk() 730 .length = SHA256_LEN in CheckDevicePk() 836 uint8_t *keyAliasValue = (uint8_t *)HcMalloc(SHA256_LEN, 0); in GetRegisterProof() 843 .length = SHA256_LEN in GetRegisterProof() 873 uint8_t *keyAliasValue = (uint8_t *)HcMalloc(SHA256_LEN, 0); in DeleteKeyPair() 880 .length = SHA256_LEN in DeleteKeyPair()
|
D | sym_token_manager.c | 363 uint8_t *keyAliasVal = (uint8_t *)HcMalloc(SHA256_LEN, 0); in ImportSymTokenToKeyManager() 370 .length = SHA256_LEN in ImportSymTokenToKeyManager() 401 uint8_t *keyAliasVal = (uint8_t *)HcMalloc(SHA256_LEN, 0); in DeleteSymTokenFromKeyManager() 408 .length = SHA256_LEN in DeleteSymTokenFromKeyManager()
|
/base/security/device_auth/deps_adapter/key_management_adapter/interfaces/ |
D | alg_defs.h | 22 #define SHA256_LEN 32 macro
|
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/ |
D | huks_adapter.c | 88 CHECK_LEN_EQUAL_RETURN(hash->length, SHA256_LEN, "hash->length"); in Sha256() 106 if (res != HKS_SUCCESS || hashBlob.size != SHA256_LEN) { in Sha256() 420 CHECK_LEN_EQUAL_RETURN(hash->length, SHA256_LEN, "hash->length"); in HashToPoint() 433 CHECK_LEN_EQUAL_RETURN(outEcPoint->length, SHA256_LEN, "outEcPoint->length"); in HashToPoint() 964 messageHash.length = SHA256_LEN; in Sign() 1039 messageHash.length = SHA256_LEN; in Verify()
|
/base/security/crypto_framework/test/unittest/src/ |
D | crypto_md_test.cpp | 41 constexpr uint32_t SHA256_LEN = 32; variable 298 EXPECT_EQ(len, SHA256_LEN);
|
D | crypto_mac_test.cpp | 43 constexpr uint32_t SHA256_LEN = 32; variable 503 EXPECT_EQ(len, SHA256_LEN); 610 EXPECT_EQ(len, SHA256_LEN); 703 EXPECT_EQ(len, SHA256_LEN);
|