/ohos5.0/base/security/code_signature/utils/src/ |
H A D | fsverity_utils_helper.cpp | 56 bool FsverityUtilsHelper::FormatDigest(libfsverity_digest *digest, uint8_t *buffer) in FormatDigest() argument 63 ret->digest_algorithm = cpu_to_le16(digest->digest_algorithm); in FormatDigest() 64 ret->digest_size = cpu_to_le16(digest->digest_size); in FormatDigest() 65 if (memcpy_s(ret->digest, MAX_DIGEST_SIZE, digest->digest, digest->digest_size) != EOK) { in FormatDigest() 71 bool FsverityUtilsHelper::ComputeDigest(const char *path, struct libfsverity_digest **digest) in ComputeDigest() argument 97 struct libfsverity_digest *digest = nullptr; in GenerateFormattedDigest() local 98 if (!ComputeDigest(path, &digest)) { in GenerateFormattedDigest() 101 uint32_t digestLen = sizeof(struct fsverity_formatted_digest) + digest->digest_size; in GenerateFormattedDigest() 103 free(digest); in GenerateFormattedDigest() 106 bool ret = FormatDigest(digest, digestBuffer.GetBuffer()); in GenerateFormattedDigest() [all …]
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/ |
H A D | hks_crypto_hal_rsa_sign.cpp | 56 .digest = HKS_DIGEST_MD5, 76 .digest = HKS_DIGEST_MD5, 96 .digest = HKS_DIGEST_MD5, 116 .digest = HKS_DIGEST_MD5, 136 .digest = HKS_DIGEST_MD5, 156 .digest = HKS_DIGEST_MD5, 176 .digest = HKS_DIGEST_NONE, 196 .digest = HKS_DIGEST_NONE, 216 .digest = HKS_DIGEST_NONE, 237 .digest = HKS_DIGEST_NONE, [all …]
|
H A D | hks_crypto_hal_rsa_oaep_decrypt.cpp | 48 .digest = HKS_DIGEST_SHA1, 64 .digest = HKS_DIGEST_SHA1, 81 .digest = HKS_DIGEST_SHA1, 99 .digest = HKS_DIGEST_SHA1, 119 .digest = HKS_DIGEST_SHA1, 141 .digest = HKS_DIGEST_SHA1, 167 .digest = HKS_DIGEST_SHA224, 183 .digest = HKS_DIGEST_SHA224, 200 .digest = HKS_DIGEST_SHA224, 635 .digest = HKS_DIGEST_NONE, [all …]
|
H A D | hks_crypto_hal_rsa_oaep_encrypt.cpp | 50 .digest = HKS_DIGEST_SHA1, 66 .digest = HKS_DIGEST_SHA1, 82 .digest = HKS_DIGEST_SHA1, 98 .digest = HKS_DIGEST_SHA1, 114 .digest = HKS_DIGEST_SHA1, 130 .digest = HKS_DIGEST_SHA1, 146 .digest = HKS_DIGEST_SHA224, 162 .digest = HKS_DIGEST_SHA224, 178 .digest = HKS_DIGEST_SHA224, 530 .digest = HKS_DIGEST_NONE, [all …]
|
H A D | hks_crypto_hal_ecdsa_sign.cpp | 57 .digest = HKS_DIGEST_NONE, 77 .digest = HKS_DIGEST_NONE, 96 .digest = HKS_DIGEST_NONE, 115 .digest = HKS_DIGEST_NONE, 135 .digest = HKS_DIGEST_SHA1, 154 .digest = HKS_DIGEST_SHA1, 173 .digest = HKS_DIGEST_SHA1, 192 .digest = HKS_DIGEST_SHA1, 211 .digest = HKS_DIGEST_SHA224, 230 .digest = HKS_DIGEST_SHA224, [all …]
|
H A D | hks_crypto_hal_rsa_cipher.cpp | 53 .digest = HKS_DIGEST_NONE, 80 .digest = HKS_DIGEST_NONE, 108 .digest = HKS_DIGEST_NONE, 137 .digest = HKS_DIGEST_NONE, 168 .digest = HKS_DIGEST_NONE, 201 .digest = HKS_DIGEST_NONE, 238 .digest = HKS_DIGEST_NONE, 259 .digest = HKS_DIGEST_NONE, 280 .digest = HKS_DIGEST_NONE, 302 .digest = HKS_DIGEST_NONE, [all …]
|
H A D | hks_crypto_hal_aes_encrypt.cpp | 57 .digest = HKS_DIGEST_NONE, 72 .digest = HKS_DIGEST_NONE, 87 .digest = HKS_DIGEST_NONE, 103 .digest = HKS_DIGEST_NONE, 118 .digest = HKS_DIGEST_NONE, 138 .digest = HKS_DIGEST_NONE, 153 .digest = HKS_DIGEST_NONE, 168 .digest = HKS_DIGEST_NONE, 183 .digest = HKS_DIGEST_NONE, 199 .digest = HKS_DIGEST_NONE, [all …]
|
H A D | hks_crypto_hal_rsa_decrypt.cpp | 47 .digest = HKS_DIGEST_NONE, 67 .digest = HKS_DIGEST_NONE, 94 .digest = HKS_DIGEST_NONE, 116 .digest = HKS_DIGEST_NONE, 140 .digest = HKS_DIGEST_NONE, 166 .digest = HKS_DIGEST_NONE, 196 .digest = HKS_DIGEST_NONE, 212 .digest = HKS_DIGEST_NONE, 229 .digest = HKS_DIGEST_NONE, 247 .digest = HKS_DIGEST_NONE, [all …]
|
H A D | hks_crypto_hal_hmac_hmac.cpp | 34 HksKeyDigest digest = HksKeyDigest::HKS_DIGEST_NONE; member 51 .digest = HKS_DIGEST_SHA1, 63 .digest = HKS_DIGEST_SHA224, 76 .digest = HKS_DIGEST_SHA256, 88 .digest = HKS_DIGEST_SHA384, 100 .digest = HKS_DIGEST_SHA512, 138 … EXPECT_EQ(HksCryptoHalHmacInit(&key, testCaseParams.digest, &context), testCaseParams.hmacResult); in RunTestCase() 142 …EXPECT_EQ(HksCryptoHalHmac(&key, testCaseParams.digest, &message, &signature), testCaseParams.hmac… in RunTestCase()
|
H A D | hks_crypto_hal_rsa_encrypt.cpp | 48 .digest = HKS_DIGEST_NONE, 69 .digest = HKS_DIGEST_NONE, 97 .digest = HKS_DIGEST_NONE, 120 .digest = HKS_DIGEST_NONE, 146 .digest = HKS_DIGEST_NONE, 174 .digest = HKS_DIGEST_NONE, 206 .digest = HKS_DIGEST_NONE, 222 .digest = HKS_DIGEST_NONE, 238 .digest = HKS_DIGEST_NONE, 255 .digest = HKS_DIGEST_NONE, [all …]
|
H A D | hks_crypto_hal_dsa_sign.cpp | 39 .digest = HKS_DIGEST_SHA1, 47 .digest = HKS_DIGEST_SHA224, 55 .digest = HKS_DIGEST_SHA256, 63 .digest = HKS_DIGEST_SHA384, 71 .digest = HKS_DIGEST_SHA512, 112 EXPECT_EQ(HksCryptoHalHash(hksUsageSpec.digest, &message, &hash), HKS_SUCCESS); in RunTestCase()
|
H A D | hks_crypto_hal_aes_decrypt.cpp | 59 .digest = HKS_DIGEST_NONE, 74 .digest = HKS_DIGEST_NONE, 89 .digest = HKS_DIGEST_NONE, 105 .digest = HKS_DIGEST_NONE, 120 .digest = HKS_DIGEST_NONE, 148 .digest = HKS_DIGEST_NONE, 163 .digest = HKS_DIGEST_NONE, 178 .digest = HKS_DIGEST_NONE, 194 .digest = HKS_DIGEST_NONE, 209 .digest = HKS_DIGEST_NONE, [all …]
|
/ohos5.0/base/update/updateservice/services/core/ability/utils/src/ |
H A D | sha256_utils.cpp | 62 bool Sha256Utils::GetDigestFromFile(const char *fileName, unsigned char digest[]) in GetDigestFromFile() argument 92 mbedtls_sha256_finish(&context, digest); in GetDigestFromFile() 100 unsigned char digest[SHA256_LENGTH] = {0}; in GetFileSha256Str() local 101 GetDigestFromFile(fileName.c_str(), digest); in GetFileSha256Str() 102 return TransDigestToSha256Result(sha256Result, len, digest); in GetFileSha256Str() 107 unsigned char digest[SHA256_LENGTH] = {0}; in Sha256Calculate() local 129 int finishRet = mbedtls_sha256_finish(&ctx, digest); in Sha256Calculate() 136 return TransDigestToSha256Result(componentId, componentIdLen, digest); in Sha256Calculate() 139 …TransDigestToSha256Result(char *sha256Result, uint32_t componentIdLen, const unsigned char *digest) in TransDigestToSha256Result() argument 147 … int result = sprintf_s(sha256Result + deviation, (componentIdLen - deviation), "%02x", digest[i]); in TransDigestToSha256Result()
|
/ohos5.0/base/security/code_signature/test/unittest/ |
H A D | local_code_sign_utils_test.cpp | 56 ByteBuffer digest; variable 61 bRet = FsverityUtilsHelper::GetInstance().GenerateFormattedDigest(realPath.c_str(), digest); 66 digest, signature); 78 ByteBuffer digest; variable 83 bRet = FsverityUtilsHelper::GetInstance().GenerateFormattedDigest(realPath.c_str(), digest); 88 digest, signature); 100 ByteBuffer digest; variable 102 … bool bRet = FsverityUtilsHelper::GetInstance().GenerateFormattedDigest(realPath.c_str(), digest);
|
/ohos5.0/base/update/packaging_tools/ |
H A D | build_pkcs7.py | 71 return hash_sha256.digest() 89 digest, 98 def sign_digest(digest, private_key_file): argument 110 digest, 119 def create_encap_content_info(digest): argument 120 if not digest: 125 SHA256_HASH_LEN, digest) 159 digest = calculate_package_hash(package_path) 160 data = create_encap_content_info(digest) 161 signature = sign_digest(digest, private_key) [all …]
|
H A D | create_update_package.py | 170 package_file.write(component.digest) 202 return hash_sha256.digest() 214 return hash_sha256.digest() 216 def sign_digest_with_pss(self, digest): argument 234 def sign_digest(self, digest): argument 250 digest = self.calculate_hash(package_file) 251 if not digest: 258 signature = self.sign_digest(digest) 280 digest = self.calculate_header_hash(package_file) 281 if not digest: [all …]
|
/ohos5.0/docs/en/application-dev/security/CryptoArchitectureKit/ |
H A D | crypto-generate-message-digest-overview.md | 3 The message digest (MD) algorithm allows a fixed-length digest to be generated from data of arbitra… 6 When the same digest algorithm is used, the generated digest (hash value) has the following feature… 11 - The digest generated is of the fixed length no matter the length of messages. (The digest length … 13 …es with the same hash value. (The probability still exists, depending on the length of the digest.)
|
/ohos5.0/base/update/updater/test/fuzztest/package_fuzzer/ |
H A D | package_fuzzer.cpp | 104 ret = BuildFileDigest(*comp[n].digest, sizeof(comp[n].digest), filePath); in TestPackagePack() 184 std::vector<uint8_t> digest(digestSize); in TestVerifyUpgradePackage() local 186 BuildFileDigest(*digest.data(), digest.capacity(), path.c_str()); in TestVerifyUpgradePackage() 187 …int ret = VerifyPackage(path.c_str(), GetFuzzCertName(0).c_str(), "", digest.data(), digest.capaci… in TestVerifyUpgradePackage() 188 ret = VerifyPackage(nullptr, nullptr, nullptr, nullptr, digest.capacity()); in TestVerifyUpgradePackage() 254 std::vector<uint8_t> digest(digestSize); in FuzzVerifyPackage() local 259 VerifyPackage(dataInfo.c_str(), keyPath.c_str(), "", digest.data(), digest.capacity()); in FuzzVerifyPackage() 260 VerifyPackage(pkgPath.c_str(), dataInfo.c_str(), "", digest.data(), digest.capacity()); in FuzzVerifyPackage() 261 …VerifyPackage(pkgPath.c_str(), keyPath.c_str(), dataInfo.c_str(), digest.data(), digest.capacity()… in FuzzVerifyPackage()
|
/ohos5.0/base/hiviewdfx/hiview/base/include/ |
H A D | audit_log_parser.h | 31 std::string digest = ""; member 43 " TimeCost:" + std::to_string((outTime - inTime)) + " Digest:" + digest; in ToString() 53 std::string digest = ""; member 64 " Digest:" + digest; in ToString() 78 …tInfo() : eventSerialId(0), createTime(0), destroyTime(0), creator(""), pipeline(""), digest(""){}; in PipelineEventInfo() 80 …SerialId(info.eventSerialId), createTime(info.inTime), creator(info.sender), digest(info.digest){}; in PipelineEventInfo()
|
/ohos5.0/docs/en/release-notes/changelogs/OpenHarmony_5.0.0.22/ |
H A D | changelogs-crypto_framework.md | 11 When DSA algorithm is used for signing or signature verification with the digest algorithm set to *… 17 Before the change:<br>When DSA is used for signing with the digest algorithm set to **NoHash**, cal… 19 After the change:<br>When DSA is used for signing with the digest algorithm set to **NoHash**, call… 21 Before the change:<br>When DSA is used to verify the signature data with the digest algorithm set t… 23 After the change:<br>When DSA is used to verify the signature data with the digest algorithm set to… 39 When DSA is used for signing or signature verification and the digest algorithm is set to **NoHash*…
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/sdk_test/src/ |
H A D | hks_inner_test.cpp | 160 HksParam digest; variable 161 digest.tag = HKS_TAG_DIGEST; 162 digest.uint32Param = HKS_DIGEST_SHA256; 163 HksAddParams(paramSetTest, &digest, 1); 207 HksParam digest; variable 208 digest.tag = HKS_TAG_DIGEST; 209 digest.uint32Param = HKS_DIGEST_SHA256; 210 HksAddParams(paramSet, &digest, 1); 327 HksParam digest; variable 328 digest.tag = HKS_TAG_DIGEST; [all …]
|
/ohos5.0/base/update/updater/services/package/pkg_package/ |
H A D | pkg_upgradefile.cpp | 73 …if (memcpy_s(fileInfo_.digest, sizeof(fileInfo_.digest), info->digest, sizeof(info->digest)) != EO… in Init() 555 PkgBuffer digest(GetDigestLen()); in Verify() local 556 algorithm->Final(digest); in Verify() 557 ret = verifier(&pkgInfo_.pkgInfo, digest.data, signData); in Verify() 570 PkgBuffer digest(GetDigestLen()); in VerifyHeader() local 571 algorithm->Final(digest); in VerifyHeader() 788 ret = memcpy_s(comp.digest, sizeof(comp.digest), fileInfo_.digest, sizeof(fileInfo_.digest)); in GetUpGradeCompInfo() 846 …if (memcpy_s(context.digest, sizeof(context.digest), fileInfo_.digest, sizeof(fileInfo_.digest)) !… in Pack() 857 …if (memcpy_s(fileInfo_.digest, sizeof(fileInfo_.digest), context.digest, sizeof(context.digest)) !… in Pack() 899 …int32_t ret = memcpy_s(fileInfo_.digest, sizeof(fileInfo_.digest), info->digest, sizeof(info->dige… in DecodeHeader() [all …]
|
/ohos5.0/base/security/huks/test/unittest/huks_common_test/include/ |
H A D | hks_test_common_h.h | 39 uint32_t digest; \ 72 uint32_t digest; member 84 uint32_t digest; member 103 uint32_t digest; member 112 uint32_t digest; member 138 uint32_t digest; member 295 uint32_t digest; member 307 uint32_t digest; member 352 bool setDigest, uint32_t digest);
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/ |
H A D | hks_import_rsa_test.cpp | 483 uint32_t digest, uint32_t importType) in ModifyImportParams() argument 488 g_importRsaKeyParams[TAG_DIGEST_ID].uint32Param = digest; in ModifyImportParams() 504 g_initOp1Params[TAG_DIGEST_ID].uint32Param = digest; in ModifyinitOp1Params() 512 g_initOp2Params[TAG_DIGEST_ID].uint32Param = digest; in ModifyinitOp2Params() 775 ModifyinitOp1Params(purposeOp1, keySize, padding, digest); in RsaImportPlainKeyAnotherTest() 776 ModifyinitOp2Params(purposeTestOp2, keySize, padding, digest); in RsaImportPlainKeyAnotherTest() 814 ModifyImportParams(purposePair, keySize, padding, digest, HKS_KEY_TYPE_KEY_PAIR); in RsaImportPlainKeyTest() 830 ModifyinitOp1Params(purposeOp1, keySize, padding, digest); in RsaImportPlainKeyTest() 831 ModifyinitOp2Params(purposeOp2, keySize, padding, digest); in RsaImportPlainKeyTest() 852 return RsaImportPlainKeyTest(purpose, keySize, padding, digest); in ImportRsaPlainKeyTest() [all …]
|
/ohos5.0/docs/zh-cn/application-dev/security/CryptoArchitectureKit/ |
H A D | crypto-generate-message-digest.md | 3 对应的算法规格请查看[消息摘要计算算法规格](crypto-generate-message-digest-overview.md#支持的算法与规格)。 22 3. 调用[Md.digest](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#digest),获取… 38 let mdResult = await md.digest(); 70 3. 调用[Md.digest](../../reference/apis-crypto-architecture-kit/js-apis-cryptoFramework.md#digest-1),… 92 let mdOutput = await md.digest();
|