Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 740) sorted by relevance

12345678910>>...30

/ohos5.0/docs/en/device-dev/subsystems/
H A Dsubsys-security-sigverify.md10signature of the installation package, and verifies the signature using the application integrity …
17signature block is added between the file block and the central directory. The integrated signatur…
23 The signature verification process consists of three steps: HAP signature verification, profile sig…
25 **HAP signature verification**
27 The HAP signature block is a signed data block in PKCS #7 format. The signature verification proces…
29 **Profile signature verification**
31signature block is a signed data block in PKCS #7 format. The profile content is stored in **conte…
35signature verification module checks the validity of the profile content. If the profile is of the…
40 The following table lists the **innerkits** APIs provided by the signature verification component. …
46 …;char \*filePath, VerifyResult \*verifyRst) | Verifies a signature based on the spe…
[all …]
/ohos5.0/docs/zh-cn/device-dev/subsystems/
H A Dsubsys-security-devicesecuritylevel.md259 #### 3. 构造signature
261 signature是对前面header和payload的签名
297 3. 将`<ecc-l3-pk>`和`<ecc-l3-pk-signature>`组合成json字符串示例如下:
302 "signature": "<ecc-l3-pk-signature>"
310 3. 将`<ecc-l3-pk>`和`<ecc-l3-pk-signature>`组合成json字符串示例如下:
315 "signature": "<ecc-l2-pk-signature>"
322 2. 将`<ecc-root-pk>`和`<ecc-root-pk-self-signature>`组合成json字符串示例如下:
327 "signature": "<ecc-root-pk-self-signature>"
339 "signature": "<ecc-l3-pk-signature>"
343 "signature": "<ecc-l2-pk-signature>"
[all …]
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/
H A Dhks_mbedtls_ecdsa.c43 const struct HksBlob *message, struct HksBlob *signature) in HksMbedtlsEcdsaSign() argument
77 size_t keyLen = (size_t)(signature->size); in HksMbedtlsEcdsaSign()
79 signature->data, keyLen, &keyLen, mbedtls_ctr_drbg_random, &ctrDrbg); in HksMbedtlsEcdsaSign()
80 signature->size = (uint32_t)keyLen; in HksMbedtlsEcdsaSign()
81 if (ret != HKS_MBEDTLS_SUCCESS || keyLen != (size_t)(signature->size)) { in HksMbedtlsEcdsaSign()
83 (void)memset_s(signature->data, signature->size, 0, signature->size); in HksMbedtlsEcdsaSign()
96 const struct HksBlob *message, const struct HksBlob *signature) in HksMbedtlsEcdsaVerify() argument
121 message->data, message->size, signature->data, signature->size); in HksMbedtlsEcdsaVerify()
/ohos5.0/docs/en/application-dev/reference/apis-crypto-architecture-kit/
H A D_crypto_signature_api.md6 Provides APIs for signature verification.
61 Defines the data used for signature verification.
77 Enumerates the types of signature verification parameters.
102 Creates a **Verify** instance for signature verification.
155 Verifies the signature of the data.
165 | out | Pointer to the signature data. |
186 Obtains the signature verification algorithm.
209 Obtains a signature verification parameter.
284 Restores the signature data.
293 | signData | Pointer to the signature data to be restored. |
[all …]
H A Dcrypto__signature_8h.md6 Provides APIs for signature verification.
24 …y](_crypto_signature_api.md#oh_cryptoverify) | Defines the data used for signature verification. |
31 …= 104, CRYPTO_SM2_USER_ID_DATABLOB = 105<br>} | Enumerates the types of signature verification par…
38 …_api.md#oh_cryptoverify) \*\*verify) | Creates a **Verify** instance for signature verification. |
41 …*in, [Crypto_DataBlob](_crypto___data_blob.md) \*signData) | Verifies the signature of the data. |
42 …ignData, [Crypto_DataBlob](_crypto___data_blob.md) \*rawSignData) | Restores the signature data. |
43 …oVerify](_crypto_signature_api.md#oh_cryptoverify) \*ctx) | Obtains the signature verification alg…
44 …amtype) type, [Crypto_DataBlob](_crypto___data_blob.md) \*value) | Sets signature verification par…
45 …ype) type, [Crypto_DataBlob](_crypto___data_blob.md) \*value) | Obtains signature verification par…
/ohos5.0/base/security/device_security_level/oem_property/common/
H A Ddslm_credential_utils.c60 DataBuffer signature; member
66 DataBuffer signature; member
74 const char *signature; member
302 if (attestation->signature.data != NULL) { in FreePublicKeyAttestation()
303 FREE(attestation->signature.data); in FreePublicKeyAttestation()
317 FREE(attestation->signature.data); in FreePayloadAttestation()
329 DataBuffer *signature = &attestation->signature; in ParsePayloadAttestation() local
330signature->length = (uint32_t)Base64UrlDecodeApp((uint8_t *)credCb->signature, &signature->data); in ParsePayloadAttestation()
331 if (signature->length == 0 || signature->data == NULL) { in ParsePayloadAttestation()
371 …attestation->signature.length = (uint32_t)Base64UrlDecodeApp((uint8_t *)sigData, &attestation->sig… in ParsePublicKeyAttestation()
[all …]
/ohos5.0/base/security/code_signature/test/unittest/
H A Denable_verity_test.cpp333 ByteBuffer signature; in EnableExpandedTamperFile() local
372 ByteBuffer signature; variable
393 ByteBuffer signature; variable
424 ByteBuffer signature; variable
447 ByteBuffer signature; variable
468 ByteBuffer signature; variable
496 ByteBuffer signature; variable
538 ByteBuffer signature; variable
571 ByteBuffer signature; variable
602 ByteBuffer signature; variable
[all …]
/ohos5.0/base/update/updater/services/package/pkg_verify/
H A Dpkg_verify_util.cpp44 int32_t ret = pkcs7.ReadSig(signature.data(), signature.size(), sigs); in VerifySourceDigest()
64 std::vector<uint8_t> signature; in VerifyAccPackageSign() local
66 if (GetSignature(pkgStream, signatureSize, signature, commentTotalLenAll) != PKG_SUCCESS) { in VerifyAccPackageSign()
77 return VerifySourceDigest(signature, sourceDigest, keyPath); in VerifyAccPackageSign()
105 std::vector<uint8_t> signature; in VerifyPackageSign() local
107 if (GetSignature(pkgStream, signatureSize, signature, commentTotalLenAll) != PKG_SUCCESS) { in VerifyPackageSign()
114 int32_t ret = Pkcs7verify(signature, hash); in VerifyPackageSign()
132 std::vector<uint8_t> &signature, uint16_t &commentTotalLenAll) const in GetSignature() argument
151 signature.assign(signData.buffer, signData.buffer + readLen); in GetSignature()
181 int32_t PkgVerifyUtil::Pkcs7verify(std::vector<uint8_t> &signature, std::vector<uint8_t> &hash) con… in Pkcs7verify() argument
[all …]
/ohos5.0/base/security/code_signature/interfaces/innerkits/jit_code_sign/src/
H A Djit_code_signer_hybrid.cpp63 uint32_t signature = ctx_.Update(insn); in SignInstruction() local
64 signTable_.push_back(signature); in SignInstruction()
90 uint32_t signature = ctx_.SignSingle(insn, curIndex); in PatchInstruction() local
91 signTable_[curIndex] = signature; in PatchInstruction()
109 uint32_t signature = verifyCtx.Update(*insnPtr); in ValidateSubCode() local
110 if (signature != signTable_[index]) { in ValidateSubCode()
114 *(insnPtr), index * INSTRUCTION_SIZE, signature, signTable_[index]); in ValidateSubCode()
148 uint32_t signature = verifyCtx.SignSingle(insn, index); in ValidateCodeCopy() local
149 if (signature != signTable_[index]) { in ValidateCodeCopy()
153 insn, index, signature, signTable_[index]); in ValidateCodeCopy()
H A Dpac_sign_ctx.cpp145 uint32_t signature = SignWithContext(value); in Update() local
146 SetContext(signature); in Update()
149 context_, signature); in Update()
151 return signature; in Update()
157 uint32_t signature = PACGA(value, paddingContext); in SignSingle() local
159 LOG_INFO("Get signature = %{public}x", signature); in SignSingle()
161 return signature; in SignSingle()
H A Djit_code_signer_single.cpp66 uint32_t signature = ctx_.SignSingle(insn, curIndex); in PatchInstruction() local
67 signTable_[curIndex] = signature; in PatchInstruction()
84 uint32_t signature = verifyCtx.SignSingle(insn, index); in ValidateCodeCopy() local
85 if (signature != signTable_[index]) { in ValidateCodeCopy()
89 insn, index * INSTRUCTION_SIZE, signature, signTable_[index]); in ValidateCodeCopy()
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/
H A Dhks_crypto_hal_api_openssl.cpp309 HksBlob signature = { .size = 0, .data = nullptr }; variable
320 signature = { .size = 1, .data = buff };
336 HksBlob signature = { .size = 0, .data = nullptr }; variable
347 signature = { .size = 1, .data = buff };
369 HksBlob signature = { .size = 1, .data = buff }; variable
392 HksBlob signature = { .size = 1, .data = buff }; variable
416 HksBlob signature = { .size = 1, .data = buff }; variable
436 HksBlob signature = { .size = 1, .data = buff }; variable
453 HksBlob signature = { .size = 1, .data = buff }; variable
475 HksBlob signature = { .size = 1, .data = buff }; variable
[all …]
/ohos5.0/base/update/packaging_tools/
H A Dbuild_pkcs7.py88 signature = private_key.sign(
95 return signature
109 signature = private_key.sign(
116 return signature
129 def write_signed_package(unsigned_package, signature, signed_package): argument
133 signature_size = len(signature)
151 f_signed.write(signature)
161 signature = sign_digest(digest, private_key)
170 signatute_file.write(signature)
209 signer_info['signature'] = signature
H A Dcreate_update_package.py232 return signature
245 return signature
258 signature = self.sign_digest(digest)
260 signature = self.sign_digest_with_pss(digest)
264 if not signature:
268 if len(signature) == SIGN_SHA384_LEN:
273 package_file.write(signature)
288 signature = self.sign_digest(digest)
290 signature = self.sign_digest_with_pss(digest)
294 if not signature:
[all …]
/ohos5.0/base/security/device_security_level/test/dslm_unit_test/cmocker/
H A Dc_mocker.h67 #define PARAMETER(index, signature, dummy) \ argument
68 GMOCK_PP_COMMA_IF(index) GMOCK_INTERNAL_ARG_O(index, GMOCK_PP_REMOVE_PARENS(signature))
77 #define IMPLEMENT_FUNCTION_INTERNAL(cls, method, count, signature, invoker) … argument
79 …testing::internal::Function<GMOCK_PP_REMOVE_PARENS(signature)>::Result method( …
80 …GMOCK_PP_REPEAT(GMOCK_INTERNAL_PARAMETER, signature, count)) \
93 … return mock->method(GMOCK_PP_REPEAT(GMOCK_INTERNAL_FORWARD_ARG, signature, count)); \
97 … return stub(GMOCK_PP_REPEAT(GMOCK_INTERNAL_FORWARD_ARG, signature, count)); \
101 …return testing::internal::Function<GMOCK_PP_REMOVE_PARENS(signature)>::Result(); \
/ohos5.0/drivers/peripheral/user_auth/test/unittest/mocks/inc/
H A Dc_mocker.h67 #define PARAMETER(index, signature, dummy) \ argument
68 GMOCK_PP_COMMA_IF(index) GMOCK_INTERNAL_ARG_O(index, GMOCK_PP_REMOVE_PARENS(signature))
77 #define IMPLEMENT_FUNCTION_INTERNAL(cls, method, count, signature, invoker) … argument
79 …testing::internal::Function<GMOCK_PP_REMOVE_PARENS(signature)>::Result method( …
80 …GMOCK_PP_REPEAT(GMOCK_INTERNAL_PARAMETER, signature, count)) \
93 … return mock->method(GMOCK_PP_REPEAT(GMOCK_INTERNAL_FORWARD_ARG, signature, count)); \
97 … return stub(GMOCK_PP_REPEAT(GMOCK_INTERNAL_FORWARD_ARG, signature, count)); \
101 …return testing::internal::Function<GMOCK_PP_REMOVE_PARENS(signature)>::Result(); \
/ohos5.0/drivers/peripheral/user_auth/hdi_service/key_mgr/src/
H A Ded25519_key.c67 Buffer *signature = NULL; in ExecutorMsgSign() local
68 int32_t ret = Ed25519Sign(g_keyPair, data, &signature); in ExecutorMsgSign()
73 if (signature->contentSize != ED25519_FIX_SIGN_BUFFER_SIZE) { in ExecutorMsgSign()
75 DestoryBuffer(signature); in ExecutorMsgSign()
78 return signature; in ExecutorMsgSign()
/ohos5.0/docs/en/release-notes/changelogs/OpenHarmony_5.0.0.22/
H A Dchangelogs-crypto_framework.md11 When DSA algorithm is used for signing or signature verification with the digest algorithm set to *…
17 … to **NoHash**, calling **update()** returns a success message, but the signature generated is inc…
21 …to verify the signature data with the digest algorithm set to **NoHash**, calling **update()** ret…
23 After the change:<br>When DSA is used to verify the signature data with the digest algorithm set to…
39signature verification and the digest algorithm is set to **NoHash**, do not use **update()**. If …
/ohos5.0/docs/en/application-dev/reference/apis-network-kit/
H A Derrorcode-net-networkSecurity.md61 Unable to decrypt certificate signature.
65 This error code is reported if the attempt to decrypt the certificate signature fails.
79 Unable to decrypt CRL signature.
83 This error code is reported if the attempt to decrypt the CRL signature fails.
115 Certificate signature failure.
123 The certificate signature is incorrectly calculated, or the digital signature algorithm used by the…
127signature algorithm used by the certificate is supported by the client, the signature key of the …
133 CRL signature failure.
141 The CRL signature is incorrectly calculated, or the digital signature algorithm used by the CRL is …
145 Check that the signature algorithm and signature key of the CRL are correct. Alternatively, regener…
[all …]
/ohos5.0/foundation/resourceschedule/ffrt/src/dm/
H A Dsdependence_manager.cpp222 if (waitData->signature == out->signature) { in onWait()
310 for (auto signature : inDeps) { in MapSignature2Deps() local
315 if (parentOut->signature == signature) { in MapSignature2Deps()
323 if (parentIn->signature == signature) { in MapSignature2Deps()
330 version = en->VA2Ctx(signature, task); in MapSignature2Deps()
335 for (auto signature : outDeps) { in MapSignature2Deps() local
340 if (parentOut->signature == signature) { in MapSignature2Deps()
349 if (parentIn->signature == signature) { in MapSignature2Deps()
355 version = en->VA2Ctx(signature, task); in MapSignature2Deps()
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/source/key_agreement/
H A Dsts_client.c172 …t verify_response_data(void *handle, const struct uint8_buff *message, struct signature *signature) in verify_response_data() argument
177 check_ptr_return_val(signature, HC_INPUT_ERROR); in verify_response_data()
212 static int32_t generate_sts_request_sign(void *handle, struct signature *signature) in generate_sts_request_sign() argument
250 int32_t ret = sign(&key_alias, &sign_message, signature); in generate_sts_request_sign()
274 static int32_t init_signature(void *handle, struct signature *signature) in init_signature() argument
306 …if (memcpy_s(signature->signature, sizeof(signature->signature), out_plain.val, out_plain.length) … in init_signature()
310 signature->length = out_plain.length; in init_signature()
317 struct signature signature = { 0, {0} }; in verify_data() local
318 int32_t ret = init_signature(handle, &signature); in verify_data()
330 ret = verify_response_data(handle, &message, &signature); in verify_data()
[all …]
/ohos5.0/docs/en/application-dev/security/DeviceCertificateKit/
H A DcertManager-guidelines.md15 …- Perform signing and signature verification using an application certificate and its private cred…
19 …ted, you need to know the combinations of the algorithm and the signing/signature verification par…
21signature verification in certificate management depends on [HUKS](../UniversalKeystoreKit/huks-ov…
37 …ec: CMSignatureSpec) : Promise\<CMHandle> | Initializes the signing or signature verification ope…
41 | certificateManager | finish(handle: Uint8Array, signature: Uint8Array, callback: AsyncCall…
42 … | finish(handle: Uint8Array, signature?: Uint8Array) : Promise\<CMResult> | Finishes the si…
43 … callback: AsyncCallback\<void>) : void | Aborts the signing or signature verification ope…
44 … | abort(handle: Uint8Array) : Promise\<void> | Aborts the signing or signature verification ope…
93 /* Generate a signature. */
98 /* Construct the parameters for signature verification. */
[all …]
/ohos5.0/base/security/code_signature/interfaces/innerkits/local_code_sign/src/
H A Dlocal_code_sign_kit.cpp28 int32_t LocalCodeSignKit::SignLocalCode(const std::string &filePath, ByteBuffer &signature) in SignLocalCode() argument
30 return LocalCodeSignClient::GetInstance().SignLocalCode("", filePath, signature); in SignLocalCode()
33 …nKit::SignLocalCode(const std::string &ownerID, const std::string &filePath, ByteBuffer &signature) in SignLocalCode() argument
35 return LocalCodeSignClient::GetInstance().SignLocalCode(ownerID, filePath, signature); in SignLocalCode()
/ohos5.0/base/security/huks/test/unittest/huks_common_test/src/
H A Dhks_test_curve25519_func.cpp87 struct HksBlob signature = { TEST_CURVE_256, g_buffer }; in TestSignEd25519() local
88 ret = HksSignForDe(&alias, paramSet, &msg, &signature); in TestSignEd25519()
90 g_bufferSize = signature.size; in TestSignEd25519()
132 struct HksBlob signature = { g_bufferSize, g_buffer }; in TestVerifyEd25519() local
133 ret = HksVerifyForDe(&alias, paramSet, &msg, &signature); in TestVerifyEd25519()
310 struct HksBlob signature = { TEST_CURVE_256, g_buffer }; in TestEd25519SignTeeVerifyLocal() local
372 struct HksBlob signature = { TEST_CURVE_256, g_buffer }; in TestSignEd25519Wrong() local
373 ret = HksSignForDe(&alias, paramSet, &msg, &signature); in TestSignEd25519Wrong()
375 g_bufferSize = signature.size; in TestSignEd25519Wrong()
432 struct HksBlob signature = { g_bufferSize, g_buffer }; in TestVerifyEd25519Wrong() local
[all …]
/ohos5.0/docs/zh-cn/application-dev/reference/apis-network-kit/
H A Djs-apis-networkSecurity.md98 | 2305004 | Unable to decrypt certificate signature. |
99 | 2305005 | Unable to decrypt CRL signature. |
101 | 2305007 | Certificate signature failure. |
102 | 2305008 | CRL signature failure. |
178 | 2305004 | Unable to decrypt certificate signature. |
179 | 2305005 | Unable to decrypt CRL signature. |
181 | 2305007 | Certificate signature failure. |
182 | 2305008 | CRL signature failure. |

12345678910>>...30