/ohos5.0/docs/en/device-dev/subsystems/ |
H A D | subsys-security-sigverify.md | 10 …signature of the installation package, and verifies the signature using the application integrity … 17 …signature block is added between the file block and the central directory. The integrated signatur… 23 The signature verification process consists of three steps: HAP signature verification, profile sig… 25 **HAP signature verification** 27 The HAP signature block is a signed data block in PKCS #7 format. The signature verification proces… 29 **Profile signature verification** 31 …signature block is a signed data block in PKCS #7 format. The profile content is stored in **conte… 35 …signature verification module checks the validity of the profile content. If the profile is of the… 40 The following table lists the **innerkits** APIs provided by the signature verification component. … 46 …;char \*filePath, VerifyResult \*verifyRst) | Verifies a signature based on the spe… [all …]
|
/ohos5.0/docs/zh-cn/device-dev/subsystems/ |
H A D | subsys-security-devicesecuritylevel.md | 259 #### 3. 构造signature 261 signature是对前面header和payload的签名 297 3. 将`<ecc-l3-pk>`和`<ecc-l3-pk-signature>`组合成json字符串示例如下: 302 "signature": "<ecc-l3-pk-signature>" 310 3. 将`<ecc-l3-pk>`和`<ecc-l3-pk-signature>`组合成json字符串示例如下: 315 "signature": "<ecc-l2-pk-signature>" 322 2. 将`<ecc-root-pk>`和`<ecc-root-pk-self-signature>`组合成json字符串示例如下: 327 "signature": "<ecc-root-pk-self-signature>" 339 "signature": "<ecc-l3-pk-signature>" 343 "signature": "<ecc-l2-pk-signature>" [all …]
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/ |
H A D | hks_mbedtls_ecdsa.c | 43 const struct HksBlob *message, struct HksBlob *signature) in HksMbedtlsEcdsaSign() argument 77 size_t keyLen = (size_t)(signature->size); in HksMbedtlsEcdsaSign() 79 signature->data, keyLen, &keyLen, mbedtls_ctr_drbg_random, &ctrDrbg); in HksMbedtlsEcdsaSign() 80 signature->size = (uint32_t)keyLen; in HksMbedtlsEcdsaSign() 81 if (ret != HKS_MBEDTLS_SUCCESS || keyLen != (size_t)(signature->size)) { in HksMbedtlsEcdsaSign() 83 (void)memset_s(signature->data, signature->size, 0, signature->size); in HksMbedtlsEcdsaSign() 96 const struct HksBlob *message, const struct HksBlob *signature) in HksMbedtlsEcdsaVerify() argument 121 message->data, message->size, signature->data, signature->size); in HksMbedtlsEcdsaVerify()
|
/ohos5.0/docs/en/application-dev/reference/apis-crypto-architecture-kit/ |
H A D | _crypto_signature_api.md | 6 Provides APIs for signature verification. 61 Defines the data used for signature verification. 77 Enumerates the types of signature verification parameters. 102 Creates a **Verify** instance for signature verification. 155 Verifies the signature of the data. 165 | out | Pointer to the signature data. | 186 Obtains the signature verification algorithm. 209 Obtains a signature verification parameter. 284 Restores the signature data. 293 | signData | Pointer to the signature data to be restored. | [all …]
|
H A D | crypto__signature_8h.md | 6 Provides APIs for signature verification. 24 …y](_crypto_signature_api.md#oh_cryptoverify) | Defines the data used for signature verification. | 31 …= 104, CRYPTO_SM2_USER_ID_DATABLOB = 105<br>} | Enumerates the types of signature verification par… 38 …_api.md#oh_cryptoverify) \*\*verify) | Creates a **Verify** instance for signature verification. | 41 …*in, [Crypto_DataBlob](_crypto___data_blob.md) \*signData) | Verifies the signature of the data. | 42 …ignData, [Crypto_DataBlob](_crypto___data_blob.md) \*rawSignData) | Restores the signature data. | 43 …oVerify](_crypto_signature_api.md#oh_cryptoverify) \*ctx) | Obtains the signature verification alg… 44 …amtype) type, [Crypto_DataBlob](_crypto___data_blob.md) \*value) | Sets signature verification par… 45 …ype) type, [Crypto_DataBlob](_crypto___data_blob.md) \*value) | Obtains signature verification par…
|
/ohos5.0/base/security/device_security_level/oem_property/common/ |
H A D | dslm_credential_utils.c | 60 DataBuffer signature; member 66 DataBuffer signature; member 74 const char *signature; member 302 if (attestation->signature.data != NULL) { in FreePublicKeyAttestation() 303 FREE(attestation->signature.data); in FreePublicKeyAttestation() 317 FREE(attestation->signature.data); in FreePayloadAttestation() 329 DataBuffer *signature = &attestation->signature; in ParsePayloadAttestation() local 330 … signature->length = (uint32_t)Base64UrlDecodeApp((uint8_t *)credCb->signature, &signature->data); in ParsePayloadAttestation() 331 if (signature->length == 0 || signature->data == NULL) { in ParsePayloadAttestation() 371 …attestation->signature.length = (uint32_t)Base64UrlDecodeApp((uint8_t *)sigData, &attestation->sig… in ParsePublicKeyAttestation() [all …]
|
/ohos5.0/base/security/code_signature/test/unittest/ |
H A D | enable_verity_test.cpp | 333 ByteBuffer signature; in EnableExpandedTamperFile() local 372 ByteBuffer signature; variable 393 ByteBuffer signature; variable 424 ByteBuffer signature; variable 447 ByteBuffer signature; variable 468 ByteBuffer signature; variable 496 ByteBuffer signature; variable 538 ByteBuffer signature; variable 571 ByteBuffer signature; variable 602 ByteBuffer signature; variable [all …]
|
/ohos5.0/base/update/updater/services/package/pkg_verify/ |
H A D | pkg_verify_util.cpp | 44 int32_t ret = pkcs7.ReadSig(signature.data(), signature.size(), sigs); in VerifySourceDigest() 64 std::vector<uint8_t> signature; in VerifyAccPackageSign() local 66 if (GetSignature(pkgStream, signatureSize, signature, commentTotalLenAll) != PKG_SUCCESS) { in VerifyAccPackageSign() 77 return VerifySourceDigest(signature, sourceDigest, keyPath); in VerifyAccPackageSign() 105 std::vector<uint8_t> signature; in VerifyPackageSign() local 107 if (GetSignature(pkgStream, signatureSize, signature, commentTotalLenAll) != PKG_SUCCESS) { in VerifyPackageSign() 114 int32_t ret = Pkcs7verify(signature, hash); in VerifyPackageSign() 132 std::vector<uint8_t> &signature, uint16_t &commentTotalLenAll) const in GetSignature() argument 151 signature.assign(signData.buffer, signData.buffer + readLen); in GetSignature() 181 int32_t PkgVerifyUtil::Pkcs7verify(std::vector<uint8_t> &signature, std::vector<uint8_t> &hash) con… in Pkcs7verify() argument [all …]
|
/ohos5.0/base/security/code_signature/interfaces/innerkits/jit_code_sign/src/ |
H A D | jit_code_signer_hybrid.cpp | 63 uint32_t signature = ctx_.Update(insn); in SignInstruction() local 64 signTable_.push_back(signature); in SignInstruction() 90 uint32_t signature = ctx_.SignSingle(insn, curIndex); in PatchInstruction() local 91 signTable_[curIndex] = signature; in PatchInstruction() 109 uint32_t signature = verifyCtx.Update(*insnPtr); in ValidateSubCode() local 110 if (signature != signTable_[index]) { in ValidateSubCode() 114 *(insnPtr), index * INSTRUCTION_SIZE, signature, signTable_[index]); in ValidateSubCode() 148 uint32_t signature = verifyCtx.SignSingle(insn, index); in ValidateCodeCopy() local 149 if (signature != signTable_[index]) { in ValidateCodeCopy() 153 insn, index, signature, signTable_[index]); in ValidateCodeCopy()
|
H A D | pac_sign_ctx.cpp | 145 uint32_t signature = SignWithContext(value); in Update() local 146 SetContext(signature); in Update() 149 context_, signature); in Update() 151 return signature; in Update() 157 uint32_t signature = PACGA(value, paddingContext); in SignSingle() local 159 LOG_INFO("Get signature = %{public}x", signature); in SignSingle() 161 return signature; in SignSingle()
|
H A D | jit_code_signer_single.cpp | 66 uint32_t signature = ctx_.SignSingle(insn, curIndex); in PatchInstruction() local 67 signTable_[curIndex] = signature; in PatchInstruction() 84 uint32_t signature = verifyCtx.SignSingle(insn, index); in ValidateCodeCopy() local 85 if (signature != signTable_[index]) { in ValidateCodeCopy() 89 insn, index * INSTRUCTION_SIZE, signature, signTable_[index]); in ValidateCodeCopy()
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/ |
H A D | hks_crypto_hal_api_openssl.cpp | 309 HksBlob signature = { .size = 0, .data = nullptr }; variable 320 signature = { .size = 1, .data = buff }; 336 HksBlob signature = { .size = 0, .data = nullptr }; variable 347 signature = { .size = 1, .data = buff }; 369 HksBlob signature = { .size = 1, .data = buff }; variable 392 HksBlob signature = { .size = 1, .data = buff }; variable 416 HksBlob signature = { .size = 1, .data = buff }; variable 436 HksBlob signature = { .size = 1, .data = buff }; variable 453 HksBlob signature = { .size = 1, .data = buff }; variable 475 HksBlob signature = { .size = 1, .data = buff }; variable [all …]
|
/ohos5.0/base/update/packaging_tools/ |
H A D | build_pkcs7.py | 88 signature = private_key.sign( 95 return signature 109 signature = private_key.sign( 116 return signature 129 def write_signed_package(unsigned_package, signature, signed_package): argument 133 signature_size = len(signature) 151 f_signed.write(signature) 161 signature = sign_digest(digest, private_key) 170 signatute_file.write(signature) 209 signer_info['signature'] = signature
|
H A D | create_update_package.py | 232 return signature 245 return signature 258 signature = self.sign_digest(digest) 260 signature = self.sign_digest_with_pss(digest) 264 if not signature: 268 if len(signature) == SIGN_SHA384_LEN: 273 package_file.write(signature) 288 signature = self.sign_digest(digest) 290 signature = self.sign_digest_with_pss(digest) 294 if not signature: [all …]
|
/ohos5.0/base/security/device_security_level/test/dslm_unit_test/cmocker/ |
H A D | c_mocker.h | 67 #define PARAMETER(index, signature, dummy) \ argument 68 GMOCK_PP_COMMA_IF(index) GMOCK_INTERNAL_ARG_O(index, GMOCK_PP_REMOVE_PARENS(signature)) 77 #define IMPLEMENT_FUNCTION_INTERNAL(cls, method, count, signature, invoker) … argument 79 …testing::internal::Function<GMOCK_PP_REMOVE_PARENS(signature)>::Result method( … 80 …GMOCK_PP_REPEAT(GMOCK_INTERNAL_PARAMETER, signature, count)) \ 93 … return mock->method(GMOCK_PP_REPEAT(GMOCK_INTERNAL_FORWARD_ARG, signature, count)); \ 97 … return stub(GMOCK_PP_REPEAT(GMOCK_INTERNAL_FORWARD_ARG, signature, count)); \ 101 …return testing::internal::Function<GMOCK_PP_REMOVE_PARENS(signature)>::Result(); \
|
/ohos5.0/drivers/peripheral/user_auth/test/unittest/mocks/inc/ |
H A D | c_mocker.h | 67 #define PARAMETER(index, signature, dummy) \ argument 68 GMOCK_PP_COMMA_IF(index) GMOCK_INTERNAL_ARG_O(index, GMOCK_PP_REMOVE_PARENS(signature)) 77 #define IMPLEMENT_FUNCTION_INTERNAL(cls, method, count, signature, invoker) … argument 79 …testing::internal::Function<GMOCK_PP_REMOVE_PARENS(signature)>::Result method( … 80 …GMOCK_PP_REPEAT(GMOCK_INTERNAL_PARAMETER, signature, count)) \ 93 … return mock->method(GMOCK_PP_REPEAT(GMOCK_INTERNAL_FORWARD_ARG, signature, count)); \ 97 … return stub(GMOCK_PP_REPEAT(GMOCK_INTERNAL_FORWARD_ARG, signature, count)); \ 101 …return testing::internal::Function<GMOCK_PP_REMOVE_PARENS(signature)>::Result(); \
|
/ohos5.0/drivers/peripheral/user_auth/hdi_service/key_mgr/src/ |
H A D | ed25519_key.c | 67 Buffer *signature = NULL; in ExecutorMsgSign() local 68 int32_t ret = Ed25519Sign(g_keyPair, data, &signature); in ExecutorMsgSign() 73 if (signature->contentSize != ED25519_FIX_SIGN_BUFFER_SIZE) { in ExecutorMsgSign() 75 DestoryBuffer(signature); in ExecutorMsgSign() 78 return signature; in ExecutorMsgSign()
|
/ohos5.0/docs/en/release-notes/changelogs/OpenHarmony_5.0.0.22/ |
H A D | changelogs-crypto_framework.md | 11 When DSA algorithm is used for signing or signature verification with the digest algorithm set to *… 17 … to **NoHash**, calling **update()** returns a success message, but the signature generated is inc… 21 …to verify the signature data with the digest algorithm set to **NoHash**, calling **update()** ret… 23 After the change:<br>When DSA is used to verify the signature data with the digest algorithm set to… 39 …signature verification and the digest algorithm is set to **NoHash**, do not use **update()**. If …
|
/ohos5.0/docs/en/application-dev/reference/apis-network-kit/ |
H A D | errorcode-net-networkSecurity.md | 61 Unable to decrypt certificate signature. 65 This error code is reported if the attempt to decrypt the certificate signature fails. 79 Unable to decrypt CRL signature. 83 This error code is reported if the attempt to decrypt the CRL signature fails. 115 Certificate signature failure. 123 The certificate signature is incorrectly calculated, or the digital signature algorithm used by the… 127 … signature algorithm used by the certificate is supported by the client, the signature key of the … 133 CRL signature failure. 141 The CRL signature is incorrectly calculated, or the digital signature algorithm used by the CRL is … 145 Check that the signature algorithm and signature key of the CRL are correct. Alternatively, regener… [all …]
|
/ohos5.0/foundation/resourceschedule/ffrt/src/dm/ |
H A D | sdependence_manager.cpp | 222 if (waitData->signature == out->signature) { in onWait() 310 for (auto signature : inDeps) { in MapSignature2Deps() local 315 if (parentOut->signature == signature) { in MapSignature2Deps() 323 if (parentIn->signature == signature) { in MapSignature2Deps() 330 version = en->VA2Ctx(signature, task); in MapSignature2Deps() 335 for (auto signature : outDeps) { in MapSignature2Deps() local 340 if (parentOut->signature == signature) { in MapSignature2Deps() 349 if (parentIn->signature == signature) { in MapSignature2Deps() 355 version = en->VA2Ctx(signature, task); in MapSignature2Deps()
|
/ohos5.0/base/security/device_auth/frameworks/deviceauth_lite/source/key_agreement/ |
H A D | sts_client.c | 172 …t verify_response_data(void *handle, const struct uint8_buff *message, struct signature *signature) in verify_response_data() argument 177 check_ptr_return_val(signature, HC_INPUT_ERROR); in verify_response_data() 212 static int32_t generate_sts_request_sign(void *handle, struct signature *signature) in generate_sts_request_sign() argument 250 int32_t ret = sign(&key_alias, &sign_message, signature); in generate_sts_request_sign() 274 static int32_t init_signature(void *handle, struct signature *signature) in init_signature() argument 306 …if (memcpy_s(signature->signature, sizeof(signature->signature), out_plain.val, out_plain.length) … in init_signature() 310 signature->length = out_plain.length; in init_signature() 317 struct signature signature = { 0, {0} }; in verify_data() local 318 int32_t ret = init_signature(handle, &signature); in verify_data() 330 ret = verify_response_data(handle, &message, &signature); in verify_data() [all …]
|
/ohos5.0/docs/en/application-dev/security/DeviceCertificateKit/ |
H A D | certManager-guidelines.md | 15 …- Perform signing and signature verification using an application certificate and its private cred… 19 …ted, you need to know the combinations of the algorithm and the signing/signature verification par… 21 …signature verification in certificate management depends on [HUKS](../UniversalKeystoreKit/huks-ov… 37 …ec: CMSignatureSpec) : Promise\<CMHandle> | Initializes the signing or signature verification ope… 41 | certificateManager | finish(handle: Uint8Array, signature: Uint8Array, callback: AsyncCall… 42 … | finish(handle: Uint8Array, signature?: Uint8Array) : Promise\<CMResult> | Finishes the si… 43 … callback: AsyncCallback\<void>) : void | Aborts the signing or signature verification ope… 44 … | abort(handle: Uint8Array) : Promise\<void> | Aborts the signing or signature verification ope… 93 /* Generate a signature. */ 98 /* Construct the parameters for signature verification. */ [all …]
|
/ohos5.0/base/security/code_signature/interfaces/innerkits/local_code_sign/src/ |
H A D | local_code_sign_kit.cpp | 28 int32_t LocalCodeSignKit::SignLocalCode(const std::string &filePath, ByteBuffer &signature) in SignLocalCode() argument 30 return LocalCodeSignClient::GetInstance().SignLocalCode("", filePath, signature); in SignLocalCode() 33 …nKit::SignLocalCode(const std::string &ownerID, const std::string &filePath, ByteBuffer &signature) in SignLocalCode() argument 35 return LocalCodeSignClient::GetInstance().SignLocalCode(ownerID, filePath, signature); in SignLocalCode()
|
/ohos5.0/base/security/huks/test/unittest/huks_common_test/src/ |
H A D | hks_test_curve25519_func.cpp | 87 struct HksBlob signature = { TEST_CURVE_256, g_buffer }; in TestSignEd25519() local 88 ret = HksSignForDe(&alias, paramSet, &msg, &signature); in TestSignEd25519() 90 g_bufferSize = signature.size; in TestSignEd25519() 132 struct HksBlob signature = { g_bufferSize, g_buffer }; in TestVerifyEd25519() local 133 ret = HksVerifyForDe(&alias, paramSet, &msg, &signature); in TestVerifyEd25519() 310 struct HksBlob signature = { TEST_CURVE_256, g_buffer }; in TestEd25519SignTeeVerifyLocal() local 372 struct HksBlob signature = { TEST_CURVE_256, g_buffer }; in TestSignEd25519Wrong() local 373 ret = HksSignForDe(&alias, paramSet, &msg, &signature); in TestSignEd25519Wrong() 375 g_bufferSize = signature.size; in TestSignEd25519Wrong() 432 struct HksBlob signature = { g_bufferSize, g_buffer }; in TestVerifyEd25519Wrong() local [all …]
|
/ohos5.0/docs/zh-cn/application-dev/reference/apis-network-kit/ |
H A D | js-apis-networkSecurity.md | 98 | 2305004 | Unable to decrypt certificate signature. | 99 | 2305005 | Unable to decrypt CRL signature. | 101 | 2305007 | Certificate signature failure. | 102 | 2305008 | CRL signature failure. | 178 | 2305004 | Unable to decrypt certificate signature. | 179 | 2305005 | Unable to decrypt CRL signature. | 181 | 2305007 | Certificate signature failure. | 182 | 2305008 | CRL signature failure. |
|