/ohos5.0/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/ |
H A D | hks_crypto_hal_rsa_sign.cpp | 52 .usageSpec = { 72 .usageSpec = { 92 .usageSpec = { 112 .usageSpec = { 132 .usageSpec = { 152 .usageSpec = { 172 .usageSpec = { 192 .usageSpec = { 212 .usageSpec = { 233 .usageSpec = { [all …]
|
H A D | hks_crypto_hal_rsa_oaep_decrypt.cpp | 44 .usageSpec = { 60 .usageSpec = { 77 .usageSpec = { 95 .usageSpec = { 115 .usageSpec = { 137 .usageSpec = { 163 .usageSpec = { 179 .usageSpec = { 196 .usageSpec = { 213 .usageSpec = { [all …]
|
H A D | hks_crypto_hal_rsa_oaep_encrypt.cpp | 46 .usageSpec = { 62 .usageSpec = { 78 .usageSpec = { 94 .usageSpec = { 110 .usageSpec = { 126 .usageSpec = { 142 .usageSpec = { 158 .usageSpec = { 174 .usageSpec = { 190 .usageSpec = { [all …]
|
H A D | hks_crypto_hal_aes_encrypt.cpp | 53 .usageSpec = { 68 .usageSpec = { 83 .usageSpec = { 99 .usageSpec = { 114 .usageSpec = { 134 .usageSpec = { 149 .usageSpec = { 164 .usageSpec = { 179 .usageSpec = { 195 .usageSpec = { [all …]
|
H A D | hks_crypto_hal_aes_decrypt.cpp | 55 .usageSpec = { 70 .usageSpec = { 85 .usageSpec = { 101 .usageSpec = { 116 .usageSpec = { 144 .usageSpec = { 159 .usageSpec = { 174 .usageSpec = { 190 .usageSpec = { 205 .usageSpec = { [all …]
|
H A D | hks_crypto_hal_rsa_cipher.cpp | 49 .usageSpec = { 76 .usageSpec = { 104 .usageSpec = { 133 .usageSpec = { 164 .usageSpec = { 197 .usageSpec = { 234 .usageSpec = { 255 .usageSpec = { 276 .usageSpec = { 298 .usageSpec = { [all …]
|
H A D | hks_crypto_hal_ecdsa_sign.cpp | 53 .usageSpec = { 73 .usageSpec = { 92 .usageSpec = { 111 .usageSpec = { 131 .usageSpec = { 150 .usageSpec = { 169 .usageSpec = { 188 .usageSpec = { 207 .usageSpec = { 226 .usageSpec = { [all …]
|
H A D | hks_crypto_hal_rsa_encrypt.cpp | 44 .usageSpec = { 65 .usageSpec = { 93 .usageSpec = { 116 .usageSpec = { 142 .usageSpec = { 170 .usageSpec = { 202 .usageSpec = { 218 .usageSpec = { 234 .usageSpec = { 251 .usageSpec = { [all …]
|
H A D | hks_crypto_hal_rsa_decrypt.cpp | 43 .usageSpec = { 63 .usageSpec = { 90 .usageSpec = { 112 .usageSpec = { 136 .usageSpec = { 162 .usageSpec = { 192 .usageSpec = { 208 .usageSpec = { 225 .usageSpec = { 243 .usageSpec = { [all …]
|
H A D | hks_crypto_hal_aes_cipher.cpp | 59 .usageSpec = { 87 .usageSpec = { 110 .usageSpec = { 134 .usageSpec = { 155 .usageSpec = { 184 .usageSpec = { 212 .usageSpec = { 235 .usageSpec = { 258 .usageSpec = { 280 .usageSpec = { [all …]
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/module_test/utils_test/src/ |
H A D | hks_attest_utils_test.cpp | 102 struct HksUsageSpec usageSpec = { .algType = HKS_ALG_RSA, .mode = 0xffff }; variable 103 int32_t ret = DcmGetPublicKey(nullptr, &info, &usageSpec); 104 ret = DcmGetPublicKey(&key, nullptr, &usageSpec); 120 struct HksUsageSpec usageSpec = { .algType = HKS_ALG_AES, .mode = 0xffff }; variable 121 int32_t ret = DcmGetPublicKey(&key, &info, &usageSpec); 137 int32_t ret = DcmGetPublicKey(&key, &info, &usageSpec); 152 struct HksUsageSpec usageSpec = { .algType = HKS_ALG_RSA, .mode = 0xffff }; variable 153 int32_t ret = DcmGetPublicKey(&key, &info, &usageSpec); 169 int32_t ret = DcmGetPublicKey(&key, &info, &usageSpec); 186 int32_t ret = DcmGetPublicKey(&key, &info, &usageSpec); [all …]
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
H A D | hks_openssl_aes.c | 129 outCtx->algType = usageSpec->algType; in ENABLE_CFI() 130 outCtx->mode = usageSpec->mode; in ENABLE_CFI() 131 outCtx->padding = usageSpec->padding; in ENABLE_CFI() 539 outCtx->algType = usageSpec->algType; in OpensslAesAeadCryptInit() 540 outCtx->mode = usageSpec->mode; in OpensslAesAeadCryptInit() 759 outCtx->algType = usageSpec->algType; in OpensslAesAeadCipherInit() 760 outCtx->mode = usageSpec->mode; in OpensslAesAeadCipherInit() 978 switch (usageSpec->mode) { in HksOpensslAesEncryptInit() 1075 switch (usageSpec->mode) { in HksOpensslAesDecryptInit() 1201 switch (usageSpec->mode) { in HksOpensslAesEncrypt() [all …]
|
H A D | hks_openssl_engine.c | 127 return EncryptCheckParam(key, usageSpec, message, cipherText); in DecryptCheckParam() 349 int32_t ret = SignVerifyCheckParam(key, usageSpec, message, signature); in HksCryptoHalSign() 354 return func(key, usageSpec, message, signature); in HksCryptoHalSign() 360 int32_t ret = SignVerifyCheckParam(key, usageSpec, message, signature); in HksCryptoHalVerify() 365 return func(key, usageSpec, message, signature); in HksCryptoHalVerify() 382 int32_t ret = EncryptCheckParam(key, usageSpec, message, cipherText); in HksCryptoHalEncrypt() 387 return func(key, usageSpec, message, cipherText, tagAead); in HksCryptoHalEncrypt() 402 return func(ctx, key, usageSpec, true); in HksCryptoHalEncryptInit() 450 int32_t ret = DecryptCheckParam(key, usageSpec, message, cipherText); in HksCryptoHalDecrypt() 455 return func(key, usageSpec, message, cipherText); in HksCryptoHalDecrypt() [all …]
|
H A D | hks_openssl_sm4.c | 81 switch (usageSpec->mode) { in HksOpensslSm4EncryptInit() 97 HKS_LOG_E("Unsupport sm4 mode! mode = 0x%" LOG_PUBLIC "x", usageSpec->mode); in HksOpensslSm4EncryptInit() 167 const struct HksUsageSpec *usageSpec) in HksOpensslSm4DecryptInit() argument 170 switch (usageSpec->mode) { in HksOpensslSm4DecryptInit() 186 HKS_LOG_E("Unsupport sm4 mode! mode = 0x%" LOG_PUBLIC "x", usageSpec->mode); in HksOpensslSm4DecryptInit() 284 int32_t HksOpensslSm4Encrypt(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, in HksOpensslSm4Encrypt() argument 291 switch (usageSpec->mode) { in HksOpensslSm4Encrypt() 304 HKS_LOG_E("Unsupport sm4 mode! mode = 0x%" LOG_PUBLIC "x", usageSpec->mode); in HksOpensslSm4Encrypt() 312 int32_t HksOpensslSm4Decrypt(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, in HksOpensslSm4Decrypt() argument 319 switch (usageSpec->mode) { in HksOpensslSm4Decrypt() [all …]
|
H A D | hks_openssl_rsa.c | 55 static int32_t GetRsaPssSaltLen(const struct HksUsageSpec *usageSpec) in GetRsaPssSaltLen() argument 57 switch (usageSpec->pssSaltLenType) { in GetRsaPssSaltLen() 371 if (usageSpec->padding == HKS_PADDING_OAEP) { in HksOpensslRsaCryptInit() 372 const EVP_MD *md = GetOpensslAlg(usageSpec->digest); in HksOpensslRsaCryptInit() 374 if (usageSpec->digest == HKS_DIGEST_SHA256 && usageSpec->mgfDigest == HKS_DIGEST_SHA1) { in HksOpensslRsaCryptInit() 375 mgfMd = GetOpensslAlg(usageSpec->mgfDigest); in HksOpensslRsaCryptInit() 397 if (HksOpensslRsaCryptInit(ctx, usageSpec) != HKS_SUCCESS) { in HksOpensslRsaCrypt() 478 if (usageSpec->padding == HKS_PADDING_PSS) { in SetRsaPadding() 512 const EVP_MD *opensslAlg = GetOpensslAlg(usageSpec->digest); in InitRsaCtx() 513 if (usageSpec->digest == HKS_DIGEST_NONE) { in InitRsaCtx() [all …]
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/ |
H A D | hks_mbedtls_engine.c | 230 Sign func = (Sign)GetAbility(HKS_CRYPTO_ABILITY_SIGN(usageSpec->algType)); in HksCryptoHalSign() 232 return func(key, usageSpec, message, signature); in HksCryptoHalSign() 244 Verify func = (Verify)GetAbility(HKS_CRYPTO_ABILITY_VERIFY(usageSpec->algType)); in HksCryptoHalVerify() 246 return func(key, usageSpec, message, signature); in HksCryptoHalVerify() 265 int32_t ret = EncryptCheckParam(key, usageSpec, message, cipherText); in HksCryptoHalEncrypt() 268 Encrypt func = (Encrypt)GetAbility(HKS_CRYPTO_ABILITY_ENCRYPT(usageSpec->algType)); in HksCryptoHalEncrypt() 270 return func(key, usageSpec, message, cipherText, tagAead); in HksCryptoHalEncrypt() 281 return func(ctx, key, usageSpec, true); in HksCryptoHalEncryptInit() 327 int32_t ret = EncryptCheckParam(key, usageSpec, message, cipherText); in HksCryptoHalDecrypt() 332 return func(key, usageSpec, message, cipherText); in HksCryptoHalDecrypt() [all …]
|
H A D | hks_mbedtls_aes.c | 172 outCtx->mode = usageSpec->mode; in AesCbcNoPaddingCryptInit() 388 outCtx->mode = usageSpec->mode; in AesCbcPkcs7CryptInit() 468 switch (usageSpec->padding) { in AesCbcCrypt() 486 switch (usageSpec->padding) { in AesCbcCryptInit() 1138 (void)usageSpec; in AesEcbNoPaddingCrypt() 1373 switch (usageSpec->padding) { in AesEcbCrypt() 1389 switch (usageSpec->padding) { in AesEcbCryptInit() 1451 switch (usageSpec->mode) { in HksMbedtlsAesEncrypt() 1485 switch (usageSpec->mode) { in HksMbedtlsAesEncryptInit() 1583 switch (usageSpec->mode) { in HksMbedtlsAesDecrypt() [all …]
|
H A D | hks_mbedtls_rsa.c | 263 static int32_t HksMbedtlsRsaCrypt(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, in HksMbedtlsRsaCrypt() argument 270 ret = HksToMbedtlsPadding(usageSpec->padding, &padding); in HksMbedtlsRsaCrypt() 275 ret = HksToMbedtlsDigestAlg(usageSpec->digest, &mbedtlsAlg); in HksMbedtlsRsaCrypt() 318 int32_t HksMbedtlsRsaEncrypt(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, in HksMbedtlsRsaEncrypt() argument 322 return HksMbedtlsRsaCrypt(key, usageSpec, message, true, cipherText); in HksMbedtlsRsaEncrypt() 325 int32_t HksMbedtlsRsaDecrypt(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, in HksMbedtlsRsaDecrypt() argument 328 return HksMbedtlsRsaCrypt(key, usageSpec, message, false, cipherText); in HksMbedtlsRsaDecrypt() 352 int32_t ret = HksToMbedtlsDigestAlg(usageSpec->digest, &mbedtlsAlg); in HksMbedtlsRsaSignVerify() 355 ret = HksToMbedtlsSignPadding(usageSpec->padding, &padding); in HksMbedtlsRsaSignVerify() 396 int32_t HksMbedtlsRsaSign(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, in HksMbedtlsRsaSign() argument [all …]
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/common/src/ |
H A D | hks_crypto_adapter.c | 75 usageSpec->algParam = NULL; in HksFillUsageSpec() 80 if ((usageSpec == NULL) || (*usageSpec == NULL)) { in HksFreeUsageSpec() 84 if ((*usageSpec)->algParam != NULL) { in HksFreeUsageSpec() 85 HKS_FREE((*usageSpec)->algParam); in HksFreeUsageSpec() 87 HKS_FREE(*usageSpec); in HksFreeUsageSpec() 160 usageSpec->algParam = aeadParam; in HksFillAeadParam() 174 usageSpec->algParam = param; in HksFillIvParam() 199 if (usageSpec->algType == HKS_ALG_RSA && usageSpec->digest == HKS_DIGEST_NONE) { in HksBuildCipherUsageSpec() 206 *outUsageSpec = usageSpec; in HksBuildCipherUsageSpec() 215 HksFreeUsageSpec(&usageSpec); in HksBuildCipherUsageSpec() [all …]
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/core/src/ |
H A D | hks_local_engine.c | 165 ret = HksCryptoHalEncrypt(key, usageSpec, inData, outData, &tag); in CipherEncrypt() 200 struct HksUsageSpec *usageSpec = NULL; in EncryptAndDecrypt() local 211 HksFreeUsageSpec(&usageSpec); in EncryptAndDecrypt() 293 if (HksCheckNeedCache(usageSpec->algType, usageSpec->digest) == HKS_SUCCESS) { in GetSignVerifyMessage() 302 int32_t ret = HksCryptoHalHash(usageSpec->digest, srcData, message); in GetSignVerifyMessage() 320 struct HksUsageSpec usageSpec = {0}; in HksLocalSign() local 321 HksFillUsageSpec(paramSet, &usageSpec); in HksLocalSign() 322 SetRsaPssSaltLenType(paramSet, &usageSpec); in HksLocalSign() 353 struct HksUsageSpec usageSpec = {0}; in HksLocalVerify() local 354 HksFillUsageSpec(paramSet, &usageSpec); in HksLocalVerify() [all …]
|
/ohos5.0/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/test/ |
H A D | dlp_crypt_test.cpp | 108 struct DlpUsageSpec usageSpec = {DLP_MODE_CTR, &tagIv}; variable 151 struct DlpUsageSpec usageSpec = {DLP_MODE_CTR, &tagIv}; variable 172 struct DlpUsageSpec usageSpec = {DLP_MODE_CTR, &tagIv}; variable 193 struct DlpUsageSpec usageSpec = {DLP_MODE_CTR, &tagIv}; variable 236 struct DlpUsageSpec usageSpec = {DLP_MODE_CTR, &tagIv}; variable 257 struct DlpUsageSpec usageSpec = {DLP_MODE_CTR, &tagIv}; variable 279 struct DlpUsageSpec usageSpec = {DLP_MODE_CTR, &tagIv}; variable 367 usageSpec.mode = 1000; 369 usageSpec.mode = DLP_MODE_CTR; 786 usageSpec.mode = 1000; [all …]
|
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/crypto_engine_test/src/ |
H A D | hks_openssl_aes_test.cpp | 76 HksUsageSpec usageSpec = { variable 84 int32_t ret = HksOpensslAesEncryptInit(&encryptCtx, &key, &usageSpec); 87 ret = HksOpensslAesDecryptInit(&encryptCtx, &key, &usageSpec); 91 usageSpec.mode = HKS_MODE_CTR; 92 ret = HksOpensslAesEncryptInit(&encryptCtx, &key, &usageSpec); 94 ret = HksOpensslAesDecryptInit(&encryptCtx, &key, &usageSpec); 249 HksUsageSpec usageSpec = { variable 260 ret = HksOpensslAesDecrypt(&key, &usageSpec, nullptr, &cioherText); 264 usageSpec.mode = HKS_MODE_CTR; 265 ret = HksOpensslAesEncrypt(&key, &usageSpec, nullptr, &cioherText, nullptr); [all …]
|
/ohos5.0/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/src/ |
H A D | dlp_crypt.cpp | 124 struct DlpCipherParam* cipherParam = usageSpec->algParam; in OpensslAesCipherInit() 263 outCtx->mode = usageSpec->mode; in OpensslAesCipherCryptInit() 412 if (usageSpec == nullptr) { in DlpOpensslAesEncryptInit() 422 switch (usageSpec->mode) { in DlpOpensslAesEncryptInit() 515 if (usageSpec == nullptr) { in DlpOpensslAesDecryptInit() 525 switch (usageSpec->mode) { in DlpOpensslAesDecryptInit() 638 if (usageSpec == nullptr) { in AesParamCheck() 664 if (!AesParamCheck(key, usageSpec, message, cipherText)) { in DlpOpensslAesEncrypt() 673 switch (usageSpec->mode) { in DlpOpensslAesEncrypt() 700 if (!AesParamCheck(key, usageSpec, message, plainText)) { in DlpOpensslAesDecrypt() [all …]
|
/ohos5.0/base/security/huks/services/huks_standard/huks_engine/main/core/src/ |
H A D | hks_core_service_three_stage.c | 62 uint32_t padding = usageSpec->padding; in CheckRsaCipherData() 63 uint32_t digest = usageSpec->digest; in CheckRsaCipherData() 105 uint32_t digest = usageSpec->digest; in CheckSm2CipherData() 203 uint32_t alg = usageSpec.algType; in HksCheckFinishOutSize() 533 struct HksUsageSpec usageSpec; in CoreSignVerify() local 544 usageSpec.purpose, ret) in CoreSignVerify() 748 HksFreeUsageSpec(&usageSpec); in CoreCipherInit() 930 HksFreeUsageSpec(&usageSpec); in CoreAesCcmCipherFinish() 1047 struct HksUsageSpec usageSpec; in RsaCipherFinish() local 1067 usageSpec.purpose, ret) in RsaCipherFinish() [all …]
|
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/include/ |
H A D | hks_mbedtls_rsa.h | 37 int32_t HksMbedtlsRsaEncrypt(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, 40 int32_t HksMbedtlsRsaDecrypt(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, 46 const struct HksUsageSpec *usageSpec, const struct HksBlob *message, struct HksBlob *signature); 49 …const struct HksUsageSpec *usageSpec, const struct HksBlob *message, const struct HksBlob *signatu…
|