Home
last modified time | relevance | path

Searched refs:usageSpec (Results 1 – 25 of 60) sorted by relevance

123

/ohos5.0/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/
H A Dhks_crypto_hal_rsa_sign.cpp52 .usageSpec = {
72 .usageSpec = {
92 .usageSpec = {
112 .usageSpec = {
132 .usageSpec = {
152 .usageSpec = {
172 .usageSpec = {
192 .usageSpec = {
212 .usageSpec = {
233 .usageSpec = {
[all …]
H A Dhks_crypto_hal_rsa_oaep_decrypt.cpp44 .usageSpec = {
60 .usageSpec = {
77 .usageSpec = {
95 .usageSpec = {
115 .usageSpec = {
137 .usageSpec = {
163 .usageSpec = {
179 .usageSpec = {
196 .usageSpec = {
213 .usageSpec = {
[all …]
H A Dhks_crypto_hal_rsa_oaep_encrypt.cpp46 .usageSpec = {
62 .usageSpec = {
78 .usageSpec = {
94 .usageSpec = {
110 .usageSpec = {
126 .usageSpec = {
142 .usageSpec = {
158 .usageSpec = {
174 .usageSpec = {
190 .usageSpec = {
[all …]
H A Dhks_crypto_hal_aes_encrypt.cpp53 .usageSpec = {
68 .usageSpec = {
83 .usageSpec = {
99 .usageSpec = {
114 .usageSpec = {
134 .usageSpec = {
149 .usageSpec = {
164 .usageSpec = {
179 .usageSpec = {
195 .usageSpec = {
[all …]
H A Dhks_crypto_hal_aes_decrypt.cpp55 .usageSpec = {
70 .usageSpec = {
85 .usageSpec = {
101 .usageSpec = {
116 .usageSpec = {
144 .usageSpec = {
159 .usageSpec = {
174 .usageSpec = {
190 .usageSpec = {
205 .usageSpec = {
[all …]
H A Dhks_crypto_hal_rsa_cipher.cpp49 .usageSpec = {
76 .usageSpec = {
104 .usageSpec = {
133 .usageSpec = {
164 .usageSpec = {
197 .usageSpec = {
234 .usageSpec = {
255 .usageSpec = {
276 .usageSpec = {
298 .usageSpec = {
[all …]
H A Dhks_crypto_hal_ecdsa_sign.cpp53 .usageSpec = {
73 .usageSpec = {
92 .usageSpec = {
111 .usageSpec = {
131 .usageSpec = {
150 .usageSpec = {
169 .usageSpec = {
188 .usageSpec = {
207 .usageSpec = {
226 .usageSpec = {
[all …]
H A Dhks_crypto_hal_rsa_encrypt.cpp44 .usageSpec = {
65 .usageSpec = {
93 .usageSpec = {
116 .usageSpec = {
142 .usageSpec = {
170 .usageSpec = {
202 .usageSpec = {
218 .usageSpec = {
234 .usageSpec = {
251 .usageSpec = {
[all …]
H A Dhks_crypto_hal_rsa_decrypt.cpp43 .usageSpec = {
63 .usageSpec = {
90 .usageSpec = {
112 .usageSpec = {
136 .usageSpec = {
162 .usageSpec = {
192 .usageSpec = {
208 .usageSpec = {
225 .usageSpec = {
243 .usageSpec = {
[all …]
H A Dhks_crypto_hal_aes_cipher.cpp59 .usageSpec = {
87 .usageSpec = {
110 .usageSpec = {
134 .usageSpec = {
155 .usageSpec = {
184 .usageSpec = {
212 .usageSpec = {
235 .usageSpec = {
258 .usageSpec = {
280 .usageSpec = {
[all …]
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/module_test/utils_test/src/
H A Dhks_attest_utils_test.cpp102 struct HksUsageSpec usageSpec = { .algType = HKS_ALG_RSA, .mode = 0xffff }; variable
103 int32_t ret = DcmGetPublicKey(nullptr, &info, &usageSpec);
104 ret = DcmGetPublicKey(&key, nullptr, &usageSpec);
120 struct HksUsageSpec usageSpec = { .algType = HKS_ALG_AES, .mode = 0xffff }; variable
121 int32_t ret = DcmGetPublicKey(&key, &info, &usageSpec);
137 int32_t ret = DcmGetPublicKey(&key, &info, &usageSpec);
152 struct HksUsageSpec usageSpec = { .algType = HKS_ALG_RSA, .mode = 0xffff }; variable
153 int32_t ret = DcmGetPublicKey(&key, &info, &usageSpec);
169 int32_t ret = DcmGetPublicKey(&key, &info, &usageSpec);
186 int32_t ret = DcmGetPublicKey(&key, &info, &usageSpec);
[all …]
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/
H A Dhks_openssl_aes.c129 outCtx->algType = usageSpec->algType; in ENABLE_CFI()
130 outCtx->mode = usageSpec->mode; in ENABLE_CFI()
131 outCtx->padding = usageSpec->padding; in ENABLE_CFI()
539 outCtx->algType = usageSpec->algType; in OpensslAesAeadCryptInit()
540 outCtx->mode = usageSpec->mode; in OpensslAesAeadCryptInit()
759 outCtx->algType = usageSpec->algType; in OpensslAesAeadCipherInit()
760 outCtx->mode = usageSpec->mode; in OpensslAesAeadCipherInit()
978 switch (usageSpec->mode) { in HksOpensslAesEncryptInit()
1075 switch (usageSpec->mode) { in HksOpensslAesDecryptInit()
1201 switch (usageSpec->mode) { in HksOpensslAesEncrypt()
[all …]
H A Dhks_openssl_engine.c127 return EncryptCheckParam(key, usageSpec, message, cipherText); in DecryptCheckParam()
349 int32_t ret = SignVerifyCheckParam(key, usageSpec, message, signature); in HksCryptoHalSign()
354 return func(key, usageSpec, message, signature); in HksCryptoHalSign()
360 int32_t ret = SignVerifyCheckParam(key, usageSpec, message, signature); in HksCryptoHalVerify()
365 return func(key, usageSpec, message, signature); in HksCryptoHalVerify()
382 int32_t ret = EncryptCheckParam(key, usageSpec, message, cipherText); in HksCryptoHalEncrypt()
387 return func(key, usageSpec, message, cipherText, tagAead); in HksCryptoHalEncrypt()
402 return func(ctx, key, usageSpec, true); in HksCryptoHalEncryptInit()
450 int32_t ret = DecryptCheckParam(key, usageSpec, message, cipherText); in HksCryptoHalDecrypt()
455 return func(key, usageSpec, message, cipherText); in HksCryptoHalDecrypt()
[all …]
H A Dhks_openssl_sm4.c81 switch (usageSpec->mode) { in HksOpensslSm4EncryptInit()
97 HKS_LOG_E("Unsupport sm4 mode! mode = 0x%" LOG_PUBLIC "x", usageSpec->mode); in HksOpensslSm4EncryptInit()
167 const struct HksUsageSpec *usageSpec) in HksOpensslSm4DecryptInit() argument
170 switch (usageSpec->mode) { in HksOpensslSm4DecryptInit()
186 HKS_LOG_E("Unsupport sm4 mode! mode = 0x%" LOG_PUBLIC "x", usageSpec->mode); in HksOpensslSm4DecryptInit()
284 int32_t HksOpensslSm4Encrypt(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, in HksOpensslSm4Encrypt() argument
291 switch (usageSpec->mode) { in HksOpensslSm4Encrypt()
304 HKS_LOG_E("Unsupport sm4 mode! mode = 0x%" LOG_PUBLIC "x", usageSpec->mode); in HksOpensslSm4Encrypt()
312 int32_t HksOpensslSm4Decrypt(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, in HksOpensslSm4Decrypt() argument
319 switch (usageSpec->mode) { in HksOpensslSm4Decrypt()
[all …]
H A Dhks_openssl_rsa.c55 static int32_t GetRsaPssSaltLen(const struct HksUsageSpec *usageSpec) in GetRsaPssSaltLen() argument
57 switch (usageSpec->pssSaltLenType) { in GetRsaPssSaltLen()
371 if (usageSpec->padding == HKS_PADDING_OAEP) { in HksOpensslRsaCryptInit()
372 const EVP_MD *md = GetOpensslAlg(usageSpec->digest); in HksOpensslRsaCryptInit()
374 if (usageSpec->digest == HKS_DIGEST_SHA256 && usageSpec->mgfDigest == HKS_DIGEST_SHA1) { in HksOpensslRsaCryptInit()
375 mgfMd = GetOpensslAlg(usageSpec->mgfDigest); in HksOpensslRsaCryptInit()
397 if (HksOpensslRsaCryptInit(ctx, usageSpec) != HKS_SUCCESS) { in HksOpensslRsaCrypt()
478 if (usageSpec->padding == HKS_PADDING_PSS) { in SetRsaPadding()
512 const EVP_MD *opensslAlg = GetOpensslAlg(usageSpec->digest); in InitRsaCtx()
513 if (usageSpec->digest == HKS_DIGEST_NONE) { in InitRsaCtx()
[all …]
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/
H A Dhks_mbedtls_engine.c230 Sign func = (Sign)GetAbility(HKS_CRYPTO_ABILITY_SIGN(usageSpec->algType)); in HksCryptoHalSign()
232 return func(key, usageSpec, message, signature); in HksCryptoHalSign()
244 Verify func = (Verify)GetAbility(HKS_CRYPTO_ABILITY_VERIFY(usageSpec->algType)); in HksCryptoHalVerify()
246 return func(key, usageSpec, message, signature); in HksCryptoHalVerify()
265 int32_t ret = EncryptCheckParam(key, usageSpec, message, cipherText); in HksCryptoHalEncrypt()
268 Encrypt func = (Encrypt)GetAbility(HKS_CRYPTO_ABILITY_ENCRYPT(usageSpec->algType)); in HksCryptoHalEncrypt()
270 return func(key, usageSpec, message, cipherText, tagAead); in HksCryptoHalEncrypt()
281 return func(ctx, key, usageSpec, true); in HksCryptoHalEncryptInit()
327 int32_t ret = EncryptCheckParam(key, usageSpec, message, cipherText); in HksCryptoHalDecrypt()
332 return func(key, usageSpec, message, cipherText); in HksCryptoHalDecrypt()
[all …]
H A Dhks_mbedtls_aes.c172 outCtx->mode = usageSpec->mode; in AesCbcNoPaddingCryptInit()
388 outCtx->mode = usageSpec->mode; in AesCbcPkcs7CryptInit()
468 switch (usageSpec->padding) { in AesCbcCrypt()
486 switch (usageSpec->padding) { in AesCbcCryptInit()
1138 (void)usageSpec; in AesEcbNoPaddingCrypt()
1373 switch (usageSpec->padding) { in AesEcbCrypt()
1389 switch (usageSpec->padding) { in AesEcbCryptInit()
1451 switch (usageSpec->mode) { in HksMbedtlsAesEncrypt()
1485 switch (usageSpec->mode) { in HksMbedtlsAesEncryptInit()
1583 switch (usageSpec->mode) { in HksMbedtlsAesDecrypt()
[all …]
H A Dhks_mbedtls_rsa.c263 static int32_t HksMbedtlsRsaCrypt(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, in HksMbedtlsRsaCrypt() argument
270 ret = HksToMbedtlsPadding(usageSpec->padding, &padding); in HksMbedtlsRsaCrypt()
275 ret = HksToMbedtlsDigestAlg(usageSpec->digest, &mbedtlsAlg); in HksMbedtlsRsaCrypt()
318 int32_t HksMbedtlsRsaEncrypt(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, in HksMbedtlsRsaEncrypt() argument
322 return HksMbedtlsRsaCrypt(key, usageSpec, message, true, cipherText); in HksMbedtlsRsaEncrypt()
325 int32_t HksMbedtlsRsaDecrypt(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, in HksMbedtlsRsaDecrypt() argument
328 return HksMbedtlsRsaCrypt(key, usageSpec, message, false, cipherText); in HksMbedtlsRsaDecrypt()
352 int32_t ret = HksToMbedtlsDigestAlg(usageSpec->digest, &mbedtlsAlg); in HksMbedtlsRsaSignVerify()
355 ret = HksToMbedtlsSignPadding(usageSpec->padding, &padding); in HksMbedtlsRsaSignVerify()
396 int32_t HksMbedtlsRsaSign(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, in HksMbedtlsRsaSign() argument
[all …]
/ohos5.0/base/security/huks/frameworks/huks_standard/main/common/src/
H A Dhks_crypto_adapter.c75 usageSpec->algParam = NULL; in HksFillUsageSpec()
80 if ((usageSpec == NULL) || (*usageSpec == NULL)) { in HksFreeUsageSpec()
84 if ((*usageSpec)->algParam != NULL) { in HksFreeUsageSpec()
85 HKS_FREE((*usageSpec)->algParam); in HksFreeUsageSpec()
87 HKS_FREE(*usageSpec); in HksFreeUsageSpec()
160 usageSpec->algParam = aeadParam; in HksFillAeadParam()
174 usageSpec->algParam = param; in HksFillIvParam()
199 if (usageSpec->algType == HKS_ALG_RSA && usageSpec->digest == HKS_DIGEST_NONE) { in HksBuildCipherUsageSpec()
206 *outUsageSpec = usageSpec; in HksBuildCipherUsageSpec()
215 HksFreeUsageSpec(&usageSpec); in HksBuildCipherUsageSpec()
[all …]
/ohos5.0/base/security/huks/frameworks/huks_standard/main/core/src/
H A Dhks_local_engine.c165 ret = HksCryptoHalEncrypt(key, usageSpec, inData, outData, &tag); in CipherEncrypt()
200 struct HksUsageSpec *usageSpec = NULL; in EncryptAndDecrypt() local
211 HksFreeUsageSpec(&usageSpec); in EncryptAndDecrypt()
293 if (HksCheckNeedCache(usageSpec->algType, usageSpec->digest) == HKS_SUCCESS) { in GetSignVerifyMessage()
302 int32_t ret = HksCryptoHalHash(usageSpec->digest, srcData, message); in GetSignVerifyMessage()
320 struct HksUsageSpec usageSpec = {0}; in HksLocalSign() local
321 HksFillUsageSpec(paramSet, &usageSpec); in HksLocalSign()
322 SetRsaPssSaltLenType(paramSet, &usageSpec); in HksLocalSign()
353 struct HksUsageSpec usageSpec = {0}; in HksLocalVerify() local
354 HksFillUsageSpec(paramSet, &usageSpec); in HksLocalVerify()
[all …]
/ohos5.0/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/test/
H A Ddlp_crypt_test.cpp108 struct DlpUsageSpec usageSpec = {DLP_MODE_CTR, &tagIv}; variable
151 struct DlpUsageSpec usageSpec = {DLP_MODE_CTR, &tagIv}; variable
172 struct DlpUsageSpec usageSpec = {DLP_MODE_CTR, &tagIv}; variable
193 struct DlpUsageSpec usageSpec = {DLP_MODE_CTR, &tagIv}; variable
236 struct DlpUsageSpec usageSpec = {DLP_MODE_CTR, &tagIv}; variable
257 struct DlpUsageSpec usageSpec = {DLP_MODE_CTR, &tagIv}; variable
279 struct DlpUsageSpec usageSpec = {DLP_MODE_CTR, &tagIv}; variable
367 usageSpec.mode = 1000;
369 usageSpec.mode = DLP_MODE_CTR;
786 usageSpec.mode = 1000;
[all …]
/ohos5.0/base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/crypto_engine_test/src/
H A Dhks_openssl_aes_test.cpp76 HksUsageSpec usageSpec = { variable
84 int32_t ret = HksOpensslAesEncryptInit(&encryptCtx, &key, &usageSpec);
87 ret = HksOpensslAesDecryptInit(&encryptCtx, &key, &usageSpec);
91 usageSpec.mode = HKS_MODE_CTR;
92 ret = HksOpensslAesEncryptInit(&encryptCtx, &key, &usageSpec);
94 ret = HksOpensslAesDecryptInit(&encryptCtx, &key, &usageSpec);
249 HksUsageSpec usageSpec = { variable
260 ret = HksOpensslAesDecrypt(&key, &usageSpec, nullptr, &cioherText);
264 usageSpec.mode = HKS_MODE_CTR;
265 ret = HksOpensslAesEncrypt(&key, &usageSpec, nullptr, &cioherText, nullptr);
[all …]
/ohos5.0/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/src/
H A Ddlp_crypt.cpp124 struct DlpCipherParam* cipherParam = usageSpec->algParam; in OpensslAesCipherInit()
263 outCtx->mode = usageSpec->mode; in OpensslAesCipherCryptInit()
412 if (usageSpec == nullptr) { in DlpOpensslAesEncryptInit()
422 switch (usageSpec->mode) { in DlpOpensslAesEncryptInit()
515 if (usageSpec == nullptr) { in DlpOpensslAesDecryptInit()
525 switch (usageSpec->mode) { in DlpOpensslAesDecryptInit()
638 if (usageSpec == nullptr) { in AesParamCheck()
664 if (!AesParamCheck(key, usageSpec, message, cipherText)) { in DlpOpensslAesEncrypt()
673 switch (usageSpec->mode) { in DlpOpensslAesEncrypt()
700 if (!AesParamCheck(key, usageSpec, message, plainText)) { in DlpOpensslAesDecrypt()
[all …]
/ohos5.0/base/security/huks/services/huks_standard/huks_engine/main/core/src/
H A Dhks_core_service_three_stage.c62 uint32_t padding = usageSpec->padding; in CheckRsaCipherData()
63 uint32_t digest = usageSpec->digest; in CheckRsaCipherData()
105 uint32_t digest = usageSpec->digest; in CheckSm2CipherData()
203 uint32_t alg = usageSpec.algType; in HksCheckFinishOutSize()
533 struct HksUsageSpec usageSpec; in CoreSignVerify() local
544 usageSpec.purpose, ret) in CoreSignVerify()
748 HksFreeUsageSpec(&usageSpec); in CoreCipherInit()
930 HksFreeUsageSpec(&usageSpec); in CoreAesCcmCipherFinish()
1047 struct HksUsageSpec usageSpec; in RsaCipherFinish() local
1067 usageSpec.purpose, ret) in RsaCipherFinish()
[all …]
/ohos5.0/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/include/
H A Dhks_mbedtls_rsa.h37 int32_t HksMbedtlsRsaEncrypt(const struct HksBlob *key, const struct HksUsageSpec *usageSpec,
40 int32_t HksMbedtlsRsaDecrypt(const struct HksBlob *key, const struct HksUsageSpec *usageSpec,
46 const struct HksUsageSpec *usageSpec, const struct HksBlob *message, struct HksBlob *signature);
49 …const struct HksUsageSpec *usageSpec, const struct HksBlob *message, const struct HksBlob *signatu…

123