/ohos5.0/base/security/code_signature/test/unittest/ |
H A D | jit_code_sign_test.cpp | 163 delete signer; 187 delete signer; 229 delete signer; 278 delete signer; 301 delete signer; 325 delete signer; 349 delete signer; 374 delete signer; 414 delete signer; 458 delete signer; [all …]
|
H A D | sign_and_enforce_test.cpp | 125 PKCS7_SIGNER_INFO *signer = GetSignerInfo(p7); in ModifyPkcs7SignerwithTargetFunc() local 126 if (signer == nullptr) { in ModifyPkcs7SignerwithTargetFunc() 129 modifyFunc(signer); in ModifyPkcs7SignerwithTargetFunc()
|
/ohos5.0/base/security/code_signature/interfaces/innerkits/jit_code_sign/include/ |
H A D | jit_buffer_integrity.h | 68 CHECK_NULL_AND_RETURN_CODE(signer); in RegisterTmpBuffer() 81 CHECK_NULL_AND_RETURN_CODE(signer); in AppendInstruction() 82 signer->SignInstruction(instr); in AppendInstruction() 95 CHECK_NULL_AND_RETURN_CODE(signer); in AppendData() 107 CHECK_NULL_AND_RETURN_CODE(signer); 108 signer->SkipNext(n); 120 CHECK_NULL_AND_RETURN_CODE(signer); in PatchInstruction() 134 CHECK_NULL_AND_RETURN_CODE(signer); in PatchInstruction() 148 CHECK_NULL_AND_RETURN_CODE(signer); in PatchData() 163 CHECK_NULL_AND_RETURN_CODE(signer); in PatchData() [all …]
|
/ohos5.0/base/security/appverify/interfaces/innerkits/appverify_lite/src/ |
H A D | mbedtls_pkcs7.c | 163 signer->issuerRaw.p = *p; in ParseSignerIssuerAndSerialNum() 173 signer->issuerRaw.len = *p - signer->issuerRaw.p; /* not include the serial. */ in ParseSignerIssuerAndSerialNum() 203 signer->authAttr.p = *p; in ParseSignerAuthAttr() 682 Pkcs7Free(signer); in FreeSignersInfo() 683 signer = next; in FreeSignersInfo() 826 signer = signer->next; in ConstructSignerCerts() 910 signer = signer->next; in PKCS7_VerifySignerSignature() 1059 signer = signer->next; in PKCS7_VerifyCertsChain() 1069 signer = signer->next; in PKCS7_VerifyCertsChain() 1079 signer = signer->next; in PKCS7_VerifyCertsChain() [all …]
|
H A D | app_verify.c | 288 static int32_t CalcDigest(const Pkcs7 *pkcs7, const SignerInfo *signer, in CalcDigest() argument 294 rc = CalcCmpContHash(pkcs7, signer, algType, hash, hashLen); in CalcDigest() 302 rc = PKCS7_GetSignerAuthAttr(signer, &input, &inputLen); in CalcDigest() 390 if (strcmp(trustList[i].issueCA, signer->issuer) == 0) { in GetProfSourceBySigningCert() 407 trustCert = GetProfSourceBySigningCert(signer, g_trustAppListTest, in GetProfileCertTypeBySignInfo() 411 if (trustCert != NULL && trustCert->maxCertPath < signer->depth) { in GetProfileCertTypeBySignInfo() 412 LOG_ERROR("cert maxdepth error: %d", signer->depth); in GetProfileCertTypeBySignInfo() 424 if (strcmp(trustList[i].appSignCert, signer->subject) == 0 && in GetAppSourceBySigningCert() 425 strcmp(trustList[i].issueCA, signer->issuer) == 0) { in GetAppSourceBySigningCert() 438 trustCert = GetAppSourceBySigningCert(signer, g_trustAppListTest, in GetAppCertTypeBySignInfo() [all …]
|
/ohos5.0/docs/zh-cn/application-dev/security/CryptoArchitectureKit/ |
H A D | crypto-rsa-sign-sig-verify-pss.md | 81 let signer = cryptoFramework.createSign("RSA|PSS|SHA256|MGF1_SHA256"); 84 await signer.init(keyPair.priKey); 87 signer.setSignSpec(cryptoFramework.SignSpecItem.PSS_SALT_LEN_NUM, setN); 92 let md = signer.getSignSpec(cryptoFramework.SignSpecItem.PSS_MD_NAME_STR); 98 await signer.update(input1); 99 let signMessageBlob = await signer.sign(input2); 163 let signer = cryptoFramework.createSign("RSA|PSS|SHA256|MGF1_SHA256"); 166 signer.initSync(keyPair.priKey); 169 signer.setSignSpec(cryptoFramework.SignSpecItem.PSS_SALT_LEN_NUM, setN); 180 signer.updateSync(input1); [all …]
|
H A D | crypto-ecdsa-sign-sig-verify.md | 47 let signer = cryptoFramework.createSign(signAlg); 48 await signer.init(priKey); 49 await signer.update(input1); // 如果明文较短,可以直接调用sign接口一次性传入 50 let signData = await signer.sign(input2); 86 let signer = cryptoFramework.createSign(signAlg); 87 signer.initSync(priKey); 88 signer.updateSync(input1); // 如果明文较短,可以直接调用sign接口一次性传入 89 let signData = signer.signSync(input2);
|
H A D | crypto-sm2-sign-sig-verify-pkcs1.md | 47 let signer = cryptoFramework.createSign(signAlg); 48 await signer.init(priKey); 49 await signer.update(input1); // 如果明文较短,可以直接调用sign接口一次性传入 50 let signData = await signer.sign(input2); 86 let signer = cryptoFramework.createSign(signAlg); 87 signer.initSync(priKey); 88 signer.updateSync(input1); // 如果明文较短,可以直接调用sign接口一次性传入 89 let signData = signer.signSync(input2);
|
H A D | crypto-rsa-sign-sig-verify-pkcs1.md | 54 let signer = cryptoFramework.createSign(signAlg); 55 await signer.init(priKey); 56 await signer.update(input1); // 如果明文较短,可以直接调用sign接口一次性传入 57 let signData = await signer.sign(input2); 93 let signer = cryptoFramework.createSign(signAlg); 94 signer.initSync(priKey); 95 signer.updateSync(input1); // 如果明文较短,可以直接调用sign接口一次性传入 96 let signData = signer.signSync(input2);
|
H A D | crypto-rsa-sign-sig-verify-recover-pkcs1.md | 39 let signer = cryptoFramework.createSign(signAlg); 40 await signer.init(priKey); 41 let signData = await signer.sign(input1); 74 let signer = cryptoFramework.createSign(signAlg); 75 signer.initSync(priKey); 76 let signData = signer.signSync(input1);
|
H A D | crypto-rsa-sign-sig-verify-pkcs1-by-segment.md | 45 let signer = cryptoFramework.createSign(signAlg); 46 await signer.init(priKey); 52 await signer.update(updateMessageBlob); 55 let signData = await signer.sign(null); 105 let signer = cryptoFramework.createSign(signAlg); 106 signer.initSync(priKey); 112 signer.updateSync(updateMessageBlob); 115 let signData = signer.signSync(null);
|
/ohos5.0/base/security/code_signature/ |
H A D | README_zh.md | 56 | int32_t RegisterTmpBuffer(JitCodeSignerBase *signer, void *tmpBuffer); | 注册临时Buffer起始地址 | 57 | int32_t AppendInstruction(JitCodeSignerBase *signer, Instr instr); | 对添加到临时Buffer的指令签名 | 58 | int32_t AppendData(JitCodeSignerBase *signer, const void *const data, uint32_t size); | 对添加到临时Buf… 59 | int32_t WillFixUp(JitCodeSignerBase *signer, uint32_t n = 1); | 声明下n条指令待更新 | 60 | int32_t PatchInstruction(JitCodeSignerBase *signer, int offset, Instr instr); | 更新缓冲区的偏移处指令签名 | 61 | int32_t PatchInstruction(JitCodeSignerBase *signer, void *address, Instr insn); | 更新对应地址指令签名 | 62 | int32_t PatchData(JitCodeSignerBase *signer, int offset, const void *const data, uint32_t size); … 63 | int32_t PatchData(JitCodeSignerBase *signer, void *address, const void *const data, uint32_t size… 65 | int32_t CopyToJitCode(JitCodeSignerBase *signer, void *jitMemory, void *tmpBuffer, int size); | 将…
|
/ohos5.0/docs/en/application-dev/security/CryptoArchitectureKit/ |
H A D | crypto-rsa-sign-sig-verify-pss.md | 84 let signer = cryptoFramework.createSign("RSA|PSS|SHA256|MGF1_SHA256"); 87 await signer.init(keyPair.priKey); 90 signer.setSignSpec(cryptoFramework.SignSpecItem.PSS_SALT_LEN_NUM, setN); 95 let md = signer.getSignSpec(cryptoFramework.SignSpecItem.PSS_MD_NAME_STR); 101 await signer.update(input1); 102 let signMessageBlob = await signer.sign(input2); 166 let signer = cryptoFramework.createSign("RSA|PSS|SHA256|MGF1_SHA256"); 169 signer.initSync(keyPair.priKey); 172 signer.setSignSpec(cryptoFramework.SignSpecItem.PSS_SALT_LEN_NUM, setN); 183 signer.updateSync(input1); [all …]
|
H A D | crypto-ecdsa-sign-sig-verify.md | 47 let signer = cryptoFramework.createSign(signAlg); 48 await signer.init(priKey); 49 …await signer.update(input1); // If the plaintext is short, you can use sign() to pass in the full … 50 let signData = await signer.sign(input2); 86 let signer = cryptoFramework.createSign(signAlg); 87 signer.initSync(priKey); 88 …signer.updateSync(input1); // If the plaintext is short, you can use sign() to pass in the full da… 89 let signData = signer.signSync(input2);
|
H A D | crypto-sm2-sign-sig-verify-pkcs1.md | 47 let signer = cryptoFramework.createSign(signAlg); 48 await signer.init(priKey); 49 …await signer.update(input1); // If the plaintext is short, you can use sign() to pass in the full … 50 let signData = await signer.sign(input2); 86 let signer = cryptoFramework.createSign(signAlg); 87 signer.initSync(priKey); 88 …signer.updateSync(input1); // If the plaintext is short, you can use sign() to pass in the full da… 89 let signData = signer.signSync(input2);
|
H A D | crypto-rsa-sign-sig-verify-recover-pkcs1.md | 39 let signer = cryptoFramework.createSign(signAlg); 40 await signer.init(priKey); 41 let signData = await signer.sign(input1); 74 let signer = cryptoFramework.createSign(signAlg); 75 signer.initSync(priKey); 76 let signData = signer.signSync(input1);
|
H A D | crypto-rsa-sign-sig-verify-pkcs1.md | 53 let signer = cryptoFramework.createSign(signAlg); 54 await signer.init(priKey); 55 …await signer.update(input1); // If the plaintext is short, you can use sign() to pass in the full … 56 let signData = await signer.sign(input2); 92 let signer = cryptoFramework.createSign(signAlg); 93 signer.initSync(priKey); 94 …signer.updateSync(input1); // If the plaintext is short, you can use sign() to pass in the full da… 95 let signData = signer.signSync(input2);
|
H A D | crypto-rsa-sign-sig-verify-pkcs1-by-segment.md | 45 let signer = cryptoFramework.createSign(signAlg); 46 await signer.init(priKey); 52 await signer.update(updateMessageBlob); 55 let signData = await signer.sign(null); 105 let signer = cryptoFramework.createSign(signAlg); 106 signer.initSync(priKey); 112 signer.updateSync(updateMessageBlob); 115 let signData = signer.signSync(null);
|
/ohos5.0/base/update/updater/services/package/pkg_verify/ |
H A D | pkcs7_signed_data.cpp | 335 Pkcs7SignerInfo signer; in ReadSig() local 336 int32_t ret = SignerInfoParse(p7SiTmp, signer); in ReadSig() 341 sigs.push_back(signer.digestEncryptData); in ReadSig() 370 Pkcs7SignerInfo signer; in SignerInfosParse() local 371 int32_t ret = SignerInfoParse(p7SiTmp, signer); in SignerInfosParse() 376 signerInfos_.push_back(std::move(signer)); in SignerInfosParse() 446 int32_t Pkcs7SignedData::VerifyDigest(X509 *cert, const Pkcs7SignerInfo &signer, const std::vector<… in VerifyDigest() argument 462 auto ret = VerifyDigestByPubKey(pubKey, signer.digestNid, hash, sig); in VerifyDigest()
|
H A D | pkcs7_signed_data.h | 97 … int32_t VerifyDigest(X509 *cert, const Pkcs7SignerInfo &signer, const std::vector<uint8_t> &hash,
|
/ohos5.0/base/security/appverify/interfaces/innerkits/appverify_lite/include/ |
H A D | mbedtls_pkcs7.h | 191 typedef int32_t (*PKCS7_CalcDigest)(const Pkcs7 *pkcs7, const SignerInfo *signer, 214 int32_t PKCS7_GetDigestInSignerAuthAttr(const SignerInfo *signer, unsigned char **dig, size_t *digL… 227 int32_t PKCS7_GetSignerAuthAttr(const SignerInfo *signer, unsigned char **data, size_t *dataLen);
|
/ohos5.0/base/security/code_signature/services/key_enable/src/ |
H A D | profile_utils.rs | 231 for signer in signers_result { in verify_signers() 232 let subject_name = format_x509name_to_string(signer.subject_name()); in verify_signers() 233 let issuer_name = format_x509name_to_string(signer.issuer_name()); in verify_signers()
|
/ohos5.0/docs/en/application-dev/security/DeviceCertificateKit/ |
H A D | certManager-overview.md | 11 - Signature verification: a process involving decrypting the signature using the signer's public ke…
|
/ohos5.0/docs/zh-cn/application-dev/reference/apis-crypto-architecture-kit/ |
H A D | js-apis-cryptoFramework.md | 3880 let signer = cryptoFramework.createSign('RSA1024|PKCS1|SHA256'); 3882 signer.init(keyPair.priKey, err => { 3883 signer.update(inputUpdate, err => { 3884 signer.sign(inputVerify, (err, signData) => { 3916 let signer = cryptoFramework.createSign('RSA1024|PKCS1|SHA256'); 3917 await signer.init(keyPair.priKey); 3918 await signer.update(inputUpdate); 3919 let signData = await signer.sign(inputSign); 3948 signer.initSync(keyPair.priKey); 3949 signer.updateSync(inputUpdate); [all …]
|
/ohos5.0/docs/en/application-dev/reference/apis-crypto-architecture-kit/ |
H A D | js-apis-cryptoFramework.md | 3882 let signer = cryptoFramework.createSign('RSA1024|PKCS1|SHA256'); 3884 signer.init(keyPair.priKey, err => { 3885 signer.update(inputUpdate, err => { 3886 signer.sign(inputVerify, (err, signData) => { 3918 let signer = cryptoFramework.createSign('RSA1024|PKCS1|SHA256'); 3919 await signer.init(keyPair.priKey); 3920 await signer.update(inputUpdate); 3921 let signData = await signer.sign(inputSign); 3950 signer.initSync(keyPair.priKey); 3951 signer.updateSync(inputUpdate); [all …]
|