/base/security/crypto_framework/frameworks/key/ |
H A D | asy_key_generator.c | 156 if ((paramsSpec->pk.data == NULL) || (paramsSpec->pk.len == 0)) { in IsDsaPubKeySpecValid() 157 LOGE("BigInteger pk is invalid"); in IsDsaPubKeySpecValid() 168 if ((paramsSpec->pk.data == NULL) || (paramsSpec->pk.len == 0)) { in IsDsaKeyPairSpecValid() 169 LOGE("BigInteger pk is invalid"); in IsDsaKeyPairSpecValid() 229 if ((paramsSpec->pk.data == NULL) || (paramsSpec->pk.len == 0)) { in IsDhPubKeySpecValid() 230 LOGE("BigInteger pk is invalid"); in IsDhPubKeySpecValid() 241 if ((paramsSpec->pk in IsDhKeyPairSpecValid() [all...] |
/base/security/crypto_framework/test/unittest/src/ |
H A D | rsa_common_param_spec.cpp | 75 returnPubSpec->pk.data = dataE; in GenerateRsa512CorrectPubKeySpec() 76 returnPubSpec->pk.len = RSA_512_E_BYTE_SIZE; in GenerateRsa512CorrectPubKeySpec() 93 returnPairSpec->pk.data = dataE; in GenerateRsa512CorrectKeyPairSpec() 94 returnPairSpec->pk.len = RSA_512_E_BYTE_SIZE; in GenerateRsa512CorrectKeyPairSpec() 126 returnPubSpec->pk.data = dataE; in GenerateRsa768CorrectPubKeySpec() 127 returnPubSpec->pk.len = RSA_768_E_BYTE_SIZE; in GenerateRsa768CorrectPubKeySpec() 144 returnPairSpec->pk.data = dataE; in GenerateRsa768CorrectKeyPairSpec() 145 returnPairSpec->pk.len = RSA_768_E_BYTE_SIZE; in GenerateRsa768CorrectKeyPairSpec() 177 returnPubSpec->pk.data = dataE; in GenerateRsa1024CorrectPubKeySpec() 178 returnPubSpec->pk in GenerateRsa1024CorrectPubKeySpec() [all...] |
H A D | ecc_common_param_spec.c | 44 eccKeyPairSpec->pk.x.data = retBigInt.data; in ConstructEccKeyPairBigInt() 45 eccKeyPairSpec->pk.x.len = retBigInt.len; in ConstructEccKeyPairBigInt() 49 HcfFree(eccKeyPairSpec->pk.x.data); in ConstructEccKeyPairBigInt() 50 eccKeyPairSpec->pk.x.data = NULL; in ConstructEccKeyPairBigInt() 51 eccKeyPairSpec->pk.x.len = 0; in ConstructEccKeyPairBigInt() 54 eccKeyPairSpec->pk.y.data = retBigInt.data; in ConstructEccKeyPairBigInt() 55 eccKeyPairSpec->pk.y.len = retBigInt.len; in ConstructEccKeyPairBigInt() 59 HcfFree(eccKeyPairSpec->pk.x.data); in ConstructEccKeyPairBigInt() 60 eccKeyPairSpec->pk.x.data = NULL; in ConstructEccKeyPairBigInt() 61 eccKeyPairSpec->pk in ConstructEccKeyPairBigInt() [all...] |
H A D | crypto_dsa_asy_key_generator_by_spec_test.cpp | 254 .pk = pk_BN 263 .pk = pk_BN, 395 HcfPubKey *pk = nullptr; in HWTEST_F() local 396 ret = generator->generatePubKey(generator, &pk); in HWTEST_F() 399 ASSERT_NE(pk, nullptr); in HWTEST_F() 401 HcfObjDestroy(pk); in HWTEST_F() 412 HcfPubKey *pk = nullptr; in HWTEST_F() local 413 ret = generator->generatePubKey(generator, &pk); in HWTEST_F() 416 ASSERT_NE(pk, nullptr); in HWTEST_F() 418 HcfObjDestroy(pk); in HWTEST_F() 428 HcfPubKey *pk = nullptr; HWTEST_F() local 659 HcfBigInteger pk = { .data = nullptr, .len = 0 }; HWTEST_F() local 1071 HcfBigInteger pk = { .data = nullptr, .len = 0 }; HWTEST_F() local 1280 HcfPubKey *pk = nullptr; HWTEST_F() local 1298 HcfPubKey *pk = nullptr; HWTEST_F() local 1314 HcfPubKey *pk = nullptr; HWTEST_F() local 1333 HcfPubKey *pk = nullptr; HWTEST_F() local 1355 HcfPubKey *pk = nullptr; HWTEST_F() local 1373 HcfPubKey *pk = nullptr; HWTEST_F() local 1395 HcfPubKey *pk = nullptr; HWTEST_F() local 1418 HcfPubKey *pk = nullptr; HWTEST_F() local 1441 HcfPubKey *pk = nullptr; HWTEST_F() local [all...] |
H A D | alg_25519_common_param_spec.c | 74 alg25519KeyPairSpec->pk.data = retBigInt.data; in ConstructAlg25519KeyPairParamsSpec() 75 alg25519KeyPairSpec->pk.len = retBigInt.len; in ConstructAlg25519KeyPairParamsSpec() 86 HcfFree(alg25519KeyPairSpec->pk.data); in ConstructAlg25519KeyPairParamsSpec() 87 alg25519KeyPairSpec->pk.data = NULL; in ConstructAlg25519KeyPairParamsSpec() 88 alg25519KeyPairSpec->pk.len = 0; in ConstructAlg25519KeyPairParamsSpec() 153 alg25519PubKeySpec->pk.data = retBigInt.data; in ConstructAlg25519PubKeyParamsSpec() 154 alg25519PubKeySpec->pk.len = retBigInt.len; in ConstructAlg25519PubKeyParamsSpec()
|
H A D | crypto_asy_key_generator_cov_test.cpp | 316 .pk = g_dsaCorrectPkBn 325 .pk = g_dsaNullPkBn 334 .pk = g_dsaNoLenPkBn 344 .pk = g_dsaCorrectPkBn, 354 .pk = g_dsaCorrectPkBn, 364 .pk = g_dsaNullPkBn, 374 .pk = g_dsaNoLenPkBn, 384 .pk = g_dsaCorrectPkBn, 394 .pk = g_dsaCorrectPkBn, 489 returnPubSpec->pk in GenerateRsa2048CorrectPubKeySpec() [all...] |
H A D | crypto_ecc_key_agreement_by_spec_test.cpp | 100 eccKeyPairSpec->pk.x.data = (IS_BIG_ENDIAN ? g_ecc224CorrectBigPkX : g_ecc224CorrectLittlePkX); in ConstructEcc224KeyPairParamsSpec() 101 eccKeyPairSpec->pk.x.len = NID_secp224r1_len; in ConstructEcc224KeyPairParamsSpec() 102 eccKeyPairSpec->pk.y.data = (IS_BIG_ENDIAN ? g_ecc224CorrectBigPkY : g_ecc224CorrectLittlePkY); in ConstructEcc224KeyPairParamsSpec() 103 eccKeyPairSpec->pk.y.len = NID_secp224r1_len; in ConstructEcc224KeyPairParamsSpec() 134 eccKeyPairSpec->pk.x.data = (IS_BIG_ENDIAN ? g_ecc256CorrectBigPkX : g_ecc256CorrectLittlePkX); in ConstructEcc256KeyPairParamsSpec() 135 eccKeyPairSpec->pk.x.len = NID_X9_62_prime256v1_len; in ConstructEcc256KeyPairParamsSpec() 136 eccKeyPairSpec->pk.y.data = (IS_BIG_ENDIAN ? g_ecc256CorrectBigPkY : g_ecc256CorrectLittlePkY); in ConstructEcc256KeyPairParamsSpec() 137 eccKeyPairSpec->pk.y.len = NID_X9_62_prime256v1_len; in ConstructEcc256KeyPairParamsSpec() 168 eccKeyPairSpec->pk.x.data = (IS_BIG_ENDIAN ? g_ecc384CorrectBigPkX : g_ecc384CorrectLittlePkX); in ConstructEcc384KeyPairParamsSpec() 169 eccKeyPairSpec->pk in ConstructEcc384KeyPairParamsSpec() [all...] |
/base/security/crypto_framework/common/src/ |
H A D | asy_key_params.c | 88 HcfFree(spec->pk.data); in DestroyDsaPubKeySpec() 89 spec->pk.data = NULL; in DestroyDsaPubKeySpec() 99 HcfFree(spec->pk.data); in DestroyDsaKeyPairSpec() 100 spec->pk.data = NULL; in DestroyDsaKeyPairSpec() 121 HcfFree(spec->pk.data); in DestroyDhPubKeySpec() 122 spec->pk.data = NULL; in DestroyDhPubKeySpec() 146 HcfFree(spec->pk.data); in DestroyDhKeyPairSpec() 147 spec->pk.data = NULL; in DestroyDhKeyPairSpec() 207 FreeEcPointMem(&(spec->pk)); in DestroyEccPubKeySpec() 231 FreeEcPointMem(&(spec->pk)); in DestroyEccKeyPairSpec() [all...] |
/base/security/huks/frameworks/crypto_lite/cipher/src/ |
H A D | cipher_rsa.c | 28 #include "pk.h" 127 static int32_t RsaLoadPrivateKey(mbedtls_pk_context *pk, const unsigned char *key, size_t keyLen) in RsaLoadPrivateKey() argument 143 ret = mbedtls_pk_parse_key(pk, (const unsigned char *)finalKey, finalKeyLen, NULL, 0, in RsaLoadPrivateKey() 150 rsa = mbedtls_pk_rsa(*pk); in RsaLoadPrivateKey() 177 static int32_t RsaLoadPublicKey(mbedtls_pk_context *pk, const unsigned char *key, size_t keyLen) in RsaLoadPublicKey() argument 189 ret = mbedtls_pk_parse_public_key(pk, (const unsigned char *)finalKey, finalKeyLen); in RsaLoadPublicKey() 195 rsa = mbedtls_pk_rsa(*pk); in RsaLoadPublicKey() 197 CIPHER_LOG_E("pk rsa error"); in RsaLoadPublicKey() 328 mbedtls_pk_context pk; in RsaEncrypt() local 329 mbedtls_pk_init(&pk); in RsaEncrypt() 451 mbedtls_pk_context pk; RsaDecrypt() local [all...] |
/base/security/appverify/interfaces/innerkits/appverify_lite/src/ |
H A D | app_verify.c | 30 #include "mbedtls/pk.h" 550 static unsigned char *GetRsaPk(const mbedtls_pk_context *pk, int32_t *len) in GetRsaPk() argument 564 int32_t pkLen = mbedtls_pk_write_pubkey(&c, buf, pk); in GetRsaPk() 567 LOG_ERROR("get pk buf error"); in GetRsaPk() 593 static unsigned char *GetEcPk(const mbedtls_pk_context *pk, int32_t *len) in GetEcPk() argument 595 mbedtls_ecp_keypair *ecCtx = mbedtls_pk_ec(*pk); in GetEcPk() 597 LOG_ERROR("get ec pk error"); in GetEcPk() 614 LOG_ERROR("get ecc pk key error"); in GetEcPk() 643 static unsigned char *GetPkBuf(const mbedtls_pk_context *pk, int32_t *len) in GetPkBuf() argument 646 if (mbedtls_pk_get_type(pk) in GetPkBuf() 654 ParseCertGetPk(const char *certEncoded, AppSignPk *pk) ParseCertGetPk() argument 681 GetAppSignPublicKey(const ProfileProf *profile, AppSignPk *pk) GetAppSignPublicKey() argument 698 FreeAppSignPublicKey(AppSignPk *pk) FreeAppSignPublicKey() argument 709 AppSignPk pk = {0}; GetAppid() local [all...] |
/base/security/crypto_framework/interfaces/inner_api/algorithm_parameter/ |
H A D | detailed_alg_25519_key_params.h | 28 HcfBigInteger pk; member 39 HcfBigInteger pk; member
|
H A D | detailed_dsa_key_params.h | 35 HcfBigInteger pk; member 42 HcfBigInteger pk; member
|
H A D | detailed_rsa_key_params.h | 33 HcfBigInteger pk; member 40 HcfBigInteger pk; member
|
H A D | detailed_dh_key_params.h | 34 HcfBigInteger pk; member 45 HcfBigInteger pk; member
|
H A D | detailed_ecc_key_params.h | 52 HcfPoint pk; member 63 HcfPoint pk; member
|
/base/security/appverify/interfaces/innerkits/appverify_lite/include/ |
H A D | app_verify_pub.h | 114 char *pk; member 119 typedef int32_t (*GetSignPk)(struct VfyRst *verifyRst, AppSignPk *pk); 120 typedef void (*FreeSignPK)(AppSignPk *pk);
|
/base/security/crypto_framework/plugin/openssl_plugin/common/inc/ |
H A D | openssl_class.h | 61 RSA *pk; member 82 DSA *pk; member 154 DH *pk; member
|
/base/security/crypto_framework/test/unittest/src/ecc/ |
H A D | ecc_asy_key_common.cpp | 114 eccPubKeySpec->pk.x.data = (IS_BIG_ENDIAN ? g_ecc224CorrectBigPkX : g_ecc224CorrectLittlePkX); in ConstructEcc224PubKeyParamsSpec() 115 eccPubKeySpec->pk.x.len = NID_secp224r1_len; in ConstructEcc224PubKeyParamsSpec() 116 eccPubKeySpec->pk.y.data = (IS_BIG_ENDIAN ? g_ecc224CorrectBigPkY : g_ecc224CorrectLittlePkY); in ConstructEcc224PubKeyParamsSpec() 117 eccPubKeySpec->pk.y.len = NID_secp224r1_len; in ConstructEcc224PubKeyParamsSpec() 176 eccKeyPairSpec->pk.x.data = (IS_BIG_ENDIAN ? g_ecc224CorrectBigPkX : g_ecc224CorrectLittlePkX); in ConstructEcc224KeyPairParamsSpec() 177 eccKeyPairSpec->pk.x.len = NID_secp224r1_len; in ConstructEcc224KeyPairParamsSpec() 178 eccKeyPairSpec->pk.y.data = (IS_BIG_ENDIAN ? g_ecc224CorrectBigPkY : g_ecc224CorrectLittlePkY); in ConstructEcc224KeyPairParamsSpec() 179 eccKeyPairSpec->pk.y.len = NID_secp224r1_len; in ConstructEcc224KeyPairParamsSpec() 238 eccPubKeySpec->pk.x.data = (IS_BIG_ENDIAN ? g_ecc256CorrectBigPkX : g_ecc256CorrectLittlePkX); in ConstructEcc256PubKeyParamsSpec() 239 eccPubKeySpec->pk in ConstructEcc256PubKeyParamsSpec() [all...] |
/base/security/crypto_framework/plugin/openssl_plugin/key/asy_key_generator/src/ |
H A D | dh_asy_key_generator_openssl.c | 107 OpensslDhFree(impl->pk); in DestroyDhPubKey() 108 impl->pk = NULL; in DestroyDhPubKey() 184 EVP_PKEY *pKey = NewEvpPkeyByDh(impl->pk, true); in GetDhPubKeyEncoded() 285 dh = impl->pk; in GetBigIntegerSpec() 507 static void FillOpensslDhPubKeyFunc(HcfOpensslDhPubKey *pk) in FillOpensslDhPubKeyFunc() argument 509 pk->base.base.base.destroy = DestroyDhPubKey; in FillOpensslDhPubKeyFunc() 510 pk->base.base.base.getClass = GetDhPubKeyClass; in FillOpensslDhPubKeyFunc() 511 pk->base.base.getAlgorithm = GetDhPubKeyAlgorithm; in FillOpensslDhPubKeyFunc() 512 pk->base.base.getEncoded = GetDhPubKeyEncoded; in FillOpensslDhPubKeyFunc() 513 pk in FillOpensslDhPubKeyFunc() 536 CreateDhPubKey(DH *pk, HcfOpensslDhPubKey **returnPubKey) CreateDhPubKey() argument 583 DH *pk = OpensslEvpPkeyGet1Dh(pkey); GeneratePubKeyByPkey() local 658 CreateOpensslDhKey(const HcfDhCommParamsSpec *paramsSpec, BIGNUM *pk, BIGNUM *sk, DH **returnDh) CreateOpensslDhKey() argument [all...] |
H A D | dsa_asy_key_generator_openssl.c | 107 OpensslDsaFree(impl->pk); in DestroyDsaPubKey() 108 impl->pk = NULL; in DestroyDsaPubKey() 177 int len = OpensslI2dDsaPubkey(impl->pk, &returnData); in GetDsaPubKeyEncoded() 263 DSA *dsaPk = impl->pk; in GetBigIntegerSpecFromDsaPubKey() 432 static void FillOpensslDsaPubKeyFunc(HcfOpensslDsaPubKey *pk) in FillOpensslDsaPubKeyFunc() argument 434 pk->base.base.base.destroy = DestroyDsaPubKey; in FillOpensslDsaPubKeyFunc() 435 pk->base.base.base.getClass = GetDsaPubKeyClass; in FillOpensslDsaPubKeyFunc() 436 pk->base.base.getAlgorithm = GetDsaPubKeyAlgorithm; in FillOpensslDsaPubKeyFunc() 437 pk->base.base.getEncoded = GetDsaPubKeyEncoded; in FillOpensslDsaPubKeyFunc() 438 pk in FillOpensslDsaPubKeyFunc() 461 CreateDsaPubKey(DSA *pk, HcfOpensslDsaPubKey **returnPubKey) CreateDsaPubKey() argument 508 DSA *pk = OpensslEvpPkeyGet1Dsa(pkey); GeneratePubKeyByPkey() local 589 CreateOpensslDsaKey(const HcfDsaCommParamsSpec *paramsSpec, BIGNUM *pk, BIGNUM *sk, DSA **returnDsa) CreateOpensslDsaKey() argument [all...] |
H A D | alg_25519_asy_key_generator_openssl.c | 492 static void FillOpensslAlg25519PubKeyFunc(HcfOpensslAlg25519PubKey *pk) in FillOpensslAlg25519PubKeyFunc() argument 494 pk->base.base.base.destroy = DestroyAlg25519PubKey; in FillOpensslAlg25519PubKeyFunc() 495 pk->base.base.base.getClass = GetAlg25519PubKeyClass; in FillOpensslAlg25519PubKeyFunc() 496 pk->base.base.getAlgorithm = GetAlg25519PubKeyAlgorithm; in FillOpensslAlg25519PubKeyFunc() 497 pk->base.base.getEncoded = GetAlg25519PubKeyEncoded; in FillOpensslAlg25519PubKeyFunc() 498 pk->base.base.getEncodedPem = GetAlg25519PubKeyEncodedPem; in FillOpensslAlg25519PubKeyFunc() 499 pk->base.base.getFormat = GetAlg25519PubKeyFormat; in FillOpensslAlg25519PubKeyFunc() 500 pk->base.getAsyKeySpecBigInteger = GetBigIntegerSpecFromAlg25519PubKey; in FillOpensslAlg25519PubKeyFunc() 501 pk->base.getAsyKeySpecInt = GetIntSpecFromAlg25519PubKey; in FillOpensslAlg25519PubKeyFunc() 502 pk in FillOpensslAlg25519PubKeyFunc() 929 CreateOpensslAlg25519PubKey(const HcfBigInteger *pk, const char *algName, EVP_PKEY **returnAlg25519) CreateOpensslAlg25519PubKey() argument [all...] |
H A D | rsa_asy_key_generator_openssl.c | 228 const BIGNUM *n = OpensslRsaGet0N(impl->pk); in GetRsaPubKeySpecBigInteger() 239 const BIGNUM *e = OpensslRsaGet0E(impl->pk); in GetRsaPubKeySpecBigInteger() 241 LOGD("[error] fail to get pk"); in GetRsaPubKeySpecBigInteger() 267 OpensslRsaFree(impl->pk); in DestroyPubKey() 268 impl->pk = NULL; in DestroyPubKey() 457 return EncodePubKeyToX509(impl->pk, returnBlob); in GetPubKeyEncoded() 460 static HcfResult GetPubKeyPkcs1Pem(RSA *pk, char **returnString) in GetPubKeyPkcs1Pem() argument 468 int ret = OpensslPemWriteBioRsaPublicKey(bio, pk); in GetPubKeyPkcs1Pem() 484 static HcfResult GetPubKeyX509Pem(RSA *pk, char **returnString) in GetPubKeyX509Pem() argument 492 int ret = OpensslPemWriteBioRsaPubKey(bio, pk); in GetPubKeyX509Pem() 508 GetPubKeyPem(const char *format, RSA *pk, char **returnString) GetPubKeyPem() argument [all...] |
/base/security/crypto_framework/frameworks/js/napi/crypto/src/ |
H A D | napi_utils.cpp | 652 napi_value pk = GetDetailAsyKeySpecValue(env, arg, "pk"); in GetDsaPubKeySpec() local 653 bool ret = GetBigIntFromNapiValue(env, pk, &spec->pk); in GetDsaPubKeySpec() 684 napi_value pk = GetDetailAsyKeySpecValue(env, arg, "pk"); in GetDsaKeyPairAsyKeySpec() local 685 bool ret = GetBigIntFromNapiValue(env, pk, &spec->pk); in GetDsaKeyPairAsyKeySpec() 695 HcfFree(spec->pk.data); in GetDsaKeyPairAsyKeySpec() 938 napi_value pk in GetEccPubKeySpec() local 972 napi_value pk = GetDetailAsyKeySpecValue(env, arg, "pk"); GetEccKeyPairAsyKeySpec() local 1068 napi_value pk = GetDetailAsyKeySpecValue(env, arg, "pk"); GetRsaPubKeySpec() local 1100 napi_value pk = GetDetailAsyKeySpecValue(env, arg, "pk"); GetRsaKeyPairAsyKeySpec() local 1201 napi_value pk = GetDetailAsyKeySpecValue(env, arg, "pk"); GetAlg25519PubKeySpec() local 1228 napi_value pk = GetDetailAsyKeySpecValue(env, arg, "pk"); GetAlg25519KeyPairAsyKeySpec() local 1354 napi_value pk = GetDetailAsyKeySpecValue(env, arg, "pk"); GetDhPubKeySpec() local 1386 napi_value pk = GetDetailAsyKeySpecValue(env, arg, "sk"); GetDhPriKeySpec() local 1418 napi_value pk = GetDetailAsyKeySpecValue(env, arg, "pk"); GetDhKeyPairAsyKeySpec() local [all...] |
/base/security/crypto_framework/test/fuzztest/key/asykeygenerator_fuzzer/ |
H A D | asykeygenerator_fuzzer.cpp | 361 .pk = pk_BN 370 .pk = pk_BN, 472 returnPubSpec->pk.data = dataE; in GenerateRsa2048CorrectPubKeySpec() 473 returnPubSpec->pk.len = RSA_2048_E_BYTE_SIZE; in GenerateRsa2048CorrectPubKeySpec() 490 returnPairSpec->pk.data = dataE; in GenerateRsa2048CorrectKeyPairSpec() 491 returnPairSpec->pk.len = RSA_2048_E_BYTE_SIZE; in GenerateRsa2048CorrectKeyPairSpec() 549 eccPubKeySpec->pk.x.data = (IsBigEndian() ? g_ecc224CorrectBigPkX : g_ecc224CorrectLittlePkX); in ConstructEcc224PubKeyParamsSpec() 550 eccPubKeySpec->pk.x.len = NID_secp224r1_len; in ConstructEcc224PubKeyParamsSpec() 551 eccPubKeySpec->pk.y.data = (IsBigEndian() ? g_ecc224CorrectBigPkY : g_ecc224CorrectLittlePkY); in ConstructEcc224PubKeyParamsSpec() 552 eccPubKeySpec->pk in ConstructEcc224PubKeyParamsSpec() [all...] |
/base/security/certificate_framework/frameworks/adapter/v1.0/inc/ |
H A D | certificate_openssl_class.h | 37 RSA *pk;
member
|