/base/security/crypto_framework/test/unittest/src/ |
H A D | crypto_dsa_sign_test.cpp | 537 HcfBlob signData = { .data = nullptr, .len = 0 }; in HWTEST_F() local 538 ret = sign->sign(sign, &srcData, &signData); in HWTEST_F() 540 EXPECT_NE(signData.data, nullptr); in HWTEST_F() 541 EXPECT_NE(signData.len, 0); in HWTEST_F() 552 EXPECT_EQ(verify->verify(verify, &srcData, &signData), true); in HWTEST_F() 555 HcfFree(signData.data); in HWTEST_F() 579 HcfBlob signData = { .data = nullptr, .len = 0 }; in HWTEST_F() local 580 ret = sign->sign(sign, &extraSrcData, &signData); in HWTEST_F() 595 EXPECT_EQ(verify->verify(verify, &extraSrcData, &signData), true); in HWTEST_F() 598 HcfFree(signData in HWTEST_F() 618 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 659 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 700 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 745 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 786 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 827 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 866 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 905 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 946 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 987 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 1028 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 1069 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 1108 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 1146 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 1187 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 1228 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 1269 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 1310 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 1349 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 1387 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 1428 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 1469 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 1510 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local 1551 HcfBlob signData = { .data = nullptr, .len = 0 }; HWTEST_F() local [all...] |
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/ |
H A D | hks_rsa_common_mt.cpp | 386 HksBlob signData = { .size = SET_SIZE_4096, .data = static_cast<uint8_t *>(HksMalloc(SET_SIZE_4096)) }; in SignLocalTestCase() local 387 ASSERT_NE(signData.data, nullptr); in SignLocalTestCase() 389 EXPECT_EQ(HksSign(&privateKey, paramInSetTest, &plainText, &signData), testCaseParams.signResult); in SignLocalTestCase() 402 EXPECT_EQ(OpensslRsaVerifyWithNoneDegist(&publicKey, testCaseParams.padding, &plainText, &signData), in SignLocalTestCase() 405 EXPECT_EQ(OpensslVerifyRsa(&plainText, &signData, in SignLocalTestCase() 414 HKS_FREE(signData.data); in SignLocalTestCase() 444 HksBlob signData = { .size = SET_SIZE_4096, .data = static_cast<uint8_t *>(HksMalloc(SET_SIZE_4096)) }; in SignServiceTestCase() local 445 ASSERT_NE(signData.data, nullptr); in SignServiceTestCase() 447 EXPECT_EQ(HksSign(&authId, paramInSet, &plainText, &signData), testCaseParams.signResult); in SignServiceTestCase() 464 EXPECT_EQ(OpensslRsaVerifyWithNoneDegist(&publicKey, testCaseParams.padding, &plainText, &signData), in SignServiceTestCase() 512 HksBlob signData = { .size = SET_SIZE_4096, .data = static_cast<uint8_t *>(HksMalloc(SET_SIZE_4096)) }; VerifyLocalTestCase() local 562 HksBlob signData = { .size = SET_SIZE_4096, .data = static_cast<uint8_t *>(HksMalloc(SET_SIZE_4096)) }; VerifyServiceTestCase() local [all...] |
H A D | hks_dsa_mt.cpp | 686 HksBlob signData = { .size = SET_SIZE_4096, .data = (uint8_t *)HksMalloc(SET_SIZE_4096) }; in GenerateKeyTestCase() local 687 ASSERT_NE(signData.data, nullptr); in GenerateKeyTestCase() 689 EXPECT_EQ(OpensslSignDsa(&plainText, &signData, &privateKey, testCaseParams.keyDigest), in GenerateKeyTestCase() 692 EXPECT_EQ(OpensslVerifyDsa(&plainText, &signData, &publicKey, testCaseParams.keyDigest), in GenerateKeyTestCase() 697 HKS_FREE(signData.data); in GenerateKeyTestCase() 749 HksBlob signData = { .size = SET_SIZE_4096, .data = (uint8_t *)HksMalloc(SET_SIZE_4096) }; in SignLocalTestCase() local 750 ASSERT_NE(signData.data, nullptr); in SignLocalTestCase() 752 EXPECT_EQ(HksSign(&privateKey, paramInSet, &plainText, &signData), testCaseParams.signResult); in SignLocalTestCase() 754 EXPECT_EQ(OpensslVerifyDsa(&plainText, &signData, &publicKey, testCaseParams.keyDigest), in SignLocalTestCase() 759 HKS_FREE(signData in SignLocalTestCase() 808 HksBlob signData = { .size = SET_SIZE_4096, .data = (uint8_t *)HksMalloc(SET_SIZE_4096) }; SignServiceTestCase() local 873 HksBlob signData = { .size = SET_SIZE_4096, .data = (uint8_t *)HksMalloc(SET_SIZE_4096) }; VerifyLocalTestCase() local 906 HksBlob signData = { .size = SET_SIZE_4096, .data = (uint8_t *)HksMalloc(SET_SIZE_4096) }; VerifyServiceTestCase() local [all...] |
H A D | openssl_rsa_helper.c | 422 int32_t OpensslSignRsa(const struct HksBlob *plainText, struct HksBlob *signData, struct HksBlob *key, int padding, in OpensslSignRsa() argument 470 size_t signLen = signData->size; in OpensslSignRsa() 471 if (EVP_DigestSignFinal(mctx, signData->data, &signLen) != 1) { in OpensslSignRsa() 477 signData->size = signLen; in OpensslSignRsa() 485 int32_t OpensslVerifyRsa(const struct HksBlob *plainText, struct HksBlob *signData, struct HksBlob *key, int padding, in OpensslVerifyRsa() argument 527 if (EVP_DigestVerifyFinal(mctx, signData->data, signData->size) != 1) { in OpensslVerifyRsa()
|
H A D | openssl_dsa_helper.c | 156 const struct HksBlob *plainText, struct HksBlob *signData, struct HksBlob *key, enum HksKeyDigest digestType) in OpensslSignDsa() 194 size_t signLen = signData->size; in OpensslSignDsa() 195 if (EVP_DigestSignFinal(mctx, signData->data, &signLen) != 1) { in OpensslSignDsa() 201 signData->size = signLen; in OpensslSignDsa() 210 const struct HksBlob *plainText, struct HksBlob *signData, struct HksBlob *key, enum HksKeyDigest digestType) in OpensslVerifyDsa() 248 if (EVP_DigestVerifyFinal(mctx, signData->data, signData->size) != 1) { in OpensslVerifyDsa() 155 OpensslSignDsa( const struct HksBlob *plainText, struct HksBlob *signData, struct HksBlob *key, enum HksKeyDigest digestType) OpensslSignDsa() argument 209 OpensslVerifyDsa( const struct HksBlob *plainText, struct HksBlob *signData, struct HksBlob *key, enum HksKeyDigest digestType) OpensslVerifyDsa() argument
|
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/include/ |
H A D | openssl_dsa_helper.h | 36 const struct HksBlob *plainText, struct HksBlob *signData, struct HksBlob *key, enum HksKeyDigest digestType); 39 const struct HksBlob *plainText, struct HksBlob *signData, struct HksBlob *key, enum HksKeyDigest digestType);
|
H A D | openssl_rsa_helper.h | 45 int32_t OpensslSignRsa(const struct HksBlob *plainText, struct HksBlob *signData, struct HksBlob *key, int padding, 48 int32_t OpensslVerifyRsa(const struct HksBlob *plainText, struct HksBlob *signData, struct HksBlob *key, int padding,
|
/base/security/crypto_framework/interfaces/kits/native/include/ |
H A D | crypto_signature.h | 125 * @param signData Indicates the signature data. 131 bool OH_CryptoVerify_Final(OH_CryptoVerify *ctx, Crypto_DataBlob *in, Crypto_DataBlob *signData); 137 * @param signData Indicates the signature data. 146 OH_Crypto_ErrCode OH_CryptoVerify_Recover(OH_CryptoVerify *ctx, Crypto_DataBlob *signData,
|
/base/security/crypto_framework/frameworks/native/src/ |
H A D | signature.c | 76 bool OH_CryptoVerify_Final(OH_CryptoVerify *ctx, Crypto_DataBlob *in, Crypto_DataBlob *signData) in OH_CryptoVerify_Final() argument 78 if ((ctx == NULL) || (ctx->verify == NULL) || (signData == NULL)) { in OH_CryptoVerify_Final() 81 bool ret = ctx->verify((HcfVerify *)ctx, (HcfBlob *)in, (HcfBlob *)signData); in OH_CryptoVerify_Final() 89 OH_Crypto_ErrCode OH_CryptoVerify_Recover(OH_CryptoVerify *ctx, Crypto_DataBlob *signData, in OH_CryptoVerify_Recover() argument 92 if ((ctx == NULL) || (ctx->recover == NULL) || (signData == NULL) || (rawSignData == NULL)) { in OH_CryptoVerify_Recover() 95 HcfResult ret = ctx->recover((HcfVerify *)ctx, (HcfBlob *)signData, (HcfBlob *)rawSignData); in OH_CryptoVerify_Recover()
|
/base/update/updater/services/package/pkg_verify/ |
H A D | pkg_verify_util.cpp | 78 int32_t PkgVerifyUtil::VerifySign(std::vector<uint8_t> &signData, std::vector<uint8_t> &digest) const in VerifySign() argument 81 int32_t ret = Pkcs7verify(signData, hash); in VerifySign() 141 PkgBuffer signData(signDataLen); in GetSignature() 143 ret = pkgStream->Read(signData, signatureStart, signDataLen, readLen); in GetSignature() 149 signature.assign(signData.buffer, signData.buffer + readLen); in GetSignature()
|
H A D | pkg_verify_util.h | 31 int32_t VerifySign(std::vector<uint8_t> &signData, std::vector<uint8_t> &digest) const;
|
H A D | pkcs7_signed_data.cpp | 209 PKCS7_SIGNED *signData = pkcs7_->d.sign; in ParseContentInfo() local 210 if (signData == nullptr) { in ParseContentInfo() 216 PKCS7 *contentInfo = signData->contents; in ParseContentInfo()
|
/base/update/updater/services/package/pkg_package/ |
H A D | pkg_upgradefile.cpp | 264 int32_t UpgradePkgFile::ReadSignData(std::vector<uint8_t> &signData,
in ReadSignData() argument 293 signData.resize(dataLen);
in ReadSignData() 294 signData.assign(signBuf.data.begin(), signBuf.data.end());
in ReadSignData() 390 int32_t UpgradePkgFile::ReadPackageInfo(std::vector<uint8_t> &signData, size_t &parsedLen,
in ReadPackageInfo() argument 404 signData.resize(SIGN_SHA384_LEN);
in ReadPackageInfo() 405 ret = memcpy_s(signData.data(), signData.size(),
in ReadPackageInfo() 408 signData.resize(SIGN_SHA256_LEN);
in ReadPackageInfo() 409 ret = memcpy_s(signData.data(), signData in ReadPackageInfo() 493 std::vector<uint8_t> signData; VerifyFileV1() local 521 std::vector<uint8_t> signData; VerifyFileV2() local 530 Verify(size_t start, DigestAlgorithm::DigestAlgorithmPtr algorithm, VerifyFunction verifier, const std::vector<uint8_t> &signData) Verify() argument 566 VerifyHeader(DigestAlgorithm::DigestAlgorithmPtr algorithm, VerifyFunction verifier, const std::vector<uint8_t> &signData) VerifyHeader() argument [all...] |
H A D | pkg_upgradefile.h | 168 VerifyFunction verifier, const std::vector<uint8_t> &signData);
172 int32_t ReadPackageInfo(std::vector<uint8_t> &signData,
178 int32_t ReadSignData(std::vector<uint8_t> &signData,
181 const std::vector<uint8_t> &signData);
|
/base/web/webview/ohos_interface/ohos_glue/ohos_adapter/bridge/webview/ |
H A D | ark_cert_manager_adapter_impl.cpp | 61 const uint8_t* uri, const uint8_t* certData, uint32_t certDataLen, uint8_t* signData, uint32_t signDataLen) in Sign() 63 return real_->Sign(uri, certData, certDataLen, signData, signDataLen); in Sign() 60 Sign( const uint8_t* uri, const uint8_t* certData, uint32_t certDataLen, uint8_t* signData, uint32_t signDataLen) Sign() argument
|
H A D | ark_cert_manager_adapter_impl.h | 43 int32_t Sign(const uint8_t* uri, const uint8_t* certData, uint32_t certDataLen, uint8_t* signData,
|
/base/security/huks/services/huks_standard/huks_engine/main/core/include/ |
H A D | hks_sm_import_wrap_key.h | 32 struct HksBlob signData; member
|
/base/web/webview/ohos_interface/ohos_glue/ohos_adapter/bridge/webcore/ |
H A D | ark_cert_manager_adapter_wrapper.cpp | 58 const uint8_t* uri, const uint8_t* certData, uint32_t certDataLen, uint8_t* signData, uint32_t signDataLen) in Sign() 60 return ctocpp_->Sign(uri, certData, certDataLen, signData, signDataLen); in Sign() 57 Sign( const uint8_t* uri, const uint8_t* certData, uint32_t certDataLen, uint8_t* signData, uint32_t signDataLen) Sign() argument
|
H A D | ark_cert_manager_adapter_wrapper.h | 43 int32_t Sign(const uint8_t* uri, const uint8_t* certData, uint32_t certDataLen, uint8_t* signData,
|
/base/web/webview/ohos_adapter/cert_mgr_adapter/include/ |
H A D | cert_mgr_adapter_impl.h | 43 uint8_t* signData, uint32_t signDataLen) override;
|
/base/web/webview/ohos_interface/include/ohos_adapter/ |
H A D | cert_mgr_adapter.h | 44 const uint8_t* uri, const uint8_t* certData, uint32_t certDataLen, uint8_t* signData, uint32_t signDataLen) = 0;
|
/base/web/webview/ohos_interface/ohos_glue/ohos_adapter/include/ |
H A D | ark_cert_manager_adapter.h | 51 const uint8_t* uri, const uint8_t* certData, uint32_t certDataLen, uint8_t* signData, uint32_t signDataLen) = 0;
|
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/ |
H A D | hks_backup_test.cpp | 342 uint8_t signData[HKS_ECC_KEY_SIZE_256] = { 0 }; in HWTEST_F() local 344 struct HksBlob signDataBlob = { .size = HKS_ARRAY_SIZE(signData), .data = signData }; in HWTEST_F() 388 uint8_t signData[HKS_ECC_KEY_SIZE_256] = { 0 }; in HWTEST_F() local 390 struct HksBlob signDataBlob = { .size = HKS_ARRAY_SIZE(signData), .data = signData }; in HWTEST_F()
|
/base/security/huks/services/huks_standard/huks_engine/main/core/src/ |
H A D | hks_sm_import_wrap_key.c | 76 ClearAndFreeKeyBlob(&dataParams->signData); in ClearAndFreeWrappedBlob() 266 dataParams->signData.size = signatureDataBlob.size; in SplitKekAndSignData() 267 dataParams->signData.data = signatureDataBlob.data; in SplitKekAndSignData() 311 ret = HksCryptoHalVerify(&dataParams->peerPublicKey, &usageSpec, &message, &dataParams->signData); in VerifyKekBySm2()
|
/base/web/webview/ohos_adapter/cert_mgr_adapter/src/ |
H A D | cert_mgr_adapter_impl.cpp | 392 uint8_t* signData, uint32_t signDataLen) in Sign() 399 if (signData == nullptr) { in Sign() 417 struct CmBlob signature = { signDataLen, signData }; in Sign() 391 Sign(const uint8_t* uri, const uint8_t* certData, uint32_t certDataLen, uint8_t* signData, uint32_t signDataLen) Sign() argument
|