Home
last modified time | relevance | path

Searched refs:signature (Results 1 - 25 of 156) sorted by relevance

1234567

/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/
H A Dhks_mbedtls_ecdsa.c43 const struct HksBlob *message, struct HksBlob *signature) in HksMbedtlsEcdsaSign()
77 size_t keyLen = (size_t)(signature->size); in HksMbedtlsEcdsaSign()
79 signature->data, keyLen, &keyLen, mbedtls_ctr_drbg_random, &ctrDrbg); in HksMbedtlsEcdsaSign()
80 signature->size = (uint32_t)keyLen; in HksMbedtlsEcdsaSign()
81 if (ret != HKS_MBEDTLS_SUCCESS || keyLen != (size_t)(signature->size)) { in HksMbedtlsEcdsaSign()
83 (void)memset_s(signature->data, signature->size, 0, signature->size); in HksMbedtlsEcdsaSign()
96 const struct HksBlob *message, const struct HksBlob *signature) in HksMbedtlsEcdsaVerify()
121 message->data, message->size, signature in HksMbedtlsEcdsaVerify()
42 HksMbedtlsEcdsaSign(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, const struct HksBlob *message, struct HksBlob *signature) HksMbedtlsEcdsaSign() argument
95 HksMbedtlsEcdsaVerify(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, const struct HksBlob *message, const struct HksBlob *signature) HksMbedtlsEcdsaVerify() argument
[all...]
/base/update/updater/services/package/pkg_verify/
H A Dpkg_verify_util.cpp35 int32_t PkgVerifyUtil::VerifySourceDigest(std::vector<uint8_t> &signature, std::vector<uint8_t> &sourceDigest, in VerifySourceDigest() argument
42 int32_t ret = pkcs7.ReadSig(signature.data(), signature.size(), sigs); in VerifySourceDigest()
62 std::vector<uint8_t> signature; in VerifyAccPackageSign() local
64 if (GetSignature(pkgStream, signatureSize, signature, commentTotalLenAll) != PKG_SUCCESS) { in VerifyAccPackageSign()
65 PKG_LOGE("get package signature fail!"); in VerifyAccPackageSign()
75 return VerifySourceDigest(signature, sourceDigest, keyPath); in VerifyAccPackageSign()
103 std::vector<uint8_t> signature; in VerifyPackageSign() local
105 if (GetSignature(pkgStream, signatureSize, signature, commentTotalLenAll) != PKG_SUCCESS) { in VerifyPackageSign()
106 PKG_LOGE("get package signature fai in VerifyPackageSign()
129 GetSignature(const PkgStreamPtr pkgStream, size_t &signatureSize, std::vector<uint8_t> &signature, uint16_t &commentTotalLenAll) const GetSignature() argument
179 Pkcs7verify(std::vector<uint8_t> &signature, std::vector<uint8_t> &hash) const Pkcs7verify() argument
[all...]
H A Dpkg_verify_util.h32 int32_t VerifySourceDigest(std::vector<uint8_t> &signature, std::vector<uint8_t> &sourceDigest,
36 std::vector<uint8_t> &signature, uint16_t &commentTotalLenAll) const;
46 int32_t Pkcs7verify(std::vector<uint8_t> &signature, std::vector<uint8_t> &hash) const;
/base/security/code_signature/interfaces/innerkits/local_code_sign/src/
H A Dlocal_code_sign_kit.cpp28 int32_t LocalCodeSignKit::SignLocalCode(const std::string &filePath, ByteBuffer &signature) in SignLocalCode() argument
30 return LocalCodeSignClient::GetInstance().SignLocalCode("", filePath, signature); in SignLocalCode()
33 int32_t LocalCodeSignKit::SignLocalCode(const std::string &ownerID, const std::string &filePath, ByteBuffer &signature) in SignLocalCode() argument
35 return LocalCodeSignClient::GetInstance().SignLocalCode(ownerID, filePath, signature); in SignLocalCode()
/base/security/code_signature/interfaces/innerkits/jit_code_sign/src/
H A Djit_code_signer_hybrid.cpp63 uint32_t signature = ctx_.Update(insn); in SignInstruction() local
64 signTable_.push_back(signature); in SignInstruction()
90 uint32_t signature = ctx_.SignSingle(insn, curIndex); in PatchInstruction() local
91 signTable_[curIndex] = signature; in PatchInstruction()
109 uint32_t signature = verifyCtx.Update(*insnPtr); in ValidateSubCode() local
110 if (signature != signTable_[index]) { in ValidateSubCode()
113 "signature(%{public}x) != wanted(%{public}x)", in ValidateSubCode()
114 *(insnPtr), index * INSTRUCTION_SIZE, signature, signTable_[index]); in ValidateSubCode()
148 uint32_t signature = verifyCtx.SignSingle(insn, index); in ValidateCodeCopy() local
149 if (signature ! in ValidateCodeCopy()
[all...]
H A Dpac_sign_ctx.cpp145 uint32_t signature = SignWithContext(value); in Update() local
146 SetContext(signature); in Update()
148 LOG_INFO("After update context = %{public}lx, signature = %{public}x", in Update()
149 context_, signature); in Update()
151 return signature; in Update()
157 uint32_t signature = PACGA(value, paddingContext); in SignSingle() local
159 LOG_INFO("Get signature = %{public}x", signature); in SignSingle()
161 return signature; in SignSingle()
H A Djit_code_signer_single.cpp66 uint32_t signature = ctx_.SignSingle(insn, curIndex); in PatchInstruction() local
67 signTable_[curIndex] = signature; in PatchInstruction()
84 uint32_t signature = verifyCtx.SignSingle(insn, index); in ValidateCodeCopy() local
85 if (signature != signTable_[index]) { in ValidateCodeCopy()
88 "%{public}x, signature(%{public}x) != wanted(%{public}x)", in ValidateCodeCopy()
89 insn, index * INSTRUCTION_SIZE, signature, signTable_[index]); in ValidateCodeCopy()
/base/security/device_security_level/test/dslm_unit_test/cmocker/
H A Dc_mocker.h67 #define PARAMETER(index, signature, dummy) \
68 GMOCK_PP_COMMA_IF(index) GMOCK_INTERNAL_ARG_O(index, GMOCK_PP_REMOVE_PARENS(signature))
77 #define IMPLEMENT_FUNCTION_INTERNAL(cls, method, count, signature, invoker) \
79 testing::internal::Function<GMOCK_PP_REMOVE_PARENS(signature)>::Result method( \
80 GMOCK_PP_REPEAT(GMOCK_INTERNAL_PARAMETER, signature, count)) \
93 return mock->method(GMOCK_PP_REPEAT(GMOCK_INTERNAL_FORWARD_ARG, signature, count)); \
97 return stub(GMOCK_PP_REPEAT(GMOCK_INTERNAL_FORWARD_ARG, signature, count)); \
101 return testing::internal::Function<GMOCK_PP_REMOVE_PARENS(signature)>::Result(); \
/base/security/device_security_level/oem_property/common/
H A Ddslm_credential_utils.c45 #define JSON_KEY_SIGNATURE "signature"
60 DataBuffer signature; member
66 DataBuffer signature; member
74 const char *signature; member
180 int32_t ret = EcdsaVerify(&root->publicKey, &root->signature, &root->publicKey, root->algorithm); in VerifyCredentialCb()
188 ret = EcdsaVerify(&intermediate->publicKey, &intermediate->signature, &root->publicKey, intermediate->algorithm); in VerifyCredentialCb()
196 ret = EcdsaVerify(&last->publicKey, &last->signature, &intermediate->publicKey, last->algorithm); in VerifyCredentialCb()
204 ret = EcdsaVerify(&payload->payload, &payload->signature, &last->publicKey, TYPE_ECDSA_SHA_384); in VerifyCredentialCb()
206 ret = EcdsaVerify(&payload->payload, &payload->signature, &last->publicKey, TYPE_ECDSA_SHA_256); in VerifyCredentialCb()
266 credCb->signature in SplitCredentialString()
329 DataBuffer *signature = &attestation->signature; ParsePayloadAttestation() local
[all...]
/base/security/code_signature/test/unittest/
H A Denable_verity_test.cpp303 struct code_sign_enable_arg *arg, ByteBuffer &signature) in FillCommonArgs()
308 ret = ReadDataFromFile(filePath + "_inside_tree.sig", signature); in FillCommonArgs()
310 ret = ReadDataFromFile(filePath + "_no_tree.sig", signature); in FillCommonArgs()
322 arg->sig_size = signature.GetSize(); in FillCommonArgs()
323 arg->sig_ptr = reinterpret_cast<uintptr_t>(signature.GetBuffer()); in FillCommonArgs()
339 ByteBuffer signature; in EnableExpandedTamperFile() local
341 FillCommonArgs(filePath, true, &arg, signature); in EnableExpandedTamperFile()
382 ByteBuffer signature; in HWTEST_F() local
383 FillCommonArgs(filePath, false, &arg, signature); in HWTEST_F()
403 ByteBuffer signature; in HWTEST_F() local
302 FillCommonArgs(const std::string &filePath, bool isInsideTree, struct code_sign_enable_arg *arg, ByteBuffer &signature) FillCommonArgs() argument
434 ByteBuffer signature; HWTEST_F() local
457 ByteBuffer signature; HWTEST_F() local
478 ByteBuffer signature; HWTEST_F() local
506 ByteBuffer signature; HWTEST_F() local
551 ByteBuffer signature; HWTEST_F() local
584 ByteBuffer signature; HWTEST_F() local
615 ByteBuffer signature; HWTEST_F() local
652 ByteBuffer signature; HWTEST_F() local
[all...]
H A Dlocal_code_sign_utils_test.cpp64 ByteBuffer signature; in HWTEST_F() local
66 digest, signature); in HWTEST_F()
86 ByteBuffer signature; in HWTEST_F() local
88 digest, signature); in HWTEST_F()
/base/update/packaging_tools/
H A Dbuild_pkcs7.py88 signature = private_key.sign(
95 return signature
109 signature = private_key.sign(
116 return signature
129 def write_signed_package(unsigned_package, signature, signed_package):
131 :Write signature to signed package
133 signature_size = len(signature)
151 f_signed.write(signature)
161 signature = sign_digest(digest, private_key)
168 signatute_fd = os.open("signature", o
[all...]
H A Dcreate_signed_data.py29 :return: base64 code of the signature
37 signature = sign_digest(hash_sha256.digest(), private_key_file)
38 if signature == False:
41 return str(b64encode(signature).decode("ascii"))
55 :param sign_func: signature function, ex. sign_func_sha256
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/include/
H A Dopenssl_ecc_helper.h33 int32_t EcdsaSign(const struct HksBlob *key, int digest, const struct HksBlob *message, struct HksBlob *signature);
36 const struct HksBlob *key, int digest, const struct HksBlob *message, const struct HksBlob *signature);
47 int32_t SignVerifyWithDigestNone(const struct HksBlob *key, const struct HksBlob *message, struct HksBlob *signature,
/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/include/
H A Dhks_mbedtls_ecdsa.h35 const struct HksBlob *message, struct HksBlob *signature);
38 const struct HksBlob *message, const struct HksBlob *signature);
H A Dhks_crypto_ed25519.h42 const struct HksBlob *message, struct HksBlob *signature);
45 const struct HksBlob *message, const struct HksBlob *signature);
H A Dhks_mbedtls_dsa.h43 const struct HksBlob *message, struct HksBlob *signature);
46 const struct HksBlob *message, const struct HksBlob *signature);
/base/security/code_signature/interfaces/innerkits/local_code_sign/include/
H A Dlocal_code_sign_kit.h41 * @param signature signature from local code sign SA
44 static int32_t SignLocalCode(const std::string &filePath, ByteBuffer &signature);
46 * @brief sign local code with owner ID to the signature, so we can identify signature files using owner ID
47 * @param ownerID owner ID written to the signature
49 * @param signature signature from local code sign SA
52 static int32_t SignLocalCode(const std::string &ownerID, const std::string &filePath, ByteBuffer &signature);
/base/security/huks/test/unittest/huks_common_test/src/
H A Dhks_test_curve25519_func.cpp87 struct HksBlob signature = { TEST_CURVE_256, g_buffer }; in TestSignEd25519() local
88 ret = HksSignForDe(&alias, paramSet, &msg, &signature); in TestSignEd25519()
90 g_bufferSize = signature.size; in TestSignEd25519()
91 HKS_TEST_LOG_I("TestSignEd25519 signature size is %u", signature.size); in TestSignEd25519()
132 struct HksBlob signature = { g_bufferSize, g_buffer }; in TestVerifyEd25519() local
133 ret = HksVerifyForDe(&alias, paramSet, &msg, &signature); in TestVerifyEd25519()
310 struct HksBlob signature = { TEST_CURVE_256, g_buffer }; in TestEd25519SignTeeVerifyLocal() local
324 ret = HksSignForDe(&ed25519Alias, paramSetSign, &msg, &signature); in TestEd25519SignTeeVerifyLocal()
326 HKS_TEST_LOG_I("Test_Ed25519_Sign_TEE signature siz in TestEd25519SignTeeVerifyLocal()
372 struct HksBlob signature = { TEST_CURVE_256, g_buffer }; TestSignEd25519Wrong() local
432 struct HksBlob signature = { g_bufferSize, g_buffer }; TestVerifyEd25519Wrong() local
[all...]
/base/security/code_signature/services/local_code_sign/src/
H A Dlocal_code_sign_stub.cpp106 ByteBuffer signature; in SignLocalCodeInner() local
107 int32_t result = SignLocalCode(ownerID, filePath, signature); in SignLocalCodeInner()
115 if (!reply.WriteUint32(signature.GetSize())) { in SignLocalCodeInner()
118 if (!reply.WriteBuffer(signature.GetBuffer(), signature.GetSize())) { in SignLocalCodeInner()
/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/
H A Dhks_crypto_hal_api_openssl.cpp309 HksBlob signature = { .size = 0, .data = nullptr }; in HWTEST_F() local
312 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F()
315 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F()
318 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F()
320 signature = { .size = 1, .data = buff }; in HWTEST_F()
321 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F()
323 EXPECT_EQ(HksCryptoHalSign(&key, &spec, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F()
336 HksBlob signature = { .size = 0, .data = nullptr }; in HWTEST_F() local
339 EXPECT_EQ(HksCryptoHalVerify(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F()
342 EXPECT_EQ(HksCryptoHalVerify(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMEN in HWTEST_F()
369 HksBlob signature = { .size = 1, .data = buff }; HWTEST_F() local
392 HksBlob signature = { .size = 1, .data = buff }; HWTEST_F() local
416 HksBlob signature = { .size = 1, .data = buff }; HWTEST_F() local
436 HksBlob signature = { .size = 1, .data = buff }; HWTEST_F() local
453 HksBlob signature = { .size = 1, .data = buff }; HWTEST_F() local
475 HksBlob signature = { .size = 1, .data = buff }; HWTEST_F() local
579 HksBlob signature = { .size = 0, .data = nullptr }; HWTEST_F() local
[all...]
/base/security/device_auth/frameworks/deviceauth_lite/source/key_agreement/
H A Dsts_client.c172 static int32_t verify_response_data(void *handle, const struct uint8_buff *message, struct signature *signature) in verify_response_data() argument
177 check_ptr_return_val(signature, HC_INPUT_ERROR); in verify_response_data()
204 int32_t ret = verify(&key_alias, sts_client->peer_user_type, message, signature); in verify_response_data()
212 static int32_t generate_sts_request_sign(void *handle, struct signature *signature) in generate_sts_request_sign() argument
250 int32_t ret = sign(&key_alias, &sign_message, signature); in generate_sts_request_sign()
274 static int32_t init_signature(void *handle, struct signature *signature) in init_signature() argument
306 if (memcpy_s(signature in init_signature()
317 struct signature signature = { 0, {0} }; verify_data() local
[all...]
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/include/
H A Dhks_openssl_curve25519.h40 const struct HksBlob *message, struct HksBlob *signature);
43 const struct HksBlob *message, const struct HksBlob *signature);
H A Dhks_openssl_ecc.h44 const struct HksBlob *message, struct HksBlob *signature);
47 const struct HksBlob *message, const struct HksBlob *signature);
H A Dhks_openssl_dsa.h41 const struct HksBlob *message, struct HksBlob *signature);
44 const struct HksBlob *message, const struct HksBlob *signature);

Completed in 9 milliseconds

1234567