/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/ |
H A D | hks_mbedtls_ecdsa.c | 43 const struct HksBlob *message, struct HksBlob *signature) in HksMbedtlsEcdsaSign() 77 size_t keyLen = (size_t)(signature->size); in HksMbedtlsEcdsaSign() 79 signature->data, keyLen, &keyLen, mbedtls_ctr_drbg_random, &ctrDrbg); in HksMbedtlsEcdsaSign() 80 signature->size = (uint32_t)keyLen; in HksMbedtlsEcdsaSign() 81 if (ret != HKS_MBEDTLS_SUCCESS || keyLen != (size_t)(signature->size)) { in HksMbedtlsEcdsaSign() 83 (void)memset_s(signature->data, signature->size, 0, signature->size); in HksMbedtlsEcdsaSign() 96 const struct HksBlob *message, const struct HksBlob *signature) in HksMbedtlsEcdsaVerify() 121 message->data, message->size, signature in HksMbedtlsEcdsaVerify() 42 HksMbedtlsEcdsaSign(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, const struct HksBlob *message, struct HksBlob *signature) HksMbedtlsEcdsaSign() argument 95 HksMbedtlsEcdsaVerify(const struct HksBlob *key, const struct HksUsageSpec *usageSpec, const struct HksBlob *message, const struct HksBlob *signature) HksMbedtlsEcdsaVerify() argument [all...] |
/base/update/updater/services/package/pkg_verify/ |
H A D | pkg_verify_util.cpp | 35 int32_t PkgVerifyUtil::VerifySourceDigest(std::vector<uint8_t> &signature, std::vector<uint8_t> &sourceDigest, in VerifySourceDigest() argument 42 int32_t ret = pkcs7.ReadSig(signature.data(), signature.size(), sigs); in VerifySourceDigest() 62 std::vector<uint8_t> signature; in VerifyAccPackageSign() local 64 if (GetSignature(pkgStream, signatureSize, signature, commentTotalLenAll) != PKG_SUCCESS) { in VerifyAccPackageSign() 65 PKG_LOGE("get package signature fail!"); in VerifyAccPackageSign() 75 return VerifySourceDigest(signature, sourceDigest, keyPath); in VerifyAccPackageSign() 103 std::vector<uint8_t> signature; in VerifyPackageSign() local 105 if (GetSignature(pkgStream, signatureSize, signature, commentTotalLenAll) != PKG_SUCCESS) { in VerifyPackageSign() 106 PKG_LOGE("get package signature fai in VerifyPackageSign() 129 GetSignature(const PkgStreamPtr pkgStream, size_t &signatureSize, std::vector<uint8_t> &signature, uint16_t &commentTotalLenAll) const GetSignature() argument 179 Pkcs7verify(std::vector<uint8_t> &signature, std::vector<uint8_t> &hash) const Pkcs7verify() argument [all...] |
H A D | pkg_verify_util.h | 32 int32_t VerifySourceDigest(std::vector<uint8_t> &signature, std::vector<uint8_t> &sourceDigest, 36 std::vector<uint8_t> &signature, uint16_t &commentTotalLenAll) const; 46 int32_t Pkcs7verify(std::vector<uint8_t> &signature, std::vector<uint8_t> &hash) const;
|
/base/security/code_signature/interfaces/innerkits/local_code_sign/src/ |
H A D | local_code_sign_kit.cpp | 28 int32_t LocalCodeSignKit::SignLocalCode(const std::string &filePath, ByteBuffer &signature)
in SignLocalCode() argument 30 return LocalCodeSignClient::GetInstance().SignLocalCode("", filePath, signature);
in SignLocalCode() 33 int32_t LocalCodeSignKit::SignLocalCode(const std::string &ownerID, const std::string &filePath, ByteBuffer &signature)
in SignLocalCode() argument 35 return LocalCodeSignClient::GetInstance().SignLocalCode(ownerID, filePath, signature);
in SignLocalCode()
|
/base/security/code_signature/interfaces/innerkits/jit_code_sign/src/ |
H A D | jit_code_signer_hybrid.cpp | 63 uint32_t signature = ctx_.Update(insn); in SignInstruction() local 64 signTable_.push_back(signature); in SignInstruction() 90 uint32_t signature = ctx_.SignSingle(insn, curIndex); in PatchInstruction() local 91 signTable_[curIndex] = signature; in PatchInstruction() 109 uint32_t signature = verifyCtx.Update(*insnPtr); in ValidateSubCode() local 110 if (signature != signTable_[index]) { in ValidateSubCode() 113 "signature(%{public}x) != wanted(%{public}x)", in ValidateSubCode() 114 *(insnPtr), index * INSTRUCTION_SIZE, signature, signTable_[index]); in ValidateSubCode() 148 uint32_t signature = verifyCtx.SignSingle(insn, index); in ValidateCodeCopy() local 149 if (signature ! in ValidateCodeCopy() [all...] |
H A D | pac_sign_ctx.cpp | 145 uint32_t signature = SignWithContext(value); in Update() local 146 SetContext(signature); in Update() 148 LOG_INFO("After update context = %{public}lx, signature = %{public}x", in Update() 149 context_, signature); in Update() 151 return signature; in Update() 157 uint32_t signature = PACGA(value, paddingContext); in SignSingle() local 159 LOG_INFO("Get signature = %{public}x", signature); in SignSingle() 161 return signature; in SignSingle()
|
H A D | jit_code_signer_single.cpp | 66 uint32_t signature = ctx_.SignSingle(insn, curIndex); in PatchInstruction() local 67 signTable_[curIndex] = signature; in PatchInstruction() 84 uint32_t signature = verifyCtx.SignSingle(insn, index); in ValidateCodeCopy() local 85 if (signature != signTable_[index]) { in ValidateCodeCopy() 88 "%{public}x, signature(%{public}x) != wanted(%{public}x)", in ValidateCodeCopy() 89 insn, index * INSTRUCTION_SIZE, signature, signTable_[index]); in ValidateCodeCopy()
|
/base/security/device_security_level/test/dslm_unit_test/cmocker/ |
H A D | c_mocker.h | 67 #define PARAMETER(index, signature, dummy) \ 68 GMOCK_PP_COMMA_IF(index) GMOCK_INTERNAL_ARG_O(index, GMOCK_PP_REMOVE_PARENS(signature)) 77 #define IMPLEMENT_FUNCTION_INTERNAL(cls, method, count, signature, invoker) \ 79 testing::internal::Function<GMOCK_PP_REMOVE_PARENS(signature)>::Result method( \ 80 GMOCK_PP_REPEAT(GMOCK_INTERNAL_PARAMETER, signature, count)) \ 93 return mock->method(GMOCK_PP_REPEAT(GMOCK_INTERNAL_FORWARD_ARG, signature, count)); \ 97 return stub(GMOCK_PP_REPEAT(GMOCK_INTERNAL_FORWARD_ARG, signature, count)); \ 101 return testing::internal::Function<GMOCK_PP_REMOVE_PARENS(signature)>::Result(); \
|
/base/security/device_security_level/oem_property/common/ |
H A D | dslm_credential_utils.c | 45 #define JSON_KEY_SIGNATURE "signature" 60 DataBuffer signature; member 66 DataBuffer signature; member 74 const char *signature; member 180 int32_t ret = EcdsaVerify(&root->publicKey, &root->signature, &root->publicKey, root->algorithm); in VerifyCredentialCb() 188 ret = EcdsaVerify(&intermediate->publicKey, &intermediate->signature, &root->publicKey, intermediate->algorithm); in VerifyCredentialCb() 196 ret = EcdsaVerify(&last->publicKey, &last->signature, &intermediate->publicKey, last->algorithm); in VerifyCredentialCb() 204 ret = EcdsaVerify(&payload->payload, &payload->signature, &last->publicKey, TYPE_ECDSA_SHA_384); in VerifyCredentialCb() 206 ret = EcdsaVerify(&payload->payload, &payload->signature, &last->publicKey, TYPE_ECDSA_SHA_256); in VerifyCredentialCb() 266 credCb->signature in SplitCredentialString() 329 DataBuffer *signature = &attestation->signature; ParsePayloadAttestation() local [all...] |
/base/security/code_signature/test/unittest/ |
H A D | enable_verity_test.cpp | 303 struct code_sign_enable_arg *arg, ByteBuffer &signature)
in FillCommonArgs() 308 ret = ReadDataFromFile(filePath + "_inside_tree.sig", signature);
in FillCommonArgs() 310 ret = ReadDataFromFile(filePath + "_no_tree.sig", signature);
in FillCommonArgs() 322 arg->sig_size = signature.GetSize();
in FillCommonArgs() 323 arg->sig_ptr = reinterpret_cast<uintptr_t>(signature.GetBuffer());
in FillCommonArgs() 339 ByteBuffer signature;
in EnableExpandedTamperFile() local 341 FillCommonArgs(filePath, true, &arg, signature);
in EnableExpandedTamperFile() 382 ByteBuffer signature;
in HWTEST_F() local 383 FillCommonArgs(filePath, false, &arg, signature);
in HWTEST_F() 403 ByteBuffer signature;
in HWTEST_F() local 302 FillCommonArgs(const std::string &filePath, bool isInsideTree, struct code_sign_enable_arg *arg, ByteBuffer &signature) FillCommonArgs() argument 434 ByteBuffer signature; HWTEST_F() local 457 ByteBuffer signature; HWTEST_F() local 478 ByteBuffer signature; HWTEST_F() local 506 ByteBuffer signature; HWTEST_F() local 551 ByteBuffer signature; HWTEST_F() local 584 ByteBuffer signature; HWTEST_F() local 615 ByteBuffer signature; HWTEST_F() local 652 ByteBuffer signature; HWTEST_F() local [all...] |
H A D | local_code_sign_utils_test.cpp | 64 ByteBuffer signature;
in HWTEST_F() local 66 digest, signature);
in HWTEST_F() 86 ByteBuffer signature;
in HWTEST_F() local 88 digest, signature);
in HWTEST_F()
|
/base/update/packaging_tools/ |
H A D | build_pkcs7.py | 88 signature = private_key.sign( 95 return signature 109 signature = private_key.sign( 116 return signature 129 def write_signed_package(unsigned_package, signature, signed_package): 131 :Write signature to signed package 133 signature_size = len(signature) 151 f_signed.write(signature) 161 signature = sign_digest(digest, private_key) 168 signatute_fd = os.open("signature", o [all...] |
H A D | create_signed_data.py | 29 :return: base64 code of the signature 37 signature = sign_digest(hash_sha256.digest(), private_key_file) 38 if signature == False: 41 return str(b64encode(signature).decode("ascii")) 55 :param sign_func: signature function, ex. sign_func_sha256
|
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/include/ |
H A D | openssl_ecc_helper.h | 33 int32_t EcdsaSign(const struct HksBlob *key, int digest, const struct HksBlob *message, struct HksBlob *signature); 36 const struct HksBlob *key, int digest, const struct HksBlob *message, const struct HksBlob *signature); 47 int32_t SignVerifyWithDigestNone(const struct HksBlob *key, const struct HksBlob *message, struct HksBlob *signature,
|
/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/include/ |
H A D | hks_mbedtls_ecdsa.h | 35 const struct HksBlob *message, struct HksBlob *signature);
38 const struct HksBlob *message, const struct HksBlob *signature);
|
H A D | hks_crypto_ed25519.h | 42 const struct HksBlob *message, struct HksBlob *signature);
45 const struct HksBlob *message, const struct HksBlob *signature);
|
H A D | hks_mbedtls_dsa.h | 43 const struct HksBlob *message, struct HksBlob *signature); 46 const struct HksBlob *message, const struct HksBlob *signature);
|
/base/security/code_signature/interfaces/innerkits/local_code_sign/include/ |
H A D | local_code_sign_kit.h | 41 * @param signature signature from local code sign SA
44 static int32_t SignLocalCode(const std::string &filePath, ByteBuffer &signature);
46 * @brief sign local code with owner ID to the signature, so we can identify signature files using owner ID
47 * @param ownerID owner ID written to the signature
49 * @param signature signature from local code sign SA
52 static int32_t SignLocalCode(const std::string &ownerID, const std::string &filePath, ByteBuffer &signature);
|
/base/security/huks/test/unittest/huks_common_test/src/ |
H A D | hks_test_curve25519_func.cpp | 87 struct HksBlob signature = { TEST_CURVE_256, g_buffer }; in TestSignEd25519() local 88 ret = HksSignForDe(&alias, paramSet, &msg, &signature); in TestSignEd25519() 90 g_bufferSize = signature.size; in TestSignEd25519() 91 HKS_TEST_LOG_I("TestSignEd25519 signature size is %u", signature.size); in TestSignEd25519() 132 struct HksBlob signature = { g_bufferSize, g_buffer }; in TestVerifyEd25519() local 133 ret = HksVerifyForDe(&alias, paramSet, &msg, &signature); in TestVerifyEd25519() 310 struct HksBlob signature = { TEST_CURVE_256, g_buffer }; in TestEd25519SignTeeVerifyLocal() local 324 ret = HksSignForDe(&ed25519Alias, paramSetSign, &msg, &signature); in TestEd25519SignTeeVerifyLocal() 326 HKS_TEST_LOG_I("Test_Ed25519_Sign_TEE signature siz in TestEd25519SignTeeVerifyLocal() 372 struct HksBlob signature = { TEST_CURVE_256, g_buffer }; TestSignEd25519Wrong() local 432 struct HksBlob signature = { g_bufferSize, g_buffer }; TestVerifyEd25519Wrong() local [all...] |
/base/security/code_signature/services/local_code_sign/src/ |
H A D | local_code_sign_stub.cpp | 106 ByteBuffer signature;
in SignLocalCodeInner() local 107 int32_t result = SignLocalCode(ownerID, filePath, signature);
in SignLocalCodeInner() 115 if (!reply.WriteUint32(signature.GetSize())) {
in SignLocalCodeInner() 118 if (!reply.WriteBuffer(signature.GetBuffer(), signature.GetSize())) {
in SignLocalCodeInner()
|
/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/ |
H A D | hks_crypto_hal_api_openssl.cpp | 309 HksBlob signature = { .size = 0, .data = nullptr }; in HWTEST_F() local 312 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F() 315 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F() 318 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F() 320 signature = { .size = 1, .data = buff }; in HWTEST_F() 321 EXPECT_EQ(HksCryptoHalSign(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F() 323 EXPECT_EQ(HksCryptoHalSign(&key, &spec, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F() 336 HksBlob signature = { .size = 0, .data = nullptr }; in HWTEST_F() local 339 EXPECT_EQ(HksCryptoHalVerify(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMENT); in HWTEST_F() 342 EXPECT_EQ(HksCryptoHalVerify(&key, nullptr, &message, &signature), HKS_ERROR_INVALID_ARGUMEN in HWTEST_F() 369 HksBlob signature = { .size = 1, .data = buff }; HWTEST_F() local 392 HksBlob signature = { .size = 1, .data = buff }; HWTEST_F() local 416 HksBlob signature = { .size = 1, .data = buff }; HWTEST_F() local 436 HksBlob signature = { .size = 1, .data = buff }; HWTEST_F() local 453 HksBlob signature = { .size = 1, .data = buff }; HWTEST_F() local 475 HksBlob signature = { .size = 1, .data = buff }; HWTEST_F() local 579 HksBlob signature = { .size = 0, .data = nullptr }; HWTEST_F() local [all...] |
/base/security/device_auth/frameworks/deviceauth_lite/source/key_agreement/ |
H A D | sts_client.c | 172 static int32_t verify_response_data(void *handle, const struct uint8_buff *message, struct signature *signature) in verify_response_data() argument 177 check_ptr_return_val(signature, HC_INPUT_ERROR); in verify_response_data() 204 int32_t ret = verify(&key_alias, sts_client->peer_user_type, message, signature); in verify_response_data() 212 static int32_t generate_sts_request_sign(void *handle, struct signature *signature) in generate_sts_request_sign() argument 250 int32_t ret = sign(&key_alias, &sign_message, signature); in generate_sts_request_sign() 274 static int32_t init_signature(void *handle, struct signature *signature) in init_signature() argument 306 if (memcpy_s(signature in init_signature() 317 struct signature signature = { 0, {0} }; verify_data() local [all...] |
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/include/ |
H A D | hks_openssl_curve25519.h | 40 const struct HksBlob *message, struct HksBlob *signature);
43 const struct HksBlob *message, const struct HksBlob *signature);
|
H A D | hks_openssl_ecc.h | 44 const struct HksBlob *message, struct HksBlob *signature);
47 const struct HksBlob *message, const struct HksBlob *signature);
|
H A D | hks_openssl_dsa.h | 41 const struct HksBlob *message, struct HksBlob *signature); 44 const struct HksBlob *message, const struct HksBlob *signature);
|