/base/security/huks/test/unittest/huks_lite_test/liteos_m_adapter/ |
H A D | hks_generate_key_test.c | 102 g_testGenKeyParams[index].paramSetParams.setDigest, g_testGenKeyParams[index].paramSetParams.digest, in LITE_TEST_CASE()
|
H A D | hks_derive_test.c | 69 deriveParamSetParams->setDigest, deriveParamSetParams->digest, in DeriveKey()
|
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/sdk_test/src/ |
H A D | hks_generate_key_test.cpp | 98 g_testGenKeyParams[index].paramSetParams.setDigest, g_testGenKeyParams[index].paramSetParams.digest, in HWTEST_F()
|
H A D | hks_derive_test.cpp | 54 deriveParamSetParams->setDigest, deriveParamSetParams->digest, in DeriveKey()
|
H A D | hks_safe_compare_key_test.cpp | 93 g_testGenKeyParams[index].paramSetParams.setDigest, g_testGenKeyParams[index].paramSetParams.digest, in SafeTestGenerateKey()
|
/base/security/huks/test/unittest/huks_lite_test/liteos_a_adapter/ |
H A D | hks_generate_key_test.cpp | 100 g_testGenKeyParams[index].paramSetParams.setDigest, g_testGenKeyParams[index].paramSetParams.digest, in HWTEST_F()
|
H A D | hks_derive_test.cpp | 68 deriveParamSetParams->setDigest, deriveParamSetParams->digest, in DeriveKey()
|
/base/update/updater/services/include/package/ |
H A D | pkg_info_utils.h | 111 uint8_t digest[DIGEST_MAX_LEN]; member
|
H A D | pkg_manager.h | 122 const std::vector<uint8_t> &digest, const std::vector<uint8_t> &signature)>;
243 * @param digest digest value
244 * @param size digest value size
248 const std::string &version, const PkgBuffer &digest, VerifyCallback cb) = 0;
268 const std::string &version, const PkgBuffer &digest) = 0;
|
/base/update/updater/services/package/pkg_algorithm/ |
H A D | pkg_algo_sign.h | 53 int32_t VerifyDigest(const std::vector<uint8_t> &digest, const std::vector<uint8_t> &signature);
|
H A D | pkg_algorithm.h | 50 uint8_t digest[DIGEST_MAX_LEN] = {};
member
|
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
H A D | hks_openssl_rsa.c | 370 const EVP_MD *md = GetOpensslAlg(usageSpec->digest); in HksOpensslRsaCryptInit() 372 if (usageSpec->digest == HKS_DIGEST_SHA256 && usageSpec->mgfDigest == HKS_DIGEST_SHA1) { in HksOpensslRsaCryptInit() 510 const EVP_MD *opensslAlg = GetOpensslAlg(usageSpec->digest); in InitRsaCtx() 511 if (usageSpec->digest == HKS_DIGEST_NONE) { in InitRsaCtx()
|
/base/security/huks/services/huks_standard/huks_engine/main/core/src/ |
H A D | hks_core_service_three_stage.c | 64 uint32_t digest = usageSpec->digest; in CheckRsaCipherData() local 74 int32_t ret = HksGetDigestLen(digest, &digestLen); in CheckRsaCipherData() 106 uint32_t digest = usageSpec->digest; in CheckSm2CipherData() local 108 int32_t ret = HksGetDigestLen(digest, &digestLen); in CheckSm2CipherData() 633 HKS_LOG_E("append cipher get digest param failed!"); 1479 uint32_t digest = alg; // In signature or verify scenario, alg represents digest. See code {GetPurposeAndAlgorithm} local 1483 if ((HksCheckNeedCache(algParam->uint32Param, digest) 1506 uint32_t digest = alg; // In signature or verify scenario, alg represents digest. See code {GetPurposeAndAlgorithm} global() local 1542 uint32_t digest = alg; // In signature or verify scenario, alg represents digest. See code {GetPurposeAndAlgorithm} global() local [all...] |
/base/security/huks/test/unittest/huks_common_test/src/ |
H A D | hks_test_cipher_func.cpp | 49 encryptStructTest->cipherParms->setDigest, encryptStructTest->cipherParms->digest, in EncryptTest() 110 decryptStruct->cipherParms->decryptParamSetParams.digest, in DecryptCipherTest() 153 onlyDecryptStruct->cipherParms->setDigest, onlyDecryptStruct->cipherParms->digest, in Decrypt()
|
/base/startup/init/interfaces/innerkits/fs_manager/libfs_hvb/ |
H A D | fs_hvb.c | 78 static int FsHvbComputeSha256(char *digest, size_t size, struct hvb_cert_data *certs, uint64_t num_certs) in FsHvbComputeSha256() argument 103 ret = hash_calc_do_final(&ctx, NULL, 0, (uint8_t *)digest, size); in FsHvbComputeSha256() 145 BEGET_LOGE("error 0x%x, get digest val from cmdline", ret); in FsHvbCheckCertChainDigest() 169 BEGET_LOGE("error, cert digest not match with cmdline"); in FsHvbCheckCertChainDigest() 397 * <num_data_blocks><hash_start_block><algorithm><digest><salt> 460 // append <digest> in FsHvbConstructVerityTarget() 461 RETURN_ERR_IF_APPEND_OCTETS_ERR(&p, end, (char *)cert->hash_payload.digest, cert->digest_size); in FsHvbConstructVerityTarget()
|
/base/startup/hvb/libhvb/src/cert/ |
H A D | hvb_cert.c | 108 struct hvb_buf digest_buf = {cert->hash_payload.digest, cert->digest_size}; in hash_image_init_desc() 190 hvb_print("error, dc digest.\n"); in _hvb_cert_payload_parser() 193 payload->digest = buf.addr; in _hvb_cert_payload_parser() 216 hvb_print("error, illegal digest offset.\n"); in _hvb_cert_payload_parser_v2() 222 hvb_print("error, dc digest.\n"); in _hvb_cert_payload_parser_v2() 225 payload->digest = cur_header; in _hvb_cert_payload_parser_v2()
|
/base/update/updater/services/applypatch/ |
H A D | block_set.cpp | 210 uint8_t digest[SHA256_DIGEST_LENGTH];
in VerifySha256() local 211 SHA256(buffer.data(), size * H_BLOCK_SIZE, digest);
in VerifySha256() 212 std::string hexdigest = Utils::ConvertSha256Hex(digest, SHA256_DIGEST_LENGTH);
in VerifySha256()
|
/base/update/updater/services/package/pkg_verify/ |
H A D | pkcs7_signed_data.cpp | 241 PKG_LOGE("invalid digest block info."); in GetDigestFromContentInfo() 282 HwSigningSigntureInfo &signatureInfo, std::vector<uint8_t> &digest) in GetDigestFromSubBlocks() 289 HwSigningSigntureInfo &signatureInfo, std::vector<uint8_t> &digest) in GetDigest() 295 return helper_->GetDigestFromSubBlocks(digestBlock, signatureInfo, digest); in GetDigest() 281 GetDigestFromSubBlocks(std::vector<uint8_t> &digestBlock, HwSigningSigntureInfo &signatureInfo, std::vector<uint8_t> &digest) GetDigestFromSubBlocks() argument 288 GetDigest(std::vector<uint8_t> &digestBlock, HwSigningSigntureInfo &signatureInfo, std::vector<uint8_t> &digest) GetDigest() argument
|
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/kdf/src/ |
H A D | hkdf_openssl.c | 264 char *digest = SwitchMd(self); in OpensslHkdf() local 265 *p++ = OpensslOsslParamConstructUtf8String("digest", digest, 0); in OpensslHkdf()
|
/base/security/huks/frameworks/huks_standard/main/common/src/ |
H A D | hks_common_check.c | 134 int32_t HksGetDigestLen(uint32_t digest, uint32_t *digestLen) in HksGetDigestLen() argument 136 switch (digest) { in HksGetDigestLen()
|
H A D | hks_crypto_adapter.c | 60 usageSpec->digest = paramSet->params[i].uint32Param;
in HksFillUsageSpec() 229 if (usageSpec->algType == HKS_ALG_RSA && usageSpec->digest == HKS_DIGEST_NONE) {
in HksBuildCipherUsageSpec() 230 usageSpec->digest = HKS_DIGEST_SHA1;
in HksBuildCipherUsageSpec()
|
/base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/crypto_engine_test/src/ |
H A D | hks_openssl_aes_test.cpp | 80 .digest = HKS_DIGEST_NONE, in HWTEST_F() 253 .digest = HKS_DIGEST_NONE, in HWTEST_F()
|
/base/startup/init/test/unittest/fs_manager/ |
H A D | libfs_hvb_unittest.cpp | 65 cmdLine = "ohos.boot.hvb.digest=1 "; // HVB_CMDLINE_CERT_DIGEST in HWTEST_F() 73 cmdLine = "ohos.boot.hvb.digest=1234 "; in HWTEST_F() 82 cmdLine = "ohos.boot.hvb.digest=12 "; in HWTEST_F() 169 cert.hash_payload.digest = (uint8_t *)"5"; in HWTEST_F()
|
/base/web/webview/ohos_interface/ohos_glue/scripts/ |
H A D | make_file_base.py | 152 return base64.b64encode(hashlib.md5(func_digest.encode()).digest(), altchars=b'$_').decode().rstrip('=')
|
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/ |
H A D | hks_ecc_key_mt.cpp | 457 uint32_t digest = ReadValueByTag(testCaseParams.params, HKS_TAG_DIGEST); in RunTestCase() local 493 EXPECT_EQ(EcdsaSign(&priKey, digest, &message, &signature), testCaseParams.signResult); in RunTestCase() 494 EXPECT_EQ(EcdsaVerify(&pubKey, digest, &message, &signature), testCaseParams.verifyResult); in RunTestCase()
|