Home
last modified time | relevance | path

Searched refs:digest (Results 126 - 150 of 152) sorted by relevance

1234567

/base/security/crypto_framework/plugin/openssl_plugin/common/inc/
H A Dopenssl_adapter.h304 int OpensslSm2CipherTextSize(const EC_KEY *key, const EVP_MD *digest, size_t msgLen, size_t *cipherTextSize);
306 int OpensslOsslSm2Encrypt(const EC_KEY *key, const EVP_MD *digest, const uint8_t *msg,
309 int OpensslOsslSm2Decrypt(const EC_KEY *key, const EVP_MD *digest, const uint8_t *cipherText,
313 int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out);
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/common/
H A Dmbedtls_ec_adapter.c340 LOG_AND_RETURN_IF_MBED_FAIL(ret, "Calculate message digest failed.\n"); in CalculateMessageDigest()
458 uint8_t digest[SHA256_HASH_LEN] = { 0 }; in EcHashToPoint() local
459 Blob digestBlob = { sizeof(digest), digest }; in EcHashToPoint()
468 LOG_AND_GOTO_CLEANUP_IF_FAIL(ret, "Compute message digest failed.\n"); in EcHashToPoint()
471 ret = mbedtls_mpi_read_binary(&scalarB, digest, SHA256_HASH_LEN); in EcHashToPoint()
472 LOG_AND_GOTO_CLEANUP_IF_FAIL(ret, "Read digest failed.\n"); in EcHashToPoint()
/base/security/certificate_manager/interfaces/innerkits/cert_manager_standard/main/include/
H A Dcm_type.h364 uint32_t digest; member
/base/security/huks/test/unittest/huks_common_test/src/
H A Dhks_modify_key_test_func.cpp124 genKeyParamSetParams->setDigest, genKeyParamSetParams->digest, in GenerateKeyTwo()
/base/security/huks/interfaces/inner_api/huks_lite/
H A Dhks_types.h273 uint32_t digest; member
/base/security/huks/interfaces/inner_api/huks_standard/main/include/
H A Dhks_type.h316 uint8_t digest; member
/base/update/updater/services/package/pkg_package/
H A Dpkg_upgradefile.h53 uint8_t digest[DIGEST_MAX_LEN]; member
/base/account/os_account/services/accountmgr/src/
H A Daccount_file_watcher_manager.cpp191 ACCOUNT_LOGE("Get digest failed duo to memcpy_s failed"); in GetDigestDataFromHuks()
352 ErrCode AccountFileWatcherMgr::GetAccountInfoDigestFromFile(const std::string &path, uint8_t *digest, uint32_t size) in GetAccountInfoDigestFromFile() argument
369 if (memcpy_s(digest, size, digestTmp.data(), ALG_COMMON_SIZE) != EOK) { in GetAccountInfoDigestFromFile()
370 ACCOUNT_LOGE("Get digest failed duo to memcpy_s failed"); in GetAccountInfoDigestFromFile()
440 ACCOUNT_LOGE("cannot save digest info to file, code %{public}d.", result); in DeleteAccountInfoDigest()
/base/security/huks/frameworks/huks_standard/main/core/src/
H A Dhks_local_engine.c50 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_CHECK_GET_DIGEST_FAIL, "get param digest failed") in HksLocalHash()
54 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "get digest len failed, ret = %" LOG_PUBLIC "d", ret) in HksLocalHash()
74 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_CHECK_GET_DIGEST_FAIL, "get param digest failed") in HksLocalMac()
293 if (HksCheckNeedCache(usageSpec->algType, usageSpec->digest) == HKS_SUCCESS) { in GetSignVerifyMessage()
302 int32_t ret = HksCryptoHalHash(usageSpec->digest, srcData, message); in GetSignVerifyMessage()
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/
H A Dhks_hmac_mt.cpp298 uint32_t digest = ReadValueByTag(testCaseParams.params, HKS_TAG_DIGEST); in LocalHmacScenario() local
323 EXPECT_EQ(HmacHmac(&key, digest, message, &macMessage), testCaseParams.hmacResult); in LocalHmacScenario()
H A Dhks_ecc_sign_mt.cpp851 uint32_t digest = ReadValueByTag(testCaseParams.params, HKS_TAG_DIGEST); in RunTestCase() local
886 if (digest == HKS_DIGEST_NONE) { in RunTestCase()
889 EXPECT_EQ(EcdsaVerify(&pubKey, digest, &message, &signature), testCaseParams.verifyResult); in RunTestCase()
H A Dhks_ecc_verify_mt.cpp852 uint32_t digest = ReadValueByTag(testCaseParams.params, HKS_TAG_DIGEST); in RunTestCase() local
869 if (digest == HKS_DIGEST_NONE) { in RunTestCase()
872 EXPECT_EQ(EcdsaSign(&authId, digest, &message, &signature), testCaseParams.signResult); in RunTestCase()
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/
H A Dhks_openssl_dsa.c338 const EVP_MD *opensslAlg = GetOpensslAlg(usageSpec->digest); in InitDSACtx()
339 if (usageSpec->digest == HKS_DIGEST_NONE) { in InitDSACtx()
/base/security/huks/services/huks_standard/huks_engine/main/device_cert_manager/src/
H A Ddcm_attest.c883 usageSpec.digest = HKS_DIGEST_SHA256; in SignTbs()
889 usageSpec.digest = HKS_DIGEST_SM3; in SignTbs()
956 if ((attetUsageSpec->digest != HKS_DIGEST_SHA256) && (attetUsageSpec->digest != HKS_DIGEST_SM3)) { in InsertSignatureGroupClaim()
989 if (attetUsageSpec->digest == HKS_DIGEST_SHA256) { in InsertEncryptionGroupClaim()
1139 struct HksAsn1Blob digest = { ASN_1_TAG_TYPE_OCT_STR, sizeof(uint32_t), (uint8_t *)&attetUsageSpec->digest }; in BuildAttestKeyClaims() local
1140 ret = DcmInsertClaim(out, &hksDigestOid, &digest, secLevel); in BuildAttestKeyClaims()
1141 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "insert digest fail\n") in BuildAttestKeyClaims()
/base/security/huks/services/huks_standard/huks_engine/main/core/src/
H A Dhks_keyblob_lite.c102 usageSpec->digest = HKS_DIGEST_NONE; in BuildKeyBlobUsageSpec()
350 keyInfo->digest = paramSet->params[i].uint32Param; in FillBaseInfo()
H A Dhks_sm_import_wrap_key.c407 usageSpec->digest = HKS_DIGEST_NONE; in BuildDecryptUsageSpecOfSmUnwrap()
H A Dhks_keyblob.c174 usageSpec->digest = HKS_DIGEST_NONE; in BuildKeyBlobUsageSpec()
H A Dhks_core_service_key_generate.c350 usageSpec->digest = HKS_DIGEST_NONE; in BuildDecryptUsageSpecOfUnwrap()
/base/account/os_account/services/accountmgr/include/osaccount/
H A Dos_account_control_file_manager.h127 ErrCode GetAccountInfoDigestFromFile(const std::string &path, uint8_t *digest, uint32_t size);
/base/security/huks/frameworks/huks_standard/main/common/include/
H A Dhks_crypto_hal.h66 uint32_t digest; member
/base/update/packaging_tools/
H A Dcreate_hashdata.py123 return hash_algo.digest()
/base/security/huks/frameworks/huks_standard/main/crypto_engine/rkc/src/
H A Dhks_rkc_rw.c477 uint8_t digest[HKS_RKC_HASH_LEN] = { 0 }; in RkcFillKsfHash() local
478 struct HksBlob digestBlob = { HKS_RKC_HASH_LEN, digest }; in RkcFillKsfHash()
H A Dhks_rkc.c147 /* if digest is invalid, will use default digest */ in RkcDigestToHks()
226 usageSpec->digest = HKS_DIGEST_NONE; in InitMkCryptUsageSpec()
/base/security/certificate_manager/test/unittest/src/
H A Dcm_finish_test.cpp138 if (spec->digest != CM_DIGEST_NONE) { in TestSignVerify()
/base/security/crypto_framework/test/unittest/src/
H A Dopenssl_adapter_mock.c1698 int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) in OpensslPkcs5Pbkdf2Hmac()
1703 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, digest, keylen, out); in OpensslPkcs5Pbkdf2Hmac()
1697 OpensslPkcs5Pbkdf2Hmac(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) OpensslPkcs5Pbkdf2Hmac() argument

Completed in 35 milliseconds

1234567