/base/security/crypto_framework/plugin/openssl_plugin/common/inc/ |
H A D | openssl_adapter.h | 304 int OpensslSm2CipherTextSize(const EC_KEY *key, const EVP_MD *digest, size_t msgLen, size_t *cipherTextSize); 306 int OpensslOsslSm2Encrypt(const EC_KEY *key, const EVP_MD *digest, const uint8_t *msg, 309 int OpensslOsslSm2Decrypt(const EC_KEY *key, const EVP_MD *digest, const uint8_t *cipherText, 313 int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out);
|
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/common/ |
H A D | mbedtls_ec_adapter.c | 340 LOG_AND_RETURN_IF_MBED_FAIL(ret, "Calculate message digest failed.\n"); in CalculateMessageDigest() 458 uint8_t digest[SHA256_HASH_LEN] = { 0 }; in EcHashToPoint() local 459 Blob digestBlob = { sizeof(digest), digest }; in EcHashToPoint() 468 LOG_AND_GOTO_CLEANUP_IF_FAIL(ret, "Compute message digest failed.\n"); in EcHashToPoint() 471 ret = mbedtls_mpi_read_binary(&scalarB, digest, SHA256_HASH_LEN); in EcHashToPoint() 472 LOG_AND_GOTO_CLEANUP_IF_FAIL(ret, "Read digest failed.\n"); in EcHashToPoint()
|
/base/security/certificate_manager/interfaces/innerkits/cert_manager_standard/main/include/ |
H A D | cm_type.h | 364 uint32_t digest; member
|
/base/security/huks/test/unittest/huks_common_test/src/ |
H A D | hks_modify_key_test_func.cpp | 124 genKeyParamSetParams->setDigest, genKeyParamSetParams->digest, in GenerateKeyTwo()
|
/base/security/huks/interfaces/inner_api/huks_lite/ |
H A D | hks_types.h | 273 uint32_t digest; member
|
/base/security/huks/interfaces/inner_api/huks_standard/main/include/ |
H A D | hks_type.h | 316 uint8_t digest; member
|
/base/update/updater/services/package/pkg_package/ |
H A D | pkg_upgradefile.h | 53 uint8_t digest[DIGEST_MAX_LEN];
member
|
/base/account/os_account/services/accountmgr/src/ |
H A D | account_file_watcher_manager.cpp | 191 ACCOUNT_LOGE("Get digest failed duo to memcpy_s failed"); in GetDigestDataFromHuks() 352 ErrCode AccountFileWatcherMgr::GetAccountInfoDigestFromFile(const std::string &path, uint8_t *digest, uint32_t size) in GetAccountInfoDigestFromFile() argument 369 if (memcpy_s(digest, size, digestTmp.data(), ALG_COMMON_SIZE) != EOK) { in GetAccountInfoDigestFromFile() 370 ACCOUNT_LOGE("Get digest failed duo to memcpy_s failed"); in GetAccountInfoDigestFromFile() 440 ACCOUNT_LOGE("cannot save digest info to file, code %{public}d.", result); in DeleteAccountInfoDigest()
|
/base/security/huks/frameworks/huks_standard/main/core/src/ |
H A D | hks_local_engine.c | 50 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_CHECK_GET_DIGEST_FAIL, "get param digest failed") in HksLocalHash() 54 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "get digest len failed, ret = %" LOG_PUBLIC "d", ret) in HksLocalHash() 74 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_CHECK_GET_DIGEST_FAIL, "get param digest failed") in HksLocalMac() 293 if (HksCheckNeedCache(usageSpec->algType, usageSpec->digest) == HKS_SUCCESS) { in GetSignVerifyMessage() 302 int32_t ret = HksCryptoHalHash(usageSpec->digest, srcData, message); in GetSignVerifyMessage()
|
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/ |
H A D | hks_hmac_mt.cpp | 298 uint32_t digest = ReadValueByTag(testCaseParams.params, HKS_TAG_DIGEST); in LocalHmacScenario() local 323 EXPECT_EQ(HmacHmac(&key, digest, message, &macMessage), testCaseParams.hmacResult); in LocalHmacScenario()
|
H A D | hks_ecc_sign_mt.cpp | 851 uint32_t digest = ReadValueByTag(testCaseParams.params, HKS_TAG_DIGEST); in RunTestCase() local 886 if (digest == HKS_DIGEST_NONE) { in RunTestCase() 889 EXPECT_EQ(EcdsaVerify(&pubKey, digest, &message, &signature), testCaseParams.verifyResult); in RunTestCase()
|
H A D | hks_ecc_verify_mt.cpp | 852 uint32_t digest = ReadValueByTag(testCaseParams.params, HKS_TAG_DIGEST); in RunTestCase() local 869 if (digest == HKS_DIGEST_NONE) { in RunTestCase() 872 EXPECT_EQ(EcdsaSign(&authId, digest, &message, &signature), testCaseParams.signResult); in RunTestCase()
|
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
H A D | hks_openssl_dsa.c | 338 const EVP_MD *opensslAlg = GetOpensslAlg(usageSpec->digest); in InitDSACtx() 339 if (usageSpec->digest == HKS_DIGEST_NONE) { in InitDSACtx()
|
/base/security/huks/services/huks_standard/huks_engine/main/device_cert_manager/src/ |
H A D | dcm_attest.c | 883 usageSpec.digest = HKS_DIGEST_SHA256;
in SignTbs() 889 usageSpec.digest = HKS_DIGEST_SM3;
in SignTbs() 956 if ((attetUsageSpec->digest != HKS_DIGEST_SHA256) && (attetUsageSpec->digest != HKS_DIGEST_SM3)) {
in InsertSignatureGroupClaim() 989 if (attetUsageSpec->digest == HKS_DIGEST_SHA256) {
in InsertEncryptionGroupClaim() 1139 struct HksAsn1Blob digest = { ASN_1_TAG_TYPE_OCT_STR, sizeof(uint32_t), (uint8_t *)&attetUsageSpec->digest };
in BuildAttestKeyClaims() local 1140 ret = DcmInsertClaim(out, &hksDigestOid, &digest, secLevel);
in BuildAttestKeyClaims() 1141 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "insert digest fail\n")
in BuildAttestKeyClaims()
|
/base/security/huks/services/huks_standard/huks_engine/main/core/src/ |
H A D | hks_keyblob_lite.c | 102 usageSpec->digest = HKS_DIGEST_NONE;
in BuildKeyBlobUsageSpec() 350 keyInfo->digest = paramSet->params[i].uint32Param;
in FillBaseInfo()
|
H A D | hks_sm_import_wrap_key.c | 407 usageSpec->digest = HKS_DIGEST_NONE; in BuildDecryptUsageSpecOfSmUnwrap()
|
H A D | hks_keyblob.c | 174 usageSpec->digest = HKS_DIGEST_NONE;
in BuildKeyBlobUsageSpec()
|
H A D | hks_core_service_key_generate.c | 350 usageSpec->digest = HKS_DIGEST_NONE; in BuildDecryptUsageSpecOfUnwrap()
|
/base/account/os_account/services/accountmgr/include/osaccount/ |
H A D | os_account_control_file_manager.h | 127 ErrCode GetAccountInfoDigestFromFile(const std::string &path, uint8_t *digest, uint32_t size);
|
/base/security/huks/frameworks/huks_standard/main/common/include/ |
H A D | hks_crypto_hal.h | 66 uint32_t digest; member
|
/base/update/packaging_tools/ |
H A D | create_hashdata.py | 123 return hash_algo.digest()
|
/base/security/huks/frameworks/huks_standard/main/crypto_engine/rkc/src/ |
H A D | hks_rkc_rw.c | 477 uint8_t digest[HKS_RKC_HASH_LEN] = { 0 };
in RkcFillKsfHash() local 478 struct HksBlob digestBlob = { HKS_RKC_HASH_LEN, digest };
in RkcFillKsfHash()
|
H A D | hks_rkc.c | 147 /* if digest is invalid, will use default digest */ in RkcDigestToHks() 226 usageSpec->digest = HKS_DIGEST_NONE; in InitMkCryptUsageSpec()
|
/base/security/certificate_manager/test/unittest/src/ |
H A D | cm_finish_test.cpp | 138 if (spec->digest != CM_DIGEST_NONE) { in TestSignVerify()
|
/base/security/crypto_framework/test/unittest/src/ |
H A D | openssl_adapter_mock.c | 1698 int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) in OpensslPkcs5Pbkdf2Hmac() 1703 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, digest, keylen, out); in OpensslPkcs5Pbkdf2Hmac() 1697 OpensslPkcs5Pbkdf2Hmac(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) OpensslPkcs5Pbkdf2Hmac() argument
|