/base/security/code_signature/utils/src/ |
H A D | fsverity_utils_helper.cpp | 56 bool FsverityUtilsHelper::FormatDigest(libfsverity_digest *digest, uint8_t *buffer)
in FormatDigest() argument 63 ret->digest_algorithm = cpu_to_le16(digest->digest_algorithm);
in FormatDigest() 64 ret->digest_size = cpu_to_le16(digest->digest_size);
in FormatDigest() 65 if (memcpy_s(ret->digest, MAX_DIGEST_SIZE, digest->digest, digest->digest_size) != EOK) {
in FormatDigest() 71 bool FsverityUtilsHelper::ComputeDigest(const char *path, struct libfsverity_digest **digest)
in ComputeDigest() argument 86 // compute digest by fsverity-utils and use callback to read data in file
in ComputeDigest() 87 if (libfsverity_compute_digest(&reader, FileReader::ReadFileCallback, &tree_params, digest)) {
in ComputeDigest() 97 struct libfsverity_digest *digest = nullptr; GenerateFormattedDigest() local [all...] |
/base/security/code_signature/test/unittest/ |
H A D | local_code_sign_utils_test.cpp | 56 ByteBuffer digest;
in HWTEST_F() local 61 bRet = FsverityUtilsHelper::GetInstance().GenerateFormattedDigest(realPath.c_str(), digest);
in HWTEST_F() 66 digest, signature);
in HWTEST_F() 78 ByteBuffer digest;
in HWTEST_F() local 83 bRet = FsverityUtilsHelper::GetInstance().GenerateFormattedDigest(realPath.c_str(), digest);
in HWTEST_F() 88 digest, signature);
in HWTEST_F() 94 * @tc.desc: Generate formatted digest failed with wrong path
100 ByteBuffer digest;
in HWTEST_F() local 102 bool bRet = FsverityUtilsHelper::GetInstance().GenerateFormattedDigest(realPath.c_str(), digest);
in HWTEST_F()
|
H A D | local_code_sign_utils_mock_test.cpp | 61 ByteBuffer digest;
in HWTEST_F() local 66 bRet = FsverityUtilsHelper::GetInstance().GenerateFormattedDigest(realPath.c_str(), digest);
in HWTEST_F() 72 digest, signature);
in HWTEST_F() 77 digest, signature);
in HWTEST_F() 82 digest, signature);
in HWTEST_F() 87 digest, signature);
in HWTEST_F() 93 * @tc.desc: Generate formatted digest failed with wrong path
|
/base/update/updateservice/services/core/ability/utils/src/ |
H A D | sha256_utils.cpp | 62 bool Sha256Utils::GetDigestFromFile(const char *fileName, unsigned char digest[]) in GetDigestFromFile() argument 92 mbedtls_sha256_finish(&context, digest); in GetDigestFromFile() 100 unsigned char digest[SHA256_LENGTH] = {0}; in GetFileSha256Str() local 101 GetDigestFromFile(fileName.c_str(), digest); in GetFileSha256Str() 102 return TransDigestToSha256Result(sha256Result, len, digest); in GetFileSha256Str() 107 unsigned char digest[SHA256_LENGTH] = {0}; in Sha256Calculate() local 129 int finishRet = mbedtls_sha256_finish(&ctx, digest); in Sha256Calculate() 136 return TransDigestToSha256Result(componentId, componentIdLen, digest); in Sha256Calculate() 139 bool Sha256Utils::TransDigestToSha256Result(char *sha256Result, uint32_t componentIdLen, const unsigned char *digest) in TransDigestToSha256Result() argument 147 int result = sprintf_s(sha256Result + deviation, (componentIdLen - deviation), "%02x", digest[ in TransDigestToSha256Result() [all...] |
/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/ |
H A D | hks_crypto_hal_rsa_oaep_decrypt.cpp | 48 .digest = HKS_DIGEST_SHA1, 64 .digest = HKS_DIGEST_SHA1, 81 .digest = HKS_DIGEST_SHA1, 99 .digest = HKS_DIGEST_SHA1, 119 .digest = HKS_DIGEST_SHA1, 141 .digest = HKS_DIGEST_SHA1, 167 .digest = HKS_DIGEST_SHA224, 183 .digest = HKS_DIGEST_SHA224, 200 .digest = HKS_DIGEST_SHA224, 217 .digest [all...] |
H A D | hks_crypto_hal_rsa_oaep_encrypt.cpp | 50 .digest = HKS_DIGEST_SHA1, 66 .digest = HKS_DIGEST_SHA1, 82 .digest = HKS_DIGEST_SHA1, 98 .digest = HKS_DIGEST_SHA1, 114 .digest = HKS_DIGEST_SHA1, 130 .digest = HKS_DIGEST_SHA1, 146 .digest = HKS_DIGEST_SHA224, 162 .digest = HKS_DIGEST_SHA224, 178 .digest = HKS_DIGEST_SHA224, 194 .digest [all...] |
H A D | hks_crypto_hal_ecdsa_sign.cpp | 57 .digest = HKS_DIGEST_NONE, 77 .digest = HKS_DIGEST_NONE, 96 .digest = HKS_DIGEST_NONE, 115 .digest = HKS_DIGEST_NONE, 135 .digest = HKS_DIGEST_SHA1, 154 .digest = HKS_DIGEST_SHA1, 173 .digest = HKS_DIGEST_SHA1, 192 .digest = HKS_DIGEST_SHA1, 211 .digest = HKS_DIGEST_SHA224, 230 .digest [all...] |
H A D | hks_crypto_hal_rsa_cipher.cpp | 53 .digest = HKS_DIGEST_NONE, 80 .digest = HKS_DIGEST_NONE, 108 .digest = HKS_DIGEST_NONE, 137 .digest = HKS_DIGEST_NONE, 168 .digest = HKS_DIGEST_NONE, 201 .digest = HKS_DIGEST_NONE, 238 .digest = HKS_DIGEST_NONE, 259 .digest = HKS_DIGEST_NONE, 280 .digest = HKS_DIGEST_NONE, 302 .digest [all...] |
H A D | hks_crypto_hal_hmac_hmac.cpp | 34 HksKeyDigest digest = HksKeyDigest::HKS_DIGEST_NONE; member 51 .digest = HKS_DIGEST_SHA1, 63 .digest = HKS_DIGEST_SHA224, 76 .digest = HKS_DIGEST_SHA256, 88 .digest = HKS_DIGEST_SHA384, 100 .digest = HKS_DIGEST_SHA512, 138 EXPECT_EQ(HksCryptoHalHmacInit(&key, testCaseParams.digest, &context), testCaseParams.hmacResult); in RunTestCase() 142 EXPECT_EQ(HksCryptoHalHmac(&key, testCaseParams.digest, &message, &signature), testCaseParams.hmacResult); in RunTestCase()
|
H A D | hks_crypto_hal_rsa_sign.cpp | 56 .digest = HKS_DIGEST_MD5, 76 .digest = HKS_DIGEST_MD5, 96 .digest = HKS_DIGEST_MD5, 116 .digest = HKS_DIGEST_MD5, 136 .digest = HKS_DIGEST_MD5, 156 .digest = HKS_DIGEST_MD5, 176 .digest = HKS_DIGEST_NONE, 196 .digest = HKS_DIGEST_NONE, 216 .digest = HKS_DIGEST_NONE, 237 .digest [all...] |
H A D | hks_crypto_hal_aes_encrypt.cpp | 57 .digest = HKS_DIGEST_NONE, 72 .digest = HKS_DIGEST_NONE, 87 .digest = HKS_DIGEST_NONE, 103 .digest = HKS_DIGEST_NONE, 118 .digest = HKS_DIGEST_NONE, 138 .digest = HKS_DIGEST_NONE, 153 .digest = HKS_DIGEST_NONE, 168 .digest = HKS_DIGEST_NONE, 183 .digest = HKS_DIGEST_NONE, 199 .digest [all...] |
H A D | hks_crypto_hal_rsa_decrypt.cpp | 47 .digest = HKS_DIGEST_NONE, 67 .digest = HKS_DIGEST_NONE, 94 .digest = HKS_DIGEST_NONE, 116 .digest = HKS_DIGEST_NONE, 140 .digest = HKS_DIGEST_NONE, 166 .digest = HKS_DIGEST_NONE, 196 .digest = HKS_DIGEST_NONE, 212 .digest = HKS_DIGEST_NONE, 229 .digest = HKS_DIGEST_NONE, 247 .digest [all...] |
H A D | hks_crypto_hal_rsa_encrypt.cpp | 48 .digest = HKS_DIGEST_NONE, 69 .digest = HKS_DIGEST_NONE, 97 .digest = HKS_DIGEST_NONE, 120 .digest = HKS_DIGEST_NONE, 146 .digest = HKS_DIGEST_NONE, 174 .digest = HKS_DIGEST_NONE, 206 .digest = HKS_DIGEST_NONE, 222 .digest = HKS_DIGEST_NONE, 238 .digest = HKS_DIGEST_NONE, 255 .digest [all...] |
H A D | hks_crypto_hal_dsa_sign.cpp | 39 .digest = HKS_DIGEST_SHA1, 47 .digest = HKS_DIGEST_SHA224, 55 .digest = HKS_DIGEST_SHA256, 63 .digest = HKS_DIGEST_SHA384, 71 .digest = HKS_DIGEST_SHA512, 112 EXPECT_EQ(HksCryptoHalHash(hksUsageSpec.digest, &message, &hash), HKS_SUCCESS); in RunTestCase()
|
/base/update/packaging_tools/ |
H A D | build_pkcs7.py | 71 return hash_sha256.digest() 74 def sign_digest_with_pss(digest, private_key_file): 89 digest, 98 def sign_digest(digest, private_key_file): 110 digest, 119 def create_encap_content_info(digest): 120 if not digest: 125 SHA256_HASH_LEN, digest) 159 digest = calculate_package_hash(package_path) 160 data = create_encap_content_info(digest) [all...] |
H A D | create_update_package.py | 170 package_file.write(component.digest) 202 return hash_sha256.digest() 214 return hash_sha256.digest() 216 def sign_digest_with_pss(self, digest): 229 signature = private_key.sign(digest, pad, hashes.SHA256()) 234 def sign_digest(self, digest): 242 signature = private_key.sign(digest, padding.PKCS1v15(), hashes.SHA256()) 250 digest = self.calculate_hash(package_file) 251 if not digest: 258 signature = self.sign_digest(digest) [all...] |
/base/hiviewdfx/hiview/base/include/ |
H A D | audit_log_parser.h | 31 std::string digest = ""; member 43 " TimeCost:" + std::to_string((outTime - inTime)) + " Digest:" + digest; in ToString() 53 std::string digest = ""; member 64 " Digest:" + digest; in ToString() 78 PipelineEventInfo() : eventSerialId(0), createTime(0), destroyTime(0), creator(""), pipeline(""), digest(""){}; in PipelineEventInfo() 80 : eventSerialId(info.eventSerialId), createTime(info.inTime), creator(info.sender), digest(info.digest){}; in PipelineEventInfo() 87 // [timestamp] [eventSerialId] [0] [sender] [processor] [thread] [digest] 91 // [timestamp] [eventSerialId] [2] [creator] [digest]
|
/base/update/updater/test/fuzztest/package_fuzzer/ |
H A D | package_fuzzer.cpp | 104 ret = BuildFileDigest(*comp[n].digest, sizeof(comp[n].digest), filePath); in TestPackagePack() 184 std::vector<uint8_t> digest(digestSize); in TestVerifyUpgradePackage() 186 BuildFileDigest(*digest.data(), digest.capacity(), path.c_str()); in TestVerifyUpgradePackage() 187 int ret = VerifyPackage(path.c_str(), GetFuzzCertName(0).c_str(), "", digest.data(), digest.capacity()); in TestVerifyUpgradePackage() 188 ret = VerifyPackage(nullptr, nullptr, nullptr, nullptr, digest.capacity()); in TestVerifyUpgradePackage() 254 std::vector<uint8_t> digest(digestSize); in FuzzVerifyPackage() 259 VerifyPackage(dataInfo.c_str(), keyPath.c_str(), "", digest in FuzzVerifyPackage() [all...] |
/base/update/updater/services/package/pkg_algorithm/ |
H A D | pkg_algorithm.cpp | 46 PkgBuffer digest(DIGEST_MAX_LEN);
in FinalDigest() 47 algorithm->Final(digest);
in FinalDigest() 48 if (check && memcmp(digest.buffer, context.digest, DIGEST_MAX_LEN) != 0) {
in FinalDigest() 51 if (memcpy_s(context.digest, sizeof(context.digest), digest.buffer, DIGEST_MAX_LEN) != EOK) {
in FinalDigest() 64 PKG_LOGE("Can not get digest algor");
in Pack() 95 PKG_LOGE("Check digest fail");
in Pack() 111 PKG_LOGE("Can not get digest algo in Unpack() [all...] |
/base/update/updater/services/package/pkg_verify/ |
H A D | pkg_verify_util.cpp | 72 PkgBuffer digest(srcDataLen); in VerifyAccPackageSign() 73 pkgStream->Read(digest, 0, srcDataLen, readLen); in VerifyAccPackageSign() 74 sourceDigest.assign(digest.buffer, digest.buffer + readLen); in VerifyAccPackageSign() 78 int32_t PkgVerifyUtil::VerifySign(std::vector<uint8_t> &signData, std::vector<uint8_t> &digest) const in VerifySign() 88 if ((hashLen != digest.size()) || memcmp(hash.data(), digest.data(), hashLen) != EOK) { in VerifySign() 197 PKG_LOGE("calc pkg sha256 digest failed."); in HashCheck() 204 PKG_LOGE("calc pkg sha256 digest failed."); in HashCheck()
|
/base/hiviewdfx/hiview/base/ |
H A D | event_source.cpp | 29 auto digest = GetPluginInfo() + Audit::DOMAIN_DELIMITER + event->GetEventInfo();
in PublishPipelineEvent() local 30 Audit::WriteAuditEvent(Audit::StatsEvent::PIPELINE_EVENT_CREATE, event->createTime_, digest);
in PublishPipelineEvent()
|
/base/update/updateservice/services/core/ability/utils/include/ |
H A D | sha256_utils.h | 34 static bool GetDigestFromFile(const char *fileName, unsigned char digest[]); 36 static bool TransDigestToSha256Result(char *sha256Result, uint32_t componentIdLen, const unsigned char *digest);
|
/base/security/huks/test/unittest/huks_common_test/include/ |
H A D | hks_test_common_h.h | 39 uint32_t digest; \ 72 uint32_t digest; member 84 uint32_t digest; member 103 uint32_t digest; member 112 uint32_t digest; member 138 uint32_t digest; member 295 uint32_t digest; member 307 uint32_t digest; member 352 bool setDigest, uint32_t digest);
|
/base/update/updater/services/package/pkg_package/ |
H A D | pkg_upgradefile.cpp | 73 if (memcpy_s(fileInfo_.digest, sizeof(fileInfo_.digest), info->digest, sizeof(info->digest)) != EOK) {
in Init() 500 // Calculate digest and verify
in VerifyFileV1() 555 PkgBuffer digest(GetDigestLen());
in Verify() 556 algorithm->Final(digest);
in Verify() 557 ret = verifier(&pkgInfo_.pkgInfo, digest.data, signData);
in Verify() 570 PkgBuffer digest(GetDigestLen());
in VerifyHeader() 571 algorithm->Final(digest);
in VerifyHeader() [all...] |
/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/ |
H A D | hks_mbedtls_ecdsa.c | 74 uint32_t digest = (usageSpec->digest == HKS_DIGEST_NONE) ? HKS_DIGEST_SHA256 : usageSpec->digest; in HksMbedtlsEcdsaSign() 75 ret = HksToMbedtlsDigestAlg(digest, &mbedtlsAlg); in HksMbedtlsEcdsaSign()
|