/base/security/appverify/interfaces/innerkits/appverify/src/util/ |
H A D | digest_parameter.cpp | 21 DigestParameter::DigestParameter() : digestOutputSizeBytes(0), md(nullptr), ptrCtx(nullptr)
in DigestParameter() 31 /* md points to the OpenSSL global static struct constant, no need to free. */
in ~DigestParameter() 32 md = nullptr;
in ~DigestParameter() 38 md = other.md;
in DigestParameter() 51 md = other.md;
in operator =()
|
/base/security/code_signature/utils/src/ |
H A D | pkcs7_generator.cpp | 44 const EVP_MD *md = EVP_get_digestbyname(hashAlg);
in GenerateSignature() local 45 if (md == nullptr) {
in GenerateSignature() 48 PKCS7Data pkcs7(md, cert);
in GenerateSignature() 53 if (!signerInfo.InitSignerInfo(ownerID, cert, md, contentData)) {
in GenerateSignature()
|
H A D | pkcs7_data.cpp | 29 PKCS7Data::PKCS7Data(const EVP_MD *md, X509 *cert)
in PKCS7Data() argument 30 : cert_(cert), md_(md)
in PKCS7Data()
|
H A D | signer_info.cpp | 41 bool SignerInfo::InitSignerInfo(const std::string &ownerID, X509 *cert, const EVP_MD *md,
in InitSignerInfo() argument 44 if ((cert == nullptr) || (md == nullptr)) {
in InitSignerInfo() 47 md_ = md;
in InitSignerInfo() 73 if (!X509_ALGOR_set0(p7info_->digest_alg, OBJ_nid2obj(EVP_MD_type(md)),
in InitSignerInfo()
|
/base/security/crypto_framework/frameworks/js/napi/crypto/src/ |
H A D | napi_md.cpp | 46 HcfMd *md = nullptr; member 81 context->md = nullptr; in FreeCryptoFwkCtx() 114 HcfMd *mdObj = context->md; in MdUpdateExecute() 125 HcfMd *mdObj = context->md; in MdDoFinalExecute() 197 context->md = napiMd->GetMd(); in BuildMdJsUpdateCtx() 200 LOGE("create md ref failed when do md update!"); in BuildMdJsUpdateCtx() 233 context->md = napiMd->GetMd(); in BuildMdJsDoFinalCtx() 236 LOGE("create md ref failed when do md fina in BuildMdJsDoFinalCtx() 355 HcfMd *md = napiMd->GetMd(); JsMdUpdateSync() local 410 HcfMd *md = napiMd->GetMd(); JsMdDoFinalSync() local 451 HcfMd *md = napiMd->GetMd(); JsGetMdLength() local [all...] |
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/signature/src/ |
H A D | signature_rsa_openssl.c | 45 int32_t md; member 67 int32_t md; member 175 static HcfResult SetPaddingAndDigest(EVP_PKEY_CTX *ctx, int32_t hcfPadding, int32_t md, int32_t mgf1md) in SetPaddingAndDigest() argument 185 LOGD("padding is pss, set mgf1 md"); in SetPaddingAndDigest() 206 (void)GetOpensslDigestAlg(impl->md, &opensslAlg); in SetOnlySignParams() 248 (void)GetOpensslDigestAlg(impl->md, &opensslAlg); in SetSignParams() 260 if (SetPaddingAndDigest(ctx, impl->padding, impl->md, impl->mgf1md) != HCF_SUCCESS) { in SetSignParams() 300 LOGD("[error] Sign set padding or md fail"); in EngineSignInit() 316 (void)GetOpensslDigestAlg(impl->md, &opensslAlg); in SetVerifyParams() 329 if (SetPaddingAndDigest(ctx, impl->padding, impl->md, imp in SetVerifyParams() 664 EVP_MD *md = NULL; CheckOnlySignatureParams() local 688 EVP_MD *md = NULL; CheckSignatureParams() local [all...] |
H A D | ecdsa_openssl.c | 418 if (!IsBrainPoolDigestAlgValid(params->md)) { in HcfSignSpiEcdsaCreate() 419 LOGE("Invalid md."); in HcfSignSpiEcdsaCreate() 423 if (!IsDigestAlgValid(params->md)) { in HcfSignSpiEcdsaCreate() 424 LOGE("Invalid md."); in HcfSignSpiEcdsaCreate() 429 int32_t ret = GetOpensslDigestAlg(params->md, &opensslAlg); in HcfSignSpiEcdsaCreate() 470 if (!IsBrainPoolDigestAlgValid(params->md)) { in HcfVerifySpiEcdsaCreate() 471 LOGE("Invalid md."); in HcfVerifySpiEcdsaCreate() 475 if (!IsDigestAlgValid(params->md)) { in HcfVerifySpiEcdsaCreate() 476 LOGE("Invalid md."); in HcfVerifySpiEcdsaCreate() 481 int32_t ret = GetOpensslDigestAlg(params->md, in HcfVerifySpiEcdsaCreate() [all...] |
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/ |
H A D | openssl_rsa_helper.c | 264 const EVP_MD *md = GetOpensslDigestType(digestType); in EncryptRsa() local 265 if ((md == NULL) || (EVP_PKEY_CTX_set_rsa_oaep_md(ectx, md) != 1) || in EncryptRsa() 266 (EVP_PKEY_CTX_set_rsa_mgf1_md(ectx, md) != 1)) { in EncryptRsa() 312 const EVP_MD *md = GetOpensslDigestType(digestType); in DecryptRsa() local 313 if ((md == NULL) || (EVP_PKEY_CTX_set_rsa_oaep_md(ectx, md) != 1) || in DecryptRsa() 314 (EVP_PKEY_CTX_set_rsa_mgf1_md(ectx, md) != 1)) { in DecryptRsa() 448 const EVP_MD *md = GetOpensslDigestType(digestType); in OpensslSignRsa() local 449 if (EVP_DigestSignInit(mctx, NULL, md, NUL in OpensslSignRsa() 507 const EVP_MD *md = GetOpensslDigestType(digestType); OpensslVerifyRsa() local [all...] |
/base/security/crypto_framework/test/unittest/src/ |
H A D | crypto_common_cov_test.cpp | 89 HcfAlgParaValue md = HCF_OPENSSL_DIGEST_MD5; in HWTEST_F() local 90 HcfResult ret = GetRsaSpecStringMd(md, nullptr); in HWTEST_F() 96 HcfAlgParaValue md = HCF_OPENSSL_DIGEST_MD5; in HWTEST_F() local 98 HcfResult ret = GetRsaSpecStringMd(md, &retStr); in HWTEST_F() 107 HcfAlgParaValue md = HCF_OPENSSL_DIGEST_SHA1; in HWTEST_F() local 109 HcfResult ret = GetRsaSpecStringMd(md, &retStr); in HWTEST_F() 118 HcfAlgParaValue md = HCF_OPENSSL_DIGEST_SHA224; in HWTEST_F() local 120 HcfResult ret = GetRsaSpecStringMd(md, &retStr); in HWTEST_F() 129 HcfAlgParaValue md = HCF_OPENSSL_DIGEST_SHA384; in HWTEST_F() local 131 HcfResult ret = GetRsaSpecStringMd(md, in HWTEST_F() 140 HcfAlgParaValue md = HCF_OPENSSL_DIGEST_SHA512; HWTEST_F() local 151 HcfAlgParaValue md = HCF_OPENSSL_DIGEST_NONE; HWTEST_F() local [all...] |
H A D | crypto_rsa_cipher_sub_test.cpp | 453 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F() 469 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F() 486 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F() 507 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F() 542 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F() 567 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F() 588 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F() 610 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F() 631 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F() 653 .md in HWTEST_F() [all...] |
H A D | crypto_sm2_cipher_test.cpp | 691 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 704 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 720 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 736 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 752 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 773 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 790 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 812 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 833 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 864 .md in HWTEST_F() [all...] |
H A D | crypto_sm4_cipher_test.cpp | 966 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 981 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 1000 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 1018 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 1038 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 1064 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 1087 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 1110 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 1129 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F() 1148 .md in HWTEST_F() [all...] |
H A D | openssl_adapter_mock.c | 1175 int OpensslEvpPkeyCtxSetRsaMgf1Md(EVP_PKEY_CTX *ctx, const EVP_MD *md) in OpensslEvpPkeyCtxSetRsaMgf1Md() argument 1177 return EVP_PKEY_CTX_set_rsa_mgf1_md(ctx, md); in OpensslEvpPkeyCtxSetRsaMgf1Md() 1180 int OpensslEvpPkeyCtxSetRsaOaepMd(EVP_PKEY_CTX *ctx, const EVP_MD *md) in OpensslEvpPkeyCtxSetRsaOaepMd() argument 1182 return EVP_PKEY_CTX_set_rsa_oaep_md(ctx, md); in OpensslEvpPkeyCtxSetRsaOaepMd() 1298 int OpensslEvpDigestFinalEx(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) in OpensslEvpDigestFinalEx() argument 1303 return EVP_DigestFinal_ex(ctx, md, size); in OpensslEvpDigestFinalEx() 1322 int OpensslHmacInitEx(HMAC_CTX *ctx, const void *key, int len, const EVP_MD *md, ENGINE *impl) in OpensslHmacInitEx() argument 1327 return HMAC_Init_ex(ctx, key, len, md, impl); in OpensslHmacInitEx() 1330 int OpensslHmacFinal(HMAC_CTX *ctx, unsigned char *md, unsigned int *len) in OpensslHmacFinal() argument 1335 return HMAC_Final(ctx, md, le in OpensslHmacFinal() 1833 OpensslEvpPkeyCtxSetSignatureMd(EVP_PKEY_CTX *ctx, const EVP_MD *md) OpensslEvpPkeyCtxSetSignatureMd() argument [all...] |
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/kdf/src/ |
H A D | pbkdf2_openssl.c | 238 EVP_MD *md = NULL;
in HcfKdfPBKDF2SpiCreate() local 239 HcfResult res = GetOpensslDigestAlg(params->md, &md);
in HcfKdfPBKDF2SpiCreate() 240 if (res != HCF_SUCCESS || md == NULL) {
in HcfKdfPBKDF2SpiCreate() 241 LOGE("get md failed");
in HcfKdfPBKDF2SpiCreate() 252 returnSpiImpl->digestAlg = md;
in HcfKdfPBKDF2SpiCreate()
|
/base/security/crypto_framework/common/inc/ |
H A D | params_parser.h | 219 HcfAlgParaValue md; member 232 HcfAlgParaValue md; member 243 HcfAlgParaValue md; member
|
/base/security/crypto_framework/frameworks/crypto_operation/ |
H A D | md.c | 16 #include "md.h" 152 HcfResult HcfMdCreate(const char *algoName, HcfMd **md) in HcfMdCreate() argument 154 if (!HcfIsStrValid(algoName, HCF_MAX_ALGO_NAME_LEN) || (md == NULL)) { in HcfMdCreate() 155 LOGE("Invalid input params while creating md!"); in HcfMdCreate() 187 *md = (HcfMd *)returnMdApi; in HcfMdCreate()
|
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/cipher/src/ |
H A D | cipher_rsa_openssl.c | 172 EVP_MD *md = NULL; in SetDetailParams() local 174 (void)GetOpensslDigestAlg(attr.md, &md); in SetDetailParams() 176 // set md and mgf1md in SetDetailParams() 177 if (OpensslEvpPkeyCtxSetRsaOaepMd(impl->ctx, md) != HCF_OPENSSL_SUCCESS || in SetDetailParams() 179 LOGD("[error] Set md or mgf1md fail"); in SetDetailParams() 309 ret = GetRsaSpecStringMd((const HcfAlgParaValue)(attr.md), returnString); in GetRsaCipherSpecString() 471 EVP_MD *md = NULL; in CheckRsaCipherParams() local 473 (void)GetOpensslDigestAlg(params->md, &md); in CheckRsaCipherParams() [all...] |
/base/security/dlp_permission_service/frameworks/test/mock/ |
H A D | openssl_mock.cpp | 48 typedef int (*EvpDigest)(const void *data, size_t count, unsigned char *md, unsigned int *size, 55 typedef int (*EvpDigestFinalEx)(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *s); 315 int EVP_Digest(const void *data, size_t count, unsigned char *md, unsigned int *size, in EVP_Digest() argument 327 return (*func)(data, count, md, size, type, impl); in EVP_Digest() 400 int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *s) in EVP_DigestFinal_ex() argument 411 return (*func)(ctx, md, s); in EVP_DigestFinal_ex()
|
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/signature/inc/ |
H A D | signature_rsa_openssl.h | 26 int32_t md; member
|
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
H A D | hks_openssl_kdf.c | 55 const EVP_MD *md = GetDeriveDigestType(deriveParam->digestAlg);
in HksOpensslPbkdf2() local 57 deriveParam->iterations, md, derivedKey->size, derivedKey->data) != 1) {
in HksOpensslPbkdf2() 68 const EVP_MD *md = GetDeriveDigestType(deriveParam->digestAlg);
in HksOpensslHkdf() local 77 if (EVP_PKEY_CTX_set_hkdf_md(pctx, md) <= 0) {
in HksOpensslHkdf()
|
/base/security/appverify/interfaces/innerkits/appverify/include/util/ |
H A D | digest_parameter.h | 35 const EVP_MD* md;
member in OHOS::Security::Verify::DigestParameter
|
/base/security/crypto_framework/interfaces/inner_api/crypto_operation/ |
H A D | md.h | 41 HcfResult HcfMdCreate(const char *algoName, HcfMd **md);
|
/base/hiviewdfx/hichecker/interfaces/js/kits/napi/js_leak_watcher/ |
H A D | js_leak_watcher.js | 69 let md = cryptoFramework.createMd('SHA256'); 81 md.updateSync({ data: new Uint8Array(buf.slice(0, readLen)) }); 88 let digestOutPut = md.digestSync();
|
/base/security/code_signature/utils/include/ |
H A D | pkcs7_data.h | 31 PKCS7Data(const EVP_MD *md, X509 *cert);
|
H A D | signer_info.h | 37 bool InitSignerInfo(const std::string &ownerID, X509 *cert, const EVP_MD *md, const ByteBuffer &contentData,
|