Home
last modified time | relevance | path

Searched refs:md (Results 1 - 25 of 55) sorted by relevance

123

/base/security/appverify/interfaces/innerkits/appverify/src/util/
H A Ddigest_parameter.cpp21 DigestParameter::DigestParameter() : digestOutputSizeBytes(0), md(nullptr), ptrCtx(nullptr) in DigestParameter()
31 /* md points to the OpenSSL global static struct constant, no need to free. */ in ~DigestParameter()
32 md = nullptr; in ~DigestParameter()
38 md = other.md; in DigestParameter()
51 md = other.md; in operator =()
/base/security/code_signature/utils/src/
H A Dpkcs7_generator.cpp44 const EVP_MD *md = EVP_get_digestbyname(hashAlg); in GenerateSignature() local
45 if (md == nullptr) { in GenerateSignature()
48 PKCS7Data pkcs7(md, cert); in GenerateSignature()
53 if (!signerInfo.InitSignerInfo(ownerID, cert, md, contentData)) { in GenerateSignature()
H A Dpkcs7_data.cpp29 PKCS7Data::PKCS7Data(const EVP_MD *md, X509 *cert) in PKCS7Data() argument
30 : cert_(cert), md_(md) in PKCS7Data()
H A Dsigner_info.cpp41 bool SignerInfo::InitSignerInfo(const std::string &ownerID, X509 *cert, const EVP_MD *md, in InitSignerInfo() argument
44 if ((cert == nullptr) || (md == nullptr)) { in InitSignerInfo()
47 md_ = md; in InitSignerInfo()
73 if (!X509_ALGOR_set0(p7info_->digest_alg, OBJ_nid2obj(EVP_MD_type(md)), in InitSignerInfo()
/base/security/crypto_framework/frameworks/js/napi/crypto/src/
H A Dnapi_md.cpp46 HcfMd *md = nullptr; member
81 context->md = nullptr; in FreeCryptoFwkCtx()
114 HcfMd *mdObj = context->md; in MdUpdateExecute()
125 HcfMd *mdObj = context->md; in MdDoFinalExecute()
197 context->md = napiMd->GetMd(); in BuildMdJsUpdateCtx()
200 LOGE("create md ref failed when do md update!"); in BuildMdJsUpdateCtx()
233 context->md = napiMd->GetMd(); in BuildMdJsDoFinalCtx()
236 LOGE("create md ref failed when do md fina in BuildMdJsDoFinalCtx()
355 HcfMd *md = napiMd->GetMd(); JsMdUpdateSync() local
410 HcfMd *md = napiMd->GetMd(); JsMdDoFinalSync() local
451 HcfMd *md = napiMd->GetMd(); JsGetMdLength() local
[all...]
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/signature/src/
H A Dsignature_rsa_openssl.c45 int32_t md; member
67 int32_t md; member
175 static HcfResult SetPaddingAndDigest(EVP_PKEY_CTX *ctx, int32_t hcfPadding, int32_t md, int32_t mgf1md) in SetPaddingAndDigest() argument
185 LOGD("padding is pss, set mgf1 md"); in SetPaddingAndDigest()
206 (void)GetOpensslDigestAlg(impl->md, &opensslAlg); in SetOnlySignParams()
248 (void)GetOpensslDigestAlg(impl->md, &opensslAlg); in SetSignParams()
260 if (SetPaddingAndDigest(ctx, impl->padding, impl->md, impl->mgf1md) != HCF_SUCCESS) { in SetSignParams()
300 LOGD("[error] Sign set padding or md fail"); in EngineSignInit()
316 (void)GetOpensslDigestAlg(impl->md, &opensslAlg); in SetVerifyParams()
329 if (SetPaddingAndDigest(ctx, impl->padding, impl->md, imp in SetVerifyParams()
664 EVP_MD *md = NULL; CheckOnlySignatureParams() local
688 EVP_MD *md = NULL; CheckSignatureParams() local
[all...]
H A Decdsa_openssl.c418 if (!IsBrainPoolDigestAlgValid(params->md)) { in HcfSignSpiEcdsaCreate()
419 LOGE("Invalid md."); in HcfSignSpiEcdsaCreate()
423 if (!IsDigestAlgValid(params->md)) { in HcfSignSpiEcdsaCreate()
424 LOGE("Invalid md."); in HcfSignSpiEcdsaCreate()
429 int32_t ret = GetOpensslDigestAlg(params->md, &opensslAlg); in HcfSignSpiEcdsaCreate()
470 if (!IsBrainPoolDigestAlgValid(params->md)) { in HcfVerifySpiEcdsaCreate()
471 LOGE("Invalid md."); in HcfVerifySpiEcdsaCreate()
475 if (!IsDigestAlgValid(params->md)) { in HcfVerifySpiEcdsaCreate()
476 LOGE("Invalid md."); in HcfVerifySpiEcdsaCreate()
481 int32_t ret = GetOpensslDigestAlg(params->md, in HcfVerifySpiEcdsaCreate()
[all...]
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/
H A Dopenssl_rsa_helper.c264 const EVP_MD *md = GetOpensslDigestType(digestType); in EncryptRsa() local
265 if ((md == NULL) || (EVP_PKEY_CTX_set_rsa_oaep_md(ectx, md) != 1) || in EncryptRsa()
266 (EVP_PKEY_CTX_set_rsa_mgf1_md(ectx, md) != 1)) { in EncryptRsa()
312 const EVP_MD *md = GetOpensslDigestType(digestType); in DecryptRsa() local
313 if ((md == NULL) || (EVP_PKEY_CTX_set_rsa_oaep_md(ectx, md) != 1) || in DecryptRsa()
314 (EVP_PKEY_CTX_set_rsa_mgf1_md(ectx, md) != 1)) { in DecryptRsa()
448 const EVP_MD *md = GetOpensslDigestType(digestType); in OpensslSignRsa() local
449 if (EVP_DigestSignInit(mctx, NULL, md, NUL in OpensslSignRsa()
507 const EVP_MD *md = GetOpensslDigestType(digestType); OpensslVerifyRsa() local
[all...]
/base/security/crypto_framework/test/unittest/src/
H A Dcrypto_common_cov_test.cpp89 HcfAlgParaValue md = HCF_OPENSSL_DIGEST_MD5; in HWTEST_F() local
90 HcfResult ret = GetRsaSpecStringMd(md, nullptr); in HWTEST_F()
96 HcfAlgParaValue md = HCF_OPENSSL_DIGEST_MD5; in HWTEST_F() local
98 HcfResult ret = GetRsaSpecStringMd(md, &retStr); in HWTEST_F()
107 HcfAlgParaValue md = HCF_OPENSSL_DIGEST_SHA1; in HWTEST_F() local
109 HcfResult ret = GetRsaSpecStringMd(md, &retStr); in HWTEST_F()
118 HcfAlgParaValue md = HCF_OPENSSL_DIGEST_SHA224; in HWTEST_F() local
120 HcfResult ret = GetRsaSpecStringMd(md, &retStr); in HWTEST_F()
129 HcfAlgParaValue md = HCF_OPENSSL_DIGEST_SHA384; in HWTEST_F() local
131 HcfResult ret = GetRsaSpecStringMd(md, in HWTEST_F()
140 HcfAlgParaValue md = HCF_OPENSSL_DIGEST_SHA512; HWTEST_F() local
151 HcfAlgParaValue md = HCF_OPENSSL_DIGEST_NONE; HWTEST_F() local
[all...]
H A Dcrypto_rsa_cipher_sub_test.cpp453 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F()
469 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F()
486 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F()
507 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F()
542 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F()
567 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F()
588 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F()
610 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F()
631 .md = HCF_OPENSSL_DIGEST_SHA256, in HWTEST_F()
653 .md in HWTEST_F()
[all...]
H A Dcrypto_sm2_cipher_test.cpp691 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
704 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
720 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
736 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
752 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
773 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
790 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
812 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
833 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
864 .md in HWTEST_F()
[all...]
H A Dcrypto_sm4_cipher_test.cpp966 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
981 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
1000 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
1018 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
1038 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
1064 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
1087 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
1110 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
1129 .md = HCF_OPENSSL_DIGEST_SM3, in HWTEST_F()
1148 .md in HWTEST_F()
[all...]
H A Dopenssl_adapter_mock.c1175 int OpensslEvpPkeyCtxSetRsaMgf1Md(EVP_PKEY_CTX *ctx, const EVP_MD *md) in OpensslEvpPkeyCtxSetRsaMgf1Md() argument
1177 return EVP_PKEY_CTX_set_rsa_mgf1_md(ctx, md); in OpensslEvpPkeyCtxSetRsaMgf1Md()
1180 int OpensslEvpPkeyCtxSetRsaOaepMd(EVP_PKEY_CTX *ctx, const EVP_MD *md) in OpensslEvpPkeyCtxSetRsaOaepMd() argument
1182 return EVP_PKEY_CTX_set_rsa_oaep_md(ctx, md); in OpensslEvpPkeyCtxSetRsaOaepMd()
1298 int OpensslEvpDigestFinalEx(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) in OpensslEvpDigestFinalEx() argument
1303 return EVP_DigestFinal_ex(ctx, md, size); in OpensslEvpDigestFinalEx()
1322 int OpensslHmacInitEx(HMAC_CTX *ctx, const void *key, int len, const EVP_MD *md, ENGINE *impl) in OpensslHmacInitEx() argument
1327 return HMAC_Init_ex(ctx, key, len, md, impl); in OpensslHmacInitEx()
1330 int OpensslHmacFinal(HMAC_CTX *ctx, unsigned char *md, unsigned int *len) in OpensslHmacFinal() argument
1335 return HMAC_Final(ctx, md, le in OpensslHmacFinal()
1833 OpensslEvpPkeyCtxSetSignatureMd(EVP_PKEY_CTX *ctx, const EVP_MD *md) OpensslEvpPkeyCtxSetSignatureMd() argument
[all...]
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/kdf/src/
H A Dpbkdf2_openssl.c238 EVP_MD *md = NULL; in HcfKdfPBKDF2SpiCreate() local
239 HcfResult res = GetOpensslDigestAlg(params->md, &md); in HcfKdfPBKDF2SpiCreate()
240 if (res != HCF_SUCCESS || md == NULL) { in HcfKdfPBKDF2SpiCreate()
241 LOGE("get md failed"); in HcfKdfPBKDF2SpiCreate()
252 returnSpiImpl->digestAlg = md; in HcfKdfPBKDF2SpiCreate()
/base/security/crypto_framework/common/inc/
H A Dparams_parser.h219 HcfAlgParaValue md; member
232 HcfAlgParaValue md; member
243 HcfAlgParaValue md; member
/base/security/crypto_framework/frameworks/crypto_operation/
H A Dmd.c16 #include "md.h"
152 HcfResult HcfMdCreate(const char *algoName, HcfMd **md) in HcfMdCreate() argument
154 if (!HcfIsStrValid(algoName, HCF_MAX_ALGO_NAME_LEN) || (md == NULL)) { in HcfMdCreate()
155 LOGE("Invalid input params while creating md!"); in HcfMdCreate()
187 *md = (HcfMd *)returnMdApi; in HcfMdCreate()
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/cipher/src/
H A Dcipher_rsa_openssl.c172 EVP_MD *md = NULL; in SetDetailParams() local
174 (void)GetOpensslDigestAlg(attr.md, &md); in SetDetailParams()
176 // set md and mgf1md in SetDetailParams()
177 if (OpensslEvpPkeyCtxSetRsaOaepMd(impl->ctx, md) != HCF_OPENSSL_SUCCESS || in SetDetailParams()
179 LOGD("[error] Set md or mgf1md fail"); in SetDetailParams()
309 ret = GetRsaSpecStringMd((const HcfAlgParaValue)(attr.md), returnString); in GetRsaCipherSpecString()
471 EVP_MD *md = NULL; in CheckRsaCipherParams() local
473 (void)GetOpensslDigestAlg(params->md, &md); in CheckRsaCipherParams()
[all...]
/base/security/dlp_permission_service/frameworks/test/mock/
H A Dopenssl_mock.cpp48 typedef int (*EvpDigest)(const void *data, size_t count, unsigned char *md, unsigned int *size,
55 typedef int (*EvpDigestFinalEx)(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *s);
315 int EVP_Digest(const void *data, size_t count, unsigned char *md, unsigned int *size, in EVP_Digest() argument
327 return (*func)(data, count, md, size, type, impl); in EVP_Digest()
400 int EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *s) in EVP_DigestFinal_ex() argument
411 return (*func)(ctx, md, s); in EVP_DigestFinal_ex()
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/signature/inc/
H A Dsignature_rsa_openssl.h26 int32_t md; member
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/
H A Dhks_openssl_kdf.c55 const EVP_MD *md = GetDeriveDigestType(deriveParam->digestAlg); in HksOpensslPbkdf2() local
57 deriveParam->iterations, md, derivedKey->size, derivedKey->data) != 1) { in HksOpensslPbkdf2()
68 const EVP_MD *md = GetDeriveDigestType(deriveParam->digestAlg); in HksOpensslHkdf() local
77 if (EVP_PKEY_CTX_set_hkdf_md(pctx, md) <= 0) { in HksOpensslHkdf()
/base/security/appverify/interfaces/innerkits/appverify/include/util/
H A Ddigest_parameter.h35 const EVP_MD* md; member in OHOS::Security::Verify::DigestParameter
/base/security/crypto_framework/interfaces/inner_api/crypto_operation/
H A Dmd.h41 HcfResult HcfMdCreate(const char *algoName, HcfMd **md);
/base/hiviewdfx/hichecker/interfaces/js/kits/napi/js_leak_watcher/
H A Djs_leak_watcher.js69 let md = cryptoFramework.createMd('SHA256');
81 md.updateSync({ data: new Uint8Array(buf.slice(0, readLen)) });
88 let digestOutPut = md.digestSync();
/base/security/code_signature/utils/include/
H A Dpkcs7_data.h31 PKCS7Data(const EVP_MD *md, X509 *cert);
H A Dsigner_info.h37 bool InitSignerInfo(const std::string &ownerID, X509 *cert, const EVP_MD *md, const ByteBuffer &contentData,

Completed in 15 milliseconds

123