/base/update/updater/services/package/pkg_verify/ |
D | pkcs7_signed_data.cpp | 207 size_t digestLen = static_cast<size_t>(ReadLE16(digestBlock.data() + offset)); in GetDigestFromContentInfo() local 209 if ((GetDigestLength(algoId) != digestLen) || ((digestLen + offset) != digestBlock.size())) { in GetDigestFromContentInfo() 210 PKG_LOGE("invalid digestLen[%zu] and digestBlock len[%zu]", digestLen, digestBlock.size()); in GetDigestFromContentInfo() 323 size_t digestLen = GetDigestLength(signer.digestNid); in VerifyDigest() local 324 if (digestLen == 0 || digest_.size() != digestLen) { in VerifyDigest() 325 PKG_LOGE("invalid digest length %zu", digestLen); in VerifyDigest() 326 UPDATER_LAST_WORD(-1, digestLen); in VerifyDigest()
|
D | pkg_verify_util.cpp | 111 size_t digestLen = hash.size(); in HashCheck() local 112 if (digestLen != PKG_HASH_CONTENT_LEN) { in HashCheck() 116 std::vector<uint8_t> sourceDigest(digestLen); in HashCheck() 123 if (memcmp(hash.data(), sourceDigest.data(), digestLen) != EOK) { in HashCheck()
|
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
D | hks_openssl_hmac.c | 39 uint32_t digestLen; member 81 uint32_t digestLen; in HmacCheckParam() local 82 HKS_IF_NOT_SUCC_LOGE_RETURN(HksGetDigestLen(alg, &digestLen), in HmacCheckParam() 85 if (mac->size < digestLen) { in HmacCheckParam() 86 …E("invalid mac->size(0x%" LOG_PUBLIC "x) for digestLen(0x%" LOG_PUBLIC "x)", mac->size, digestLen); in HmacCheckParam() 131 uint32_t digestLen; in HksOpensslHmacInit() 132 HKS_IF_NOT_SUCC_LOGE_RETURN(HksGetDigestLen(digestAlg, &digestLen), in HksOpensslHmacInit() 154 outCtx->digestLen = digestLen; in HksOpensslHmacInit()
|
D | hks_openssl_ed25519tox25519.c | 370 uint32_t digestLen = ED25519_FIX_KEY_BUFFER_SIZE; in ConvertPrivX25519FromED25519() local 372 if (EVP_Digest(input, inputLen, digest, &digestLen, EVP_sha512(), NULL) <= 0) { in ConvertPrivX25519FromED25519() 378 digestLen / 2) != EOK) { // 2 : used to calculate half of the digest length in ConvertPrivX25519FromED25519() 379 (void)memset_s(digest, digestLen, 0, digestLen); in ConvertPrivX25519FromED25519() 389 (void)memset_s(digest, digestLen, 0, digestLen); in ConvertPrivX25519FromED25519()
|
/base/security/huks/frameworks/huks_standard/main/common/src/ |
D | hks_common_check.c | 102 int32_t HksGetDigestLen(uint32_t digest, uint32_t *digestLen) in HksGetDigestLen() argument 106 *digestLen = HKS_DIGEST_MD5_LEN; in HksGetDigestLen() 109 *digestLen = HKS_DIGEST_SHA1_LEN; in HksGetDigestLen() 112 *digestLen = HKS_DIGEST_SHA224_LEN; in HksGetDigestLen() 115 *digestLen = HKS_DIGEST_SHA256_LEN; in HksGetDigestLen() 118 *digestLen = HKS_DIGEST_SHA384_LEN; in HksGetDigestLen() 121 *digestLen = HKS_DIGEST_SHA512_LEN; in HksGetDigestLen() 124 *digestLen = HKS_DIGEST_SM3_LEN; in HksGetDigestLen()
|
D | hks_check_paramset.c | 1012 uint32_t digestLen; in CheckMacOutput() 1013 ret = HksGetDigestLen(digest, &digestLen); in CheckMacOutput() 1016 if (mac->size < digestLen) { in CheckMacOutput() 1021 …if ((isLocalCheck) && (key->size < digestLen)) { /* the unit of local engine input key size is byt… in CheckMacOutput()
|
D | hks_base_check.c | 1102 uint32_t digestLen; in CheckRsaOaepCipherData() local 1106 int32_t ret = HksGetDigestLen(digest, &digestLen); in CheckRsaOaepCipherData() 1113 if (keySize <= (HKS_RSA_OAEP_DIGEST_NUM * digestLen + HKS_RSA_OAEP_DIGEST_NUM)) { in CheckRsaOaepCipherData() 1116 uint32_t size = keySize - HKS_RSA_OAEP_DIGEST_NUM * digestLen - HKS_RSA_OAEP_DIGEST_NUM; in CheckRsaOaepCipherData() 1120 "digestLen: %" LOG_PUBLIC "u", inData->size, keySize, digestLen); in CheckRsaOaepCipherData()
|
/base/security/appverify/interfaces/innerkits/appverify/src/util/ |
D | hap_signing_block_utils.cpp | 450 int digestLen = HapVerifyOpensslUtils::GetDigest(chunkDigest, optionalBlocks, digestParam, out); in ComputeDigestsWithOptionalBlock() local 451 if (digestLen != digestParam.digestOutputSizeBytes) { in ComputeDigestsWithOptionalBlock() 453 digestLen, digestParam.digestOutputSizeBytes); in ComputeDigestsWithOptionalBlock() 519 int digestLen = HapVerifyOpensslUtils::GetDigest(digestParam, out); in ComputeDigestsForEachChunk() local 520 if (digestLen != digestParam.digestOutputSizeBytes) { in ComputeDigestsForEachChunk() 522 digestLen, digestParam.digestOutputSizeBytes); in ComputeDigestsForEachChunk() 526 offset += digestLen; in ComputeDigestsForEachChunk()
|
D | hap_verify_openssl_utils.cpp | 276 unsigned int digestLen; in VerifyShaWithRsaPss() local 277 if (EVP_DigestFinal_ex(mdCtxTmp, digest, &digestLen) <= 0) { in VerifyShaWithRsaPss() 285 if (!VerifyShaWithRsaPss(signInfo, pkey, isPss, digest, digestLen)) { in VerifyShaWithRsaPss() 315 unsigned int digestLen; in VerifyPkcs7AuthAttributes() local 316 if (EVP_DigestFinal_ex(mdCtx, digest, &digestLen) <= 0) { in VerifyPkcs7AuthAttributes() 322 if (!AsnStringCmp(digestInAttribute, digest, static_cast<int>(digestLen))) { in VerifyPkcs7AuthAttributes() 380 const unsigned char digest[], unsigned int digestLen) in VerifyShaWithRsaPss() argument 407 …erify(pkeyCtx, signInfo->enc_digest->data, signInfo->enc_digest->length, digest, digestLen) <= 0) { in VerifyShaWithRsaPss()
|
/base/update/updater/test/unittest/test_data/applypatch/ |
D | TestDecompressGzip.new.gz |
|
/base/security/huks/frameworks/huks_standard/main/common/include/ |
D | hks_common_check.h | 56 int32_t HksGetDigestLen(uint32_t digest, uint32_t *digestLen);
|
/base/update/updater/services/package/pkg_manager/ |
D | pkg_managerImpl.cpp | 648 size_t digestLen = DigestAlgorithm::GetDigestLen(digestMethod); in CreatePkgStream() local 690 … PkgBuffer result(digestInfos[DIGEST_INFO_HAS_SIGN].data(), digestLen); algorithm->Final(result)); in CreatePkgStream() 692 …PkgBuffer result(digestInfos[DIGEST_INFO_NO_SIGN].data(), digestLen); algorithmInner->Final(result… in CreatePkgStream() 727 size_t digestLen = DigestAlgorithm::GetDigestLen(info->digestMethod); in CreatePkgStream() local 729 digestInfos[DIGEST_INFO_HAS_SIGN].resize(digestLen); in CreatePkgStream() 748 PkgBuffer digest(digestInfos[DIGEST_INFO_HAS_SIGN].data(), digestLen); in CreatePkgStream() 889 size_t digestLen = DigestAlgorithm::GetDigestLen(digestMethod); in CreatePkgStream() local 891 if (digestLen != digest.length) { in CreatePkgStream() 897 digestInfos[DIGEST_INFO_HAS_SIGN].resize(digestLen); in CreatePkgStream() 898 digestInfos[DIGEST_INFO_NO_SIGN].resize(digestLen); in CreatePkgStream()
|
/base/update/updater/test/unittest/package/ |
D | pkg_algo_unittest.cpp | 104 constexpr size_t digestLen = 32; in TestInvalidParam() local 114 uint8_t dig2[digestLen]; in TestInvalidParam()
|
D | package_unittest.cpp | 53 constexpr uint32_t digestLen = 32; in TestInvalidCreatePackage() local 54 ret = VerifyPackage(nullptr, GetTestCertName(0).c_str(), nullptr, nullptr, digestLen); in TestInvalidCreatePackage()
|
/base/security/appverify/interfaces/innerkits/appverify/include/util/ |
D | hap_verify_openssl_utils.h | 75 const unsigned char digest[], unsigned int digestLen);
|
/base/security/huks/frameworks/huks_standard/main/core/src/ |
D | hks_local_engine.c | 52 uint32_t digestLen; in HksLocalHash() 53 ret = HksGetDigestLen(digestAlg->uint32Param, &digestLen); in HksLocalHash() 56 if (hash->size < digestLen) { in HksLocalHash()
|
/base/security/huks/services/huks_standard/huks_engine/main/core/src/ |
D | hks_core_service_three_stage.c | 76 uint32_t digestLen; in CheckRsaCipherData() local 77 int32_t ret = HksGetDigestLen(digest, &digestLen); in CheckRsaCipherData() 80 if (keySize <= (HKS_RSA_OAEP_DIGEST_NUM * digestLen + HKS_RSA_OAEP_DIGEST_NUM)) { in CheckRsaCipherData() 83 uint32_t size = keySize - HKS_RSA_OAEP_DIGEST_NUM * digestLen - HKS_RSA_OAEP_DIGEST_NUM; in CheckRsaCipherData()
|