Home
last modified time | relevance | path

Searched refs:digestLen (Results 1 – 17 of 17) sorted by relevance

/base/update/updater/services/package/pkg_verify/
Dpkcs7_signed_data.cpp207 size_t digestLen = static_cast<size_t>(ReadLE16(digestBlock.data() + offset)); in GetDigestFromContentInfo() local
209 if ((GetDigestLength(algoId) != digestLen) || ((digestLen + offset) != digestBlock.size())) { in GetDigestFromContentInfo()
210 PKG_LOGE("invalid digestLen[%zu] and digestBlock len[%zu]", digestLen, digestBlock.size()); in GetDigestFromContentInfo()
323 size_t digestLen = GetDigestLength(signer.digestNid); in VerifyDigest() local
324 if (digestLen == 0 || digest_.size() != digestLen) { in VerifyDigest()
325 PKG_LOGE("invalid digest length %zu", digestLen); in VerifyDigest()
326 UPDATER_LAST_WORD(-1, digestLen); in VerifyDigest()
Dpkg_verify_util.cpp111 size_t digestLen = hash.size(); in HashCheck() local
112 if (digestLen != PKG_HASH_CONTENT_LEN) { in HashCheck()
116 std::vector<uint8_t> sourceDigest(digestLen); in HashCheck()
123 if (memcmp(hash.data(), sourceDigest.data(), digestLen) != EOK) { in HashCheck()
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/
Dhks_openssl_hmac.c39 uint32_t digestLen; member
81 uint32_t digestLen; in HmacCheckParam() local
82 HKS_IF_NOT_SUCC_LOGE_RETURN(HksGetDigestLen(alg, &digestLen), in HmacCheckParam()
85 if (mac->size < digestLen) { in HmacCheckParam()
86 …E("invalid mac->size(0x%" LOG_PUBLIC "x) for digestLen(0x%" LOG_PUBLIC "x)", mac->size, digestLen); in HmacCheckParam()
131 uint32_t digestLen; in HksOpensslHmacInit()
132 HKS_IF_NOT_SUCC_LOGE_RETURN(HksGetDigestLen(digestAlg, &digestLen), in HksOpensslHmacInit()
154 outCtx->digestLen = digestLen; in HksOpensslHmacInit()
Dhks_openssl_ed25519tox25519.c370 uint32_t digestLen = ED25519_FIX_KEY_BUFFER_SIZE; in ConvertPrivX25519FromED25519() local
372 if (EVP_Digest(input, inputLen, digest, &digestLen, EVP_sha512(), NULL) <= 0) { in ConvertPrivX25519FromED25519()
378 digestLen / 2) != EOK) { // 2 : used to calculate half of the digest length in ConvertPrivX25519FromED25519()
379 (void)memset_s(digest, digestLen, 0, digestLen); in ConvertPrivX25519FromED25519()
389 (void)memset_s(digest, digestLen, 0, digestLen); in ConvertPrivX25519FromED25519()
/base/security/huks/frameworks/huks_standard/main/common/src/
Dhks_common_check.c102 int32_t HksGetDigestLen(uint32_t digest, uint32_t *digestLen) in HksGetDigestLen() argument
106 *digestLen = HKS_DIGEST_MD5_LEN; in HksGetDigestLen()
109 *digestLen = HKS_DIGEST_SHA1_LEN; in HksGetDigestLen()
112 *digestLen = HKS_DIGEST_SHA224_LEN; in HksGetDigestLen()
115 *digestLen = HKS_DIGEST_SHA256_LEN; in HksGetDigestLen()
118 *digestLen = HKS_DIGEST_SHA384_LEN; in HksGetDigestLen()
121 *digestLen = HKS_DIGEST_SHA512_LEN; in HksGetDigestLen()
124 *digestLen = HKS_DIGEST_SM3_LEN; in HksGetDigestLen()
Dhks_check_paramset.c1012 uint32_t digestLen; in CheckMacOutput()
1013 ret = HksGetDigestLen(digest, &digestLen); in CheckMacOutput()
1016 if (mac->size < digestLen) { in CheckMacOutput()
1021 …if ((isLocalCheck) && (key->size < digestLen)) { /* the unit of local engine input key size is byt… in CheckMacOutput()
Dhks_base_check.c1102 uint32_t digestLen; in CheckRsaOaepCipherData() local
1106 int32_t ret = HksGetDigestLen(digest, &digestLen); in CheckRsaOaepCipherData()
1113 if (keySize <= (HKS_RSA_OAEP_DIGEST_NUM * digestLen + HKS_RSA_OAEP_DIGEST_NUM)) { in CheckRsaOaepCipherData()
1116 uint32_t size = keySize - HKS_RSA_OAEP_DIGEST_NUM * digestLen - HKS_RSA_OAEP_DIGEST_NUM; in CheckRsaOaepCipherData()
1120 "digestLen: %" LOG_PUBLIC "u", inData->size, keySize, digestLen); in CheckRsaOaepCipherData()
/base/security/appverify/interfaces/innerkits/appverify/src/util/
Dhap_signing_block_utils.cpp450 int digestLen = HapVerifyOpensslUtils::GetDigest(chunkDigest, optionalBlocks, digestParam, out); in ComputeDigestsWithOptionalBlock() local
451 if (digestLen != digestParam.digestOutputSizeBytes) { in ComputeDigestsWithOptionalBlock()
453 digestLen, digestParam.digestOutputSizeBytes); in ComputeDigestsWithOptionalBlock()
519 int digestLen = HapVerifyOpensslUtils::GetDigest(digestParam, out); in ComputeDigestsForEachChunk() local
520 if (digestLen != digestParam.digestOutputSizeBytes) { in ComputeDigestsForEachChunk()
522 digestLen, digestParam.digestOutputSizeBytes); in ComputeDigestsForEachChunk()
526 offset += digestLen; in ComputeDigestsForEachChunk()
Dhap_verify_openssl_utils.cpp276 unsigned int digestLen; in VerifyShaWithRsaPss() local
277 if (EVP_DigestFinal_ex(mdCtxTmp, digest, &digestLen) <= 0) { in VerifyShaWithRsaPss()
285 if (!VerifyShaWithRsaPss(signInfo, pkey, isPss, digest, digestLen)) { in VerifyShaWithRsaPss()
315 unsigned int digestLen; in VerifyPkcs7AuthAttributes() local
316 if (EVP_DigestFinal_ex(mdCtx, digest, &digestLen) <= 0) { in VerifyPkcs7AuthAttributes()
322 if (!AsnStringCmp(digestInAttribute, digest, static_cast<int>(digestLen))) { in VerifyPkcs7AuthAttributes()
380 const unsigned char digest[], unsigned int digestLen) in VerifyShaWithRsaPss() argument
407 …erify(pkeyCtx, signInfo->enc_digest->data, signInfo->enc_digest->length, digest, digestLen) <= 0) { in VerifyShaWithRsaPss()
/base/update/updater/test/unittest/test_data/applypatch/
DTestDecompressGzip.new.gz
/base/security/huks/frameworks/huks_standard/main/common/include/
Dhks_common_check.h56 int32_t HksGetDigestLen(uint32_t digest, uint32_t *digestLen);
/base/update/updater/services/package/pkg_manager/
Dpkg_managerImpl.cpp648 size_t digestLen = DigestAlgorithm::GetDigestLen(digestMethod); in CreatePkgStream() local
690 … PkgBuffer result(digestInfos[DIGEST_INFO_HAS_SIGN].data(), digestLen); algorithm->Final(result)); in CreatePkgStream()
692 …PkgBuffer result(digestInfos[DIGEST_INFO_NO_SIGN].data(), digestLen); algorithmInner->Final(result… in CreatePkgStream()
727 size_t digestLen = DigestAlgorithm::GetDigestLen(info->digestMethod); in CreatePkgStream() local
729 digestInfos[DIGEST_INFO_HAS_SIGN].resize(digestLen); in CreatePkgStream()
748 PkgBuffer digest(digestInfos[DIGEST_INFO_HAS_SIGN].data(), digestLen); in CreatePkgStream()
889 size_t digestLen = DigestAlgorithm::GetDigestLen(digestMethod); in CreatePkgStream() local
891 if (digestLen != digest.length) { in CreatePkgStream()
897 digestInfos[DIGEST_INFO_HAS_SIGN].resize(digestLen); in CreatePkgStream()
898 digestInfos[DIGEST_INFO_NO_SIGN].resize(digestLen); in CreatePkgStream()
/base/update/updater/test/unittest/package/
Dpkg_algo_unittest.cpp104 constexpr size_t digestLen = 32; in TestInvalidParam() local
114 uint8_t dig2[digestLen]; in TestInvalidParam()
Dpackage_unittest.cpp53 constexpr uint32_t digestLen = 32; in TestInvalidCreatePackage() local
54 ret = VerifyPackage(nullptr, GetTestCertName(0).c_str(), nullptr, nullptr, digestLen); in TestInvalidCreatePackage()
/base/security/appverify/interfaces/innerkits/appverify/include/util/
Dhap_verify_openssl_utils.h75 const unsigned char digest[], unsigned int digestLen);
/base/security/huks/frameworks/huks_standard/main/core/src/
Dhks_local_engine.c52 uint32_t digestLen; in HksLocalHash()
53 ret = HksGetDigestLen(digestAlg->uint32Param, &digestLen); in HksLocalHash()
56 if (hash->size < digestLen) { in HksLocalHash()
/base/security/huks/services/huks_standard/huks_engine/main/core/src/
Dhks_core_service_three_stage.c76 uint32_t digestLen; in CheckRsaCipherData() local
77 int32_t ret = HksGetDigestLen(digest, &digestLen); in CheckRsaCipherData()
80 if (keySize <= (HKS_RSA_OAEP_DIGEST_NUM * digestLen + HKS_RSA_OAEP_DIGEST_NUM)) { in CheckRsaCipherData()
83 uint32_t size = keySize - HKS_RSA_OAEP_DIGEST_NUM * digestLen - HKS_RSA_OAEP_DIGEST_NUM; in CheckRsaCipherData()