Home
last modified time | relevance | path

Searched refs:digestLen (Results 1 – 20 of 20) sorted by relevance

/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/
Dhks_openssl_hmac.c39 uint32_t digestLen; member
81 uint32_t digestLen; in HmacCheckParam() local
82 HKS_IF_NOT_SUCC_LOGE_RETURN(HksGetDigestLen(alg, &digestLen), in HmacCheckParam()
85 if (mac->size < digestLen) { in HmacCheckParam()
86 …E("invalid mac->size(0x%" LOG_PUBLIC "x) for digestLen(0x%" LOG_PUBLIC "x)", mac->size, digestLen); in HmacCheckParam()
131 uint32_t digestLen; in HksOpensslHmacInit()
132 HKS_IF_NOT_SUCC_LOGE_RETURN(HksGetDigestLen(digestAlg, &digestLen), in HksOpensslHmacInit()
154 outCtx->digestLen = digestLen; in HksOpensslHmacInit()
Dhks_openssl_ed25519tox25519.c388 uint32_t digestLen = ED25519_FIX_KEY_BUFFER_SIZE; in ConvertPrivX25519FromED25519() local
390 if (EVP_Digest(input, inputLen, digest, &digestLen, EVP_sha512(), NULL) <= 0) { in ConvertPrivX25519FromED25519()
396 digestLen / 2) != EOK) { // 2 : used to calculate half of the digest length in ConvertPrivX25519FromED25519()
397 (void)memset_s(digest, digestLen, 0, digestLen); in ConvertPrivX25519FromED25519()
407 (void)memset_s(digest, digestLen, 0, digestLen); in ConvertPrivX25519FromED25519()
/base/security/huks/frameworks/huks_standard/main/common/src/
Dhks_common_check.c102 int32_t HksGetDigestLen(uint32_t digest, uint32_t *digestLen) in HksGetDigestLen() argument
106 *digestLen = HKS_DIGEST_MD5_LEN; in HksGetDigestLen()
109 *digestLen = HKS_DIGEST_SHA1_LEN; in HksGetDigestLen()
112 *digestLen = HKS_DIGEST_SHA224_LEN; in HksGetDigestLen()
115 *digestLen = HKS_DIGEST_SHA256_LEN; in HksGetDigestLen()
118 *digestLen = HKS_DIGEST_SHA384_LEN; in HksGetDigestLen()
121 *digestLen = HKS_DIGEST_SHA512_LEN; in HksGetDigestLen()
124 *digestLen = HKS_DIGEST_SM3_LEN; in HksGetDigestLen()
Dhks_check_paramset.c1032 uint32_t digestLen; in CheckMacOutput()
1033 ret = HksGetDigestLen(digest, &digestLen); in CheckMacOutput()
1036 if (mac->size < digestLen) { in CheckMacOutput()
1041 …if ((isLocalCheck) && (key->size < digestLen)) { /* the unit of local engine input key size is byt… in CheckMacOutput()
Dhks_base_check.c1189 uint32_t digestLen; in CheckRsaOaepCipherData() local
1193 int32_t ret = HksGetDigestLen(digest, &digestLen); in CheckRsaOaepCipherData()
1200 if (keySize <= (HKS_RSA_OAEP_DIGEST_NUM * digestLen + HKS_RSA_OAEP_DIGEST_NUM)) { in CheckRsaOaepCipherData()
1203 uint32_t size = keySize - HKS_RSA_OAEP_DIGEST_NUM * digestLen - HKS_RSA_OAEP_DIGEST_NUM; in CheckRsaOaepCipherData()
1207 "digestLen: %" LOG_PUBLIC "u", inData->size, keySize, digestLen); in CheckRsaOaepCipherData()
/base/update/updater/services/package/pkg_verify/
Dpkg_verify_util.cpp130 size_t digestLen = hash.size(); in HashCheck() local
131 if (digestLen != PKG_HASH_CONTENT_LEN) { in HashCheck()
136 std::vector<uint8_t> sourceDigest(digestLen); in HashCheck()
144 if (memcmp(hash.data(), sourceDigest.data(), digestLen) != EOK) { in HashCheck()
Dpkcs7_signed_data.cpp249 size_t digestLen = static_cast<size_t>(ReadLE16(digestBlock.data() + offset)); in GetDigestFromContentInfo() local
251 if ((GetDigestLength(algoId) != digestLen) || ((digestLen + offset) != digestBlock.size())) { in GetDigestFromContentInfo()
252 PKG_LOGE("invalid digestLen[%zu] and digestBlock len[%zu]", digestLen, digestBlock.size()); in GetDigestFromContentInfo()
/base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/crypto_engine_test/include/
Dhks_openssl_hmac_test.h22 uint32_t digestLen; member
/base/security/code_signature/utils/src/
Dfsverity_utils_helper.cpp101 uint32_t digestLen = sizeof(struct fsverity_formatted_digest) + digest->digest_size; in GenerateFormattedDigest() local
102 if (!digestBuffer.Resize(digestLen)) { in GenerateFormattedDigest()
/base/security/appverify/interfaces/innerkits/appverify/src/util/
Dhap_verify_openssl_utils.cpp276 uint32_t digestLen; in VerifyShaWithRsaPss() local
277 if (EVP_DigestFinal_ex(mdCtxTmp, digest, &digestLen) <= 0) { in VerifyShaWithRsaPss()
285 if (!VerifyShaWithRsaPss(signInfo, pkey, isPss, digest, digestLen)) { in VerifyShaWithRsaPss()
316 uint32_t digestLen; in VerifyPkcs7AuthAttributes() local
317 if (EVP_DigestFinal_ex(mdCtx, digest, &digestLen) <= 0) { in VerifyPkcs7AuthAttributes()
323 if (!AsnStringCmp(digestInAttribute, digest, static_cast<int>(digestLen))) { in VerifyPkcs7AuthAttributes()
381 const unsigned char digest[], uint32_t digestLen) in VerifyShaWithRsaPss() argument
408 …erify(pkeyCtx, signInfo->enc_digest->data, signInfo->enc_digest->length, digest, digestLen) <= 0) { in VerifyShaWithRsaPss()
Dhap_signing_block_utils.cpp461 …int32_t digestLen = HapVerifyOpensslUtils::GetDigest(chunkDigest, optionalBlocks, digestParam, out… in ComputeDigestsWithOptionalBlock() local
462 if (digestLen != digestParam.digestOutputSizeBytes) { in ComputeDigestsWithOptionalBlock()
464 digestLen, digestParam.digestOutputSizeBytes); in ComputeDigestsWithOptionalBlock()
530 int32_t digestLen = HapVerifyOpensslUtils::GetDigest(digestParam, out); in ComputeDigestsForEachChunk() local
531 if (digestLen != digestParam.digestOutputSizeBytes) { in ComputeDigestsForEachChunk()
533 digestLen, digestParam.digestOutputSizeBytes); in ComputeDigestsForEachChunk()
537 offset += digestLen; in ComputeDigestsForEachChunk()
/base/update/updater/test/unittest/test_data/applypatch/
DTestDecompressGzip.new.gz1/* 2 * Copyright (c) 2021 Huawei Device Co., Ltd. 3 * ...
/base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/crypto_engine_test/src/
Dhks_openssl_hmac_test.cpp104 hmacCtx->digestLen = HKS_ALG_AES;
/base/security/huks/frameworks/huks_standard/main/common/include/
Dhks_common_check.h57 int32_t HksGetDigestLen(uint32_t digest, uint32_t *digestLen);
/base/update/updater/test/unittest/package/
Dpkg_algo_unittest.cpp104 constexpr size_t digestLen = 32; in TestInvalidParam() local
114 uint8_t dig2[digestLen]; in TestInvalidParam()
Dpackage_unittest.cpp53 constexpr uint32_t digestLen = 32; in TestInvalidCreatePackage() local
54 ret = VerifyPackage(nullptr, GetTestCertName(0).c_str(), nullptr, nullptr, digestLen); in TestInvalidCreatePackage()
/base/update/updater/services/package/pkg_manager/
Dpkg_managerImpl.cpp767 size_t digestLen = DigestAlgorithm::GetDigestLen(digestMethod); in DoCreatePkgStream() local
791 PkgBuffer result(digestInfos[DIGEST_INFO_HAS_SIGN].data(), digestLen); in DoCreatePkgStream()
795 PkgBuffer result(digestInfos[DIGEST_INFO_NO_SIGN].data(), digestLen); in DoCreatePkgStream()
834 size_t digestLen = DigestAlgorithm::GetDigestLen(info->digestMethod); in DoCreatePkgStream() local
836 digestInfos[DIGEST_INFO_HAS_SIGN].resize(digestLen); in DoCreatePkgStream()
855 PkgBuffer digest(digestInfos[DIGEST_INFO_HAS_SIGN].data(), digestLen); in DoCreatePkgStream()
998 size_t digestLen = DigestAlgorithm::GetDigestLen(digestMethod); in DoCreatePkgStream() local
1000 if (digestLen != digest.length) { in DoCreatePkgStream()
1006 digestInfos[DIGEST_INFO_HAS_SIGN].resize(digestLen); in DoCreatePkgStream()
1007 digestInfos[DIGEST_INFO_NO_SIGN].resize(digestLen); in DoCreatePkgStream()
/base/security/appverify/interfaces/innerkits/appverify/include/util/
Dhap_verify_openssl_utils.h75 const unsigned char digest[], uint32_t digestLen);
/base/security/huks/frameworks/huks_standard/main/core/src/
Dhks_local_engine.c52 uint32_t digestLen; in HksLocalHash()
53 ret = HksGetDigestLen(digestAlg->uint32Param, &digestLen); in HksLocalHash()
56 if (hash->size < digestLen) { in HksLocalHash()
/base/security/huks/services/huks_standard/huks_engine/main/core/src/
Dhks_core_service_three_stage.c72 uint32_t digestLen; in CheckRsaCipherData() local
73 int32_t ret = HksGetDigestLen(digest, &digestLen); in CheckRsaCipherData()
76 if (keySize <= (HKS_RSA_OAEP_DIGEST_NUM * digestLen + HKS_RSA_OAEP_DIGEST_NUM)) { in CheckRsaCipherData()
80 uint32_t size = keySize - HKS_RSA_OAEP_DIGEST_NUM * digestLen - HKS_RSA_OAEP_DIGEST_NUM; in CheckRsaCipherData()