/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
D | hks_openssl_hmac.c | 39 uint32_t digestLen; member 81 uint32_t digestLen; in HmacCheckParam() local 82 HKS_IF_NOT_SUCC_LOGE_RETURN(HksGetDigestLen(alg, &digestLen), in HmacCheckParam() 85 if (mac->size < digestLen) { in HmacCheckParam() 86 …E("invalid mac->size(0x%" LOG_PUBLIC "x) for digestLen(0x%" LOG_PUBLIC "x)", mac->size, digestLen); in HmacCheckParam() 131 uint32_t digestLen; in HksOpensslHmacInit() 132 HKS_IF_NOT_SUCC_LOGE_RETURN(HksGetDigestLen(digestAlg, &digestLen), in HksOpensslHmacInit() 154 outCtx->digestLen = digestLen; in HksOpensslHmacInit()
|
D | hks_openssl_ed25519tox25519.c | 388 uint32_t digestLen = ED25519_FIX_KEY_BUFFER_SIZE; in ConvertPrivX25519FromED25519() local 390 if (EVP_Digest(input, inputLen, digest, &digestLen, EVP_sha512(), NULL) <= 0) { in ConvertPrivX25519FromED25519() 396 digestLen / 2) != EOK) { // 2 : used to calculate half of the digest length in ConvertPrivX25519FromED25519() 397 (void)memset_s(digest, digestLen, 0, digestLen); in ConvertPrivX25519FromED25519() 407 (void)memset_s(digest, digestLen, 0, digestLen); in ConvertPrivX25519FromED25519()
|
/base/security/huks/frameworks/huks_standard/main/common/src/ |
D | hks_common_check.c | 102 int32_t HksGetDigestLen(uint32_t digest, uint32_t *digestLen) in HksGetDigestLen() argument 106 *digestLen = HKS_DIGEST_MD5_LEN; in HksGetDigestLen() 109 *digestLen = HKS_DIGEST_SHA1_LEN; in HksGetDigestLen() 112 *digestLen = HKS_DIGEST_SHA224_LEN; in HksGetDigestLen() 115 *digestLen = HKS_DIGEST_SHA256_LEN; in HksGetDigestLen() 118 *digestLen = HKS_DIGEST_SHA384_LEN; in HksGetDigestLen() 121 *digestLen = HKS_DIGEST_SHA512_LEN; in HksGetDigestLen() 124 *digestLen = HKS_DIGEST_SM3_LEN; in HksGetDigestLen()
|
D | hks_check_paramset.c | 1032 uint32_t digestLen; in CheckMacOutput() 1033 ret = HksGetDigestLen(digest, &digestLen); in CheckMacOutput() 1036 if (mac->size < digestLen) { in CheckMacOutput() 1041 …if ((isLocalCheck) && (key->size < digestLen)) { /* the unit of local engine input key size is byt… in CheckMacOutput()
|
D | hks_base_check.c | 1189 uint32_t digestLen; in CheckRsaOaepCipherData() local 1193 int32_t ret = HksGetDigestLen(digest, &digestLen); in CheckRsaOaepCipherData() 1200 if (keySize <= (HKS_RSA_OAEP_DIGEST_NUM * digestLen + HKS_RSA_OAEP_DIGEST_NUM)) { in CheckRsaOaepCipherData() 1203 uint32_t size = keySize - HKS_RSA_OAEP_DIGEST_NUM * digestLen - HKS_RSA_OAEP_DIGEST_NUM; in CheckRsaOaepCipherData() 1207 "digestLen: %" LOG_PUBLIC "u", inData->size, keySize, digestLen); in CheckRsaOaepCipherData()
|
/base/update/updater/services/package/pkg_verify/ |
D | pkg_verify_util.cpp | 130 size_t digestLen = hash.size(); in HashCheck() local 131 if (digestLen != PKG_HASH_CONTENT_LEN) { in HashCheck() 136 std::vector<uint8_t> sourceDigest(digestLen); in HashCheck() 144 if (memcmp(hash.data(), sourceDigest.data(), digestLen) != EOK) { in HashCheck()
|
D | pkcs7_signed_data.cpp | 249 size_t digestLen = static_cast<size_t>(ReadLE16(digestBlock.data() + offset)); in GetDigestFromContentInfo() local 251 if ((GetDigestLength(algoId) != digestLen) || ((digestLen + offset) != digestBlock.size())) { in GetDigestFromContentInfo() 252 PKG_LOGE("invalid digestLen[%zu] and digestBlock len[%zu]", digestLen, digestBlock.size()); in GetDigestFromContentInfo()
|
/base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/crypto_engine_test/include/ |
D | hks_openssl_hmac_test.h | 22 uint32_t digestLen; member
|
/base/security/code_signature/utils/src/ |
D | fsverity_utils_helper.cpp | 101 uint32_t digestLen = sizeof(struct fsverity_formatted_digest) + digest->digest_size; in GenerateFormattedDigest() local 102 if (!digestBuffer.Resize(digestLen)) { in GenerateFormattedDigest()
|
/base/security/appverify/interfaces/innerkits/appverify/src/util/ |
D | hap_verify_openssl_utils.cpp | 276 uint32_t digestLen; in VerifyShaWithRsaPss() local 277 if (EVP_DigestFinal_ex(mdCtxTmp, digest, &digestLen) <= 0) { in VerifyShaWithRsaPss() 285 if (!VerifyShaWithRsaPss(signInfo, pkey, isPss, digest, digestLen)) { in VerifyShaWithRsaPss() 316 uint32_t digestLen; in VerifyPkcs7AuthAttributes() local 317 if (EVP_DigestFinal_ex(mdCtx, digest, &digestLen) <= 0) { in VerifyPkcs7AuthAttributes() 323 if (!AsnStringCmp(digestInAttribute, digest, static_cast<int>(digestLen))) { in VerifyPkcs7AuthAttributes() 381 const unsigned char digest[], uint32_t digestLen) in VerifyShaWithRsaPss() argument 408 …erify(pkeyCtx, signInfo->enc_digest->data, signInfo->enc_digest->length, digest, digestLen) <= 0) { in VerifyShaWithRsaPss()
|
D | hap_signing_block_utils.cpp | 461 …int32_t digestLen = HapVerifyOpensslUtils::GetDigest(chunkDigest, optionalBlocks, digestParam, out… in ComputeDigestsWithOptionalBlock() local 462 if (digestLen != digestParam.digestOutputSizeBytes) { in ComputeDigestsWithOptionalBlock() 464 digestLen, digestParam.digestOutputSizeBytes); in ComputeDigestsWithOptionalBlock() 530 int32_t digestLen = HapVerifyOpensslUtils::GetDigest(digestParam, out); in ComputeDigestsForEachChunk() local 531 if (digestLen != digestParam.digestOutputSizeBytes) { in ComputeDigestsForEachChunk() 533 digestLen, digestParam.digestOutputSizeBytes); in ComputeDigestsForEachChunk() 537 offset += digestLen; in ComputeDigestsForEachChunk()
|
/base/update/updater/test/unittest/test_data/applypatch/ |
D | TestDecompressGzip.new.gz |
|
/base/security/huks/test/unittest/huks_standard_test/module_test/framework_test/crypto_engine_test/src/ |
D | hks_openssl_hmac_test.cpp | 104 hmacCtx->digestLen = HKS_ALG_AES;
|
/base/security/huks/frameworks/huks_standard/main/common/include/ |
D | hks_common_check.h | 57 int32_t HksGetDigestLen(uint32_t digest, uint32_t *digestLen);
|
/base/update/updater/test/unittest/package/ |
D | pkg_algo_unittest.cpp | 104 constexpr size_t digestLen = 32; in TestInvalidParam() local 114 uint8_t dig2[digestLen]; in TestInvalidParam()
|
D | package_unittest.cpp | 53 constexpr uint32_t digestLen = 32; in TestInvalidCreatePackage() local 54 ret = VerifyPackage(nullptr, GetTestCertName(0).c_str(), nullptr, nullptr, digestLen); in TestInvalidCreatePackage()
|
/base/update/updater/services/package/pkg_manager/ |
D | pkg_managerImpl.cpp | 767 size_t digestLen = DigestAlgorithm::GetDigestLen(digestMethod); in DoCreatePkgStream() local 791 PkgBuffer result(digestInfos[DIGEST_INFO_HAS_SIGN].data(), digestLen); in DoCreatePkgStream() 795 PkgBuffer result(digestInfos[DIGEST_INFO_NO_SIGN].data(), digestLen); in DoCreatePkgStream() 834 size_t digestLen = DigestAlgorithm::GetDigestLen(info->digestMethod); in DoCreatePkgStream() local 836 digestInfos[DIGEST_INFO_HAS_SIGN].resize(digestLen); in DoCreatePkgStream() 855 PkgBuffer digest(digestInfos[DIGEST_INFO_HAS_SIGN].data(), digestLen); in DoCreatePkgStream() 998 size_t digestLen = DigestAlgorithm::GetDigestLen(digestMethod); in DoCreatePkgStream() local 1000 if (digestLen != digest.length) { in DoCreatePkgStream() 1006 digestInfos[DIGEST_INFO_HAS_SIGN].resize(digestLen); in DoCreatePkgStream() 1007 digestInfos[DIGEST_INFO_NO_SIGN].resize(digestLen); in DoCreatePkgStream()
|
/base/security/appverify/interfaces/innerkits/appverify/include/util/ |
D | hap_verify_openssl_utils.h | 75 const unsigned char digest[], uint32_t digestLen);
|
/base/security/huks/frameworks/huks_standard/main/core/src/ |
D | hks_local_engine.c | 52 uint32_t digestLen; in HksLocalHash() 53 ret = HksGetDigestLen(digestAlg->uint32Param, &digestLen); in HksLocalHash() 56 if (hash->size < digestLen) { in HksLocalHash()
|
/base/security/huks/services/huks_standard/huks_engine/main/core/src/ |
D | hks_core_service_three_stage.c | 72 uint32_t digestLen; in CheckRsaCipherData() local 73 int32_t ret = HksGetDigestLen(digest, &digestLen); in CheckRsaCipherData() 76 if (keySize <= (HKS_RSA_OAEP_DIGEST_NUM * digestLen + HKS_RSA_OAEP_DIGEST_NUM)) { in CheckRsaCipherData() 80 uint32_t size = keySize - HKS_RSA_OAEP_DIGEST_NUM * digestLen - HKS_RSA_OAEP_DIGEST_NUM; in CheckRsaCipherData()
|