Home
last modified time | relevance | path

Searched refs:q (Results 1 – 25 of 34) sorted by relevance

12

/base/security/selinux_adapter/
DCODEOWNERS16 # any change needs to be reviewed by @steven-q
17 interfaces/ @steven-q
18 scripts/ @steven-q
19 sepolicy/ @steven-q
20 test/ @steven-q
/base/startup/init/services/modules/init_eng/
Dinit_eng.c102 char *q = NULL; in BindMountFile() local
110 q = strchr(p + 1, '/'); in BindMountFile()
111 if (q == NULL) { in BindMountFile()
121 …rintf_s(targetFullPath, PATH_MAX, PATH_MAX - 1, "%s%s", strcmp(target, "/") == 0 ? "" : target, q); in BindMountFile()
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/
Dopenssl_dsa_helper.c85 BIGNUM *q = NULL; in InitDsa() local
99 q = BinToBN(key->data + offset, keyMaterial->qSize); in InitDsa()
117 if (DSA_set0_pqg(dsa, p, q, g) != 1) { in InitDsa()
128 FreeBN(q); in InitDsa()
366 const BIGNUM *q = DSA_get0_q(dsa); in SaveDsaKeyToHksBlob() local
369 if (x == NULL || y == NULL || p == NULL || q == NULL || g == NULL) { in SaveDsaKeyToHksBlob()
386 if (BN_bn2bin(q, key->data + offset + (keyMaterial->qSize - (uint32_t)BN_num_bytes(q))) <= 0) { in SaveDsaKeyToHksBlob()
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/standard/
Dcrypto_hash_to_point.c35 BIGNUM *q; member
95 para->q = BN_new(); in CurveInitConstPara()
107 BN_free(para->q); in CurveFreeConstPara()
220 if (BN_mod_exp(result, a, curvePara->q, curvePara->p, ctx) <= 0) { in CurveHashToPointCalcC()
223 if (BN_cmp(curvePara->q, result) > 0) { in CurveHashToPointCalcC()
258 if (BN_bin2bn(g_curveParamQ, KEY_BYTES_CURVE25519, para->q) == NULL) { in CurveSetConstPara()
/base/security/crypto_framework/test/unittest/src/
Dcrypto_dsa_asy_key_generator_by_spec_test.cpp246 static HcfDsaCommParamsSpec dsaCommonSpec = { .base = asySpecComm, .p = p_BN, .q = q_BN, .g = g_BN …
251 .q = q_BN,
260 .q = q_BN,
615 HcfBigInteger q = { .data = nullptr, .len = 0 }; variable
616 ret = keyPair->pubKey->getAsyKeySpecBigInteger(keyPair->pubKey, DSA_Q_BN, &q);
619 ASSERT_NE(q.data, nullptr);
620 ASSERT_NE(q.len, 0);
621 HcfFree(q.data);
799 HcfBigInteger q = { .data = nullptr, .len = 0 }; variable
800 ret = keyPair->priKey->getAsyKeySpecBigInteger(keyPair->priKey, DSA_Q_BN, &q);
[all …]
Dcrypto_dsa_exception_test.cpp187 static HcfDsaCommParamsSpec dsaCommonSpec = { .base = asySpecComm, .p = p_BN, .q = q_BN, .g = g_BN …
188 static HcfDsaCommParamsSpec dsaCommonSpecException = { .base = asySpecComm, .p = p_EXBN, .q = q_BN,…
192 BIGNUM *q = NULL; variable
198 ret = BigIntegerToBigNum(&q_BN, &q);
204 FreeCommSpecBn(p, q, g);
275 BIGNUM *q = NULL; variable
283 ret = ConvertCommSpec2Bn(&dsaCommonSpec, &p, &q, nullptr);
Dcrypto_dsa_asy_key_generator_test.cpp428 HcfBigInteger q = { .data = nullptr, .len = 0 }; variable
429 …sult ret = dsa2048KeyPair_->pubKey->getAsyKeySpecBigInteger(dsa2048KeyPair_->pubKey, DSA_Q_BN, &q);
432 ASSERT_NE(q.data, nullptr);
433 ASSERT_NE(q.len, 0);
434 HcfFree(q.data);
537 HcfBigInteger q = { .data = nullptr, .len = 0 }; variable
538 …sult ret = dsa2048KeyPair_->priKey->getAsyKeySpecBigInteger(dsa2048KeyPair_->priKey, DSA_Q_BN, &q);
541 ASSERT_NE(q.data, nullptr);
542 ASSERT_NE(q.len, 0);
543 HcfFree(q.data);
[all …]
Dcrypto_asy_key_generator_cov_test.cpp283 .base = dsaAsySpecNoAlg, .p = g_dsaCorrectPBn, .q = g_dsaCorrectQBn, .g = g_dsaCorrectGBn
286 .base = dsaAsySpecErrorAlg, .p = g_dsaCorrectPBn, .q = g_dsaCorrectQBn, .g = g_dsaCorrectGBn
289 .base = dsaAsySpecCommCorrect, .p = g_dsaNullPBn, .q = g_dsaCorrectQBn, .g = g_dsaCorrectGBn
292 .base = dsaAsySpecCommCorrect, .p = g_dsaNoLenPBn, .q = g_dsaCorrectQBn, .g = g_dsaCorrectGBn
295 .base = dsaAsySpecCommCorrect, .p = g_dsaCorrectPBn, .q = g_dsaNullQBn, .g = g_dsaCorrectGBn
298 .base = dsaAsySpecCommCorrect, .p = g_dsaCorrectPBn, .q = g_dsaNoLenQBn, .g = g_dsaCorrectGBn
301 .base = dsaAsySpecCommCorrect, .p = g_dsaCorrectPBn, .q = g_dsaCorrectQBn, .g = g_dsaNullGBn
304 .base = dsaAsySpecCommCorrect, .p = g_dsaCorrectPBn, .q = g_dsaCorrectQBn, .g = g_dsaNoLenGBn
311 .q = g_dsaCorrectQBn,
320 .q = g_dsaCorrectQBn,
[all …]
Dopenssl_adapter_mock.c753 int Openssl_DSA_set0_pqg(DSA *dsa, BIGNUM *p, BIGNUM *q, BIGNUM *g) in Openssl_DSA_set0_pqg() argument
758 return DSA_set0_pqg(dsa, p, q, g); in Openssl_DSA_set0_pqg()
900 void Openssl_RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q) in Openssl_RSA_get0_factors() argument
902 RSA_get0_factors(r, p, q); in Openssl_RSA_get0_factors()
/base/security/certificate_manager/config/systemCertificates/
D116bf586.013 BgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFBVfNVdRVfslsq0DafwBo/q+EVXVMAoG
D9c2e7d30.07 Z6m/AxxNjG8yR9VBaKQTBME1DJqEQ/xcHf+Js+gXGM2RX/uJ4+q/Tl18GybTdXnt
D1e09d511.019 IEoHNN/q/xWA5brXethbdXwFeilHfkCoMRN3zUA7tFFHei4R40cR3p1m0IvVVGb6
D09789157.016 DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJxfAN+q
D2ae6433e.020 hvcNAQELBQADggIBACYGXnDnZTPIgm7ZnBc6G3pmsgH2eDtpXi/q/075KMOYKmFM
/base/security/crypto_framework/plugin/openssl_plugin/key/asy_key_generator/src/
Ddsa_asy_key_generator_openssl.c54 static void FreeCommSpecBn(BIGNUM *p, BIGNUM *q, BIGNUM *g) in FreeCommSpecBn() argument
59 if (q != NULL) { in FreeCommSpecBn()
60 Openssl_BN_free(q); in FreeCommSpecBn()
530 static HcfResult ConvertCommSpec2Bn(const HcfDsaCommParamsSpec *paramsSpec, BIGNUM **p, BIGNUM **q,… in ConvertCommSpec2Bn() argument
536 if (BigIntegerToBigNum(&(paramsSpec->q), q) != HCF_SUCCESS) { in ConvertCommSpec2Bn()
546 Openssl_BN_free(*q); in ConvertCommSpec2Bn()
547 *q = NULL; in ConvertCommSpec2Bn()
556 BIGNUM *q = NULL; in CreateOpensslDsaKey() local
558 if (ConvertCommSpec2Bn(paramsSpec, &p, &q, &g)!= HCF_SUCCESS) { in CreateOpensslDsaKey()
563 FreeCommSpecBn(p, q, g); in CreateOpensslDsaKey()
[all …]
/base/hiviewdfx/hilog_lite/frameworks/featured/
Dhiview_log.c1181 SecUnsignedInt32 q; in HiLogSecOutputS()
1185 q = (n32Tmp >> 1) + (n32Tmp >> 2); in HiLogSecOutputS()
1186 q = q + (q >> 4); in HiLogSecOutputS()
1187 q = q + (q >> 8); in HiLogSecOutputS()
1188 q = q + (q >> 16); in HiLogSecOutputS()
1189 q = q >> 3; in HiLogSecOutputS()
1190 r = n32Tmp - (((q << 2) + q) << 1); in HiLogSecOutputS()
1191 n32Tmp = (r > 9) ? (q + 1) : q; in HiLogSecOutputS()
/base/security/crypto_framework/interfaces/innerkits/algorithm_parameter/
Ddetailed_dsa_key_params.h27 HcfBigInteger q; member
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/
Dhks_openssl_dsa.c108 BIGNUM *q = BN_bin2bn(buff, keyMaterial->qSize, NULL); in InitDsaStructParameter() local
114 SELF_FREE_PTR(q, BN_free); in InitDsaStructParameter()
119 if (DSA_set0_pqg(dsa, p, q, g) != HKS_OPENSSL_SUCCESS) { in InitDsaStructParameter()
121 SELF_FREE_PTR(q, BN_free); in InitDsaStructParameter()
207 const BIGNUM *q = DSA_get0_q(dsa); in DsaKeyMaterialData() local
229 ret = BN_bn2bin(q, rawMaterial + offset + (keyMaterial->qSize - (uint32_t)BN_num_bytes(q))); in DsaKeyMaterialData()
/base/startup/init/interfaces/innerkits/fs_manager/
Dfstab.c535 const char *q = item + strlen(OHOS_REQUIRED_MOUNT_PREFIX); // Get partition name in ParseRequiredMountInfo() local
536 BEGET_CHECK(!(q == NULL || *q == '\0' || (p - q) <= 0), return -1); in ParseRequiredMountInfo()
537 BEGET_ERROR_CHECK(strncpy_s(partName, NAME_SIZE -1, q, p - q) == EOK, in ParseRequiredMountInfo()
/base/security/huks/utils/crypto_adapter/
Dhks_client_service_adapter.c319 …const struct HksBlob *publicKey, struct HksBlob *y, struct HksBlob *p, struct HksBlob *q, struct H… in GetDsaPubKeyParam() argument
340 q->size = keyMaterial->qSize; in GetDsaPubKeyParam()
341 q->data = publicKey->data + offset; in GetDsaPubKeyParam()
348 …t32_t DsaToX509PublicKey(const struct HksBlob *y, const struct HksBlob *p, const struct HksBlob *q, in DsaToX509PublicKey() argument
355 BIGNUM *dsaQ = BN_bin2bn(q->data, q->size, NULL); in DsaToX509PublicKey()
404 struct HksBlob q = {0}; in DsaPublicKeyToX509() local
406 int32_t ret = GetDsaPubKeyParam(publicKey, &y, &p, &q, &g); in DsaPublicKeyToX509()
409 return DsaToX509PublicKey(&y, &p, &q, &g, x509Key); in DsaPublicKeyToX509()
756 const BIGNUM *q = NULL; in X509PublicKeyToDsa() local
765 GetDsaKeyInfo(dsa, &q, &qSize, DSA_get0_q) != HKS_SUCCESS || in X509PublicKeyToDsa()
[all …]
/base/security/crypto_framework/frameworks/key/
Dasy_key_generator.c101 if ((paramsSpec->q.data == NULL) || (paramsSpec->q.len == 0)) { in IsDsaCommParamsSpecValid()
431 destSpec->q.data = (unsigned char *)HcfMalloc(srcSpec->q.len, 0); in CopyDsaCommonSpec()
432 if (destSpec->q.data == NULL) { in CopyDsaCommonSpec()
444 (void)memcpy_s(destSpec->q.data, srcSpec->q.len, srcSpec->q.data, srcSpec->q.len); in CopyDsaCommonSpec()
447 destSpec->q.len = srcSpec->q.len; in CopyDsaCommonSpec()
/base/hiviewdfx/hilog/frameworks/libhilog/vsnprintf/
Doutput_p.inl211 case SECUREC_CHAR('q'): [[fallthrough]];
439 7: 'h', 'l', 'L', 'F', 'w' , 'N','z','q','t','j'
1074 SecUnsignedInt32 q;
1078 q = (n32Tmp >> 1) + (n32Tmp >> 2);
1079 q = q + (q >> 4);
1080 q = q + (q >> 8);
1081 q = q + (q >> 16);
1082 q = q >> 3;
1083 r = n32Tmp - (((q << 2) + q) << 1);
1084 n32Tmp = (r > 9) ? (q + 1) : q;
/base/security/crypto_framework/common/src/
Dasy_key_params.c42 HcfFree(spec->q.data); in FreeDsaCommParamsSpec()
43 spec->q.data = NULL; in FreeDsaCommParamsSpec()
/base/security/crypto_framework/plugin/openssl_plugin/common/src/
Dopenssl_adapter.c474 int Openssl_DSA_set0_pqg(DSA *dsa, BIGNUM *p, BIGNUM *q, BIGNUM *g) in Openssl_DSA_set0_pqg() argument
476 return DSA_set0_pqg(dsa, p, q, g); in Openssl_DSA_set0_pqg()
585 void Openssl_RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q) in Openssl_RSA_get0_factors() argument
587 RSA_get0_factors(r, p, q); in Openssl_RSA_get0_factors()
/base/security/crypto_framework/test/fuzztest/key/asykeygenerator_fuzzer/
Dasykeygenerator_fuzzer.cpp261 …static HcfDsaCommParamsSpec dsaCommonSpec = { .base = asySpecComm, .p = p_BN, .q = q_BN, .g = g_BN…
266 .q = q_BN,
275 .q = q_BN,

12