/base/security/selinux_adapter/ |
D | CODEOWNERS | 16 # any change needs to be reviewed by @steven-q 17 interfaces/ @steven-q 18 scripts/ @steven-q 19 sepolicy/ @steven-q 20 test/ @steven-q
|
/base/startup/init/services/modules/init_eng/ |
D | init_eng.c | 102 char *q = NULL; in BindMountFile() local 110 q = strchr(p + 1, '/'); in BindMountFile() 111 if (q == NULL) { in BindMountFile() 121 …rintf_s(targetFullPath, PATH_MAX, PATH_MAX - 1, "%s%s", strcmp(target, "/") == 0 ? "" : target, q); in BindMountFile()
|
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/ |
D | openssl_dsa_helper.c | 85 BIGNUM *q = NULL; in InitDsa() local 99 q = BinToBN(key->data + offset, keyMaterial->qSize); in InitDsa() 117 if (DSA_set0_pqg(dsa, p, q, g) != 1) { in InitDsa() 128 FreeBN(q); in InitDsa() 366 const BIGNUM *q = DSA_get0_q(dsa); in SaveDsaKeyToHksBlob() local 369 if (x == NULL || y == NULL || p == NULL || q == NULL || g == NULL) { in SaveDsaKeyToHksBlob() 386 if (BN_bn2bin(q, key->data + offset + (keyMaterial->qSize - (uint32_t)BN_num_bytes(q))) <= 0) { in SaveDsaKeyToHksBlob()
|
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/standard/ |
D | crypto_hash_to_point.c | 35 BIGNUM *q; member 95 para->q = BN_new(); in CurveInitConstPara() 107 BN_free(para->q); in CurveFreeConstPara() 220 if (BN_mod_exp(result, a, curvePara->q, curvePara->p, ctx) <= 0) { in CurveHashToPointCalcC() 223 if (BN_cmp(curvePara->q, result) > 0) { in CurveHashToPointCalcC() 258 if (BN_bin2bn(g_curveParamQ, KEY_BYTES_CURVE25519, para->q) == NULL) { in CurveSetConstPara()
|
/base/security/crypto_framework/test/unittest/src/ |
D | crypto_dsa_asy_key_generator_by_spec_test.cpp | 246 static HcfDsaCommParamsSpec dsaCommonSpec = { .base = asySpecComm, .p = p_BN, .q = q_BN, .g = g_BN … 251 .q = q_BN, 260 .q = q_BN, 615 HcfBigInteger q = { .data = nullptr, .len = 0 }; variable 616 ret = keyPair->pubKey->getAsyKeySpecBigInteger(keyPair->pubKey, DSA_Q_BN, &q); 619 ASSERT_NE(q.data, nullptr); 620 ASSERT_NE(q.len, 0); 621 HcfFree(q.data); 799 HcfBigInteger q = { .data = nullptr, .len = 0 }; variable 800 ret = keyPair->priKey->getAsyKeySpecBigInteger(keyPair->priKey, DSA_Q_BN, &q); [all …]
|
D | crypto_dsa_exception_test.cpp | 187 static HcfDsaCommParamsSpec dsaCommonSpec = { .base = asySpecComm, .p = p_BN, .q = q_BN, .g = g_BN … 188 static HcfDsaCommParamsSpec dsaCommonSpecException = { .base = asySpecComm, .p = p_EXBN, .q = q_BN,… 192 BIGNUM *q = NULL; variable 198 ret = BigIntegerToBigNum(&q_BN, &q); 204 FreeCommSpecBn(p, q, g); 275 BIGNUM *q = NULL; variable 283 ret = ConvertCommSpec2Bn(&dsaCommonSpec, &p, &q, nullptr);
|
D | crypto_dsa_asy_key_generator_test.cpp | 428 HcfBigInteger q = { .data = nullptr, .len = 0 }; variable 429 …sult ret = dsa2048KeyPair_->pubKey->getAsyKeySpecBigInteger(dsa2048KeyPair_->pubKey, DSA_Q_BN, &q); 432 ASSERT_NE(q.data, nullptr); 433 ASSERT_NE(q.len, 0); 434 HcfFree(q.data); 537 HcfBigInteger q = { .data = nullptr, .len = 0 }; variable 538 …sult ret = dsa2048KeyPair_->priKey->getAsyKeySpecBigInteger(dsa2048KeyPair_->priKey, DSA_Q_BN, &q); 541 ASSERT_NE(q.data, nullptr); 542 ASSERT_NE(q.len, 0); 543 HcfFree(q.data); [all …]
|
D | crypto_asy_key_generator_cov_test.cpp | 283 .base = dsaAsySpecNoAlg, .p = g_dsaCorrectPBn, .q = g_dsaCorrectQBn, .g = g_dsaCorrectGBn 286 .base = dsaAsySpecErrorAlg, .p = g_dsaCorrectPBn, .q = g_dsaCorrectQBn, .g = g_dsaCorrectGBn 289 .base = dsaAsySpecCommCorrect, .p = g_dsaNullPBn, .q = g_dsaCorrectQBn, .g = g_dsaCorrectGBn 292 .base = dsaAsySpecCommCorrect, .p = g_dsaNoLenPBn, .q = g_dsaCorrectQBn, .g = g_dsaCorrectGBn 295 .base = dsaAsySpecCommCorrect, .p = g_dsaCorrectPBn, .q = g_dsaNullQBn, .g = g_dsaCorrectGBn 298 .base = dsaAsySpecCommCorrect, .p = g_dsaCorrectPBn, .q = g_dsaNoLenQBn, .g = g_dsaCorrectGBn 301 .base = dsaAsySpecCommCorrect, .p = g_dsaCorrectPBn, .q = g_dsaCorrectQBn, .g = g_dsaNullGBn 304 .base = dsaAsySpecCommCorrect, .p = g_dsaCorrectPBn, .q = g_dsaCorrectQBn, .g = g_dsaNoLenGBn 311 .q = g_dsaCorrectQBn, 320 .q = g_dsaCorrectQBn, [all …]
|
D | openssl_adapter_mock.c | 753 int Openssl_DSA_set0_pqg(DSA *dsa, BIGNUM *p, BIGNUM *q, BIGNUM *g) in Openssl_DSA_set0_pqg() argument 758 return DSA_set0_pqg(dsa, p, q, g); in Openssl_DSA_set0_pqg() 900 void Openssl_RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q) in Openssl_RSA_get0_factors() argument 902 RSA_get0_factors(r, p, q); in Openssl_RSA_get0_factors()
|
/base/security/certificate_manager/config/systemCertificates/ |
D | 116bf586.0 | 13 BgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFBVfNVdRVfslsq0DafwBo/q+EVXVMAoG
|
D | 9c2e7d30.0 | 7 Z6m/AxxNjG8yR9VBaKQTBME1DJqEQ/xcHf+Js+gXGM2RX/uJ4+q/Tl18GybTdXnt
|
D | 1e09d511.0 | 19 IEoHNN/q/xWA5brXethbdXwFeilHfkCoMRN3zUA7tFFHei4R40cR3p1m0IvVVGb6
|
D | 09789157.0 | 16 DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJxfAN+q
|
D | 2ae6433e.0 | 20 hvcNAQELBQADggIBACYGXnDnZTPIgm7ZnBc6G3pmsgH2eDtpXi/q/075KMOYKmFM
|
/base/security/crypto_framework/plugin/openssl_plugin/key/asy_key_generator/src/ |
D | dsa_asy_key_generator_openssl.c | 54 static void FreeCommSpecBn(BIGNUM *p, BIGNUM *q, BIGNUM *g) in FreeCommSpecBn() argument 59 if (q != NULL) { in FreeCommSpecBn() 60 Openssl_BN_free(q); in FreeCommSpecBn() 530 static HcfResult ConvertCommSpec2Bn(const HcfDsaCommParamsSpec *paramsSpec, BIGNUM **p, BIGNUM **q,… in ConvertCommSpec2Bn() argument 536 if (BigIntegerToBigNum(&(paramsSpec->q), q) != HCF_SUCCESS) { in ConvertCommSpec2Bn() 546 Openssl_BN_free(*q); in ConvertCommSpec2Bn() 547 *q = NULL; in ConvertCommSpec2Bn() 556 BIGNUM *q = NULL; in CreateOpensslDsaKey() local 558 if (ConvertCommSpec2Bn(paramsSpec, &p, &q, &g)!= HCF_SUCCESS) { in CreateOpensslDsaKey() 563 FreeCommSpecBn(p, q, g); in CreateOpensslDsaKey() [all …]
|
/base/hiviewdfx/hilog_lite/frameworks/featured/ |
D | hiview_log.c | 1181 SecUnsignedInt32 q; in HiLogSecOutputS() 1185 q = (n32Tmp >> 1) + (n32Tmp >> 2); in HiLogSecOutputS() 1186 q = q + (q >> 4); in HiLogSecOutputS() 1187 q = q + (q >> 8); in HiLogSecOutputS() 1188 q = q + (q >> 16); in HiLogSecOutputS() 1189 q = q >> 3; in HiLogSecOutputS() 1190 r = n32Tmp - (((q << 2) + q) << 1); in HiLogSecOutputS() 1191 n32Tmp = (r > 9) ? (q + 1) : q; in HiLogSecOutputS()
|
/base/security/crypto_framework/interfaces/innerkits/algorithm_parameter/ |
D | detailed_dsa_key_params.h | 27 HcfBigInteger q; member
|
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
D | hks_openssl_dsa.c | 108 BIGNUM *q = BN_bin2bn(buff, keyMaterial->qSize, NULL); in InitDsaStructParameter() local 114 SELF_FREE_PTR(q, BN_free); in InitDsaStructParameter() 119 if (DSA_set0_pqg(dsa, p, q, g) != HKS_OPENSSL_SUCCESS) { in InitDsaStructParameter() 121 SELF_FREE_PTR(q, BN_free); in InitDsaStructParameter() 207 const BIGNUM *q = DSA_get0_q(dsa); in DsaKeyMaterialData() local 229 ret = BN_bn2bin(q, rawMaterial + offset + (keyMaterial->qSize - (uint32_t)BN_num_bytes(q))); in DsaKeyMaterialData()
|
/base/startup/init/interfaces/innerkits/fs_manager/ |
D | fstab.c | 535 const char *q = item + strlen(OHOS_REQUIRED_MOUNT_PREFIX); // Get partition name in ParseRequiredMountInfo() local 536 BEGET_CHECK(!(q == NULL || *q == '\0' || (p - q) <= 0), return -1); in ParseRequiredMountInfo() 537 BEGET_ERROR_CHECK(strncpy_s(partName, NAME_SIZE -1, q, p - q) == EOK, in ParseRequiredMountInfo()
|
/base/security/huks/utils/crypto_adapter/ |
D | hks_client_service_adapter.c | 319 …const struct HksBlob *publicKey, struct HksBlob *y, struct HksBlob *p, struct HksBlob *q, struct H… in GetDsaPubKeyParam() argument 340 q->size = keyMaterial->qSize; in GetDsaPubKeyParam() 341 q->data = publicKey->data + offset; in GetDsaPubKeyParam() 348 …t32_t DsaToX509PublicKey(const struct HksBlob *y, const struct HksBlob *p, const struct HksBlob *q, in DsaToX509PublicKey() argument 355 BIGNUM *dsaQ = BN_bin2bn(q->data, q->size, NULL); in DsaToX509PublicKey() 404 struct HksBlob q = {0}; in DsaPublicKeyToX509() local 406 int32_t ret = GetDsaPubKeyParam(publicKey, &y, &p, &q, &g); in DsaPublicKeyToX509() 409 return DsaToX509PublicKey(&y, &p, &q, &g, x509Key); in DsaPublicKeyToX509() 756 const BIGNUM *q = NULL; in X509PublicKeyToDsa() local 765 GetDsaKeyInfo(dsa, &q, &qSize, DSA_get0_q) != HKS_SUCCESS || in X509PublicKeyToDsa() [all …]
|
/base/security/crypto_framework/frameworks/key/ |
D | asy_key_generator.c | 101 if ((paramsSpec->q.data == NULL) || (paramsSpec->q.len == 0)) { in IsDsaCommParamsSpecValid() 431 destSpec->q.data = (unsigned char *)HcfMalloc(srcSpec->q.len, 0); in CopyDsaCommonSpec() 432 if (destSpec->q.data == NULL) { in CopyDsaCommonSpec() 444 (void)memcpy_s(destSpec->q.data, srcSpec->q.len, srcSpec->q.data, srcSpec->q.len); in CopyDsaCommonSpec() 447 destSpec->q.len = srcSpec->q.len; in CopyDsaCommonSpec()
|
/base/hiviewdfx/hilog/frameworks/libhilog/vsnprintf/ |
D | output_p.inl | 211 case SECUREC_CHAR('q'): [[fallthrough]]; 439 7: 'h', 'l', 'L', 'F', 'w' , 'N','z','q','t','j' 1074 SecUnsignedInt32 q; 1078 q = (n32Tmp >> 1) + (n32Tmp >> 2); 1079 q = q + (q >> 4); 1080 q = q + (q >> 8); 1081 q = q + (q >> 16); 1082 q = q >> 3; 1083 r = n32Tmp - (((q << 2) + q) << 1); 1084 n32Tmp = (r > 9) ? (q + 1) : q;
|
/base/security/crypto_framework/common/src/ |
D | asy_key_params.c | 42 HcfFree(spec->q.data); in FreeDsaCommParamsSpec() 43 spec->q.data = NULL; in FreeDsaCommParamsSpec()
|
/base/security/crypto_framework/plugin/openssl_plugin/common/src/ |
D | openssl_adapter.c | 474 int Openssl_DSA_set0_pqg(DSA *dsa, BIGNUM *p, BIGNUM *q, BIGNUM *g) in Openssl_DSA_set0_pqg() argument 476 return DSA_set0_pqg(dsa, p, q, g); in Openssl_DSA_set0_pqg() 585 void Openssl_RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q) in Openssl_RSA_get0_factors() argument 587 RSA_get0_factors(r, p, q); in Openssl_RSA_get0_factors()
|
/base/security/crypto_framework/test/fuzztest/key/asykeygenerator_fuzzer/ |
D | asykeygenerator_fuzzer.cpp | 261 …static HcfDsaCommParamsSpec dsaCommonSpec = { .base = asySpecComm, .p = p_BN, .q = q_BN, .g = g_BN… 266 .q = q_BN, 275 .q = q_BN,
|