source stringlengths 14 113 | code stringlengths 10 21.3k |
|---|---|
application-dev\security\CryptoArchitectureKit\crypto-key-derivation-using-pbkdf2.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { BusinessError } from '@kit.BasicServicesKit';
function kdfSync() {
let spec: cryptoFramework.PBKDF2Spec = {
algName: 'PBKDF2',
password: '123456',
salt: new Uint8Array(16),
iterations: 10000,
keySize: 32
};... |
application-dev\security\CryptoArchitectureKit\crypto-key-derivation-using-scrypt.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { BusinessError } from '@kit.BasicServicesKit';
async function ScryptAwait() {
try {
let spec: cryptoFramework.ScryptSpec = {
algName: 'SCRYPT',
salt: new Uint8Array(16),
passphrase: "password",
n:1024,... |
application-dev\security\CryptoArchitectureKit\crypto-key-derivation-using-scrypt.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { BusinessError } from '@kit.BasicServicesKit';
function ScryptPromise() {
let spec: cryptoFramework.ScryptSpec = {
algName: 'SCRYPT',
passphrase: '123456',
salt: new Uint8Array(16),
n:1024,
p:16,
r:8,
... |
application-dev\security\CryptoArchitectureKit\crypto-key-derivation-using-scrypt.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { BusinessError } from '@kit.BasicServicesKit';
function kdfSync() {
try {
let spec: cryptoFramework.ScryptSpec = {
algName: 'SCRYPT',
passphrase: '123456',
salt: new Uint8Array(16),
n:1024,
p:16,... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-asym-encrypt-decrypt-by-segment.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// Encrypt the message by segment.
async function rsaEncryptBySegment(pubKey: cryptoFramework.PubKey, plainText: cryptoFramework.DataBlob) {
let cipher = cryptoFramework.createCipher('RSA1024|PKCS1');
await ... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-asym-encrypt-decrypt-by-segment.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// Encrypt the message by segment.
function rsaEncryptBySegment(pubKey: cryptoFramework.PubKey, plainText: cryptoFramework.DataBlob) {
let cipher = cryptoFramework.createCipher('RSA1024|PKCS1');
cipher.initS... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-asym-encrypt-decrypt-pkcs1.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// Encrypt the message.
async function encryptMessagePromise(publicKey: cryptoFramework.PubKey, plainText: cryptoFramework.DataBlob) {
let cipher = cryptoFramework.createCipher('RSA1024|PKCS1');
await cipher... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-asym-encrypt-decrypt-pkcs1.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// Encrypt the message.
function encryptMessage(publicKey: cryptoFramework.PubKey, plainText: cryptoFramework.DataBlob) {
let cipher = cryptoFramework.createCipher('RSA1024|PKCS1');
cipher.initSync(cryptoFra... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-asym-encrypt-decrypt-pkcs1_oaep.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// Construct the RSA key pair parameter based on the key pair specifications.
function genRsaKeyPairSpec(nIn: bigint, eIn: bigint, dIn: bigint) {
let rsaCommSpec: cryptoFramework.RSACommonParamsSpec = {
n:... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-asym-encrypt-decrypt-pkcs1_oaep.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// Construct the RSA key pair parameter based on the key pair specifications.
function genRsaKeyPairSpec(nIn: bigint, eIn: bigint, dIn: bigint) {
let rsaCommSpec: cryptoFramework.RSACommonParamsSpec = {
n:... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-encoded-decoded.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
function TestPriKeyPkcs1Encoded() {
let rsaGenerator = cryptoFramework.createAsyKeyGenerator('RSA1024');
let keyPair = rsaGenerator.generateKeyPairSync();
let options : cryptoFramework.KeyEncodingConfig = {
password: "123456",
... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-encoded-decoded.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { BusinessError } from '@kit.BasicServicesKit';
let priKeyPkcs1EncodingStr : string =
"-----BEGIN RSA PRIVATE KEY-----\n"
+"Proc-Type: 4,ENCRYPTED\n"
+"DEK-Info: AES-128-CBC,815A066131BF05CF87CE610A59CC69AE\n\n"
+"7Jd0vmOmYGFZ2yRY8f... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-sign-sig-verify-pkcs1-by-segment.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
async function signMessageBySegment(priKey: cryptoFramework.PriKey, plainText: Uint8Array) {
let signAlg = "RSA1024|PKCS1|SHA256";
let signer = cryptoFramework.createSign(signAlg);
await signer.init(priKe... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-sign-sig-verify-pkcs1-by-segment.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
function signMessageBySegment(priKey: cryptoFramework.PriKey, plainText: Uint8Array) {
let signAlg = "RSA1024|PKCS1|SHA256";
let signer = cryptoFramework.createSign(signAlg);
signer.initSync(priKey);
... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-sign-sig-verify-pkcs1.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// The plaintext is split into input1 and input2.
let input1: cryptoFramework.DataBlob = { data: new Uint8Array(buffer.from("This is Sign test plan1", 'utf-8').buffer) };
let input2: cryptoFramework.DataBlob = { d... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-sign-sig-verify-pkcs1.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// The plaintext is split into input1 and input2.
let input1: cryptoFramework.DataBlob = { data: new Uint8Array(buffer.from("This is Sign test plan1", 'utf-8').buffer) };
let input2: cryptoFramework.DataBlob = { d... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-sign-sig-verify-pss.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// Construct the RSA key pair parameter based on the key pair specifications.
function genRsaKeyPairSpec(nIn: bigint, eIn: bigint, dIn: bigint) {
let rsaCommSpec: cryptoFramework.RSACommonParamsSpec = {
n:... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-sign-sig-verify-pss.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// Construct the RSA key pair parameter based on the key pair specifications.
function genRsaKeyPairSpec(nIn: bigint, eIn: bigint, dIn: bigint) {
let rsaCommSpec: cryptoFramework.RSACommonParamsSpec = {
n:... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-sign-sig-verify-recover-pkcs1.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// The plaintext is split into input1 and input2.
let input1: cryptoFramework.DataBlob = { data: new Uint8Array(buffer.from("This is Sign test plan1", 'utf-8').buffer) };
async function signMessagePromise(priKey: ... |
application-dev\security\CryptoArchitectureKit\crypto-rsa-sign-sig-verify-recover-pkcs1.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// The plaintext is split into input1 and input2.
let input1: cryptoFramework.DataBlob = { data: new Uint8Array(buffer.from("This is Sign test plan1", 'utf-8').buffer) };
function signMessagePromise(priKey: crypto... |
application-dev\security\CryptoArchitectureKit\crypto-sm2-asym-encrypt-decrypt.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// Encrypt the message.
async function encryptMessagePromise(publicKey: cryptoFramework.PubKey, plainText: cryptoFramework.DataBlob) {
let cipher = cryptoFramework.createCipher('SM2_256|SM3');
await cipher.... |
application-dev\security\CryptoArchitectureKit\crypto-sm2-asym-encrypt-decrypt.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// Encrypt the message.
function encryptMessage(publicKey: cryptoFramework.PubKey, plainText: cryptoFramework.DataBlob) {
let cipher = cryptoFramework.createCipher('SM2_256|SM3');
cipher.initSync(cryptoFram... |
application-dev\security\CryptoArchitectureKit\crypto-sm2-ciphertext-conversion.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
function testGenCipherTextBySpec() {
let spec : cryptoFramework.SM2CipherTextSpec = {
xCoordinate: BigInt('20625015362595980457695435345498579729138244358573902431560627260141789922999'),
yCoordinate: BigIn... |
application-dev\security\CryptoArchitectureKit\crypto-sm2-ciphertext-conversion.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
function testGetCipherTextSpec() {
let cipherTextArray = new Uint8Array([48, 118, 2, 32, 45, 153, 88, 82, 104, 221, 226, 43, 174, 21, 122, 248, 5, 232, 105, 41, 92, 95, 102, 224, 216, 149, 85, 236, 110, 6, 64, 188, 149... |
application-dev\security\CryptoArchitectureKit\crypto-sm2-sign-sig-verify-pkcs1.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// The plaintext is split into input1 and input2.
let input1: cryptoFramework.DataBlob = { data: new Uint8Array(buffer.from("This is Sign test plan1", 'utf-8').buffer) };
let input2: cryptoFramework.DataBlob = { d... |
application-dev\security\CryptoArchitectureKit\crypto-sm2-sign-sig-verify-pkcs1.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// The plaintext is split into input1 and input2.
let input1: cryptoFramework.DataBlob = { data: new Uint8Array(buffer.from("This is Sign test plan1", 'utf-8').buffer) };
let input2: cryptoFramework.DataBlob = { d... |
application-dev\security\CryptoArchitectureKit\crypto-sm4-sym-encrypt-decrypt-cbc.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
function generateRandom(len: number) {
let rand = cryptoFramework.createRandom();
let generateRandSync = rand.generateRandomSync(len);
return generateRandSync;
}
function genIvParamsSpec() {
let ... |
application-dev\security\CryptoArchitectureKit\crypto-sm4-sym-encrypt-decrypt-cbc.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
function generateRandom(len: number) {
let rand = cryptoFramework.createRandom();
let generateRandSync = rand.generateRandomSync(len);
return generateRandSync;
}
function genIvParamsSpec() {
let ... |
application-dev\security\CryptoArchitectureKit\crypto-sm4-sym-encrypt-decrypt-ecb.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// Encrypt the message.
async function encryptMessagePromise(symKey: cryptoFramework.SymKey, plainText: cryptoFramework.DataBlob) {
let cipher = cryptoFramework.createCipher('SM4_128|ECB|PKCS7');
await ciph... |
application-dev\security\CryptoArchitectureKit\crypto-sm4-sym-encrypt-decrypt-ecb.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
// Encrypt the message.
function encryptMessage(symKey: cryptoFramework.SymKey, plainText: cryptoFramework.DataBlob) {
let cipher = cryptoFramework.createCipher('SM4_128|ECB|PKCS7');
cipher.initSync(cryptoF... |
application-dev\security\CryptoArchitectureKit\crypto-sm4-sym-encrypt-decrypt-gcm-by-segment.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
function generateRandom(len: number) {
let rand = cryptoFramework.createRandom();
let generateRandSync = rand.generateRandomSync(len);
return generateRandSync;
}
function genGcmParamsSpec() {
let... |
application-dev\security\CryptoArchitectureKit\crypto-sm4-sym-encrypt-decrypt-gcm-by-segment.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
function generateRandom(len: number) {
let rand = cryptoFramework.createRandom();
let generateRandSync = rand.generateRandomSync(len);
return generateRandSync;
}
function genGcmParamsSpec() {
let... |
application-dev\security\CryptoArchitectureKit\crypto-sm4-sym-encrypt-decrypt-gcm.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
function generateRandom(len: number) {
let rand = cryptoFramework.createRandom();
let generateRandSync = rand.generateRandomSync(len);
return generateRandSync;
}
function genGcmParamsSpec() {
let... |
application-dev\security\CryptoArchitectureKit\crypto-sm4-sym-encrypt-decrypt-gcm.md | import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { buffer } from '@kit.ArkTS';
function generateRandom(len: number) {
let rand = cryptoFramework.createRandom();
let generateRandSync = rand.generateRandomSync(len);
return generateRandSync;
}
function genGcmParamsSpec() {
let... |
application-dev\security\DataProtectionKit\dlp-guidelines.md | import { dlpPermission } from '@kit.DataProtectionKit'; |
application-dev\security\DataProtectionKit\dlp-guidelines.md | import { common, Want } from '@kit.AbilityKit';
import { BusinessError } from '@kit.BasicServicesKit';
function OpenDlpFile(dlpUri: string, fileName: string, fd: number) {
let want:Want = {
"action": "ohos.want.action.viewData",
"bundleName": "com.example.example_bundle_name",
"ab... |
application-dev\security\DataProtectionKit\dlp-guidelines.md | import { dlpPermission } from '@kit.DataProtectionKit';
import { common, Want } from '@kit.AbilityKit';
import { BusinessError } from '@kit.BasicServicesKit';
try {
let fileUri: string = "file://docs/storage/Users/currentUser/test.txt";
let fileName: string = "test.txt";
... |
application-dev\security\DataProtectionKit\dlp-guidelines.md | import { dlpPermission } from '@kit.DataProtectionKit';
import { BusinessError } from '@kit.BasicServicesKit';
dlpPermission.isInSandbox().then((data)=> {
console.log('isInSandbox, result: ' + JSON.stringify(data));
}).catch((err:BusinessError) => {
console.log('isInSandbox: ' + JSON.stringify(... |
application-dev\security\DataProtectionKit\dlp-guidelines.md | import { dlpPermission } from '@kit.DataProtectionKit';
import { BusinessError } from '@kit.BasicServicesKit';
dlpPermission.getDLPPermissionInfo().then((data)=> {
console.log('getDLPPermissionInfo, result: ' + JSON.stringify(data));
}).catch((err:BusinessError) => {
console.log('getDLPPermissi... |
application-dev\security\DataProtectionKit\dlp-guidelines.md | import { dlpPermission } from '@kit.DataProtectionKit';
dlpPermission.getDLPSupportedFileTypes((err, result) => {
console.log('getDLPSupportedFileTypes: ' + JSON.stringify(err));
console.log('getDLPSupportedFileTypes: ' + JSON.stringify(result));
}); |
application-dev\security\DataProtectionKit\dlp-guidelines.md | import { dlpPermission } from '@kit.DataProtectionKit';
import { fileIo } from '@kit.CoreFileKit';
import { BusinessError } from '@kit.BasicServicesKit';
let uri = "file://docs/storage/Users/currentUser/Desktop/test.txt.dlp";
let file = fileIo.openSync(uri);
try {
let res = dlpPermission.isDL... |
application-dev\security\DataProtectionKit\dlp-guidelines.md | import { dlpPermission } from '@kit.DataProtectionKit';
import { BusinessError } from '@kit.BasicServicesKit';
class SubscribeExample {
event(info: dlpPermission.AccessedDLPFileInfo) {
console.info('openDlpFile event', info.uri, info.lastOpenTime)
}
unSubscribe() {
try {
... |
application-dev\security\DataProtectionKit\dlp-guidelines.md | import { dlpPermission } from '@kit.DataProtectionKit';
import { BusinessError } from '@kit.BasicServicesKit';
async function getDLPFileAccessRecords() {
try {
let res:Array<dlpPermission.AccessedDLPFileInfo> = await dlpPermission.getDLPFileAccessRecords(); // Obtain the list of recently accessed ... |
application-dev\security\DataProtectionKit\dlp-guidelines.md | import { dlpPermission } from '@kit.DataProtectionKit';
import { BusinessError } from '@kit.BasicServicesKit';
async function getRetentionSandboxList() {
try {
let res:Array<dlpPermission.RetentionSandboxInfo> = await dlpPermission.getRetentionSandboxList(); // Obtain the sandbox applications in t... |
application-dev\security\DataProtectionKit\dlp-guidelines.md | import { dlpPermission } from '@kit.DataProtectionKit';
import { BusinessError } from '@kit.BasicServicesKit';
async function setSandboxAppConfig() {
try {
await dlpPermission.setSandboxAppConfig('configInfo'); // Set sandbox application configuration.
} catch (err) {
console.error('... |
application-dev\security\DataProtectionKit\dlp-guidelines.md | import { dlpPermission } from '@kit.DataProtectionKit';
import { BusinessError } from '@kit.BasicServicesKit';
async function cleanSandboxAppConfig() {
try {
await dlpPermission.cleanSandboxAppConfig(); // Clear the sandbox application configuration.
} catch (err) {
console.error('er... |
application-dev\security\DataProtectionKit\dlp-guidelines.md | import { dlpPermission } from '@kit.DataProtectionKit';
import { BusinessError } from '@kit.BasicServicesKit';
async function getSandboxAppConfig() {
try {
let res:string = await dlpPermission.getSandboxAppConfig(); // Obtain the sandbox application configuration.
console.info('res', JSON.... |
application-dev\security\DataProtectionKit\dlp-guidelines.md | import { dlpPermission } from '@kit.DataProtectionKit';
import { common, UIAbility, AbilityConstant, Want } from '@kit.AbilityKit';
import { BusinessError } from '@kit.BasicServicesKit';
try {
let context = getContext () as common.UIAbilityContext; // Obtain the UIAbility context.
let want: Wan... |
application-dev\security\DataProtectionKit\dlp-guidelines.md | import { dlpPermission } from '@kit.DataProtectionKit';
import { BusinessError } from '@kit.BasicServicesKit';
dlpPermission.isDLPFeatureProvided().then((res) => {
console.info('res', JSON.stringify(res));
}).catch((err: BusinessError) => {
console.error('error', (err as BusinessError).code, (e... |
application-dev\security\DeviceCertificateKit\certManager-guidelines.md | import { certificateManager } from '@kit.DeviceCertificateKit';
import { BusinessError } from '@kit.BasicServicesKit'; |
application-dev\security\DeviceCertificateKit\certManager-guidelines.md | async function certificateManagerSample() {
/* The data of the credential to be installed must be assigned based on the service. The data in this example is not the real credential data. */
let keystore: Uint8Array = new Uint8Array([
0x30, 0x82, 0x04, 0x6a, 0x02, 0x01,
]);
/* Keystore pas... |
application-dev\security\DeviceCertificateKit\certManagerDialog-guidelines.md | import certificateManagerDialog from '@ohos.security.certManagerDialog';
import { BusinessError } from '@kit.BasicServicesKit';
import { common } from '@kit.AbilityKit'; |
application-dev\security\DeviceCertificateKit\certManagerDialog-guidelines.md | async function certificateManagerDialogSample() {
/* context is application context information, which is obtained by the caller. The context here is only an example. */
let context: common.Context = getContext(this);
/* pageType specifies the type of the page to display. In this example, pageType is PAGE_MAIN, whic... |
application-dev\security\DeviceCertificateKit\create-get-cert-crl-object.md | import { cert } from '@kit.DeviceCertificateKit'; |
application-dev\security\DeviceCertificateKit\create-get-cert-crl-object.md | import { cert } from '@kit.DeviceCertificateKit';
import { BusinessError } from '@kit.BasicServicesKit';
import { util } from '@kit.ArkTS';
async function createX509CRL(): Promise<cert.X509CRL> {
let crlData = '-----BEGIN X509 CRL-----\n' +
'MIHzMF4CAQMwDQYJKoZIhvcNAQEEBQAwFTETMBEGA1UEAxMKQ1JMIGlzc3VlchcN\n' +
... |
application-dev\security\DeviceCertificateKit\create-parse-verify-cert-object.md | import { cert } from '@kit.DeviceCertificateKit'; |
application-dev\security\DeviceCertificateKit\create-parse-verify-cert-object.md | import { cert } from '@kit.DeviceCertificateKit';
import { BusinessError } from '@kit.BasicServicesKit';
import { util } from '@kit.ArkTS';
// The following is an example of the certificate binary data, which varies with the service.
let certData = '-----BEGIN CERTIFICATE-----\n' +
'MIIBLzCB1QIUO/QDVJwZLIpeJyPjyTvE4... |
application-dev\security\DeviceCertificateKit\create-parse-verify-certextension-object.md | import { cert } from '@kit.DeviceCertificateKit'; |
application-dev\security\DeviceCertificateKit\create-parse-verify-certextension-object.md | import { cert } from '@kit.DeviceCertificateKit';
import { BusinessError } from '@kit.BasicServicesKit';
import { util } from '@kit.ArkTS';
// Certificate extension data. The following is only an example.
let extData = new Uint8Array([
0x30, 0x40, 0x30, 0x0F, 0x06, 0x03, 0x55, 0x1D,
0x13, 0x01, 0x01, 0xFF, 0x04, 0... |
application-dev\security\DeviceCertificateKit\create-parse-verify-crl-object.md | import { cert } from '@kit.DeviceCertificateKit';
import { cryptoFramework } from '@kit.CryptoArchitectureKit'; |
application-dev\security\DeviceCertificateKit\create-parse-verify-crl-object.md | import { cert } from '@kit.DeviceCertificateKit';
import { cryptoFramework } from '@kit.CryptoArchitectureKit';
import { BusinessError } from '@kit.BasicServicesKit';
import { util } from '@kit.ArkTS';
// CRL data example.
let crlData = '-----BEGIN X509 CRL-----\n' +
'MIHzMF4CAQMwDQYJKoZIhvcNAQEEBQAwFTETMBEGA1UEAxM... |
application-dev\security\DeviceCertificateKit\create-trustanchor-from-p12.md | import { cert } from '@kit.DeviceCertificateKit'; |
application-dev\security\DeviceCertificateKit\create-trustanchor-from-p12.md | import { cert } from '@kit.DeviceCertificateKit';
import { BusinessError } from '@kit.BasicServicesKit';
import { util } from '@kit.ArkTS';
let p12Data = new Uint8Array([0x30, 0x82, 0x07, 0x5C, 0x02, 0x01, 0x03, 0x30, 0x82, 0x07, 0x12, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x01, 0xA0, 0x82,... |
application-dev\security\DeviceCertificateKit\create-verify-cerchainvalidator-object.md | import { cert } from '@kit.DeviceCertificateKit'; |
application-dev\security\DeviceCertificateKit\create-verify-cerchainvalidator-object.md | import { cert } from '@kit.DeviceCertificateKit';
import { util } from '@kit.ArkTS';
// CA data, which is only an example.
let caCertData = '-----BEGIN CERTIFICATE-----\n' +
'...\n' +
'...\n' +
'...\n' +
'-----END CERTIFICATE-----\n';
// Level-2 CA certificate data, which is only an example.
let secondCaCertD... |
application-dev\security\DeviceCertificateKit\create-verify-certchain-object.md | import { cert } from '@kit.DeviceCertificateKit'; |
application-dev\security\DeviceCertificateKit\create-verify-certchain-object.md | import { cert } from '@kit.DeviceCertificateKit';
import { BusinessError } from '@kit.BasicServicesKit';
import { util } from '@kit.ArkTS';
let certChainData = "-----BEGIN CERTIFICATE-----\n" +
"MIID6jCCAtKgAwIBAgIIIM2q/TmRoLcwDQYJKoZIhvcNAQELBQAwWjELMAkGA1UE\n" +
"BhMCRU4xEDAOBgNVBAgTB0VuZ2xhbmQxDzANBgNVBAcTBkxvb... |
application-dev\security\UniversalKeystoreKit\huks-check-key-arkts.md | import { huks } from '@kit.UniversalKeystoreKit';
/* 1. Set the key alias. */
let keyAlias = 'test_key';
let isKeyExist: Boolean;
/* 2. Construct an empty object. */
let huksOptions: huks.HuksOptions = {
properties: []
}
try {
/* 3. Check whether the key exists. */
huks.hasKeyItem(keyAlias, huksOptions, (error, ... |
application-dev\security\UniversalKeystoreKit\huks-delete-key-arkts.md | /*
* Delete a 256-bit HKDF key. This example uses promise-based APIs.
*/
import { huks } from '@kit.UniversalKeystoreKit';
/* 1. Set the key alias. */
let keyAlias = "test_Key";
/* 2. Construct an empty object. */
let huksOptions: huks.HuksOptions = {
properties: []
}
class throwObject {
isThrow = false;
}
fun... |
application-dev\security\UniversalKeystoreKit\huks-encryption-decryption-arkts.md | /*
* The following uses AES/CBC/PKCS7 with promise-based APIs.
*/
import { huks } from '@kit.UniversalKeystoreKit';
let aesKeyAlias = 'test_aesKeyAlias';
let handle: number;
let plainText = '123456';
let IV = '001122334455';
let cipherData: Uint8Array;
function StringToUint8Array(str: String) {
let arr: number[] ... |
application-dev\security\UniversalKeystoreKit\huks-encryption-decryption-arkts.md | /*
* The following uses AES/GCM/NoPadding with promise-based APIs.
*/
import { huks } from '@kit.UniversalKeystoreKit';
let aesKeyAlias = 'test_aesKeyAlias';
let handle: number;
let plainText = '123456';
let cipherData: Uint8Array;
let AAD = '1234567890123456';
let NONCE = '001122334455';
function StringToUint8Arra... |
application-dev\security\UniversalKeystoreKit\huks-encryption-decryption-arkts.md | /*
* The following uses SM2 with promise-based APIs.
*/
import { huks } from '@kit.UniversalKeystoreKit';
let sm2KeyAlias = 'test_sm2KeyAlias';
let handle: number;
let plainText = '123456';
let cipherData: Uint8Array;
function StringToUint8Array(str: String) {
let arr: number[] = new Array();
for (let i = 0, j ... |
application-dev\security\UniversalKeystoreKit\huks-encryption-decryption-arkts.md | /*
* The following uses DES/CBC/NoPadding with promise-based APIs as an example.
*/
import { huks } from '@kit.UniversalKeystoreKit';
let desKeyAlias = 'test_desKeyAlias';
let handle: number;
let plainText = '12345678';
let IV = '12345678';
let cipherData: Uint8Array;
function StringToUint8Array(str: String) {
le... |
application-dev\security\UniversalKeystoreKit\huks-export-key-arkts.md | import { huks } from '@kit.UniversalKeystoreKit';
/* 1. Set the key alias. */
let keyAlias = 'keyAlias';
/* Leave options empty. */
let emptyOptions: huks.HuksOptions = {
properties: []
};
try {
/* 2. Export the key. */
huks.exportKeyItem(keyAlias, emptyOptions, (error, data) => {
if (error) {
console.... |
application-dev\security\UniversalKeystoreKit\huks-hmac-arkts.md | /*
* Perform HMAC calculation using promise-based APIs.
*/
import { huks } from '@kit.UniversalKeystoreKit';
let HmackeyAlias = 'test_HMAC';
let handle: number;
let plainText = '123456';
let hashData: Uint8Array;
function StringToUint8Array(str: String) {
let arr: number[] = new Array();
for (let i = 0, j = str... |
application-dev\security\UniversalKeystoreKit\huks-import-key-in-plaintext-arkts.md | /* Import an AES 256-bit key in plaintext. This example uses callback-based APIs. */
import { huks } from '@kit.UniversalKeystoreKit'
/* Key material */
let plainTextSize32 = new Uint8Array([
0xfb, 0x8b, 0x9f, 0x12, 0xa0, 0x83, 0x19, 0xbe, 0x6a, 0x6f, 0x63, 0x2a, 0x7c, 0x86, 0xba, 0xca,
0x64, 0x0b, 0x88, 0x96, 0xe... |
application-dev\security\UniversalKeystoreKit\huks-import-key-in-plaintext-arkts.md | /* Import an RSA 2048-bit key in plaintext. This example uses callback-based APIs. */
import { huks } from '@kit.UniversalKeystoreKit'
let rsa2048KeyPairMaterial = new Uint8Array([
0x01, 0x00, 0x00, 0x00, // Key algorithm (expressed in little-endian) huks.HuksKeyAlg.HUKS_ALG_RSA = 1
0x00, 0x08, 0x00, 0x00, // Key ... |
application-dev\security\UniversalKeystoreKit\huks-import-key-in-plaintext-arkts.md | /* Import the public key of an X25519 key pair. This example uses callback-based APIs. */
import { huks } from '@kit.UniversalKeystoreKit'
// X25519 public key data. The private key and public key in the X25519 key pair are both 32 bytes (256 bits). For details about the algorithm, see related cryptography materials.
l... |
application-dev\security\UniversalKeystoreKit\huks-import-key-in-plaintext-arkts.md | import { huks } from '@kit.UniversalKeystoreKit';
let keyAlias = 'AES256Alias_sample';
let isKeyExist = false;
let keyProperties: Array<huks.HuksParam> = [
{
tag: huks.HuksTag.HUKS_TAG_ALGORITHM,
value: huks.HuksKeyAlg.HUKS_ALG_AES
}
]
let huksOptions: huks.HuksOptions = {
properties: keyProperties, // ... |
application-dev\security\UniversalKeystoreKit\huks-import-wrapped-key-arkts.md | import { huks } from '@kit.UniversalKeystoreKit';
let IV = '0000000000000000';
let AAD = "abababababababab";
let NONCE = "hahahahahaha";
let TAG_SIZE = 16;
let FILED_LENGTH = 4;
let importedAes192PlainKey = "The aes192 key to import";
let callerAes256Kek = "The is kek to encrypt aes192 key";
let callerKeyAlias = "test... |
application-dev\security\UniversalKeystoreKit\huks-import-wrapped-key-arkts.md | import { huks } from '@kit.UniversalKeystoreKit';
/*
* Set the key alias and encapsulate the key property set.
*/
let keyAlias = 'test_import_key_ecdh_aes192';
let isKeyExist: Boolean;
let keyProperties: Array<huks.HuksParam> = [{
tag: huks.HuksTag.HUKS_TAG_ALGORITHM,
value: huks.HuksKeyAlg.HUKS_ALG_AES,
}];
let... |
application-dev\security\UniversalKeystoreKit\huks-key-agreement-arkts.md | /*
* Agree on an X25519 key using promise-based APIs.
*/
import { huks } from '@kit.UniversalKeystoreKit';
/*
* Set the key alias and encapsulate the key property set.
*/
let srcKeyAliasFirst = "AgreeX25519KeyFirstAlias";
let srcKeyAliasSecond = "AgreeX25519KeySecondAlias";
let agreeX25519InData = 'A... |
application-dev\security\UniversalKeystoreKit\huks-key-agreement-arkts.md | /*
* Agree on a DH key using promise-based APIs.
*/
import { huks } from '@kit.UniversalKeystoreKit'
function StringToUint8Array(str: string) {
let arr: number[] = []
for (let i = 0, j = str.length; i < j; ++i) {
arr.push(str.charCodeAt(i))
}
return new Uint8Array(arr)
}
function Uin... |
application-dev\security\UniversalKeystoreKit\huks-key-anon-attestation-arkts.md | /*
* Perform anonymous key attestation. This example uses promise-based APIs.
*/
import { huks } from '@kit.UniversalKeystoreKit';
/* 1. Set the key alias. */
let keyAliasString = "key anon attest";
let aliasString = keyAliasString;
let aliasUint8 = StringToUint8Array(keyAliasString);
let securityLevel = StringToUin... |
application-dev\security\UniversalKeystoreKit\huks-key-attestation-arkts.md | /*
* Perform non-anonymous key attestation. This example uses promise-based APIs.
*/
import { huks } from '@kit.UniversalKeystoreKit';
/* 1. Set the key alias. */
let keyAliasString = "key attest";
let aliasString = keyAliasString;
let aliasUint8 = StringToUint8Array(keyAliasString);
let securityLevel = StringToUint... |
application-dev\security\UniversalKeystoreKit\huks-key-derivation-arkts.md | /*
* Derive an HKDF key using promise-based APIs.
*/
import { huks } from '@kit.UniversalKeystoreKit';
/*
* Set the key alias and encapsulate the key property set.
*/
let srcKeyAlias = "hkdf_Key";
let deriveHkdfInData = "deriveHkdfTestIndata";
let handle: number;
let finishOutData: Uint8Array;
let HuksKeyDeriveKey... |
application-dev\security\UniversalKeystoreKit\huks-key-derivation-arkts.md | /*
* Derive a PBKDF2 key using promise-based APIs.
*/
import { huks } from '@kit.UniversalKeystoreKit';
/*
* Set the key alias and encapsulate the key property set.
*/
let srcKeyAlias = "pbkdf2_Key";
let salt = "mySalt";
let iterationCount = 10000;
let derivedKeySize = 32;
let handle: number;
let finishOutData: Ui... |
application-dev\security\UniversalKeystoreKit\huks-key-generation-arkts.md | /* Generate a DH key. */
import { huks } from '@kit.UniversalKeystoreKit';
/* 1. Set the key alias. */
let keyAlias = 'dh_key';
/* 2. Initialize the key property set. */
let properties1: Array<huks.HuksParam> = [
{
tag: huks.HuksTag.HUKS_TAG_ALGORITHM,
va... |
application-dev\security\UniversalKeystoreKit\huks-list-aliases-arkts.md | /*
* The following example uses promise-based APIs to query key aliases.
*/
import { huks } from '@kit.UniversalKeystoreKit'
async function testListAliases() {
/* 1. Initialize the key property set. */
let queryProperties: Array<huks.HuksParam> = [
{
tag: huks.HuksTag.HUKS_TAG_AUTH_STORAGE_LEVEL,
... |
application-dev\security\UniversalKeystoreKit\huks-obtain-key-properties-arkts.md | import { huks } from '@kit.UniversalKeystoreKit';
/* 1. Set the key alias. */
let keyAlias = 'keyAlias';
/* Leave options empty. */
let emptyOptions: huks.HuksOptions = {
properties: []
};
try {
/* 2. Obtain key properties. */
huks.getKeyItemProperties(keyAlias, emptyOptions, (error, data) => {
if (error) {
... |
application-dev\security\UniversalKeystoreKit\huks-refined-user-identity-authentication.md | import { huks } from "@kit.UniversalKeystoreKit";
/*
* Set the key alias and encapsulate the key property set.
*/
let keyAlias = 'test_sm4_key_alias';
class throwObject {
isThrow: boolean = false;
}
let properties: Array<huks.HuksParam> = [
{
tag: huks.HuksTag.HUKS_TAG_A... |
application-dev\security\UniversalKeystoreKit\huks-refined-user-identity-authentication.md | import { huks } from "@kit.UniversalKeystoreKit";
class HuksProperties {
tag: huks.HuksTag = huks.HuksTag.HUKS_TAG_ALGORITHM;
value: huks.HuksKeyAlg | huks.HuksKeySize | huks.HuksKeyPurpose | huks.HuksKeyPadding | huks.HuksCipherMode
| Uint8Array = huks.HuksKeyAlg.HUKS_ALG_ECC;
}
/*
... |
application-dev\security\UniversalKeystoreKit\huks-refined-user-identity-authentication.md | import { huks } from "@kit.UniversalKeystoreKit";
import { userAuth } from '@kit.UserAuthenticationKit';
import { BusinessError } from "@kit.BasicServicesKit"
let keyAlias = 'test_sm4_key_alias';
let IV = '1234567890123456';
let handle = 0;
let cipherText: Uint8Array; // Data in ciphertext.
... |
application-dev\security\UniversalKeystoreKit\huks-signing-signature-verification-arkts.md | /*
* Key algorithm ECC256 and digest algorithm SHA-256 are used.
*/
import { huks } from '@kit.UniversalKeystoreKit';
let keyAlias = 'test_eccKeyAlias';
let handle: number;
let plaintext = '123456';
let signature: Uint8Array;
function StringToUint8Array(str: String) {
let arr: number[] = new Array();
for (let i... |
application-dev\security\UniversalKeystoreKit\huks-signing-signature-verification-arkts.md | /*
* The key algorithm SM2 and digest algorithm SM3 are used.
*/
import { huks } from '@kit.UniversalKeystoreKit';
let keyAlias = 'test_sm2KeyAlias';
let handle: number;
let plaintext = '123456';
let signature: Uint8Array;
function StringToUint8Array(str: String) {
let arr: number[] = new Array();
for (let i =... |
application-dev\security\UniversalKeystoreKit\huks-signing-signature-verification-arkts.md | /*
* The key algorithm RSA, digest algorithm SHA-256, and padding mode PSS are used.
*/
import { huks } from '@kit.UniversalKeystoreKit';
let keyAlias = 'test_rsaKeyAlias';
let handle: number;
let plaintext = '123456';
let signature: Uint8Array;
function StringToUint8Array(str: string) {
let arr: number[] = [];
... |
application-dev\security\UniversalKeystoreKit\huks-signing-signature-verification-arkts.md | /*
* The key algorithm RSA, digest algorithm SHA-256, and padding mode PKCS #1 v1.5 are used.
*/
import { huks } from '@kit.UniversalKeystoreKit';
let keyAlias = 'test_rsaKeyAlias';
let handle: number;
let plaintext = '123456';
let signature: Uint8Array;
function StringToUint8Array(str: String) {
let arr: number[... |
application-dev\security\UniversalKeystoreKit\huks-user-identity-authentication.md | import { huks } from '@kit.UniversalKeystoreKit';
/*
* Set the key alias and encapsulate the key property set.
*/
let keyAlias = 'test_sm4_key_alias';
let properties: Array<huks.HuksParam> = [{
tag: huks.HuksTag.HUKS_TAG_ALGORITHM,
value: huks.HuksKeyAlg.HUKS_ALG_SM4
}, {
tag: huks.HuksTag.HUKS_TAG_PURPOSE,
va... |
application-dev\security\UniversalKeystoreKit\huks-user-identity-authentication.md | import { huks } from '@kit.UniversalKeystoreKit';
import { userAuth } from '@kit.UserAuthenticationKit';
/*
* Set the key alias and encapsulate the key property set.
*/
let IV = '1234567890123456';
let srcKeyAlias = 'test_sm4_key_alias';
let handle: number;
let challenge: Uint8Array;
let fingerAuthToken: Uint8Array;... |
application-dev\security\UniversalKeystoreKit\huks-user-identity-authentication.md | /*
* The following uses a 128-bit SM4 key as an example.
*/
import { huks } from '@kit.UniversalKeystoreKit';
/*
* Determine the key property set to be encapsulated.
*/
let IV = '1234567890123456';
let cipherInData = 'Hks_SM4_Cipher_Test_101010101010101010110_string';
let handle: number;
let fingerAuthToken: Uint8Arra... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.