Go to file
wpy88 4789bbf0d3 内存泄漏处理
Signed-off-by: wpy88 <weipengyu4@huawei.com>
2024-09-02 12:34:29 +08:00
build 修改默认密钥安全等级配置 2024-08-05 20:44:20 +08:00
figures 修改README模块架构图 2022-10-25 15:30:08 +08:00
frameworks use HksMalloc and HKS_FREE instead of OPENSSL_malloc and OPENSSL_free to avoid __FILE__ 2024-08-23 09:34:25 +08:00
interfaces !1250 主要修复空指针未有效置空而在释放内存后再被使用的告警 2024-08-20 06:14:23 +00:00
services/huks_standard 内存泄漏处理 2024-09-02 12:34:29 +08:00
test fix failed tdd 2024-08-27 17:27:22 +08:00
utils add rwlock for upgrading keys, use atomic for multi-thread 2024-08-23 15:08:35 +08:00
.gitattributes merge pr phase-2 2021-11-17 10:24:06 +08:00
BUILD.gn independent compile for huks test 2024-06-06 11:56:39 +08:00
bundle.json delete googletest 2024-07-30 19:47:04 +08:00
CODEOWNERS remove redundant blank 2023-06-30 17:21:22 +08:00
hisysevent.yaml 修改打点事件名称 2022-12-24 09:56:27 +08:00
huks.gni huks_enable_hdi_in_system_in_standard 2024-07-23 17:35:25 +08:00
LICENSE code check modification 2021-12-22 17:42:15 +08:00
OAT.xml 添加OAT文件屏蔽静态检查问题 2024-05-30 16:39:29 +08:00
README_zh.md 更改目录描述、更新接口文档跳转链接 2024-02-21 10:25:31 +08:00
README.md update README.md. 2022-10-08 03:09:27 +00:00

HUKS

Introduction

OpenHarmony Universal KeyStore HUKS provides applications with key library capabilities, such as key management and cryptographic operations on keys. HUKS also provides APIs for applications to import or generate keys.

HUKS consists of the following modules:

  • HUKS SDK layer: provides HUKS APIs for applications.

  • HUKS service layer: implements functions such as HUKS key management and storage.

  • HUKS engine layer: HUKS core module, which generates, encrypts, and decrypts keys. For devices running a standard system, this module of the commercial version must run in a secure environment such as a TEE or a chip with security capabilities. A secure environment requires dedicated hardware and is therefore implemented only by emulation in the open-source code. For the small and mini systems, HUKS only provides the example implementation of the root key protection solution. In commercial scenarios, the implementation must adapt to the protection solution for either the hardware root key or other root keys.

Directory Structure

base/security/huks/
├── build                            # Build configuration file
├── frameworks                       # Framework code, which is used by interfaces and services
│   └── huks_standard                # Code implementation
|   └── huks_lite                    # Build script in a small and mini systems
|   └── crypto_lite                  # Encryption and decryption implementation
├── interfaces                       # APIs
│   └── innerkits
│   └── kits
├── services
│   └── huks_standard
├── test
└── utils
   └── crypto_adapter
   └── file_operator
   └── list
   └── mutex

Repositories Involved

Security subsystem

security_huks