Go to file
openharmony_ci bda89f4b4f
!1396 hks_file_operator.c wf
Merge pull request !1396 from zww/1108_wf
2024-11-11 11:09:30 +00:00
build 二次密钥迁移 2024-10-08 20:24:23 +08:00
figures 修改README模块架构图 2022-10-25 15:30:08 +08:00
frameworks add code for fix huks log 2024-11-04 17:59:52 +08:00
interfaces add code for fix huks log 2024-11-04 17:59:52 +08:00
services/huks_standard Add exception branch handling 2024-11-08 14:30:15 +08:00
test optimize fuzz 2024-11-11 09:37:46 +08:00
utils hks_file_operator.c wf 2024-11-11 15:01:04 +08:00
.gitattributes merge pr phase-2 2021-11-17 10:24:06 +08:00
BUILD.gn independent compile for huks test 2024-06-06 11:56:39 +08:00
bundle.json delete googletest 2024-07-30 19:47:04 +08:00
CODEOWNERS remove redundant blank 2023-06-30 17:21:22 +08:00
hisysevent.yaml 修改打点事件名称 2022-12-24 09:56:27 +08:00
huks.gni huks_enable_hdi_in_system_in_standard 2024-07-23 17:35:25 +08:00
LICENSE code check modification 2021-12-22 17:42:15 +08:00
OAT.xml 添加OAT文件屏蔽静态检查问题 2024-05-30 16:39:29 +08:00
README_zh.md 更改目录描述、更新接口文档跳转链接 2024-02-21 10:25:31 +08:00
README.md update README.md. 2022-10-08 03:09:27 +00:00

HUKS

Introduction

OpenHarmony Universal KeyStore HUKS provides applications with key library capabilities, such as key management and cryptographic operations on keys. HUKS also provides APIs for applications to import or generate keys.

HUKS consists of the following modules:

  • HUKS SDK layer: provides HUKS APIs for applications.

  • HUKS service layer: implements functions such as HUKS key management and storage.

  • HUKS engine layer: HUKS core module, which generates, encrypts, and decrypts keys. For devices running a standard system, this module of the commercial version must run in a secure environment such as a TEE or a chip with security capabilities. A secure environment requires dedicated hardware and is therefore implemented only by emulation in the open-source code. For the small and mini systems, HUKS only provides the example implementation of the root key protection solution. In commercial scenarios, the implementation must adapt to the protection solution for either the hardware root key or other root keys.

Directory Structure

base/security/huks/
├── build                            # Build configuration file
├── frameworks                       # Framework code, which is used by interfaces and services
│   └── huks_standard                # Code implementation
|   └── huks_lite                    # Build script in a small and mini systems
|   └── crypto_lite                  # Encryption and decryption implementation
├── interfaces                       # APIs
│   └── innerkits
│   └── kits
├── services
│   └── huks_standard
├── test
└── utils
   └── crypto_adapter
   └── file_operator
   └── list
   └── mutex

Repositories Involved

Security subsystem

security_huks