Go to file
code4lala e11c8fb6b2 add comment for HksUpgradeOnUserUnlock, acquire read lock before HksPluginOnRemoteRequest
Signed-off-by: code4lala <fengziteng2@huawei.com>
Change-Id: If82fe8ad3d50acf9542eac03edfbe4ae882a5cd9
2024-08-23 15:08:35 +08:00
build 修改默认密钥安全等级配置 2024-08-05 20:44:20 +08:00
figures 修改README模块架构图 2022-10-25 15:30:08 +08:00
frameworks HksGetParamBlob类型参数校验优化 2024-08-17 09:33:27 +08:00
interfaces !1250 主要修复空指针未有效置空而在释放内存后再被使用的告警 2024-08-20 06:14:23 +00:00
services/huks_standard add comment for HksUpgradeOnUserUnlock, acquire read lock before HksPluginOnRemoteRequest 2024-08-23 15:08:35 +08:00
test add rwlock for upgrading keys, use atomic for multi-thread 2024-08-23 15:08:35 +08:00
utils add rwlock for upgrading keys, use atomic for multi-thread 2024-08-23 15:08:35 +08:00
.gitattributes merge pr phase-2 2021-11-17 10:24:06 +08:00
BUILD.gn independent compile for huks test 2024-06-06 11:56:39 +08:00
bundle.json delete googletest 2024-07-30 19:47:04 +08:00
CODEOWNERS remove redundant blank 2023-06-30 17:21:22 +08:00
hisysevent.yaml 修改打点事件名称 2022-12-24 09:56:27 +08:00
huks.gni huks_enable_hdi_in_system_in_standard 2024-07-23 17:35:25 +08:00
LICENSE code check modification 2021-12-22 17:42:15 +08:00
OAT.xml 添加OAT文件屏蔽静态检查问题 2024-05-30 16:39:29 +08:00
README_zh.md 更改目录描述、更新接口文档跳转链接 2024-02-21 10:25:31 +08:00
README.md update README.md. 2022-10-08 03:09:27 +00:00

HUKS

Introduction

OpenHarmony Universal KeyStore HUKS provides applications with key library capabilities, such as key management and cryptographic operations on keys. HUKS also provides APIs for applications to import or generate keys.

HUKS consists of the following modules:

  • HUKS SDK layer: provides HUKS APIs for applications.

  • HUKS service layer: implements functions such as HUKS key management and storage.

  • HUKS engine layer: HUKS core module, which generates, encrypts, and decrypts keys. For devices running a standard system, this module of the commercial version must run in a secure environment such as a TEE or a chip with security capabilities. A secure environment requires dedicated hardware and is therefore implemented only by emulation in the open-source code. For the small and mini systems, HUKS only provides the example implementation of the root key protection solution. In commercial scenarios, the implementation must adapt to the protection solution for either the hardware root key or other root keys.

Directory Structure

base/security/huks/
├── build                            # Build configuration file
├── frameworks                       # Framework code, which is used by interfaces and services
│   └── huks_standard                # Code implementation
|   └── huks_lite                    # Build script in a small and mini systems
|   └── crypto_lite                  # Encryption and decryption implementation
├── interfaces                       # APIs
│   └── innerkits
│   └── kits
├── services
│   └── huks_standard
├── test
└── utils
   └── crypto_adapter
   └── file_operator
   └── list
   └── mutex

Repositories Involved

Security subsystem

security_huks