/base/security/certificate_framework/frameworks/adapter/v1.0/src/ |
H A D | x509_crl_openssl.c | 38 X509_CRL *crl; member 78 return ((HcfX509CRLOpensslImpl *)self)->crl; in GetCrl() 111 X509_CRL *crl = ((HcfX509CRLOpensslImpl *)self)->crl; in IsRevoked() local 112 if (crl == NULL) { in IsRevoked() 113 LOGE("crl is null!"); in IsRevoked() 117 int32_t res = X509_CRL_get0_by_cert(crl, &rev, certOpenssl); in IsRevoked() 132 X509_CRL *crl = ((HcfX509CRLOpensslImpl *)self)->crl; in GetEncoded() local 133 if (crl in GetEncoded() 188 X509_CRL *crl = ((HcfX509CRLOpensslImpl *)self)->crl; Verify() local 218 X509_CRL *crl = ((HcfX509CRLOpensslImpl *)self)->crl; GetVersion() local 232 X509_CRL *crl = GetCrl(self); GetIssuerName() local 289 X509_CRL *crl = GetCrl(self); GetLastUpdate() local 322 X509_CRL *crl = GetCrl(self); GetNextUpdate() local 356 X509_CRL *crl = GetCrl(self); GetRevokedCert() local 408 X509_CRL *crl = ((HcfX509CRLOpensslImpl *)self)->crl; GetRevokedCertWithCert() local 473 X509_CRL *crl = GetCrl(self); GetRevokedCerts() local 513 X509_CRL *crl = GetCrl(self); GetTbsList() local 543 X509_CRL *crl = GetCrl(self); GetSignature() local 577 GetSignatureAlgOidInner(X509_CRL *crl, CfBlob *oidOut) GetSignatureAlgOidInner() argument 624 X509_CRL *crl = GetCrl(self); GetSignatureAlgOid() local 671 GetSignatureAlgParamsInner(X509_CRL *crl, CfBlob *sigAlgParamOut) GetSignatureAlgParamsInner() argument 726 X509_CRL *crl = GetCrl(self); GetSignatureAlgParams() local 741 X509_CRL *crl = GetCrl(self); GetExtensions() local 765 X509_CRL *crl = GetCrl(self); ToString() local 803 X509_CRL *crl = GetCrl(self); HashCode() local 842 X509_CRL *crl = GetCrl(self); GetExtensionsObject() local 869 X509_CRL *crl = GetCrl(self); GetNumOfCRL() local 1151 X509_CRL *crl = ParseX509CRL(inStream); HcfCX509CrlSpiCreate() local [all...] |
H A D | x509_cert_chain_openssl.c | 199 int crlNum = sk_X509_CRL_num(crlStack); // allow crlNum : 0, no crl in STACK_OF() 201 X509_CRL *crl = sk_X509_CRL_value(crlStack, i); in STACK_OF() local 202 if (crl == NULL) { in STACK_OF() 208 /* crl in certcrlcollection object is not null. */ in STACK_OF() 218 int32_t res = X509_CRL_get0_by_cert(crl, &rev, cert); in STACK_OF() 552 X509_CRL *crl = NULL; in PushCrl2Stack() local 558 LOGE("Failed to getEncoded of crl!"); in PushCrl2Stack() 562 crl = ParseX509CRL(&encodedBlob); in PushCrl2Stack() 564 if (crl == NULL) { in PushCrl2Stack() 568 if (sk_X509_CRL_push(outCrls, crl) in PushCrl2Stack() 759 X509_CRL *crl = LoadCrlDp(crlStack); GetCrlFromCert() local 784 X509_CRL *crl = GetCrlFromCert(params, x509); ValidateCrlOnline() local [all...] |
/base/security/appverify/interfaces/innerkits/appverify/src/init/ |
H A D | hap_crl_manager.cpp | 82 HAPVERIFY_LOG_DEBUG("total crl num: %{public}u", numOfCrl);
in ParseCrls() 90 X509_CRL* crl = HapCertVerifyOpensslUtils::GetX509CrlFromDerBuffer(crlsBuffer, hasUsed, crlLen);
in ParseCrls() local 91 if (crl == nullptr) {
in ParseCrls() 92 HAPVERIFY_LOG_WARN("crl file is destroyed");
in ParseCrls() 97 if (!HapCertVerifyOpensslUtils::GetIssuerFromX509Crl(crl, crlIssuer)) {
in ParseCrls() 98 X509_CRL_free(crl);
in ParseCrls() 106 crlsMap[crlIssuer] = crl;
in ParseCrls() 110 HAPVERIFY_LOG_INFO("get %{public}ust crl's Issuer: %{public}s", numOfCrl, crlIssuer.c_str());
in ParseCrls() 122 HAPVERIFY_LOG_WARN("crl fileLen: %{public}lld", fileLen);
in ReadCrls() 161 void HapCrlManager::UpdateCrlByIssuer(const std::string& issuer, X509_CRL* crl)
in UpdateCrlByIssuer() argument [all...] |
/base/security/appverify/interfaces/innerkits/appverify/src/util/ |
H A D | hap_cert_verify_openssl_utils.cpp | 235 X509_CRL* crl = d2i_X509_CRL_bio(derBio, nullptr);
in GetX509CrlFromDerBuffer() local 237 return crl;
in GetX509CrlFromDerBuffer() 240 void HapCertVerifyOpensslUtils::WriteX509CrlToStream(std::ofstream& crlFile, X509_CRL* crl)
in WriteX509CrlToStream() argument 252 if (crl == nullptr || i2d_X509_CRL_bio(derBio, crl) == 0) {
in WriteX509CrlToStream() 273 /* write crl data len */
in WriteX509CrlToStream() 441 /* get signed cert's issuer and then it will be used to find local crl */
in VerifyCrl() 447 /* crl is optional */
in VerifyCrl() 449 /* if it include crl, it must be verified by ca cert */
in VerifyCrl() 468 X509_CRL* crl variable 529 GetIssuerFromX509Crl(const X509_CRL* crl, std::string& issuer) GetIssuerFromX509Crl() argument [all...] |
H A D | hap_verify_openssl_utils.cpp | 130 if (!HapCertVerifyOpensslUtils::VerifyCrl(certsChain, p7->d.sign->crl, pkcs7Context)) { in VerifyCertChain()
|
/base/security/certificate_framework/test/fuzztest/v1.0/x509crl_fuzzer/ |
H A D | x509crl_fuzzer.cpp | 119 X509_CRL *crl = X509_CRL_new(); in GetCrlStream() local 120 (void)X509_CRL_set_version(crl, TEST_VERSION); in GetCrlStream() 127 (void)X509_CRL_set_issuer_name(crl, issuer); in GetCrlStream() 132 (void)X509_CRL_set_lastUpdate(crl, g_lastUpdate); in GetCrlStream() 137 (void)X509_CRL_set_nextUpdate(crl, g_nextUpdate); in GetCrlStream() 147 (void)X509_CRL_set_nextUpdate(crl, g_rvTime); in GetCrlStream() 149 (void)X509_CRL_add0_revoked(crl, revoked); in GetCrlStream() 151 (void)X509_CRL_sort(crl); in GetCrlStream() 152 (void)X509_CRL_sign(crl, prikey, EVP_sha256()); in GetCrlStream() 153 int len = i2d_X509_CRL(crl, nullpt in GetCrlStream() [all...] |
/base/security/appverify/interfaces/innerkits/appverify/include/util/ |
H A D | hap_cert_verify_openssl_utils.h | 42 DLL_EXPORT static bool GetIssuerFromX509Crl(const X509_CRL* crl, std::string& issuer);
46 DLL_EXPORT static void WriteX509CrlToStream(std::ofstream& crlFile, X509_CRL* crl);
|
/base/security/certificate_framework/frameworks/core/v1.0/certificate/ |
H A D | cert_crl_collection.c | 122 HcfX509Crl *crl = inCrls->data[i]; in GetMatchCRLs() local 124 CfResult res = crl->match(crl, matchParams, &out); in GetMatchCRLs() 133 res = CloneCrlObj(crl, &tmpArr.data[outInd]); in GetMatchCRLs() 135 LOGE("crl clone failed"); in GetMatchCRLs() 285 LOGE("Failed to clone crl!"); in CloneCrlArray() 319 LOGE("Failed to clone crl array!"); in HcfCertCrlCollectionCreate()
|
/base/security/appverify/interfaces/innerkits/appverify/include/init/ |
H A D | hap_crl_manager.h | 50 DLL_EXPORT void UpdateCrlByIssuer(const std::string& issuer, X509_CRL* crl);
|
/base/security/appverify/interfaces/innerkits/appverify_lite/src/ |
H A D | mbedtls_pkcs7.c | 565 static int32_t ParseSignedDataCrl(unsigned char **p, const unsigned char *end, mbedtls_x509_crl *crl) in ParseSignedDataCrl() argument 572 LOG_INFO("Has no crl in signed data."); in ParseSignedDataCrl() 575 mbedtls_x509_crl_init(crl); in ParseSignedDataCrl() 576 rc = mbedtls_x509_crl_parse(crl, *p, len); in ParseSignedDataCrl() 622 rc = ParseSignedDataCrl(&p, end, &signedData->crl); in ParseSignedData() 701 mbedtls_x509_crl_free(&pkcs7->signedData.crl); in FreeSignedDataCrl() 984 static int32_t IsRevoked(const mbedtls_x509_crt *crt, const mbedtls_x509_crl *crl) in IsRevoked() argument 986 mbedtls_x509_crl_entry *cur = (mbedtls_x509_crl_entry *)(&crl->entry); in IsRevoked() 1003 static int32_t VerifyCrl(const mbedtls_x509_crt *crt, const mbedtls_x509_crl *crl) in VerifyCrl() argument 1005 const mbedtls_x509_crl *crlList = crl; in VerifyCrl() [all...] |
/base/security/huks/services/huks_standard/huks_engine/main/device_cert_manager/include/ |
H A D | dcm_attest.h | 105 struct HksAsn1Obj crl;
member
|
/base/security/appverify/interfaces/innerkits/appverify_lite/include/ |
H A D | mbedtls_pkcs7.h | 130 mbedtls_x509_crl crl; member
|
/base/security/certificate_framework/frameworks/js/napi/certificate/src/ |
H A D | napi_cert_crl_collection.cpp | 177 HcfX509Crl *crl = crls->data[i]; in SelectCRLsRet() local 178 NapiX509Crl *x509Crl = new (std::nothrow) NapiX509Crl(crl); in SelectCRLsRet() 187 NapiX509Crl *crl = static_cast<NapiX509Crl *>(data); in SelectCRLsRet() 188 delete crl; in SelectCRLsRet() 377 napi_throw(env, CertGenerateBusinessError(env, CF_INVALID_PARAMS, "Build X509 crl match params failed")); in GetCrlMatchParam() 378 LOGE("build X509 crl match params failed!"); in GetCrlMatchParam() 464 LOGE("get array crl from data failed!"); in ParseCreateCertCRLColJSParams() 472 LOGE("get array crl from data failed!"); in ParseCreateCertCRLColJSParams()
|
H A D | napi_x509_crl.cpp | 61 HcfX509Crl *crl; member 154 LOGE("x509 crl: get callback failed!"); in CreateCallbackAndPromise() 211 LOGE("verify crl failed!"); in VerifyExecute() 212 context->errMsg = "verify crl failed"; in VerifyExecute() 245 LOGE("crl entry array is null!"); in GenerateCrlEntryArray() 249 LOGE("crl entry array count is 0!"); in GenerateCrlEntryArray() 1357 context->errCode = HcfX509CrlCreate(context->encodingBlob, &context->crl); in CreateX509CrlExecute() 1373 NapiX509Crl *x509CrlClass = new (std::nothrow) NapiX509Crl(context->crl); in CreateX509CrlComplete() 1378 CfObjDestroy(context->crl); in CreateX509CrlComplete()
|
/base/security/huks/services/huks_standard/huks_engine/main/device_cert_manager/src/ |
H A D | dcm_attest.c | 582 ret += DcmAsn1ExtractTag(&val, &ext->crl, &val, ASN_1_TAG_TYPE_SEQ);
in ParseAttestExtension()
|