Home
last modified time | relevance | path

Searched refs:issuer (Results 1 - 25 of 48) sorted by relevance

12

/base/security/code_signature/test/unittest/utils/src/
H A Denable_key_utils.cpp26 int32_t EnableTestKey(const char *signing, const char *issuer) in EnableTestKey() argument
30 arg.issuer = reinterpret_cast<uint64_t>(issuer); in EnableTestKey()
32 arg.issuer_length = strlen(issuer) + 1; in EnableTestKey()
/base/security/appverify/interfaces/innerkits/appverify/src/init/
H A Dhap_crl_manager.cpp153 X509_CRL* HapCrlManager::GetCrlByIssuer(const std::string& issuer) in GetCrlByIssuer() argument
155 if (crlsMap.find(issuer) == crlsMap.end()) { in GetCrlByIssuer()
158 return crlsMap[issuer]; in GetCrlByIssuer()
161 void HapCrlManager::UpdateCrlByIssuer(const std::string& issuer, X509_CRL* crl) in UpdateCrlByIssuer() argument
167 if (crlsMap.find(issuer) != crlsMap.end()) { in UpdateCrlByIssuer()
168 X509_CRL_free(crlsMap[issuer]); in UpdateCrlByIssuer()
170 crlsMap[issuer] = X509_CRL_dup(crl); in UpdateCrlByIssuer()
194 HAPVERIFY_LOG_ERROR("cert(issuer: %{public}s, subject: %{public}s, number:%{public}lld) is revoked", in CrlCheck()
H A Dtrusted_ticket_manager.cpp32 const std::string TrustedTicketManager::KEY_OF_ISSUER = "issuer-ca";
127 if (!JsonParserUtils::GetJsonString(TicketSource, KEY_OF_ISSUER, hapTicketSource.issuer)) { in ParseTrustedTicketSourceJson()
128 HAPVERIFY_LOG_ERROR("Get issuer Failed"); in ParseTrustedTicketSourceJson()
152 "issuer: " + ticketSourceInfo.issuer + "\n" + in EncapTrustedTicketSourceString()
193 MatchIssuer(TicketSource.issuer, certIssuer)) { in TrustedSourceListCompare()
H A Dtrusted_source_manager.cpp34 const std::string TrustedSourceManager::KEY_OF_ISSUER = "issuer-ca";
164 if (!JsonParserUtils::GetJsonString(appSource, KEY_OF_ISSUER, hapAppSource.issuer)) { in ParseTrustedAppSourceJson()
165 HAPVERIFY_LOG_ERROR("Get issuer Failed"); in ParseTrustedAppSourceJson()
194 "issuer: " + appSourceInfo.issuer + "\n" + in EncapTrustedAppSourceString()
243 MatchSubjectAndIssuer(appSource.issuer, certIssuer)) { in TrustedSourceListCompare()
249 if (MatchSubjectAndIssuer(appSource.issuer, certIssuer)) { in TrustedSourceListCompare()
/base/security/certificate_framework/frameworks/js/napi/certificate/src/
H A Dnapi_x509_crl_match_parameters.cpp117 if (!GetIssuer(env, arg, matchParams->issuer)) { in BuildX509CrlMatchParams()
138 if (matchParams->issuer != nullptr) { in FreeX509CrlMatchParams()
139 FreeCfBlobArray(matchParams->issuer->data, matchParams->issuer->count); in FreeX509CrlMatchParams()
140 CF_FREE_PTR(matchParams->issuer); in FreeX509CrlMatchParams()
/base/security/code_signature/services/key_enable/src/
H A Dcert_path_utils.rs35 const ISSUER_KEY: &str = "issuer";
123 /// issuer
219 let issuer = match cert_profile[ISSUER_KEY].try_as_string() { in parse_cert_profile()
238 issuer_ca: issuer.to_string(), in parse_cert_profile()
299 error!(LOG_LABEL, "Error parsing cert profile issuer : {:?}", e); in load_cert_path_from_json_file()
321 let issuer = fabricate_name(&self.issuer_ca); in add_subject_cert_path()
324 issuer, in add_subject_cert_path()
341 /// issuer
342 pub issuer: u64,
420 issuer in cert_path_operation()
[all...]
H A Dprofile_utils.rs192 let issuer = format_x509_fabricate_name(signed_pem.issuer_name()); in get_cert_details()
193 Ok((subject, issuer, profile_type)) in get_cert_details()
345 let (subject, issuer, profile_type) = in process_profile()
355 if add_cert_path_info(subject, issuer, profile_type, DEFAULT_MAX_CERT_PATH_LEN).is_err() { in process_profile()
456 let (subject, issuer, profile_type) = process_data(&profile_data)?; in enable_key_in_profile_internal()
476 if add_cert_path_info(subject, issuer, profile_type, DEFAULT_MAX_CERT_PATH_LEN).is_err() { in enable_key_in_profile_internal()
501 let (subject, issuer, profile_type) = process_data(&profile_data)?; in process_remove_bundle()
509 if remove_cert_path_info(subject, issuer, profile_type, DEFAULT_MAX_CERT_PATH_LEN).is_err() { in process_remove_bundle()
/base/security/code_signature/test/unittest/
H A Dadd_cert_path_test.cpp44 static const string FAKE_ISSUER = "Fake issuer";
46 static const string ISSUER_AS_SYSTEM_TYPE = "System issuer";
58 static CertPathInfo MakeCertPathInfo(const char *signing, const char *issuer, in MakeCertPathInfo() argument
63 arg.issuer = reinterpret_cast<uint64_t>(issuer); in MakeCertPathInfo()
65 arg.issuer_length = strlen(issuer); in MakeCertPathInfo()
/base/security/appverify/interfaces/innerkits/appverify/include/init/
H A Dhap_crl_manager.h49 DLL_EXPORT X509_CRL* GetCrlByIssuer(const std::string& issuer);
50 DLL_EXPORT void UpdateCrlByIssuer(const std::string& issuer, X509_CRL* crl);
/base/security/appverify/interfaces/innerkits/appverify/src/provision/
H A Dprovision_info.cpp54 this->issuer = info.issuer; in operator =()
/base/security/code_signature/test/unittest/utils/include/
H A Denable_key_utils.h22 int EnableTestKey(const char *signing, const char *issuer);
/base/security/appverify/interfaces/innerkits/appverify/test/unittest/src/
H A Dprovision_verify_test.cpp35 "issuer": "App Gallery"
121 "issuer": "App Gallery"
144 "issuer": "App Gallery"
168 "issuer": "App Gallery"
192 "issuer": "App Gallery"
344 "issuer": "App Gallery" in HWTEST_F()
434 "issuer": "App Gallery"
483 "issuer": "App Gallery"
535 "issuer": "App Gallery"
H A Dhap_cert_verify_openssl_utils_test.cpp104 * @tc.steps: step3. Get subject of rootCertsObj and get issuer of certX509. in HWTEST_F()
105 * @tc.expected: step3. The subject is same as issuer. in HWTEST_F()
109 std::string issuer; in HWTEST_F() local
110 ASSERT_TRUE(HapCertVerifyOpensslUtils::GetIssuerFromX509(certX509, issuer)); in HWTEST_F()
111 ASSERT_TRUE(subject.compare(issuer) == 0); in HWTEST_F()
240 std::string issuer; in HWTEST_F() local
241 ASSERT_FALSE(HapCertVerifyOpensslUtils::GetIssuerFromX509(nullptr, issuer)); in HWTEST_F()
/base/security/certificate_framework/interfaces/inner_api/certificate/
H A Dx509_crl_match_parameters.h30 CfBlobArray *issuer; member
H A Dx509_cert_match_parameters.h41 CfBlob *issuer; member
/base/update/updater/services/package/pkg_verify/
H A Dcert_verify.cpp103 rootInfo_.issuer = GetX509CertIssuerName(rootCert); in InitRootCert()
113 PKG_LOGE("compare cert subject and issuer fail"); in VerifySingleCert()
125 rootInfo_.issuer.compare(certIssuer) == 0) { in CompareCertSubjectAndIssuer()
/base/security/certificate_framework/frameworks/adapter/v1.0/src/
H A Dx509_crl_openssl.c243 char *issuer = X509_NAME_oneline(x509Name, NULL, 0); in GetIssuerName() local
244 if (issuer == NULL) { in GetIssuerName()
249 if (strlen(issuer) > HCF_MAX_STR_LEN) { in GetIssuerName()
250 LOGE("issuer name is too long!"); in GetIssuerName()
252 OPENSSL_free(issuer); in GetIssuerName()
255 uint32_t length = strlen(issuer) + 1; in GetIssuerName()
258 LOGE("Failed to malloc for crl issuer data!"); in GetIssuerName()
259 OPENSSL_free(issuer); in GetIssuerName()
262 (void)memcpy_s(out->data, length, issuer, length); in GetIssuerName()
264 OPENSSL_free(issuer); in GetIssuerName()
902 CompareIssuerX509Openssl(HcfX509CrlSpi *self, const CfBlobArray *issuer, bool *out) CompareIssuerX509Openssl() argument
[all...]
/base/security/appverify/interfaces/innerkits/appverify_lite/src/
H A Dapp_provision.c218 pf->issuer = GetStringTag(root, "issuer"); in GetProfIssuerInfo()
219 if (pf->issuer == NULL) { in GetProfIssuerInfo()
221 pf->issuer = APPV_MALLOC(len + 1); in GetProfIssuerInfo()
222 if (pf->issuer == NULL) { in GetProfIssuerInfo()
225 errno_t ret = strcpy_s(pf->issuer, len + 1, APP_STORE); in GetProfIssuerInfo()
227 APPV_FREE(pf->issuer); in GetProfIssuerInfo()
280 FREE_IF_NOT_NULL(pf->issuer); in ProfFreeData()
H A Dmbedtls_pkcs7.c168 /* parse issuer name */ in ParseSignerIssuerAndSerialNum()
169 rc = mbedtls_x509_get_name(p, *p + len, &signer->issuer); in ParseSignerIssuerAndSerialNum()
664 name_cur = signer->issuer.next; in FreeSignerIssuer()
670 signer->issuer.next = NULL; in FreeSignerIssuer()
717 /* current level's subject is next level issuer */ in FindSuperCert()
719 if (CompareX509NameList(&cur->issuer, &certsList->subject) == 0) { in FindSuperCert()
807 mbedtls_x509_name *signerIssuer = &signer->issuer; in ConstructSignerCerts()
812 CompareX509NameList(signerIssuer, &cert->issuer) == 0) { in ConstructSignerCerts()
1008 CompareX509NameList(&crlList->issuer, &crt->issuer) ! in VerifyCrl()
1102 PKCS7_GetSignerSignningCertIssuer(const SignerInfo *signer, char *issuer, size_t issuerLen) PKCS7_GetSignerSignningCertIssuer() argument
[all...]
/base/security/code_signature/services/key_enable/utils/include/
H A Dcert_path.h33 uint64_t issuer; member
/base/security/code_signature/utils/include/
H A Dcert_utils.h33 ByteBuffer &signCert, ByteBuffer &issuer, std::vector<ByteBuffer> &chain);
/base/security/appverify/interfaces/innerkits/appverify/include/util/
H A Dhap_cert_verify_openssl_utils.h40 DLL_EXPORT static bool GetIssuerFromX509(const X509* cert, std::string& issuer);
42 DLL_EXPORT static bool GetIssuerFromX509Crl(const X509_CRL* crl, std::string& issuer);
/base/security/appverify/interfaces/innerkits/appverify_lite/include/
H A Dmbedtls_pkcs7.h61 char issuer[MAX_SIGNER_NAME_LEN]; member
93 mbedtls_x509_name issuer; member
242 * Description : Get all signer's associate info, now including subject/issuer/
/base/update/packaging_tools/
H A Dbuild_pkcs7.py199 issuer = cert.issuer
202 issuer_and_serial['issuer'] = cert.issuer
/base/security/certificate_framework/test/unittest/v1.0/src/
H A Dcrypto_x509_crl_test_part2.cpp191 /* issuer is nullptr */
196 matchParams.issuer = nullptr; in HWTEST_F()
202 /* self issuer is equal to x509Crl */
205 // get issuer name in HWTEST_F()
217 matchParams.issuer = &cfBlobArr; in HWTEST_F()
224 /* self issuer is not equal to x509Crl */
227 // get issuer name in HWTEST_F()
247 matchParams.issuer = &cfBlobArr; in HWTEST_F()
256 /* issuer->count is 0 and outTmpSelf.size is not 0 */
259 // get issuer nam in HWTEST_F()
[all...]

Completed in 14 milliseconds

12