Home
last modified time | relevance | path

Searched refs:oid (Results 1 - 20 of 20) sorted by relevance

/base/security/certificate_framework/frameworks/adapter/v2.0/src/
H A Dcf_adapter_extension_openssl.c37 char *oid; member
230 char oid[MAX_LEN_OID] = { 0 }; in DeepCopyOidsToOut() local
231 int32_t oidLen = OBJ_obj2txt(oid, MAX_LEN_OID, X509_EXTENSION_get_object(ex), 1); in DeepCopyOidsToOut()
233 CF_LOG_E("Failed to get oid[%u]", index); in DeepCopyOidsToOut()
238 int32_t ret = DeepCopyDataToOutblob(oid, strlen(oid), &dataArray[i]); in DeepCopyOidsToOut()
240 CF_LOG_E("Failed to copy oid[%u]", index); in DeepCopyOidsToOut()
313 char oid[MAX_LEN_OID] = { 0 }; in CfOpensslHasUnsupportedCriticalExtension() local
314 int32_t oidLen = OBJ_obj2txt(oid, MAX_LEN_OID, X509_EXTENSION_get_object(ex), 1); in CfOpensslHasUnsupportedCriticalExtension()
316 CF_LOG_E("Failed to get ext oid"); in CfOpensslHasUnsupportedCriticalExtension()
337 GetTargetNid(const CfBlob *oid, int *nid) GetTargetNid() argument
455 CfOpensslGetEntry(const CfBase *object, CfExtensionEntryType type, const CfBlob *oid, CfBlob *out) CfOpensslGetEntry() argument
[all...]
/base/security/huks/test/unittest/huks_standard_test/module_test/utils_test/src/
H A Dhks_attest_utils_test.cpp67 struct HksBlob oid = { 1, buffer }; in HWTEST_F() local
70 ret = DcmInsertClaim(nullptr, &oid, &fakeBlob, HKS_SECURITY_LEVEL_LOW); in HWTEST_F()
71 ret = DcmInsertClaim(&key, &oid, nullptr, HKS_SECURITY_LEVEL_LOW); in HWTEST_F()
85 struct HksBlob oid = { 1, buffer }; in HWTEST_F() local
87 int32_t ret = DcmInsertClaim(&key, &oid, &fakeBlob, HKS_SECURITY_LEVEL_LOW); in HWTEST_F()
/base/security/huks/services/huks_standard/huks_engine/main/device_cert_manager/src/
H A Ddcm_attest_utils.c61 int32_t DcmInsertClaim(struct HksBlob *out, const struct HksBlob *oid, const struct HksAsn1Blob *value, in DcmInsertClaim() argument
64 if ((CheckBlob(out) != HKS_SUCCESS) || (CheckBlob(oid) != HKS_SUCCESS) || (CheckAsn1Blob(value) != HKS_SUCCESS)) { in DcmInsertClaim()
68 if (out->size < oid->size + value->size + ENCODED_SEC_LEVEL_SIZE + ASN_1_MAX_HEADER_LEN) { in DcmInsertClaim()
75 (void)memcpy_s(buf, out->size - ASN_1_MAX_HEADER_LEN - ENCODED_SEC_LEVEL_SIZE, oid->data, oid->size); in DcmInsertClaim()
76 buf += oid->size; in DcmInsertClaim()
83 uint32_t seqSize = ENCODED_SEC_LEVEL_SIZE + oid->size + tmp.size; in DcmInsertClaim()
210 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "insert oid value fail\n") in GetX25519PublicKey()
H A Ddcm_attest.c631 static int32_t EncodeClaims(const struct HksBlob *oid, const struct HksBlob *claim, struct HksBlob *seq) in EncodeClaims() argument
633 if (memcpy_s(seq->data, seq->size, oid->data, oid->size) != EOK) { in EncodeClaims()
634 HKS_LOG_E("copy claim oid failed!"); in EncodeClaims()
637 uint32_t size = oid->size; in EncodeClaims()
936 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_BAD_STATE, "insert sign oid failed!") in CreateAttestCert()
1047 HKS_LOG_I("invalid oid of app id!"); in InsertAppIdClaim()
1151 static int32_t InsertIdOrSecInfoData(enum HksTag tag, uint32_t type, const struct HksBlob *oid, in InsertIdOrSecInfoData() argument
1162 ret = DcmInsertClaim(out, oid, &paramBlob, HKS_SECURITY_LEVEL_SUPER); in InsertIdOrSecInfoData()
/base/security/code_signature/utils/src/
H A Dopenssl_utils.cpp102 int CreateNIDFromOID(const std::string &oid, const std::string &shortName, in CreateNIDFromOID() argument
107 int nid = OBJ_txt2nid(oid.c_str()); in CreateNIDFromOID()
109 nid = OBJ_create(oid.c_str(), shortName.c_str(), longName.c_str()); in CreateNIDFromOID()
/base/security/certificate_framework/test/unittest/cf_adapter_test/src/
H A Dcf_adapter_extension_test.cpp461 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; in HWTEST_F() local
463 ret = CfOpensslGetEntry(obj001, CF_EXT_ENTRY_TYPE_ENTRY, &oid, &outBlob); in HWTEST_F()
485 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; in HWTEST_F() local
487 ret = CfOpensslGetEntry(obj002, CF_EXT_ENTRY_TYPE_ENTRY_CRITICAL, &oid, &outBlob); in HWTEST_F()
509 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; in HWTEST_F() local
511 ret = CfOpensslGetEntry(obj003, CF_EXT_ENTRY_TYPE_ENTRY_VALUE, &oid, &outBlob); in HWTEST_F()
529 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; in HWTEST_F() local
533 int32_t ret = CfOpensslGetEntry(nullptr, CF_EXT_ENTRY_TYPE_ENTRY, &oid, &outBlob); /* object is null */ in HWTEST_F()
551 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; in HWTEST_F() local
556 ret = CfOpensslGetEntry(obj005, CF_EXT_ENTRY_TYPE_ENTRY, &oid, in HWTEST_F()
577 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; HWTEST_F() local
601 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; HWTEST_F() local
624 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; HWTEST_F() local
652 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; HWTEST_F() local
716 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; HWTEST_F() local
737 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; HWTEST_F() local
[all...]
/base/security/certificate_framework/frameworks/adapter/v2.0/inc/
H A Dcf_adapter_extension_openssl.h38 int32_t CfOpensslGetEntry(const CfBase *object, CfExtensionEntryType type, const CfBlob *oid, CfBlob *out);
/base/security/certificate_framework/frameworks/core/extension/inc/
H A Dcf_extension_adapter_ability_define.h26 int32_t (*adapterGetEntry)(const CfBase *object, CfExtensionEntryType type, const CfBlob *oid, CfBlob *out);
/base/security/code_signature/utils/include/
H A Dopenssl_utils.h41 int CreateNIDFromOID(const std::string &oid, const std::string &shortName,
/base/security/appverify/interfaces/innerkits/appverify_lite/include/
H A Dmbedtls_pkcs7.h25 #include <mbedtls/oid.h>
110 mbedtls_asn1_buf oid; member
136 * contentTypeOid must be the pkcs7 signed-data oid 1.2.840.113549.1.7.2
/base/security/huks/services/huks_standard/huks_engine/main/device_cert_manager/include/
H A Ddcm_attest_utils.h67 int32_t DcmInsertClaim(struct HksBlob *out, const struct HksBlob *oid, const struct HksAsn1Blob *value,
/base/security/certificate_framework/frameworks/adapter/v1.0/src/
H A Dcertificate_openssl_common.c34 char *oid; member
56 const char *GetAlgorithmName(const char *oid) in GetAlgorithmName() argument
58 if (oid == NULL) { in GetAlgorithmName()
65 if (strcmp(g_oidToNameMap[i].oid, oid) == 0) { in GetAlgorithmName()
69 LOGE("Can not find algorithmName! [oid]: %s", oid); in GetAlgorithmName()
H A Dx509_crl_openssl.c586 const ASN1_OBJECT *oid = NULL; in GetSignatureAlgOidInner() local
587 X509_ALGOR_get0(&oid, NULL, NULL, palg); in GetSignatureAlgOidInner()
588 if (oid == NULL) { in GetSignatureAlgOidInner()
589 LOGE("oid is null!"); in GetSignatureAlgOidInner()
598 int32_t resLen = OBJ_obj2txt(output, OID_LENGTH, oid, 1); in GetSignatureAlgOidInner()
649 LOGE("Get signature algor oid failed!"); in GetSignatureAlgName()
H A Dx509_certificate_openssl.c918 const ASN1_OBJECT *oid = NULL; in GetSigAlgOidX509Openssl() local
919 X509_ALGOR_get0(&oid, NULL, NULL, alg); in GetSigAlgOidX509Openssl()
921 int32_t resLen = OBJ_obj2txt(algOid, OID_STR_MAX_LEN, oid, 1); in GetSigAlgOidX509Openssl()
/base/security/certificate_framework/test/unittest/cf_sdk_test/src/
H A Dcf_extension_test.cpp286 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; in HWTEST_F() local
291 { .tag = CF_TAG_PARAM1_BUFFER, .blob = oid }, in HWTEST_F()
305 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; in HWTEST_F() local
310 { .tag = CF_TAG_PARAM1_BUFFER, .blob = oid }, in HWTEST_F()
324 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; in HWTEST_F() local
329 { .tag = CF_TAG_PARAM1_BUFFER, .blob = oid }, in HWTEST_F()
/base/security/certificate_framework/frameworks/adapter/v1.0/inc/
H A Dcertificate_openssl_common.h40 const char *GetAlgorithmName(const char *oid);
/base/security/certificate_framework/test/fuzztest/cfgetandcheck_fuzzer/
H A Dcfgetandcheck_fuzzer.cpp115 CfBlob oid = { size - sizeof(uint32_t), reinterpret_cast<uint8_t *>(data + sizeof(uint32_t)) }; in TestObjectTypeFunc4() local
120 { .tag = CF_TAG_PARAM1_BUFFER, .blob = oid }, in TestObjectTypeFunc4()
/base/security/appverify/interfaces/innerkits/appverify_lite/src/
H A Dmbedtls_pkcs7.c138 *p += len; // pass the oid info to the real content location. in GetContentInfoType()
345 if (first->oid.tag != second->oid.tag || in CompareX509NameList()
346 first->oid.len != second->oid.len || in CompareX509NameList()
347 memcmp(first->oid.p, second->oid.p, second->oid.len) != 0 || in CompareX509NameList()
504 rc = GetContentInfoType(p, end, &content->oid, &hasContent); in ParseSignedDataContentInfo()
509 if (MBEDTLS_OID_CMP(MBEDTLS_OID_PKCS7_DATA, &content->oid) || !hasConten in ParseSignedDataContentInfo()
[all...]
/base/security/huks/frameworks/huks_standard/main/core/src/
H A Dhks_verifier.c366 static ASN1_OBJECT *GetObjByOid(int32_t nid, const char *oid, const char *sn, const char *ln) in GetObjByOid() argument
372 len = a2d_ASN1_OBJECT(NULL, 0, oid, -1); in GetObjByOid()
381 len = a2d_ASN1_OBJECT(buf, len, oid, -1); in GetObjByOid()
398 HKS_IF_NULL_LOGE_RETURN(obj, ret, "get obj by oid failed") in GetKeyDescriptionSeqValue()
/base/security/certificate_framework/test/unittest/v1.0/src/
H A Dcrypto_x509_certificate_test.cpp611 /* oid is nullptr */
618 /* oid not found */
621 char oid[] = "1.2.840.113549.1.1.255"; in HWTEST_F() local
622 const char *str = GetAlgorithmName(oid); in HWTEST_F()
1055 /* HcfX509CertMatchParams's public key algorithm oid is valid */
1071 /* HcfX509CertMatchParams's public key algorithm oid is invalid */
1087 /* HcfX509CertMatchParams's public key algorithm oid is empty */

Completed in 21 milliseconds