/base/security/certificate_framework/frameworks/adapter/v2.0/src/ |
H A D | cf_adapter_extension_openssl.c | 37 char *oid;
member 230 char oid[MAX_LEN_OID] = { 0 };
in DeepCopyOidsToOut() local 231 int32_t oidLen = OBJ_obj2txt(oid, MAX_LEN_OID, X509_EXTENSION_get_object(ex), 1);
in DeepCopyOidsToOut() 233 CF_LOG_E("Failed to get oid[%u]", index);
in DeepCopyOidsToOut() 238 int32_t ret = DeepCopyDataToOutblob(oid, strlen(oid), &dataArray[i]);
in DeepCopyOidsToOut() 240 CF_LOG_E("Failed to copy oid[%u]", index);
in DeepCopyOidsToOut() 313 char oid[MAX_LEN_OID] = { 0 };
in CfOpensslHasUnsupportedCriticalExtension() local 314 int32_t oidLen = OBJ_obj2txt(oid, MAX_LEN_OID, X509_EXTENSION_get_object(ex), 1);
in CfOpensslHasUnsupportedCriticalExtension() 316 CF_LOG_E("Failed to get ext oid");
in CfOpensslHasUnsupportedCriticalExtension() 337 GetTargetNid(const CfBlob *oid, int *nid) GetTargetNid() argument 455 CfOpensslGetEntry(const CfBase *object, CfExtensionEntryType type, const CfBlob *oid, CfBlob *out) CfOpensslGetEntry() argument [all...] |
/base/security/huks/test/unittest/huks_standard_test/module_test/utils_test/src/ |
H A D | hks_attest_utils_test.cpp | 67 struct HksBlob oid = { 1, buffer }; in HWTEST_F() local 70 ret = DcmInsertClaim(nullptr, &oid, &fakeBlob, HKS_SECURITY_LEVEL_LOW); in HWTEST_F() 71 ret = DcmInsertClaim(&key, &oid, nullptr, HKS_SECURITY_LEVEL_LOW); in HWTEST_F() 85 struct HksBlob oid = { 1, buffer }; in HWTEST_F() local 87 int32_t ret = DcmInsertClaim(&key, &oid, &fakeBlob, HKS_SECURITY_LEVEL_LOW); in HWTEST_F()
|
/base/security/huks/services/huks_standard/huks_engine/main/device_cert_manager/src/ |
H A D | dcm_attest_utils.c | 61 int32_t DcmInsertClaim(struct HksBlob *out, const struct HksBlob *oid, const struct HksAsn1Blob *value,
in DcmInsertClaim() argument 64 if ((CheckBlob(out) != HKS_SUCCESS) || (CheckBlob(oid) != HKS_SUCCESS) || (CheckAsn1Blob(value) != HKS_SUCCESS)) {
in DcmInsertClaim() 68 if (out->size < oid->size + value->size + ENCODED_SEC_LEVEL_SIZE + ASN_1_MAX_HEADER_LEN) {
in DcmInsertClaim() 75 (void)memcpy_s(buf, out->size - ASN_1_MAX_HEADER_LEN - ENCODED_SEC_LEVEL_SIZE, oid->data, oid->size);
in DcmInsertClaim() 76 buf += oid->size;
in DcmInsertClaim() 83 uint32_t seqSize = ENCODED_SEC_LEVEL_SIZE + oid->size + tmp.size;
in DcmInsertClaim() 210 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, ret, "insert oid value fail\n")
in GetX25519PublicKey()
|
H A D | dcm_attest.c | 631 static int32_t EncodeClaims(const struct HksBlob *oid, const struct HksBlob *claim, struct HksBlob *seq)
in EncodeClaims() argument 633 if (memcpy_s(seq->data, seq->size, oid->data, oid->size) != EOK) {
in EncodeClaims() 634 HKS_LOG_E("copy claim oid failed!");
in EncodeClaims() 637 uint32_t size = oid->size;
in EncodeClaims() 936 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_BAD_STATE, "insert sign oid failed!")
in CreateAttestCert() 1047 HKS_LOG_I("invalid oid of app id!");
in InsertAppIdClaim() 1151 static int32_t InsertIdOrSecInfoData(enum HksTag tag, uint32_t type, const struct HksBlob *oid,
in InsertIdOrSecInfoData() argument 1162 ret = DcmInsertClaim(out, oid, ¶mBlob, HKS_SECURITY_LEVEL_SUPER);
in InsertIdOrSecInfoData()
|
/base/security/code_signature/utils/src/ |
H A D | openssl_utils.cpp | 102 int CreateNIDFromOID(const std::string &oid, const std::string &shortName,
in CreateNIDFromOID() argument 107 int nid = OBJ_txt2nid(oid.c_str());
in CreateNIDFromOID() 109 nid = OBJ_create(oid.c_str(), shortName.c_str(), longName.c_str());
in CreateNIDFromOID()
|
/base/security/certificate_framework/test/unittest/cf_adapter_test/src/ |
H A D | cf_adapter_extension_test.cpp | 461 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) };
in HWTEST_F() local 463 ret = CfOpensslGetEntry(obj001, CF_EXT_ENTRY_TYPE_ENTRY, &oid, &outBlob);
in HWTEST_F() 485 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) };
in HWTEST_F() local 487 ret = CfOpensslGetEntry(obj002, CF_EXT_ENTRY_TYPE_ENTRY_CRITICAL, &oid, &outBlob);
in HWTEST_F() 509 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) };
in HWTEST_F() local 511 ret = CfOpensslGetEntry(obj003, CF_EXT_ENTRY_TYPE_ENTRY_VALUE, &oid, &outBlob);
in HWTEST_F() 529 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) };
in HWTEST_F() local 533 int32_t ret = CfOpensslGetEntry(nullptr, CF_EXT_ENTRY_TYPE_ENTRY, &oid, &outBlob); /* object is null */
in HWTEST_F() 551 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) };
in HWTEST_F() local 556 ret = CfOpensslGetEntry(obj005, CF_EXT_ENTRY_TYPE_ENTRY, &oid, in HWTEST_F() 577 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; HWTEST_F() local 601 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; HWTEST_F() local 624 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; HWTEST_F() local 652 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; HWTEST_F() local 716 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; HWTEST_F() local 737 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) }; HWTEST_F() local [all...] |
/base/security/certificate_framework/frameworks/adapter/v2.0/inc/ |
H A D | cf_adapter_extension_openssl.h | 38 int32_t CfOpensslGetEntry(const CfBase *object, CfExtensionEntryType type, const CfBlob *oid, CfBlob *out);
|
/base/security/certificate_framework/frameworks/core/extension/inc/ |
H A D | cf_extension_adapter_ability_define.h | 26 int32_t (*adapterGetEntry)(const CfBase *object, CfExtensionEntryType type, const CfBlob *oid, CfBlob *out);
|
/base/security/code_signature/utils/include/ |
H A D | openssl_utils.h | 41 int CreateNIDFromOID(const std::string &oid, const std::string &shortName,
|
/base/security/appverify/interfaces/innerkits/appverify_lite/include/ |
H A D | mbedtls_pkcs7.h | 25 #include <mbedtls/oid.h> 110 mbedtls_asn1_buf oid; member 136 * contentTypeOid must be the pkcs7 signed-data oid 1.2.840.113549.1.7.2
|
/base/security/huks/services/huks_standard/huks_engine/main/device_cert_manager/include/ |
H A D | dcm_attest_utils.h | 67 int32_t DcmInsertClaim(struct HksBlob *out, const struct HksBlob *oid, const struct HksAsn1Blob *value,
|
/base/security/certificate_framework/frameworks/adapter/v1.0/src/ |
H A D | certificate_openssl_common.c | 34 char *oid;
member 56 const char *GetAlgorithmName(const char *oid)
in GetAlgorithmName() argument 58 if (oid == NULL) {
in GetAlgorithmName() 65 if (strcmp(g_oidToNameMap[i].oid, oid) == 0) {
in GetAlgorithmName() 69 LOGE("Can not find algorithmName! [oid]: %s", oid);
in GetAlgorithmName()
|
H A D | x509_crl_openssl.c | 586 const ASN1_OBJECT *oid = NULL; in GetSignatureAlgOidInner() local 587 X509_ALGOR_get0(&oid, NULL, NULL, palg); in GetSignatureAlgOidInner() 588 if (oid == NULL) { in GetSignatureAlgOidInner() 589 LOGE("oid is null!"); in GetSignatureAlgOidInner() 598 int32_t resLen = OBJ_obj2txt(output, OID_LENGTH, oid, 1); in GetSignatureAlgOidInner() 649 LOGE("Get signature algor oid failed!"); in GetSignatureAlgName()
|
H A D | x509_certificate_openssl.c | 918 const ASN1_OBJECT *oid = NULL; in GetSigAlgOidX509Openssl() local 919 X509_ALGOR_get0(&oid, NULL, NULL, alg); in GetSigAlgOidX509Openssl() 921 int32_t resLen = OBJ_obj2txt(algOid, OID_STR_MAX_LEN, oid, 1); in GetSigAlgOidX509Openssl()
|
/base/security/certificate_framework/test/unittest/cf_sdk_test/src/ |
H A D | cf_extension_test.cpp | 286 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) };
in HWTEST_F() local 291 { .tag = CF_TAG_PARAM1_BUFFER, .blob = oid },
in HWTEST_F() 305 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) };
in HWTEST_F() local 310 { .tag = CF_TAG_PARAM1_BUFFER, .blob = oid },
in HWTEST_F() 324 CfBlob oid = { strlen(oidStr), reinterpret_cast<uint8_t *>(oidStr) };
in HWTEST_F() local 329 { .tag = CF_TAG_PARAM1_BUFFER, .blob = oid },
in HWTEST_F()
|
/base/security/certificate_framework/frameworks/adapter/v1.0/inc/ |
H A D | certificate_openssl_common.h | 40 const char *GetAlgorithmName(const char *oid);
|
/base/security/certificate_framework/test/fuzztest/cfgetandcheck_fuzzer/ |
H A D | cfgetandcheck_fuzzer.cpp | 115 CfBlob oid = { size - sizeof(uint32_t), reinterpret_cast<uint8_t *>(data + sizeof(uint32_t)) }; in TestObjectTypeFunc4() local 120 { .tag = CF_TAG_PARAM1_BUFFER, .blob = oid }, in TestObjectTypeFunc4()
|
/base/security/appverify/interfaces/innerkits/appverify_lite/src/ |
H A D | mbedtls_pkcs7.c | 138 *p += len; // pass the oid info to the real content location. in GetContentInfoType() 345 if (first->oid.tag != second->oid.tag || in CompareX509NameList() 346 first->oid.len != second->oid.len || in CompareX509NameList() 347 memcmp(first->oid.p, second->oid.p, second->oid.len) != 0 || in CompareX509NameList() 504 rc = GetContentInfoType(p, end, &content->oid, &hasContent); in ParseSignedDataContentInfo() 509 if (MBEDTLS_OID_CMP(MBEDTLS_OID_PKCS7_DATA, &content->oid) || !hasConten in ParseSignedDataContentInfo() [all...] |
/base/security/huks/frameworks/huks_standard/main/core/src/ |
H A D | hks_verifier.c | 366 static ASN1_OBJECT *GetObjByOid(int32_t nid, const char *oid, const char *sn, const char *ln)
in GetObjByOid() argument 372 len = a2d_ASN1_OBJECT(NULL, 0, oid, -1);
in GetObjByOid() 381 len = a2d_ASN1_OBJECT(buf, len, oid, -1);
in GetObjByOid() 398 HKS_IF_NULL_LOGE_RETURN(obj, ret, "get obj by oid failed")
in GetKeyDescriptionSeqValue()
|
/base/security/certificate_framework/test/unittest/v1.0/src/ |
H A D | crypto_x509_certificate_test.cpp | 611 /* oid is nullptr */ 618 /* oid not found */ 621 char oid[] = "1.2.840.113549.1.1.255"; in HWTEST_F() local 622 const char *str = GetAlgorithmName(oid); in HWTEST_F() 1055 /* HcfX509CertMatchParams's public key algorithm oid is valid */ 1071 /* HcfX509CertMatchParams's public key algorithm oid is invalid */ 1087 /* HcfX509CertMatchParams's public key algorithm oid is empty */
|