| /kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
| H A D | x509_public_key.c | 23 int x509_get_sig_params(struct x509_certificate *cert) in x509_get_sig_params() argument 25 struct public_key_signature *sig = cert->sig; in x509_get_sig_params() 33 sig->data = cert->tbs; in x509_get_sig_params() 34 sig->data_size = cert->tbs_size; in x509_get_sig_params() 36 if (!cert->pub->pkey_algo) in x509_get_sig_params() 37 cert->unsupported_key = true; in x509_get_sig_params() 40 cert->unsupported_sig = true; in x509_get_sig_params() 44 cert->unsupported_sig = true; in x509_get_sig_params() 48 sig->s = kmemdup(cert->raw_sig, cert in x509_get_sig_params() 104 x509_check_for_self_signed(struct x509_certificate *cert) x509_check_for_self_signed() argument 163 struct x509_certificate *cert; x509_key_preparse() local [all...] |
| H A D | x509_cert_parser.c | 20 struct x509_certificate *cert; /* Certificate being constructed */ member 22 const void *cert_start; /* Start of cert content */ 46 void x509_free_certificate(struct x509_certificate *cert) in x509_free_certificate() argument 48 if (cert) { in x509_free_certificate() 49 public_key_free(cert->pub); in x509_free_certificate() 50 public_key_signature_free(cert->sig); in x509_free_certificate() 51 kfree(cert->issuer); in x509_free_certificate() 52 kfree(cert->subject); in x509_free_certificate() 53 kfree(cert->id); in x509_free_certificate() 54 kfree(cert in x509_free_certificate() 65 struct x509_certificate *cert; x509_cert_parse() local [all...] |
| /kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
| H A D | x509_public_key.c | 25 int x509_get_sig_params(struct x509_certificate *cert) in x509_get_sig_params() argument 27 struct public_key_signature *sig = cert->sig; in x509_get_sig_params() 35 sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL); in x509_get_sig_params() 39 sig->s_size = cert->raw_sig_size; in x509_get_sig_params() 47 cert->unsupported_sig = true; in x509_get_sig_params() 67 if (strcmp(cert->pub->pkey_algo, "sm2") == 0) { in x509_get_sig_params() 70 sm2_compute_z_digest(desc, cert->pub->key, in x509_get_sig_params() 71 cert->pub->keylen, sig->digest) ?: in x509_get_sig_params() 75 crypto_shash_finup(desc, cert in x509_get_sig_params() 106 x509_check_for_self_signed(struct x509_certificate *cert) x509_check_for_self_signed() argument 165 struct x509_certificate *cert; x509_key_preparse() local [all...] |
| H A D | x509_cert_parser.c | 20 struct x509_certificate *cert; /* Certificate being constructed */ member 26 enum OID key_algo; /* Algorithm used by the cert's key */ 28 enum OID sig_algo; /* Algorithm used to sign the cert */ 44 void x509_free_certificate(struct x509_certificate *cert) in x509_free_certificate() argument 46 if (cert) { in x509_free_certificate() 47 public_key_free(cert->pub); in x509_free_certificate() 48 public_key_signature_free(cert->sig); in x509_free_certificate() 49 kfree(cert->issuer); in x509_free_certificate() 50 kfree(cert->subject); in x509_free_certificate() 51 kfree(cert in x509_free_certificate() 63 struct x509_certificate *cert; x509_cert_parse() local [all...] |
| /test/xts/acts/security/certificate_framework/js_api_test_oh40/entry/src/ohosTest/js/test/utils/certificate/ |
| H A D | publicCertificateCommon.js | 17 import cert from "@ohos.security.cert";
20 expect(cert.CertResult.INVALID_PARAMS).assertEqual(401);
21 expect(cert.CertResult.NOT_SUPPORT).assertEqual(801);
22 expect(cert.CertResult.ERR_OUT_OF_MEMORY).assertEqual(19020001);
23 expect(cert.CertResult.ERR_RUNTIME_ERROR).assertEqual(19020002);
24 expect(cert.CertResult.ERR_CRYPTO_OPERATION).assertEqual(19030001);
25 expect(cert.CertResult.ERR_CERT_SIGNATURE_FAILURE).assertEqual(19030002);
26 expect(cert.CertResult.ERR_CERT_NOT_YET_VALID).assertEqual(19030003);
27 expect(cert [all...] |
| /base/startup/init/test/unittest/fs_manager/ |
| H A D | libfs_hvb_unittest.cpp | 144 struct hvb_cert cert; in HWTEST_F() local 146 int ret = FsHvbConstructVerityTarget(nullptr, devName, &cert); in HWTEST_F() 148 ret = FsHvbConstructVerityTarget(&target, nullptr, &cert); in HWTEST_F() 153 cert.image_len = 512; in HWTEST_F() 154 cert.data_block_size = 0; in HWTEST_F() 155 ret = FsHvbConstructVerityTarget(&target, devName, &cert); in HWTEST_F() 157 cert.data_block_size = 8; in HWTEST_F() 158 cert.hash_block_size = 0; in HWTEST_F() 159 ret = FsHvbConstructVerityTarget(&target, devName, &cert); in HWTEST_F() 162 cert in HWTEST_F() [all...] |
| /base/startup/hvb/libhvb/src/cert/ |
| H A D | hvb_cert.c | 101 struct hvb_cert *cert, const char *const *hash_ptn_list, in hash_image_init_desc() 107 struct hvb_buf salt_buf = {cert->hash_payload.salt, cert->salt_size}; in hash_image_init_desc() 108 struct hvb_buf digest_buf = {cert->hash_payload.digest, cert->digest_size}; in hash_image_init_desc() 111 enum hvb_image_type image_type = (enum hvb_image_type)cert->verity_type; in hash_image_init_desc() 118 image_buf.size = cert->image_original_len; in hash_image_init_desc() 137 ret = hvb_compare_hash(&digest_buf, &image_buf, &salt_buf, cert->hash_algo); in hash_image_init_desc() 178 static enum hvb_errno _hvb_cert_payload_parser(struct hvb_cert *cert, uint8_t **p, uint8_t *end) in _hvb_cert_payload_parser() argument 181 struct hash_payload *payload = &cert in _hvb_cert_payload_parser() 100 hash_image_init_desc(struct hvb_ops *ops, const char *ptn, struct hvb_cert *cert, const char *const *hash_ptn_list, struct hvb_verified_data *vd) hash_image_init_desc() argument 198 _hvb_cert_payload_parser_v2(struct hvb_cert *cert, uint8_t **p, uint8_t *end, uint8_t *header) _hvb_cert_payload_parser_v2() argument 231 _hvb_cert_signature_parser(struct hvb_cert *cert, uint8_t **p, uint8_t *end) _hvb_cert_signature_parser() argument 267 _hvb_cert_signature_parser_v2(struct hvb_cert *cert, uint8_t **p, uint8_t *end, uint8_t *header) _hvb_cert_signature_parser_v2() argument 312 hvb_cert_parser(struct hvb_cert *cert, struct hvb_buf *cert_buf) hvb_cert_parser() argument 475 _check_rollback_index(struct hvb_ops *ops, struct hvb_cert *cert, struct hvb_verified_data *vd) _check_rollback_index() argument 525 struct hvb_cert cert = {0}; cert_init_desc() local [all...] |
| /kernel/linux/common_modules/code_sign/ |
| H A D | verify_cert_chain.c | 31 struct x509_certificate *cert; in pkcs7_find_key() local 37 cert = pkcs7->certs; in pkcs7_find_key() 38 while (cert) { in pkcs7_find_key() 39 if (asymmetric_key_id_same(cert->id, sinfo->sig->auth_ids[0])) { in pkcs7_find_key() 40 if (strcmp(cert->pub->pkey_algo, sinfo->sig->pkey_algo) != 0 in pkcs7_find_key() 41 && (strncmp(cert->pub->pkey_algo, "ecdsa-", 6) != 0 in pkcs7_find_key() 42 || strcmp(cert->sig->pkey_algo, "ecdsa") != 0)) { in pkcs7_find_key() 44 cert = cert->next; in pkcs7_find_key() 50 sinfo->index, cert in pkcs7_find_key() 189 struct x509_certificate* cert = pkcs7->certs; code_sign_verify_certchain() local [all...] |
| H A D | code_sign_ioctl.c | 41 code_sign_log_info("cert found"); in matched_cert_search() 46 code_sign_log_error("cert not found"); in matched_cert_search() 90 int cert_chain_insert(struct rb_root *root, struct cert_source *cert) in cert_chain_insert() argument 98 if (!(cert->path_type == RELEASE_DEVELOPER_CODE in cert_chain_insert() 99 || cert->path_type == DEBUG_DEVELOPER_CODE)) { in cert_chain_insert() 100 code_sign_log_error("no permission to insert code %d", cert->path_type); in cert_chain_insert() 110 int result = strcmp(cert->subject, this->subject); in cert_chain_insert() 118 result = strcmp(cert->issuer, this->issuer); in cert_chain_insert() 125 code_sign_log_info("cert already exist in trust sources"); in cert_chain_insert() 132 cert in cert_chain_insert() 143 cert_chain_remove(struct rb_root *root, struct cert_source *cert) cert_chain_remove() argument [all...] |
| /test/xts/acts/security/cryptoFramework/js_api_test_one/entry/src/ohosTest/js/test/utils/securityrandom/ |
| H A D | publicSecurityRandomCommon.js | 17 import cert from "@ohos.security.cert";
21 expect(401).assertEqual(cert.CertResult.INVALID_PARAMS);
23 expect(801).assertEqual(cert.CertResult.NOT_SUPPORT);
25 expect(19020001).assertEqual(cert.CertResult.ERR_OUT_OF_MEMORY);
27 expect(19020002).assertEqual(cert.CertResult.ERR_RUNTIME_ERROR);
29 expect(19030001).assertEqual(cert.CertResult.ERR_CRYPTO_OPERATION);
30 expect(19030002).assertEqual(cert.CertResult.ERR_CERT_SIGNATURE_FAILURE);
31 expect(19030003).assertEqual(cert.CertResult.ERR_CERT_NOT_YET_VALID);
32 expect(19030004).assertEqual(cert [all...] |
| /base/security/appverify/interfaces/innerkits/appverify/src/util/ |
| H A D | hap_cert_verify_openssl_utils.cpp | 55 X509* cert = PEM_read_bio_X509(pemBio, nullptr, nullptr, nullptr);
in GetX509CertFromPemString() local 57 return cert;
in GetX509CertFromPemString() 73 X509* cert = d2i_X509(nullptr, &derBits, len);
in GetX509CertFromBase64String() local 74 return cert;
in GetX509CertFromBase64String() 79 X509* cert = GetX509CertFromPemString(certStr);
in GetPublickeyBase64FromPemCert() local 80 if (cert == nullptr) {
in GetPublickeyBase64FromPemCert() 85 if (!GetPublickeyBase64(cert, publicKey)) {
in GetPublickeyBase64FromPemCert() 88 X509_free(cert);
in GetPublickeyBase64FromPemCert() 91 X509_free(cert);
in GetPublickeyBase64FromPemCert() 98 X509* cert in GetFingerprintBase64FromPemCert() local 140 GetPublickeyBase64(const X509* cert, std::string& publicKey) GetPublickeyBase64() argument 173 X509* cert = GetX509CertFromPemString(certStr); GetOrganizationFromPemCert() local 285 X509* cert = sk_X509_value(certs, i); global() variable 309 X509* cert = certsChain[0]; GetCertsChain() local 333 FindCertOfIssuer(X509* cert, CertSign& certVisitSign) FindCertOfIssuer() argument 357 CertVerify(X509* cert, const X509* issuerCert) CertVerify() argument 490 GetSubjectFromX509(const X509* cert, std::string& subject) GetSubjectFromX509() argument 503 GetIssuerFromX509(const X509* cert, std::string& issuer) GetIssuerFromX509() argument 516 GetSerialNumberFromX509(const X509* cert, long long& certNumber) GetSerialNumberFromX509() argument [all...] |
| /kernel/linux/linux-6.6/arch/s390/boot/ |
| H A D | ipl_report.c | 31 struct ipl_rb_certificate_entry *cert; in get_cert_comp_list_size() local 42 for_each_rb_entry(cert, certs) in get_cert_comp_list_size() 43 ipl_cert_list_size += sizeof(unsigned int) + cert->len; in get_cert_comp_list_size() 50 struct ipl_rb_certificate_entry *cert; in ipl_report_certs_intersects() local 55 for_each_rb_entry(cert, certs) { in ipl_report_certs_intersects() 56 if (intersects(addr, size, cert->addr, cert->len)) { in ipl_report_certs_intersects() 57 *intersection_start = cert->addr; in ipl_report_certs_intersects() 75 struct ipl_rb_certificate_entry *cert; in copy_certificates_bootdata() local 79 for_each_rb_entry(cert, cert in copy_certificates_bootdata() [all...] |
| /base/update/updater/services/package/pkg_verify/ |
| H A D | cert_verify.cpp | 52 int32_t CertVerify::CheckCertChain(STACK_OF(X509) *certStack, X509 *cert) 58 return helper_->CertChainCheck(certStack, cert); 72 PKG_LOGE("Init root cert fail"); in Init() 78 int32_t SingleCertHelper::CertChainCheck(STACK_OF(X509) * certStack, X509 *cert) 81 if (cert == nullptr) { 85 return VerifySingleCert(cert); 93 PKG_LOGE("Get root cert fail, file: %s", Utils::GetCertName().c_str()); in InitRootCert() 109 int32_t SingleCertHelper::VerifySingleCert(X509 *cert) in VerifySingleCert() argument 111 int32_t ret = CompareCertSubjectAndIssuer(cert); in VerifySingleCert() 113 PKG_LOGE("compare cert subjec in VerifySingleCert() 120 CompareCertSubjectAndIssuer(X509 *cert) CompareCertSubjectAndIssuer() argument [all...] |
| H A D | openssl_util.cpp | 103 X509 *cert = PEM_read_bio_X509(pemBio, nullptr, nullptr, nullptr); in GetX509CertFromPemString() local 104 if (cert == nullptr) { in GetX509CertFromPemString() 109 return cert; in GetX509CertFromPemString() 125 X509 *cert = PEM_read_bio_X509(certbio, nullptr, nullptr, nullptr); in GetX509CertFromPemFile() local 126 if (cert == nullptr) { in GetX509CertFromPemFile() 133 return cert; in GetX509CertFromPemFile() 136 bool VerifyX509CertByIssuerCert(X509 *cert, X509 *issuerCert) in VerifyX509CertByIssuerCert() argument 138 if (cert == nullptr || issuerCert == nullptr) { in VerifyX509CertByIssuerCert() 148 bool ret = (X509_verify(cert, pubKey) == 1); in VerifyX509CertByIssuerCert() 265 std::string GetX509CertSubjectName(X509 *cert) in GetX509CertSubjectName() argument 280 GetX509CertIssuerName(X509 *cert) GetX509CertIssuerName() argument [all...] |
| /base/startup/init/interfaces/innerkits/fs_manager/libfs_hvb/ |
| H A D | fs_hvb.c | 169 BEGET_LOGE("error, cert digest not match with cmdline"); in FsHvbCheckCertChainDigest() 201 BEGET_LOGE("error 0x%x, cert chain hash", rc); in FsHvbInit() 210 static int FsHvbGetCert(struct hvb_cert *cert, char *devName, struct hvb_verified_data *vd) in FsHvbGetCert() argument 232 hr = hvb_cert_parser(cert, &p->data); in FsHvbGetCert() 234 BEGET_LOGE("error 0x%x, parser hvb cert", hr); in FsHvbGetCert() 364 static int FsHvbVerityTargetAddFecArgs(struct hvb_cert *cert, char *devPath, char **str, char *end) in FsHvbVerityTargetAddFecArgs() argument 366 FS_HVB_RETURN_ERR_IF_NULL(cert); in FsHvbVerityTargetAddFecArgs() 377 RETURN_ERR_IF_APPEND_DIGIT_ERR(str, end, cert->fec_num_roots); in FsHvbVerityTargetAddFecArgs() 379 if (cert->data_block_size == 0 || cert in FsHvbVerityTargetAddFecArgs() 404 FsHvbConstructVerityTarget(DmVerityTarget *target, const char *devName, struct hvb_cert *cert) FsHvbConstructVerityTarget() argument 483 struct hvb_cert cert = {0}; FsHvbCreateVerityTarget() local [all...] |
| /base/security/appverify/interfaces/innerkits/appverify/test/unittest/src/ |
| H A D | trusted_root_ca_test.cpp | 80 * @tc.desc: The static function will return object of matched cert;
90 X509* cert = nullptr;
in HWTEST_F() local 91 ASSERT_TRUE(rootCertsObj.FindMatchedRoot(cert) == nullptr);
in HWTEST_F() 93 * @tc.steps: step2. input a self sign cert.
in HWTEST_F() 96 cert = HapCertVerifyOpensslUtils::GetX509CertFromPemString(ECC_TEST_CERT);
in HWTEST_F() 97 ASSERT_TRUE(cert != nullptr);
in HWTEST_F() 98 ASSERT_TRUE(rootCertsObj.FindMatchedRoot(cert) == nullptr);
in HWTEST_F() 99 X509_free(cert);
in HWTEST_F() 101 * @tc.steps: step2. input a slft ca sign cert.
in HWTEST_F() 104 cert in HWTEST_F() [all...] |
| /kernel/linux/linux-5.10/arch/s390/boot/ |
| H A D | ipl_report.c | 34 struct ipl_rb_certificate_entry *cert; in find_bootdata_space() local 45 for_each_rb_entry(cert, certs) in find_bootdata_space() 46 ipl_cert_list_size += sizeof(unsigned int) + cert->len; in find_bootdata_space() 73 for_each_rb_entry(cert, certs) in find_bootdata_space() 74 if (intersects(safe_addr, size, cert->addr, cert->len)) { in find_bootdata_space() 75 safe_addr = cert->addr + cert->len; in find_bootdata_space() 95 struct ipl_rb_certificate_entry *cert; in copy_certificates_bootdata() local 99 for_each_rb_entry(cert, cert in copy_certificates_bootdata() [all...] |
| /base/request/request/services/src/manage/config/ |
| H A D | cert_manager.rs | 36 self.info.read().unwrap().cert.clone() 46 cert: Option<Vec<Certificate>>, 69 let cert = unsafe { &**item }; in update_system_cert() 70 let cert_slice = unsafe { std::slice::from_raw_parts(cert.data, cert.size as usize) }; in update_system_cert() 72 Ok(cert) => { in update_system_cert() 73 certificates.push(cert); in update_system_cert() 76 error!("parse security cert path failed, error is {:?}", e); in update_system_cert() 85 Ok(cert) => { in update_system_cert() 86 certificates.push(cert); in update_system_cert() [all...] |
| /base/security/dlp_permission_service/services/dlp_permission/sa/test/unittest/src/ |
| H A D | dlp_credential_test.cpp | 88 std::vector<uint8_t> cert; in HWTEST_F() local 89 proxy->OnGenerateDlpCertificate(0, cert); in HWTEST_F() 90 EXPECT_EQ(true, (cert.size() == 0)); in HWTEST_F() 91 proxy->OnGenerateDlpCertificate(-1, cert); in HWTEST_F() 92 EXPECT_EQ(true, (cert.size() == 0)); in HWTEST_F() 95 proxy->OnParseDlpCertificate(0, policy, cert); in HWTEST_F() 96 EXPECT_EQ(true, (cert.size() == 0)); in HWTEST_F() 97 proxy->OnParseDlpCertificate(-1, policy, cert); in HWTEST_F() 98 EXPECT_EQ(true, (cert.size() == 0)); in HWTEST_F() 107 void OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) overrid [all...] |
| /base/security/code_signature/utils/src/ |
| H A D | openssl_utils.cpp | 40 LOG_ERROR("Fail to create bio for cert.");
in LoadCertFromBuffer() 43 X509 *cert = d2i_X509_bio(mem, nullptr);
in LoadCertFromBuffer() local 44 if (cert == nullptr) {
in LoadCertFromBuffer() 48 return cert;
in LoadCertFromBuffer() 53 X509 *cert = LoadCertFromBuffer(certBuffer.GetBuffer(), certBuffer.GetSize());
in ConvertCertToPEMString() local 54 if (cert == nullptr) {
in ConvertCertToPEMString() 59 X509_free(cert);
in ConvertCertToPEMString() 64 if (!PEM_write_bio_X509(mem, cert)) {
in ConvertCertToPEMString() 77 X509_free(cert);
in ConvertCertToPEMString() 88 for (const ByteBuffer &cert in MakeStackOfCerts() [all...] |
| /base/security/certificate_framework/frameworks/adapter/v1.0/src/ |
| H A D | certificate_openssl_common.c | 153 LOGE("Date is null in x509 cert!");
in CompareDateWithCertTime() 160 LOGE("Date is not validate in x509 cert!");
in CompareDateWithCertTime() 163 LOGE("Date is expired in x509 cert!");
in CompareDateWithCertTime() 201 CfResult CompareNameObject(const X509 *cert, const CfBlob *derBlob, X509NameType type, bool *compareRes)
in CompareNameObject() argument 205 name = X509_get_subject_name(cert);
in CompareNameObject() 207 name = X509_get_issuer_name(cert);
in CompareNameObject() 353 bool CheckIsSelfSigned(const X509 *cert)
in CheckIsSelfSigned() argument 355 if (cert == NULL) {
in CheckIsSelfSigned() 359 X509_NAME *issuer = X509_get_issuer_name(cert);
in CheckIsSelfSigned() 366 X509_NAME *subject = X509_get_subject_name(cert);
in CheckIsSelfSigned() 377 CheckIsLeafCert(X509 *cert) CheckIsLeafCert() argument 398 X509 *cert = NULL; STACK_OF() local 439 CheckSelfPubkey(X509 *cert, const EVP_PKEY *pubKey) CheckSelfPubkey() argument 463 X509 *cert = NULL; STACK_OF() local 541 GetSubjectNameFromX509(X509 *cert, CfBlob **sub) GetSubjectNameFromX509() argument 569 GetNameConstraintsFromX509(X509 *cert, CfBlob **name) GetNameConstraintsFromX509() argument [all...] |
| /base/request/request/services/src/cxx/ |
| H A D | request_cert_mgr_adapter.cpp | 72 void RequestCertManager::FreeCertData(struct CRequestCert *cert)
in FreeCertData() argument 74 if (cert == nullptr) {
in FreeCertData() 78 if (cert->data != nullptr) {
in FreeCertData() 79 free(cert->data);
in FreeCertData() 80 cert->data = nullptr;
in FreeCertData() 82 cert->size = 0;
in FreeCertData() 83 free(cert);
in FreeCertData() 106 REQUEST_HILOGE("GetUserCertsData, init cert list failed, ret = %{public}d", ret);
in GetUserCertsData() 112 REQUEST_HILOGE("GetUserCertsData, get cert list failed, ret = %{public}d", ret);
in GetUserCertsData() 139 REQUEST_HILOGE("GetUserCertsData, init cert inf in GetUserCertsData() 156 struct CRequestCert *cert = static_cast<struct CRequestCert *>(malloc(sizeof(struct CRequestCert))); GetUserCertsData() local [all...] |
| /base/security/certificate_framework/frameworks/js/napi/certificate/src/ |
| H A D | napi_x509_certificate.cpp | 54 HcfX509Certificate *cert = nullptr; member 161 HcfX509Certificate *cert = context->certClass->GetX509Cert(); in VerifyExecute() local 162 context->errCode = cert->base.verify(&(cert->base), context->pubKey); in VerifyExecute() 164 LOGE("verify cert failed!"); in VerifyExecute() 165 context->errMsg = "verify cert failed"; in VerifyExecute() 179 HcfX509Certificate *cert = context->certClass->GetX509Cert(); in GetEncodedExecute() local 187 context->errCode = cert->base.getEncoded(&(cert->base), encodingBlob); in GetEncodedExecute() 189 LOGE("get cert encode in GetEncodedExecute() 309 HcfX509Certificate *cert = GetX509Cert(); GetPublicKey() local 352 HcfX509Certificate *cert = GetX509Cert(); CheckValidityWithDate() local 363 HcfX509Certificate *cert = GetX509Cert(); GetVersion() local 372 HcfX509Certificate *cert = GetX509Cert(); GetSerialNumber() local 388 HcfX509Certificate *cert = GetX509Cert(); GetCertSerialNumber() local 409 HcfX509Certificate *cert = GetX509Cert(); GetIssuerName() local 432 HcfX509Certificate *cert = GetX509Cert(); GetSubjectName() local 451 HcfX509Certificate *cert = GetX509Cert(); GetSubjectNameEx() local 470 HcfX509Certificate *cert = GetX509Cert(); GetNotBeforeTime() local 495 HcfX509Certificate *cert = GetX509Cert(); GetNotAfterTime() local 520 HcfX509Certificate *cert = GetX509Cert(); GetSignature() local 543 HcfX509Certificate *cert = GetX509Cert(); GetSigAlgName() local 568 HcfX509Certificate *cert = GetX509Cert(); GetSigAlgOID() local 593 HcfX509Certificate *cert = GetX509Cert(); GetSigAlgParams() local 616 HcfX509Certificate *cert = GetX509Cert(); GetKeyUsage() local 639 HcfX509Certificate *cert = GetX509Cert(); GetExtendedKeyUsage() local 658 HcfX509Certificate *cert = GetX509Cert(); GetBasicConstraints() local 672 HcfX509Certificate *cert = GetX509Cert(); GetSubjectAlternativeNames() local 695 HcfX509Certificate *cert = GetX509Cert(); GetIssuerAlternativeNames() local 752 HcfX509Certificate *cert = GetX509Cert(); ToString() local 769 HcfX509Certificate *cert = GetX509Cert(); HashCode() local 820 HcfX509Certificate *cert = GetX509Cert(); GetExtensionsObject() local 860 HcfX509Certificate *cert = GetX509Cert(); GetIssuerX500DistinguishedName() local 897 HcfX509Certificate *cert = GetX509Cert(); GetSubjectX500DistinguishedName() local 939 HcfX509Certificate *cert = GetX509Cert(); GetCRLDistributionPointsURI() local 957 HcfX509Certificate *cert = GetX509Cert(); MatchProc() local [all...] |
| /base/security/dlp_permission_service/interfaces/inner_api/dlp_permission/src/ |
| H A D | dlp_permission_async_stub.cpp | 64 std::vector<uint8_t> cert; in OnGenerateDlpCertificateStub() local 76 if (!data.ReadUInt8Vector(&cert)) { in OnGenerateDlpCertificateStub() 81 this->OnGenerateDlpCertificate(result, cert); in OnGenerateDlpCertificateStub() 85 void DlpPermissionAsyncStub::OnGenerateDlpCertificate(int32_t result, const std::vector<uint8_t>& cert) in OnGenerateDlpCertificate() argument 92 generateDlpCertificateCallback_->OnGenerateDlpCertificate(result, cert); in OnGenerateDlpCertificate() 116 std::vector<uint8_t> cert; in OnParseDlpCertificateStub() local 117 if (!data.ReadUInt8Vector(&cert)) { in OnParseDlpCertificateStub() 122 this->OnParseDlpCertificate(result, policyParcel->policyParams_, cert); in OnParseDlpCertificateStub() 127 const std::vector<uint8_t>& cert) in OnParseDlpCertificate() 134 parseDlpCertificateCallback_->OnParseDlpCertificate(result, policy, cert); in OnParseDlpCertificate() 126 OnParseDlpCertificate(int32_t result, const PermissionPolicy& policy, const std::vector<uint8_t>& cert) OnParseDlpCertificate() argument [all...] |
| /kernel/linux/linux-6.6/certs/ |
| H A D | Makefile | 26 cmd_extract_certs = $(obj)/extract-cert "$(extract-cert-in)" $@ 27 extract-cert-in = $(filter-out $(obj)/extract-cert, $(real-prereqs)) 31 $(obj)/x509_certificate_list: $(CONFIG_SYSTEM_TRUSTED_KEYS) $(obj)/extract-cert FORCE 70 $(obj)/signing_key.x509: extract-cert-in := $(PKCS11_URI) 73 $(obj)/signing_key.x509: $(filter-out $(PKCS11_URI),$(CONFIG_MODULE_SIG_KEY)) $(obj)/extract-cert FORCE 80 $(obj)/x509_revocation_list: $(CONFIG_SYSTEM_REVOCATION_KEYS) $(obj)/extract-cert FORCE 85 hostprogs := extract-cert 87 HOSTCFLAGS_extract-cert [all...] |