/base/security/code_signature/services/key_enable/utils/src/ |
H A D | key_enable_adapter.cpp | 25 int32_t InitLocalCertificate(uint8_t *certData, uint32_t *certSize) in InitLocalCertificate() argument 32 if (memcpy_s(certData, *certSize, cert.GetBuffer(), cert.GetSize()) != EOK) { in InitLocalCertificate() 35 *certSize = cert.GetSize(); in InitLocalCertificate()
|
/base/security/dlp_permission_service/test/fuzztest/dlp_permission/fuzzer/parsedlpheader_fuzzer/ |
H A D | parsedlpheader_fuzzer.cpp | 66 uint32_t certSize = txtSize; in FuzzTest() local 69 certSize = data[0] % HUNDRED; in FuzzTest() 77 .txtOffset = sizeof(struct DlpHeader) + certSize + contactAccountSize, in FuzzTest() 80 .certSize = certSize, in FuzzTest()
|
/base/security/code_signature/utils/src/ |
H A D | cert_utils.cpp | 156 uint32_t certSize;
in GetCertChainFormBuffer() local 160 if (!CheckSizeAndAssign(rawPtr, restSize, certSize)) {
in GetCertChainFormBuffer() 164 ret = CheckSizeAndCopy(rawPtr, restSize, certSize, signCert);
in GetCertChainFormBuffer() 166 ret = CheckSizeAndCopy(rawPtr, restSize, certSize, issuer);
in GetCertChainFormBuffer() 169 ret = CheckSizeAndCopy(rawPtr, restSize, certSize, cert);
in GetCertChainFormBuffer()
|
/base/security/code_signature/services/key_enable/utils/include/ |
H A D | key_enable_adapter.h | 28 int32_t InitLocalCertificate(uint8_t *cert, uint32_t *certSize);
|
/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/src/ |
H A D | dlp_file_manager.cpp | 109 size_t certSize = cert.size(); in GenerateCertBlob() local 110 if (certSize > DLP_MAX_CERT_SIZE) { in GenerateCertBlob() 111 DLP_LOG_ERROR(LABEL, "Check dlp cert fail, cert is too large, size=%{public}zu", certSize); in GenerateCertBlob() 114 if (certSize == 0) { in GenerateCertBlob() 115 DLP_LOG_ERROR(LABEL, "Check dlp cert fail, cert is zero, size=%{public}zu", certSize); in GenerateCertBlob() 119 uint8_t* certBuffer = new (std::nothrow) uint8_t[certSize]; in GenerateCertBlob() 125 if (memcpy_s(certBuffer, certSize, &cert[0], certSize) != EOK) { in GenerateCertBlob() 127 (void)memset_s(certBuffer, certSize, 0, certSize); in GenerateCertBlob() [all...] |
H A D | dlp_file_kits.cpp | 98 if (head.magic != DLP_FILE_MAGIC || head.certSize == 0 || head.certSize > DLP_MAX_CERT_SIZE || in IsValidDlpHeader() 101 DLP_LOG_ERROR(LABEL, "Parse dlp file header error. certSize=%{public}u, contactAccountSize=%{public}u", in IsValidDlpHeader() 102 head.certSize, head.contactAccountSize); in IsValidDlpHeader() 105 if (head.contactAccountOffset != (sizeof(struct DlpHeader) + head.certSize) || in IsValidDlpHeader() 106 head.txtOffset != (sizeof(struct DlpHeader) + head.certSize + head.contactAccountSize + head.offlineCertSize) || in IsValidDlpHeader()
|
H A D | dlp_file.cpp | 65 head_.certSize = 0; in DlpFile() 109 (void)memset_s(cert_.data, head_.certSize, 0, head_.certSize); in ~DlpFile() 329 if (head_.certSize != 0) { in SetContactAccount() 331 head_.contactAccountOffset = head_.certOffset + head_.certSize; in SetContactAccount() 363 if (head.magic != DLP_FILE_MAGIC || head.certSize == 0 || head.certSize > DLP_MAX_CERT_SIZE || in IsValidDlpHeader() 366 head.contactAccountOffset != (sizeof(struct DlpHeader) + head.certSize) || in IsValidDlpHeader() 367 head.txtOffset != (sizeof(struct DlpHeader) + head.certSize + head.contactAccountSize + head.offlineCertSize) || in IsValidDlpHeader() 623 uint8_t* buf = new (std::nothrow)uint8_t[head_.certSize]; in ParseDlpHeaderInRaw() [all...] |
/base/web/webview/ohos_interface/ohos_glue/ohos_adapter/bridge/webcore/ |
H A D | ark_cert_manager_adapter_wrapper.cpp | 68 int ArkCertManagerAdapterWrapper::VerifyCertFromNetSsl(uint8_t* certData, uint32_t certSize) in VerifyCertFromNetSsl() argument 70 return ctocpp_->VerifyCertFromNetSsl(certData, certSize); in VerifyCertFromNetSsl()
|
H A D | ark_cert_manager_adapter_wrapper.h | 48 int VerifyCertFromNetSsl(uint8_t* certData, uint32_t certSize);
|
/base/web/webview/ohos_interface/ohos_glue/ohos_adapter/bridge/webview/ |
H A D | ark_cert_manager_adapter_impl.h | 48 int VerifyCertFromNetSsl(uint8_t* certData, uint32_t certSize) override;
|
H A D | ark_cert_manager_adapter_impl.cpp | 71 int ArkCertManagerAdapterImpl::VerifyCertFromNetSsl(uint8_t* certData, uint32_t certSize) in VerifyCertFromNetSsl() argument
|
/base/web/webview/ohos_interface/ohos_glue/ohos_adapter/include/ |
H A D | ark_cert_manager_adapter.h | 57 virtual int VerifyCertFromNetSsl(uint8_t* certData, uint32_t certSize) = 0;
|
/base/security/certificate_manager/frameworks/cert_manager_standard/main/common/src/ |
H A D | cm_pfx.c | 76 appCert->certSize = (uint32_t)len; in CmGetAppCertChain()
|
/base/security/certificate_manager/test/unittest/module_test/src/ |
H A D | cm_log_test.cpp | 129 uint32_t certSize = sizeof(g_ed25519CaCert);
in ConstructCertBuf() local 130 if (memcpy_s(outBlob->data + offset, outBlob->size - offset, &certSize, sizeof(certSize)) != EOK) {
in ConstructCertBuf() 133 offset += sizeof(certSize);
in ConstructCertBuf()
|
/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/test/ |
H A D | dlp_file_test.cpp | 558 // head_.certSize = 0 in HWTEST_F() 559 testFile.head_.certSize = 0; in HWTEST_F() 592 .certSize = 20, in HWTEST_F() 609 // certSize 0 in HWTEST_F() 610 header.certSize = 0; in HWTEST_F() 613 // certSize too large in HWTEST_F() 614 header.certSize = DLP_MAX_CERT_SIZE + 1; in HWTEST_F() 616 header.certSize = 20; in HWTEST_F() 686 .certSize = 20, in HWTEST_F() 713 .certSize in HWTEST_F() [all...] |
H A D | dlp_file_manager_test.cpp | 243 .certSize = 32, in HWTEST_F() 281 .certSize = 256, in HWTEST_F() 324 .certSize = 256, in HWTEST_F()
|
/base/security/certificate_manager/interfaces/innerkits/cert_manager_standard/main/include/ |
H A D | cm_type.h | 324 uint32_t certSize; member
|
/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/include/ |
H A D | dlp_file.h | 57 uint32_t certSize; member
|
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_service/main/os_dependency/idl/cm_ipc/ |
H A D | cm_ipc_service.c | 553 if ((certBlob->size - (sizeof(struct AppCert) - MAX_LEN_CERTIFICATE_CHAIN)) < appCert->certSize) { in CopyCertificateInfoToBuffer() 554 CM_LOG_E("certInfo data size[%u] invalid, certSize[%u]", certBlob->size, appCert->certSize); in CopyCertificateInfoToBuffer() 570 struct CmBlob appCertBlob = { appCert->certSize, appCert->appCertdata }; in CopyCertificateInfoToBuffer()
|
/base/security/certificate_framework/test/fuzztest/v1.0/x509certchain_fuzzer/ |
H A D | x509certchain_fuzzer.cpp | 201 int certSize = sizeof(g_testSelfSignedCaCert); in CreateChainByArr() local 203 certSize, CF_FORMAT_PEM }; in CreateChainByArr()
|
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/ |
H A D | cert_manager_app_cert_process.c | 362 certBlob.size = sizeof(struct AppCert) - MAX_LEN_CERTIFICATE_CHAIN + appCert->certSize; in StoreAppCert()
|
/base/security/huks/services/huks_standard/huks_engine/main/device_cert_manager/src/ |
H A D | dcm_attest.c | 921 uint32_t certSize = tbs.size;
in CreateAttestCert() local 938 certSize += obj.header.size + obj.value.size;
in CreateAttestCert() 944 certSize += obj.header.size + obj.value.size;
in CreateAttestCert() 946 struct HksAsn1Blob certBlob = { ASN_1_TAG_TYPE_SEQ, certSize, attestCert->data + ATT_CERT_HEADER_SIZE };
in CreateAttestCert()
|