/base/security/code_signature/test/unittest/utils/src/ |
H A D | enable_key_utils.cpp | 26 int32_t EnableTestKey(const char *signing, const char *issuer)
in EnableTestKey() argument 30 arg.issuer = reinterpret_cast<uint64_t>(issuer);
in EnableTestKey() 32 arg.issuer_length = strlen(issuer) + 1;
in EnableTestKey()
|
/base/security/appverify/interfaces/innerkits/appverify/src/init/ |
H A D | hap_crl_manager.cpp | 153 X509_CRL* HapCrlManager::GetCrlByIssuer(const std::string& issuer)
in GetCrlByIssuer() argument 155 if (crlsMap.find(issuer) == crlsMap.end()) {
in GetCrlByIssuer() 158 return crlsMap[issuer];
in GetCrlByIssuer() 161 void HapCrlManager::UpdateCrlByIssuer(const std::string& issuer, X509_CRL* crl)
in UpdateCrlByIssuer() argument 167 if (crlsMap.find(issuer) != crlsMap.end()) {
in UpdateCrlByIssuer() 168 X509_CRL_free(crlsMap[issuer]);
in UpdateCrlByIssuer() 170 crlsMap[issuer] = X509_CRL_dup(crl);
in UpdateCrlByIssuer() 194 HAPVERIFY_LOG_ERROR("cert(issuer: %{public}s, subject: %{public}s, number:%{public}lld) is revoked",
in CrlCheck()
|
H A D | trusted_ticket_manager.cpp | 32 const std::string TrustedTicketManager::KEY_OF_ISSUER = "issuer-ca"; 127 if (!JsonParserUtils::GetJsonString(TicketSource, KEY_OF_ISSUER, hapTicketSource.issuer)) { in ParseTrustedTicketSourceJson() 128 HAPVERIFY_LOG_ERROR("Get issuer Failed"); in ParseTrustedTicketSourceJson() 152 "issuer: " + ticketSourceInfo.issuer + "\n" + in EncapTrustedTicketSourceString() 193 MatchIssuer(TicketSource.issuer, certIssuer)) { in TrustedSourceListCompare()
|
H A D | trusted_source_manager.cpp | 34 const std::string TrustedSourceManager::KEY_OF_ISSUER = "issuer-ca";
164 if (!JsonParserUtils::GetJsonString(appSource, KEY_OF_ISSUER, hapAppSource.issuer)) {
in ParseTrustedAppSourceJson() 165 HAPVERIFY_LOG_ERROR("Get issuer Failed");
in ParseTrustedAppSourceJson() 194 "issuer: " + appSourceInfo.issuer + "\n" +
in EncapTrustedAppSourceString() 243 MatchSubjectAndIssuer(appSource.issuer, certIssuer)) {
in TrustedSourceListCompare() 249 if (MatchSubjectAndIssuer(appSource.issuer, certIssuer)) {
in TrustedSourceListCompare()
|
/base/security/certificate_framework/frameworks/js/napi/certificate/src/ |
H A D | napi_x509_crl_match_parameters.cpp | 117 if (!GetIssuer(env, arg, matchParams->issuer)) { in BuildX509CrlMatchParams() 138 if (matchParams->issuer != nullptr) { in FreeX509CrlMatchParams() 139 FreeCfBlobArray(matchParams->issuer->data, matchParams->issuer->count); in FreeX509CrlMatchParams() 140 CF_FREE_PTR(matchParams->issuer); in FreeX509CrlMatchParams()
|
/base/security/code_signature/services/key_enable/src/ |
H A D | cert_path_utils.rs | 35 const ISSUER_KEY: &str = "issuer"; 123 /// issuer 219 let issuer = match cert_profile[ISSUER_KEY].try_as_string() { in parse_cert_profile() 238 issuer_ca: issuer.to_string(), in parse_cert_profile() 299 error!(LOG_LABEL, "Error parsing cert profile issuer : {:?}", e); in load_cert_path_from_json_file() 321 let issuer = fabricate_name(&self.issuer_ca); in add_subject_cert_path() 324 issuer, in add_subject_cert_path() 341 /// issuer 342 pub issuer: u64, 420 issuer in cert_path_operation() [all...] |
H A D | profile_utils.rs | 192 let issuer = format_x509_fabricate_name(signed_pem.issuer_name()); in get_cert_details() 193 Ok((subject, issuer, profile_type)) in get_cert_details() 345 let (subject, issuer, profile_type) = in process_profile() 355 if add_cert_path_info(subject, issuer, profile_type, DEFAULT_MAX_CERT_PATH_LEN).is_err() { in process_profile() 456 let (subject, issuer, profile_type) = process_data(&profile_data)?; in enable_key_in_profile_internal() 476 if add_cert_path_info(subject, issuer, profile_type, DEFAULT_MAX_CERT_PATH_LEN).is_err() { in enable_key_in_profile_internal() 501 let (subject, issuer, profile_type) = process_data(&profile_data)?; in process_remove_bundle() 509 if remove_cert_path_info(subject, issuer, profile_type, DEFAULT_MAX_CERT_PATH_LEN).is_err() { in process_remove_bundle()
|
/base/security/code_signature/test/unittest/ |
H A D | add_cert_path_test.cpp | 44 static const string FAKE_ISSUER = "Fake issuer";
46 static const string ISSUER_AS_SYSTEM_TYPE = "System issuer";
58 static CertPathInfo MakeCertPathInfo(const char *signing, const char *issuer,
in MakeCertPathInfo() argument 63 arg.issuer = reinterpret_cast<uint64_t>(issuer);
in MakeCertPathInfo() 65 arg.issuer_length = strlen(issuer);
in MakeCertPathInfo()
|
/base/security/appverify/interfaces/innerkits/appverify/include/init/ |
H A D | hap_crl_manager.h | 49 DLL_EXPORT X509_CRL* GetCrlByIssuer(const std::string& issuer);
50 DLL_EXPORT void UpdateCrlByIssuer(const std::string& issuer, X509_CRL* crl);
|
/base/security/appverify/interfaces/innerkits/appverify/src/provision/ |
H A D | provision_info.cpp | 54 this->issuer = info.issuer; in operator =()
|
/base/security/code_signature/test/unittest/utils/include/ |
H A D | enable_key_utils.h | 22 int EnableTestKey(const char *signing, const char *issuer);
|
/base/security/appverify/interfaces/innerkits/appverify/test/unittest/src/ |
H A D | provision_verify_test.cpp | 35 "issuer": "App Gallery" 121 "issuer": "App Gallery" 144 "issuer": "App Gallery" 168 "issuer": "App Gallery" 192 "issuer": "App Gallery" 344 "issuer": "App Gallery" in HWTEST_F() 434 "issuer": "App Gallery" 483 "issuer": "App Gallery" 535 "issuer": "App Gallery"
|
H A D | hap_cert_verify_openssl_utils_test.cpp | 104 * @tc.steps: step3. Get subject of rootCertsObj and get issuer of certX509.
in HWTEST_F() 105 * @tc.expected: step3. The subject is same as issuer.
in HWTEST_F() 109 std::string issuer;
in HWTEST_F() local 110 ASSERT_TRUE(HapCertVerifyOpensslUtils::GetIssuerFromX509(certX509, issuer));
in HWTEST_F() 111 ASSERT_TRUE(subject.compare(issuer) == 0);
in HWTEST_F() 240 std::string issuer;
in HWTEST_F() local 241 ASSERT_FALSE(HapCertVerifyOpensslUtils::GetIssuerFromX509(nullptr, issuer));
in HWTEST_F()
|
/base/security/certificate_framework/interfaces/inner_api/certificate/ |
H A D | x509_crl_match_parameters.h | 30 CfBlobArray *issuer; member
|
H A D | x509_cert_match_parameters.h | 41 CfBlob *issuer; member
|
/base/update/updater/services/package/pkg_verify/ |
H A D | cert_verify.cpp | 103 rootInfo_.issuer = GetX509CertIssuerName(rootCert); in InitRootCert() 113 PKG_LOGE("compare cert subject and issuer fail"); in VerifySingleCert() 125 rootInfo_.issuer.compare(certIssuer) == 0) { in CompareCertSubjectAndIssuer()
|
/base/security/certificate_framework/frameworks/adapter/v1.0/src/ |
H A D | x509_crl_openssl.c | 243 char *issuer = X509_NAME_oneline(x509Name, NULL, 0); in GetIssuerName() local 244 if (issuer == NULL) { in GetIssuerName() 249 if (strlen(issuer) > HCF_MAX_STR_LEN) { in GetIssuerName() 250 LOGE("issuer name is too long!"); in GetIssuerName() 252 OPENSSL_free(issuer); in GetIssuerName() 255 uint32_t length = strlen(issuer) + 1; in GetIssuerName() 258 LOGE("Failed to malloc for crl issuer data!"); in GetIssuerName() 259 OPENSSL_free(issuer); in GetIssuerName() 262 (void)memcpy_s(out->data, length, issuer, length); in GetIssuerName() 264 OPENSSL_free(issuer); in GetIssuerName() 902 CompareIssuerX509Openssl(HcfX509CrlSpi *self, const CfBlobArray *issuer, bool *out) CompareIssuerX509Openssl() argument [all...] |
/base/security/appverify/interfaces/innerkits/appverify_lite/src/ |
H A D | app_provision.c | 218 pf->issuer = GetStringTag(root, "issuer"); in GetProfIssuerInfo() 219 if (pf->issuer == NULL) { in GetProfIssuerInfo() 221 pf->issuer = APPV_MALLOC(len + 1); in GetProfIssuerInfo() 222 if (pf->issuer == NULL) { in GetProfIssuerInfo() 225 errno_t ret = strcpy_s(pf->issuer, len + 1, APP_STORE); in GetProfIssuerInfo() 227 APPV_FREE(pf->issuer); in GetProfIssuerInfo() 280 FREE_IF_NOT_NULL(pf->issuer); in ProfFreeData()
|
H A D | mbedtls_pkcs7.c | 168 /* parse issuer name */ in ParseSignerIssuerAndSerialNum() 169 rc = mbedtls_x509_get_name(p, *p + len, &signer->issuer); in ParseSignerIssuerAndSerialNum() 664 name_cur = signer->issuer.next; in FreeSignerIssuer() 670 signer->issuer.next = NULL; in FreeSignerIssuer() 717 /* current level's subject is next level issuer */ in FindSuperCert() 719 if (CompareX509NameList(&cur->issuer, &certsList->subject) == 0) { in FindSuperCert() 807 mbedtls_x509_name *signerIssuer = &signer->issuer; in ConstructSignerCerts() 812 CompareX509NameList(signerIssuer, &cert->issuer) == 0) { in ConstructSignerCerts() 1008 CompareX509NameList(&crlList->issuer, &crt->issuer) ! in VerifyCrl() 1102 PKCS7_GetSignerSignningCertIssuer(const SignerInfo *signer, char *issuer, size_t issuerLen) PKCS7_GetSignerSignningCertIssuer() argument [all...] |
/base/security/code_signature/services/key_enable/utils/include/ |
H A D | cert_path.h | 33 uint64_t issuer; member
|
/base/security/code_signature/utils/include/ |
H A D | cert_utils.h | 33 ByteBuffer &signCert, ByteBuffer &issuer, std::vector<ByteBuffer> &chain);
|
/base/security/appverify/interfaces/innerkits/appverify/include/util/ |
H A D | hap_cert_verify_openssl_utils.h | 40 DLL_EXPORT static bool GetIssuerFromX509(const X509* cert, std::string& issuer);
42 DLL_EXPORT static bool GetIssuerFromX509Crl(const X509_CRL* crl, std::string& issuer);
|
/base/security/appverify/interfaces/innerkits/appverify_lite/include/ |
H A D | mbedtls_pkcs7.h | 61 char issuer[MAX_SIGNER_NAME_LEN]; member 93 mbedtls_x509_name issuer; member 242 * Description : Get all signer's associate info, now including subject/issuer/
|
/base/update/packaging_tools/ |
H A D | build_pkcs7.py | 199 issuer = cert.issuer 202 issuer_and_serial['issuer'] = cert.issuer
|
/base/security/certificate_framework/test/unittest/v1.0/src/ |
H A D | crypto_x509_crl_test_part2.cpp | 191 /* issuer is nullptr */ 196 matchParams.issuer = nullptr; in HWTEST_F() 202 /* self issuer is equal to x509Crl */ 205 // get issuer name in HWTEST_F() 217 matchParams.issuer = &cfBlobArr; in HWTEST_F() 224 /* self issuer is not equal to x509Crl */ 227 // get issuer name in HWTEST_F() 247 matchParams.issuer = &cfBlobArr; in HWTEST_F() 256 /* issuer->count is 0 and outTmpSelf.size is not 0 */ 259 // get issuer nam in HWTEST_F() [all...] |