Home
last modified time | relevance | path

Searched refs:signer (Results 1 - 9 of 9) sorted by relevance

/base/security/code_signature/test/unittest/
H A Djit_code_sign_test.cpp149 JitCodeSignerBase *signer = nullptr; in HWTEST_F() local
152 signer = CreateJitCodeSigner(level); in HWTEST_F()
155 AppendInstruction(signer, g_testInstructionSet[i]); in HWTEST_F()
159 EXPECT_EQ(CopyToJitCode(signer, g_jitMemory, g_testInstructionSet, in HWTEST_F()
163 delete signer; in HWTEST_F()
164 signer = nullptr; in HWTEST_F()
177 JitCodeSignerBase *signer = nullptr; in HWTEST_F() local
180 signer = CreateJitCodeSigner(level); in HWTEST_F()
181 AppendData(signer, g_testInstructionBuf, INSTRUCTIONS_SET_SIZE_BYTES); in HWTEST_F()
183 EXPECT_EQ(CopyToJitCode(signer, g_jitMemor in HWTEST_F()
200 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
242 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
291 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
314 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
338 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
362 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
387 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
427 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
471 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
510 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
536 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
566 JitCodeSignerBase *signer = nullptr; HWMTEST_F() local
614 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
660 JitCodeSignerBase *signer = CreateJitCodeSigner(level); HWMTEST_F() local
721 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
752 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
780 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
801 JitCodeSignerBase *signer = nullptr; HWTEST_F() local
[all...]
H A Dsign_and_enforce_test.cpp80 // only one signer in GetSignerInfo()
125 PKCS7_SIGNER_INFO *signer = GetSignerInfo(p7); in ModifyPkcs7SignerwithTargetFunc() local
126 if (signer == nullptr) { in ModifyPkcs7SignerwithTargetFunc()
129 modifyFunc(signer); in ModifyPkcs7SignerwithTargetFunc()
217 * @tc.desc: sign AN file and enforce it using signature with wrong signer
/base/security/code_signature/interfaces/innerkits/jit_code_sign/include/
H A Djit_buffer_integrity.h42 * @brief Create Jit Code signer of specific level
62 * @param signer jit code signer
66 static inline int32_t RegisterTmpBuffer(JitCodeSignerBase *signer, void *tmpBuffer) in RegisterTmpBuffer() argument
68 CHECK_NULL_AND_RETURN_CODE(signer); in RegisterTmpBuffer()
69 signer->RegisterTmpBuffer(CAST_TO_BYTES(tmpBuffer)); in RegisterTmpBuffer()
75 * @param signer jit code signer
79 static inline int32_t AppendInstruction(JitCodeSignerBase *signer, Instr instr) in AppendInstruction() argument
81 CHECK_NULL_AND_RETURN_CODE(signer); in AppendInstruction()
93 AppendData(JitCodeSignerBase *signer, const void *const data, uint32_t size) AppendData() argument
105 WillFixUp(JitCodeSignerBase *signer, uint32_t n = 1) WillFixUp() argument
118 PatchInstruction(JitCodeSignerBase *signer, int offset, Instr instr) PatchInstruction() argument
131 PatchInstruction(JitCodeSignerBase *signer, void *address, Instr insn) PatchInstruction() argument
145 PatchData(JitCodeSignerBase *signer, int offset, const void *const data, uint32_t size) PatchData() argument
160 PatchData(JitCodeSignerBase *signer, void *address, const void *const data, uint32_t size) PatchData() argument
204 CopyToJitCode( JitCodeSignerBase *signer, void *jitMemory, void *tmpBuffer, int size) CopyToJitCode() argument
[all...]
/base/security/appverify/interfaces/innerkits/appverify_lite/src/
H A Dmbedtls_pkcs7.c148 static int32_t ParseSignerVersion(unsigned char **p, const unsigned char *end, SignerInfo *signer) in ParseSignerVersion() argument
150 return mbedtls_asn1_get_int(p, end, &signer->version); in ParseSignerVersion()
153 static int32_t ParseSignerIssuerAndSerialNum(unsigned char **p, const unsigned char *end, SignerInfo *signer) in ParseSignerIssuerAndSerialNum() argument
163 signer->issuerRaw.p = *p; in ParseSignerIssuerAndSerialNum()
169 rc = mbedtls_x509_get_name(p, *p + len, &signer->issuer); in ParseSignerIssuerAndSerialNum()
173 signer->issuerRaw.len = *p - signer->issuerRaw.p; /* not include the serial. */ in ParseSignerIssuerAndSerialNum()
175 rc = mbedtls_x509_get_serial(p, end, &signer->serial); in ParseSignerIssuerAndSerialNum()
180 static int32_t ParseSignerDigestAlg(unsigned char **p, const unsigned char *end, SignerInfo *signer) in ParseSignerDigestAlg() argument
182 int32_t rc = mbedtls_asn1_get_alg_null(p, end, &signer in ParseSignerDigestAlg()
192 ParseSignerAuthAttr(unsigned char **p, const unsigned char *end, SignerInfo *signer) ParseSignerAuthAttr() argument
227 ParseSignerEncAlg(unsigned char **p, const unsigned char *end, SignerInfo *signer) ParseSignerEncAlg() argument
246 ParseSignerSignature(unsigned char **p, const unsigned char *end, SignerInfo *signer) ParseSignerSignature() argument
262 GetSignerSignature(const SignerInfo *signer, unsigned char **sig, size_t *sigLen) GetSignerSignature() argument
271 ParseSignerUnAuthAttr(unsigned char **p, const unsigned char *end, SignerInfo *signer) ParseSignerUnAuthAttr() argument
651 FreeSignerCerts(SignerInfo *signer) FreeSignerCerts() argument
660 FreeSignerIssuer(SignerInfo *signer) FreeSignerIssuer() argument
675 SignerInfo *signer = pkcs7->signedData.signers.next; FreeSignersInfo() local
747 AddCertToSignerCertPath(SignerInfo *signer, mbedtls_x509_crt *crt) AddCertToSignerCertPath() argument
766 BuildSignerCertPath(SignerInfo *signer, mbedtls_x509_crt *lowerCrt, SignedData *signeData) BuildSignerCertPath() argument
804 SignerInfo *signer = &signedData->signers; ConstructSignerCerts() local
832 GetSignerDigestAlg(const SignerInfo *signer, mbedtls_md_type_t *algType) GetSignerDigestAlg() argument
851 GetSignerPubKeyOfSignature(const SignerInfo *signer, mbedtls_pk_context **pk) GetSignerPubKeyOfSignature() argument
870 const SignerInfo *signer = &pkcs7->signedData.signers; PKCS7_VerifySignerSignature() local
1045 const SignerInfo *signer = &pkcs7->signedData.signers; PKCS7_VerifyCertsChain() local
1088 PKCS7_GetSignerSignningCertSubject(const SignerInfo *signer, char *subject, size_t subjectLen) PKCS7_GetSignerSignningCertSubject() argument
1102 PKCS7_GetSignerSignningCertIssuer(const SignerInfo *signer, char *issuer, size_t issuerLen) PKCS7_GetSignerSignningCertIssuer() argument
1126 IsIncludeRoot(const SignerInfo *signer) IsIncludeRoot() argument
1150 GetSignerSignningCertDepth(const SignerInfo *signer) GetSignerSignningCertDepth() argument
1193 const SignerInfo *signer = &pkcs7->signedData.signers; PKCS7_GetAllSignersResolvedInfo() local
1215 PKCS7_GetDigestInSignerAuthAttr(const SignerInfo *signer, unsigned char **dig, size_t *digLen) PKCS7_GetDigestInSignerAuthAttr() argument
1264 PKCS7_GetSignerAuthAttr(const SignerInfo *signer, unsigned char **data, size_t *dataLen) PKCS7_GetSignerAuthAttr() argument
[all...]
H A Dapp_verify.c251 static int32_t CalcCmpContHash(const Pkcs7 *pkcs7, const SignerInfo *signer, in CalcCmpContHash() argument
272 rc = PKCS7_GetDigestInSignerAuthAttr((SignerInfo *)signer, &digInAttr, &digInAttrLen); in CalcCmpContHash()
288 static int32_t CalcDigest(const Pkcs7 *pkcs7, const SignerInfo *signer, in CalcDigest() argument
294 rc = CalcCmpContHash(pkcs7, signer, algType, hash, hashLen); in CalcDigest()
299 LOG_INFO("signer context hash equal with attr hash"); in CalcDigest()
302 rc = PKCS7_GetSignerAuthAttr(signer, &input, &inputLen); in CalcDigest()
386 static const TrustAppCert *GetProfSourceBySigningCert(const SignerResovledInfo *signer, in GetProfSourceBySigningCert() argument
390 if (strcmp(trustList[i].issueCA, signer->issuer) == 0) { in GetProfSourceBySigningCert()
391 if (strcmp(trustList[i].profileSignCert, signer->subject) == 0 || in GetProfSourceBySigningCert()
392 strcmp(trustList[i].profileDebugSignCert, signer in GetProfSourceBySigningCert()
401 GetProfileCertTypeBySignInfo(SignerResovledInfo *signer, int32_t *certType) GetProfileCertTypeBySignInfo() argument
420 GetAppSourceBySigningCert(const SignerResovledInfo *signer, const TrustAppCert* trustList, int32_t num) GetAppSourceBySigningCert() argument
432 GetAppCertTypeBySignInfo(SignerResovledInfo *signer, int32_t *certType) GetAppCertTypeBySignInfo() argument
[all...]
/base/security/appverify/interfaces/innerkits/appverify_lite/include/
H A Dmbedtls_pkcs7.h75 * the PKCS7 signer's cert path header
76 * depth is the signer's cert path depth
85 * PKCS7 signer info structure, as defined in PKCS7
86 * rootCert is not defined in PKCS7, this is the signer's root cert preinstall in system
88 * next is point to the next signer info, as PKCS7 definination, maybe there are multi signer
163 * Description : Verify all signer's cert chain
184 * signer - pkcs7 signer info
191 typedef int32_t (*PKCS7_CalcDigest)(const Pkcs7 *pkcs7, const SignerInfo *signer,
[all...]
/base/update/updater/services/package/pkg_verify/
H A Dpkcs7_signed_data.cpp335 Pkcs7SignerInfo signer; in ReadSig() local
336 int32_t ret = SignerInfoParse(p7SiTmp, signer); in ReadSig()
341 sigs.push_back(signer.digestEncryptData); in ReadSig()
370 Pkcs7SignerInfo signer; in SignerInfosParse() local
371 int32_t ret = SignerInfoParse(p7SiTmp, signer); in SignerInfosParse()
376 signerInfos_.push_back(std::move(signer)); in SignerInfosParse()
389 PKG_LOGE("signer cert info is nullptr!"); in SignerInfoParse()
398 PKG_LOGE("Parse signer info digest_alg failed!"); in SignerInfoParse()
403 PKG_LOGE("Parse signer info digest_enc_alg failed!"); in SignerInfoParse()
409 PKG_LOGE("parse signer inf in SignerInfoParse()
446 VerifyDigest(X509 *cert, const Pkcs7SignerInfo &signer, const std::vector<uint8_t> &hash, const std::vector<uint8_t> &sig) const VerifyDigest() argument
[all...]
H A Dpkcs7_signed_data.h97 int32_t VerifyDigest(X509 *cert, const Pkcs7SignerInfo &signer, const std::vector<uint8_t> &hash,
/base/security/code_signature/services/key_enable/src/
H A Dprofile_utils.rs231 for signer in signers_result { in verify_signers()
232 let subject_name = format_x509name_to_string(signer.subject_name()); in verify_signers()
233 let issuer_name = format_x509name_to_string(signer.issuer_name()); in verify_signers()
340 error!(LOG_LABEL, "Invalid signer profile file {}", @public(path)); in process_profile()

Completed in 7 milliseconds