/base/security/code_signature/test/unittest/ |
H A D | jit_code_sign_test.cpp | 149 JitCodeSignerBase *signer = nullptr; in HWTEST_F() local 152 signer = CreateJitCodeSigner(level); in HWTEST_F() 155 AppendInstruction(signer, g_testInstructionSet[i]); in HWTEST_F() 159 EXPECT_EQ(CopyToJitCode(signer, g_jitMemory, g_testInstructionSet, in HWTEST_F() 163 delete signer; in HWTEST_F() 164 signer = nullptr; in HWTEST_F() 177 JitCodeSignerBase *signer = nullptr; in HWTEST_F() local 180 signer = CreateJitCodeSigner(level); in HWTEST_F() 181 AppendData(signer, g_testInstructionBuf, INSTRUCTIONS_SET_SIZE_BYTES); in HWTEST_F() 183 EXPECT_EQ(CopyToJitCode(signer, g_jitMemor in HWTEST_F() 200 JitCodeSignerBase *signer = nullptr; HWTEST_F() local 242 JitCodeSignerBase *signer = nullptr; HWTEST_F() local 291 JitCodeSignerBase *signer = nullptr; HWTEST_F() local 314 JitCodeSignerBase *signer = nullptr; HWTEST_F() local 338 JitCodeSignerBase *signer = nullptr; HWTEST_F() local 362 JitCodeSignerBase *signer = nullptr; HWTEST_F() local 387 JitCodeSignerBase *signer = nullptr; HWTEST_F() local 427 JitCodeSignerBase *signer = nullptr; HWTEST_F() local 471 JitCodeSignerBase *signer = nullptr; HWTEST_F() local 510 JitCodeSignerBase *signer = nullptr; HWTEST_F() local 536 JitCodeSignerBase *signer = nullptr; HWTEST_F() local 566 JitCodeSignerBase *signer = nullptr; HWMTEST_F() local 614 JitCodeSignerBase *signer = nullptr; HWTEST_F() local 660 JitCodeSignerBase *signer = CreateJitCodeSigner(level); HWMTEST_F() local 721 JitCodeSignerBase *signer = nullptr; HWTEST_F() local 752 JitCodeSignerBase *signer = nullptr; HWTEST_F() local 780 JitCodeSignerBase *signer = nullptr; HWTEST_F() local 801 JitCodeSignerBase *signer = nullptr; HWTEST_F() local [all...] |
H A D | sign_and_enforce_test.cpp | 80 // only one signer
in GetSignerInfo() 125 PKCS7_SIGNER_INFO *signer = GetSignerInfo(p7);
in ModifyPkcs7SignerwithTargetFunc() local 126 if (signer == nullptr) {
in ModifyPkcs7SignerwithTargetFunc() 129 modifyFunc(signer);
in ModifyPkcs7SignerwithTargetFunc() 217 * @tc.desc: sign AN file and enforce it using signature with wrong signer
|
/base/security/code_signature/interfaces/innerkits/jit_code_sign/include/ |
H A D | jit_buffer_integrity.h | 42 * @brief Create Jit Code signer of specific level 62 * @param signer jit code signer 66 static inline int32_t RegisterTmpBuffer(JitCodeSignerBase *signer, void *tmpBuffer) in RegisterTmpBuffer() argument 68 CHECK_NULL_AND_RETURN_CODE(signer); in RegisterTmpBuffer() 69 signer->RegisterTmpBuffer(CAST_TO_BYTES(tmpBuffer)); in RegisterTmpBuffer() 75 * @param signer jit code signer 79 static inline int32_t AppendInstruction(JitCodeSignerBase *signer, Instr instr) in AppendInstruction() argument 81 CHECK_NULL_AND_RETURN_CODE(signer); in AppendInstruction() 93 AppendData(JitCodeSignerBase *signer, const void *const data, uint32_t size) AppendData() argument 105 WillFixUp(JitCodeSignerBase *signer, uint32_t n = 1) WillFixUp() argument 118 PatchInstruction(JitCodeSignerBase *signer, int offset, Instr instr) PatchInstruction() argument 131 PatchInstruction(JitCodeSignerBase *signer, void *address, Instr insn) PatchInstruction() argument 145 PatchData(JitCodeSignerBase *signer, int offset, const void *const data, uint32_t size) PatchData() argument 160 PatchData(JitCodeSignerBase *signer, void *address, const void *const data, uint32_t size) PatchData() argument 204 CopyToJitCode( JitCodeSignerBase *signer, void *jitMemory, void *tmpBuffer, int size) CopyToJitCode() argument [all...] |
/base/security/appverify/interfaces/innerkits/appverify_lite/src/ |
H A D | mbedtls_pkcs7.c | 148 static int32_t ParseSignerVersion(unsigned char **p, const unsigned char *end, SignerInfo *signer) in ParseSignerVersion() argument 150 return mbedtls_asn1_get_int(p, end, &signer->version); in ParseSignerVersion() 153 static int32_t ParseSignerIssuerAndSerialNum(unsigned char **p, const unsigned char *end, SignerInfo *signer) in ParseSignerIssuerAndSerialNum() argument 163 signer->issuerRaw.p = *p; in ParseSignerIssuerAndSerialNum() 169 rc = mbedtls_x509_get_name(p, *p + len, &signer->issuer); in ParseSignerIssuerAndSerialNum() 173 signer->issuerRaw.len = *p - signer->issuerRaw.p; /* not include the serial. */ in ParseSignerIssuerAndSerialNum() 175 rc = mbedtls_x509_get_serial(p, end, &signer->serial); in ParseSignerIssuerAndSerialNum() 180 static int32_t ParseSignerDigestAlg(unsigned char **p, const unsigned char *end, SignerInfo *signer) in ParseSignerDigestAlg() argument 182 int32_t rc = mbedtls_asn1_get_alg_null(p, end, &signer in ParseSignerDigestAlg() 192 ParseSignerAuthAttr(unsigned char **p, const unsigned char *end, SignerInfo *signer) ParseSignerAuthAttr() argument 227 ParseSignerEncAlg(unsigned char **p, const unsigned char *end, SignerInfo *signer) ParseSignerEncAlg() argument 246 ParseSignerSignature(unsigned char **p, const unsigned char *end, SignerInfo *signer) ParseSignerSignature() argument 262 GetSignerSignature(const SignerInfo *signer, unsigned char **sig, size_t *sigLen) GetSignerSignature() argument 271 ParseSignerUnAuthAttr(unsigned char **p, const unsigned char *end, SignerInfo *signer) ParseSignerUnAuthAttr() argument 651 FreeSignerCerts(SignerInfo *signer) FreeSignerCerts() argument 660 FreeSignerIssuer(SignerInfo *signer) FreeSignerIssuer() argument 675 SignerInfo *signer = pkcs7->signedData.signers.next; FreeSignersInfo() local 747 AddCertToSignerCertPath(SignerInfo *signer, mbedtls_x509_crt *crt) AddCertToSignerCertPath() argument 766 BuildSignerCertPath(SignerInfo *signer, mbedtls_x509_crt *lowerCrt, SignedData *signeData) BuildSignerCertPath() argument 804 SignerInfo *signer = &signedData->signers; ConstructSignerCerts() local 832 GetSignerDigestAlg(const SignerInfo *signer, mbedtls_md_type_t *algType) GetSignerDigestAlg() argument 851 GetSignerPubKeyOfSignature(const SignerInfo *signer, mbedtls_pk_context **pk) GetSignerPubKeyOfSignature() argument 870 const SignerInfo *signer = &pkcs7->signedData.signers; PKCS7_VerifySignerSignature() local 1045 const SignerInfo *signer = &pkcs7->signedData.signers; PKCS7_VerifyCertsChain() local 1088 PKCS7_GetSignerSignningCertSubject(const SignerInfo *signer, char *subject, size_t subjectLen) PKCS7_GetSignerSignningCertSubject() argument 1102 PKCS7_GetSignerSignningCertIssuer(const SignerInfo *signer, char *issuer, size_t issuerLen) PKCS7_GetSignerSignningCertIssuer() argument 1126 IsIncludeRoot(const SignerInfo *signer) IsIncludeRoot() argument 1150 GetSignerSignningCertDepth(const SignerInfo *signer) GetSignerSignningCertDepth() argument 1193 const SignerInfo *signer = &pkcs7->signedData.signers; PKCS7_GetAllSignersResolvedInfo() local 1215 PKCS7_GetDigestInSignerAuthAttr(const SignerInfo *signer, unsigned char **dig, size_t *digLen) PKCS7_GetDigestInSignerAuthAttr() argument 1264 PKCS7_GetSignerAuthAttr(const SignerInfo *signer, unsigned char **data, size_t *dataLen) PKCS7_GetSignerAuthAttr() argument [all...] |
H A D | app_verify.c | 251 static int32_t CalcCmpContHash(const Pkcs7 *pkcs7, const SignerInfo *signer, in CalcCmpContHash() argument 272 rc = PKCS7_GetDigestInSignerAuthAttr((SignerInfo *)signer, &digInAttr, &digInAttrLen); in CalcCmpContHash() 288 static int32_t CalcDigest(const Pkcs7 *pkcs7, const SignerInfo *signer, in CalcDigest() argument 294 rc = CalcCmpContHash(pkcs7, signer, algType, hash, hashLen); in CalcDigest() 299 LOG_INFO("signer context hash equal with attr hash"); in CalcDigest() 302 rc = PKCS7_GetSignerAuthAttr(signer, &input, &inputLen); in CalcDigest() 386 static const TrustAppCert *GetProfSourceBySigningCert(const SignerResovledInfo *signer, in GetProfSourceBySigningCert() argument 390 if (strcmp(trustList[i].issueCA, signer->issuer) == 0) { in GetProfSourceBySigningCert() 391 if (strcmp(trustList[i].profileSignCert, signer->subject) == 0 || in GetProfSourceBySigningCert() 392 strcmp(trustList[i].profileDebugSignCert, signer in GetProfSourceBySigningCert() 401 GetProfileCertTypeBySignInfo(SignerResovledInfo *signer, int32_t *certType) GetProfileCertTypeBySignInfo() argument 420 GetAppSourceBySigningCert(const SignerResovledInfo *signer, const TrustAppCert* trustList, int32_t num) GetAppSourceBySigningCert() argument 432 GetAppCertTypeBySignInfo(SignerResovledInfo *signer, int32_t *certType) GetAppCertTypeBySignInfo() argument [all...] |
/base/security/appverify/interfaces/innerkits/appverify_lite/include/ |
H A D | mbedtls_pkcs7.h | 75 * the PKCS7 signer's cert path header 76 * depth is the signer's cert path depth 85 * PKCS7 signer info structure, as defined in PKCS7 86 * rootCert is not defined in PKCS7, this is the signer's root cert preinstall in system 88 * next is point to the next signer info, as PKCS7 definination, maybe there are multi signer 163 * Description : Verify all signer's cert chain 184 * signer - pkcs7 signer info 191 typedef int32_t (*PKCS7_CalcDigest)(const Pkcs7 *pkcs7, const SignerInfo *signer, [all...] |
/base/update/updater/services/package/pkg_verify/ |
H A D | pkcs7_signed_data.cpp | 335 Pkcs7SignerInfo signer; in ReadSig() local 336 int32_t ret = SignerInfoParse(p7SiTmp, signer); in ReadSig() 341 sigs.push_back(signer.digestEncryptData); in ReadSig() 370 Pkcs7SignerInfo signer; in SignerInfosParse() local 371 int32_t ret = SignerInfoParse(p7SiTmp, signer); in SignerInfosParse() 376 signerInfos_.push_back(std::move(signer)); in SignerInfosParse() 389 PKG_LOGE("signer cert info is nullptr!"); in SignerInfoParse() 398 PKG_LOGE("Parse signer info digest_alg failed!"); in SignerInfoParse() 403 PKG_LOGE("Parse signer info digest_enc_alg failed!"); in SignerInfoParse() 409 PKG_LOGE("parse signer inf in SignerInfoParse() 446 VerifyDigest(X509 *cert, const Pkcs7SignerInfo &signer, const std::vector<uint8_t> &hash, const std::vector<uint8_t> &sig) const VerifyDigest() argument [all...] |
H A D | pkcs7_signed_data.h | 97 int32_t VerifyDigest(X509 *cert, const Pkcs7SignerInfo &signer, const std::vector<uint8_t> &hash,
|
/base/security/code_signature/services/key_enable/src/ |
H A D | profile_utils.rs | 231 for signer in signers_result { in verify_signers() 232 let subject_name = format_x509name_to_string(signer.subject_name()); in verify_signers() 233 let issuer_name = format_x509name_to_string(signer.issuer_name()); in verify_signers() 340 error!(LOG_LABEL, "Invalid signer profile file {}", @public(path)); in process_profile()
|