/base/security/code_signature/services/key_enable/src/ |
H A D | cert_path_utils.rs | 34 const SUBJECT_KEY: &str = "subject"; 121 /// subject 122 pub subject: String, 148 .map(|source| (&source.subject, &source.issuer_ca)) in get_profile_info() 156 .map(|source| (&source.subject, &source.issuer_ca)) in get_debug_profile_info() 165 if !cert_path.subject.is_empty() in add_cert_paths() 171 cert_path.subject, in add_cert_paths() 237 subject: signing_cert.to_string(), in parse_cert_profile() 320 let subject = fabricate_name(&self.subject); in add_subject_cert_path() [all...] |
H A D | cert_chain_utils.rs | 91 for &subject in member_names.iter() {
in load_pem_certs_from_json_file() 92 if let Ok(cert_str) = value[subject].try_as_string() {
in load_pem_certs_from_json_file()
|
H A D | profile_utils.rs | 191 let subject = format_x509_fabricate_name(signed_pem.subject_name()); in get_cert_details() 193 Ok((subject, issuer, profile_type)) in get_cert_details() 345 let (subject, issuer, profile_type) = in process_profile() 355 if add_cert_path_info(subject, issuer, profile_type, DEFAULT_MAX_CERT_PATH_LEN).is_err() { in process_profile() 456 let (subject, issuer, profile_type) = process_data(&profile_data)?; in enable_key_in_profile_internal() 476 if add_cert_path_info(subject, issuer, profile_type, DEFAULT_MAX_CERT_PATH_LEN).is_err() { in enable_key_in_profile_internal() 501 let (subject, issuer, profile_type) = process_data(&profile_data)?; in process_remove_bundle() 509 if remove_cert_path_info(subject, issuer, profile_type, DEFAULT_MAX_CERT_PATH_LEN).is_err() { in process_remove_bundle()
|
/base/security/appverify/interfaces/innerkits/appverify/test/unittest/src/ |
H A D | hap_cert_verify_openssl_utils_test.cpp | 104 * @tc.steps: step3. Get subject of rootCertsObj and get issuer of certX509.
in HWTEST_F() 105 * @tc.expected: step3. The subject is same as issuer.
in HWTEST_F() 107 std::string subject;
in HWTEST_F() local 108 ASSERT_TRUE(HapCertVerifyOpensslUtils::GetSubjectFromX509(issuerCert, subject));
in HWTEST_F() 111 ASSERT_TRUE(subject.compare(issuer) == 0);
in HWTEST_F() 152 std::string subject;
in HWTEST_F() local 153 ASSERT_TRUE(HapCertVerifyOpensslUtils::GetSubjectFromX509(certX509, subject));
in HWTEST_F() 157 * @tc.steps: step2. Use the subject as an error input.
in HWTEST_F() 160 certX509 = HapCertVerifyOpensslUtils::GetX509CertFromBase64String(subject);
in HWTEST_F() 234 std::string subject;
in HWTEST_F() local [all...] |
/base/update/updater/services/package/pkg_verify/ |
H A D | cert_verify.cpp | 102 rootInfo_.subject = GetX509CertSubjectName(rootCert); in InitRootCert() 113 PKG_LOGE("compare cert subject and issuer fail"); in VerifySingleCert() 124 if (rootInfo_.subject.compare(certSubject) == 0 && in CompareCertSubjectAndIssuer()
|
/base/security/certificate_framework/interfaces/inner_api/certificate/ |
H A D | x509_cert_match_parameters.h | 44 CfBlob *subject; member
|
/base/telephony/sms_mms/frameworks/js/napi/include/ |
H A D | napi_mms.h | 83 std::string subject = ""; member 100 std::string subject = ""; member 122 std::string subject = ""; member
|
/base/update/updater/services/include/package/ |
H A D | cert_verify.h | 27 std::string subject {};
|
/base/security/appverify/interfaces/innerkits/appverify_lite/include/ |
H A D | app_verify.h | 117 char *subject; member
|
H A D | mbedtls_pkcs7.h | 62 char subject[MAX_SIGNER_NAME_LEN]; member 242 * Description : Get all signer's associate info, now including subject/issuer/
|
/base/security/huks/services/huks_standard/huks_engine/main/device_cert_manager/include/ |
H A D | dcm_attest.h | 91 struct HksAsn1Obj subject;
member
|
/base/security/appverify/interfaces/innerkits/appverify_lite/src/ |
H A D | app_verify.c | 391 if (strcmp(trustList[i].profileSignCert, signer->subject) == 0 || in GetProfSourceBySigningCert() 392 strcmp(trustList[i].profileDebugSignCert, signer->subject) == 0) { in GetProfSourceBySigningCert() 424 if (strcmp(trustList[i].appSignCert, signer->subject) == 0 && in GetAppSourceBySigningCert() 799 /* cmp subject and issuer */ in CmpCert() 801 memcmp(certA->subject_raw.p, binSignCert->subject, certA->subject_raw.len)) { in CmpCert() 802 LOG_ERROR("cert subject diff"); in CmpCert() 943 if (certInfo->subject != NULL) { in FreeCertInfo() 944 APPV_FREE(certInfo->subject); in FreeCertInfo() 984 certInfo->subject = APPV_MALLOC(certInfo->subjectLen + 1); in GetCertInfo() 985 if (certInfo->subject in GetCertInfo() [all...] |
H A D | mbedtls_pkcs7.c | 717 /* current level's subject is next level issuer */ in FindSuperCert() 719 if (CompareX509NameList(&cur->issuer, &certsList->subject) == 0) { in FindSuperCert() 1088 int32_t PKCS7_GetSignerSignningCertSubject(const SignerInfo *signer, char *subject, size_t subjectLen) in PKCS7_GetSignerSignningCertSubject() argument 1091 if (signer == NULL || subject == NULL) { in PKCS7_GetSignerSignningCertSubject() 1095 rc = mbedtls_x509_dn_gets(subject, subjectLen, &crt->subject); in PKCS7_GetSignerSignningCertSubject() 1142 if (CompareX509NameList(&pre->issuer, &pre->subject) == 0) { in IsIncludeRoot() 1196 rc = PKCS7_GetSignerSignningCertSubject(signer, sri->signers[idx].subject, sizeof(sri->signers[idx].subject)); in PKCS7_GetAllSignersResolvedInfo()
|
/base/security/appverify/interfaces/innerkits/appverify/include/util/ |
H A D | hap_cert_verify_openssl_utils.h | 39 DLL_EXPORT static bool GetSubjectFromX509(const X509* cert, std::string& subject);
|
/base/security/certificate_framework/frameworks/adapter/v1.0/src/ |
H A D | certificate_openssl_common.c | 366 X509_NAME *subject = X509_get_subject_name(cert);
in CheckIsSelfSigned() local 367 if (subject == NULL) {
in CheckIsSelfSigned() 368 LOGE("x509 get subject name failed!");
in CheckIsSelfSigned() 373 ret = (X509_NAME_cmp(issuer, subject) == 0);
in CheckIsSelfSigned() 418 LOGE("x509 get subject name failed!");
in STACK_OF() 424 LOGE("x509 get subject name failed!");
in STACK_OF() 544 LOGE("No certificate found in when get subject name");
in GetSubjectNameFromX509() 549 LOGE("Failed to get subject name!");
in GetSubjectNameFromX509() 560 LOGE("Failed to get subject DER data!");
in GetSubjectNameFromX509()
|
H A D | x509_certificate_openssl.c | 296 LOGE("Failed to get subject key identifier!"); in GetSubKeyIdDNX509Openssl() 304 LOGE("Failed to convert subject key id to der format!"); in GetSubKeyIdDNX509Openssl() 682 char *subject = (char *)CfMalloc(HCF_MAX_STR_LEN + 1, 0); in GetSubjectDNX509Openssl() local 683 if (subject == NULL) { in GetSubjectDNX509Openssl() 684 LOGE("Failed to malloc for subject buffer!"); in GetSubjectDNX509Openssl() 690 X509_NAME_oneline(subjectName, subject, HCF_MAX_STR_LEN); in GetSubjectDNX509Openssl() 691 size_t length = strlen(subject) + 1; in GetSubjectDNX509Openssl() 698 res = DeepCopyDataToOut(subject, length, out); in GetSubjectDNX509Openssl() 700 CfFree(subject); in GetSubjectDNX509Openssl() 1373 // subject in MatchPart1() [all...] |
/base/security/appverify/interfaces/innerkits/appverify/src/util/ |
H A D | hap_cert_verify_openssl_utils.cpp | 490 bool HapCertVerifyOpensslUtils::GetSubjectFromX509(const X509* cert, std::string& subject)
in GetSubjectFromX509() argument 498 subject = GetDnToString(name);
in GetSubjectFromX509() 499 HAPVERIFY_LOG_DEBUG("subject = %{public}s", subject.c_str());
in GetSubjectFromX509()
|
/base/telephony/sms_mms/frameworks/js/napi/src/ |
H A D | napi_mms.cpp | 162 asyncContext.subject = mmsMsg.GetMmsSubject(); in GetMmsSendReq() 182 asyncContext.subject = mmsMsg.GetMmsSubject(); in GetMmsNotificationInd() 208 asyncContext.subject = mmsMsg.GetMmsSubject(); in GetMmsRetrieveConf() 400 NapiUtil::SetPropertyStringUtf8(env, sendReqObj, "subject", sendReqContext.subject); in ParseSendReqValue() 438 NapiUtil::SetPropertyStringUtf8(env, notificationObj, "subject", notificationContext.subject); in ParseNotificationIndValue() 472 NapiUtil::SetPropertyStringUtf8(env, retrieveConfObj, "subject", retrieveConfContext.subject); in ParseRetrieveConfValue() 893 sendReq.subject in ReadEncodeMmsType() [all...] |
/base/security/certificate_framework/test/unittest/v1.0/src/ |
H A D | crypto_x509_cert_chain_test.cpp | 1001 CfBlob subject = { 0, nullptr }; in HWTEST_F() local 1002 subject.data = (uint8_t *)(&g_testChainSubjectPemRootData[0]); in HWTEST_F() 1003 subject.size = g_testChainSubjectPemRootDataSize; in HWTEST_F() 1007 anchor.CASubject = &subject; in HWTEST_F() 1037 CfBlob subject = { 0, nullptr }; in HWTEST_F() local 1038 subject.data = (uint8_t *)(&g_testChainSubjectPemOtherSubjectData[0]); in HWTEST_F() 1039 subject.size = g_testChainSubjectPemOtherSubjectDataSize; in HWTEST_F() 1043 anchor.CASubject = &subject; in HWTEST_F() 1645 CfBlob subject = { 0, nullptr }; in HWTEST_F() local 1646 subject in HWTEST_F() 1682 CfBlob subject = { 0, nullptr }; HWTEST_F() local [all...] |
H A D | crypto_x509_certificate_test.cpp | 534 /* cert without subject alternative names. */ 700 /* HcfX509CertMatchParams`s subject is valid */ 710 matchParams.subject = &cfBlobDataParam; in HWTEST_F() 716 /* HcfX509CertMatchParams`s subject is invalid */ 726 matchParams.subject = &cfBlobDataParam; in HWTEST_F() 1104 /* HcfX509CertMatchParams's subject length is 0 */ 1114 matchParams.subject = &cfBlobDataParam; in HWTEST_F() 1148 matchParams.subject = &cfDataSubject; in HWTEST_F() 1253 /* ConvertNameDerDataToString : The incoming data is the subject of the DER certificate */
|
/base/security/certificate_framework/frameworks/js/napi/certificate/src/ |
H A D | napi_x509_cert_match_parameters.cpp | 170 LOGE("Failed to get subject alternative name array!"); in GetSubjectAltNamesArray() 318 if (!GetSubject(env, arg, matchParams->subject)) { in BuildX509CertMatchParamsV1() 400 CfBlobFree(&matchParams->subject); in FreeX509CertMatchParams()
|
/base/security/huks/services/huks_standard/huks_engine/main/device_cert_manager/src/ |
H A D | dcm_attest.c | 501 if (IsValidTlv(tbsSpec->subject)) {
in IsValidAttestTbs() 502 HKS_LOG_E("invalid subject.\n");
in IsValidAttestTbs() 550 ret += DcmAsn1ExtractTag(&val, &tbsSpec->subject, &val, ASN_1_TAG_TYPE_SEQ);
in ParseAttestTbs() 708 ret = DcmAsn1InsertValue(&tmp, NULL, &tbs->subject.value);
in EncodeTbs() 709 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_BAD_STATE, "insert subject failed!")
in EncodeTbs() 755 draftTbs.issuer = devCert.tbs.subject;
in CreateTbs()
|