Lines Matching full:config
34 static int32_t CheckCertSecuritylevel(HITLS_Config *config, HITLS_CERT_X509 *cert, bool isCACert) in CheckCertSecuritylevel() argument
36 CERT_MgrCtx *mgrCtx = config->certMgrCtx; in CheckCertSecuritylevel()
42 int32_t ret = SAL_CERT_X509Ctrl(config, cert, CERT_CTRL_GET_PUB_KEY, NULL, (void *)&pubkey); in CheckCertSecuritylevel()
48 ret = SAL_CERT_KeyCtrl(config, pubkey, CERT_KEY_CTRL_GET_SECBITS, NULL, (void *)&secBits); in CheckCertSecuritylevel()
54 ret = SECURITY_CfgCheck(config, HITLS_SECURITY_SECOP_CA_KEY, secBits, 0, cert); in CheckCertSecuritylevel()
61 ret = SECURITY_CfgCheck(config, HITLS_SECURITY_SECOP_EE_KEY, secBits, 0, cert); in CheckCertSecuritylevel()
70 ret = SAL_CERT_X509Ctrl(config, cert, CERT_CTRL_GET_SIGN_ALGO, NULL, (void *)&signAlg); in CheckCertSecuritylevel()
76 ret = SECURITY_CfgCheck(config, HITLS_SECURITY_SECOP_SIGALG_CHECK, 0, signAlg, NULL); in CheckCertSecuritylevel()
89 int32_t HITLS_CFG_SetVerifyStore(HITLS_Config *config, HITLS_CERT_Store *store, bool isClone) in HITLS_CFG_SetVerifyStore() argument
91 if (config == NULL) { in HITLS_CFG_SetVerifyStore()
97 newStore = SAL_CERT_StoreDup(config->certMgrCtx, store); in HITLS_CFG_SetVerifyStore()
105 int32_t ret = SAL_CERT_SetVerifyStore(config->certMgrCtx, newStore); in HITLS_CFG_SetVerifyStore()
108 SAL_CERT_StoreFree(config->certMgrCtx, newStore); in HITLS_CFG_SetVerifyStore()
114 HITLS_CERT_Store *HITLS_CFG_GetVerifyStore(const HITLS_Config *config) in HITLS_CFG_GetVerifyStore() argument
116 if (config == NULL) { in HITLS_CFG_GetVerifyStore()
120 return SAL_CERT_GetVerifyStore(config->certMgrCtx); in HITLS_CFG_GetVerifyStore()
123 int32_t HITLS_CFG_SetChainStore(HITLS_Config *config, HITLS_CERT_Store *store, bool isClone) in HITLS_CFG_SetChainStore() argument
125 if (config == NULL) { in HITLS_CFG_SetChainStore()
131 newStore = SAL_CERT_StoreDup(config->certMgrCtx, store); in HITLS_CFG_SetChainStore()
139 int32_t ret = SAL_CERT_SetChainStore(config->certMgrCtx, newStore); in HITLS_CFG_SetChainStore()
142 SAL_CERT_StoreFree(config->certMgrCtx, newStore); in HITLS_CFG_SetChainStore()
148 HITLS_CERT_Store *HITLS_CFG_GetChainStore(const HITLS_Config *config) in HITLS_CFG_GetChainStore() argument
150 if (config == NULL) { in HITLS_CFG_GetChainStore()
154 return SAL_CERT_GetChainStore(config->certMgrCtx); in HITLS_CFG_GetChainStore()
157 int32_t HITLS_CFG_SetCertStore(HITLS_Config *config, HITLS_CERT_Store *store, bool isClone) in HITLS_CFG_SetCertStore() argument
159 if (config == NULL) { in HITLS_CFG_SetCertStore()
165 newStore = SAL_CERT_StoreDup(config->certMgrCtx, store); in HITLS_CFG_SetCertStore()
173 int32_t ret = SAL_CERT_SetCertStore(config->certMgrCtx, newStore); in HITLS_CFG_SetCertStore()
176 SAL_CERT_StoreFree(config->certMgrCtx, newStore); in HITLS_CFG_SetCertStore()
182 HITLS_CERT_Store *HITLS_CFG_GetCertStore(const HITLS_Config *config) in HITLS_CFG_GetCertStore() argument
184 if (config == NULL) { in HITLS_CFG_GetCertStore()
188 return SAL_CERT_GetCertStore(config->certMgrCtx); in HITLS_CFG_GetCertStore()
191 int32_t HITLS_CFG_SetVerifyDepth(HITLS_Config *config, uint32_t depth) in HITLS_CFG_SetVerifyDepth() argument
193 if (config == NULL) { in HITLS_CFG_SetVerifyDepth()
197 return SAL_CERT_SetVerifyDepth(config->certMgrCtx, depth); in HITLS_CFG_SetVerifyDepth()
200 int32_t HITLS_CFG_GetVerifyDepth(const HITLS_Config *config, uint32_t *depth) in HITLS_CFG_GetVerifyDepth() argument
202 if (config == NULL) { in HITLS_CFG_GetVerifyDepth()
206 return SAL_CERT_GetVerifyDepth(config->certMgrCtx, depth); in HITLS_CFG_GetVerifyDepth()
209 int32_t HITLS_CFG_SetDefaultPasswordCb(HITLS_Config *config, HITLS_PasswordCb cb) in HITLS_CFG_SetDefaultPasswordCb() argument
211 if (config == NULL) { in HITLS_CFG_SetDefaultPasswordCb()
215 return SAL_CERT_SetDefaultPasswordCb(config->certMgrCtx, cb); in HITLS_CFG_SetDefaultPasswordCb()
218 HITLS_PasswordCb HITLS_CFG_GetDefaultPasswordCb(HITLS_Config *config) in HITLS_CFG_GetDefaultPasswordCb() argument
220 if (config == NULL) { in HITLS_CFG_GetDefaultPasswordCb()
224 return SAL_CERT_GetDefaultPasswordCb(config->certMgrCtx); in HITLS_CFG_GetDefaultPasswordCb()
227 int32_t HITLS_CFG_SetDefaultPasswordCbUserdata(HITLS_Config *config, void *userdata) in HITLS_CFG_SetDefaultPasswordCbUserdata() argument
229 if (config == NULL) { in HITLS_CFG_SetDefaultPasswordCbUserdata()
233 return SAL_CERT_SetDefaultPasswordCbUserdata(config->certMgrCtx, userdata); in HITLS_CFG_SetDefaultPasswordCbUserdata()
236 void *HITLS_CFG_GetDefaultPasswordCbUserdata(HITLS_Config *config) in HITLS_CFG_GetDefaultPasswordCbUserdata() argument
238 if (config == NULL) { in HITLS_CFG_GetDefaultPasswordCbUserdata()
242 return SAL_CERT_GetDefaultPasswordCbUserdata(config->certMgrCtx); in HITLS_CFG_GetDefaultPasswordCbUserdata()
245 static int32_t CFG_SetCertificate(HITLS_Config *config, HITLS_CERT_X509 *cert, bool isClone, bool i… in CFG_SetCertificate() argument
247 if (config == NULL || cert == NULL) { in CFG_SetCertificate()
253 newCert = SAL_CERT_X509Dup(config->certMgrCtx, cert); in CFG_SetCertificate()
259 int32_t ret = SAL_CERT_SetCurrentCert(config, newCert, isTlcpEncCert); in CFG_SetCertificate()
268 int32_t HITLS_CFG_SetCertificate(HITLS_Config *config, HITLS_CERT_X509 *cert, bool isClone) in HITLS_CFG_SetCertificate() argument
270 if (config == NULL || cert == NULL || config->certMgrCtx == NULL) { in HITLS_CFG_SetCertificate()
274 int32_t ret = CheckCertSecuritylevel(config, cert, false); in HITLS_CFG_SetCertificate()
279 return CFG_SetCertificate(config, cert, isClone, false); in HITLS_CFG_SetCertificate()
282 int32_t HITLS_CFG_LoadCertFile(HITLS_Config *config, const char *file, HITLS_ParseFormat format) in HITLS_CFG_LoadCertFile() argument
284 if (config == NULL || file == NULL || strlen(file) == 0) { in HITLS_CFG_LoadCertFile()
288 HITLS_CERT_X509 *cert = SAL_CERT_X509Parse(LIBCTX_FROM_CONFIG(config), in HITLS_CFG_LoadCertFile()
289 ATTRIBUTE_FROM_CONFIG(config), config, (const uint8_t *)file, (uint32_t)strlen(file), in HITLS_CFG_LoadCertFile()
295 ret = CheckCertSecuritylevel(config, cert, false); in HITLS_CFG_LoadCertFile()
301 ret = SAL_CERT_SetCurrentCert(config, cert, false); in HITLS_CFG_LoadCertFile()
309 int32_t HITLS_CFG_LoadCertBuffer(HITLS_Config *config, const uint8_t *buf, uint32_t bufLen, HITLS_P… in HITLS_CFG_LoadCertBuffer() argument
311 if (config == NULL || buf == NULL || bufLen == 0) { in HITLS_CFG_LoadCertBuffer()
315 HITLS_CERT_X509 *newCert = SAL_CERT_X509Parse(LIBCTX_FROM_CONFIG(config), in HITLS_CFG_LoadCertBuffer()
316 ATTRIBUTE_FROM_CONFIG(config),config, buf, bufLen, TLS_PARSE_TYPE_BUFF, format); in HITLS_CFG_LoadCertBuffer()
322 ret = CheckCertSecuritylevel(config, newCert, false); in HITLS_CFG_LoadCertBuffer()
328 ret = SAL_CERT_SetCurrentCert(config, newCert, false); in HITLS_CFG_LoadCertBuffer()
336 HITLS_CERT_X509 *HITLS_CFG_GetCertificate(const HITLS_Config *config) in HITLS_CFG_GetCertificate() argument
338 if (config == NULL) { in HITLS_CFG_GetCertificate()
342 return SAL_CERT_GetCurrentCert(config->certMgrCtx); in HITLS_CFG_GetCertificate()
345 static int32_t CFG_SetPrivateKey(HITLS_Config *config, HITLS_CERT_Key *privateKey, bool isClone, in CFG_SetPrivateKey() argument
348 if (config == NULL || privateKey == NULL) { in CFG_SetPrivateKey()
354 newKey = SAL_CERT_KeyDup(config->certMgrCtx, privateKey); in CFG_SetPrivateKey()
362 int32_t ret = SAL_CERT_SetCurrentPrivateKey(config, newKey, isTlcpEncCertPriKey); in CFG_SetPrivateKey()
365 SAL_CERT_KeyFree(config->certMgrCtx, newKey); in CFG_SetPrivateKey()
372 int32_t HITLS_CFG_SetTlcpPrivateKey(HITLS_Config *config, HITLS_CERT_Key *privateKey, in HITLS_CFG_SetTlcpPrivateKey() argument
375 return CFG_SetPrivateKey(config, privateKey, isClone, isTlcpEncCertPriKey); in HITLS_CFG_SetTlcpPrivateKey()
378 int32_t HITLS_CFG_SetTlcpCertificate(HITLS_Config *config, HITLS_CERT_X509 *cert, bool isClone, boo… in HITLS_CFG_SetTlcpCertificate() argument
380 return CFG_SetCertificate(config, cert, isClone, isTlcpEncCert); in HITLS_CFG_SetTlcpCertificate()
384 int32_t HITLS_CFG_SetPrivateKey(HITLS_Config *config, HITLS_CERT_Key *privateKey, bool isClone) in HITLS_CFG_SetPrivateKey() argument
386 return CFG_SetPrivateKey(config, privateKey, isClone, false); in HITLS_CFG_SetPrivateKey()
390 int32_t HITLS_CFG_ProviderLoadKeyFile(HITLS_Config *config, const char *file, const char *format, c… in HITLS_CFG_ProviderLoadKeyFile() argument
392 if (config == NULL || file == NULL || strlen(file) == 0) { in HITLS_CFG_ProviderLoadKeyFile()
395 … HITLS_CERT_Key *newKey = SAL_CERT_KeyParse(config, (const uint8_t *)file, (uint32_t)strlen(file), in HITLS_CFG_ProviderLoadKeyFile()
401 int32_t ret = SAL_CERT_SetCurrentPrivateKey(config, newKey, false); in HITLS_CFG_ProviderLoadKeyFile()
403 SAL_CERT_KeyFree(config->certMgrCtx, newKey); in HITLS_CFG_ProviderLoadKeyFile()
408 int32_t HITLS_CFG_LoadKeyFile(HITLS_Config *config, const char *file, HITLS_ParseFormat format) in HITLS_CFG_LoadKeyFile() argument
410 if (config == NULL || file == NULL || strlen(file) == 0) { in HITLS_CFG_LoadKeyFile()
414 … HITLS_CERT_Key *newKey = SAL_CERT_KeyParse(config, (const uint8_t *)file, (uint32_t)strlen(file), in HITLS_CFG_LoadKeyFile()
420 int32_t ret = SAL_CERT_SetCurrentPrivateKey(config, newKey, false); in HITLS_CFG_LoadKeyFile()
422 SAL_CERT_KeyFree(config->certMgrCtx, newKey); in HITLS_CFG_LoadKeyFile()
428 int32_t HITLS_CFG_ProviderLoadKeyBuffer(HITLS_Config *config, const uint8_t *buf, uint32_t bufLen, … in HITLS_CFG_ProviderLoadKeyBuffer() argument
431 if (config == NULL || buf == NULL || bufLen == 0) { in HITLS_CFG_ProviderLoadKeyBuffer()
434 …HITLS_CERT_Key *newKey = SAL_CERT_KeyParse(config, buf, bufLen, TLS_PARSE_TYPE_BUFF, type, format); in HITLS_CFG_ProviderLoadKeyBuffer()
439 int32_t ret = SAL_CERT_SetCurrentPrivateKey(config, newKey, false); in HITLS_CFG_ProviderLoadKeyBuffer()
441 SAL_CERT_KeyFree(config->certMgrCtx, newKey); in HITLS_CFG_ProviderLoadKeyBuffer()
446 int32_t HITLS_CFG_LoadKeyBuffer(HITLS_Config *config, const uint8_t *buf, uint32_t bufLen, HITLS_Pa… in HITLS_CFG_LoadKeyBuffer() argument
448 if (config == NULL || buf == NULL || bufLen == 0) { in HITLS_CFG_LoadKeyBuffer()
452 HITLS_CERT_Key *newKey = SAL_CERT_KeyParse(config, buf, bufLen, TLS_PARSE_TYPE_BUFF, in HITLS_CFG_LoadKeyBuffer()
458 int32_t ret = SAL_CERT_SetCurrentPrivateKey(config, newKey, false); in HITLS_CFG_LoadKeyBuffer()
460 SAL_CERT_KeyFree(config->certMgrCtx, newKey); in HITLS_CFG_LoadKeyBuffer()
465 HITLS_CERT_Key *HITLS_CFG_GetPrivateKey(HITLS_Config *config) in HITLS_CFG_GetPrivateKey() argument
467 if (config == NULL) { in HITLS_CFG_GetPrivateKey()
471 return SAL_CERT_GetCurrentPrivateKey(config->certMgrCtx, false); in HITLS_CFG_GetPrivateKey()
474 int32_t HITLS_CFG_CheckPrivateKey(HITLS_Config *config) in HITLS_CFG_CheckPrivateKey() argument
476 if (config == NULL) { in HITLS_CFG_CheckPrivateKey()
480 CERT_MgrCtx *certMgrCtx = config->certMgrCtx; in HITLS_CFG_CheckPrivateKey()
498 return SAL_CERT_CheckPrivateKey(config, cert, privateKey); in HITLS_CFG_CheckPrivateKey()
501 int32_t HITLS_CFG_AddChainCert(HITLS_Config *config, HITLS_CERT_X509 *cert, bool isClone) in HITLS_CFG_AddChainCert() argument
503 if (config == NULL || cert == NULL || config->certMgrCtx == NULL) { in HITLS_CFG_AddChainCert()
508 ret = CheckCertSecuritylevel(config, cert, true); in HITLS_CFG_AddChainCert()
515 newCert = SAL_CERT_X509Dup(config->certMgrCtx, cert); in HITLS_CFG_AddChainCert()
521 ret = SAL_CERT_AddChainCert(config->certMgrCtx, newCert); in HITLS_CFG_AddChainCert()
530 int32_t HITLS_CFG_AddCertToStore(HITLS_Config *config, HITLS_CERT_X509 *cert, HITLS_CERT_StoreType … in HITLS_CFG_AddCertToStore() argument
533 if (config == NULL || cert == NULL) { in HITLS_CFG_AddCertToStore()
541 store = SAL_CERT_GetCertStore(config->certMgrCtx); in HITLS_CFG_AddCertToStore()
544 store = SAL_CERT_GetVerifyStore(config->certMgrCtx); in HITLS_CFG_AddCertToStore()
547 store = SAL_CERT_GetChainStore(config->certMgrCtx); in HITLS_CFG_AddCertToStore()
554 newCert = SAL_CERT_X509Dup(config->certMgrCtx, cert); in HITLS_CFG_AddCertToStore()
560 int32_t ret = SAL_CERT_StoreCtrl(config, store, CERT_STORE_CTRL_ADD_CERT_LIST, newCert, NULL); in HITLS_CFG_AddCertToStore()
571 HITLS_CERT_X509 *HITLS_CFG_ParseCert(HITLS_Config *config, const uint8_t *buf, uint32_t len, in HITLS_CFG_ParseCert() argument
574 if (config == NULL || buf == NULL || len == 0) { in HITLS_CFG_ParseCert()
578 HITLS_CERT_X509 *newCert = SAL_CERT_X509Parse(LIBCTX_FROM_CONFIG(config), in HITLS_CFG_ParseCert()
579 ATTRIBUTE_FROM_CONFIG(config), config, buf, len, type, format); in HITLS_CFG_ParseCert()
590 HITLS_CERT_Key *HITLS_CFG_ProviderParseKey(HITLS_Config *config, const uint8_t *buf, uint32_t len, in HITLS_CFG_ProviderParseKey() argument
593 if (config == NULL || buf == NULL || len == 0) { in HITLS_CFG_ProviderParseKey()
597 HITLS_CERT_Key *newKey = SAL_CERT_KeyParse(config, buf, len, type, format, encodeType); in HITLS_CFG_ProviderParseKey()
608 HITLS_CERT_Key *HITLS_CFG_ParseKey(HITLS_Config *config, const uint8_t *buf, uint32_t len, in HITLS_CFG_ParseKey() argument
611 if (config == NULL || buf == NULL || len == 0) { in HITLS_CFG_ParseKey()
615 HITLS_CERT_Key *newKey = SAL_CERT_KeyParse(config, buf, len, type, in HITLS_CFG_ParseKey()
627 HITLS_CERT_Chain *HITLS_CFG_GetChainCerts(HITLS_Config *config) in HITLS_CFG_GetChainCerts() argument
629 if (config == NULL) { in HITLS_CFG_GetChainCerts()
633 return SAL_CERT_GetCurrentChainCerts(config->certMgrCtx); in HITLS_CFG_GetChainCerts()
637 int32_t HITLS_CFG_ClearChainCerts(HITLS_Config *config) in HITLS_CFG_ClearChainCerts() argument
639 if (config == NULL) { in HITLS_CFG_ClearChainCerts()
643 SAL_CERT_ClearCurrentChainCerts(config->certMgrCtx); in HITLS_CFG_ClearChainCerts()
647 int32_t HITLS_CFG_AddExtraChainCert(HITLS_Config *config, HITLS_CERT_X509 *cert) in HITLS_CFG_AddExtraChainCert() argument
649 if (config == NULL || cert == NULL) { in HITLS_CFG_AddExtraChainCert()
653 return SAL_CERT_AddExtraChainCert(config->certMgrCtx, cert); in HITLS_CFG_AddExtraChainCert()
656 HITLS_CERT_Chain *HITLS_CFG_GetExtraChainCerts(HITLS_Config *config) in HITLS_CFG_GetExtraChainCerts() argument
658 if (config == NULL) { in HITLS_CFG_GetExtraChainCerts()
662 return SAL_CERT_GetExtraChainCerts(config->certMgrCtx); in HITLS_CFG_GetExtraChainCerts()
665 int32_t HITLS_CFG_RemoveCertAndKey(HITLS_Config *config) in HITLS_CFG_RemoveCertAndKey() argument
667 if (config == NULL) { in HITLS_CFG_RemoveCertAndKey()
670 SAL_CERT_ClearCertAndKey(config->certMgrCtx); in HITLS_CFG_RemoveCertAndKey()
674 int32_t HITLS_CFG_SetVerifyCb(HITLS_Config *config, HITLS_VerifyCb callback) in HITLS_CFG_SetVerifyCb() argument
676 if (config == NULL) { in HITLS_CFG_SetVerifyCb()
680 return SAL_CERT_SetVerifyCb(config->certMgrCtx, callback); in HITLS_CFG_SetVerifyCb()
683 HITLS_VerifyCb HITLS_CFG_GetVerifyCb(HITLS_Config *config) in HITLS_CFG_GetVerifyCb() argument
685 if (config == NULL) { in HITLS_CFG_GetVerifyCb()
689 return SAL_CERT_GetVerifyCb(config->certMgrCtx); in HITLS_CFG_GetVerifyCb()
693 int32_t HITLS_CFG_SetVerifyNoneSupport(HITLS_Config *config, bool support) in HITLS_CFG_SetVerifyNoneSupport() argument
695 if (config == NULL) { in HITLS_CFG_SetVerifyNoneSupport()
698 config->isSupportVerifyNone = support; in HITLS_CFG_SetVerifyNoneSupport()
703 int32_t HITLS_CFG_GetVerifyNoneSupport(HITLS_Config *config, uint8_t *isSupport) in HITLS_CFG_GetVerifyNoneSupport() argument
705 if (config == NULL || isSupport == NULL) { in HITLS_CFG_GetVerifyNoneSupport()
709 *isSupport = (uint8_t)config->isSupportVerifyNone; in HITLS_CFG_GetVerifyNoneSupport()
713 int32_t HITLS_CFG_GetClientVerifySupport(HITLS_Config *config, uint8_t *isSupport) in HITLS_CFG_GetClientVerifySupport() argument
715 if (config == NULL || isSupport == NULL) { in HITLS_CFG_GetClientVerifySupport()
719 *isSupport = (uint8_t)config->isSupportClientVerify; in HITLS_CFG_GetClientVerifySupport()
723 int32_t HITLS_CFG_GetNoClientCertSupport(HITLS_Config *config, uint8_t *isSupport) in HITLS_CFG_GetNoClientCertSupport() argument
725 if (config == NULL || isSupport == NULL) { in HITLS_CFG_GetNoClientCertSupport()
729 *isSupport = (uint8_t)config->isSupportNoClientCert; in HITLS_CFG_GetNoClientCertSupport()
733 int32_t HITLS_CFG_SetClientVerifySupport(HITLS_Config *config, bool support) in HITLS_CFG_SetClientVerifySupport() argument
735 if (config == NULL) { in HITLS_CFG_SetClientVerifySupport()
738 config->isSupportClientVerify = support; in HITLS_CFG_SetClientVerifySupport()
742 int32_t HITLS_CFG_SetNoClientCertSupport(HITLS_Config *config, bool support) in HITLS_CFG_SetNoClientCertSupport() argument
744 if (config == NULL) { in HITLS_CFG_SetNoClientCertSupport()
748 config->isSupportNoClientCert = support; in HITLS_CFG_SetNoClientCertSupport()
754 int32_t HITLS_CFG_AddCAIndication(HITLS_Config *config, HITLS_TrustedCAType caType, const uint8_t *… in HITLS_CFG_AddCAIndication() argument
756 if ((config == NULL) || (data == NULL) || (len == 0)) { in HITLS_CFG_AddCAIndication()
774 if (config->caList == NULL) { in HITLS_CFG_AddCAIndication()
775 config->caList = BSL_LIST_New(sizeof(HITLS_TrustedCANode *)); in HITLS_CFG_AddCAIndication()
776 if (config->caList == NULL) { in HITLS_CFG_AddCAIndication()
786 …int32_t ret = (int32_t)BSL_LIST_AddElement((BslList *)config->caList, newCaNode, BSL_LIST_POS_END); in HITLS_CFG_AddCAIndication()
793 HITLS_TrustedCAList *HITLS_CFG_GetCAList(const HITLS_Config *config) in HITLS_CFG_GetCAList() argument
795 if (config == NULL) { in HITLS_CFG_GetCAList()
798 return config->caList; in HITLS_CFG_GetCAList()