/base/tee/tee_client/services/authentication/ |
H A D | tee_get_native_cert.c | 28 uint32_t pathLen; in SetPathToBuf() local 31 pathLen = num; in SetPathToBuf() 33 if (*inputLen < sizeof(pathLen)) { in SetPathToBuf() 34 tloge("buffer overflow for pathLen\n"); in SetPathToBuf() 38 ret = memcpy_s(buffer, *inputLen, &pathLen, sizeof(pathLen)); in SetPathToBuf() 44 buffer += sizeof(pathLen); in SetPathToBuf() 45 *len += (uint32_t)sizeof(pathLen); in SetPathToBuf() 46 *inputLen -= (uint32_t)sizeof(pathLen); in SetPathToBuf()
|
H A D | tee_auth_common.c | 76 int TeeGetPkgName(int caPid, char *path, size_t pathLen) in TeeGetPkgName() argument 78 if (path == NULL || pathLen > MAX_PATH_LENGTH) { in TeeGetPkgName() 83 if (TeeGetCaName(caPid, path, pathLen) < 0) { in TeeGetPkgName()
|
H A D | tee_auth_common.h | 47 int TeeGetPkgName(int caPid, char *path, size_t pathLen);
|
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/include/ |
H A D | cert_manager_storage.h | 38 int32_t GetRootPath(uint32_t store, char *rootPath, uint32_t pathLen); 41 char *userIdPath, uint32_t pathLen); 44 char *uidPath, uint32_t pathLen); 47 char *authListPath, uint32_t pathLen);
|
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/ |
H A D | cert_manager_storage.c | 28 int32_t GetRootPath(uint32_t store, char *rootPath, uint32_t pathLen) in GetRootPath() argument 35 ret = memcpy_s(rootPath, pathLen - 1, CREDNTIAL_STORE, strlen(CREDNTIAL_STORE)); in GetRootPath() 38 ret = memcpy_s(rootPath, pathLen - 1, SYSTEM_CA_STORE, strlen(SYSTEM_CA_STORE)); in GetRootPath() 41 ret = memcpy_s(rootPath, pathLen - 1, USER_CA_STORE, strlen(USER_CA_STORE)); in GetRootPath() 44 ret = memcpy_s(rootPath, pathLen - 1, PRI_CREDNTIAL_STORE, strlen(PRI_CREDNTIAL_STORE)); in GetRootPath() 47 ret = memcpy_s(rootPath, pathLen - 1, SYS_CREDNTIAL_STORE, strlen(SYS_CREDNTIAL_STORE)); in GetRootPath() 62 char *userIdPath, uint32_t pathLen) in ConstructUserIdPath() 70 if (snprintf_s(userIdPath, pathLen, pathLen - 1, "%s%u", rootPath, context->userId) < 0) { in ConstructUserIdPath() 85 char *uidPath, uint32_t pathLen) in ConstructUidPath() 61 ConstructUserIdPath(const struct CmContext *context, uint32_t store, char *userIdPath, uint32_t pathLen) ConstructUserIdPath() argument 84 ConstructUidPath(const struct CmContext *context, uint32_t store, char *uidPath, uint32_t pathLen) ConstructUidPath() argument 107 ConstructAuthListPath(const struct CmContext *context, uint32_t store, char *authListPath, uint32_t pathLen) ConstructAuthListPath() argument [all...] |
/base/tee/tee_client/services/teecd/src/ |
H A D | fs_work_agent.c | 160 static int32_t CheckPathLen(const char *path, size_t pathLen) in CheckPathLen() argument 164 while (i < pathLen && path[i] != '\0') { in CheckPathLen() 167 if (i >= pathLen) { in CheckPathLen() 179 static int32_t CreateDir(const char *path, size_t pathLen) in CreateDir() argument 183 ret = CheckPathLen(path, pathLen); in CreateDir() 240 static int32_t GetPathStorage(char *path, size_t pathLen, const char *env) in GetPathStorage() argument 253 rc = strncpy_s(path, pathLen, defaultPath, strlen(defaultPath) + 1); in GetPathStorage() 261 static int32_t GetTransientDir(char* path, size_t pathLen) in GetTransientDir() argument 263 return GetPathStorage(path, pathLen, "SFS_PARTITION_TRANSIENT"); in GetTransientDir() 266 static int32_t GetPersistentDir(char* path, size_t pathLen) in GetPersistentDir() argument 272 JoinFileNameTransient(const char *name, char *path, size_t pathLen) JoinFileNameTransient() argument 324 GetDefaultDir(char *path, size_t pathLen) GetDefaultDir() argument 342 DoJoinFileName(const char *name, char *path, size_t pathLen) DoJoinFileName() argument 369 JoinFileNameForStorageCE(const char *name, char *path, size_t pathLen) JoinFileNameForStorageCE() argument 416 JoinFileName(const char *name, char *path, size_t pathLen) JoinFileName() argument [all...] |
/base/startup/init/interfaces/innerkits/fs_manager/libfs_hvb/ |
H A D | hvb_ops.c | 76 size_t pathLen = 0; in HvbReadFromPartition() local 85 pathLen = strlen(PARTITION_PATH_PREFIX) + strlen(partition); in HvbReadFromPartition() 86 path = calloc(1, pathLen + 1); in HvbReadFromPartition() 92 rc = snprintf_s(path, pathLen + 1, pathLen, "%s%s", PARTITION_PATH_PREFIX, in HvbReadFromPartition()
|
/base/security/certificate_framework/frameworks/adapter/v2.0/src/ |
H A D | cf_adapter_extension_openssl.c | 495 static int32_t CheckKeyUsage(const X509_EXTENSIONS *exts, int32_t *pathLen)
in CheckKeyUsage() argument 511 *pathLen = BASIC_CONSTRAINTS_NO_CA;
in CheckKeyUsage() 518 static int32_t CheckBasicConstraints(const X509_EXTENSIONS *exts, int32_t *pathLen)
in CheckBasicConstraints() argument 530 /* CheckCA operation is success, but cert is not a CA, pathLen set -1 */
in CheckBasicConstraints() 531 *pathLen = BASIC_CONSTRAINTS_NO_CA;
in CheckBasicConstraints() 538 /* CheckCA operation is success and cert is a CA, but no limit to pathlen, pathLen set -2 */
in CheckBasicConstraints() 539 *pathLen = BASIC_CONSTRAINTS_PATHLEN_NO_LIMIT;
in CheckBasicConstraints() 550 *pathLen = (int32_t)len;
in CheckBasicConstraints() 557 int32_t CfOpensslCheckCA(const CfBase *object, int32_t *pathLen)
in CfOpensslCheckCA() argument 559 if ((object == NULL) || (pathLen in CfOpensslCheckCA() [all...] |
/base/security/certificate_framework/test/unittest/cf_adapter_test/src/ |
H A D | cf_adapter_extension_test.cpp | 776 int32_t pathLen = 0;
in HWTEST_F() local 777 ret = CfOpensslCheckCA(extsObj001, &pathLen);
in HWTEST_F() 780 EXPECT_EQ(pathLen, expectPathLenArray[i]) <<
in HWTEST_F() 781 "Normal adapter extension object check CA test2 failed, index:" << i << ", pathLen:" << pathLen;
in HWTEST_F() local 794 int32_t pathLen = 0;
in HWTEST_F() local 805 int32_t ret = CfOpensslCheckCA(&(exts002.base), &pathLen);
in HWTEST_F() 807 EXPECT_EQ(pathLen, BASIC_CONSTRAINTS_NO_CA) << "Normal test failed, not get the expected return value.";
in HWTEST_F() 822 int32_t pathLen = 0;
in HWTEST_F() local 837 int32_t ret = CfOpensslCheckCA(&(exts003.base), &pathLen);
in HWTEST_F() 856 int32_t pathLen = 0; HWTEST_F() local 891 int32_t pathLen = 0; HWTEST_F() local 909 int32_t pathLen = 0; HWTEST_F() local 928 int32_t pathLen = 0; HWTEST_F() local 944 int32_t pathLen = 0; HWTEST_F() local 964 int32_t pathLen = 0; HWTEST_F() local 1011 int32_t pathLen = 0; HWTEST_F() local [all...] |
/base/customization/config_policy/interfaces/kits/cj/src/ |
H A D | config_policy_ffi.cpp | 121 size_t pathLen = strlen(filePath) + 1; in CJ_GetOneCfgFile() local 122 ret.data = static_cast<char*>(malloc(sizeof(char) * pathLen)); in CJ_GetOneCfgFile() 126 errno_t err = strcpy_s(ret.data, pathLen, filePath); in CJ_GetOneCfgFile()
|
/base/security/huks/services/huks_standard/huks_service/main/hks_storage/src/ |
H A D | hks_storage_utils.c | 207 int32_t GetPath(const char *path, const char *name, char *targetPath, uint32_t pathLen, uint32_t bakFlag) in GetPath() argument 209 if (strncpy_s(targetPath, pathLen, path, strlen(path)) != EOK) { in GetPath() 219 if (strncat_s(targetPath, pathLen, "/", strlen("/")) != EOK) { in GetPath() 225 if (strncat_s(targetPath, pathLen, name, strlen(name)) != EOK) { in GetPath() 231 if (strncat_s(targetPath, pathLen, ".bak", strlen(".bak")) != EOK) { in GetPath() 437 uint32_t pathLen = strlen(path); in HksMakeFullDir() local 438 char *curPath = (char *)HksMalloc(pathLen + 1); in HksMakeFullDir() 445 for (uint32_t i = 1; i < pathLen; ++i) { in HksMakeFullDir() 447 (void)memcpy_s(curPath, pathLen, path, i); in HksMakeFullDir()
|
/base/startup/init/interfaces/innerkits/fs_manager/libfs_dm/ |
H A D | fs_dm.c | 343 size_t pathLen = strlen(DM_DEVICE_PATH_PREFIX) + 32; in DmGetDeviceName() local 358 path = calloc(1, pathLen); in DmGetDeviceName() 364 rc = snprintf_s(path, pathLen, pathLen - 1, "%s%d", DM_DEVICE_PATH_PREFIX, devNum); in DmGetDeviceName() 372 rc = memcpy_s(outDevName, outDevNameLen, path, pathLen); in DmGetDeviceName()
|
/base/security/certificate_framework/frameworks/adapter/v2.0/inc/ |
H A D | cf_adapter_extension_openssl.h | 40 int32_t CfOpensslCheckCA(const CfBase *object, int32_t *pathLen);
|
/base/security/certificate_framework/frameworks/core/extension/inc/ |
H A D | cf_extension_adapter_ability_define.h | 28 int32_t (*adapterCheckCA)(const CfBase *object, int32_t *pathLen);
|
/base/security/certificate_framework/frameworks/core/extension/src/ |
H A D | cf_object_extension.c | 202 int32_t pathLen;
in CfExtensionCheck() local 203 ret = tmp->func.adapterCheckCA(tmp->adapterRes, &pathLen);
in CfExtensionCheck() 211 { .tag = CF_TAG_RESULT_INT, .int32Param = pathLen },
in CfExtensionCheck()
|
/base/accesscontrol/sandbox_manager/services/sandbox_manager/main/cpp/src/mac/ |
H A D | mac_adapter.cpp | 39 uint32_t pathLen = 0; member 117 info.pathInfos[i].pathLen = policy[offset + i].path.length(); in SetSandboxPolicy() 161 info.pathInfos[i].pathLen = policy[offset + i].path.length(); in QuerySandboxPolicy() 203 info.pathInfos[i].pathLen = policy[offset + i].path.length(); in CheckSandboxPolicy() 247 info.pathInfos[i].pathLen = policy[offset + i].path.length(); in UnSetSandboxPolicy() 282 info.pathInfos[0].pathLen = policy.path.length(); in UnSetSandboxPolicy()
|
/base/security/certificate_framework/test/fuzztest/v1.0/x509certificate_fuzzer/ |
H A D | x509certificate_fuzzer.cpp | 125 int32_t pathLen = x509CertObj->getBasicConstraints(x509CertObj); in TestQuery() local 126 if (pathLen < 0) { in TestQuery()
|
/base/security/huks/services/huks_standard/huks_service/main/hks_storage/include/ |
H A D | hks_storage_utils.h | 98 int32_t GetPath(const char *path, const char *name, char *targetPath, uint32_t pathLen, uint32_t bakFlag);
|
/base/tee/tee_client/services/teecd/include/ |
H A D | fs_work_agent.h | 152 uint32_t pathLen; member
|
/base/startup/appspawn/interfaces/innerkits/client/ |
H A D | appspawn_client.c | 131 int pathLen = snprintf_s(addr.sun_path, pathSize, (pathSize - 1), "%s%s", APPSPAWN_SOCKET_DIR, socketName); in CreateClientSocket() local 132 APPSPAWN_CHECK(pathLen > 0, break, "Format path %{public}s error: %{public}d", socketName, errno); in CreateClientSocket() 134 socklen_t socketAddrLen = (socklen_t)(offsetof(struct sockaddr_un, sun_path) + (socklen_t)pathLen + 1); in CreateClientSocket()
|
/base/startup/init/test/systest/ |
H A D | loopclient_systest.c | 203 int pathLen = snprintf_s(addr.sun_path, pathSize, (pathSize - 1), "%s%s", _SOCKET_DIR, socketName); in CreateClientSocket() local 204 if (pathLen <= 0) { in CreateClientSocket() 209 socklen_t socketAddrLen = offsetof(struct sockaddr_un, sun_path) + pathLen + 1; in CreateClientSocket()
|
/base/startup/appspawn/modules/common/ |
H A D | appspawn_cgroup.c | 208 uint32_t pathLen = strlen(path); in ProcessMgrAddApp() local 214 path[pathLen] = '\0'; in ProcessMgrAddApp()
|
/base/web/webview/interfaces/kits/napi/webviewcontroller/ |
H A D | napi_web_download_item.cpp | 642 size_t pathLen = 0; in JS_Start() local 643 napi_get_value_string_utf8(env, argv[0], nullptr, 0, &pathLen); in JS_Start() 652 char stringValue[pathLen + 1]; in JS_Start() 654 napi_get_value_string_utf8(env, argv[0], stringValue, pathLen + 1, &jsStringLength); in JS_Start() 655 if (jsStringLength != pathLen) { in JS_Start()
|
/base/security/certificate_framework/frameworks/adapter/v1.0/src/ |
H A D | x509_certificate_openssl.c | 1125 long pathLen = ASN1_INTEGER_get(constraints->pathlen); in GetBasicConstraintsX509Openssl() local 1126 if ((pathLen < 0) || (pathLen > INT_MAX)) { in GetBasicConstraintsX509Openssl() 1132 return (int32_t)pathLen; in GetBasicConstraintsX509Openssl() 1527 long pathLen = ASN1_INTEGER_get(bc->pathlen); in DetailForMinPathLenConstraint() local 1529 if (ca && (pathLen >= minPathLenConstraint || pathLen == -1)) { in DetailForMinPathLenConstraint()
|
/base/security/certificate_framework/test/unittest/v1.0/src/ |
H A D | crypto_x509_certificate_test.cpp | 506 int32_t pathLen = x509Cert->getBasicConstraints(x509Cert); in HWTEST_F() local 507 EXPECT_EQ(pathLen, -1); /* cert path len is only valid for CA. */ in HWTEST_F() 514 int32_t pathLen = g_x509CertObj->getBasicConstraints(g_x509CertObj); in HWTEST_F() local 515 EXPECT_EQ(pathLen, TEST_CERT_CHAIN_LEN); /* g_testSelfSignedCaCert is CA and it's path len is 2. */ in HWTEST_F() 521 int32_t pathLen = g_x509CertObj->getBasicConstraints(nullptr); in HWTEST_F() local 522 EXPECT_EQ(pathLen, -1); in HWTEST_F()
|