Searched refs:tmpSize (Results 1 - 7 of 7) sorted by relevance
/base/security/code_signature/utils/src/ |
H A D | pkcs7_data.cpp | 75 long tmpSize = BIO_get_mem_data(bio, &tmp);
in GetPKCS7Data() local 76 if ((tmpSize < 0) || (tmpSize > UINT32_MAX)) {
in GetPKCS7Data() 79 if (!pkcs7Data.CopyFrom(tmp, static_cast<uint32_t>(tmpSize))) {
in GetPKCS7Data()
|
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
H A D | hks_openssl_ed25519tox25519.c | 323 uint32_t tmpSize = (uint32_t)BN_num_bytes(var->c);
in BnOperationOfPubKeyConversion() local 324 HKS_IF_NOT_SUCC_BREAK(FillPubKeyByZero(tmpKey, &tmpSize))
in BnOperationOfPubKeyConversion() 325 SwapEndianThirtyTwoByte(tmpKey, tmpSize, true);
in BnOperationOfPubKeyConversion() 326 if (memcpy_s(keyOut->data, keyOut->size, tmpKey, tmpSize) != EOK) {
in BnOperationOfPubKeyConversion() 329 keyOut->size = tmpSize;
in BnOperationOfPubKeyConversion() 339 uint32_t tmpSize = sizeof(struct KeyMaterial25519) + CURVE25519_KEY_LEN;
in ConvertPubkeyX25519FromED25519() local 340 if (keyOut->size < tmpSize) {
in ConvertPubkeyX25519FromED25519() 381 uint32_t tmpSize = sizeof(struct KeyMaterial25519) + CURVE25519_KEY_LEN;
in ConvertPrivX25519FromED25519() local 383 if (keyIn->size < totalSize || keyOut->size < tmpSize) {
in ConvertPrivX25519FromED25519() 395 uint8_t *input = keyIn->data + tmpSize;
in ConvertPrivX25519FromED25519() [all...] |
/base/security/code_signature/test/unittest/ |
H A D | sign_and_enforce_test.cpp | 105 long tmpSize = BIO_get_mem_data(bio, &tmp);
in DumpPKCS7Data() local 106 if ((tmpSize < 0) || (tmpSize > UINT32_MAX)) {
in DumpPKCS7Data() 109 if (!pkcs7Data.CopyFrom(tmp, static_cast<uint32_t>(tmpSize))) {
in DumpPKCS7Data()
|
/base/security/huks/frameworks/huks_standard/main/os_dependency/ipc/src/ |
H A D | hks_client_ipc_serialization.c | 424 uint32_t tmpSize; in EncodeCertChain() local 425 int32_t ret = CheckAndCalculateSize(inBlob->size, beginLen + endLen, &tmpSize); in EncodeCertChain() 428 struct HksBlob tmpBlob = { tmpSize, NULL }; in EncodeCertChain() 429 tmpBlob.data = (uint8_t *)HksMalloc(tmpSize); in EncodeCertChain() 433 if (memcpy_s(tmpBlob.data, tmpSize, begin, beginLen) != EOK) { in EncodeCertChain() 439 if (memcpy_s(tmpBlob.data + tmpSize - endLen, endLen, end, endLen) != EOK) { in EncodeCertChain() 445 ret = Base64Encode(inBlob->data, inBlob->size, tmpBlob.data + beginLen, tmpSize - beginLen - endLen); in EncodeCertChain()
|
/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/ |
H A D | hks_mbedtls_3des.c | 398 uint32_t tmpSize = (message->size - point) >= blockSize ? blockSize : (message->size - point); in Des3EcbNoPaddingData() local 399 ret = memcpy_s(tmpMessage, blockSize, message->data + point, tmpSize); in Des3EcbNoPaddingData() 406 ret = mbedtls_cipher_update(ecbNoPadingctx, tmpMessage, tmpSize, cipherText->data + point, &olen); in Des3EcbNoPaddingData()
|
H A D | hks_mbedtls_des.c | 383 uint32_t tmpSize = (message->size - point) >= blockSize ? blockSize : (message->size - point); in DesEcbNoPaddingData() local 384 ret = memcpy_s(tmpMessage, blockSize, message->data + point, tmpSize); in DesEcbNoPaddingData() 391 ret = mbedtls_cipher_update(ecbNoPadingctx, tmpMessage, tmpSize, cipherText->data + point, &olen); in DesEcbNoPaddingData()
|
H A D | hks_mbedtls_aes.c | 1258 uint32_t tmpSize = (message->size - point) >= blockSize ? blockSize : (message->size - point); in AesEcbNoPaddingData() local 1259 if (memcpy_s(tmpMessage, blockSize, message->data + point, tmpSize)) { in AesEcbNoPaddingData() 1265 ret = mbedtls_cipher_update(ecbNoPadingctx, tmpMessage, tmpSize, cipherText->data + point, &olen); in AesEcbNoPaddingData()
|
Completed in 9 milliseconds