Home
last modified time | relevance | path

Searched refs:tmpSize (Results 1 - 7 of 7) sorted by relevance

/base/security/code_signature/utils/src/
H A Dpkcs7_data.cpp75 long tmpSize = BIO_get_mem_data(bio, &tmp); in GetPKCS7Data() local
76 if ((tmpSize < 0) || (tmpSize > UINT32_MAX)) { in GetPKCS7Data()
79 if (!pkcs7Data.CopyFrom(tmp, static_cast<uint32_t>(tmpSize))) { in GetPKCS7Data()
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/
H A Dhks_openssl_ed25519tox25519.c323 uint32_t tmpSize = (uint32_t)BN_num_bytes(var->c); in BnOperationOfPubKeyConversion() local
324 HKS_IF_NOT_SUCC_BREAK(FillPubKeyByZero(tmpKey, &tmpSize)) in BnOperationOfPubKeyConversion()
325 SwapEndianThirtyTwoByte(tmpKey, tmpSize, true); in BnOperationOfPubKeyConversion()
326 if (memcpy_s(keyOut->data, keyOut->size, tmpKey, tmpSize) != EOK) { in BnOperationOfPubKeyConversion()
329 keyOut->size = tmpSize; in BnOperationOfPubKeyConversion()
339 uint32_t tmpSize = sizeof(struct KeyMaterial25519) + CURVE25519_KEY_LEN; in ConvertPubkeyX25519FromED25519() local
340 if (keyOut->size < tmpSize) { in ConvertPubkeyX25519FromED25519()
381 uint32_t tmpSize = sizeof(struct KeyMaterial25519) + CURVE25519_KEY_LEN; in ConvertPrivX25519FromED25519() local
383 if (keyIn->size < totalSize || keyOut->size < tmpSize) { in ConvertPrivX25519FromED25519()
395 uint8_t *input = keyIn->data + tmpSize; in ConvertPrivX25519FromED25519()
[all...]
/base/security/code_signature/test/unittest/
H A Dsign_and_enforce_test.cpp105 long tmpSize = BIO_get_mem_data(bio, &tmp); in DumpPKCS7Data() local
106 if ((tmpSize < 0) || (tmpSize > UINT32_MAX)) { in DumpPKCS7Data()
109 if (!pkcs7Data.CopyFrom(tmp, static_cast<uint32_t>(tmpSize))) { in DumpPKCS7Data()
/base/security/huks/frameworks/huks_standard/main/os_dependency/ipc/src/
H A Dhks_client_ipc_serialization.c424 uint32_t tmpSize; in EncodeCertChain() local
425 int32_t ret = CheckAndCalculateSize(inBlob->size, beginLen + endLen, &tmpSize); in EncodeCertChain()
428 struct HksBlob tmpBlob = { tmpSize, NULL }; in EncodeCertChain()
429 tmpBlob.data = (uint8_t *)HksMalloc(tmpSize); in EncodeCertChain()
433 if (memcpy_s(tmpBlob.data, tmpSize, begin, beginLen) != EOK) { in EncodeCertChain()
439 if (memcpy_s(tmpBlob.data + tmpSize - endLen, endLen, end, endLen) != EOK) { in EncodeCertChain()
445 ret = Base64Encode(inBlob->data, inBlob->size, tmpBlob.data + beginLen, tmpSize - beginLen - endLen); in EncodeCertChain()
/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/
H A Dhks_mbedtls_3des.c398 uint32_t tmpSize = (message->size - point) >= blockSize ? blockSize : (message->size - point); in Des3EcbNoPaddingData() local
399 ret = memcpy_s(tmpMessage, blockSize, message->data + point, tmpSize); in Des3EcbNoPaddingData()
406 ret = mbedtls_cipher_update(ecbNoPadingctx, tmpMessage, tmpSize, cipherText->data + point, &olen); in Des3EcbNoPaddingData()
H A Dhks_mbedtls_des.c383 uint32_t tmpSize = (message->size - point) >= blockSize ? blockSize : (message->size - point); in DesEcbNoPaddingData() local
384 ret = memcpy_s(tmpMessage, blockSize, message->data + point, tmpSize); in DesEcbNoPaddingData()
391 ret = mbedtls_cipher_update(ecbNoPadingctx, tmpMessage, tmpSize, cipherText->data + point, &olen); in DesEcbNoPaddingData()
H A Dhks_mbedtls_aes.c1258 uint32_t tmpSize = (message->size - point) >= blockSize ? blockSize : (message->size - point); in AesEcbNoPaddingData() local
1259 if (memcpy_s(tmpMessage, blockSize, message->data + point, tmpSize)) { in AesEcbNoPaddingData()
1265 ret = mbedtls_cipher_update(ecbNoPadingctx, tmpMessage, tmpSize, cipherText->data + point, &olen); in AesEcbNoPaddingData()

Completed in 9 milliseconds