Searched refs:userIdLen (Results 1 - 8 of 8) sorted by relevance
/base/security/huks/services/huks_standard/huks_service/main/core/src/ |
H A D | hks_session_manager.c | 222 /* userIdLen and processNameLen have been checked by calling function */
in ConstructOperationProcessInfo() 223 uint32_t userIdLen = processInfo->userId.size;
in ConstructOperationProcessInfo() local 226 uint8_t *userId = (uint8_t *)HksMalloc(userIdLen);
in ConstructOperationProcessInfo() 236 (void)memcpy_s(userId, userIdLen, processInfo->userId.data, userIdLen);
in ConstructOperationProcessInfo() 239 operation->processInfo.userId.size = userIdLen;
in ConstructOperationProcessInfo() 359 uint32_t userIdLen = operation->processInfo.userId.size;
in IsSameUserId() local 360 return ((userIdLen == processInfo->userId.size) &&
in IsSameUserId() 361 (memcmp(operation->processInfo.userId.data, processInfo->userId.data, userIdLen) == 0));
in IsSameUserId()
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/creds_manager/ |
H A D | sym_token_manager.c | 331 uint32_t userIdLen = HcStrlen(userId); in GenerateKeyAlias() local 333 uint32_t aliasLen = authCodeTagLen + userIdLen + deviceIdLen; in GenerateKeyAlias() 343 if (memcpy_s(oriAliasBuff.val, oriAliasBuff.length, userId, userIdLen) != EOK) { in GenerateKeyAlias() 348 if (memcpy_s(oriAliasBuff.val + userIdLen, oriAliasBuff.length - userIdLen, deviceId, deviceIdLen) != EOK) { in GenerateKeyAlias() 353 if (memcpy_s(oriAliasBuff.val + userIdLen + deviceIdLen, in GenerateKeyAlias() 354 oriAliasBuff.length - userIdLen - deviceIdLen, authCodeTag, authCodeTagLen) != EOK) { in GenerateKeyAlias()
|
H A D | asy_token_manager.c | 349 uint32_t userIdLen = HcStrlen(userId); in GenerateKeyAlias() local 355 aliasStrLen = userIdLen + deviceIdLen + serverPkTagLen; in GenerateKeyAlias() 357 aliasStrLen = userIdLen + deviceIdLen; in GenerateKeyAlias() 368 if (memcpy_s(aliasBuff.val, aliasBuff.length, userId, userIdLen) != EOK) { in GenerateKeyAlias() 373 if (memcpy_s(aliasBuff.val + userIdLen, aliasBuff.length - userIdLen, in GenerateKeyAlias() 379 if (isServerPkAlias && (memcpy_s(aliasBuff.val + userIdLen + deviceIdLen, in GenerateKeyAlias() 380 aliasBuff.length - userIdLen - deviceIdLen, serverPkTag, serverPkTagLen) != EOK)) { in GenerateKeyAlias()
|
/base/security/device_auth/test/fuzztest/authenticators/account_related/auth/isoauthtask_fuzzer/ |
H A D | isoauthtask_fuzzer.cpp | 145 uint32_t userIdLen = HcStrlen(userId) + 1; in IsoAuthTaskTest02() local 146 params->userIdPeer = static_cast<char *>(HcMalloc(userIdLen, 0)); in IsoAuthTaskTest02() 148 (void)memcpy_s(params->userIdPeer, userIdLen, userId, userIdLen); in IsoAuthTaskTest02()
|
/base/security/device_auth/services/identity_manager/src/ |
H A D | cert_operation.c | 129 static int32_t GetSelfUserId(int32_t osAccountId, char *userId, uint32_t userIdLen) in GetSelfUserId() argument 147 if (memcpy_s(userId, userIdLen, StringGet(&(*ptr)->userId), StringLength(&(*ptr)->userId)) != EOK) { in GetSelfUserId()
|
/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | iso_auth_task_test.cpp | 133 uint32_t userIdLen = HcStrlen(userId) + 1; in HWTEST_F() local 134 params->userIdPeer = static_cast<char *>(HcMalloc(userIdLen, 0)); in HWTEST_F() 136 (void)memcpy_s(params->userIdPeer, userIdLen, userId, userIdLen); in HWTEST_F()
|
/base/startup/appspawn/modules/sandbox/ |
H A D | appspawn_sandbox.c | 126 uint32_t userIdLen = sizeof(PARAMETER_USER_ID) - 1; in BuildRootPath() local 136 if (rootLen > (currLen + userIdLen)) { in BuildRootPath() 138 uid, sandbox->rootPath + currLen + userIdLen); in BuildRootPath()
|
/base/security/device_auth/services/session_manager/src/session/v2/ |
H A D | dev_session_v2.c | 668 static int32_t GetSelfUserId(int32_t osAccountId, char *userId, uint32_t userIdLen) in GetSelfUserId() argument 686 if (memcpy_s(userId, userIdLen, StringGet(&(*ptr)->userId), StringLength(&(*ptr)->userId)) != EOK) { in GetSelfUserId()
|
Completed in 17 milliseconds