Home
last modified time | relevance | path

Searched refs:length (Results 1 - 25 of 1181) sorted by relevance

12345678910>>...48

/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/
H A Dpake_v1_protocol_common.c70 params->salt.length = PAKE_SALT_LEN; in AllocDefaultParams()
71 params->salt.val = (uint8_t *)HcMalloc(params->salt.length, 0); in AllocDefaultParams()
77 params->challengeSelf.length = PAKE_CHALLENGE_LEN; in AllocDefaultParams()
78 params->challengeSelf.val = (uint8_t *)HcMalloc(params->challengeSelf.length, 0); in AllocDefaultParams()
84 params->challengePeer.length = PAKE_CHALLENGE_LEN; in AllocDefaultParams()
85 params->challengePeer.val = (uint8_t *)HcMalloc(params->challengePeer.length, 0); in AllocDefaultParams()
91 params->sessionKey.length = PAKE_SESSION_KEY_LEN; in AllocDefaultParams()
92 params->sessionKey.val = (uint8_t *)HcMalloc(params->sessionKey.length, 0); in AllocDefaultParams()
98 params->hmacKey.length = PAKE_HMAC_KEY_LEN; in AllocDefaultParams()
99 params->hmacKey.val = (uint8_t *)HcMalloc(params->hmacKey.length, in AllocDefaultParams()
[all...]
/base/security/device_auth/services/protocol/src/iso_protocol/
H A Diso_protocol_common.c36 params->randSelf.length = RAND_BYTE_LEN; in InitIsoBaseParams()
37 params->randSelf.val = (uint8_t *)HcMalloc(params->randSelf.length, 0); in InitIsoBaseParams()
43 params->randPeer.length = RAND_BYTE_LEN; in InitIsoBaseParams()
44 params->randPeer.val = (uint8_t *)HcMalloc(params->randPeer.length, 0); in InitIsoBaseParams()
51 params->sessionKey.length = ISO_SESSION_KEY_LEN; in InitIsoBaseParams()
52 params->sessionKey.val = (uint8_t *)HcMalloc(params->sessionKey.length, 0); in InitIsoBaseParams()
96 int length = params->randSelf.length + params->randPeer.length + params->authIdSelf.length in IsoCalSelfToken() local
142 int length = params->randSelf.length + params->randPeer.length + params->authIdPeer.length + IsoCalPeerToken() local
[all...]
/base/security/device_auth/frameworks/deviceauth_lite/inc/base/
H A Dbase.h113 uint32_t length; member
118 uint32_t length; member
123 uint32_t length; member
128 uint32_t length; member
134 uint32_t length; member
140 uint32_t length; member
157 uint32_t length; member
162 uint32_t length; member
167 uint32_t length; member
172 uint32_t length; member
177 uint32_t length; global() member
182 uint32_t length; global() member
187 uint32_t length; global() member
192 uint32_t length; global() member
197 uint32_t length; global() member
202 uint32_t length; global() member
207 uint32_t length; global() member
212 uint32_t length; global() member
[all...]
/base/security/device_auth/common_lib/impl/src/
H A Duint8buff_utils.c35 buff->length = buffLen; in InitUint8Buff()
44 if (buff->length == 0) { in DeepCopyUint8Buff()
47 uint8_t *val = (uint8_t *)HcMalloc(buff->length, 0); in DeepCopyUint8Buff()
51 (void)memcpy_s(val, buff->length, buff->val, buff->length); in DeepCopyUint8Buff()
53 newBuff->length = buff->length; in DeepCopyUint8Buff()
59 if (buff == NULL || buff->val == NULL || buff->length == 0) { in FreeUint8Buff()
64 buff->length = 0; in FreeUint8Buff()
69 if (buff == NULL || buff->val == NULL || buff->length in ClearFreeUint8Buff()
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/common/
H A Ddas_task_common.c171 serviceIdPlain.length = pkgName->length + serviceType->length; in CombineServiceId()
172 serviceIdPlain.val = (uint8_t *)HcMalloc(serviceIdPlain.length, 0); in CombineServiceId()
179 if (memcpy_s(serviceIdPlain.val, serviceIdPlain.length, pkgName->val, pkgName->length) != EOK) { in CombineServiceId()
184 if (memcpy_s(serviceIdPlain.val + pkgName->length, serviceIdPlain.length - pkgName->length, in CombineServiceId()
185 serviceType->val, serviceType->length) ! in CombineServiceId()
[all...]
/base/security/device_auth/services/protocol/src/
H A Dprotocol_common.c27 (void)memset_s(key->val, key->length, 0, key->length); in FreeAndCleanKey()
30 key->length = 0; in FreeAndCleanKey()
40 (void)memset_s(param->val, param->length, 0, param->length); in InitSingleParam()
43 param->length = len; in InitSingleParam()
44 param->val = (uint8_t *)HcMalloc(param->length, 0); in InitSingleParam()
/base/security/device_auth/frameworks/deviceauth_lite/source/key_agreement/
H A Dsts_client.c87 random_value.random_value, random_value.length) != EOK) { in build_start_request_data()
90 sts_client->my_challenge.length = random_value.length; in build_start_request_data()
149 uint32_t len = sts_client->peer_public_key.length + sts_client->peer_id.length + in generate_sign_message()
150 sts_client->self_public_key.length + sts_client->self_id.length; in generate_sign_message()
158 (void)memcpy_s(info + pos, len - pos, sts_client->peer_public_key.stpk, sts_client->peer_public_key.length); in generate_sign_message()
159 pos += sts_client->peer_public_key.length; in generate_sign_message()
160 (void)memcpy_s(info + pos, len - pos, sts_client->peer_id.auth_id, sts_client->peer_id.length); in generate_sign_message()
[all...]
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
H A Dpake_v2_protocol_common.c74 params->salt.length = PAKE_SALT_LEN; in AllocDefaultParams()
75 params->salt.val = (uint8_t *)HcMalloc(params->salt.length, 0); in AllocDefaultParams()
81 params->sharedSecret.length = SHA256_LEN; in AllocDefaultParams()
82 params->sharedSecret.val = (uint8_t *)HcMalloc(params->sharedSecret.length, 0); in AllocDefaultParams()
88 params->sessionKey.length = PAKE_SESSION_KEY_LEN; in AllocDefaultParams()
89 params->sessionKey.val = (uint8_t *)HcMalloc(params->sessionKey.length, 0); in AllocDefaultParams()
95 params->kcfData.length = HMAC_LEN; in AllocDefaultParams()
96 params->kcfData.val = (uint8_t *)HcMalloc(params->kcfData.length, 0); in AllocDefaultParams()
102 params->kcfDataPeer.length = HMAC_LEN; in AllocDefaultParams()
103 params->kcfDataPeer.val = (uint8_t *)HcMalloc(params->kcfDataPeer.length, in AllocDefaultParams()
[all...]
/base/security/device_security_level/services/common/
H A Ddslm_crypto.c23 void GenerateRandom(RandomValue *rand, uint32_t length) in GenerateRandom() argument
28 rand->length = (length > RANDOM_MAX_LEN) ? RANDOM_MAX_LEN : length; in GenerateRandom()
30 RAND_bytes(&rand->value[0], rand->length); in GenerateRandom()
/base/security/device_security_level/test/dslm_unit_test/
H A Ddslm_oem_property_test.cpp685 uint32_t length = strlen(data) + 1; in HWTEST_F() local
686 const DataBuffer srcData = {.length = length, .data = (uint8_t *)data}; in HWTEST_F()
687 const DataBuffer sigData = {.length = length, .data = (uint8_t *)data}; in HWTEST_F()
698 uint32_t length = strlen(data) + 1; in HWTEST_F() local
703 const DataBuffer srcData = {.length = length, .data = nullptr}; in HWTEST_F()
704 const DataBuffer sigData = {.length = length, in HWTEST_F()
735 uint32_t length = strlen(data) + 1; HWTEST_F() local
772 uint32_t length = strlen(data) + 1; HWTEST_F() local
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/
H A Dstandard_exchange_message_util.c28 uint32_t exAuthInfoLen = nonce->length + cipher->length; in PackageNonceAndCipherToJson()
35 if (memcpy_s(exAuthInfoVal, exAuthInfoLen, nonce->val, nonce->length) != EOK) { in PackageNonceAndCipherToJson()
40 if (memcpy_s(exAuthInfoVal + nonce->length, exAuthInfoLen - nonce->length, in PackageNonceAndCipherToJson()
41 cipher->val, cipher->length) != EOK) { in PackageNonceAndCipherToJson()
74 if (memcpy_s(nonce->val, nonce->length, exAuthInfoVal, nonce->length) != EOK) { in ParseNonceAndCipherFromJson()
80 res = InitSingleParam(cipher, exAuthInfoLen - nonce->length); in ParseNonceAndCipherFromJson()
85 if (memcpy_s(cipher->val, cipher->length, exAuthInfoVa in ParseNonceAndCipherFromJson()
[all...]
H A Dcommon_standard_bind_exchange.c32 params->pubKeyPeer.length = PAKE_ED25519_KEY_PAIR_LEN; in InitStandardBindExchangeParams()
33 params->pubKeyPeer.val = (uint8_t *)HcMalloc(params->pubKeyPeer.length, 0); in InitStandardBindExchangeParams()
39 params->pubKeySelf.length = PAKE_ED25519_KEY_PAIR_LEN; in InitStandardBindExchangeParams()
40 params->pubKeySelf.val = (uint8_t *)HcMalloc(params->pubKeySelf.length, 0); in InitStandardBindExchangeParams()
46 params->nonce.length = STANDARD_BIND_EXCHANGE_NONCE_LEN; in InitStandardBindExchangeParams()
47 params->nonce.val = (uint8_t *)HcMalloc(params->nonce.length, 0); in InitStandardBindExchangeParams()
53 params->authInfo.length = 0; in InitStandardBindExchangeParams()
55 params->exInfoCipher.length = 0; in InitStandardBindExchangeParams()
104 KeyParams keyParams = { { keyAlias->val, keyAlias->length, true }, false, pakeParams->baseParams.osAccountId }; in GenerateKeyPairIfNotExist()
125 { keyAlias->val, keyAlias->length, tru in PackageAuthInfo()
[all...]
/base/telephony/call_manager/test/unittest/call_manager_zero_gtest/src/
H A Dzero_branch5_test.cpp203 int32_t length = sizeof(CellularCallEventInfo); in HWTEST_F() local
206 dataParcel.WriteInt32(length); in HWTEST_F()
207 dataParcel.WriteRawData((const void *)&info, length); in HWTEST_F()
226 int32_t length = sizeof(CallWaitResponse); in HWTEST_F() local
227 data.WriteInt32(length); in HWTEST_F()
231 data.WriteRawData((const void *)&callWaitResponse, length); in HWTEST_F()
237 length = sizeof(CallRestrictionResponse); in HWTEST_F()
238 dataParcel.WriteInt32(length); in HWTEST_F()
242 dataParcel.WriteRawData((const void *)&callRestrictionResult, length); in HWTEST_F()
249 length in HWTEST_F()
282 int32_t length = sizeof(ClipResponse); HWTEST_F() local
332 int32_t length = sizeof(CallModeReportInfo); HWTEST_F() local
[all...]
/base/security/device_auth/services/key_agree_sdk/src/
H A Dkey_agree_sdk.c36 if ((sharedSecret->length < MIN_SHARED_SECRET_LENGTH) || (sharedSecret->length > MAX_SHARED_SECRET_LENGTH)) { in CheckKeyAgreeStartSessionParams()
37 LOGE("Invalid length of sharedSecret!"); in CheckKeyAgreeStartSessionParams()
40 if (strnlen((const char *)(sharedSecret->data), sharedSecret->length) > sharedSecret->length + 1) { in CheckKeyAgreeStartSessionParams()
44 if ((deviceId->length < MIN_DEVICE_ID_LENGTH) || (deviceId->length > MAX_DEVICE_ID_LENGTH)) { in CheckKeyAgreeStartSessionParams()
45 LOGE("Invalid length of deviceId!"); in CheckKeyAgreeStartSessionParams()
48 if (strnlen((const char *)(deviceId->data), deviceId->length) > deviceId->length in CheckKeyAgreeStartSessionParams()
[all...]
/base/global/resource_management/frameworks/resmgr/src/
H A Draw_file_manager.cpp64 int64_t length; member
70 explicit RawFile(const std::string &path) : filePath(path), offset(0), length(0), in RawFile()
152 if (tempName.length() < rawFileDirName.length() in OH_ResourceManager_OpenRawDir()
153 || (tempName.compare(0, rawFileDirName.length(), rawFileDirName) != 0)) { in OH_ResourceManager_OpenRawDir()
203 result->length = static_cast<long>(len); in LoadRawFileFromHap()
231 result->length = ftell(result->pf); in OH_ResourceManager_OpenRawFile()
265 int OH_ResourceManager_ReadRawFile(const RawFile *rawFile, void *buf, size_t length) in OH_ResourceManager_ReadRawFile() argument
267 if (rawFile == nullptr || rawFile->actualOffset == nullptr || buf == nullptr || length == 0) { in OH_ResourceManager_ReadRawFile()
272 if (length > le in OH_ResourceManager_ReadRawFile()
419 int64_t length; global() member
499 OH_ResourceManager_ReadRawFile64(const RawFile64 *rawFile, void *buf, int64_t length) OH_ResourceManager_ReadRawFile64() argument
[all...]
/base/security/device_auth/frameworks/deviceauth_lite/source/auth_info/
H A Dexchange_auth_info_client.c95 if (key->length < PAKE_SESSION_KEY_LENGTH) { in parse_exchange_response_data()
154 plain.size = auth_info.length + sign_result.length; in build_exchange_request()
161 if (memcpy_s(plain.val, plain.size, auth_info.val, auth_info.length) != EOK) { in build_exchange_request()
166 plain.length = auth_info.length; in build_exchange_request()
168 if (memcpy_s(plain.val + plain.length, plain.size - plain.length, sign_result.signature, sign_result.length) in build_exchange_request()
173 plain.length in build_exchange_request()
[all...]
/base/telephony/call_manager/test/fuzztest/telephonyinteraction_fuzzer/
H A Dtelephonyinteraction_fuzzer.cpp83 int32_t accountLength = msg.length() > kMaxNumberLen ? kMaxNumberLen : msg.length(); in UpdateCallReportInfo()
126 int32_t accountLength = msg.length() > kMaxNumberLen ? kMaxNumberLen : msg.length(); in UpdateCallsReportInfo()
161 int32_t length = sizeof(CellularCallEventInfo); in UpdateEventReport() local
164 dataParcel.WriteInt32(length); in UpdateEventReport()
165 dataParcel.WriteRawData((const void *)&info, length); in UpdateEventReport()
181 int32_t length = sizeof(CallWaitResponse); in UpdateGetWaitingResult() local
182 dataParcel.WriteInt32(length); in UpdateGetWaitingResult()
186 dataParcel.WriteRawData((const void *)&callWaitResponse, length); in UpdateGetWaitingResult()
202 int32_t length = sizeof(CallRestrictionResponse); UpdateGetRestrictionResult() local
223 int32_t length = sizeof(CallTransferResponse); UpdateGetTransferResult() local
254 int32_t length = sizeof(ClipResponse); UpdateGetCallClipResult() local
275 int32_t length = sizeof(GetImsConfigResponse); GetImsConfigResult() local
295 int32_t length = sizeof(GetImsFeatureValueResponse); GetImsFeatureValueResult() local
315 int32_t length = sizeof(MmiCodeInfo); SendMmiCodeResult() local
337 int32_t length = sizeof(CallModeReportInfo); ReceiveUpdateCallMediaModeRequest() local
359 int32_t length = sizeof(CallModeReportInfo); ReceiveUpdateCallMediaModeResponse() local
381 int32_t length = sizeof(CallSessionReportInfo); HandleCallSessionEventChanged() local
402 int32_t length = sizeof(PeerDimensionsReportInfo); HandlePeerDimensionsChanged() local
441 int32_t length = sizeof(CameraCapabilitiesReportInfo); HandleCameraCapabilitiesChanged() local
[all...]
/base/security/certificate_framework/frameworks/js/napi/certificate/src/
H A Dnapi_cert_crl_common.cpp97 uint32_t length; in GetArrayCertFromNapiValue() local
98 status = napi_get_array_length(env, object, &length); in GetArrayCertFromNapiValue()
99 if (status != napi_ok || length == 0) { in GetArrayCertFromNapiValue()
100 LOGI("array length is invalid!"); in GetArrayCertFromNapiValue()
103 if (length > MAX_LEN_OF_ARRAY) { in GetArrayCertFromNapiValue()
104 LOGE("array length is invalid!"); in GetArrayCertFromNapiValue()
108 certs->data = static_cast<HcfX509Certificate **>(CfMalloc(length * sizeof(HcfX509Certificate *), 0)); in GetArrayCertFromNapiValue()
113 certs->count = length; in GetArrayCertFromNapiValue()
114 for (uint32_t i = 0; i < length; i++) { in GetArrayCertFromNapiValue()
148 uint32_t length; in GetArrayCRLFromNapiValue() local
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/
H A Dpake_v2_auth_task_common.c65 .length = SHA256_LEN in VerifyPkSignPeer()
77 .length = params->pkInfoPeer.length in VerifyPkSignPeer()
81 .length = params->pkInfoSignPeer.length in VerifyPkSignPeer()
83 KeyParams keyParams = { { serverPkAliasBuff.val, serverPkAliasBuff.length, true }, false, params->osAccountId }; in VerifyPkSignPeer()
102 .length = SHA256_LEN in GenerateEcdhSharedKey()
117 params->pakeParams.psk.length = sharedKeyAliasLen; in GenerateEcdhSharedKey()
119 KeyParams privKeyParams = { { aliasBuff.val, aliasBuff.length, true }, false, params->pakeParams.osAccountId }; in GenerateEcdhSharedKey()
120 KeyBuff pubKeyBuff = { params->pkPeerBuff.val, params->pkPeerBuff.length, fals in GenerateEcdhSharedKey()
[all...]
/base/update/sys_installer_lite/frameworks/source/verify/
H A Dhota_verify.c39 void HotaHashCalc(const uint8 *buffer, uint32 length) in HotaHashCalc() argument
46 AppSha256Update(&g_sha256, buffer, length); in HotaHashCalc()
50 int32 HotaGetHash(uint8 *buffer, uint32 length) in HotaGetHash() argument
57 if (memset_s(buffer, length, 0, length) != EOK) { in HotaGetHash()
61 if (length >= HASH_LENGTH) { in HotaGetHash()
106 uint32 length = 0; in HotaSignVerifyByHash() local
112 uint8 *keyBuf = HotaGetPubKey(&length); in HotaSignVerifyByHash()
117 int ret = AppRsaDecodePublicKey(&rsa, keyBuf, length); in HotaSignVerifyByHash()
155 uint8 *HotaGetPubKey(uint32 *length) in HotaGetPubKey() argument
[all...]
/base/security/certificate_manager/frameworks/cert_manager_standard/main/common/src/
H A Dcm_util.c24 int32_t CmIsNumeric(const char *str, const size_t length, uint32_t *value) in CmIsNumeric() argument
26 if (str == NULL || length == 0 || length > STR_MAX_LEN || value == NULL) { in CmIsNumeric()
31 for (size_t i = 0; i < length; i++) { in CmIsNumeric()
35 if (i == length - 1) { in CmIsNumeric()
H A Dcm_x509.c97 int32_t length = 0; in ToStringName() local
117 length = ASN1_STRING_to_UTF8((unsigned char **)&data, X509_NAME_ENTRY_get_data(entry)); in ToStringName()
118 if (length < 0) { in ToStringName()
120 } else if ((uint32_t)length >= outBufMaxSize) { in ToStringName()
124 if (strncpy_s(outBuf, outBufMaxSize, data, length) != EOK) { in ToStringName()
132 return length; in ToStringName()
146 int32_t length = 0; in GetX509FirstSubjectName() local
148 length = GetX509SubjectName(x509cert, subjectNameList[j], subjectName, NAME_MAX_SIZE); in GetX509FirstSubjectName()
149 if (length < 0) { in GetX509FirstSubjectName()
151 } else if ((uint32_t)length > in GetX509FirstSubjectName()
168 int32_t length = 0; GetX509FirstSubjectProp() local
261 int32_t length = GetX509SubjectName(x509cert, subjectNameList[j], subjectName, NAME_MAX_SIZE); GetX509SubjectNameLongFormat() local
285 int32_t length = GetX509IssueName(x509cert, issueNameList[j], issueName, NAME_MAX_SIZE); GetX509IssueNameLongFormat() local
382 uint32_t length = (uint32_t)strlen(buf); GetX509TimeFormat() local
422 uint32_t length = (uint32_t)strlen(buf); GetX509Fingerprint() local
[all...]
/base/security/device_auth/test/unittest/deviceauth/source/
H A Dkey_agree_sdk_test.cpp140 g_sharedSecret.length = g_sharedSecretLength; in SetUpTestCase()
141 g_sharedSecret.data = (uint8_t *)HcMalloc(g_sharedSecret.length, 0); in SetUpTestCase()
142 (void)memcpy_s(g_sharedSecret.data, g_sharedSecret.length, (uint8_t *)"123456", g_sharedSecretLength); in SetUpTestCase()
144 g_deviceId.length = g_deviceIdLength; in SetUpTestCase()
145 g_deviceId.data = (uint8_t *)HcMalloc(g_deviceId.length, 0); in SetUpTestCase()
146 (void)memcpy_s(g_deviceId.data, g_deviceId.length, (uint8_t *)"clientclientabcd", g_deviceIdLength); in SetUpTestCase()
148 g_deviceId_s.length = g_deviceIdLength; in SetUpTestCase()
149 g_deviceId_s.data = (uint8_t *)HcMalloc(g_deviceId_s.length, 0); in SetUpTestCase()
150 (void)memcpy_s(g_deviceId_s.data, g_deviceId_s.length, (uint8_t *)"serverserverabcd", g_deviceIdLength); in SetUpTestCase()
225 g_sharedSecret.length in SetUpTestCase()
[all...]
/base/startup/init/test/unittest/param/
H A Dparam_shell_unittest.cpp73 bshd->length = strlen(bshd->buffer); in TestParamShellCmd()
79 bshd->length = strlen(bshd->buffer); in TestParamShellCmd()
85 bshd->length = strlen(bshd->buffer); in TestParamShellCmd()
92 bshd->length = strlen(bshd->buffer); in TestParamShellCmd()
99 bshd->length = strlen(bshd->buffer); in TestParamShellCmd()
105 bshd->length = strlen(bshd->buffer); in TestParamShellCmd()
111 bshd->length = strlen(bshd->buffer); in TestParamShellCmd()
123 bshd->length = strlen(bshd->buffer); in TestParamShellCmd1()
129 bshd->length = strlen(bshd->buffer); in TestParamShellCmd1()
135 bshd->length in TestParamShellCmd1()
[all...]
/base/hiviewdfx/hisysevent/frameworks/native/util/
H A Dstring_util.cpp24 if (src.length() > len) { in CopyCString()
27 return strcpy_s(dst, src.length() + 1, src.c_str()); in CopyCString()
32 if (src.length() > len) { in CreateCString()
35 char* data = new(std::nothrow) char[src.length() + 1]{0}; in CreateCString()
39 if (auto res = strcpy_s(data, src.length() + 1, src.c_str()); res != 0) { in CreateCString()
49 if (str.length() > len) { in ConvertCString()
52 char* data = new(std::nothrow) char[str.length() + 1]{0}; in ConvertCString()
56 if (auto res = strcpy_s(data, str.length() + 1, str.c_str()); res != 0) { in ConvertCString()

Completed in 12 milliseconds

12345678910>>...48