/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
H A D | pake_v1_protocol_common.c | 70 params->salt.length = PAKE_SALT_LEN; in AllocDefaultParams() 71 params->salt.val = (uint8_t *)HcMalloc(params->salt.length, 0); in AllocDefaultParams() 77 params->challengeSelf.length = PAKE_CHALLENGE_LEN; in AllocDefaultParams() 78 params->challengeSelf.val = (uint8_t *)HcMalloc(params->challengeSelf.length, 0); in AllocDefaultParams() 84 params->challengePeer.length = PAKE_CHALLENGE_LEN; in AllocDefaultParams() 85 params->challengePeer.val = (uint8_t *)HcMalloc(params->challengePeer.length, 0); in AllocDefaultParams() 91 params->sessionKey.length = PAKE_SESSION_KEY_LEN; in AllocDefaultParams() 92 params->sessionKey.val = (uint8_t *)HcMalloc(params->sessionKey.length, 0); in AllocDefaultParams() 98 params->hmacKey.length = PAKE_HMAC_KEY_LEN; in AllocDefaultParams() 99 params->hmacKey.val = (uint8_t *)HcMalloc(params->hmacKey.length, in AllocDefaultParams() [all...] |
/base/security/device_auth/services/protocol/src/iso_protocol/ |
H A D | iso_protocol_common.c | 36 params->randSelf.length = RAND_BYTE_LEN; in InitIsoBaseParams() 37 params->randSelf.val = (uint8_t *)HcMalloc(params->randSelf.length, 0); in InitIsoBaseParams() 43 params->randPeer.length = RAND_BYTE_LEN; in InitIsoBaseParams() 44 params->randPeer.val = (uint8_t *)HcMalloc(params->randPeer.length, 0); in InitIsoBaseParams() 51 params->sessionKey.length = ISO_SESSION_KEY_LEN; in InitIsoBaseParams() 52 params->sessionKey.val = (uint8_t *)HcMalloc(params->sessionKey.length, 0); in InitIsoBaseParams() 96 int length = params->randSelf.length + params->randPeer.length + params->authIdSelf.length in IsoCalSelfToken() local 142 int length = params->randSelf.length + params->randPeer.length + params->authIdPeer.length + IsoCalPeerToken() local [all...] |
/base/security/device_auth/frameworks/deviceauth_lite/inc/base/ |
H A D | base.h | 113 uint32_t length; member 118 uint32_t length; member 123 uint32_t length; member 128 uint32_t length; member 134 uint32_t length; member 140 uint32_t length; member 157 uint32_t length; member 162 uint32_t length; member 167 uint32_t length; member 172 uint32_t length; member 177 uint32_t length; global() member 182 uint32_t length; global() member 187 uint32_t length; global() member 192 uint32_t length; global() member 197 uint32_t length; global() member 202 uint32_t length; global() member 207 uint32_t length; global() member 212 uint32_t length; global() member [all...] |
/base/security/device_auth/common_lib/impl/src/ |
H A D | uint8buff_utils.c | 35 buff->length = buffLen; in InitUint8Buff() 44 if (buff->length == 0) { in DeepCopyUint8Buff() 47 uint8_t *val = (uint8_t *)HcMalloc(buff->length, 0); in DeepCopyUint8Buff() 51 (void)memcpy_s(val, buff->length, buff->val, buff->length); in DeepCopyUint8Buff() 53 newBuff->length = buff->length; in DeepCopyUint8Buff() 59 if (buff == NULL || buff->val == NULL || buff->length == 0) { in FreeUint8Buff() 64 buff->length = 0; in FreeUint8Buff() 69 if (buff == NULL || buff->val == NULL || buff->length in ClearFreeUint8Buff() [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/common/ |
H A D | das_task_common.c | 171 serviceIdPlain.length = pkgName->length + serviceType->length; in CombineServiceId() 172 serviceIdPlain.val = (uint8_t *)HcMalloc(serviceIdPlain.length, 0); in CombineServiceId() 179 if (memcpy_s(serviceIdPlain.val, serviceIdPlain.length, pkgName->val, pkgName->length) != EOK) { in CombineServiceId() 184 if (memcpy_s(serviceIdPlain.val + pkgName->length, serviceIdPlain.length - pkgName->length, in CombineServiceId() 185 serviceType->val, serviceType->length) ! in CombineServiceId() [all...] |
/base/security/device_auth/services/protocol/src/ |
H A D | protocol_common.c | 27 (void)memset_s(key->val, key->length, 0, key->length); in FreeAndCleanKey() 30 key->length = 0; in FreeAndCleanKey() 40 (void)memset_s(param->val, param->length, 0, param->length); in InitSingleParam() 43 param->length = len; in InitSingleParam() 44 param->val = (uint8_t *)HcMalloc(param->length, 0); in InitSingleParam()
|
/base/security/device_auth/frameworks/deviceauth_lite/source/key_agreement/ |
H A D | sts_client.c | 87 random_value.random_value, random_value.length) != EOK) { in build_start_request_data() 90 sts_client->my_challenge.length = random_value.length; in build_start_request_data() 149 uint32_t len = sts_client->peer_public_key.length + sts_client->peer_id.length + in generate_sign_message() 150 sts_client->self_public_key.length + sts_client->self_id.length; in generate_sign_message() 158 (void)memcpy_s(info + pos, len - pos, sts_client->peer_public_key.stpk, sts_client->peer_public_key.length); in generate_sign_message() 159 pos += sts_client->peer_public_key.length; in generate_sign_message() 160 (void)memcpy_s(info + pos, len - pos, sts_client->peer_id.auth_id, sts_client->peer_id.length); in generate_sign_message() [all...] |
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
H A D | pake_v2_protocol_common.c | 74 params->salt.length = PAKE_SALT_LEN;
in AllocDefaultParams() 75 params->salt.val = (uint8_t *)HcMalloc(params->salt.length, 0);
in AllocDefaultParams() 81 params->sharedSecret.length = SHA256_LEN;
in AllocDefaultParams() 82 params->sharedSecret.val = (uint8_t *)HcMalloc(params->sharedSecret.length, 0);
in AllocDefaultParams() 88 params->sessionKey.length = PAKE_SESSION_KEY_LEN;
in AllocDefaultParams() 89 params->sessionKey.val = (uint8_t *)HcMalloc(params->sessionKey.length, 0);
in AllocDefaultParams() 95 params->kcfData.length = HMAC_LEN;
in AllocDefaultParams() 96 params->kcfData.val = (uint8_t *)HcMalloc(params->kcfData.length, 0);
in AllocDefaultParams() 102 params->kcfDataPeer.length = HMAC_LEN;
in AllocDefaultParams() 103 params->kcfDataPeer.val = (uint8_t *)HcMalloc(params->kcfDataPeer.length, in AllocDefaultParams() [all...] |
/base/security/device_security_level/services/common/ |
H A D | dslm_crypto.c | 23 void GenerateRandom(RandomValue *rand, uint32_t length) in GenerateRandom() argument 28 rand->length = (length > RANDOM_MAX_LEN) ? RANDOM_MAX_LEN : length; in GenerateRandom() 30 RAND_bytes(&rand->value[0], rand->length); in GenerateRandom()
|
/base/security/device_security_level/test/dslm_unit_test/ |
H A D | dslm_oem_property_test.cpp | 685 uint32_t length = strlen(data) + 1; in HWTEST_F() local 686 const DataBuffer srcData = {.length = length, .data = (uint8_t *)data}; in HWTEST_F() 687 const DataBuffer sigData = {.length = length, .data = (uint8_t *)data}; in HWTEST_F() 698 uint32_t length = strlen(data) + 1; in HWTEST_F() local 703 const DataBuffer srcData = {.length = length, .data = nullptr}; in HWTEST_F() 704 const DataBuffer sigData = {.length = length, in HWTEST_F() 735 uint32_t length = strlen(data) + 1; HWTEST_F() local 772 uint32_t length = strlen(data) + 1; HWTEST_F() local [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/ |
H A D | standard_exchange_message_util.c | 28 uint32_t exAuthInfoLen = nonce->length + cipher->length; in PackageNonceAndCipherToJson() 35 if (memcpy_s(exAuthInfoVal, exAuthInfoLen, nonce->val, nonce->length) != EOK) { in PackageNonceAndCipherToJson() 40 if (memcpy_s(exAuthInfoVal + nonce->length, exAuthInfoLen - nonce->length, in PackageNonceAndCipherToJson() 41 cipher->val, cipher->length) != EOK) { in PackageNonceAndCipherToJson() 74 if (memcpy_s(nonce->val, nonce->length, exAuthInfoVal, nonce->length) != EOK) { in ParseNonceAndCipherFromJson() 80 res = InitSingleParam(cipher, exAuthInfoLen - nonce->length); in ParseNonceAndCipherFromJson() 85 if (memcpy_s(cipher->val, cipher->length, exAuthInfoVa in ParseNonceAndCipherFromJson() [all...] |
H A D | common_standard_bind_exchange.c | 32 params->pubKeyPeer.length = PAKE_ED25519_KEY_PAIR_LEN; in InitStandardBindExchangeParams() 33 params->pubKeyPeer.val = (uint8_t *)HcMalloc(params->pubKeyPeer.length, 0); in InitStandardBindExchangeParams() 39 params->pubKeySelf.length = PAKE_ED25519_KEY_PAIR_LEN; in InitStandardBindExchangeParams() 40 params->pubKeySelf.val = (uint8_t *)HcMalloc(params->pubKeySelf.length, 0); in InitStandardBindExchangeParams() 46 params->nonce.length = STANDARD_BIND_EXCHANGE_NONCE_LEN; in InitStandardBindExchangeParams() 47 params->nonce.val = (uint8_t *)HcMalloc(params->nonce.length, 0); in InitStandardBindExchangeParams() 53 params->authInfo.length = 0; in InitStandardBindExchangeParams() 55 params->exInfoCipher.length = 0; in InitStandardBindExchangeParams() 104 KeyParams keyParams = { { keyAlias->val, keyAlias->length, true }, false, pakeParams->baseParams.osAccountId }; in GenerateKeyPairIfNotExist() 125 { keyAlias->val, keyAlias->length, tru in PackageAuthInfo() [all...] |
/base/telephony/call_manager/test/unittest/call_manager_zero_gtest/src/ |
H A D | zero_branch5_test.cpp | 203 int32_t length = sizeof(CellularCallEventInfo); in HWTEST_F() local 206 dataParcel.WriteInt32(length); in HWTEST_F() 207 dataParcel.WriteRawData((const void *)&info, length); in HWTEST_F() 226 int32_t length = sizeof(CallWaitResponse); in HWTEST_F() local 227 data.WriteInt32(length); in HWTEST_F() 231 data.WriteRawData((const void *)&callWaitResponse, length); in HWTEST_F() 237 length = sizeof(CallRestrictionResponse); in HWTEST_F() 238 dataParcel.WriteInt32(length); in HWTEST_F() 242 dataParcel.WriteRawData((const void *)&callRestrictionResult, length); in HWTEST_F() 249 length in HWTEST_F() 282 int32_t length = sizeof(ClipResponse); HWTEST_F() local 332 int32_t length = sizeof(CallModeReportInfo); HWTEST_F() local [all...] |
/base/security/device_auth/services/key_agree_sdk/src/ |
H A D | key_agree_sdk.c | 36 if ((sharedSecret->length < MIN_SHARED_SECRET_LENGTH) || (sharedSecret->length > MAX_SHARED_SECRET_LENGTH)) { in CheckKeyAgreeStartSessionParams() 37 LOGE("Invalid length of sharedSecret!"); in CheckKeyAgreeStartSessionParams() 40 if (strnlen((const char *)(sharedSecret->data), sharedSecret->length) > sharedSecret->length + 1) { in CheckKeyAgreeStartSessionParams() 44 if ((deviceId->length < MIN_DEVICE_ID_LENGTH) || (deviceId->length > MAX_DEVICE_ID_LENGTH)) { in CheckKeyAgreeStartSessionParams() 45 LOGE("Invalid length of deviceId!"); in CheckKeyAgreeStartSessionParams() 48 if (strnlen((const char *)(deviceId->data), deviceId->length) > deviceId->length in CheckKeyAgreeStartSessionParams() [all...] |
/base/global/resource_management/frameworks/resmgr/src/ |
H A D | raw_file_manager.cpp | 64 int64_t length;
member 70 explicit RawFile(const std::string &path) : filePath(path), offset(0), length(0),
in RawFile() 152 if (tempName.length() < rawFileDirName.length()
in OH_ResourceManager_OpenRawDir() 153 || (tempName.compare(0, rawFileDirName.length(), rawFileDirName) != 0)) {
in OH_ResourceManager_OpenRawDir() 203 result->length = static_cast<long>(len);
in LoadRawFileFromHap() 231 result->length = ftell(result->pf);
in OH_ResourceManager_OpenRawFile() 265 int OH_ResourceManager_ReadRawFile(const RawFile *rawFile, void *buf, size_t length)
in OH_ResourceManager_ReadRawFile() argument 267 if (rawFile == nullptr || rawFile->actualOffset == nullptr || buf == nullptr || length == 0) {
in OH_ResourceManager_ReadRawFile() 272 if (length > le in OH_ResourceManager_ReadRawFile() 419 int64_t length; global() member 499 OH_ResourceManager_ReadRawFile64(const RawFile64 *rawFile, void *buf, int64_t length) OH_ResourceManager_ReadRawFile64() argument [all...] |
/base/security/device_auth/frameworks/deviceauth_lite/source/auth_info/ |
H A D | exchange_auth_info_client.c | 95 if (key->length < PAKE_SESSION_KEY_LENGTH) { in parse_exchange_response_data() 154 plain.size = auth_info.length + sign_result.length; in build_exchange_request() 161 if (memcpy_s(plain.val, plain.size, auth_info.val, auth_info.length) != EOK) { in build_exchange_request() 166 plain.length = auth_info.length; in build_exchange_request() 168 if (memcpy_s(plain.val + plain.length, plain.size - plain.length, sign_result.signature, sign_result.length) in build_exchange_request() 173 plain.length in build_exchange_request() [all...] |
/base/telephony/call_manager/test/fuzztest/telephonyinteraction_fuzzer/ |
H A D | telephonyinteraction_fuzzer.cpp | 83 int32_t accountLength = msg.length() > kMaxNumberLen ? kMaxNumberLen : msg.length(); in UpdateCallReportInfo() 126 int32_t accountLength = msg.length() > kMaxNumberLen ? kMaxNumberLen : msg.length(); in UpdateCallsReportInfo() 161 int32_t length = sizeof(CellularCallEventInfo); in UpdateEventReport() local 164 dataParcel.WriteInt32(length); in UpdateEventReport() 165 dataParcel.WriteRawData((const void *)&info, length); in UpdateEventReport() 181 int32_t length = sizeof(CallWaitResponse); in UpdateGetWaitingResult() local 182 dataParcel.WriteInt32(length); in UpdateGetWaitingResult() 186 dataParcel.WriteRawData((const void *)&callWaitResponse, length); in UpdateGetWaitingResult() 202 int32_t length = sizeof(CallRestrictionResponse); UpdateGetRestrictionResult() local 223 int32_t length = sizeof(CallTransferResponse); UpdateGetTransferResult() local 254 int32_t length = sizeof(ClipResponse); UpdateGetCallClipResult() local 275 int32_t length = sizeof(GetImsConfigResponse); GetImsConfigResult() local 295 int32_t length = sizeof(GetImsFeatureValueResponse); GetImsFeatureValueResult() local 315 int32_t length = sizeof(MmiCodeInfo); SendMmiCodeResult() local 337 int32_t length = sizeof(CallModeReportInfo); ReceiveUpdateCallMediaModeRequest() local 359 int32_t length = sizeof(CallModeReportInfo); ReceiveUpdateCallMediaModeResponse() local 381 int32_t length = sizeof(CallSessionReportInfo); HandleCallSessionEventChanged() local 402 int32_t length = sizeof(PeerDimensionsReportInfo); HandlePeerDimensionsChanged() local 441 int32_t length = sizeof(CameraCapabilitiesReportInfo); HandleCameraCapabilitiesChanged() local [all...] |
/base/security/certificate_framework/frameworks/js/napi/certificate/src/ |
H A D | napi_cert_crl_common.cpp | 97 uint32_t length; in GetArrayCertFromNapiValue() local 98 status = napi_get_array_length(env, object, &length); in GetArrayCertFromNapiValue() 99 if (status != napi_ok || length == 0) { in GetArrayCertFromNapiValue() 100 LOGI("array length is invalid!"); in GetArrayCertFromNapiValue() 103 if (length > MAX_LEN_OF_ARRAY) { in GetArrayCertFromNapiValue() 104 LOGE("array length is invalid!"); in GetArrayCertFromNapiValue() 108 certs->data = static_cast<HcfX509Certificate **>(CfMalloc(length * sizeof(HcfX509Certificate *), 0)); in GetArrayCertFromNapiValue() 113 certs->count = length; in GetArrayCertFromNapiValue() 114 for (uint32_t i = 0; i < length; i++) { in GetArrayCertFromNapiValue() 148 uint32_t length; in GetArrayCRLFromNapiValue() local [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_task_common.c | 65 .length = SHA256_LEN in VerifyPkSignPeer() 77 .length = params->pkInfoPeer.length in VerifyPkSignPeer() 81 .length = params->pkInfoSignPeer.length in VerifyPkSignPeer() 83 KeyParams keyParams = { { serverPkAliasBuff.val, serverPkAliasBuff.length, true }, false, params->osAccountId }; in VerifyPkSignPeer() 102 .length = SHA256_LEN in GenerateEcdhSharedKey() 117 params->pakeParams.psk.length = sharedKeyAliasLen; in GenerateEcdhSharedKey() 119 KeyParams privKeyParams = { { aliasBuff.val, aliasBuff.length, true }, false, params->pakeParams.osAccountId }; in GenerateEcdhSharedKey() 120 KeyBuff pubKeyBuff = { params->pkPeerBuff.val, params->pkPeerBuff.length, fals in GenerateEcdhSharedKey() [all...] |
/base/update/sys_installer_lite/frameworks/source/verify/ |
H A D | hota_verify.c | 39 void HotaHashCalc(const uint8 *buffer, uint32 length)
in HotaHashCalc() argument 46 AppSha256Update(&g_sha256, buffer, length);
in HotaHashCalc() 50 int32 HotaGetHash(uint8 *buffer, uint32 length)
in HotaGetHash() argument 57 if (memset_s(buffer, length, 0, length) != EOK) {
in HotaGetHash() 61 if (length >= HASH_LENGTH) {
in HotaGetHash() 106 uint32 length = 0;
in HotaSignVerifyByHash() local 112 uint8 *keyBuf = HotaGetPubKey(&length);
in HotaSignVerifyByHash() 117 int ret = AppRsaDecodePublicKey(&rsa, keyBuf, length);
in HotaSignVerifyByHash() 155 uint8 *HotaGetPubKey(uint32 *length)
in HotaGetPubKey() argument [all...] |
/base/security/certificate_manager/frameworks/cert_manager_standard/main/common/src/ |
H A D | cm_util.c | 24 int32_t CmIsNumeric(const char *str, const size_t length, uint32_t *value) in CmIsNumeric() argument 26 if (str == NULL || length == 0 || length > STR_MAX_LEN || value == NULL) { in CmIsNumeric() 31 for (size_t i = 0; i < length; i++) { in CmIsNumeric() 35 if (i == length - 1) { in CmIsNumeric()
|
H A D | cm_x509.c | 97 int32_t length = 0; in ToStringName() local 117 length = ASN1_STRING_to_UTF8((unsigned char **)&data, X509_NAME_ENTRY_get_data(entry)); in ToStringName() 118 if (length < 0) { in ToStringName() 120 } else if ((uint32_t)length >= outBufMaxSize) { in ToStringName() 124 if (strncpy_s(outBuf, outBufMaxSize, data, length) != EOK) { in ToStringName() 132 return length; in ToStringName() 146 int32_t length = 0; in GetX509FirstSubjectName() local 148 length = GetX509SubjectName(x509cert, subjectNameList[j], subjectName, NAME_MAX_SIZE); in GetX509FirstSubjectName() 149 if (length < 0) { in GetX509FirstSubjectName() 151 } else if ((uint32_t)length > in GetX509FirstSubjectName() 168 int32_t length = 0; GetX509FirstSubjectProp() local 261 int32_t length = GetX509SubjectName(x509cert, subjectNameList[j], subjectName, NAME_MAX_SIZE); GetX509SubjectNameLongFormat() local 285 int32_t length = GetX509IssueName(x509cert, issueNameList[j], issueName, NAME_MAX_SIZE); GetX509IssueNameLongFormat() local 382 uint32_t length = (uint32_t)strlen(buf); GetX509TimeFormat() local 422 uint32_t length = (uint32_t)strlen(buf); GetX509Fingerprint() local [all...] |
/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | key_agree_sdk_test.cpp | 140 g_sharedSecret.length = g_sharedSecretLength; in SetUpTestCase() 141 g_sharedSecret.data = (uint8_t *)HcMalloc(g_sharedSecret.length, 0); in SetUpTestCase() 142 (void)memcpy_s(g_sharedSecret.data, g_sharedSecret.length, (uint8_t *)"123456", g_sharedSecretLength); in SetUpTestCase() 144 g_deviceId.length = g_deviceIdLength; in SetUpTestCase() 145 g_deviceId.data = (uint8_t *)HcMalloc(g_deviceId.length, 0); in SetUpTestCase() 146 (void)memcpy_s(g_deviceId.data, g_deviceId.length, (uint8_t *)"clientclientabcd", g_deviceIdLength); in SetUpTestCase() 148 g_deviceId_s.length = g_deviceIdLength; in SetUpTestCase() 149 g_deviceId_s.data = (uint8_t *)HcMalloc(g_deviceId_s.length, 0); in SetUpTestCase() 150 (void)memcpy_s(g_deviceId_s.data, g_deviceId_s.length, (uint8_t *)"serverserverabcd", g_deviceIdLength); in SetUpTestCase() 225 g_sharedSecret.length in SetUpTestCase() [all...] |
/base/startup/init/test/unittest/param/ |
H A D | param_shell_unittest.cpp | 73 bshd->length = strlen(bshd->buffer); in TestParamShellCmd() 79 bshd->length = strlen(bshd->buffer); in TestParamShellCmd() 85 bshd->length = strlen(bshd->buffer); in TestParamShellCmd() 92 bshd->length = strlen(bshd->buffer); in TestParamShellCmd() 99 bshd->length = strlen(bshd->buffer); in TestParamShellCmd() 105 bshd->length = strlen(bshd->buffer); in TestParamShellCmd() 111 bshd->length = strlen(bshd->buffer); in TestParamShellCmd() 123 bshd->length = strlen(bshd->buffer); in TestParamShellCmd1() 129 bshd->length = strlen(bshd->buffer); in TestParamShellCmd1() 135 bshd->length in TestParamShellCmd1() [all...] |
/base/hiviewdfx/hisysevent/frameworks/native/util/ |
H A D | string_util.cpp | 24 if (src.length() > len) {
in CopyCString() 27 return strcpy_s(dst, src.length() + 1, src.c_str());
in CopyCString() 32 if (src.length() > len) {
in CreateCString() 35 char* data = new(std::nothrow) char[src.length() + 1]{0};
in CreateCString() 39 if (auto res = strcpy_s(data, src.length() + 1, src.c_str()); res != 0) {
in CreateCString() 49 if (str.length() > len) {
in ConvertCString() 52 char* data = new(std::nothrow) char[str.length() + 1]{0};
in ConvertCString() 56 if (auto res = strcpy_s(data, str.length() + 1, str.c_str()); res != 0) {
in ConvertCString()
|