/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
H A D | hks_openssl_aes.c | 148 int32_t outLen = 0;
in OpensslBlockCipherEncryptUpdate() 149 if (EVP_EncryptUpdate(ctx, cipherText->data, &outLen, message->data, message->size) != HKS_OPENSSL_SUCCESS) {
in OpensslBlockCipherEncryptUpdate() 153 cipherText->size = (uint32_t)outLen;
in OpensslBlockCipherEncryptUpdate() 170 int32_t outLen = 0;
in OpensslBlockCipherHandleFinalThree() local 174 ? EVP_EncryptUpdate(ctx, output->data, &outLen, input->data, input->size)
in OpensslBlockCipherHandleFinalThree() 175 : EVP_DecryptUpdate(ctx, output->data, &outLen, input->data, input->size);
in OpensslBlockCipherHandleFinalThree() 182 output->size = (uint32_t)outLen;
in OpensslBlockCipherHandleFinalThree() 184 ? EVP_EncryptFinal_ex(ctx, (output->data + outLen), &outLen)
in OpensslBlockCipherHandleFinalThree() 185 : EVP_DecryptFinal_ex(ctx, (output->data + outLen), in OpensslBlockCipherHandleFinalThree() 395 int outLen = 0; OpensslAesAeadEncryptFinal() local 430 int outLen = 0; OpensslAesAeadDecryptFinal() local 494 int outLen = 0; OpensslAesAeadCryptInit() local 555 int32_t outLen = 0; OpensslAesAeadEnryptUpdate() local 571 int32_t outLen = 0; OpensslAesAeadDecryptUpdate() local 596 int32_t outLen = 0; OpensslAesAeadEncryptFinalGCM() local 643 int32_t outLen = 0; OpensslAesAeadDecryptFinalGCM() local 773 int32_t outLen = output->size; OpensslAesAeadCipherUpdate() local 825 int32_t outLen = 0; OpensslAesAeadCipherFinal() local 931 int32_t outLen = 0; OpensslAesCipherEncryptFinal() local 954 int32_t outLen = 0; OpensslAesCipherDecryptFinal() local [all...] |
H A D | hks_openssl_bn.c | 68 int32_t outLen = BN_num_bytes(bnX);
in BnExpModExport() local 69 if ((outLen < 0) || (x->size < (uint32_t)outLen) || x->size > INT32_MAX) {
in BnExpModExport() 77 if (outLen == 0) {
in BnExpModExport() 81 uint8_t *bnOutput = (uint8_t *)HksMalloc(outLen);
in BnExpModExport() 87 if (realOutLen != outLen) {
in BnExpModExport()
|
H A D | hks_openssl_rsa.c | 400 size_t outLen; in HksOpensslRsaCrypt() local 402 ret = EVP_PKEY_encrypt(ctx, NULL, &outLen, message->data, message->size); in HksOpensslRsaCrypt() 404 ret = EVP_PKEY_decrypt(ctx, NULL, &outLen, message->data, message->size); in HksOpensslRsaCrypt() 412 if (outLen > cipherText->size) { in HksOpensslRsaCrypt() 419 ret = EVP_PKEY_encrypt(ctx, cipherText->data, &outLen, message->data, message->size); in HksOpensslRsaCrypt() 421 ret = EVP_PKEY_decrypt(ctx, cipherText->data, &outLen, message->data, message->size); in HksOpensslRsaCrypt() 428 cipherText->size = outLen; in HksOpensslRsaCrypt()
|
/base/security/certificate_manager/frameworks/cert_manager_standard/main/os_dependency/cm_ipc/src/ |
H A D | cm_request.cpp | 61 size_t outLen = reply.ReadUint32(); in CmReadRequestReply() local 62 if (outLen == 0) { in CmReadRequestReply() 72 const uint8_t *outData = reply.ReadBuffer(outLen); in CmReadRequestReply() 76 if (outBlob->size < outLen) { in CmReadRequestReply() 77 CM_LOG_E("outBlob size[%u] smaller than outLen[%u]", outBlob->size, outLen); in CmReadRequestReply() 80 if (memcpy_s(outBlob->data, outBlob->size, outData, outLen) != EOK) { in CmReadRequestReply() 83 outBlob->size = outLen; in CmReadRequestReply()
|
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/ |
H A D | openssl_aes_helper.c | 164 int outLen = 0; in AesEncrypt() local 165 if (EVP_EncryptUpdate(ctx, outData->data, &outLen, inData->data, inData->size) != 1) { in AesEncrypt() 169 outData->size = (uint32_t)outLen; in AesEncrypt() 170 if (EVP_EncryptFinal_ex(ctx, outData->data + outLen, &outLen) != 1) { in AesEncrypt() 174 outData->size += outLen; in AesEncrypt() 218 int outLen = 0; in AesDecrypt() local 219 if (EVP_DecryptUpdate(ctx, outData->data, &outLen, inData->data, inData->size) != 1) { in AesDecrypt() 223 outData->size = outLen; in AesDecrypt() 224 if (EVP_DecryptFinal_ex(ctx, outData->data + outLen, in AesDecrypt() 266 int outLen = 0; AesGcmEncrypt() local 321 int outLen = 0; AesGcmDecrypt() local [all...] |
H A D | openssl_rsa_helper.c | 272 size_t outLen = outData->size; in EncryptRsa() local 273 if (EVP_PKEY_encrypt(ectx, outData->data, &outLen, inData->data, inData->size) != 1) { in EncryptRsa() 278 outData->size = outLen; in EncryptRsa() 320 size_t outLen = outData->size; in DecryptRsa() local 321 if (EVP_PKEY_decrypt(ectx, outData->data, &outLen, inData->data, inData->size) != 1) { in DecryptRsa() 326 outData->size = outLen; in DecryptRsa()
|
/base/security/huks/frameworks/huks_standard/main/os_dependency/ipc/src/ |
H A D | hks_request.cpp | 54 uint32_t outLen = 0;
in HksReadRequestReply() local 55 if (!reply.ReadUint32(outLen) || outLen == 0) {
in HksReadRequestReply() 64 const uint8_t *outData = reply.ReadBuffer(outLen);
in HksReadRequestReply() 67 if (outBlob->size < outLen) {
in HksReadRequestReply() 68 HKS_LOG_E("outBlob size[%" LOG_PUBLIC "u] smaller than outLen[%" LOG_PUBLIC "u]", outBlob->size, outLen);
in HksReadRequestReply() 72 if (memcpy_s(outBlob->data, outBlob->size, outData, outLen) != EOK) {
in HksReadRequestReply() 76 outBlob->size = outLen;
in HksReadRequestReply()
|
/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/src/ |
H A D | dlp_crypt.cpp | 176 int32_t outLen = 0; in OpensslAesCipherEncryptFinal() local 178 if (EVP_EncryptUpdate(ctx, cipherText->data, &outLen, message->data, message->size) != DLP_OPENSSL_SUCCESS) { in OpensslAesCipherEncryptFinal() 183 cipherText->size = static_cast<uint32_t>(outLen); in OpensslAesCipherEncryptFinal() 185 if (EVP_EncryptFinal_ex(ctx, cipherText->data + outLen, &outLen) != DLP_OPENSSL_SUCCESS) { in OpensslAesCipherEncryptFinal() 190 cipherText->size += static_cast<uint32_t>(outLen); in OpensslAesCipherEncryptFinal() 279 int32_t outLen = 0; in OpensslAesCipherEncryptUpdate() local 280 if (EVP_EncryptUpdate(ctx, cipherText->data, &outLen, message->data, message->size) != DLP_OPENSSL_SUCCESS) { in OpensslAesCipherEncryptUpdate() 284 cipherText->size = static_cast<uint32_t>(outLen); in OpensslAesCipherEncryptUpdate() 302 int32_t outLen in OpensslAesCipherEncryptFinalThree() local 337 int32_t outLen = 0; OpensslAesCipherDecryptUpdate() local 359 int32_t outLen = 0; OpensslAesCipherDecryptFinalThree() local 386 int32_t outLen = 0; OpensslAesCipherDecryptFinal() local [all...] |
/base/hiviewdfx/hilog_lite/frameworks/mini/ |
H A D | hiview_output_log.c | 427 int32 outLen = 0; in LogValuesFmt() local 433 for (i = 0; fmt[i] != 0 && outLen < desLen;) { in LogValuesFmt() 435 desStrPtr[outLen++] = fmt[i++]; in LogValuesFmt() 439 desStrPtr[outLen++] = fmt[i++]; in LogValuesFmt() 440 desStrPtr[outLen++] = fmt[i++]; in LogValuesFmt() 462 len = snprintf_s(&desStrPtr[outLen], desLen - outLen, desLen - outLen - 1, in LogValuesFmt() 467 outLen += len; in LogValuesFmt() 472 return outLen; in LogValuesFmt() 612 int32 outLen = 0; LogValuesFmtHash() local [all...] |
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/kdf/src/ |
H A D | pbkdf2_openssl.c | 36 int outLen;
member 67 HcfClearAndFreeUnsignedChar((*data)->out, (*data)->outLen);
in FreeKdfData() 69 (*data)->outLen = 0;
in FreeKdfData() 181 data->outLen = params->output.len;
in InitPBKDF2Data() 194 data->salt, data->saltLen, data->iter, self->digestAlg, data->outLen, data->out) != HCF_OPENSSL_SUCCESS) {
in OpensslPBKDF2() 199 (void)memcpy_s(params->output.data, data->outLen, data->out, data->outLen);
in OpensslPBKDF2()
|
/base/security/appverify/interfaces/innerkits/appverify/src/util/ |
H A D | hap_verify_openssl_utils.cpp | 563 uint32_t outLen = 0; in GetDigest() local 565 return outLen; in GetDigest() 567 if (EVP_DigestFinal(digestParameter.ptrCtx, out, &outLen) <= 0) { in GetDigest() 570 outLen = 0; in GetDigest() 572 return outLen; in GetDigest() 579 uint32_t outLen = 0; in GetDigest() local 582 return outLen; in GetDigest() 586 return outLen; in GetDigest() 592 return outLen; in GetDigest() 598 return outLen; in GetDigest() [all...] |
/base/security/device_auth/deps_adapter/key_management_adapter/impl/inc/ |
H A D | mbedtls_ec_adapter.h | 33 int32_t MbedtlsBase64Encode(const uint8_t *byte, uint32_t byteLen, char *base64Str, uint32_t strLen, uint32_t *outLen);
34 int32_t MbedtlsBase64Decode(const char *base64Str, uint32_t strLen, uint8_t *byte, uint32_t byteLen, uint32_t *outLen);
|
/base/security/device_security_level/baselib/utils/src/ |
H A D | utils_hexstring.c | 54 uint32_t outLen = strLen / BYTE_TO_HEX_OPER_LENGTH; in DslmHexStringToByte() local 56 if (hexLen < outLen) { /* test the length */ in DslmHexStringToByte() 63 for (uint32_t i = 0; i < outLen; i++) { in DslmHexStringToByte()
|
/base/security/device_security_level/oem_property/common/ |
H A D | dslm_credential.c | 85 uint32_t outLen = len; in GetSupportedCredTypes() local 87 outLen = cb->credTypeCnt; in GetSupportedCredTypes() 89 for (uint32_t i = 0; i < outLen; i++) { in GetSupportedCredTypes() 92 return (int32_t)outLen; in GetSupportedCredTypes()
|
/base/hiviewdfx/hiview/core/param_update/src/ |
H A D | log_sign_tools.cpp | 72 int LogSignTools::CalcFileSha(const std::string& path, unsigned char *hash, size_t outLen) in CalcFileSha() argument 79 if (outLen < SHA256_DIGEST_LENGTH) { in CalcFileSha() 123 size_t outLen = static_cast<size_t>(EVP_EncodeBlock(reinterpret_cast<uint8_t *>(base64Str.get()), in CalcBase64() local 125 encodedStr = std::string(reinterpret_cast<char*>(base64Str.get()), outLen); in CalcBase64()
|
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/ |
H A D | cert_manager_uri.c | 565 uint32_t outLen = 0; in CmConstructUri() local 566 int32_t ret = CertManagerUriEncode(NULL, &outLen, uriObj); in CmConstructUri() 572 if ((outLen == 0) || (outLen > MAX_OUT_BLOB_SIZE)) { in CmConstructUri() 573 CM_LOG_E("invalid outLen[%u]", outLen); in CmConstructUri() 577 char *data = (char *)CMMalloc(outLen); in CmConstructUri() 582 (void)memset_s(data, outLen, 0, outLen); in CmConstructUri() 583 outUri->size = outLen; /* includ in CmConstructUri() 597 UintToStr(uint32_t input, char *out, uint32_t outLen) UintToStr() argument [all...] |
/base/update/updater/services/include/rust/ |
H A D | hash_signed_data.h | 25 size_t GetSigFromHashData(const HashSignedData *signed_data, uint8_t *out, size_t outLen, const char *file_name);
|
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/cipher/src/ |
H A D | cipher_aes_openssl.c | 491 uint32_t outLen = AES_BLOCK_SIZE + AES_BLOCK_SIZE; in AllocateOutput() local 493 outLen += input->len; in AllocateOutput() 496 output->data = (uint8_t *)HcfMalloc(outLen, 0); in AllocateOutput() 501 output->len = outLen; in AllocateOutput() 573 uint32_t outLen = 0; in AllocateCcmOutput() local 575 outLen += input->len; in AllocateCcmOutput() 579 outLen += authTagLen + AES_BLOCK_SIZE; in AllocateCcmOutput() 580 if (outLen == 0) { in AllocateCcmOutput() 584 output->data = (uint8_t *)HcfMalloc(outLen, 0); in AllocateCcmOutput() 589 output->len = outLen; in AllocateCcmOutput() 686 uint32_t outLen = 0; AllocateGcmOutput() local [all...] |
H A D | cipher_sm4_openssl.c | 389 uint32_t outLen = SM4_BLOCK_SIZE + SM4_BLOCK_SIZE; in AllocateOutput() local 391 outLen += input->len; in AllocateOutput() 394 output->data = (uint8_t*)HcfMalloc(outLen, 0); in AllocateOutput() 399 output->len = outLen; in AllocateOutput() 472 uint32_t outLen = 0; in AllocateGcmOutput() local 474 outLen += input->len; in AllocateGcmOutput() 478 outLen += data->updateLen + authTagLen + SM4_BLOCK_SIZE; in AllocateGcmOutput() 479 if (outLen == 0) { in AllocateGcmOutput() 483 output->data = (uint8_t *)HcfMalloc(outLen, 0); in AllocateGcmOutput() 488 output->len = outLen; in AllocateGcmOutput() [all...] |
H A D | cipher_3des_openssl.c | 148 uint32_t outLen = DES_BLOCK_SIZE; in AllocateOutput() local 150 outLen += input->len; in AllocateOutput() 152 output->data = (uint8_t *)HcfMalloc(outLen, 0); in AllocateOutput() 157 output->len = outLen; in AllocateOutput()
|
/base/security/huks/frameworks/huks_standard/main/core/src/ |
H A D | hks_verifier.c | 287 static int32_t ExtractTlvLength(const uint8_t *in, uint32_t inLen, uint32_t *headSize, uint32_t *outLen)
in ExtractTlvLength() argument 289 if ((in == NULL) || (inLen < ASN_1_MIN_HEADER_LEN) || (outLen == NULL)) {
in ExtractTlvLength() 310 *outLen = length;
in ExtractTlvLength() 314 static int32_t ExtractTlvData(const uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen)
in ExtractTlvData() argument 316 if ((in == NULL) || (inLen < ASN_1_MIN_HEADER_LEN) || (out == NULL) || (outLen == NULL)) {
in ExtractTlvData() 337 if (memcpy_s(out, *outLen, buf, length) != EOK) {
in ExtractTlvData() 341 *outLen = length;
in ExtractTlvData() 346 uint8_t **out, uint32_t *outLen, uint32_t *size)
in ExtractTlvDataAndHeadSize() 349 int32_t ret = ExtractTlvLength(in, inLen, &headOffset, outLen);
in ExtractTlvDataAndHeadSize() 355 *out = (uint8_t *)HksMalloc(*outLen);
in ExtractTlvDataAndHeadSize() 345 ExtractTlvDataAndHeadSize(const uint8_t *in, uint32_t inLen, uint8_t **out, uint32_t *outLen, uint32_t *size) ExtractTlvDataAndHeadSize() argument [all...] |
/base/hiviewdfx/hiview/core/param_update/include/ |
H A D | log_sign_tools.h | 44 static int CalcFileSha(const std::string& path, unsigned char *hash, size_t outLen);
|
/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/ |
H A D | hks_crypto_hal_rsa_encrypt.cpp | 316 uint32_t outLen = inLen; in RunTestCase() local 318 outLen = HKS_KEY_BYTES(testCaseParams.keySize); in RunTestCase() 327 HksBlob cipherText = { .size = outLen, .data = (uint8_t *)HksMalloc(outLen + HKS_PADDING_SUPPLENMENT) }; in RunTestCase()
|
H A D | hks_crypto_hal_aes_decrypt.cpp | 340 uint32_t outLen = inLen; in RunTestCase() local 342 outLen = (inLen + HKS_PADDING_SUPPLENMENT) / HKS_PADDING_SUPPLENMENT * HKS_PADDING_SUPPLENMENT; in RunTestCase() 349 HksBlob cipherText = { .size = outLen, .data = (uint8_t *)HksMalloc(outLen + HKS_PADDING_SUPPLENMENT) }; in RunTestCase() 471 uint32_t outLen = inLen; in GcmRunTestCase() local 477 HksBlob cipherText = { .size = outLen, .data = (uint8_t *)HksMalloc(outLen + HKS_PADDING_SUPPLENMENT) }; in GcmRunTestCase()
|
/base/telephony/sms_mms/frameworks/native/mms/src/ |
H A D | mms_msg.cpp | 64 std::unique_ptr<char[]> MmsMsg::EncodeMsg(uint32_t &outLen)
in EncodeMsg() argument 81 outLen = encodeBuffer.GetCurPosition();
in EncodeMsg() 82 TELEPHONY_LOGI("NativeEncodeMms length:%{public}d", outLen);
in EncodeMsg() 83 return encodeBuffer.ReadDataBuffer(0, outLen);
in EncodeMsg()
|