Home
last modified time | relevance | path

Searched refs:userIdLen (Results 1 - 8 of 8) sorted by relevance

/base/security/huks/services/huks_standard/huks_service/main/core/src/
H A Dhks_session_manager.c222 /* userIdLen and processNameLen have been checked by calling function */ in ConstructOperationProcessInfo()
223 uint32_t userIdLen = processInfo->userId.size; in ConstructOperationProcessInfo() local
226 uint8_t *userId = (uint8_t *)HksMalloc(userIdLen); in ConstructOperationProcessInfo()
236 (void)memcpy_s(userId, userIdLen, processInfo->userId.data, userIdLen); in ConstructOperationProcessInfo()
239 operation->processInfo.userId.size = userIdLen; in ConstructOperationProcessInfo()
359 uint32_t userIdLen = operation->processInfo.userId.size; in IsSameUserId() local
360 return ((userIdLen == processInfo->userId.size) && in IsSameUserId()
361 (memcmp(operation->processInfo.userId.data, processInfo->userId.data, userIdLen) == 0)); in IsSameUserId()
/base/security/device_auth/services/legacy/authenticators/src/account_related/creds_manager/
H A Dsym_token_manager.c331 uint32_t userIdLen = HcStrlen(userId); in GenerateKeyAlias() local
333 uint32_t aliasLen = authCodeTagLen + userIdLen + deviceIdLen; in GenerateKeyAlias()
343 if (memcpy_s(oriAliasBuff.val, oriAliasBuff.length, userId, userIdLen) != EOK) { in GenerateKeyAlias()
348 if (memcpy_s(oriAliasBuff.val + userIdLen, oriAliasBuff.length - userIdLen, deviceId, deviceIdLen) != EOK) { in GenerateKeyAlias()
353 if (memcpy_s(oriAliasBuff.val + userIdLen + deviceIdLen, in GenerateKeyAlias()
354 oriAliasBuff.length - userIdLen - deviceIdLen, authCodeTag, authCodeTagLen) != EOK) { in GenerateKeyAlias()
H A Dasy_token_manager.c349 uint32_t userIdLen = HcStrlen(userId); in GenerateKeyAlias() local
355 aliasStrLen = userIdLen + deviceIdLen + serverPkTagLen; in GenerateKeyAlias()
357 aliasStrLen = userIdLen + deviceIdLen; in GenerateKeyAlias()
368 if (memcpy_s(aliasBuff.val, aliasBuff.length, userId, userIdLen) != EOK) { in GenerateKeyAlias()
373 if (memcpy_s(aliasBuff.val + userIdLen, aliasBuff.length - userIdLen, in GenerateKeyAlias()
379 if (isServerPkAlias && (memcpy_s(aliasBuff.val + userIdLen + deviceIdLen, in GenerateKeyAlias()
380 aliasBuff.length - userIdLen - deviceIdLen, serverPkTag, serverPkTagLen) != EOK)) { in GenerateKeyAlias()
/base/security/device_auth/test/fuzztest/authenticators/account_related/auth/isoauthtask_fuzzer/
H A Disoauthtask_fuzzer.cpp145 uint32_t userIdLen = HcStrlen(userId) + 1; in IsoAuthTaskTest02() local
146 params->userIdPeer = static_cast<char *>(HcMalloc(userIdLen, 0)); in IsoAuthTaskTest02()
148 (void)memcpy_s(params->userIdPeer, userIdLen, userId, userIdLen); in IsoAuthTaskTest02()
/base/security/device_auth/services/identity_manager/src/
H A Dcert_operation.c129 static int32_t GetSelfUserId(int32_t osAccountId, char *userId, uint32_t userIdLen) in GetSelfUserId() argument
147 if (memcpy_s(userId, userIdLen, StringGet(&(*ptr)->userId), StringLength(&(*ptr)->userId)) != EOK) { in GetSelfUserId()
/base/security/device_auth/test/unittest/deviceauth/source/
H A Diso_auth_task_test.cpp133 uint32_t userIdLen = HcStrlen(userId) + 1; in HWTEST_F() local
134 params->userIdPeer = static_cast<char *>(HcMalloc(userIdLen, 0)); in HWTEST_F()
136 (void)memcpy_s(params->userIdPeer, userIdLen, userId, userIdLen); in HWTEST_F()
/base/startup/appspawn/modules/sandbox/
H A Dappspawn_sandbox.c126 uint32_t userIdLen = sizeof(PARAMETER_USER_ID) - 1; in BuildRootPath() local
136 if (rootLen > (currLen + userIdLen)) { in BuildRootPath()
138 uid, sandbox->rootPath + currLen + userIdLen); in BuildRootPath()
/base/security/device_auth/services/session_manager/src/session/v2/
H A Ddev_session_v2.c668 static int32_t GetSelfUserId(int32_t osAccountId, char *userId, uint32_t userIdLen) in GetSelfUserId() argument
686 if (memcpy_s(userId, userIdLen, StringGet(&(*ptr)->userId), StringLength(&(*ptr)->userId)) != EOK) { in GetSelfUserId()

Completed in 14 milliseconds