/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_task_common.c | 67 Uint8Buff keyInfo = { (uint8_t *)HICHAIN_RETURN_KEY, HcStrlen(HICHAIN_RETURN_KEY) }; in GenerateOutputKey() 120 if (HcStrlen(pinString) < MIN_PIN_LEN || HcStrlen(pinString) > MAX_PIN_LEN) { in FillPskWithPin() 125 int res = InitSingleParam(&(params->baseParams.psk), HcStrlen(pinString)); in FillPskWithPin() 131 pinString, HcStrlen(pinString)) != HC_SUCCESS) { in FillPskWithPin() 147 uint32_t authIdLen = HcStrlen(authId); in FillAuthId() 169 authIdLen = HcStrlen(authId); in FillAuthId() 181 authId, HcStrlen(authId)) != EOK) { in FillAuthId() 211 params->packageName = (char *)HcMalloc(HcStrlen(packageName) + 1, 0); in FillPkgNameAndServiceType() 216 …if (memcpy_s(params->packageName, HcStrlen(packageName) + 1, packageName, HcStrlen(packageName)) !… in FillPkgNameAndServiceType() 226 params->serviceType = (char *)HcMalloc(HcStrlen(serviceType) + 1, 0); in FillPkgNameAndServiceType() [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/ |
H A D | iso_task_common.c | 242 gcmParam.aadLen = (uint32_t)HcStrlen(aad); in CheckEncResult() 333 …(void)memset_s(params->pinCodeString, HcStrlen(params->pinCodeString), 0, HcStrlen(params->pinCode… in DestroyIsoParams() 347 uint32_t authIdLen = HcStrlen(authId); in FillAuthId() 359 authId, HcStrlen(authId)) != EOK) { in FillAuthId() 373 authIdLen = HcStrlen(authId); in FillAuthId() 406 …if (memcpy_s(params->serviceType, HcStrlen(serviceType) + 1, serviceType, HcStrlen(serviceType)) !… in FillPkgNameAndServiceType() 420 …if (memcpy_s(params->packageName, HcStrlen(packageName) + 1, packageName, HcStrlen(packageName)) !… in FillPkgNameAndServiceType() 448 if (HcStrlen(pinString) < MIN_PIN_LEN || HcStrlen(pinString) > MAX_PIN_LEN) { in FillPin() 463 …if (memcpy_s(params->pinCodeString, HcStrlen(pinString) + 1, pinString, HcStrlen(pinString)) != EO… in FillPin() 465 … (void)memset_s(params->pinCodeString, HcStrlen(pinString) + 1, 0, HcStrlen(pinString) + 1); in FillPin() [all …]
|
/ohos5.0/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | mk_agree_test.cpp | 91 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH; 106 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH; 114 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH; 127 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH; 150 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH; 173 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH; 186 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH; 202 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH; 218 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH; 234 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH;
|
H A D | deviceauth_interface_test.cpp | 900 params.pkgName.length = HcStrlen(TEST_APP_ID); 1108 serviceTypeBuff.length = HcStrlen(TEST_GROUP_ID); 1111 authIdBuff.length = HcStrlen(TEST_AUTH_ID); 1117 serviceTypeBuff.length = HcStrlen(TEST_GROUP_ID); 1120 authIdBuff.length = HcStrlen(TEST_AUTH_ID); 1124 pkgNameBuff.length = HcStrlen(TEST_APP_ID); 1130 authIdBuff.length = HcStrlen(TEST_AUTH_ID); 1136 pkgNameBuff.length = HcStrlen(TEST_APP_ID); 1142 authIdBuff.length = HcStrlen(TEST_AUTH_ID); 1343 …(void)memcpy_s(params->packageName, HcStrlen(TEST_APP_ID) + 1, TEST_APP_ID, HcStrlen(TEST_APP_ID)); [all …]
|
/ohos5.0/base/security/device_auth/services/frameworks/src/module/ |
H A D | dev_auth_module_manager.c | 58 if (HcStrlen(pkgName) == 0 || HcStrlen(serviceType) == 0 || authId->length == 0) { in IsParamsForDasTokenManagerValid() 84 .pkgName = { (uint8_t *)moduleParams->pkgName, HcStrlen(moduleParams->pkgName) }, in RegisterLocalIdentity() 85 … .serviceType = { (uint8_t *)moduleParams->serviceType, HcStrlen(moduleParams->serviceType) }, in RegisterLocalIdentity() 112 .pkgName = { (uint8_t *)moduleParams->pkgName, HcStrlen(moduleParams->pkgName) }, in UnregisterLocalIdentity() 113 … .serviceType = { (uint8_t *)moduleParams->serviceType, HcStrlen(moduleParams->serviceType) }, in UnregisterLocalIdentity() 140 .pkgName = { (uint8_t *)moduleParams->pkgName, HcStrlen(moduleParams->pkgName) }, in DeletePeerAuthInfo() 141 … .serviceType = { (uint8_t *)moduleParams->serviceType, HcStrlen(moduleParams->serviceType) }, in DeletePeerAuthInfo() 169 .pkgName = { (uint8_t *)moduleParams->pkgName, HcStrlen(moduleParams->pkgName) }, in GetPublicKey() 170 … .serviceType = { (uint8_t *)moduleParams->serviceType, HcStrlen(moduleParams->serviceType) }, in GetPublicKey()
|
/ohos5.0/base/security/device_auth/services/identity_manager/src/ |
H A D | credential_operator.c | 156 if (HcStrlen(pkgName) == 0 || HcStrlen(serviceType) == 0 || HcStrlen(authId) == 0) { in GenerateKeyAliasInner() 160 Uint8Buff pkgNameBuff = { (uint8_t *)pkgName, HcStrlen(pkgName) }; in GenerateKeyAliasInner() 161 Uint8Buff serviceTypeBuff = { (uint8_t *)serviceType, HcStrlen(serviceType) }; in GenerateKeyAliasInner() 162 Uint8Buff authIdBuff = { NULL, HcStrlen(authId) }; in GenerateKeyAliasInner() 238 if (publicKeyStr != NULL && HcStrlen(publicKeyStr) > 0) { in DecodeServiceTypeAndPublicKey() 239 if (HcStrlen(publicKeyStr) > PAKE_ED25519_KEY_STR_LEN) { in DecodeServiceTypeAndPublicKey() 320 Uint8Buff authIdBuff = { (uint8_t *)authId, HcStrlen(authId) }; in PackPublicKeyToJson() 326 .serviceType = { (uint8_t *)serviceType, HcStrlen(serviceType) }, in PackPublicKeyToJson() 447 Uint8Buff authIdBuff = { (uint8_t *)param->deviceId, HcStrlen(param->deviceId) }; in RegisterIdentity() 652 Uint8Buff authIdBuff = { (uint8_t *)param->deviceId, HcStrlen(param->deviceId) }; in ImportCredential() [all …]
|
H A D | identity_p2p.c | 199 Uint8Buff selfAuthIdBuff = { (uint8_t *)selfAuthId, HcStrlen(selfAuthId) }; in ComputeAndSaveDirectAuthPsk() 200 Uint8Buff pkgNameBuff = { (uint8_t *)DEFAULT_PACKAGE_NAME, HcStrlen(DEFAULT_PACKAGE_NAME) }; in ComputeAndSaveDirectAuthPsk() 201 Uint8Buff serviceTypeBuff = { (uint8_t *)DEFAULT_SERVICE_TYPE, HcStrlen(DEFAULT_SERVICE_TYPE) }; in ComputeAndSaveDirectAuthPsk() 213 Uint8Buff peerServiceTypeBuff = { (uint8_t *)peerServiceType, HcStrlen(peerServiceType) }; in ComputeAndSaveDirectAuthPsk() 215 Uint8Buff peerAuthIdBuff = { (uint8_t *)peerAuthId, HcStrlen(peerAuthId) }; in ComputeAndSaveDirectAuthPsk() 265 Uint8Buff pkgNameBuff = { (uint8_t *)DEFAULT_PACKAGE_NAME, HcStrlen(DEFAULT_PACKAGE_NAME) }; in GetDirectAuthPskAliasCreateIfNeeded() 266 Uint8Buff serviceTypeBuff = { (uint8_t *)peerServieType, HcStrlen(peerServieType) }; in GetDirectAuthPskAliasCreateIfNeeded() 267 Uint8Buff peerAuthIdBuff = { (uint8_t *)peerAuthId, HcStrlen(peerAuthId) }; in GetDirectAuthPskAliasCreateIfNeeded() 310 Uint8Buff keyInfo = { (uint8_t *)TMP_AUTH_KEY_FACTOR, HcStrlen(TMP_AUTH_KEY_FACTOR) }; in GetSharedSecretByUrl()
|
H A D | identity_group.c | 141 Uint8Buff serviceTypeBuff = { (uint8_t *)serviceType, HcStrlen(serviceType) }; in IsP2pAuthTokenExist() 144 Uint8Buff peerAuthIdBuff = { (uint8_t *)peerAuthId, HcStrlen(peerAuthId) }; in IsP2pAuthTokenExist() 457 Uint8Buff serviceTypeBuff = { (uint8_t *)serviceType, (uint32_t)HcStrlen(serviceType) }; in GenerateKeyAliasForIso() 459 Uint8Buff peerAuthIdBuff = { (uint8_t *)peerAuthId, (uint32_t)HcStrlen(peerAuthId) }; in GenerateKeyAliasForIso() 567 uint32_t authIdLen = HcStrlen(selfAuthId); in GetSelfAuthIdAndUserType() 592 Uint8Buff serviceTypeBuff = { (uint8_t *)serviceType, HcStrlen(serviceType) }; in GenerateSelfKeyAlias() 616 Uint8Buff serviceTypeBuff = { (uint8_t *)serviceType, HcStrlen(serviceType) }; in GeneratePeerKeyAlias() 623 Uint8Buff peerAuthIdBuff = { (uint8_t *)peerAuthId, HcStrlen(peerAuthId) }; in GeneratePeerKeyAlias() 742 Uint8Buff serviceTypeBuff = { (uint8_t *)serviceType, HcStrlen(serviceType) }; in GeneratePskAliasAndCheckExist() 744 Uint8Buff peerAuthIdBuff = { (uint8_t *)peerAuthId, HcStrlen(peerAuthId) }; in GeneratePskAliasAndCheckExist() [all …]
|
H A D | identity_pin.c | 239 Uint8Buff messageBuf = { (uint8_t *)pinCode, (uint32_t)HcStrlen(pinCode) }; in AuthGeneratePskUsePin() 260 return HcStrlen(pinCode) >= PIN_CODE_LEN_LONG; in CheckPinLenForStandardIso() 271 if (HcStrlen(pinCode) < PIN_CODE_LEN_SHORT) { in GetSharedSecretForPinInIso() 317 uint32_t pinLen = HcStrlen(pinCode); in GetSharedSecretForPinInPake()
|
/ohos5.0/base/security/device_auth/frameworks/src/ |
H A D | ipc_sdk.c | 63 ret = memcmp(appId, cbCache->appId, HcStrlen(cbCache->appId) + 1); in DelIpcCliCallbackCtx() 76 eno = memcpy_s(cbCache->appId, IPC_APPID_LEN, appId, HcStrlen(appId) + 1); in AddIpcCliCallbackCtx() 279 (const uint8_t *)createParams, HcStrlen(createParams) + 1); in EncodeCreateGroupParams() 698 if ((outInfo == NULL) || (HcStrlen(outInfo) == 0)) { in IpcGmGetRegisterInfo() 810 (const uint8_t *)queryParams, HcStrlen(queryParams) + 1); in IpcGmGetPkInfoList() 959 (const uint8_t *)queryParams, HcStrlen(queryParams) + 1); in IpcGmGetGroupInfo() 1509 HcStrlen(authParams) + 1); in EncodeAuthDeviceParams() 1634 HcStrlen(pseudonymId) + 1); in IpcGaGetRealInfo() 1781 callCtx, PARAM_TYPE_AUTH_PARAMS, (const uint8_t *)authParams, HcStrlen(authParams) + 1); in ProcessAuthDevice() 1835 callCtx, PARAM_TYPE_AUTH_PARAMS, (const uint8_t *)authParams, HcStrlen(authParams) + 1); in StartAuthDevice() [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/iso_auth_task/ |
H A D | iso_auth_task_common.c | 82 uint32_t devIdLen = HcStrlen(devIdSelf); in FillPayload() 93 uint32_t selfDeviceIdLen = HcStrlen(selfDeviceId); in FillPayload() 103 …params->isoBaseParams.authIdSelf.length = params->devIdSelf.length + HcStrlen(params->deviceIdSelf… in FillPayload() 125 params->challenge.length = HcStrlen(KEY_INFO_PERSISTENT_TOKEN); in SetChallenge() 132 HcStrlen(KEY_INFO_PERSISTENT_TOKEN)) != EOK) { in SetChallenge() 159 .length = HcStrlen(params->userIdSelf) in GenerateAuthTokenForAccessory() 300 uint32_t devIdPeerHexLen = HcStrlen(devIdPeerHex); in GetPayloadValue() 317 uint32_t deviceIdPeerLen = HcStrlen(deviceIdPeer); in GetPayloadValue() 337 …int32_t res = InitSingleParam(&(params->isoBaseParams.authIdPeer), HcStrlen(payloadHex) / BYTE_TO_… in ExtractPeerAuthId() 362 uint32_t deviceIdPeerLen = HcStrlen(params->deviceIdPeer); in ExtractAndVerifyPayload()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_protocol_task_common.c | 92 uint32_t len = HcStrlen(extInfoStr); in RemoveEscapeForExtInfo() 133 innerExtInfo->length = HcStrlen(outInnerExtStr) + 1; in GetInnerExtInfo() 142 Uint8Buff packageName = { (uint8_t *)params->packageName, HcStrlen(params->packageName) }; in LoadPseudonymFlagIfNeed() 143 Uint8Buff serviceType = { (uint8_t *)params->serviceType, HcStrlen(params->serviceType) }; in LoadPseudonymFlagIfNeed() 264 Uint8Buff packageName = { (uint8_t *)params->packageName, HcStrlen(params->packageName) }; in GeneratePskAlias() 265 Uint8Buff serviceType = { (uint8_t *)params->serviceType, HcStrlen(params->serviceType) }; in GeneratePskAlias() 313 Uint8Buff keyInfo = { (uint8_t *)TMP_AUTH_KEY_FACTOR, HcStrlen(TMP_AUTH_KEY_FACTOR) }; in FillPskWithDerivedKeyHex() 449 Uint8Buff pkgNameBuff = { (uint8_t *)params->packageName, HcStrlen(params->packageName)}; in GeneratePseudonymPskIfNotExist() 504 .length = HcStrlen(hexStr) in AddPseudonymIdToPayload() 537 .length = HcStrlen(hexStr) in AddPseudonymChallengeToPayload() [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_task_common.c | 110 uint32_t sharedKeyAliasLen = HcStrlen(SHARED_KEY_ALIAS) + 1; in GenerateEcdhSharedKey() 146 uint32_t deviceIdPeerLen = HcStrlen((const char *)params->deviceIdPeer.val); in ExtractPakePeerId() 165 uint32_t deviceIdSelfLen = HcStrlen((const char *)params->deviceIdSelf.val); in ExtractPakeSelfId() 195 params->deviceIdSelf.length = HcStrlen(deviceId); in ExtractSelfDeviceId() 220 uint32_t len = HcStrlen(deviceId); in ExtractPeerDeviceId() 249 params->devIdSelf.length = HcStrlen(devIdSelf); in ExtractSelfDevId() 276 uint32_t pkSize = HcStrlen(devicePk) / BYTE_TO_HEX_OPER_LENGTH; in GetPeerPkFromPkInfo() 306 uint32_t len = HcStrlen(devId); in ExtractPeerDevId() 331 uint32_t len = HcStrlen(pkInfoPeerStr) + 1; in GetPkInfoPeer() 419 uint32_t deviceIdLen = HcStrlen(deviceId); in InitPakeAuthParams()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/ |
H A D | common_standard_bind_exchange.c | 148 res = InitSingleParam(&(exchangeParams->authInfo), HcStrlen(authInfoStr)); in PackageAuthInfo() 155 authInfoStr, HcStrlen(authInfoStr)) != EOK) { in PackageAuthInfo() 256 .aadLen = HcStrlen(aad), in EncryptAuthAndSignInfo() 290 .aadLen = HcStrlen(aad), in DecryptAuthAndSignInfo() 407 … Uint8Buff packageName = { (uint8_t *)pakeParams->packageName, HcStrlen(pakeParams->packageName) }; in SaveAuthInfo() 408 … Uint8Buff serviceType = { (uint8_t *)pakeParams->serviceType, HcStrlen(pakeParams->serviceType) }; in SaveAuthInfo() 443 … Uint8Buff packageName = { (uint8_t *)pakeParams->packageName, HcStrlen(pakeParams->packageName) }; in ClientRequestStandardBindExchange() 444 … Uint8Buff serviceType = { (uint8_t *)pakeParams->serviceType, HcStrlen(pakeParams->serviceType) }; in ClientRequestStandardBindExchange() 488 … Uint8Buff packageName = { (uint8_t *)pakeParams->packageName, HcStrlen(pakeParams->packageName) }; in GenerateSelfKeyAlias() 489 … Uint8Buff serviceType = { (uint8_t *)pakeParams->serviceType, HcStrlen(pakeParams->serviceType) }; in GenerateSelfKeyAlias() [all …]
|
/ohos5.0/base/security/device_auth/services/mk_agree/src/ |
H A D | key_manager.c | 50 … if (memcpy_s(outKeyAlias->val, outKeyAlias->length, keyAliasHex, HcStrlen(keyAliasHex)) != EOK) { in ConvertHashToAlias() 73 uint32_t prefixLen = HcStrlen(prefix); in ConvertHashToAliasWithPrefix() 101 Uint8Buff msgBuff = { (uint8_t *)selfUdid, HcStrlen(selfUdid) }; in GenerateDevKeyAlias() 116 Uint8Buff peerDevIdBuff = { (uint8_t *)peerDeviceId, HcStrlen(peerDeviceId) }; in GenerateMkAlias() 135 Uint8Buff peerDevIdBuff = { (uint8_t *)peerDeviceId, HcStrlen(peerDeviceId) }; in GeneratePseudonymPskAlias() 152 Uint8Buff keyInfo = { (uint8_t *)MK_DERIVE_INFO, HcStrlen(MK_DERIVE_INFO) }; in KeyDerivation() 181 Uint8Buff authIdBuff = { (uint8_t *)selfUdid, HcStrlen(selfUdid) }; in GenerateDeviceKeyPair()
|
H A D | mk_agree_task.c | 81 uint32_t payloadLen = HcStrlen(payloadStr); in GeneratePakeRequestPayloadData() 206 uint32_t payloadLen = HcStrlen(payloadStr); in GeneratePakeResponsePayloadData() 295 uint32_t peerDevPkLen = HcStrlen(peerDevPkStr) / BYTE_TO_HEX_OPER_LENGTH; in GenerateMkByPeer() 378 uint32_t payloadLen = HcStrlen(payloadStr) / BYTE_TO_HEX_OPER_LENGTH; in ParsePakeData() 446 uint32_t kcfDataLen = HcStrlen(kcfDataStr) / BYTE_TO_HEX_OPER_LENGTH; in VerifyPeerKcf() 527 uint32_t udidLen = HcStrlen(udid); in GetDuplicateUdid()
|
/ohos5.0/base/security/device_auth/common_lib/impl/src/ |
H A D | string_util.c | 71 uint32_t realHexLen = HcStrlen(hexStr); in HexStringToByte() 102 uint32_t len = HcStrlen(oriStr); in ToUpperCase() 122 uint32_t len = HcStrlen(str); in DeepCopyString()
|
H A D | json_utils.c | 31 uint32_t len = HcStrlen(jsonStr); in GetCjsonMaxDepth() 230 *byteLen = HcStrlen(valueStr) / BYTE_TO_HEX_OPER_LENGTH; in GetByteLenFromJson() 244 if (len < HcStrlen(valueStr) / BYTE_TO_HEX_OPER_LENGTH) { in GetByteFromJson() 557 (void)memset_s(str, HcStrlen(str), 0, HcStrlen(str)); in ClearSensitiveStringInJson() 565 (void)memset_s(jsonStr, HcStrlen(jsonStr), 0, HcStrlen(jsonStr)); in ClearAndFreeJsonString()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/ |
H A D | das_standard_token_manager.c | 79 …if (memcmp(params->pkgName.val, GROUP_MANAGER_PACKAGE_NAME, HcStrlen(GROUP_MANAGER_PACKAGE_NAME)) … in UnregisterLocalIdentityStd() 228 Uint8Buff packageName = { (uint8_t *)params->packageName, HcStrlen(params->packageName) }; in GenerateSelfKeyAlias() 229 Uint8Buff serviceType = { (uint8_t *)params->serviceType, HcStrlen(params->serviceType) }; in GenerateSelfKeyAlias() 247 Uint8Buff packageName = { (uint8_t *)params->packageName, HcStrlen(params->packageName) }; in GeneratePeerKeyAlias() 248 Uint8Buff serviceType = { (uint8_t *)params->serviceType, HcStrlen(params->serviceType) }; in GeneratePeerKeyAlias() 271 Uint8Buff packageName = { (uint8_t *)params->packageName, HcStrlen(params->packageName) }; in GenerateSharedKeyAlias() 272 Uint8Buff serviceType = { (uint8_t *)params->serviceType, HcStrlen(params->serviceType) }; in GenerateSharedKeyAlias()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/creds_manager/ |
H A D | asy_token_manager.c | 60 info->devicePk.length = HcStrlen(devicePk) / BYTE_TO_HEX_OPER_LENGTH; in GeneratePkInfoFromJson() 70 info->version.length = HcStrlen(version) + 1; in GeneratePkInfoFromJson() 80 info->deviceId.length = HcStrlen(deviceId) + 1; in GeneratePkInfoFromJson() 90 info->userId.length = HcStrlen(userId) + 1; in GeneratePkInfoFromJson() 155 token->pkInfoStr.length = HcStrlen(pkInfoStr) + 1; in GenerateTokenFromJson() 270 int32_t fileSize = (int32_t)(HcStrlen(storeJsonString) + 1); in WriteTokensJsonToFile() 349 uint32_t userIdLen = HcStrlen(userId); in GenerateKeyAlias() 350 uint32_t deviceIdLen = HcStrlen(deviceId); in GenerateKeyAlias() 352 uint32_t serverPkTagLen = HcStrlen(serverPkTag); in GenerateKeyAlias() 416 uint32_t serverPkLen = HcStrlen(serverPkStr) / BYTE_TO_HEX_OPER_LENGTH; in ImportServerPk() [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/group_manager/src/channel_manager/ |
H A D | channel_manager.c | 98 if (ProcessTransmitCallback(requestId, (uint8_t *)data, HcStrlen(data) + 1, callback)) { in HcSendMsg() 103 return GetSoftBusInstance()->sendMsg(channelId, (uint8_t *)data, HcStrlen(data) + 1); in HcSendMsg()
|
/ohos5.0/base/security/device_auth/services/key_agree_sdk/src/ |
H A D | key_agree_session.c | 55 uint32_t authIdLen = HcStrlen(authIdStr) / BYTE_TO_HEX_OPER_LENGTH; in GetIdPeer() 101 uint32_t len = HcStrlen(str); in GetSlice() 127 uint64_t len = HcStrlen(verStr); in StringToVersion() 172 uint32_t tmpStrLen = HcStrlen(tmpStr); in VersionToString() 302 …int32_t res = InitSingleParam(&(baseParams->epkPeer), HcStrlen(epkPeerHex) / BYTE_TO_HEX_OPER_LENG… in GetDasEpkPeerFromJson() 375 uint32_t versionStrLength = HcStrlen(versionStr) + 1; in FillExtraData() 540 uint32_t returnStrLen = HcStrlen(returnStr); in BuildAndPutOutMessage() 813 uint32_t returnStrLen = HcStrlen(returnStr); in ProcessProtocolInitial()
|
/ohos5.0/base/security/device_auth/frameworks/src/lite/ |
H A D | ipc_adapt.c | 253 if (memcpy_s(&(node->appId), sizeof(node->appId), appId, HcStrlen(appId) + 1) != EOK) { in AddIpcCallBackByAppId() 812 HcStrlen(returnData) + 1); in GaCbOnFinishWithType() 866 HcStrlen(errorReturn) + 1); in GaCbOnErrorWithType() 1002 …ret = EncodeCallData(dataParcel, PARAM_TYPE_GROUP_INFO, (const uint8_t *)(groupInfo), HcStrlen(gro… in IpcOnGroupCreated() 1049 …ret = EncodeCallData(dataParcel, PARAM_TYPE_GROUP_INFO, (const uint8_t *)(groupInfo), HcStrlen(gro… in IpcOnGroupDeleted() 1096 …ret = EncodeCallData(dataParcel, PARAM_TYPE_UDID, (const uint8_t *)(peerUdid), HcStrlen(peerUdid) … in IpcOnDeviceBound() 1097 …ret |= EncodeCallData(dataParcel, PARAM_TYPE_GROUP_INFO, (const uint8_t *)(groupInfo), HcStrlen(gr… in IpcOnDeviceBound() 1144 …ret = EncodeCallData(dataParcel, PARAM_TYPE_UDID, (const uint8_t *)(peerUdid), HcStrlen(peerUdid) … in IpcOnDeviceUnBound() 1145 …ret |= EncodeCallData(dataParcel, PARAM_TYPE_GROUP_INFO, (const uint8_t *)(groupInfo), HcStrlen(gr… in IpcOnDeviceUnBound() 1192 …ret = EncodeCallData(dataParcel, PARAM_TYPE_UDID, (const uint8_t *)(peerUdid), HcStrlen(peerUdid) … in IpcOnDeviceNotTrusted() [all …]
|
/ohos5.0/base/security/device_auth/frameworks/src/standard/ |
H A D | ipc_adapt.cpp | 253 eno = memcpy_s(&(node->appId), sizeof(node->appId), appId, HcStrlen(appId) + 1); in AddIpcCallBackByAppId() 776 reinterpret_cast<const uint8_t *>(returnData), HcStrlen(returnData) + 1); in GaCbOnFinishWithType() 871 reinterpret_cast<const uint8_t *>(reqParams), HcStrlen(reqParams) + 1); in GaCbOnRequestWithType() 949 reinterpret_cast<const uint8_t *>(groupInfo), HcStrlen(groupInfo) + 1); in IpcOnGroupCreated() 988 reinterpret_cast<const uint8_t *>(groupInfo), HcStrlen(groupInfo) + 1); in IpcOnGroupDeleted() 1027 reinterpret_cast<const uint8_t *>(peerUdid), HcStrlen(peerUdid) + 1); in IpcOnDeviceBound() 1029 reinterpret_cast<const uint8_t *>(groupInfo), HcStrlen(groupInfo) + 1); in IpcOnDeviceBound() 1068 reinterpret_cast<const uint8_t *>(peerUdid), HcStrlen(peerUdid) + 1); in IpcOnDeviceUnBound() 1070 reinterpret_cast<const uint8_t *>(groupInfo), HcStrlen(groupInfo) + 1); in IpcOnDeviceUnBound() 1109 reinterpret_cast<const uint8_t *>(peerUdid), HcStrlen(peerUdid) + 1); in IpcOnDeviceNotTrusted() [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/group_auth/src/group_auth_manager/account_related_group_auth/ |
H A D | account_related_group_auth.c | 64 uint32_t keyLen = (HcStrlen(returnSessionKeyStr) / BYTE_TO_HEX_OPER_LENGTH); in ReturnSessionKey() 151 uint32_t userIdInDbLen = HcStrlen(userIdInDb); in IsUserIdEqual() 152 uint32_t peerUserIdLen = HcStrlen(peerUserIdInDb); in IsUserIdEqual() 409 if (HcStrlen(jsonStr) > MAX_SERVICE_PEER_DATA_LENGTH) { in GetValueFromJsonStr() 413 uint32_t keyLen = HcStrlen(key); in GetValueFromJsonStr() 462 Uint8Buff hashMsgBuff = { (uint8_t *)userId, HcStrlen(userId) }; in GetPeerUserIdFromReceivedData() 710 … if (!callback->onTransmit(requestId, (uint8_t *)sendToPeerStr, HcStrlen(sendToPeerStr) + 1)) { in AccountOnFinishToPeer()
|