Home
last modified time | relevance | path

Searched refs:HcStrlen (Results 1 – 25 of 80) sorted by relevance

1234

/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/
H A Dpake_task_common.c67 Uint8Buff keyInfo = { (uint8_t *)HICHAIN_RETURN_KEY, HcStrlen(HICHAIN_RETURN_KEY) }; in GenerateOutputKey()
120 if (HcStrlen(pinString) < MIN_PIN_LEN || HcStrlen(pinString) > MAX_PIN_LEN) { in FillPskWithPin()
125 int res = InitSingleParam(&(params->baseParams.psk), HcStrlen(pinString)); in FillPskWithPin()
131 pinString, HcStrlen(pinString)) != HC_SUCCESS) { in FillPskWithPin()
147 uint32_t authIdLen = HcStrlen(authId); in FillAuthId()
169 authIdLen = HcStrlen(authId); in FillAuthId()
181 authId, HcStrlen(authId)) != EOK) { in FillAuthId()
211 params->packageName = (char *)HcMalloc(HcStrlen(packageName) + 1, 0); in FillPkgNameAndServiceType()
216 …if (memcpy_s(params->packageName, HcStrlen(packageName) + 1, packageName, HcStrlen(packageName)) !… in FillPkgNameAndServiceType()
226 params->serviceType = (char *)HcMalloc(HcStrlen(serviceType) + 1, 0); in FillPkgNameAndServiceType()
[all …]
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/
H A Diso_task_common.c242 gcmParam.aadLen = (uint32_t)HcStrlen(aad); in CheckEncResult()
333 …(void)memset_s(params->pinCodeString, HcStrlen(params->pinCodeString), 0, HcStrlen(params->pinCode… in DestroyIsoParams()
347 uint32_t authIdLen = HcStrlen(authId); in FillAuthId()
359 authId, HcStrlen(authId)) != EOK) { in FillAuthId()
373 authIdLen = HcStrlen(authId); in FillAuthId()
406 …if (memcpy_s(params->serviceType, HcStrlen(serviceType) + 1, serviceType, HcStrlen(serviceType)) !… in FillPkgNameAndServiceType()
420 …if (memcpy_s(params->packageName, HcStrlen(packageName) + 1, packageName, HcStrlen(packageName)) !… in FillPkgNameAndServiceType()
448 if (HcStrlen(pinString) < MIN_PIN_LEN || HcStrlen(pinString) > MAX_PIN_LEN) { in FillPin()
463 …if (memcpy_s(params->pinCodeString, HcStrlen(pinString) + 1, pinString, HcStrlen(pinString)) != EO… in FillPin()
465 … (void)memset_s(params->pinCodeString, HcStrlen(pinString) + 1, 0, HcStrlen(pinString) + 1); in FillPin()
[all …]
/ohos5.0/base/security/device_auth/test/unittest/deviceauth/source/
H A Dmk_agree_test.cpp91 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH;
106 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH;
114 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH;
127 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH;
150 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH;
173 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH;
186 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH;
202 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH;
218 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH;
234 uint32_t peerDevPkLen = HcStrlen(TEST_DEV_PK) / BYTE_TO_HEX_OPER_LENGTH;
H A Ddeviceauth_interface_test.cpp900 params.pkgName.length = HcStrlen(TEST_APP_ID);
1108 serviceTypeBuff.length = HcStrlen(TEST_GROUP_ID);
1111 authIdBuff.length = HcStrlen(TEST_AUTH_ID);
1117 serviceTypeBuff.length = HcStrlen(TEST_GROUP_ID);
1120 authIdBuff.length = HcStrlen(TEST_AUTH_ID);
1124 pkgNameBuff.length = HcStrlen(TEST_APP_ID);
1130 authIdBuff.length = HcStrlen(TEST_AUTH_ID);
1136 pkgNameBuff.length = HcStrlen(TEST_APP_ID);
1142 authIdBuff.length = HcStrlen(TEST_AUTH_ID);
1343 …(void)memcpy_s(params->packageName, HcStrlen(TEST_APP_ID) + 1, TEST_APP_ID, HcStrlen(TEST_APP_ID));
[all …]
/ohos5.0/base/security/device_auth/services/frameworks/src/module/
H A Ddev_auth_module_manager.c58 if (HcStrlen(pkgName) == 0 || HcStrlen(serviceType) == 0 || authId->length == 0) { in IsParamsForDasTokenManagerValid()
84 .pkgName = { (uint8_t *)moduleParams->pkgName, HcStrlen(moduleParams->pkgName) }, in RegisterLocalIdentity()
85 … .serviceType = { (uint8_t *)moduleParams->serviceType, HcStrlen(moduleParams->serviceType) }, in RegisterLocalIdentity()
112 .pkgName = { (uint8_t *)moduleParams->pkgName, HcStrlen(moduleParams->pkgName) }, in UnregisterLocalIdentity()
113 … .serviceType = { (uint8_t *)moduleParams->serviceType, HcStrlen(moduleParams->serviceType) }, in UnregisterLocalIdentity()
140 .pkgName = { (uint8_t *)moduleParams->pkgName, HcStrlen(moduleParams->pkgName) }, in DeletePeerAuthInfo()
141 … .serviceType = { (uint8_t *)moduleParams->serviceType, HcStrlen(moduleParams->serviceType) }, in DeletePeerAuthInfo()
169 .pkgName = { (uint8_t *)moduleParams->pkgName, HcStrlen(moduleParams->pkgName) }, in GetPublicKey()
170 … .serviceType = { (uint8_t *)moduleParams->serviceType, HcStrlen(moduleParams->serviceType) }, in GetPublicKey()
/ohos5.0/base/security/device_auth/services/identity_manager/src/
H A Dcredential_operator.c156 if (HcStrlen(pkgName) == 0 || HcStrlen(serviceType) == 0 || HcStrlen(authId) == 0) { in GenerateKeyAliasInner()
160 Uint8Buff pkgNameBuff = { (uint8_t *)pkgName, HcStrlen(pkgName) }; in GenerateKeyAliasInner()
161 Uint8Buff serviceTypeBuff = { (uint8_t *)serviceType, HcStrlen(serviceType) }; in GenerateKeyAliasInner()
162 Uint8Buff authIdBuff = { NULL, HcStrlen(authId) }; in GenerateKeyAliasInner()
238 if (publicKeyStr != NULL && HcStrlen(publicKeyStr) > 0) { in DecodeServiceTypeAndPublicKey()
239 if (HcStrlen(publicKeyStr) > PAKE_ED25519_KEY_STR_LEN) { in DecodeServiceTypeAndPublicKey()
320 Uint8Buff authIdBuff = { (uint8_t *)authId, HcStrlen(authId) }; in PackPublicKeyToJson()
326 .serviceType = { (uint8_t *)serviceType, HcStrlen(serviceType) }, in PackPublicKeyToJson()
447 Uint8Buff authIdBuff = { (uint8_t *)param->deviceId, HcStrlen(param->deviceId) }; in RegisterIdentity()
652 Uint8Buff authIdBuff = { (uint8_t *)param->deviceId, HcStrlen(param->deviceId) }; in ImportCredential()
[all …]
H A Didentity_p2p.c199 Uint8Buff selfAuthIdBuff = { (uint8_t *)selfAuthId, HcStrlen(selfAuthId) }; in ComputeAndSaveDirectAuthPsk()
200 Uint8Buff pkgNameBuff = { (uint8_t *)DEFAULT_PACKAGE_NAME, HcStrlen(DEFAULT_PACKAGE_NAME) }; in ComputeAndSaveDirectAuthPsk()
201 Uint8Buff serviceTypeBuff = { (uint8_t *)DEFAULT_SERVICE_TYPE, HcStrlen(DEFAULT_SERVICE_TYPE) }; in ComputeAndSaveDirectAuthPsk()
213 Uint8Buff peerServiceTypeBuff = { (uint8_t *)peerServiceType, HcStrlen(peerServiceType) }; in ComputeAndSaveDirectAuthPsk()
215 Uint8Buff peerAuthIdBuff = { (uint8_t *)peerAuthId, HcStrlen(peerAuthId) }; in ComputeAndSaveDirectAuthPsk()
265 Uint8Buff pkgNameBuff = { (uint8_t *)DEFAULT_PACKAGE_NAME, HcStrlen(DEFAULT_PACKAGE_NAME) }; in GetDirectAuthPskAliasCreateIfNeeded()
266 Uint8Buff serviceTypeBuff = { (uint8_t *)peerServieType, HcStrlen(peerServieType) }; in GetDirectAuthPskAliasCreateIfNeeded()
267 Uint8Buff peerAuthIdBuff = { (uint8_t *)peerAuthId, HcStrlen(peerAuthId) }; in GetDirectAuthPskAliasCreateIfNeeded()
310 Uint8Buff keyInfo = { (uint8_t *)TMP_AUTH_KEY_FACTOR, HcStrlen(TMP_AUTH_KEY_FACTOR) }; in GetSharedSecretByUrl()
H A Didentity_group.c141 Uint8Buff serviceTypeBuff = { (uint8_t *)serviceType, HcStrlen(serviceType) }; in IsP2pAuthTokenExist()
144 Uint8Buff peerAuthIdBuff = { (uint8_t *)peerAuthId, HcStrlen(peerAuthId) }; in IsP2pAuthTokenExist()
457 Uint8Buff serviceTypeBuff = { (uint8_t *)serviceType, (uint32_t)HcStrlen(serviceType) }; in GenerateKeyAliasForIso()
459 Uint8Buff peerAuthIdBuff = { (uint8_t *)peerAuthId, (uint32_t)HcStrlen(peerAuthId) }; in GenerateKeyAliasForIso()
567 uint32_t authIdLen = HcStrlen(selfAuthId); in GetSelfAuthIdAndUserType()
592 Uint8Buff serviceTypeBuff = { (uint8_t *)serviceType, HcStrlen(serviceType) }; in GenerateSelfKeyAlias()
616 Uint8Buff serviceTypeBuff = { (uint8_t *)serviceType, HcStrlen(serviceType) }; in GeneratePeerKeyAlias()
623 Uint8Buff peerAuthIdBuff = { (uint8_t *)peerAuthId, HcStrlen(peerAuthId) }; in GeneratePeerKeyAlias()
742 Uint8Buff serviceTypeBuff = { (uint8_t *)serviceType, HcStrlen(serviceType) }; in GeneratePskAliasAndCheckExist()
744 Uint8Buff peerAuthIdBuff = { (uint8_t *)peerAuthId, HcStrlen(peerAuthId) }; in GeneratePskAliasAndCheckExist()
[all …]
H A Didentity_pin.c239 Uint8Buff messageBuf = { (uint8_t *)pinCode, (uint32_t)HcStrlen(pinCode) }; in AuthGeneratePskUsePin()
260 return HcStrlen(pinCode) >= PIN_CODE_LEN_LONG; in CheckPinLenForStandardIso()
271 if (HcStrlen(pinCode) < PIN_CODE_LEN_SHORT) { in GetSharedSecretForPinInIso()
317 uint32_t pinLen = HcStrlen(pinCode); in GetSharedSecretForPinInPake()
/ohos5.0/base/security/device_auth/frameworks/src/
H A Dipc_sdk.c63 ret = memcmp(appId, cbCache->appId, HcStrlen(cbCache->appId) + 1); in DelIpcCliCallbackCtx()
76 eno = memcpy_s(cbCache->appId, IPC_APPID_LEN, appId, HcStrlen(appId) + 1); in AddIpcCliCallbackCtx()
279 (const uint8_t *)createParams, HcStrlen(createParams) + 1); in EncodeCreateGroupParams()
698 if ((outInfo == NULL) || (HcStrlen(outInfo) == 0)) { in IpcGmGetRegisterInfo()
810 (const uint8_t *)queryParams, HcStrlen(queryParams) + 1); in IpcGmGetPkInfoList()
959 (const uint8_t *)queryParams, HcStrlen(queryParams) + 1); in IpcGmGetGroupInfo()
1509 HcStrlen(authParams) + 1); in EncodeAuthDeviceParams()
1634 HcStrlen(pseudonymId) + 1); in IpcGaGetRealInfo()
1781 callCtx, PARAM_TYPE_AUTH_PARAMS, (const uint8_t *)authParams, HcStrlen(authParams) + 1); in ProcessAuthDevice()
1835 callCtx, PARAM_TYPE_AUTH_PARAMS, (const uint8_t *)authParams, HcStrlen(authParams) + 1); in StartAuthDevice()
[all …]
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/iso_auth_task/
H A Diso_auth_task_common.c82 uint32_t devIdLen = HcStrlen(devIdSelf); in FillPayload()
93 uint32_t selfDeviceIdLen = HcStrlen(selfDeviceId); in FillPayload()
103 …params->isoBaseParams.authIdSelf.length = params->devIdSelf.length + HcStrlen(params->deviceIdSelf… in FillPayload()
125 params->challenge.length = HcStrlen(KEY_INFO_PERSISTENT_TOKEN); in SetChallenge()
132 HcStrlen(KEY_INFO_PERSISTENT_TOKEN)) != EOK) { in SetChallenge()
159 .length = HcStrlen(params->userIdSelf) in GenerateAuthTokenForAccessory()
300 uint32_t devIdPeerHexLen = HcStrlen(devIdPeerHex); in GetPayloadValue()
317 uint32_t deviceIdPeerLen = HcStrlen(deviceIdPeer); in GetPayloadValue()
337 …int32_t res = InitSingleParam(&(params->isoBaseParams.authIdPeer), HcStrlen(payloadHex) / BYTE_TO_… in ExtractPeerAuthId()
362 uint32_t deviceIdPeerLen = HcStrlen(params->deviceIdPeer); in ExtractAndVerifyPayload()
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/
H A Dpake_v1_protocol_task_common.c92 uint32_t len = HcStrlen(extInfoStr); in RemoveEscapeForExtInfo()
133 innerExtInfo->length = HcStrlen(outInnerExtStr) + 1; in GetInnerExtInfo()
142 Uint8Buff packageName = { (uint8_t *)params->packageName, HcStrlen(params->packageName) }; in LoadPseudonymFlagIfNeed()
143 Uint8Buff serviceType = { (uint8_t *)params->serviceType, HcStrlen(params->serviceType) }; in LoadPseudonymFlagIfNeed()
264 Uint8Buff packageName = { (uint8_t *)params->packageName, HcStrlen(params->packageName) }; in GeneratePskAlias()
265 Uint8Buff serviceType = { (uint8_t *)params->serviceType, HcStrlen(params->serviceType) }; in GeneratePskAlias()
313 Uint8Buff keyInfo = { (uint8_t *)TMP_AUTH_KEY_FACTOR, HcStrlen(TMP_AUTH_KEY_FACTOR) }; in FillPskWithDerivedKeyHex()
449 Uint8Buff pkgNameBuff = { (uint8_t *)params->packageName, HcStrlen(params->packageName)}; in GeneratePseudonymPskIfNotExist()
504 .length = HcStrlen(hexStr) in AddPseudonymIdToPayload()
537 .length = HcStrlen(hexStr) in AddPseudonymChallengeToPayload()
[all …]
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/
H A Dpake_v2_auth_task_common.c110 uint32_t sharedKeyAliasLen = HcStrlen(SHARED_KEY_ALIAS) + 1; in GenerateEcdhSharedKey()
146 uint32_t deviceIdPeerLen = HcStrlen((const char *)params->deviceIdPeer.val); in ExtractPakePeerId()
165 uint32_t deviceIdSelfLen = HcStrlen((const char *)params->deviceIdSelf.val); in ExtractPakeSelfId()
195 params->deviceIdSelf.length = HcStrlen(deviceId); in ExtractSelfDeviceId()
220 uint32_t len = HcStrlen(deviceId); in ExtractPeerDeviceId()
249 params->devIdSelf.length = HcStrlen(devIdSelf); in ExtractSelfDevId()
276 uint32_t pkSize = HcStrlen(devicePk) / BYTE_TO_HEX_OPER_LENGTH; in GetPeerPkFromPkInfo()
306 uint32_t len = HcStrlen(devId); in ExtractPeerDevId()
331 uint32_t len = HcStrlen(pkInfoPeerStr) + 1; in GetPkInfoPeer()
419 uint32_t deviceIdLen = HcStrlen(deviceId); in InitPakeAuthParams()
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/
H A Dcommon_standard_bind_exchange.c148 res = InitSingleParam(&(exchangeParams->authInfo), HcStrlen(authInfoStr)); in PackageAuthInfo()
155 authInfoStr, HcStrlen(authInfoStr)) != EOK) { in PackageAuthInfo()
256 .aadLen = HcStrlen(aad), in EncryptAuthAndSignInfo()
290 .aadLen = HcStrlen(aad), in DecryptAuthAndSignInfo()
407 … Uint8Buff packageName = { (uint8_t *)pakeParams->packageName, HcStrlen(pakeParams->packageName) }; in SaveAuthInfo()
408 … Uint8Buff serviceType = { (uint8_t *)pakeParams->serviceType, HcStrlen(pakeParams->serviceType) }; in SaveAuthInfo()
443 … Uint8Buff packageName = { (uint8_t *)pakeParams->packageName, HcStrlen(pakeParams->packageName) }; in ClientRequestStandardBindExchange()
444 … Uint8Buff serviceType = { (uint8_t *)pakeParams->serviceType, HcStrlen(pakeParams->serviceType) }; in ClientRequestStandardBindExchange()
488 … Uint8Buff packageName = { (uint8_t *)pakeParams->packageName, HcStrlen(pakeParams->packageName) }; in GenerateSelfKeyAlias()
489 … Uint8Buff serviceType = { (uint8_t *)pakeParams->serviceType, HcStrlen(pakeParams->serviceType) }; in GenerateSelfKeyAlias()
[all …]
/ohos5.0/base/security/device_auth/services/mk_agree/src/
H A Dkey_manager.c50 … if (memcpy_s(outKeyAlias->val, outKeyAlias->length, keyAliasHex, HcStrlen(keyAliasHex)) != EOK) { in ConvertHashToAlias()
73 uint32_t prefixLen = HcStrlen(prefix); in ConvertHashToAliasWithPrefix()
101 Uint8Buff msgBuff = { (uint8_t *)selfUdid, HcStrlen(selfUdid) }; in GenerateDevKeyAlias()
116 Uint8Buff peerDevIdBuff = { (uint8_t *)peerDeviceId, HcStrlen(peerDeviceId) }; in GenerateMkAlias()
135 Uint8Buff peerDevIdBuff = { (uint8_t *)peerDeviceId, HcStrlen(peerDeviceId) }; in GeneratePseudonymPskAlias()
152 Uint8Buff keyInfo = { (uint8_t *)MK_DERIVE_INFO, HcStrlen(MK_DERIVE_INFO) }; in KeyDerivation()
181 Uint8Buff authIdBuff = { (uint8_t *)selfUdid, HcStrlen(selfUdid) }; in GenerateDeviceKeyPair()
H A Dmk_agree_task.c81 uint32_t payloadLen = HcStrlen(payloadStr); in GeneratePakeRequestPayloadData()
206 uint32_t payloadLen = HcStrlen(payloadStr); in GeneratePakeResponsePayloadData()
295 uint32_t peerDevPkLen = HcStrlen(peerDevPkStr) / BYTE_TO_HEX_OPER_LENGTH; in GenerateMkByPeer()
378 uint32_t payloadLen = HcStrlen(payloadStr) / BYTE_TO_HEX_OPER_LENGTH; in ParsePakeData()
446 uint32_t kcfDataLen = HcStrlen(kcfDataStr) / BYTE_TO_HEX_OPER_LENGTH; in VerifyPeerKcf()
527 uint32_t udidLen = HcStrlen(udid); in GetDuplicateUdid()
/ohos5.0/base/security/device_auth/common_lib/impl/src/
H A Dstring_util.c71 uint32_t realHexLen = HcStrlen(hexStr); in HexStringToByte()
102 uint32_t len = HcStrlen(oriStr); in ToUpperCase()
122 uint32_t len = HcStrlen(str); in DeepCopyString()
H A Djson_utils.c31 uint32_t len = HcStrlen(jsonStr); in GetCjsonMaxDepth()
230 *byteLen = HcStrlen(valueStr) / BYTE_TO_HEX_OPER_LENGTH; in GetByteLenFromJson()
244 if (len < HcStrlen(valueStr) / BYTE_TO_HEX_OPER_LENGTH) { in GetByteFromJson()
557 (void)memset_s(str, HcStrlen(str), 0, HcStrlen(str)); in ClearSensitiveStringInJson()
565 (void)memset_s(jsonStr, HcStrlen(jsonStr), 0, HcStrlen(jsonStr)); in ClearAndFreeJsonString()
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/
H A Ddas_standard_token_manager.c79 …if (memcmp(params->pkgName.val, GROUP_MANAGER_PACKAGE_NAME, HcStrlen(GROUP_MANAGER_PACKAGE_NAME)) … in UnregisterLocalIdentityStd()
228 Uint8Buff packageName = { (uint8_t *)params->packageName, HcStrlen(params->packageName) }; in GenerateSelfKeyAlias()
229 Uint8Buff serviceType = { (uint8_t *)params->serviceType, HcStrlen(params->serviceType) }; in GenerateSelfKeyAlias()
247 Uint8Buff packageName = { (uint8_t *)params->packageName, HcStrlen(params->packageName) }; in GeneratePeerKeyAlias()
248 Uint8Buff serviceType = { (uint8_t *)params->serviceType, HcStrlen(params->serviceType) }; in GeneratePeerKeyAlias()
271 Uint8Buff packageName = { (uint8_t *)params->packageName, HcStrlen(params->packageName) }; in GenerateSharedKeyAlias()
272 Uint8Buff serviceType = { (uint8_t *)params->serviceType, HcStrlen(params->serviceType) }; in GenerateSharedKeyAlias()
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/creds_manager/
H A Dasy_token_manager.c60 info->devicePk.length = HcStrlen(devicePk) / BYTE_TO_HEX_OPER_LENGTH; in GeneratePkInfoFromJson()
70 info->version.length = HcStrlen(version) + 1; in GeneratePkInfoFromJson()
80 info->deviceId.length = HcStrlen(deviceId) + 1; in GeneratePkInfoFromJson()
90 info->userId.length = HcStrlen(userId) + 1; in GeneratePkInfoFromJson()
155 token->pkInfoStr.length = HcStrlen(pkInfoStr) + 1; in GenerateTokenFromJson()
270 int32_t fileSize = (int32_t)(HcStrlen(storeJsonString) + 1); in WriteTokensJsonToFile()
349 uint32_t userIdLen = HcStrlen(userId); in GenerateKeyAlias()
350 uint32_t deviceIdLen = HcStrlen(deviceId); in GenerateKeyAlias()
352 uint32_t serverPkTagLen = HcStrlen(serverPkTag); in GenerateKeyAlias()
416 uint32_t serverPkLen = HcStrlen(serverPkStr) / BYTE_TO_HEX_OPER_LENGTH; in ImportServerPk()
[all …]
/ohos5.0/base/security/device_auth/services/legacy/group_manager/src/channel_manager/
H A Dchannel_manager.c98 if (ProcessTransmitCallback(requestId, (uint8_t *)data, HcStrlen(data) + 1, callback)) { in HcSendMsg()
103 return GetSoftBusInstance()->sendMsg(channelId, (uint8_t *)data, HcStrlen(data) + 1); in HcSendMsg()
/ohos5.0/base/security/device_auth/services/key_agree_sdk/src/
H A Dkey_agree_session.c55 uint32_t authIdLen = HcStrlen(authIdStr) / BYTE_TO_HEX_OPER_LENGTH; in GetIdPeer()
101 uint32_t len = HcStrlen(str); in GetSlice()
127 uint64_t len = HcStrlen(verStr); in StringToVersion()
172 uint32_t tmpStrLen = HcStrlen(tmpStr); in VersionToString()
302 …int32_t res = InitSingleParam(&(baseParams->epkPeer), HcStrlen(epkPeerHex) / BYTE_TO_HEX_OPER_LENG… in GetDasEpkPeerFromJson()
375 uint32_t versionStrLength = HcStrlen(versionStr) + 1; in FillExtraData()
540 uint32_t returnStrLen = HcStrlen(returnStr); in BuildAndPutOutMessage()
813 uint32_t returnStrLen = HcStrlen(returnStr); in ProcessProtocolInitial()
/ohos5.0/base/security/device_auth/frameworks/src/lite/
H A Dipc_adapt.c253 if (memcpy_s(&(node->appId), sizeof(node->appId), appId, HcStrlen(appId) + 1) != EOK) { in AddIpcCallBackByAppId()
812 HcStrlen(returnData) + 1); in GaCbOnFinishWithType()
866 HcStrlen(errorReturn) + 1); in GaCbOnErrorWithType()
1002 …ret = EncodeCallData(dataParcel, PARAM_TYPE_GROUP_INFO, (const uint8_t *)(groupInfo), HcStrlen(gro… in IpcOnGroupCreated()
1049 …ret = EncodeCallData(dataParcel, PARAM_TYPE_GROUP_INFO, (const uint8_t *)(groupInfo), HcStrlen(gro… in IpcOnGroupDeleted()
1096 …ret = EncodeCallData(dataParcel, PARAM_TYPE_UDID, (const uint8_t *)(peerUdid), HcStrlen(peerUdid) … in IpcOnDeviceBound()
1097 …ret |= EncodeCallData(dataParcel, PARAM_TYPE_GROUP_INFO, (const uint8_t *)(groupInfo), HcStrlen(gr… in IpcOnDeviceBound()
1144 …ret = EncodeCallData(dataParcel, PARAM_TYPE_UDID, (const uint8_t *)(peerUdid), HcStrlen(peerUdid) … in IpcOnDeviceUnBound()
1145 …ret |= EncodeCallData(dataParcel, PARAM_TYPE_GROUP_INFO, (const uint8_t *)(groupInfo), HcStrlen(gr… in IpcOnDeviceUnBound()
1192 …ret = EncodeCallData(dataParcel, PARAM_TYPE_UDID, (const uint8_t *)(peerUdid), HcStrlen(peerUdid) … in IpcOnDeviceNotTrusted()
[all …]
/ohos5.0/base/security/device_auth/frameworks/src/standard/
H A Dipc_adapt.cpp253 eno = memcpy_s(&(node->appId), sizeof(node->appId), appId, HcStrlen(appId) + 1); in AddIpcCallBackByAppId()
776 reinterpret_cast<const uint8_t *>(returnData), HcStrlen(returnData) + 1); in GaCbOnFinishWithType()
871 reinterpret_cast<const uint8_t *>(reqParams), HcStrlen(reqParams) + 1); in GaCbOnRequestWithType()
949 reinterpret_cast<const uint8_t *>(groupInfo), HcStrlen(groupInfo) + 1); in IpcOnGroupCreated()
988 reinterpret_cast<const uint8_t *>(groupInfo), HcStrlen(groupInfo) + 1); in IpcOnGroupDeleted()
1027 reinterpret_cast<const uint8_t *>(peerUdid), HcStrlen(peerUdid) + 1); in IpcOnDeviceBound()
1029 reinterpret_cast<const uint8_t *>(groupInfo), HcStrlen(groupInfo) + 1); in IpcOnDeviceBound()
1068 reinterpret_cast<const uint8_t *>(peerUdid), HcStrlen(peerUdid) + 1); in IpcOnDeviceUnBound()
1070 reinterpret_cast<const uint8_t *>(groupInfo), HcStrlen(groupInfo) + 1); in IpcOnDeviceUnBound()
1109 reinterpret_cast<const uint8_t *>(peerUdid), HcStrlen(peerUdid) + 1); in IpcOnDeviceNotTrusted()
[all …]
/ohos5.0/base/security/device_auth/services/legacy/group_auth/src/group_auth_manager/account_related_group_auth/
H A Daccount_related_group_auth.c64 uint32_t keyLen = (HcStrlen(returnSessionKeyStr) / BYTE_TO_HEX_OPER_LENGTH); in ReturnSessionKey()
151 uint32_t userIdInDbLen = HcStrlen(userIdInDb); in IsUserIdEqual()
152 uint32_t peerUserIdLen = HcStrlen(peerUserIdInDb); in IsUserIdEqual()
409 if (HcStrlen(jsonStr) > MAX_SERVICE_PEER_DATA_LENGTH) { in GetValueFromJsonStr()
413 uint32_t keyLen = HcStrlen(key); in GetValueFromJsonStr()
462 Uint8Buff hashMsgBuff = { (uint8_t *)userId, HcStrlen(userId) }; in GetPeerUserIdFromReceivedData()
710 … if (!callback->onTransmit(requestId, (uint8_t *)sendToPeerStr, HcStrlen(sendToPeerStr) + 1)) { in AccountOnFinishToPeer()

1234