/ohos5.0/base/security/device_auth/services/protocol/src/iso_protocol/ |
H A D | iso_protocol_common.c | 103 int usedLen = 0; in IsoCalSelfToken() local 109 usedLen += params->randPeer.length; in IsoCalSelfToken() 110 …if (memcpy_s(messagePeer + usedLen, length - usedLen, params->randSelf.val, params->randSelf.lengt… in IsoCalSelfToken() 115 usedLen += params->randSelf.length; in IsoCalSelfToken() 116 …if (memcpy_s(messagePeer + usedLen, length - usedLen, params->authIdSelf.val, params->authIdSelf.l… in IsoCalSelfToken() 121 usedLen += params->authIdSelf.length; in IsoCalSelfToken() 150 int usedLen = 0; in IsoCalPeerToken() local 156 usedLen += params->randSelf.length; in IsoCalPeerToken() 157 …if (memcpy_s(messageSelf + usedLen, length - usedLen, params->randPeer.val, params->randPeer.lengt… in IsoCalPeerToken() 162 usedLen += params->randPeer.length; in IsoCalPeerToken() [all …]
|
/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
H A D | pake_v2_protocol_common.c | 342 uint32_t usedLen = 0; in ComputeSharedSecret() local 348 usedLen += sid->length; in ComputeSharedSecret() 349 if (memcpy_s(sharedSecretMsg.val + usedLen, sharedSecretMsg.length - usedLen, in ComputeSharedSecret() 356 if (memcpy_s(sharedSecretMsg.val + usedLen, sharedSecretMsg.length - usedLen, in ComputeSharedSecret() 434 if (memcpy_s(proofMsg->val + *usedLen, proofMsg->length - *usedLen, in CombineEpk() 439 *usedLen += epkLenX; in CombineEpk() 440 if (memcpy_s(proofMsg->val + *usedLen, proofMsg->length - *usedLen, in CombineEpk() 445 *usedLen += epkLenX; in CombineEpk() 452 uint32_t usedLen = 0; in CombineProofMsg() local 464 usedLen += KCF_CODE_LEN; in CombineProofMsg() [all …]
|
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
H A D | iso_protocol.c | 78 int32_t usedLen = 0; in BuildSelfTokenMessage() local 83 usedLen += params->randSelf.length; in BuildSelfTokenMessage() 88 usedLen += params->randPeer.length; in BuildSelfTokenMessage() 93 usedLen += params->authIdPeer.length; in BuildSelfTokenMessage() 100 …if (memcpy_s(message + usedLen, messageLen - usedLen, msg->selfMsg.val, msg->selfMsg.length) != EO… in BuildSelfTokenMessage() 104 usedLen += msg->selfMsg.length; in BuildSelfTokenMessage() 107 …if (memcpy_s(message + usedLen, messageLen - usedLen, msg->peerMsg.val, msg->peerMsg.length) != EO… in BuildSelfTokenMessage() 118 int32_t usedLen = 0; in BuildPeerTokenMessage() local 123 usedLen += params->randPeer.length; in BuildPeerTokenMessage() 128 usedLen += params->randSelf.length; in BuildPeerTokenMessage() [all …]
|
H A D | dl_speke_protocol.c | 457 uint32_t usedLen = 0; in CombineSharedSecretMsg() local 462 usedLen += sid->length; in CombineSharedSecretMsg() 464 if (memcpy_s(sharedSecretMsg->val + usedLen, sharedSecretMsg->length - usedLen, in CombineSharedSecretMsg() 469 usedLen += params->innerKeyLen; in CombineSharedSecretMsg() 470 if (memcpy_s(sharedSecretMsg->val + usedLen, sharedSecretMsg->length - usedLen, in CombineSharedSecretMsg() 535 if (memcpy_s(kcfDataMsg->val + usedLen, kcfDataMsg->length - usedLen, in CombineProtectedMsg() 543 if (memcpy_s(kcfDataMsg->val + usedLen, kcfDataMsg->length - usedLen, in CombineProtectedMsg() 563 if (memcpy_s(kcfDataMsg->val + usedLen, kcfDataMsg->length - usedLen, in GenerateKcfDataMsg() 569 if (memcpy_s(kcfDataMsg->val + usedLen, kcfDataMsg->length - usedLen, in GenerateKcfDataMsg() 575 if (memcpy_s(kcfDataMsg->val + usedLen, kcfDataMsg->length - usedLen, in GenerateKcfDataMsg() [all …]
|
H A D | ec_speke_protocol.c | 420 uint32_t usedLen = 0; in CombineSharedSecretMsg() local 425 usedLen += sid->length; in CombineSharedSecretMsg() 427 if (memcpy_s(sharedSecretMsg->val + usedLen, sharedSecretMsg->length - usedLen, in CombineSharedSecretMsg() 432 usedLen += EC_SPEKE_EC_KEY_LEN; in CombineSharedSecretMsg() 433 if (memcpy_s(sharedSecretMsg->val + usedLen, sharedSecretMsg->length - usedLen, in CombineSharedSecretMsg() 512 if (memcpy_s(kcfDataMsg->val + usedLen, kcfDataMsg->length - usedLen, in CombineProtectedMsg() 520 if (memcpy_s(kcfDataMsg->val + usedLen, kcfDataMsg->length - usedLen, in CombineProtectedMsg() 540 if (memcpy_s(kcfDataMsg->val + usedLen, kcfDataMsg->length - usedLen, in GenerateKcfDataMsg() 546 if (memcpy_s(kcfDataMsg->val + usedLen, kcfDataMsg->length - usedLen, in GenerateKcfDataMsg() 552 if (memcpy_s(kcfDataMsg->val + usedLen, kcfDataMsg->length - usedLen, in GenerateKcfDataMsg() [all …]
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/common/ |
H A D | das_task_common.c | 214 uint32_t usedLen = 0; in CombineKeyAlias() local 220 usedLen = usedLen + serviceId->length; in CombineKeyAlias() 222 …if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, keyType->val, keyType->length) != EOK… in CombineKeyAlias() 227 usedLen = usedLen + keyType->length; in CombineKeyAlias() 229 …if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, authId->val, authId->length) != EOK) { in CombineKeyAlias() 257 uint32_t usedLen = 0; in CombineKeyAliasForPseudonymPsk() local 265 usedLen = usedLen + serviceType->length; in CombineKeyAliasForPseudonymPsk() 267 …if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, peerAuthId->val, peerAuthId->length) … in CombineKeyAliasForPseudonymPsk() 272 usedLen = usedLen + peerAuthId->length; in CombineKeyAliasForPseudonymPsk() 274 …if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, keyType->val, keyType->length) != EOK… in CombineKeyAliasForPseudonymPsk()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/ |
H A D | common_standard_bind_exchange.c | 185 uint32_t usedLen = pakeParams->baseParams.challengeSelf.length; in GenerateSignInfo() local 187 …if (memcpy_s(msgInfo.val + usedLen, msgInfo.length - usedLen, pakeParams->baseParams.challengePeer… in GenerateSignInfo() 193 usedLen += pakeParams->baseParams.challengePeer.length; in GenerateSignInfo() 195 if (memcpy_s(msgInfo.val + usedLen, msgInfo.length - usedLen, exchangeParams->authInfo.val, in GenerateSignInfo() 369 uint32_t usedLen = pakeParams->baseParams.challengePeer.length; in VerifySignInfo() local 370 …if (memcpy_s(verifyMsg.val + usedLen, verifyMsg.length - usedLen, pakeParams->baseParams.challenge… in VerifySignInfo() 375 usedLen += pakeParams->baseParams.challengeSelf.length; in VerifySignInfo() 376 if (memcpy_s(verifyMsg.val + usedLen, verifyMsg.length - usedLen, exchangeParams->authInfo.val, in VerifySignInfo()
|
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/ |
H A D | auth_code_import.c | 103 uint32_t usedLen = 0; in BuildKeyAliasMsg() local 108 usedLen = usedLen + serviceId->length; in BuildKeyAliasMsg() 109 …if (memcpy_s(keyAliasMsg->val + usedLen, keyAliasMsg->length - usedLen, keyType->val, keyType->len… in BuildKeyAliasMsg() 113 usedLen = usedLen + keyType->length; in BuildKeyAliasMsg() 114 …if (memcpy_s(keyAliasMsg->val + usedLen, keyAliasMsg->length - usedLen, authId->val, authId->lengt… in BuildKeyAliasMsg()
|
H A D | pub_key_exchange.c | 103 uint32_t usedLen = 0; in BuildKeyAliasMsg() local 108 usedLen = usedLen + serviceId->length; in BuildKeyAliasMsg() 109 …if (memcpy_s(keyAliasMsg->val + usedLen, keyAliasMsg->length - usedLen, keyType->val, keyType->len… in BuildKeyAliasMsg() 113 usedLen = usedLen + keyType->length; in BuildKeyAliasMsg() 114 …if (memcpy_s(keyAliasMsg->val + usedLen, keyAliasMsg->length - usedLen, authId->val, authId->lengt… in BuildKeyAliasMsg()
|
/ohos5.0/base/security/device_auth/services/identity_manager/src/ |
H A D | credential_operator.c | 77 uint32_t usedLen = 0; in CombineKeyAlias() local 83 usedLen = usedLen + serviceId->length; in CombineKeyAlias() 84 …if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, keyType->val, keyType->length) != EOK… in CombineKeyAlias() 89 usedLen = usedLen + keyType->length; in CombineKeyAlias() 90 …if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, authId->val, authId->length) != EOK) { in CombineKeyAlias()
|
/ohos5.0/foundation/multimedia/media_foundation/engine/plugin/plugins/ffmpeg_adapter/utils/ |
H A D | avc_config_data_parser.cpp | 96 uint32_t usedLen = 0; in ParseConfigData() local 98 (void)memcpy_s(newCfgData_.get() + usedLen, cfgSet.items[i]->len, cfgSet.items[i]->SpsOrPps, in ParseConfigData() 100 usedLen += cfgSet.items[i]->len; in ParseConfigData()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_protocol_task_common.c | 429 uint32_t usedLen = 0; in CombinePseudonymChallenge() local 435 usedLen = usedLen + pseudonymChallengeBuff->length; in CombinePseudonymChallenge() 437 …if (memcpy_s(combinedChallengeBuff->val + usedLen, totalLen - usedLen, nextPseudonymChallengeBuff-… in CombinePseudonymChallenge()
|