/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/ |
D | cert_manager_storage.c | 26 int32_t GetRootPath(uint32_t store, char *rootPath, uint32_t pathLen) in GetRootPath() argument 33 ret = memcpy_s(rootPath, pathLen - 1, CREDNTIAL_STORE, strlen(CREDNTIAL_STORE)); in GetRootPath() 36 ret = memcpy_s(rootPath, pathLen - 1, SYSTEM_CA_STORE, strlen(SYSTEM_CA_STORE)); in GetRootPath() 39 ret = memcpy_s(rootPath, pathLen - 1, USER_CA_STORE, strlen(USER_CA_STORE)); in GetRootPath() 42 ret = memcpy_s(rootPath, pathLen - 1, PRI_CREDNTIAL_STORE, strlen(PRI_CREDNTIAL_STORE)); in GetRootPath() 57 char *userIdPath, uint32_t pathLen) in ConstructUserIdPath() argument 65 if (snprintf_s(userIdPath, pathLen, pathLen - 1, "%s/%u", rootPath, context->userId) < 0) { in ConstructUserIdPath() 80 char *uidPath, uint32_t pathLen) in ConstructUidPath() argument 88 if (snprintf_s(uidPath, pathLen, pathLen - 1, "%s/%u", userIdPath, context->uid) < 0) { in ConstructUidPath() 103 char *authListPath, uint32_t pathLen) in ConstructAuthListPath() argument [all …]
|
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/include/ |
D | cert_manager_storage.h | 31 int32_t GetRootPath(uint32_t store, char *rootPath, uint32_t pathLen); 34 char *userIdPath, uint32_t pathLen); 37 char *uidPath, uint32_t pathLen); 40 char *authListPath, uint32_t pathLen);
|
/base/startup/appspawn/interfaces/innerkits/client/ |
D | appspawn_socket.cpp | 52 socklen_t pathLen = 0; in PackSocketAddr() local 54 pathLen = socketName_.length(); in PackSocketAddr() 56 pathLen = socketDir_.length() + socketName_.length(); in PackSocketAddr() 59 if (pathLen >= pathSize) { in PackSocketAddr() 71 APPSPAWN_CHECK(static_cast<int>(pathLen) == len, return -1, "Failed to copy socket path"); in PackSocketAddr() 74 socketAddrLen_ = offsetof(struct sockaddr_un, sun_path) + pathLen + 1; in PackSocketAddr()
|
/base/startup/init/interfaces/innerkits/fs_manager/libfs_hvb/ |
D | hvb_ops.c | 52 size_t pathLen = 0; in HvbReadFromPartition() local 65 pathLen = strlen(PARTITION_PATH_PREFIX) + strlen(partition); in HvbReadFromPartition() 66 path = calloc(1, pathLen + 1); in HvbReadFromPartition() 72 rc = snprintf_s(path, pathLen + 1, pathLen, "%s%s", PARTITION_PATH_PREFIX, in HvbReadFromPartition()
|
/base/security/huks/utils/file_operator/ |
D | hks_file_operator_lite.c | 242 uint32_t pathLen; in HksGetStoragePath() local 244 pathLen = strlen(HKS_KEY_STORE_PATH); in HksGetStoragePath() 245 ret = memcpy_s(path, *len - 1, HKS_KEY_STORE_PATH, pathLen); in HksGetStoragePath() 247 pathLen = strlen(HKS_KEY_STORE_BAK_PATH); in HksGetStoragePath() 248 ret = memcpy_s(path, *len - 1, HKS_KEY_STORE_BAK_PATH, pathLen); in HksGetStoragePath() 256 path[pathLen] = '\0'; in HksGetStoragePath() 257 *len = pathLen + 1; in HksGetStoragePath()
|
D | hks_file_operator.c | 289 uint32_t pathLen; in HksGetStoragePath() local 291 pathLen = strlen(HKS_KEY_STORE_PATH); in HksGetStoragePath() 292 ret = memcpy_s(path, *len - 1, HKS_KEY_STORE_PATH, pathLen); in HksGetStoragePath() 294 pathLen = strlen(HKS_KEY_STORE_BAK_PATH); in HksGetStoragePath() 295 ret = memcpy_s(path, *len - 1, HKS_KEY_STORE_BAK_PATH, pathLen); in HksGetStoragePath() 303 path[pathLen] = '\0'; in HksGetStoragePath() 304 *len = pathLen + 1; in HksGetStoragePath()
|
/base/security/crypto_framework/test/fuzztest/certificate/x509certificate_fuzzer/ |
D | x509certificate_fuzzer.cpp | 115 int32_t pathLen = x509CertObj->getBasicConstraints(x509CertObj); in TestQuery() local 116 if (pathLen < 0) { in TestQuery()
|
/base/security/huks/services/huks_standard/huks_service/main/core/src/ |
D | hks_storage.c | 188 static int32_t GetPath(const char *path, const char *name, char *targetPath, uint32_t pathLen, uint… in GetPath() argument 190 if (strncpy_s(targetPath, pathLen, path, strlen(path)) != EOK) { in GetPath() 196 if (strncat_s(targetPath, pathLen, "/", strlen("/")) != EOK) { in GetPath() 202 if (strncat_s(targetPath, pathLen, name, strlen(name)) != EOK) { in GetPath() 208 if (strncat_s(targetPath, pathLen, ".bak", strlen(".bak")) != EOK) { in GetPath() 1278 static int32_t ConstructUserIdPath(const char *userId, char *userIdPath, uint32_t pathLen) in ConstructUserIdPath() argument 1280 if (strncpy_s(userIdPath, pathLen, HKS_KEY_STORE_PATH, strlen(HKS_KEY_STORE_PATH)) != EOK) { in ConstructUserIdPath() 1285 if (strncat_s(userIdPath, pathLen, "/", strlen("/")) != EOK) { in ConstructUserIdPath() 1290 if (strncat_s(userIdPath, pathLen, userId, strlen(userId)) != EOK) { in ConstructUserIdPath() 1295 if (strncat_s(userIdPath, pathLen, "\0", strlen("\0")) != EOK) { in ConstructUserIdPath() [all …]
|
/base/startup/init/ueventd/ |
D | ueventd_device_handler.c | 42 size_t pathLen = strlen("/dev/block/platform/"); in IsBootDeviceLinkDir() local 43 INIT_CHECK_RETURN_VALUE(strncmp(linkDir, "/dev/block/platform/", pathLen) == 0, false); in IsBootDeviceLinkDir() 44 const char *vernier = linkDir + pathLen; in IsBootDeviceLinkDir()
|
/base/security/crypto_framework/test/unittest/src/ |
D | crypto_x509_certificate_test.cpp | 666 int32_t pathLen = x509Cert->getBasicConstraints(x509Cert); variable 667 EXPECT_EQ(pathLen, -1); /* cert path len is only valid for CA. */ 674 int32_t pathLen = g_x509CertObj->getBasicConstraints(g_x509CertObj); variable 675 …EXPECT_EQ(pathLen, TEST_CERT_CHAIN_LEN); /* g_testSelfSignedCaCert is CA and it's path len is 2. */ 681 int32_t pathLen = g_x509CertObj->getBasicConstraints(nullptr); variable 682 EXPECT_EQ(pathLen, -1);
|
/base/security/crypto_framework/plugin/openssl_plugin/certificate/src/ |
D | x509_certificate_openssl.c | 711 long pathLen = ASN1_INTEGER_get(constraints->pathlen); in GetBasicConstraintsX509Openssl() local 712 if ((pathLen < 0) || (pathLen > INT_MAX)) { in GetBasicConstraintsX509Openssl() 716 return (int32_t)pathLen; in GetBasicConstraintsX509Openssl()
|