Home
last modified time | relevance | path

Searched refs:inLen (Results 1 – 21 of 21) sorted by relevance

/base/security/huks/frameworks/huks_standard/main/core/src/
Dhks_verifier.c252 static int32_t EncodeTlvAndGetLength(uint8_t **buf, uint32_t *outLength, uint32_t inLen) in EncodeTlvAndGetLength() argument
271 if (inLen < (ASN_1_MIN_HEADER_LEN + 1)) { in EncodeTlvAndGetLength()
286 static int32_t ExtractTlvLength(const uint8_t *in, uint32_t inLen, uint32_t *headSize, uint32_t *ou… in ExtractTlvLength() argument
288 if ((in == NULL) || (inLen < ASN_1_MIN_HEADER_LEN) || (outLen == NULL)) { in ExtractTlvLength()
296 int32_t ret = EncodeTlvAndGetLength(&buf, &length, inLen); in ExtractTlvLength()
300 if (*headSize > inLen) { in ExtractTlvLength()
305 if (length > (inLen - *headSize)) { in ExtractTlvLength()
313 static int32_t ExtractTlvData(const uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen) in ExtractTlvData() argument
315 if ((in == NULL) || (inLen < ASN_1_MIN_HEADER_LEN) || (out == NULL) || (outLen == NULL)) { in ExtractTlvData()
323 int32_t ret = EncodeTlvAndGetLength(&buf, &length, inLen); in ExtractTlvData()
[all …]
/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/
Dhks_crypto_hal_aes_encrypt.cpp353 uint32_t inLen = encryptMsg->size; in RunTestEncrypt() local
360 if (inLen > HKS_UPDATE_DATA_MAX) { in RunTestEncrypt()
366 while (point < inLen - HKS_UPDATE_DATA_MAX) { in RunTestEncrypt()
376 uint32_t lastLen = inLen - point; in RunTestEncrypt()
391 HksBlob out = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestEncrypt()
412 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCase() local
413 uint32_t outLen = inLen; in RunTestCase()
415 … outLen = (inLen + HKS_PADDING_SUPPLENMENT) / HKS_PADDING_SUPPLENMENT * HKS_PADDING_SUPPLENMENT; in RunTestCase()
417 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
419 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase()
Dhks_crypto_hal_aes_cipher.cpp497 uint32_t inLen = encryptMsg->size; in RunTestEncrypt() local
506 if (inLen > HKS_UPDATE_DATA_MAX) { in RunTestEncrypt()
511 while (point < inLen - HKS_UPDATE_DATA_MAX) { in RunTestEncrypt()
525 uint32_t lastLen = inLen - point; in RunTestEncrypt()
538 HksBlob out = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestEncrypt()
617 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCaseThreeStage() local
618 …uint32_t outLen = (inLen + HKS_PADDING_SUPPLENMENT) / HKS_PADDING_SUPPLENMENT * HKS_PADDING_SUPPLE… in RunTestCaseThreeStage()
620 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCaseThreeStage()
622 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCaseThreeStage()
712 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCaseThreeStageGCM() local
[all …]
Dhks_crypto_hal_aes_decrypt.cpp338 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCase() local
339 uint32_t outLen = inLen; in RunTestCase()
341 … outLen = (inLen + HKS_PADDING_SUPPLENMENT) / HKS_PADDING_SUPPLENMENT * HKS_PADDING_SUPPLENMENT; in RunTestCase()
344 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
346 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase()
471 uint32_t inLen = testCaseParamsForGcm.hexData.length() / HKS_COUNT_OF_HALF; in GcmRunTestCase() local
472 uint32_t outLen = inLen; in GcmRunTestCase()
473 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in GcmRunTestCase()
475 for (uint32_t ii = 0; ii < inLen; ii++) { in GcmRunTestCase()
Dhks_crypto_hal_rsa_decrypt.cpp487 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCase() local
488 uint32_t outLen = inLen; in RunTestCase()
490 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
492 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase()
Dhks_crypto_hal_rsa_encrypt.cpp474 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCase() local
475 uint32_t outLen = inLen; in RunTestCase()
480 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
482 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase()
Dhks_crypto_hal_rsa_oaep_decrypt.cpp1291 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCase() local
1292 uint32_t outLen = inLen; in RunTestCase()
1294 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
1296 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase()
Dhks_crypto_hal_rsa_oaep_encrypt.cpp1165 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCase() local
1168 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
1170 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase()
Dhks_crypto_hal_rsa_cipher.cpp879 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCase() local
882 …HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen + HKS_PADDING_SUPPLENMENT) }; in RunTestCase()
884 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase()
/base/security/huks/test/reliability/src/
Dpressure_test.cpp602 uint32_t inLen = dataLen + COMPLEMENT_LEN; variable
603 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) };
657 uint32_t inLen = dataLen + COMPLEMENT_LEN; variable
658 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) };
664 HksBlob plainTextDecrypt = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) };
1081 uint32_t inLen = dataLen + COMPLEMENT_LEN; variable
1082 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) };
1140 uint32_t inLen = dataLen + COMPLEMENT_LEN; variable
1141 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) };
1147 HksBlob plainTextDecrypt = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) };
Dapi_pressure_test.cpp477 const struct HksBlob *cipherText, uint32_t *inLen);
696 uint32_t inLen = dataLen + COMPLEMENT_LEN; in EncryptTest() local
701 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in EncryptTest()
709 const struct HksBlob *cipherText, uint32_t *inLen) in DecryptTest() argument
715 HksBlob plainTextDecrypt = { .size = *inLen, .data = (uint8_t *)HksMalloc(*inLen) }; in DecryptTest()
1347 uint32_t inLen = dataLen + COMPLEMENT_LEN; variable
1348 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) };
1354 … std::thread(&ApiPressureTest::DecryptTest, this, &authId, paramInSet, &cipherText, &inLen));
/base/telephony/sms_mms/interfaces/innerkits/
Dmms_msg.h308 bool DecodeMsg(std::unique_ptr<char[]> inBuff, uint32_t inLen);
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/
Dhks_aes_key_mt.cpp463 uint32_t inLen = testCaseParams.hexData.length() + COMPLEMENT_LEN; in RunTestCase() local
464 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
466 HksBlob plainTextDecrypt = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
Dhks_aes_cipher_mt.cpp454 uint32_t inLen = testCaseParams.hexData.length() + COMPLEMENT_LEN; in RunTestCase() local
455 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
459 HksBlob plainTextDecrypt = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
Dhks_aes_encrypt_mt.cpp464 uint32_t inLen = testCaseParams.hexData.length() + COMPLEMENT_LEN; in RunTestCase() local
465 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
467 HksBlob plainTextDecrypt = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
Dhks_aes_decrypt_mt.cpp467 uint32_t inLen = testCaseParams.hexData.length() + COMPLEMENT_LEN; in RunTestCase() local
468 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
470 HksBlob plainTextDecrypt = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
Dhks_rsa_common_mt.cpp186 uint32_t inLen = (cipherLenBit->uint32Param) / BIT_NUM_OF_UINT8; in EncryptServiceTestCase() local
187 HksBlob cipherText = { .size = inLen, .data = static_cast<uint8_t *>(HksMalloc(inLen)) }; in EncryptServiceTestCase()
/base/telephony/sms_mms/frameworks/native/mms/src/
Dmms_msg.cpp46 bool MmsMsg::DecodeMsg(std::unique_ptr<char[]> inBuff, uint32_t inLen) in DecodeMsg() argument
49 if (!decodeBuffer.WriteDataBuffer(std::move(inBuff), inLen)) { in DecodeMsg()
/base/telephony/sms_mms/frameworks/js/napi/include/
Dnapi_mms.h169 uint32_t inLen; member
/base/telephony/sms_mms/frameworks/js/napi/src/
Dnapi_mms.cpp317 mmsResult = mmsMsg.DecodeMsg(std::move(context->inBuffer), context->inLen); in NativeDecodeMms()
636 context.inLen = arrayLength; in ParseDecodeMmsParam()
/base/security/crypto_framework/test/unittest/src/
Dcrypto_aes_cipher_test.cpp71 static void PrintfHex(const char *tag, uint8_t *in, int inLen) in PrintfHex() argument
77 for (int i = 0; i < inLen; i++) { in PrintfHex()