/base/security/huks/frameworks/huks_standard/main/core/src/ |
D | hks_verifier.c | 252 static int32_t EncodeTlvAndGetLength(uint8_t **buf, uint32_t *outLength, uint32_t inLen) in EncodeTlvAndGetLength() argument 271 if (inLen < (ASN_1_MIN_HEADER_LEN + 1)) { in EncodeTlvAndGetLength() 286 static int32_t ExtractTlvLength(const uint8_t *in, uint32_t inLen, uint32_t *headSize, uint32_t *ou… in ExtractTlvLength() argument 288 if ((in == NULL) || (inLen < ASN_1_MIN_HEADER_LEN) || (outLen == NULL)) { in ExtractTlvLength() 296 int32_t ret = EncodeTlvAndGetLength(&buf, &length, inLen); in ExtractTlvLength() 300 if (*headSize > inLen) { in ExtractTlvLength() 305 if (length > (inLen - *headSize)) { in ExtractTlvLength() 313 static int32_t ExtractTlvData(const uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen) in ExtractTlvData() argument 315 if ((in == NULL) || (inLen < ASN_1_MIN_HEADER_LEN) || (out == NULL) || (outLen == NULL)) { in ExtractTlvData() 323 int32_t ret = EncodeTlvAndGetLength(&buf, &length, inLen); in ExtractTlvData() [all …]
|
/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/ |
D | hks_crypto_hal_aes_encrypt.cpp | 353 uint32_t inLen = encryptMsg->size; in RunTestEncrypt() local 360 if (inLen > HKS_UPDATE_DATA_MAX) { in RunTestEncrypt() 366 while (point < inLen - HKS_UPDATE_DATA_MAX) { in RunTestEncrypt() 376 uint32_t lastLen = inLen - point; in RunTestEncrypt() 391 HksBlob out = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestEncrypt() 412 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCase() local 413 uint32_t outLen = inLen; in RunTestCase() 415 … outLen = (inLen + HKS_PADDING_SUPPLENMENT) / HKS_PADDING_SUPPLENMENT * HKS_PADDING_SUPPLENMENT; in RunTestCase() 417 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase() 419 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase()
|
D | hks_crypto_hal_aes_cipher.cpp | 497 uint32_t inLen = encryptMsg->size; in RunTestEncrypt() local 506 if (inLen > HKS_UPDATE_DATA_MAX) { in RunTestEncrypt() 511 while (point < inLen - HKS_UPDATE_DATA_MAX) { in RunTestEncrypt() 525 uint32_t lastLen = inLen - point; in RunTestEncrypt() 538 HksBlob out = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestEncrypt() 617 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCaseThreeStage() local 618 …uint32_t outLen = (inLen + HKS_PADDING_SUPPLENMENT) / HKS_PADDING_SUPPLENMENT * HKS_PADDING_SUPPLE… in RunTestCaseThreeStage() 620 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCaseThreeStage() 622 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCaseThreeStage() 712 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCaseThreeStageGCM() local [all …]
|
D | hks_crypto_hal_aes_decrypt.cpp | 338 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCase() local 339 uint32_t outLen = inLen; in RunTestCase() 341 … outLen = (inLen + HKS_PADDING_SUPPLENMENT) / HKS_PADDING_SUPPLENMENT * HKS_PADDING_SUPPLENMENT; in RunTestCase() 344 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase() 346 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() 471 uint32_t inLen = testCaseParamsForGcm.hexData.length() / HKS_COUNT_OF_HALF; in GcmRunTestCase() local 472 uint32_t outLen = inLen; in GcmRunTestCase() 473 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in GcmRunTestCase() 475 for (uint32_t ii = 0; ii < inLen; ii++) { in GcmRunTestCase()
|
D | hks_crypto_hal_rsa_decrypt.cpp | 487 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCase() local 488 uint32_t outLen = inLen; in RunTestCase() 490 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase() 492 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase()
|
D | hks_crypto_hal_rsa_encrypt.cpp | 474 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCase() local 475 uint32_t outLen = inLen; in RunTestCase() 480 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase() 482 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase()
|
D | hks_crypto_hal_rsa_oaep_decrypt.cpp | 1291 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCase() local 1292 uint32_t outLen = inLen; in RunTestCase() 1294 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase() 1296 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase()
|
D | hks_crypto_hal_rsa_oaep_encrypt.cpp | 1165 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCase() local 1168 HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase() 1170 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase()
|
D | hks_crypto_hal_rsa_cipher.cpp | 879 uint32_t inLen = testCaseParams.hexData.length() / HKS_COUNT_OF_HALF; in RunTestCase() local 882 …HksBlob message = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen + HKS_PADDING_SUPPLENMENT) }; in RunTestCase() 884 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase()
|
/base/security/huks/test/reliability/src/ |
D | pressure_test.cpp | 602 uint32_t inLen = dataLen + COMPLEMENT_LEN; variable 603 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; 657 uint32_t inLen = dataLen + COMPLEMENT_LEN; variable 658 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; 664 HksBlob plainTextDecrypt = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; 1081 uint32_t inLen = dataLen + COMPLEMENT_LEN; variable 1082 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; 1140 uint32_t inLen = dataLen + COMPLEMENT_LEN; variable 1141 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; 1147 HksBlob plainTextDecrypt = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) };
|
D | api_pressure_test.cpp | 477 const struct HksBlob *cipherText, uint32_t *inLen); 696 uint32_t inLen = dataLen + COMPLEMENT_LEN; in EncryptTest() local 701 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in EncryptTest() 709 const struct HksBlob *cipherText, uint32_t *inLen) in DecryptTest() argument 715 HksBlob plainTextDecrypt = { .size = *inLen, .data = (uint8_t *)HksMalloc(*inLen) }; in DecryptTest() 1347 uint32_t inLen = dataLen + COMPLEMENT_LEN; variable 1348 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; 1354 … std::thread(&ApiPressureTest::DecryptTest, this, &authId, paramInSet, &cipherText, &inLen));
|
/base/telephony/sms_mms/interfaces/innerkits/ |
D | mms_msg.h | 308 bool DecodeMsg(std::unique_ptr<char[]> inBuff, uint32_t inLen);
|
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/ |
D | hks_aes_key_mt.cpp | 463 uint32_t inLen = testCaseParams.hexData.length() + COMPLEMENT_LEN; in RunTestCase() local 464 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase() 466 HksBlob plainTextDecrypt = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
|
D | hks_aes_cipher_mt.cpp | 454 uint32_t inLen = testCaseParams.hexData.length() + COMPLEMENT_LEN; in RunTestCase() local 455 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase() 459 HksBlob plainTextDecrypt = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
|
D | hks_aes_encrypt_mt.cpp | 464 uint32_t inLen = testCaseParams.hexData.length() + COMPLEMENT_LEN; in RunTestCase() local 465 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase() 467 HksBlob plainTextDecrypt = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
|
D | hks_aes_decrypt_mt.cpp | 467 uint32_t inLen = testCaseParams.hexData.length() + COMPLEMENT_LEN; in RunTestCase() local 468 HksBlob cipherText = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase() 470 HksBlob plainTextDecrypt = { .size = inLen, .data = (uint8_t *)HksMalloc(inLen) }; in RunTestCase()
|
D | hks_rsa_common_mt.cpp | 186 uint32_t inLen = (cipherLenBit->uint32Param) / BIT_NUM_OF_UINT8; in EncryptServiceTestCase() local 187 HksBlob cipherText = { .size = inLen, .data = static_cast<uint8_t *>(HksMalloc(inLen)) }; in EncryptServiceTestCase()
|
/base/telephony/sms_mms/frameworks/native/mms/src/ |
D | mms_msg.cpp | 46 bool MmsMsg::DecodeMsg(std::unique_ptr<char[]> inBuff, uint32_t inLen) in DecodeMsg() argument 49 if (!decodeBuffer.WriteDataBuffer(std::move(inBuff), inLen)) { in DecodeMsg()
|
/base/telephony/sms_mms/frameworks/js/napi/include/ |
D | napi_mms.h | 169 uint32_t inLen; member
|
/base/telephony/sms_mms/frameworks/js/napi/src/ |
D | napi_mms.cpp | 317 mmsResult = mmsMsg.DecodeMsg(std::move(context->inBuffer), context->inLen); in NativeDecodeMms() 636 context.inLen = arrayLength; in ParseDecodeMmsParam()
|
/base/security/crypto_framework/test/unittest/src/ |
D | crypto_aes_cipher_test.cpp | 71 static void PrintfHex(const char *tag, uint8_t *in, int inLen) in PrintfHex() argument 77 for (int i = 0; i < inLen; i++) { in PrintfHex()
|