/ohos5.0/base/security/dlp_permission_service/services/dlp_permission/sa/test/unittest/src/ |
H A D | hex_string_test.cpp | 78 …EXPECT_EQ(HexStringToByte(nullptr, 0, byteBuffer, sizeof(byteBuffer)), DLP_SERVICE_ERROR_VALUE_INV… 81 EXPECT_EQ(HexStringToByte(test.c_str(), test.length(), nullptr, sizeof(byteBuffer)), 85 EXPECT_EQ(HexStringToByte(test.c_str(), test.length(), nullptr, sizeof(byteBuffer)), 89 …EXPECT_EQ(HexStringToByte(test.c_str(), test.length(), nullptr, 1), DLP_SERVICE_ERROR_VALUE_INVALI… 92 EXPECT_EQ(HexStringToByte(test.c_str(), test.length(), nullptr, sizeof(byteBuffer)), 96 EXPECT_EQ(HexStringToByte(test.c_str(), test.length(), byteBuffer, sizeof(byteBuffer)), DLP_OK); 111 EXPECT_EQ(HexStringToByte(test.c_str(), test.length(), byteBuffer, sizeof(byteBuffer)), 114 …EXPECT_EQ(HexStringToByte(test.c_str(), test.length(), byteBuffer, 1), DLP_SERVICE_ERROR_VALUE_INV… 116 EXPECT_EQ(HexStringToByte(test.c_str(), test.length(), byteBuffer, sizeof(byteBuffer)), 119 EXPECT_EQ(HexStringToByte(test.c_str(), test.length(), byteBuffer, sizeof(byteBuffer)),
|
/ohos5.0/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | mk_agree_test.cpp | 94 int32_t ret = HexStringToByte(TEST_DEV_PK, peerDevPkVal, peerDevPkLen); 117 int32_t ret = HexStringToByte(TEST_DEV_PK, peerDevPkVal, peerDevPkLen); 130 int32_t ret = HexStringToByte(TEST_DEV_PK, peerDevPkVal, peerDevPkLen); 153 int32_t ret = HexStringToByte(TEST_DEV_PK, peerDevPkVal, peerDevPkLen); 176 int32_t ret = HexStringToByte(TEST_DEV_PK, peerDevPkVal, peerDevPkLen); 189 int32_t ret = HexStringToByte(TEST_DEV_PK, peerDevPkVal, peerDevPkLen); 205 int32_t ret = HexStringToByte(TEST_DEV_PK, peerDevPkVal, peerDevPkLen); 221 int32_t ret = HexStringToByte(TEST_DEV_PK, peerDevPkVal, peerDevPkLen); 237 int32_t ret = HexStringToByte(TEST_DEV_PK, peerDevPkVal, peerDevPkLen);
|
H A D | json_utils_mock.c | 280 return HexStringToByte(valueStr, byte, len); in GetByteFromJson()
|
H A D | iso_auth_task_test.cpp | 159 (void)HexStringToByte(TEST_SESSION_KEY.c_str(), sessionBytes, SESSION_BYTES_LENGTH); in GetSessionKey()
|
/ohos5.0/base/security/dlp_permission_service/frameworks/common/include/ |
H A D | hex_string.h | 26 int32_t HexStringToByte(const char *hexStr, uint32_t hexStrLen, uint8_t *byte, uint32_t byteLen);
|
/ohos5.0/base/security/device_auth/common_lib/interfaces/ |
H A D | string_util.h | 38 int32_t HexStringToByte(const char *hexStr, uint8_t *byte, uint32_t byteLen);
|
/ohos5.0/base/security/dlp_permission_service/frameworks/common/src/ |
H A D | hex_string.cpp | 67 int32_t HexStringToByte(const char *hexStr, uint32_t hexStrLen, uint8_t *byte, uint32_t byteLen) in HexStringToByte() function
|
/ohos5.0/base/security/device_auth/test/unittest/deviceauth/unit_test/source/ |
H A D | common_lib_test.cpp | 500 ret = HexStringToByte(nullptr, byteStr, TEST_BUFFER_SIZE); 502 ret = HexStringToByte(hexData, byteStr, TEST_LENGTH_ZERO); 504 ret = HexStringToByte(invalidData, byteStr, TEST_BUFFER_SIZE); 506 ret = HexStringToByte(hexData, byteStr, TEST_BUFFER_SIZE);
|
/ohos5.0/base/security/device_auth/common_lib/impl/src/ |
H A D | string_util.c | 66 int32_t HexStringToByte(const char *hexStr, uint8_t *byte, uint32_t byteLen) in HexStringToByte() function
|
H A D | json_utils.c | 247 return HexStringToByte(valueStr, byte, len); in GetByteFromJson()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/ |
H A D | standard_exchange_message_util.c | 69 res = HexStringToByte(exAuthInfoStr, exAuthInfoVal, exAuthInfoLen); in ParseNonceAndCipherFromJson()
|
/ohos5.0/base/security/device_auth/services/mk_agree/src/ |
H A D | mk_agree_task.c | 301 int32_t res = HexStringToByte(peerDevPkStr, peerDevPkVal, peerDevPkLen); in GenerateMkByPeer() 383 int32_t res = HexStringToByte(payloadStr, payload->val, payload->length); in ParsePakeData() 452 int32_t res = HexStringToByte(kcfDataStr, kcfDataVal, kcfDataLen); in VerifyPeerKcf()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/iso_auth_task/ |
H A D | iso_auth_task_common.c | 308 …if (HexStringToByte(devIdPeerHex, params->devIdPeer.val, params->devIdPeer.length) != CLIB_SUCCESS… in GetPayloadValue() 342 if (HexStringToByte(payloadHex, params->isoBaseParams.authIdPeer.val, in ExtractPeerAuthId()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_message_util.c | 122 …res = HexStringToByte(epkPeerHex, params->baseParams.epkPeer.val, params->baseParams.epkPeer.lengt… in GetDasEpkPeerFromJson()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/common/ |
H A D | das_task_common.c | 480 if (HexStringToByte(authIdStr, authIdPeer->val, authIdPeer->length) != HC_SUCCESS) { in GetIdPeer() 514 if (HexStringToByte(authIdStr, authIdPeerTmp, authIdPeerLen) != HC_SUCCESS) { in GetAndCheckAuthIdPeer()
|
/ohos5.0/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/ |
H A D | cert_manager_auth_mgr.c | 72 static int32_t HexStringToByte(const char *hexStr, uint8_t *byte, uint32_t byteLen) in HexStringToByte() function 442 int32_t ret = HexStringToByte(macString, data, size); in GetMacByteFromString()
|
/ohos5.0/base/security/dlp_permission_service/services/dlp_permission/sa/sa_common/ |
H A D | dlp_permission_serializer.cpp | 101 int32_t res = HexStringToByte(tmp.c_str(), tmp.length(), *buff, length); in ReadUint8ArrayFromJson() 123 int32_t res = HexStringToByte(input.c_str(), input.length(), buff, len); in TransHexStringToByte()
|
/ohos5.0/base/security/device_auth/services/key_agree_sdk/src/ |
H A D | key_agree_session.c | 65 if (HexStringToByte(authIdStr, authIdPeer->val, authIdPeer->length) != HC_SUCCESS) { in GetIdPeer() 307 res = HexStringToByte(epkPeerHex, baseParams->epkPeer.val, baseParams->epkPeer.length); in GetDasEpkPeerFromJson()
|
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
H A D | iso_protocol.c | 334 if (HexStringToByte(authIdCStr, authIdC.val, authIdC.length) != HC_SUCCESS) { in ServerGenTokenParseEvent() 441 if (HexStringToByte(authIdSStr, authIdS.val, authIdS.length) != HC_SUCCESS) { in ClientGenTokenParseEvent()
|
H A D | dl_speke_protocol.c | 151 …if (HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCES… in GetAuthIdPeerFromInput() 183 if (HexStringToByte(epkPeerStr, params->epkPeer.val, params->epkPeer.length) != HC_SUCCESS) { in GetEpkPeerFromInput()
|
H A D | ec_speke_protocol.c | 124 …if (HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCES… in GetAuthIdPeerFromInput() 156 if (HexStringToByte(epkPeerStr, params->epkPeer.val, params->epkPeer.length) != HC_SUCCESS) { in GetEpkPeerFromInput()
|
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/ |
H A D | auth_code_import.c | 232 …if (HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCES… in GetAuthIdPeerFromInput()
|
H A D | pub_key_exchange.c | 316 …if (HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCES… in GetAuthIdPeerFromInput()
|
/ohos5.0/base/security/device_auth/test/fuzztest/authenticators/account_related/auth/isoauthtask_fuzzer/ |
H A D | isoauthtask_fuzzer.cpp | 163 (void)HexStringToByte(TEST_SESSION_KEY.c_str(), sessionBytes, SESSION_BYTES_LENGTH); in GetSessionKey()
|
/ohos5.0/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/ |
H A D | huks_adapter.c | 1485 res = HexStringToByte(bigNumHex, bigNumBlob.data, bigNumBlob.size); in BigNumExpMod() 2110 if (HexStringToByte(primeHex, primeByte, innerKeyLen) != HAL_SUCCESS) { in CheckDlPublicKey()
|