Home
last modified time | relevance | path

Searched refs:authIdPeer (Results 1 - 18 of 18) sorted by relevance

/base/security/device_auth/services/legacy/authenticators/inc/account_unrelated/
H A Ddas_task_common.h31 int32_t GetIdPeer(const CJson *in, const char *peerIdKey, const Uint8Buff *authIdSelf, Uint8Buff *authIdPeer);
32 int32_t GetAndCheckAuthIdPeer(const CJson *in, const Uint8Buff *authIdSelf, const Uint8Buff *authIdPeer);
33 int32_t GetAuthIdPeerFromPayload(const CJson *in, const Uint8Buff *authIdSelf, Uint8Buff *authIdPeer);
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/common/
H A Ddas_task_common.c463 int32_t GetIdPeer(const CJson *in, const char *peerIdKey, const Uint8Buff *authIdSelf, Uint8Buff *authIdPeer) in GetIdPeer() argument
475 int32_t res = InitSingleParam(authIdPeer, authIdLen); in GetIdPeer()
480 if (HexStringToByte(authIdStr, authIdPeer->val, authIdPeer->length) != HC_SUCCESS) { in GetIdPeer()
481 LOGE("HexStringToByte for authIdPeer failed."); in GetIdPeer()
484 if ((authIdSelf->length == authIdPeer->length) && in GetIdPeer()
485 memcmp(authIdSelf->val, authIdPeer->val, authIdSelf->length) == 0) { in GetIdPeer()
492 int32_t GetAndCheckAuthIdPeer(const CJson *in, const Uint8Buff *authIdSelf, const Uint8Buff *authIdPeer) in GetAndCheckAuthIdPeer() argument
519 if ((authIdSelf->length == authIdPeer->length) && in GetAndCheckAuthIdPeer()
520 memcmp(authIdSelf->val, authIdPeer in GetAndCheckAuthIdPeer()
534 GetAuthIdPeerFromPayload(const CJson *in, const Uint8Buff *authIdSelf, Uint8Buff *authIdPeer) GetAuthIdPeerFromPayload() argument
[all...]
/base/security/device_auth/services/protocol/src/iso_protocol/
H A Diso_protocol_common.c89 HcFree(params->authIdPeer.val); in DestroyIsoBaseParams()
90 params->authIdPeer.val = NULL; in DestroyIsoBaseParams()
97 params->authIdPeer.length; in IsoCalSelfToken()
122 if (memcpy_s(messagePeer + usedLen, length - usedLen, params->authIdPeer.val, params->authIdPeer.length) != EOK) { in IsoCalSelfToken()
123 LOGE("Memcpy authIdPeer failed."); in IsoCalSelfToken()
142 int length = params->randSelf.length + params->randPeer.length + params->authIdPeer.length + in IsoCalPeerToken()
163 if (memcpy_s(messageSelf + usedLen, length - usedLen, params->authIdPeer.val, params->authIdPeer.length) != EOK) { in IsoCalPeerToken()
164 LOGE("Memcpy authIdPeer faile in IsoCalPeerToken()
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/
H A Diso_task_common.c268 res = GenerateKeyAlias(&pkgNameBuff, &serviceType, params->peerUserType, &params->baseParams.authIdPeer, in GenerateKeyAliasForIso()
272 res = GenerateKeyAlias(&pkgNameBuff, &serviceType, KEY_ALIAS_AUTH_TOKEN, &params->baseParams.authIdPeer, in GenerateKeyAliasForIso()
365 params->baseParams.authIdPeer.length = 0; in FillAuthId()
366 params->baseParams.authIdPeer.val = NULL; in FillAuthId()
378 params->baseParams.authIdPeer.length = authIdLen; in FillAuthId()
379 params->baseParams.authIdPeer.val = (uint8_t *)HcMalloc(params->baseParams.authIdPeer.length, 0); in FillAuthId()
380 if (params->baseParams.authIdPeer.val == NULL) { in FillAuthId()
381 LOGE("malloc authIdPeer failed"); in FillAuthId()
384 if (memcpy_s(params->baseParams.authIdPeer in FillAuthId()
[all...]
/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/
H A Dauth_code_import.c45 Uint8Buff authIdPeer; member
185 return CalKeyAlias(&serviceId, &keyTypeBuff, &params->authIdPeer, keyAlias); in GenerateKeyAlias()
228 if (InitUint8Buff(&params->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
229 LOGE("allocate authIdPeer memory fail."); in GetAuthIdPeerFromInput()
232 if (HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
276 ExtraInfo exInfo = { params->authIdPeer, params->userTypePeer, PAIR_TYPE_BIND }; in ServerGenAuthCodeProcEvent()
356 ExtraInfo exInfo = { params->authIdPeer, params->userTypePeer, PAIR_TYPE_BIND }; in ClientImportAuthCodeProcEvent()
519 ClearFreeUint8Buff(&impl->params.authIdPeer); in DestroyAuthCodeImportCmd()
H A Dpub_key_exchange.c43 Uint8Buff authIdPeer; member
184 const Uint8Buff *authId = isSelf ? &(params->authIdSelf) : &(params->authIdPeer); in GenerateKeyAlias()
312 if (InitUint8Buff(&params->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
313 LOGE("allocate authIdPeer memory fail."); in GetAuthIdPeerFromInput()
316 if (HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
438 ExtraInfo exInfo = { params->authIdPeer, params->userTypeSelf, PAIR_TYPE_BIND }; in SavePeerPubKey()
685 ClearFreeUint8Buff(&impl->params.authIdPeer); in DestroyPubKeyExchangeCmd()
H A Dsave_trusted_info.c59 char *authIdPeer; member
237 if (DeepCopyString(authId, &(params->authIdPeer)) != HC_SUCCESS) { in ServerSendTrustedInfoParseEvent()
303 if (!StringSetPointer(&devParams->authId, params->authIdPeer)) { in GeneratePeerDevParams()
400 PRINT_SENSITIVE_DATA("PeerAuthId", params->authIdPeer); in AddPeerTrustedDevice()
593 if (DeepCopyString(authId, &(params->authIdPeer)) != HC_SUCCESS) { in ClientFinishProcParseEvent()
794 HcFree(impl->params.authIdPeer); in DestroySaveTrustedInfoCmd()
795 impl->params.authIdPeer = NULL; in DestroySaveTrustedInfoCmd()
/base/security/device_auth/services/protocol/inc/iso_protocol/
H A Diso_protocol_common.h33 Uint8Buff authIdPeer; // need malloc by caller member
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/
H A Ddas_standard_token_manager.c105 KeyAliasType keyType, const Uint8Buff *authIdPeer) in DeletePeerPubKey()
109 int32_t res = GenerateKeyAlias(pkgNameBuff, serviceTypeBuff, keyType, authIdPeer, &pakeKeyAliasBuff); in DeletePeerPubKey()
137 const Uint8Buff *authIdPeer) in DeleteAuthPsk()
141 int32_t res = GenerateKeyAlias(pkgNameBuff, serviceTypeBuff, KEY_ALIAS_PSK, authIdPeer, &pakeKeyAliasBuff); in DeleteAuthPsk()
174 const Uint8Buff *authIdPeer) in DeletePseudonymPskStd()
178 int32_t res = GeneratePseudonymPskAlias(serviceTypeBuff, authIdPeer, &pakeKeyAliasBuff); in DeletePseudonymPskStd()
104 DeletePeerPubKey(int32_t osAccountId, const Uint8Buff *pkgNameBuff, const Uint8Buff *serviceTypeBuff, KeyAliasType keyType, const Uint8Buff *authIdPeer) DeletePeerPubKey() argument
136 DeleteAuthPsk(int32_t osAccountId, const Uint8Buff *pkgNameBuff, const Uint8Buff *serviceTypeBuff, const Uint8Buff *authIdPeer) DeleteAuthPsk() argument
173 DeletePseudonymPskStd(int32_t osAccountId, const Uint8Buff *serviceTypeBuff, const Uint8Buff *authIdPeer) DeletePseudonymPskStd() argument
/base/security/device_auth/services/key_agree_sdk/src/
H A Dkey_agree_session.c48 static int32_t GetIdPeer(const CJson *in, const char *peerIdKey, const Uint8Buff *authIdSelf, Uint8Buff *authIdPeer) in GetIdPeer() argument
60 int32_t res = InitSingleParam(authIdPeer, authIdLen); in GetIdPeer()
65 if (HexStringToByte(authIdStr, authIdPeer->val, authIdPeer->length) != HC_SUCCESS) { in GetIdPeer()
66 LOGE("HexStringToByte for authIdPeer failed."); in GetIdPeer()
69 if ((authIdSelf->length == authIdPeer->length) && in GetIdPeer()
70 memcmp(authIdSelf->val, authIdPeer->val, authIdSelf->length) == 0) { in GetIdPeer()
260 int32_t GetAuthIdPeerFromPayload(const CJson *in, const Uint8Buff *authIdSelf, Uint8Buff *authIdPeer) in GetAuthIdPeerFromPayload() argument
267 int32_t res = GetIdPeer(payload, FIELD_PEER_AUTH_ID, authIdSelf, authIdPeer); in GetAuthIdPeerFromPayload()
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/
H A Diso_protocol.c55 Uint8Buff authIdPeer; member
89 if (memcpy_s(message + usedLen, messageLen - usedLen, params->authIdPeer.val, params->authIdPeer.length) != EOK) { in BuildSelfTokenMessage()
90 LOGE("Memcpy authIdPeer failed."); in BuildSelfTokenMessage()
93 usedLen += params->authIdPeer.length; in BuildSelfTokenMessage()
134 if (memcpy_s(message + usedLen, messageLen - usedLen, params->authIdPeer.val, params->authIdPeer.length) != EOK) { in BuildPeerTokenMessage()
135 LOGE("Memcpy authIdPeer failed."); in BuildPeerTokenMessage()
138 usedLen += params->authIdPeer.length; in BuildPeerTokenMessage()
160 params->authIdSelf.length + params->authIdPeer in IsoCalToken()
[all...]
H A Ddl_speke_protocol.c83 Uint8Buff authIdPeer; member
147 if (InitUint8Buff(&params->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
148 LOGE("allocate authIdPeer memory fail."); in GetAuthIdPeerFromInput()
151 if (HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
397 uint32_t sidPeerMsgLen = params->authIdPeer.length + params->innerKeyLen; in CalSidPeer()
403 if (memcpy_s(sidPeerMsg.val, sidPeerMsg.length, params->authIdPeer.val, params->authIdPeer.length) != EOK) { in CalSidPeer()
404 LOGE("Memcpy for authIdPeer failed."); in CalSidPeer()
408 if (memcpy_s(sidPeerMsg.val + params->authIdPeer in CalSidPeer()
[all...]
H A Dec_speke_protocol.c65 Uint8Buff authIdPeer; member
120 if (InitUint8Buff(&params->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
121 LOGE("allocate authIdPeer memory fail."); in GetAuthIdPeerFromInput()
124 if (HexStringToByte(authIdPeerStr, params->authIdPeer.val, params->authIdPeer.length) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
369 uint32_t sidPeerMsgLen = params->authIdPeer.length + EC_SPEKE_EC_KEY_LEN; in CalSidPeer()
375 if (memcpy_s(sidPeerMsg.val, sidPeerMsg.length, params->authIdPeer.val, params->authIdPeer.length) != EOK) { in CalSidPeer()
376 LOGE("Memcpy for authIdPeer failed."); in CalSidPeer()
380 if (memcpy_s(sidPeerMsg.val + params->authIdPeer in CalSidPeer()
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/iso_auth_task/
H A Diso_auth_task_common.c337 int32_t res = InitSingleParam(&(params->isoBaseParams.authIdPeer), HcStrlen(payloadHex) / BYTE_TO_HEX_OPER_LENGTH); in ExtractPeerAuthId()
342 if (HexStringToByte(payloadHex, params->isoBaseParams.authIdPeer.val, in ExtractPeerAuthId()
343 params->isoBaseParams.authIdPeer.length) != CLIB_SUCCESS) { in ExtractPeerAuthId()
380 if (memcmp(combineString, params->isoBaseParams.authIdPeer.val, len) != 0) { in ExtractAndVerifyPayload()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/lite_exchange_task/
H A Diso_client_bind_exchange_task.c74 ExtraInfo exInfo = { { params->baseParams.authIdPeer.val, params->baseParams.authIdPeer.length }, in DecAndImportInner()
H A Diso_server_bind_exchange_task.c135 ExtraInfo exInfo = { { params->baseParams.authIdPeer.val, params->baseParams.authIdPeer.length }, in ImportAuthCode()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_protocol_task/
H A Diso_client_protocol_task.c141 RETURN_IF_ERR(GetAuthIdPeerFromPayload(in, &(params->baseParams.authIdSelf), &(params->baseParams.authIdPeer))); in ParseServerStartMessage()
143 RETURN_IF_ERR(GetAndCheckAuthIdPeer(in, &(params->baseParams.authIdSelf), &(params->baseParams.authIdPeer))); in ParseServerStartMessage()
H A Diso_server_protocol_task.c91 &(params->baseParams.authIdPeer)), res); in IsoServerStart()
94 &(params->baseParams.authIdPeer)), res); in IsoServerStart()

Completed in 16 milliseconds