/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/ |
H A D | pake_protocol_ec_common.c | 64 res = InitSingleParam(&(params->epkSelf), keyBufferLen); in InitEcPakeParams() 66 LOGE("InitSingleParam for epkSelf failed, res: %x.", res); in InitEcPakeParams() 101 res = params->loader->agreeSharedSecret(&eskSelfParams, &baseBuff, alg, ¶ms->epkSelf); in GenerateEcPakeParams() 106 PRINT_DEBUG_MSG(params->epkSelf.val, params->epkSelf.length, "epkSelf"); in GenerateEcPakeParams()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_message_util.c | 90 res = AddByteToJson(payload, FIELD_EPK, params->baseParams.epkSelf.val, params->baseParams.epkSelf.length); in PackagePakeResponseData() 92 LOGE("Add epkSelf failed, res: %d.", res); in PackagePakeResponseData() 156 int32_t res = AddByteToJson(payload, FIELD_EPK, params->baseParams.epkSelf.val, params->baseParams.epkSelf.length); in PackagePakeClientConfirmData() 158 LOGE("Add epkSelf failed, res: %d.", res); in PackagePakeClientConfirmData()
|
/base/security/device_auth/services/protocol/inc/pake_protocol/ |
H A D | pake_defs.h | 56 Uint8Buff epkSelf; member
|
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
H A D | ec_speke_protocol.c | 62 Uint8Buff epkSelf; member 285 res = InitUint8Buff(¶ms->epkSelf, 2 * EC_SPEKE_EC_KEY_LEN); in EcSpekeCalEpkSelf() 288 res = InitUint8Buff(¶ms->epkSelf, EC_SPEKE_EC_KEY_LEN); in EcSpekeCalEpkSelf() 294 LOGE("allocate epkSelf memory fail."); in EcSpekeCalEpkSelf() 299 res = GetLoaderInstance()->agreeSharedSecret(&eskSelfParams, &baseBuff, algo, ¶ms->epkSelf); in EcSpekeCalEpkSelf() 301 LOGE("AgreeSharedSecret for epkSelf failed, res: %x", res); in EcSpekeCalEpkSelf() 304 PRINT_DEBUG_MSG(params->epkSelf.val, params->epkSelf.length, "epkSelf"); in EcSpekeCalEpkSelf() 353 params->epkSelf in CalSidSelf() [all...] |
H A D | dl_speke_protocol.c | 80 Uint8Buff epkSelf; member 319 if (InitUint8Buff(¶ms->epkSelf, params->innerKeyLen) != HC_SUCCESS) { in DlSpekeCalEpkSelf() 320 LOGE("Failed to init epkSelf!"); in DlSpekeCalEpkSelf() 324 params->largePrimeNumHex, &(params->epkSelf)); in DlSpekeCalEpkSelf() 326 LOGE("BigNumExpMod for epkSelf failed, res: %x.", res); in DlSpekeCalEpkSelf() 381 params->epkSelf.val, params->innerKeyLen) != EOK) { // only need x-coordinate in CalSidSelf() 561 Uint8Buff *epkClient = isClient ? ¶ms->epkSelf : ¶ms->epkPeer; in GenerateKcfDataMsg() 562 Uint8Buff *epkServer = isClient ? ¶ms->epkPeer : ¶ms->epkSelf; in GenerateKcfDataMsg() 711 if (AddByteToJson(json, FIELD_EPK_SERVER, params->epkSelf.val, params->epkSelf in DlSpekeServerStartRspBuildEvent() [all...] |
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common/ |
H A D | pake_protocol_dl_common.c | 112 res = InitSingleParam(&(params->epkSelf), params->innerKeyLen); in InitDlPakeParams() 114 LOGE("InitSingleParam for epkSelf failed, res: %x.", res); in InitDlPakeParams() 147 res = params->loader->bigNumExpMod(¶ms->base, &(params->eskSelf), params->largePrimeNumHex, &(params->epkSelf)); in GenerateDlPakeParams() 149 LOGE("BigNumExpMod for epkSelf failed, res: %x.", res); in GenerateDlPakeParams()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
H A D | pake_v2_protocol_common.c | 50 HcFree(params->epkSelf.val);
in DestroyPakeV2BaseParams() 51 params->epkSelf.val = NULL;
in DestroyPakeV2BaseParams() 121 params->epkSelf.val = NULL;
in FillDefaultValue() 122 params->epkSelf.length = 0;
in FillDefaultValue() 228 params->epkSelf.val, params->innerKeyLen) != EOK) { // only need x-coordinate
in ComputeSidSelf() 229 LOGE("Memcpy for epkSelf failed.");
in ComputeSidSelf() 466 res = CombineEpk(¶ms->epkSelf, ¶ms->epkPeer, params->innerKeyLen, proofMsg, &usedLen);
in CombineProofMsg() 468 res = CombineEpk(¶ms->epkPeer, ¶ms->epkSelf, params->innerKeyLen, proofMsg, &usedLen);
in CombineProofMsg()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
H A D | pake_v1_protocol_common.c | 46 HcFree(params->epkSelf.val); in DestroyPakeV1BaseParams() 47 params->epkSelf.val = NULL; in DestroyPakeV1BaseParams() 127 params->epkSelf.val = NULL; in FillDefaultValue() 128 params->epkSelf.length = 0; in FillDefaultValue()
|
/base/security/device_auth/services/key_agree_sdk/src/ |
H A D | key_agree_session.c | 331 int32_t res = AddByteToJson(payload, FIELD_EPK, baseParams->epkSelf.val, baseParams->epkSelf.length); in PackagePakeClientConfirmData() 333 LOGE("Add epkSelf failed, res: %d.", res); in PackagePakeClientConfirmData() 473 res = AddByteToJson(payload, FIELD_EPK, baseParams->epkSelf.val, baseParams->epkSelf.length); in PackagePakeResponseData() 475 LOGE("Add epkSelf failed, res: %d.", res); in PackagePakeResponseData()
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_client_task.c | 124 GOTO_ERR_AND_SET_RET(AddByteToJson(data, FIELD_EPK, innerTask->params.pakeParams.epkSelf.val, in PrepareAsyClientStepTwoData() 125 innerTask->params.pakeParams.epkSelf.length), ret); in PrepareAsyClientStepTwoData()
|
H A D | pake_v2_auth_server_task.c | 103 GOTO_ERR_AND_SET_RET(AddByteToJson(data, FIELD_EPK, innerTask->params.pakeParams.epkSelf.val, in PrepareAsyServerStepOneData() 104 innerTask->params.pakeParams.epkSelf.length), ret); in PrepareAsyServerStepOneData()
|