/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_task_common.c | 174 params->baseParams.idPeer.length = authIdLen; in FillAuthId() 175 params->baseParams.idPeer.val = (uint8_t *)HcMalloc(params->baseParams.idPeer.length, 0); in FillAuthId() 176 if (params->baseParams.idPeer.val == NULL) { in FillAuthId() 177 LOGE("Malloc for idPeer failed."); in FillAuthId() 180 if (memcpy_s(params->baseParams.idPeer.val, params->baseParams.idPeer.length, in FillAuthId() 182 LOGE("Memcpy for idPeer failed."); in FillAuthId()
|
/base/security/device_auth/services/protocol/inc/pake_protocol/ |
H A D | pake_defs.h | 59 Uint8Buff idPeer; member
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
H A D | pake_v2_protocol_common.c | 59 HcFree(params->idPeer.val);
in DestroyPakeV2BaseParams() 60 params->idPeer.val = NULL;
in DestroyPakeV2BaseParams() 129 params->idPeer.val = NULL;
in FillDefaultValue() 130 params->idPeer.length = 0;
in FillDefaultValue() 246 Uint8Buff idPeerMsg = { NULL, params->idPeer.length + params->innerKeyLen };
in ComputeSidPeer() 254 if (memcpy_s(idPeerMsg.val, idPeerMsg.length, params->idPeer.val, params->idPeer.length) != EOK) {
in ComputeSidPeer() 255 LOGE("Memcpy for idPeer failed.");
in ComputeSidPeer() 259 if (memcpy_s(idPeerMsg.val + params->idPeer.length, idPeerMsg.length - params->idPeer in ComputeSidPeer() [all...] |
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
H A D | pake_v1_protocol_common.c | 61 HcFree(params->idPeer.val); in DestroyPakeV1BaseParams() 62 params->idPeer.val = NULL; in DestroyPakeV1BaseParams() 137 params->idPeer.val = NULL; in FillDefaultValue() 138 params->idPeer.length = 0; in FillDefaultValue()
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_task_common.c | 147 if (InitCharStringBuff(¶ms->pakeParams.idPeer, in ExtractPakePeerId() 149 LOGE("InitCharStringBuff: idPeer failed."); in ExtractPakePeerId() 152 (void)memcpy_s(params->pakeParams.idPeer.val, params->pakeParams.idPeer.length, params->devIdPeer.val, in ExtractPakePeerId() 154 (void)memcpy_s(params->pakeParams.idPeer.val + params->devIdPeer.length, in ExtractPakePeerId() 155 params->pakeParams.idPeer.length - params->devIdPeer.length, params->deviceIdPeer.val, deviceIdPeerLen); in ExtractPakePeerId() 309 LOGE("InitCharStringBuff: idPeer failed."); in ExtractPeerDevId()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_protocol_task_common.c | 144 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyTypePeer, &(params->baseParams.idPeer), in LoadPseudonymFlagIfNeed() 268 int32_t res = GenerateKeyAlias(&packageName, &serviceType, KEY_ALIAS_PSK, &(params->baseParams.idPeer), in GeneratePskAlias() 390 int32_t res = GeneratePseudonymPskAlias(&serviceTypeBuff, &(params->baseParams.idPeer), &pskAliasBuff); in LoadPseudonymExtInfoIfNeed() 454 int32_t res = GenerateKeyAlias(&pkgNameBuff, &serviceTypeBuff, KEY_ALIAS_PSK, ¶ms->baseParams.idPeer, in GeneratePseudonymPskIfNotExist() 467 res = GeneratePseudonymPskAlias(&serviceTypeBuff, ¶ms->baseParams.idPeer, &pskAliasBuff); in GeneratePseudonymPskIfNotExist() 572 res = GeneratePseudonymPskAlias(&serviceTypeBuff, &(params->baseParams.idPeer), &pskAlias); in GenerateSelfPseudonymChlgAndId() 665 res = GeneratePseudonymPskAlias(&serviceTypeBuff, &(params->baseParams.idPeer), &pskAlias); in CheckPseudonymIdByCompute() 795 int32_t res = GenerateKeyAlias(&pkgNameBuff, &serviceTypeBuff, KEY_ALIAS_PSK, ¶ms->baseParams.idPeer, in SaveExtInfoToPseudonymPsk() 826 res = GeneratePseudonymPskAlias(&serviceTypeBuff, &(params->baseParams.idPeer), &pskAlias); in SaveNextPseudonymIdAndChallenge()
|
H A D | pake_v1_client_protocol_task.c | 110 res = GetAndCheckAuthIdPeer(in, &(params->baseParams.idSelf), &(params->baseParams.idPeer)); in ParseMsgForClientConfirm()
|
H A D | pake_v1_server_protocol_task.c | 99 res = GetAndCheckAuthIdPeer(in, &(params->baseParams.idSelf), &(params->baseParams.idPeer)); in PakeResponse()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/ |
H A D | das_standard_token_manager.c | 254 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyTypePeer, &(params->baseParams.idPeer), peerKeyAlias); in GeneratePeerKeyAlias() 273 int32_t res = GenerateKeyAlias(&packageName, &serviceType, KEY_ALIAS_PSK, &(params->baseParams.idPeer), in GenerateSharedKeyAlias()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/ |
H A D | common_standard_bind_exchange.c | 342 &pakeParams->baseParams.idSelf, &pakeParams->baseParams.idPeer); in ParseAuthInfo() 409 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyType, &(pakeParams->baseParams.idPeer), in SaveAuthInfo() 418 ExtraInfo exInfo = { pakeParams->baseParams.idPeer, pakeParams->userType, PAIR_TYPE_BIND }; in SaveAuthInfo()
|
/base/security/device_auth/services/key_agree_sdk/src/ |
H A D | key_agree_session.c | 601 res = GetAuthIdPeerFromPayload(inParams, &(spekeSession->baseParam.idSelf), &(spekeSession->baseParam.idPeer)); in PakeConfirm() 631 res = GetAuthIdPeerFromPayload(inParams, &(spekeSession->baseParam.idSelf), &(spekeSession->baseParam.idPeer)); in PakeServerConfirm()
|
/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | deviceauth_interface_test.cpp | 912 pakeParams->baseParams.idPeer.val = (uint8_t *)TEST_AUTH_ID; in HWTEST_F() 913 pakeParams->baseParams.idPeer.length = strlen(TEST_AUTH_ID); in HWTEST_F()
|