Home
last modified time | relevance | path

Searched refs:innerKeyLen (Results 1 - 7 of 7) sorted by relevance

/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common/
H A Dpake_protocol_dl_common.c66 params->innerKeyLen = PAKE_DL_PRIME_LEN; in FillDlKeysLenAccordingToEpkPeer()
72 params->innerKeyLen = PAKE_DL_PRIME_SMALL_LEN; in FillDlKeysLenAccordingToEpkPeer()
83 params->innerKeyLen = PAKE_DL_PRIME_LEN; in FillDlKeysLenAccordingToMod()
88 params->innerKeyLen = PAKE_DL_PRIME_SMALL_LEN; in FillDlKeysLenAccordingToMod()
112 res = InitSingleParam(&(params->epkSelf), params->innerKeyLen); in InitDlPakeParams()
117 res = InitSingleParam(&(params->base), params->innerKeyLen); in InitDlPakeParams()
139 params->largePrimeNumHex = (params->innerKeyLen == PAKE_DL_PRIME_SMALL_LEN) ? in GenerateDlPakeParams()
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
H A Dpake_v2_protocol_common.c137 params->innerKeyLen = 0; in FillDefaultValue()
214 Uint8Buff idSelfMsg = { NULL, params->idSelf.length + params->innerKeyLen }; in ComputeSidSelf()
228 params->epkSelf.val, params->innerKeyLen) != EOK) { // only need x-coordinate in ComputeSidSelf()
246 Uint8Buff idPeerMsg = { NULL, params->idPeer.length + params->innerKeyLen }; in ComputeSidPeer()
260 params->epkPeer.val, params->innerKeyLen) != EOK) { // only need x-coordinate in ComputeSidPeer()
335 sharedSecretMsg.length = sid->length + params->innerKeyLen + HcStrlen(SHARED_SECRET_DERIVED_FACTOR); in ComputeSharedSecret()
350 tmpSharedSecret->val, params->innerKeyLen) != EOK) { // Only need x-coordinate in ComputeSharedSecret()
355 usedLen += params->innerKeyLen; in ComputeSharedSecret()
387 tmpSharedSecret.length = (params->curveType == CURVE_256) ? (params->innerKeyLen * 2) : (params->innerKeyLen); in GenerateSharedSecret()
[all...]
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/
H A Ddl_speke_protocol.c87 uint32_t innerKeyLen; member
221 params->innerKeyLen = DL_SPEKE_PRIME_LEN; in SetSelfKeyLenByMod()
226 params->innerKeyLen = DL_SPEKE_PRIME_SMALL_LEN; in SetSelfKeyLenByMod()
274 params->innerKeyLen = DL_SPEKE_PRIME_LEN; in SetSelfKeyLenByEpkPeerAndMod()
280 params->innerKeyLen = DL_SPEKE_PRIME_SMALL_LEN; in SetSelfKeyLenByEpkPeerAndMod()
289 if (InitUint8Buff(&params->base, params->innerKeyLen) != HC_SUCCESS) { in DlSpekeCalBase()
295 params->largePrimeNumHex = (params->innerKeyLen == DL_SPEKE_PRIME_SMALL_LEN) ? in DlSpekeCalBase()
319 if (InitUint8Buff(&params->epkSelf, params->innerKeyLen) != HC_SUCCESS) { in DlSpekeCalEpkSelf()
369 uint32_t sidSelfMsgLen = params->authIdSelf.length + params->innerKeyLen; in CalSidSelf()
381 params->epkSelf.val, params->innerKeyLen) ! in CalSidSelf()
[all...]
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/
H A Dpake_protocol_ec_common.c56 params->innerKeyLen = PAKE_EC_KEY_LEN; in InitEcPakeParams()
58 uint32_t keyBufferLen = (params->curveType == CURVE_256) ? (params->innerKeyLen * 2) : (params->innerKeyLen); in InitEcPakeParams()
/base/security/device_auth/services/protocol/inc/pake_protocol/
H A Dpake_defs.h66 uint32_t innerKeyLen; member
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/
H A Dpake_v1_protocol_common.c143 params->innerKeyLen = 0; in FillDefaultValue()
273 int32_t res = InitSingleParam(&params->sharedSecret, params->innerKeyLen); in GenerateSessionKey()
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/
H A Dhuks_adapter.c2100 uint32_t innerKeyLen = HcStrlen(primeHex) / BYTE_TO_HEX_OPER_LENGTH; in CheckDlPublicKey() local
2101 if (key->length > innerKeyLen) { in CheckDlPublicKey()
2105 uint8_t *primeByte = (uint8_t *)HcMalloc(innerKeyLen, 0); in CheckDlPublicKey()
2110 if (HexStringToByte(primeHex, primeByte, innerKeyLen) != HAL_SUCCESS) { in CheckDlPublicKey()
2119 primeByte[innerKeyLen - 1] -= 1; in CheckDlPublicKey()
2128 Uint8Buff primeBuff = { primeByte, innerKeyLen }; in CheckDlPublicKey()

Completed in 9 milliseconds