Home
last modified time | relevance | path

Searched refs:supportedDlPrimeMod (Results 1 - 9 of 9) sorted by relevance

/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common/
H A Dpake_protocol_dl_common.c64 (((uint32_t)params->supportedDlPrimeMod & DL_PRIME_MOD_384) != 0)) { in FillDlKeysLenAccordingToEpkPeer()
70 (((uint32_t)params->supportedDlPrimeMod & DL_PRIME_MOD_256) != 0)) { in FillDlKeysLenAccordingToEpkPeer()
75 LOGE("PAKE DL mod: %x, Invalid epkPeer length: %u.", params->supportedDlPrimeMod, params->epkPeer.length); in FillDlKeysLenAccordingToEpkPeer()
81 if (((uint32_t)params->supportedDlPrimeMod & DL_PRIME_MOD_384) != 0) { in FillDlKeysLenAccordingToMod()
86 if (((uint32_t)params->supportedDlPrimeMod & DL_PRIME_MOD_256) != 0) { in FillDlKeysLenAccordingToMod()
91 LOGE("Unsupported PAKE DL mod: %x.", params->supportedDlPrimeMod); in FillDlKeysLenAccordingToMod()
161 (((uint32_t)params->supportedDlPrimeMod & DL_PRIME_MOD_384) != 0)) { in IsEpkPeerLenInvalid()
165 (((uint32_t)params->supportedDlPrimeMod & DL_PRIME_MOD_256) != 0)) { in IsEpkPeerLenInvalid()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/
H A Dpake_message_util.c28 (((uint32_t)params->baseParams.supportedDlPrimeMod | DL_PRIME_MOD_256) == DL_PRIME_MOD_256); in PackagePakeRequestData()
61 params->baseParams.supportedDlPrimeMod = is256ModSupported ? in ParsePakeRequestMessage()
62 (params->baseParams.supportedDlPrimeMod & DL_PRIME_MOD_256) : in ParsePakeRequestMessage()
63 (params->baseParams.supportedDlPrimeMod & DL_PRIME_MOD_384); in ParsePakeRequestMessage()
H A Dpake_task_common.c303 params->baseParams.supportedDlPrimeMod = (uint32_t)params->baseParams.supportedDlPrimeMod | DL_PRIME_MOD_384; in FillDasPakeParams()
306 params->baseParams.supportedDlPrimeMod = (uint32_t)params->baseParams.supportedDlPrimeMod | DL_PRIME_MOD_256; in FillDasPakeParams()
/base/security/device_auth/services/protocol/inc/pake_protocol/
H A Dpake_defs.h68 PakeDlPrimeMod supportedDlPrimeMod; // default: DL_PRIME_MOD_NONE member
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/
H A Dpake_v2_auth_task_common.c438 params->pakeParams.supportedDlPrimeMod = (uint32_t)params->pakeParams.supportedDlPrimeMod | DL_PRIME_MOD_384; in InitPakeAuthParams()
441 params->pakeParams.supportedDlPrimeMod = (uint32_t)params->pakeParams.supportedDlPrimeMod | DL_PRIME_MOD_256; in InitPakeAuthParams()
/base/security/device_auth/test/unittest/deviceauth/source/
H A Ddeviceauth_interface_test.cpp203 baseParams->supportedDlPrimeMod = DL_PRIME_MOD_384; in HWTEST_F()
207 baseParams->supportedDlPrimeMod = DL_PRIME_MOD_256; in HWTEST_F()
210 baseParams->supportedDlPrimeMod = DL_PRIME_MOD_384; in HWTEST_F()
213 baseParams->supportedDlPrimeMod = DL_PRIME_MOD_256; in HWTEST_F()
216 baseParams->supportedDlPrimeMod = DL_PRIME_MOD_NONE; in HWTEST_F()
219 baseParams->supportedDlPrimeMod = DL_PRIME_MOD_256; in HWTEST_F()
224 baseParams->supportedDlPrimeMod = DL_PRIME_MOD_NONE; in HWTEST_F()
228 baseParams->supportedDlPrimeMod = DL_PRIME_MOD_384; in HWTEST_F()
232 baseParams->supportedDlPrimeMod = DL_PRIME_MOD_256; in HWTEST_F()
/base/security/device_auth/services/key_agree_sdk/src/
H A Dkey_agree_session.c743 spekeSession->baseParam.supportedDlPrimeMod = in InitSpekeSession()
744 spekeSession->baseParam.supportedDlPrimeMod | DL_PRIME_MOD_256; in InitSpekeSession()
749 spekeSession->baseParam.supportedDlPrimeMod = in InitSpekeSession()
750 spekeSession->baseParam.supportedDlPrimeMod | DL_PRIME_MOD_384; in InitSpekeSession()
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/
H A Dpake_v1_protocol_common.c141 params->supportedDlPrimeMod = DL_PRIME_MOD_NONE; in FillDefaultValue()
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
H A Dpake_v2_protocol_common.c135 params->supportedDlPrimeMod = DL_PRIME_MOD_NONE; in FillDefaultValue()

Completed in 8 milliseconds