/base/security/device_auth/services/protocol/src/iso_protocol/ |
H A D | iso_protocol_common.c | 103 int usedLen = 0; in IsoCalSelfToken() local 109 usedLen += params->randPeer.length; in IsoCalSelfToken() 110 if (memcpy_s(messagePeer + usedLen, length - usedLen, params->randSelf.val, params->randSelf.length) != EOK) { in IsoCalSelfToken() 115 usedLen += params->randSelf.length; in IsoCalSelfToken() 116 if (memcpy_s(messagePeer + usedLen, length - usedLen, params->authIdSelf.val, params->authIdSelf.length) != EOK) { in IsoCalSelfToken() 121 usedLen += params->authIdSelf.length; in IsoCalSelfToken() 122 if (memcpy_s(messagePeer + usedLen, length - usedLen, param in IsoCalSelfToken() 150 int usedLen = 0; IsoCalPeerToken() local [all...] |
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
H A D | pake_v2_protocol_common.c | 342 uint32_t usedLen = 0;
in ComputeSharedSecret() local 348 usedLen += sid->length;
in ComputeSharedSecret() 349 if (memcpy_s(sharedSecretMsg.val + usedLen, sharedSecretMsg.length - usedLen,
in ComputeSharedSecret() 355 usedLen += params->innerKeyLen;
in ComputeSharedSecret() 356 if (memcpy_s(sharedSecretMsg.val + usedLen, sharedSecretMsg.length - usedLen,
in ComputeSharedSecret() 432 Uint8Buff *proofMsg, uint32_t *usedLen)
in CombineEpk() 434 if (memcpy_s(proofMsg->val + *usedLen, proofMsg->length - *usedLen,
in CombineEpk() 431 CombineEpk(const Uint8Buff *epkClient, const Uint8Buff *epkServer, uint32_t epkLenX, Uint8Buff *proofMsg, uint32_t *usedLen) CombineEpk() argument 452 uint32_t usedLen = 0; CombineProofMsg() local [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/common/ |
H A D | das_task_common.c | 214 uint32_t usedLen = 0; in CombineKeyAlias() local 220 usedLen = usedLen + serviceId->length; in CombineKeyAlias() 222 if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, keyType->val, keyType->length) != EOK) { in CombineKeyAlias() 227 usedLen = usedLen + keyType->length; in CombineKeyAlias() 229 if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, authId->val, authId->length) != EOK) { in CombineKeyAlias() 257 uint32_t usedLen in CombineKeyAliasForPseudonymPsk() local [all...] |
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
H A D | iso_protocol.c | 78 int32_t usedLen = 0; in BuildSelfTokenMessage() local 83 usedLen += params->randSelf.length; in BuildSelfTokenMessage() 84 if (memcpy_s(message + usedLen, messageLen - usedLen, params->randPeer.val, params->randPeer.length) != EOK) { in BuildSelfTokenMessage() 88 usedLen += params->randPeer.length; in BuildSelfTokenMessage() 89 if (memcpy_s(message + usedLen, messageLen - usedLen, params->authIdPeer.val, params->authIdPeer.length) != EOK) { in BuildSelfTokenMessage() 93 usedLen += params->authIdPeer.length; in BuildSelfTokenMessage() 94 if (memcpy_s(message + usedLen, messageLen - usedLen, param in BuildSelfTokenMessage() 118 int32_t usedLen = 0; BuildPeerTokenMessage() local [all...] |
H A D | dl_speke_protocol.c | 457 uint32_t usedLen = 0; in CombineSharedSecretMsg() local 462 usedLen += sid->length; in CombineSharedSecretMsg() 464 if (memcpy_s(sharedSecretMsg->val + usedLen, sharedSecretMsg->length - usedLen, in CombineSharedSecretMsg() 469 usedLen += params->innerKeyLen; in CombineSharedSecretMsg() 470 if (memcpy_s(sharedSecretMsg->val + usedLen, sharedSecretMsg->length - usedLen, in CombineSharedSecretMsg() 530 static int32_t CombineProtectedMsg(DlSpekeProtocol *impl, bool isVerify, Uint8Buff *kcfDataMsg, uint32_t usedLen) in CombineProtectedMsg() argument 535 if (memcpy_s(kcfDataMsg->val + usedLen, kcfDataMsg->length - usedLen, in CombineProtectedMsg() 560 uint32_t usedLen = DL_SPEKE_KCF_CODE_LEN; GenerateKcfDataMsg() local [all...] |
H A D | ec_speke_protocol.c | 428 uint32_t usedLen = 0; in CombineSharedSecretMsg() local 433 usedLen += sid->length; in CombineSharedSecretMsg() 435 if (memcpy_s(sharedSecretMsg->val + usedLen, sharedSecretMsg->length - usedLen, in CombineSharedSecretMsg() 440 usedLen += EC_SPEKE_EC_KEY_LEN; in CombineSharedSecretMsg() 441 if (memcpy_s(sharedSecretMsg->val + usedLen, sharedSecretMsg->length - usedLen, in CombineSharedSecretMsg() 516 static int32_t CombineProtectedMsg(EcSpekeProtocol *impl, bool isVerify, Uint8Buff *kcfDataMsg, uint32_t usedLen) in CombineProtectedMsg() argument 521 if (memcpy_s(kcfDataMsg->val + usedLen, kcfDataMsg->length - usedLen, in CombineProtectedMsg() 546 uint32_t usedLen = EC_SPEKE_KCF_CODE_LEN; GenerateKcfDataMsg() local [all...] |
/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/ |
H A D | auth_code_import.c | 103 uint32_t usedLen = 0; in BuildKeyAliasMsg() local 108 usedLen = usedLen + serviceId->length; in BuildKeyAliasMsg() 109 if (memcpy_s(keyAliasMsg->val + usedLen, keyAliasMsg->length - usedLen, keyType->val, keyType->length) != EOK) { in BuildKeyAliasMsg() 113 usedLen = usedLen + keyType->length; in BuildKeyAliasMsg() 114 if (memcpy_s(keyAliasMsg->val + usedLen, keyAliasMsg->length - usedLen, authId->val, authId->length) != EOK) { in BuildKeyAliasMsg()
|
H A D | pub_key_exchange.c | 103 uint32_t usedLen = 0; in BuildKeyAliasMsg() local 108 usedLen = usedLen + serviceId->length; in BuildKeyAliasMsg() 109 if (memcpy_s(keyAliasMsg->val + usedLen, keyAliasMsg->length - usedLen, keyType->val, keyType->length) != EOK) { in BuildKeyAliasMsg() 113 usedLen = usedLen + keyType->length; in BuildKeyAliasMsg() 114 if (memcpy_s(keyAliasMsg->val + usedLen, keyAliasMsg->length - usedLen, authId->val, authId->length) != EOK) { in BuildKeyAliasMsg()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/ |
H A D | common_standard_bind_exchange.c | 185 uint32_t usedLen = pakeParams->baseParams.challengeSelf.length; in GenerateSignInfo() local 187 if (memcpy_s(msgInfo.val + usedLen, msgInfo.length - usedLen, pakeParams->baseParams.challengePeer.val, in GenerateSignInfo() 193 usedLen += pakeParams->baseParams.challengePeer.length; in GenerateSignInfo() 195 if (memcpy_s(msgInfo.val + usedLen, msgInfo.length - usedLen, exchangeParams->authInfo.val, in GenerateSignInfo() 369 uint32_t usedLen = pakeParams->baseParams.challengePeer.length; in VerifySignInfo() local 370 if (memcpy_s(verifyMsg.val + usedLen, verifyMsg.length - usedLen, pakeParams->baseParams.challengeSelf.val, in VerifySignInfo() 375 usedLen in VerifySignInfo() [all...] |
/base/security/device_auth/services/identity_manager/src/ |
H A D | credential_operator.c | 77 uint32_t usedLen = 0; in CombineKeyAlias() local 83 usedLen = usedLen + serviceId->length; in CombineKeyAlias() 84 if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, keyType->val, keyType->length) != EOK) { in CombineKeyAlias() 89 usedLen = usedLen + keyType->length; in CombineKeyAlias() 90 if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, authId->val, authId->length) != EOK) { in CombineKeyAlias()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_protocol_task_common.c | 432 uint32_t usedLen = 0; in CombinePseudonymChallenge() local 438 usedLen = usedLen + pseudonymChallengeBuff->length; in CombinePseudonymChallenge() 440 if (memcpy_s(combinedChallengeBuff->val + usedLen, totalLen - usedLen, nextPseudonymChallengeBuff->val, in CombinePseudonymChallenge()
|