Home
last modified time | relevance | path

Searched refs:usedLen (Results 1 - 11 of 11) sorted by relevance

/base/security/device_auth/services/protocol/src/iso_protocol/
H A Diso_protocol_common.c103 int usedLen = 0; in IsoCalSelfToken() local
109 usedLen += params->randPeer.length; in IsoCalSelfToken()
110 if (memcpy_s(messagePeer + usedLen, length - usedLen, params->randSelf.val, params->randSelf.length) != EOK) { in IsoCalSelfToken()
115 usedLen += params->randSelf.length; in IsoCalSelfToken()
116 if (memcpy_s(messagePeer + usedLen, length - usedLen, params->authIdSelf.val, params->authIdSelf.length) != EOK) { in IsoCalSelfToken()
121 usedLen += params->authIdSelf.length; in IsoCalSelfToken()
122 if (memcpy_s(messagePeer + usedLen, length - usedLen, param in IsoCalSelfToken()
150 int usedLen = 0; IsoCalPeerToken() local
[all...]
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
H A Dpake_v2_protocol_common.c342 uint32_t usedLen = 0; in ComputeSharedSecret() local
348 usedLen += sid->length; in ComputeSharedSecret()
349 if (memcpy_s(sharedSecretMsg.val + usedLen, sharedSecretMsg.length - usedLen, in ComputeSharedSecret()
355 usedLen += params->innerKeyLen; in ComputeSharedSecret()
356 if (memcpy_s(sharedSecretMsg.val + usedLen, sharedSecretMsg.length - usedLen, in ComputeSharedSecret()
432 Uint8Buff *proofMsg, uint32_t *usedLen) in CombineEpk()
434 if (memcpy_s(proofMsg->val + *usedLen, proofMsg->length - *usedLen, in CombineEpk()
431 CombineEpk(const Uint8Buff *epkClient, const Uint8Buff *epkServer, uint32_t epkLenX, Uint8Buff *proofMsg, uint32_t *usedLen) CombineEpk() argument
452 uint32_t usedLen = 0; CombineProofMsg() local
[all...]
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/common/
H A Ddas_task_common.c214 uint32_t usedLen = 0; in CombineKeyAlias() local
220 usedLen = usedLen + serviceId->length; in CombineKeyAlias()
222 if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, keyType->val, keyType->length) != EOK) { in CombineKeyAlias()
227 usedLen = usedLen + keyType->length; in CombineKeyAlias()
229 if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, authId->val, authId->length) != EOK) { in CombineKeyAlias()
257 uint32_t usedLen in CombineKeyAliasForPseudonymPsk() local
[all...]
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/
H A Diso_protocol.c78 int32_t usedLen = 0; in BuildSelfTokenMessage() local
83 usedLen += params->randSelf.length; in BuildSelfTokenMessage()
84 if (memcpy_s(message + usedLen, messageLen - usedLen, params->randPeer.val, params->randPeer.length) != EOK) { in BuildSelfTokenMessage()
88 usedLen += params->randPeer.length; in BuildSelfTokenMessage()
89 if (memcpy_s(message + usedLen, messageLen - usedLen, params->authIdPeer.val, params->authIdPeer.length) != EOK) { in BuildSelfTokenMessage()
93 usedLen += params->authIdPeer.length; in BuildSelfTokenMessage()
94 if (memcpy_s(message + usedLen, messageLen - usedLen, param in BuildSelfTokenMessage()
118 int32_t usedLen = 0; BuildPeerTokenMessage() local
[all...]
H A Ddl_speke_protocol.c457 uint32_t usedLen = 0; in CombineSharedSecretMsg() local
462 usedLen += sid->length; in CombineSharedSecretMsg()
464 if (memcpy_s(sharedSecretMsg->val + usedLen, sharedSecretMsg->length - usedLen, in CombineSharedSecretMsg()
469 usedLen += params->innerKeyLen; in CombineSharedSecretMsg()
470 if (memcpy_s(sharedSecretMsg->val + usedLen, sharedSecretMsg->length - usedLen, in CombineSharedSecretMsg()
530 static int32_t CombineProtectedMsg(DlSpekeProtocol *impl, bool isVerify, Uint8Buff *kcfDataMsg, uint32_t usedLen) in CombineProtectedMsg() argument
535 if (memcpy_s(kcfDataMsg->val + usedLen, kcfDataMsg->length - usedLen, in CombineProtectedMsg()
560 uint32_t usedLen = DL_SPEKE_KCF_CODE_LEN; GenerateKcfDataMsg() local
[all...]
H A Dec_speke_protocol.c428 uint32_t usedLen = 0; in CombineSharedSecretMsg() local
433 usedLen += sid->length; in CombineSharedSecretMsg()
435 if (memcpy_s(sharedSecretMsg->val + usedLen, sharedSecretMsg->length - usedLen, in CombineSharedSecretMsg()
440 usedLen += EC_SPEKE_EC_KEY_LEN; in CombineSharedSecretMsg()
441 if (memcpy_s(sharedSecretMsg->val + usedLen, sharedSecretMsg->length - usedLen, in CombineSharedSecretMsg()
516 static int32_t CombineProtectedMsg(EcSpekeProtocol *impl, bool isVerify, Uint8Buff *kcfDataMsg, uint32_t usedLen) in CombineProtectedMsg() argument
521 if (memcpy_s(kcfDataMsg->val + usedLen, kcfDataMsg->length - usedLen, in CombineProtectedMsg()
546 uint32_t usedLen = EC_SPEKE_KCF_CODE_LEN; GenerateKcfDataMsg() local
[all...]
/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/
H A Dauth_code_import.c103 uint32_t usedLen = 0; in BuildKeyAliasMsg() local
108 usedLen = usedLen + serviceId->length; in BuildKeyAliasMsg()
109 if (memcpy_s(keyAliasMsg->val + usedLen, keyAliasMsg->length - usedLen, keyType->val, keyType->length) != EOK) { in BuildKeyAliasMsg()
113 usedLen = usedLen + keyType->length; in BuildKeyAliasMsg()
114 if (memcpy_s(keyAliasMsg->val + usedLen, keyAliasMsg->length - usedLen, authId->val, authId->length) != EOK) { in BuildKeyAliasMsg()
H A Dpub_key_exchange.c103 uint32_t usedLen = 0; in BuildKeyAliasMsg() local
108 usedLen = usedLen + serviceId->length; in BuildKeyAliasMsg()
109 if (memcpy_s(keyAliasMsg->val + usedLen, keyAliasMsg->length - usedLen, keyType->val, keyType->length) != EOK) { in BuildKeyAliasMsg()
113 usedLen = usedLen + keyType->length; in BuildKeyAliasMsg()
114 if (memcpy_s(keyAliasMsg->val + usedLen, keyAliasMsg->length - usedLen, authId->val, authId->length) != EOK) { in BuildKeyAliasMsg()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/
H A Dcommon_standard_bind_exchange.c185 uint32_t usedLen = pakeParams->baseParams.challengeSelf.length; in GenerateSignInfo() local
187 if (memcpy_s(msgInfo.val + usedLen, msgInfo.length - usedLen, pakeParams->baseParams.challengePeer.val, in GenerateSignInfo()
193 usedLen += pakeParams->baseParams.challengePeer.length; in GenerateSignInfo()
195 if (memcpy_s(msgInfo.val + usedLen, msgInfo.length - usedLen, exchangeParams->authInfo.val, in GenerateSignInfo()
369 uint32_t usedLen = pakeParams->baseParams.challengePeer.length; in VerifySignInfo() local
370 if (memcpy_s(verifyMsg.val + usedLen, verifyMsg.length - usedLen, pakeParams->baseParams.challengeSelf.val, in VerifySignInfo()
375 usedLen in VerifySignInfo()
[all...]
/base/security/device_auth/services/identity_manager/src/
H A Dcredential_operator.c77 uint32_t usedLen = 0; in CombineKeyAlias() local
83 usedLen = usedLen + serviceId->length; in CombineKeyAlias()
84 if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, keyType->val, keyType->length) != EOK) { in CombineKeyAlias()
89 usedLen = usedLen + keyType->length; in CombineKeyAlias()
90 if (memcpy_s(keyAliasBuff.val + usedLen, totalLen - usedLen, authId->val, authId->length) != EOK) { in CombineKeyAlias()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/
H A Dpake_v1_protocol_task_common.c432 uint32_t usedLen = 0; in CombinePseudonymChallenge() local
438 usedLen = usedLen + pseudonymChallengeBuff->length; in CombinePseudonymChallenge()
440 if (memcpy_s(combinedChallengeBuff->val + usedLen, totalLen - usedLen, nextPseudonymChallengeBuff->val, in CombinePseudonymChallenge()

Completed in 13 milliseconds