/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/ |
H A D | standard_exchange_message_util.c | 80 res = InitSingleParam(cipher, exAuthInfoLen - nonce->length); in ParseNonceAndCipherFromJson() 98 int res = InitSingleParam(&(params->baseParams.challengeSelf), PAKE_CHALLENGE_LEN); in GenerateSelfChallenge() 100 LOGE("InitSingleParam for challengeSelf failed, res: %d.", res); in GenerateSelfChallenge() 113 int res = InitSingleParam(&(params->baseParams.challengePeer), PAKE_CHALLENGE_LEN); in GetPeerChallenge() 115 LOGE("InitSingleParam for challengePeer failed, res: %d.", res); in GetPeerChallenge()
|
H A D | common_standard_bind_exchange.c | 148 res = InitSingleParam(&(exchangeParams->authInfo), HcStrlen(authInfoStr)); in PackageAuthInfo() 150 LOGE("InitSingleParam for authInfo failed."); in PackageAuthInfo() 241 res = InitSingleParam(&(exchangeParams->exInfoCipher), exchangeInfo.length + AE_TAG_LEN); in EncryptAuthAndSignInfo() 243 LOGE("InitSingleParam for failed."); in EncryptAuthAndSignInfo() 307 res = InitSingleParam(&(exchangeParams->authInfo), exchangeInfo.length - SIGNATURE_LEN); in DecryptAuthAndSignInfo() 309 LOGE("InitSingleParam for authInfo failed."); in DecryptAuthAndSignInfo()
|
/base/security/device_auth/services/protocol/inc/ |
H A D | protocol_common.h | 34 int32_t InitSingleParam(Uint8Buff *param, uint32_t len);
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common/ |
H A D | pake_protocol_dl_common.c | 107 res = InitSingleParam(&(params->eskSelf), params->eskSelf.length); in InitDlPakeParams() 109 LOGE("InitSingleParam for eskSelf failed, res: %x.", res); in InitDlPakeParams() 112 res = InitSingleParam(&(params->epkSelf), params->innerKeyLen); in InitDlPakeParams() 114 LOGE("InitSingleParam for epkSelf failed, res: %x.", res); in InitDlPakeParams() 117 res = InitSingleParam(&(params->base), params->innerKeyLen); in InitDlPakeParams() 119 LOGE("InitSingleParam for base failed, res: %x.", res); in InitDlPakeParams()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/ |
H A D | pake_protocol_ec_common.c | 59 int32_t res = InitSingleParam(&(params->eskSelf), params->eskSelf.length); in InitEcPakeParams() 61 LOGE("InitSingleParam for eskSelf failed, res: %x.", res); in InitEcPakeParams() 64 res = InitSingleParam(&(params->epkSelf), keyBufferLen); in InitEcPakeParams() 66 LOGE("InitSingleParam for epkSelf failed, res: %x.", res); in InitEcPakeParams() 69 res = InitSingleParam(&(params->base), keyBufferLen); in InitEcPakeParams() 71 LOGE("InitSingleParam for base failed, res: %x.", res); in InitEcPakeParams()
|
/base/security/device_auth/services/protocol/src/ |
H A D | protocol_common.c | 33 int32_t InitSingleParam(Uint8Buff *param, uint32_t len) in InitSingleParam() function
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_task_common.c | 133 if (InitSingleParam(param, len + 1) != HC_SUCCESS) { in InitCharStringBuff() 332 if (InitSingleParam(¶ms->pkInfoPeer, len) != HC_SUCCESS) { in GetPkInfoPeer() 369 if (InitSingleParam(¶ms->pkInfoSelf, pkInfoLen) != HC_SUCCESS) { in GetAsyPubKeyInfo() 370 LOGE("InitSingleParam: pkInfoSelf failed."); in GetAsyPubKeyInfo() 422 GOTO_IF_ERR(InitSingleParam(¶ms->pakeParams.epkPeer, P256_PUBLIC_SIZE)); in InitPakeAuthParams() 423 GOTO_IF_ERR(InitSingleParam(¶ms->pkInfoSignSelf, SIGNATURE_SIZE)); in InitPakeAuthParams() 424 GOTO_IF_ERR(InitSingleParam(¶ms->pkInfoSignPeer, SIGNATURE_SIZE)); in InitPakeAuthParams() 425 GOTO_IF_ERR(InitSingleParam(¶ms->pakeParams.idSelf, deviceIdLen + 1)); in InitPakeAuthParams()
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/iso_auth_task/ |
H A D | iso_auth_task_common.c | 73 int32_t res = InitSingleParam(¶ms->devIdSelf, DEV_AUTH_DEVICE_ID_SIZE); in FillPayload() 104 res = InitSingleParam(¶ms->isoBaseParams.authIdSelf, params->isoBaseParams.authIdSelf.length); in FillPayload() 152 res = InitSingleParam(outKey, AUTH_TOKEN_SIZE_BYTE); in GenerateAuthTokenForAccessory() 172 int32_t res = InitSingleParam(authTokenAlias, SHA256_LEN); in GenerateTokenAliasForController() 337 int32_t res = InitSingleParam(&(params->isoBaseParams.authIdPeer), HcStrlen(payloadHex) / BYTE_TO_HEX_OPER_LENGTH); in ExtractPeerAuthId() 339 LOGE("InitSingleParam for payload peer failed, res: %d.", res); in ExtractPeerAuthId()
|
/base/security/device_auth/services/key_agree_sdk/src/ |
H A D | key_agree_sdk.c | 112 if (InitSingleParam(&(spekeSession->sharedSecret), sharedSecret->length) != HC_SUCCESS) { in InitKeyAgreeStartSessionParams() 123 if (InitSingleParam(&(spekeSession->deviceId), deviceId->length) != HC_SUCCESS) { in InitKeyAgreeStartSessionParams()
|
H A D | key_agree_session.c | 60 int32_t res = InitSingleParam(authIdPeer, authIdLen); in GetIdPeer() 62 LOGE("InitSingleParam for peer authId failed, res: %d.", res); in GetIdPeer() 302 int32_t res = InitSingleParam(&(baseParams->epkPeer), HcStrlen(epkPeerHex) / BYTE_TO_HEX_OPER_LENGTH); in GetDasEpkPeerFromJson() 304 LOGE("InitSingleParam for epkPeer failed, res: %d.", res); in GetDasEpkPeerFromJson() 378 res = InitSingleParam(&(spekeSession->baseParam.extraData), versionStrLength); in FillExtraData() 380 LOGE("InitSingleParam for extraData failed, res: %d.", res); in FillExtraData() 404 int32_t res = InitSingleParam(&(spekeSession->baseParam.psk), spekeSession->sharedSecret.length); in FillPskAndDeviceId() 406 LOGE("InitSingleParam for psk failed, res: %d.", res); in FillPskAndDeviceId() 416 res = InitSingleParam(&(spekeSession->baseParam.idSelf), spekeSession->deviceId.length); in FillPskAndDeviceId() 418 LOGE("InitSingleParam fo in FillPskAndDeviceId() [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_message_util.c | 117 int res = InitSingleParam(&(params->baseParams.epkPeer), HcStrlen(epkPeerHex) / BYTE_TO_HEX_OPER_LENGTH); in GetDasEpkPeerFromJson() 119 LOGE("InitSingleParam for epkPeer failed, res: %d.", res); in GetDasEpkPeerFromJson()
|
H A D | pake_task_common.c | 125 int res = InitSingleParam(&(params->baseParams.psk), HcStrlen(pinString)); in FillPskWithPin() 127 LOGE("InitSingleParam for psk failed, res: %d.", res); in FillPskWithPin()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
H A D | pake_v1_protocol_common.c | 273 int32_t res = InitSingleParam(¶ms->sharedSecret, params->innerKeyLen); in GenerateSessionKey() 275 LOGE("InitSingleParam for sharedSecret failed, res: %x.", res); in GenerateSessionKey()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_protocol_task_common.c | 83 res = InitSingleParam(¶ms->returnKey, params->returnKey.length); in AllocReturnKey() 85 LOGE("InitSingleParam for returnKey failed, res: %d.", res); in AllocReturnKey() 246 int res = InitSingleParam(&(params->baseParams.psk), PAKE_PSK_LEN * BYTE_TO_HEX_OPER_LENGTH + 1); in ConvertPakeV1Psk() 248 LOGE("InitSingleParam for psk failed, res: %d.", res); in ConvertPakeV1Psk()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/common/ |
H A D | das_task_common.c | 475 int32_t res = InitSingleParam(authIdPeer, authIdLen); in GetIdPeer() 477 LOGE("InitSingleParam for peer authId failed, res: %d.", res); in GetIdPeer()
|