Searched refs:PRINT_DEBUG_MSG (Results 1 - 8 of 8) sorted by relevance
/base/security/device_auth/common_lib/interfaces/ |
H A D | string_util.h | 28 #define PRINT_DEBUG_MSG(msgBuff, msgLen, msgTag)
macro 30 #define PRINT_DEBUG_MSG(msgBuff, msgLen, msgTag) PrintBuffer(msgBuff, msgLen, msgTag)
macro
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/ |
H A D | pake_protocol_ec_common.c | 97 PRINT_DEBUG_MSG(params->base.val, params->base.length, "baseValue"); in GenerateEcPakeParams() 100 PRINT_DEBUG_MSG(params->eskSelf.val, params->eskSelf.length, "eskSelf"); in GenerateEcPakeParams() 106 PRINT_DEBUG_MSG(params->epkSelf.val, params->epkSelf.length, "epkSelf"); in GenerateEcPakeParams() 130 PRINT_DEBUG_MSG(params->epkPeer.val, params->epkPeer.length, "epkPeer"); in AgreeEcSharedSecret() 138 PRINT_DEBUG_MSG(sharedSecret->val, sharedSecret->length, "sharedSecret"); in AgreeEcSharedSecret()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
H A D | pake_v1_protocol_common.c | 188 PRINT_DEBUG_MSG(params->salt.val, params->salt.length, "saltValue"); in GeneratePakeParams() 195 PRINT_DEBUG_MSG(params->challengeSelf.val, params->challengeSelf.length, "challengeSelf"); in GeneratePakeParams() 201 PRINT_DEBUG_MSG(secret.val, secret.length, "secretValue"); in GeneratePakeParams() 251 PRINT_DEBUG_MSG(unionKey.val, unionKey.length, "unionKey"); in DeriveKeyFromSharedSecret() 258 PRINT_DEBUG_MSG(params->sessionKey.val, params->sessionKey.length, "sessionKey"); in DeriveKeyFromSharedSecret() 265 PRINT_DEBUG_MSG(params->hmacKey.val, params->hmacKey.length, "hmacKey"); in DeriveKeyFromSharedSecret() 313 PRINT_DEBUG_MSG(params->challengePeer.val, params->challengePeer.length, "challengePeer"); in GenerateProof() 320 PRINT_DEBUG_MSG(challenge.val, challenge.length, "challenge"); in GenerateProof() 328 PRINT_DEBUG_MSG(params->kcfData.val, params->kcfData.length, "kcfData"); in GenerateProof() 351 PRINT_DEBUG_MSG(challeng in VerifyProof() [all...] |
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
H A D | ec_speke_protocol.c | 141 PRINT_DEBUG_MSG(params->salt.val, params->salt.length, "saltValue"); in GetSaltFromInput() 161 PRINT_DEBUG_MSG(params->epkPeer.val, params->epkPeer.length, "epkPeer"); in GetEpkPeerFromInput() 176 PRINT_DEBUG_MSG(params->kcfDataPeer.val, params->kcfDataPeer.length, "kcfDataPeer"); in GetKcfDataPeerFromInput() 202 PRINT_DEBUG_MSG(params->salt.val, params->salt.length, "saltValue"); in CalSalt() 215 PRINT_DEBUG_MSG(secret->val, secret->length, "secretValue"); in CalSecret() 244 PRINT_DEBUG_MSG(params->base.val, params->base.length, "baseValue"); in EcSpekeCalBase() 274 PRINT_DEBUG_MSG(params->eskSelf.val, params->eskSelf.length, "eskSelf"); in EcSpekeCalEskSelf() 304 PRINT_DEBUG_MSG(params->epkSelf.val, params->epkSelf.length, "epkSelf"); in EcSpekeCalEpkSelf() 512 PRINT_DEBUG_MSG(params->sharedSecret.val, params->sharedSecret.length, "sharedSecret"); in CalSharedSecret() 606 PRINT_DEBUG_MSG(imp in CalKcfDataSelf() [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_message_util.c | 127 PRINT_DEBUG_MSG(params->baseParams.epkPeer.val, params->baseParams.epkPeer.length, "epkPeer"); in GetDasEpkPeerFromJson() 178 PRINT_DEBUG_MSG(params->baseParams.kcfDataPeer.val, params->baseParams.kcfDataPeer.length, "kcfDataPeer"); in ParsePakeClientConfirmMessage() 206 PRINT_DEBUG_MSG(params->baseParams.kcfDataPeer.val, params->baseParams.kcfDataPeer.length, "kcfDataPeer"); in ParsePakeServerConfirmMessage()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_client_protocol_task.c | 105 PRINT_DEBUG_MSG(params->baseParams.challengePeer.val, params->baseParams.challengePeer.length, "challengePeer"); in ParseMsgForClientConfirm()
|
H A D | pake_v1_server_protocol_task.c | 159 PRINT_DEBUG_MSG(params->baseParams.challengePeer.val, params->baseParams.challengePeer.length, "challengePeer"); in PakeServerConfirm()
|
H A D | pake_v1_protocol_task_common.c | 259 PRINT_DEBUG_MSG(srcPsk->val, srcPsk->length, "pskValue"); in ConvertPakeV1Psk() 317 PRINT_DEBUG_MSG(params->nonce.val, params->nonce.length, "nonceValue"); in FillPskWithDerivedKeyHex()
|
Completed in 7 milliseconds