/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common/ |
H A D | pake_protocol_dl_common.c | 63 if ((params->epkPeer.length == PAKE_DL_PRIME_LEN) && in FillDlKeysLenAccordingToEpkPeer() 69 if ((params->epkPeer.length == PAKE_DL_PRIME_SMALL_LEN) && in FillDlKeysLenAccordingToEpkPeer() 75 LOGE("PAKE DL mod: %x, Invalid epkPeer length: %u.", params->supportedDlPrimeMod, params->epkPeer.length); in FillDlKeysLenAccordingToEpkPeer() 160 if ((params->epkPeer.length == PAKE_DL_PRIME_LEN) && in IsEpkPeerLenInvalid() 164 if ((params->epkPeer.length == PAKE_DL_PRIME_SMALL_LEN) && in IsEpkPeerLenInvalid() 168 LOGE("Invalid epkPeer length: %u.", params->epkPeer.length); in IsEpkPeerLenInvalid() 179 if (!params->loader->checkDlPublicKey(&(params->epkPeer), params->largePrimeNumHex)) { in AgreeDlSharedSecret() 184 res = params->loader->bigNumExpMod(&(params->epkPeer), in AgreeDlSharedSecret() [all...] |
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/ |
H A D | pake_protocol_ec_common.c | 118 if (params->epkPeer.length != validKeyBufferLen) { in AgreeEcSharedSecret() 119 LOGE("Invalid epkPeer length: %u.", params->epkPeer.length); in AgreeEcSharedSecret() 125 if (!params->loader->checkEcPublicKey(&(params->epkPeer), alg)) { in AgreeEcSharedSecret() 130 PRINT_DEBUG_MSG(params->epkPeer.val, params->epkPeer.length, "epkPeer"); in AgreeEcSharedSecret() 132 KeyBuff epkPeerBuff = { params->epkPeer.val, params->epkPeer.length, false }; in AgreeEcSharedSecret()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_message_util.c | 117 int res = InitSingleParam(&(params->baseParams.epkPeer), HcStrlen(epkPeerHex) / BYTE_TO_HEX_OPER_LENGTH); in GetDasEpkPeerFromJson() 119 LOGE("InitSingleParam for epkPeer failed, res: %d.", res); in GetDasEpkPeerFromJson() 122 res = HexStringToByte(epkPeerHex, params->baseParams.epkPeer.val, params->baseParams.epkPeer.length); in GetDasEpkPeerFromJson() 124 LOGE("Convert epkPeer from hex string to byte failed, res: %d.", res); in GetDasEpkPeerFromJson() 127 PRINT_DEBUG_MSG(params->baseParams.epkPeer.val, params->baseParams.epkPeer.length, "epkPeer"); in GetDasEpkPeerFromJson()
|
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
H A D | dl_speke_protocol.c | 81 Uint8Buff epkPeer; member 179 if (InitUint8Buff(¶ms->epkPeer, HcStrlen(epkPeerStr) / BYTE_TO_HEX_OPER_LENGTH) != HC_SUCCESS) { in GetEpkPeerFromInput() 183 if (HexStringToByte(epkPeerStr, params->epkPeer.val, params->epkPeer.length) != HC_SUCCESS) { in GetEpkPeerFromInput() 271 if ((params->epkPeer.length == DL_SPEKE_PRIME_LEN) && in SetSelfKeyLenByEpkPeerAndMod() 277 if ((params->epkPeer.length == DL_SPEKE_PRIME_SMALL_LEN) && in SetSelfKeyLenByEpkPeerAndMod() 283 LOGE("DL SPEKE mod: %x, Invalid epkPeer length: %u.", params->primeMod, params->epkPeer.length); in SetSelfKeyLenByEpkPeerAndMod() 333 if ((params->epkPeer.length == DL_SPEKE_PRIME_LEN) && in IsEpkPeerLenValid() 337 if ((params->epkPeer in IsEpkPeerLenValid() [all...] |
H A D | ec_speke_protocol.c | 63 Uint8Buff epkPeer; member 153 if (InitUint8Buff(¶ms->epkPeer, HcStrlen(epkPeerStr) / BYTE_TO_HEX_OPER_LENGTH) != HC_SUCCESS) { in GetEpkPeerFromInput() 157 if (HexStringToByte(epkPeerStr, params->epkPeer.val, params->epkPeer.length) != HC_SUCCESS) { in GetEpkPeerFromInput() 161 PRINT_DEBUG_MSG(params->epkPeer.val, params->epkPeer.length, "epkPeer"); in GetEpkPeerFromInput() 313 if (params->epkPeer.length != epkPeerValidLen) { in CheckEpkPeerValid() 314 LOGE("Invalid epkPeer length: %u", params->epkPeer in CheckEpkPeerValid() [all...] |
/base/security/device_auth/services/protocol/inc/pake_protocol/ |
H A D | pake_defs.h | 57 Uint8Buff epkPeer; member
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
H A D | pake_v2_protocol_common.c | 53 HcFree(params->epkPeer.val);
in DestroyPakeV2BaseParams() 54 params->epkPeer.val = NULL;
in DestroyPakeV2BaseParams() 123 params->epkPeer.val = NULL;
in FillDefaultValue() 124 params->epkPeer.length = 0;
in FillDefaultValue() 260 params->epkPeer.val, params->innerKeyLen) != EOK) { // only need x-coordinate
in ComputeSidPeer() 261 LOGE("Memcpy for epkPeer failed.");
in ComputeSidPeer() 466 res = CombineEpk(¶ms->epkSelf, ¶ms->epkPeer, params->innerKeyLen, proofMsg, &usedLen);
in CombineProofMsg() 468 res = CombineEpk(¶ms->epkPeer, ¶ms->epkSelf, params->innerKeyLen, proofMsg, &usedLen);
in CombineProofMsg()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
H A D | pake_v1_protocol_common.c | 49 HcFree(params->epkPeer.val); in DestroyPakeV1BaseParams() 50 params->epkPeer.val = NULL; in DestroyPakeV1BaseParams() 129 params->epkPeer.val = NULL; in FillDefaultValue() 130 params->epkPeer.length = 0; in FillDefaultValue()
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_client_task.c | 162 GOTO_IF_ERR(GetByteFromJson(in, FIELD_EPK, innerTask->params.pakeParams.epkPeer.val, in AsyAuthClientStepTwo() 163 innerTask->params.pakeParams.epkPeer.length)); in AsyAuthClientStepTwo()
|
H A D | pake_v2_auth_server_task.c | 221 FIELD_EPK, innerTask->params.pakeParams.epkPeer.val, innerTask->params.pakeParams.epkPeer.length)); in AsyAuthServerStepTwo()
|
H A D | pake_v2_auth_task_common.c | 422 GOTO_IF_ERR(InitSingleParam(¶ms->pakeParams.epkPeer, P256_PUBLIC_SIZE)); in InitPakeAuthParams()
|
/base/security/device_auth/services/key_agree_sdk/src/ |
H A D | key_agree_session.c | 302 int32_t res = InitSingleParam(&(baseParams->epkPeer), HcStrlen(epkPeerHex) / BYTE_TO_HEX_OPER_LENGTH); in GetDasEpkPeerFromJson() 304 LOGE("InitSingleParam for epkPeer failed, res: %d.", res); in GetDasEpkPeerFromJson() 307 res = HexStringToByte(epkPeerHex, baseParams->epkPeer.val, baseParams->epkPeer.length); in GetDasEpkPeerFromJson() 309 LOGE("Convert epkPeer from hex string to byte failed, res: %d.", res); in GetDasEpkPeerFromJson()
|
/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | deviceauth_interface_test.cpp | 202 baseParams->epkPeer.length = PAKE_DL_PRIME_LEN; in HWTEST_F() 206 baseParams->epkPeer.length = PAKE_DL_PRIME_SMALL_LEN; in HWTEST_F() 227 baseParams->epkPeer.length = PAKE_DL_PRIME_LEN; in HWTEST_F() 231 baseParams->epkPeer.length = PAKE_DL_PRIME_SMALL_LEN; in HWTEST_F()
|