Home
last modified time | relevance | path

Searched refs:epkPeer (Results 1 - 13 of 13) sorted by relevance

/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common/
H A Dpake_protocol_dl_common.c63 if ((params->epkPeer.length == PAKE_DL_PRIME_LEN) && in FillDlKeysLenAccordingToEpkPeer()
69 if ((params->epkPeer.length == PAKE_DL_PRIME_SMALL_LEN) && in FillDlKeysLenAccordingToEpkPeer()
75 LOGE("PAKE DL mod: %x, Invalid epkPeer length: %u.", params->supportedDlPrimeMod, params->epkPeer.length); in FillDlKeysLenAccordingToEpkPeer()
160 if ((params->epkPeer.length == PAKE_DL_PRIME_LEN) && in IsEpkPeerLenInvalid()
164 if ((params->epkPeer.length == PAKE_DL_PRIME_SMALL_LEN) && in IsEpkPeerLenInvalid()
168 LOGE("Invalid epkPeer length: %u.", params->epkPeer.length); in IsEpkPeerLenInvalid()
179 if (!params->loader->checkDlPublicKey(&(params->epkPeer), params->largePrimeNumHex)) { in AgreeDlSharedSecret()
184 res = params->loader->bigNumExpMod(&(params->epkPeer), in AgreeDlSharedSecret()
[all...]
/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/
H A Dpake_protocol_ec_common.c118 if (params->epkPeer.length != validKeyBufferLen) { in AgreeEcSharedSecret()
119 LOGE("Invalid epkPeer length: %u.", params->epkPeer.length); in AgreeEcSharedSecret()
125 if (!params->loader->checkEcPublicKey(&(params->epkPeer), alg)) { in AgreeEcSharedSecret()
130 PRINT_DEBUG_MSG(params->epkPeer.val, params->epkPeer.length, "epkPeer"); in AgreeEcSharedSecret()
132 KeyBuff epkPeerBuff = { params->epkPeer.val, params->epkPeer.length, false }; in AgreeEcSharedSecret()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/
H A Dpake_message_util.c117 int res = InitSingleParam(&(params->baseParams.epkPeer), HcStrlen(epkPeerHex) / BYTE_TO_HEX_OPER_LENGTH); in GetDasEpkPeerFromJson()
119 LOGE("InitSingleParam for epkPeer failed, res: %d.", res); in GetDasEpkPeerFromJson()
122 res = HexStringToByte(epkPeerHex, params->baseParams.epkPeer.val, params->baseParams.epkPeer.length); in GetDasEpkPeerFromJson()
124 LOGE("Convert epkPeer from hex string to byte failed, res: %d.", res); in GetDasEpkPeerFromJson()
127 PRINT_DEBUG_MSG(params->baseParams.epkPeer.val, params->baseParams.epkPeer.length, "epkPeer"); in GetDasEpkPeerFromJson()
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/
H A Ddl_speke_protocol.c81 Uint8Buff epkPeer; member
179 if (InitUint8Buff(&params->epkPeer, HcStrlen(epkPeerStr) / BYTE_TO_HEX_OPER_LENGTH) != HC_SUCCESS) { in GetEpkPeerFromInput()
183 if (HexStringToByte(epkPeerStr, params->epkPeer.val, params->epkPeer.length) != HC_SUCCESS) { in GetEpkPeerFromInput()
271 if ((params->epkPeer.length == DL_SPEKE_PRIME_LEN) && in SetSelfKeyLenByEpkPeerAndMod()
277 if ((params->epkPeer.length == DL_SPEKE_PRIME_SMALL_LEN) && in SetSelfKeyLenByEpkPeerAndMod()
283 LOGE("DL SPEKE mod: %x, Invalid epkPeer length: %u.", params->primeMod, params->epkPeer.length); in SetSelfKeyLenByEpkPeerAndMod()
333 if ((params->epkPeer.length == DL_SPEKE_PRIME_LEN) && in IsEpkPeerLenValid()
337 if ((params->epkPeer in IsEpkPeerLenValid()
[all...]
H A Dec_speke_protocol.c63 Uint8Buff epkPeer; member
153 if (InitUint8Buff(&params->epkPeer, HcStrlen(epkPeerStr) / BYTE_TO_HEX_OPER_LENGTH) != HC_SUCCESS) { in GetEpkPeerFromInput()
157 if (HexStringToByte(epkPeerStr, params->epkPeer.val, params->epkPeer.length) != HC_SUCCESS) { in GetEpkPeerFromInput()
161 PRINT_DEBUG_MSG(params->epkPeer.val, params->epkPeer.length, "epkPeer"); in GetEpkPeerFromInput()
313 if (params->epkPeer.length != epkPeerValidLen) { in CheckEpkPeerValid()
314 LOGE("Invalid epkPeer length: %u", params->epkPeer in CheckEpkPeerValid()
[all...]
/base/security/device_auth/services/protocol/inc/pake_protocol/
H A Dpake_defs.h57 Uint8Buff epkPeer; member
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
H A Dpake_v2_protocol_common.c53 HcFree(params->epkPeer.val); in DestroyPakeV2BaseParams()
54 params->epkPeer.val = NULL; in DestroyPakeV2BaseParams()
123 params->epkPeer.val = NULL; in FillDefaultValue()
124 params->epkPeer.length = 0; in FillDefaultValue()
260 params->epkPeer.val, params->innerKeyLen) != EOK) { // only need x-coordinate in ComputeSidPeer()
261 LOGE("Memcpy for epkPeer failed."); in ComputeSidPeer()
466 res = CombineEpk(&params->epkSelf, &params->epkPeer, params->innerKeyLen, proofMsg, &usedLen); in CombineProofMsg()
468 res = CombineEpk(&params->epkPeer, &params->epkSelf, params->innerKeyLen, proofMsg, &usedLen); in CombineProofMsg()
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/
H A Dpake_v1_protocol_common.c49 HcFree(params->epkPeer.val); in DestroyPakeV1BaseParams()
50 params->epkPeer.val = NULL; in DestroyPakeV1BaseParams()
129 params->epkPeer.val = NULL; in FillDefaultValue()
130 params->epkPeer.length = 0; in FillDefaultValue()
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/
H A Dpake_v2_auth_client_task.c162 GOTO_IF_ERR(GetByteFromJson(in, FIELD_EPK, innerTask->params.pakeParams.epkPeer.val, in AsyAuthClientStepTwo()
163 innerTask->params.pakeParams.epkPeer.length)); in AsyAuthClientStepTwo()
H A Dpake_v2_auth_server_task.c221 FIELD_EPK, innerTask->params.pakeParams.epkPeer.val, innerTask->params.pakeParams.epkPeer.length)); in AsyAuthServerStepTwo()
H A Dpake_v2_auth_task_common.c422 GOTO_IF_ERR(InitSingleParam(&params->pakeParams.epkPeer, P256_PUBLIC_SIZE)); in InitPakeAuthParams()
/base/security/device_auth/services/key_agree_sdk/src/
H A Dkey_agree_session.c302 int32_t res = InitSingleParam(&(baseParams->epkPeer), HcStrlen(epkPeerHex) / BYTE_TO_HEX_OPER_LENGTH); in GetDasEpkPeerFromJson()
304 LOGE("InitSingleParam for epkPeer failed, res: %d.", res); in GetDasEpkPeerFromJson()
307 res = HexStringToByte(epkPeerHex, baseParams->epkPeer.val, baseParams->epkPeer.length); in GetDasEpkPeerFromJson()
309 LOGE("Convert epkPeer from hex string to byte failed, res: %d.", res); in GetDasEpkPeerFromJson()
/base/security/device_auth/test/unittest/deviceauth/source/
H A Ddeviceauth_interface_test.cpp202 baseParams->epkPeer.length = PAKE_DL_PRIME_LEN; in HWTEST_F()
206 baseParams->epkPeer.length = PAKE_DL_PRIME_SMALL_LEN; in HWTEST_F()
227 baseParams->epkPeer.length = PAKE_DL_PRIME_LEN; in HWTEST_F()
231 baseParams->epkPeer.length = PAKE_DL_PRIME_SMALL_LEN; in HWTEST_F()

Completed in 11 milliseconds