Home
last modified time | relevance | path

Searched refs:idPeer (Results 1 - 12 of 12) sorted by relevance

/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/
H A Dpake_task_common.c174 params->baseParams.idPeer.length = authIdLen; in FillAuthId()
175 params->baseParams.idPeer.val = (uint8_t *)HcMalloc(params->baseParams.idPeer.length, 0); in FillAuthId()
176 if (params->baseParams.idPeer.val == NULL) { in FillAuthId()
177 LOGE("Malloc for idPeer failed."); in FillAuthId()
180 if (memcpy_s(params->baseParams.idPeer.val, params->baseParams.idPeer.length, in FillAuthId()
182 LOGE("Memcpy for idPeer failed."); in FillAuthId()
/base/security/device_auth/services/protocol/inc/pake_protocol/
H A Dpake_defs.h59 Uint8Buff idPeer; member
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
H A Dpake_v2_protocol_common.c59 HcFree(params->idPeer.val); in DestroyPakeV2BaseParams()
60 params->idPeer.val = NULL; in DestroyPakeV2BaseParams()
129 params->idPeer.val = NULL; in FillDefaultValue()
130 params->idPeer.length = 0; in FillDefaultValue()
246 Uint8Buff idPeerMsg = { NULL, params->idPeer.length + params->innerKeyLen }; in ComputeSidPeer()
254 if (memcpy_s(idPeerMsg.val, idPeerMsg.length, params->idPeer.val, params->idPeer.length) != EOK) { in ComputeSidPeer()
255 LOGE("Memcpy for idPeer failed."); in ComputeSidPeer()
259 if (memcpy_s(idPeerMsg.val + params->idPeer.length, idPeerMsg.length - params->idPeer in ComputeSidPeer()
[all...]
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/
H A Dpake_v1_protocol_common.c61 HcFree(params->idPeer.val); in DestroyPakeV1BaseParams()
62 params->idPeer.val = NULL; in DestroyPakeV1BaseParams()
137 params->idPeer.val = NULL; in FillDefaultValue()
138 params->idPeer.length = 0; in FillDefaultValue()
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/
H A Dpake_v2_auth_task_common.c147 if (InitCharStringBuff(&params->pakeParams.idPeer, in ExtractPakePeerId()
149 LOGE("InitCharStringBuff: idPeer failed."); in ExtractPakePeerId()
152 (void)memcpy_s(params->pakeParams.idPeer.val, params->pakeParams.idPeer.length, params->devIdPeer.val, in ExtractPakePeerId()
154 (void)memcpy_s(params->pakeParams.idPeer.val + params->devIdPeer.length, in ExtractPakePeerId()
155 params->pakeParams.idPeer.length - params->devIdPeer.length, params->deviceIdPeer.val, deviceIdPeerLen); in ExtractPakePeerId()
309 LOGE("InitCharStringBuff: idPeer failed."); in ExtractPeerDevId()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/
H A Dpake_v1_protocol_task_common.c144 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyTypePeer, &(params->baseParams.idPeer), in LoadPseudonymFlagIfNeed()
268 int32_t res = GenerateKeyAlias(&packageName, &serviceType, KEY_ALIAS_PSK, &(params->baseParams.idPeer), in GeneratePskAlias()
390 int32_t res = GeneratePseudonymPskAlias(&serviceTypeBuff, &(params->baseParams.idPeer), &pskAliasBuff); in LoadPseudonymExtInfoIfNeed()
454 int32_t res = GenerateKeyAlias(&pkgNameBuff, &serviceTypeBuff, KEY_ALIAS_PSK, &params->baseParams.idPeer, in GeneratePseudonymPskIfNotExist()
467 res = GeneratePseudonymPskAlias(&serviceTypeBuff, &params->baseParams.idPeer, &pskAliasBuff); in GeneratePseudonymPskIfNotExist()
572 res = GeneratePseudonymPskAlias(&serviceTypeBuff, &(params->baseParams.idPeer), &pskAlias); in GenerateSelfPseudonymChlgAndId()
665 res = GeneratePseudonymPskAlias(&serviceTypeBuff, &(params->baseParams.idPeer), &pskAlias); in CheckPseudonymIdByCompute()
795 int32_t res = GenerateKeyAlias(&pkgNameBuff, &serviceTypeBuff, KEY_ALIAS_PSK, &params->baseParams.idPeer, in SaveExtInfoToPseudonymPsk()
826 res = GeneratePseudonymPskAlias(&serviceTypeBuff, &(params->baseParams.idPeer), &pskAlias); in SaveNextPseudonymIdAndChallenge()
H A Dpake_v1_client_protocol_task.c110 res = GetAndCheckAuthIdPeer(in, &(params->baseParams.idSelf), &(params->baseParams.idPeer)); in ParseMsgForClientConfirm()
H A Dpake_v1_server_protocol_task.c99 res = GetAndCheckAuthIdPeer(in, &(params->baseParams.idSelf), &(params->baseParams.idPeer)); in PakeResponse()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/
H A Ddas_standard_token_manager.c254 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyTypePeer, &(params->baseParams.idPeer), peerKeyAlias); in GeneratePeerKeyAlias()
273 int32_t res = GenerateKeyAlias(&packageName, &serviceType, KEY_ALIAS_PSK, &(params->baseParams.idPeer), in GenerateSharedKeyAlias()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/
H A Dcommon_standard_bind_exchange.c342 &pakeParams->baseParams.idSelf, &pakeParams->baseParams.idPeer); in ParseAuthInfo()
409 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyType, &(pakeParams->baseParams.idPeer), in SaveAuthInfo()
418 ExtraInfo exInfo = { pakeParams->baseParams.idPeer, pakeParams->userType, PAIR_TYPE_BIND }; in SaveAuthInfo()
/base/security/device_auth/services/key_agree_sdk/src/
H A Dkey_agree_session.c601 res = GetAuthIdPeerFromPayload(inParams, &(spekeSession->baseParam.idSelf), &(spekeSession->baseParam.idPeer)); in PakeConfirm()
631 res = GetAuthIdPeerFromPayload(inParams, &(spekeSession->baseParam.idSelf), &(spekeSession->baseParam.idPeer)); in PakeServerConfirm()
/base/security/device_auth/test/unittest/deviceauth/source/
H A Ddeviceauth_interface_test.cpp912 pakeParams->baseParams.idPeer.val = (uint8_t *)TEST_AUTH_ID; in HWTEST_F()
913 pakeParams->baseParams.idPeer.length = strlen(TEST_AUTH_ID); in HWTEST_F()

Completed in 12 milliseconds