/base/security/device_auth/test/fuzztest/authenticators/account_unrelated/pake/standardexchangetask_fuzzer/ |
H A D | standardexchangetask_fuzzer.cpp | 69 pakeParams.baseParams.idSelf.val = authId; in StandardExchangeTaskTest003() 70 pakeParams.baseParams.idSelf.length = AUTH_ID_LENGTH; in StandardExchangeTaskTest003() 131 pakeParams.baseParams.idSelf.val = authId; in StandardExchangeTaskTest004() 132 pakeParams.baseParams.idSelf.length = AUTH_ID_LENGTH; in StandardExchangeTaskTest004()
|
/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | standard_exchange_task_test.cpp | 77 pakeParams.baseParams.idSelf.val = authId; in HWTEST_F() 78 pakeParams.baseParams.idSelf.length = AUTH_ID_LENGTH; in HWTEST_F() 129 pakeParams.baseParams.idSelf.val = authId; in HWTEST_F() 130 pakeParams.baseParams.idSelf.length = AUTH_ID_LENGTH; in HWTEST_F()
|
H A D | deviceauth_interface_test.cpp | 909 pakeParams->baseParams.idSelf.val = (uint8_t *)TEST_AUTH_ID; in HWTEST_F() 910 pakeParams->baseParams.idSelf.length = strlen(TEST_AUTH_ID); in HWTEST_F()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_task_common.c | 152 params->baseParams.idSelf.length = authIdLen; in FillAuthId() 153 params->baseParams.idSelf.val = (uint8_t *)HcMalloc(params->baseParams.idSelf.length, 0); in FillAuthId() 154 if (params->baseParams.idSelf.val == NULL) { in FillAuthId() 155 LOGE("Malloc for idSelf failed."); in FillAuthId() 158 if (memcpy_s(params->baseParams.idSelf.val, params->baseParams.idSelf.length, authId, HcStrlen(authId)) != EOK) { in FillAuthId() 159 LOGE("Memcpy for idSelf failed."); in FillAuthId()
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_task_common.c | 166 if (InitCharStringBuff(¶ms->pakeParams.idSelf, in ExtractPakeSelfId() 168 LOGE("InitCharStringBuff: idSelf failed."); in ExtractPakeSelfId() 172 (void)memcpy_s(params->pakeParams.idSelf.val, params->pakeParams.idSelf.length, params->devIdSelf.val, in ExtractPakeSelfId() 174 (void)memcpy_s(params->pakeParams.idSelf.val + params->devIdSelf.length, in ExtractPakeSelfId() 175 params->pakeParams.idSelf.length - params->devIdSelf.length, params->deviceIdSelf.val, deviceIdSelfLen); in ExtractPakeSelfId() 425 GOTO_IF_ERR(InitSingleParam(¶ms->pakeParams.idSelf, deviceIdLen + 1)); in InitPakeAuthParams() 428 (void)memcpy_s(params->pakeParams.idSelf.val, deviceIdLen, deviceId, deviceIdLen); in InitPakeAuthParams() 429 params->pakeParams.idSelf.length = deviceIdLen; in InitPakeAuthParams()
|
/base/security/device_auth/services/protocol/inc/pake_protocol/ |
H A D | pake_defs.h | 58 Uint8Buff idSelf; member
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_client_protocol_task.c | 70 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.idSelf.val, in PakeRequest() 71 params->baseParams.idSelf.length); in PakeRequest() 74 LOGE("Add idSelf failed, res: %d.", res); in PakeRequest() 110 res = GetAndCheckAuthIdPeer(in, &(params->baseParams.idSelf), &(params->baseParams.idPeer)); in ParseMsgForClientConfirm()
|
H A D | pake_v1_server_protocol_task.c | 69 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.idSelf.val, in PackageMsgForResponse() 70 params->baseParams.idSelf.length); in PackageMsgForResponse() 73 LOGE("Add idSelf failed, res: %d.", res); in PackageMsgForResponse() 99 res = GetAndCheckAuthIdPeer(in, &(params->baseParams.idSelf), &(params->baseParams.idPeer)); in PakeResponse()
|
/base/security/device_auth/services/key_agree_sdk/src/ |
H A D | key_agree_session.c | 341 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, baseParams->idSelf.val, baseParams->idSelf.length); in PackagePakeClientConfirmData() 343 LOGE("Add idSelf failed, res: %d.", res); in PackagePakeClientConfirmData() 416 res = InitSingleParam(&(spekeSession->baseParam.idSelf), spekeSession->deviceId.length); in FillPskAndDeviceId() 418 LOGE("InitSingleParam for idSelf failed, res: %d.", res); in FillPskAndDeviceId() 422 if (memcpy_s(spekeSession->baseParam.idSelf.val, spekeSession->baseParam.idSelf.length, in FillPskAndDeviceId() 424 LOGE("Memcpy for idSelf failed."); in FillPskAndDeviceId() 426 FreeAndCleanKey(&spekeSession->baseParam.idSelf); in FillPskAndDeviceId() 478 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, baseParams->idSelf in PackagePakeResponseData() [all...] |
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
H A D | pake_v2_protocol_common.c | 56 HcFree(params->idSelf.val);
in DestroyPakeV2BaseParams() 57 params->idSelf.val = NULL;
in DestroyPakeV2BaseParams() 127 params->idSelf.val = NULL;
in FillDefaultValue() 128 params->idSelf.length = 0;
in FillDefaultValue() 214 Uint8Buff idSelfMsg = { NULL, params->idSelf.length + params->innerKeyLen };
in ComputeSidSelf() 222 if (memcpy_s(idSelfMsg.val, idSelfMsg.length, params->idSelf.val, params->idSelf.length) != EOK) {
in ComputeSidSelf() 223 LOGE("Memcpy for idSelf failed.");
in ComputeSidSelf() 227 if (memcpy_s(idSelfMsg.val + params->idSelf.length, idSelfMsg.length - params->idSelf in ComputeSidSelf() [all...] |
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/ |
H A D | common_standard_bind_exchange.c | 103 ExtraInfo exInfo = { pakeParams->baseParams.idSelf, -1, -1 }; in GenerateKeyPairIfNotExist() 137 GOTO_ERR_AND_SET_RET(AddByteToJson(authInfoJson, FIELD_AUTH_ID, pakeParams->baseParams.idSelf.val, in PackageAuthInfo() 138 pakeParams->baseParams.idSelf.length), res); in PackageAuthInfo() 342 &pakeParams->baseParams.idSelf, &pakeParams->baseParams.idPeer); in ParseAuthInfo() 445 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyType, &(pakeParams->baseParams.idSelf), &keyAlias); in ClientRequestStandardBindExchange() 490 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyType, &(pakeParams->baseParams.idSelf), keyAlias); in GenerateSelfKeyAlias() 568 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyType, &(pakeParams->baseParams.idSelf), &keyAlias); in ClientConfirmStandardBindExchange()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
H A D | pake_v1_protocol_common.c | 58 HcFree(params->idSelf.val); in DestroyPakeV1BaseParams() 59 params->idSelf.val = NULL; in DestroyPakeV1BaseParams() 135 params->idSelf.val = NULL; in FillDefaultValue() 136 params->idSelf.length = 0; in FillDefaultValue()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/ |
H A D | das_standard_token_manager.c | 230 int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyType, &(params->baseParams.idSelf), selfKeyAlias); in GenerateSelfKeyAlias()
|