Home
last modified time | relevance | path

Searched refs:isPeerFromUpgrade (Results 1 - 7 of 7) sorted by relevance

/base/security/device_auth/services/legacy/authenticators/inc/account_unrelated/iso_task/
H A Diso_base_cur_task.h53 bool isPeerFromUpgrade; member
/base/security/device_auth/services/legacy/authenticators/inc/account_unrelated/pake_task/
H A Dpake_base_cur_task.h64 bool isPeerFromUpgrade; member
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/
H A Diso_task_common.c266 if (params->isPeerFromUpgrade) { in GenerateKeyAliasForIso()
279 if (params->isPeerFromUpgrade) { in GenerateKeyAliasForIso()
294 if (params->isPeerFromUpgrade) { in DeleteAuthCode()
305 res = params->baseParams.loader->deleteKey(&keyAliasBuff, params->isPeerFromUpgrade, in DeleteAuthCode()
502 (void)GetBoolFromJson(in, FIELD_IS_PEER_FROM_UPGRADE, &params->isPeerFromUpgrade); in GetUpgradeFlagAndKeyLength()
576 if (params->isPeerFromUpgrade) { in AuthGeneratePsk()
589 if (params->isPeerFromUpgrade) { in AuthGeneratePsk()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/
H A Ddas_standard_token_manager.c259 if (params->isPeerFromUpgrade) { in GeneratePeerKeyAlias()
279 if (params->isPeerFromUpgrade) { in GenerateSharedKeyAlias()
305 .isDeStorage = params->isPeerFromUpgrade, in ComputeAndSavePskInner()
347 res = params->baseParams.loader->checkKeyExist(&peerKeyAlias, params->isPeerFromUpgrade, in ComputeAndSavePskStd()
/base/security/device_auth/services/identity_manager/src/
H A Didentity_group.c654 static int32_t CheckPeerKeyAlias(const Uint8Buff *peerKeyAlias, bool isPeerFromUpgrade, int32_t osAccountId, in CheckPeerKeyAlias() argument
657 int32_t ret = GetLoaderInstance()->checkKeyExist(peerKeyAlias, isPeerFromUpgrade, osAccountId); in CheckPeerKeyAlias()
703 bool isPeerFromUpgrade = peerDeviceEntry->upgradeFlag == 1; in ComputeAndSavePsk() local
704 ret = CheckPeerKeyAlias(&peerKeyAlias, isPeerFromUpgrade, osAccountId, groupId, peerDeviceEntry); in ComputeAndSavePsk()
710 KeyParams peerKeyParams = { { peerKeyAlias.val, peerKeyAlias.length, true }, isPeerFromUpgrade, osAccountId }; in ComputeAndSavePsk()
751 bool isPeerFromUpgrade = deviceEntry->upgradeFlag == 1; in GeneratePskAliasAndCheckExist() local
752 if (isPeerFromUpgrade) { in GeneratePskAliasAndCheckExist()
762 if (GetLoaderInstance()->checkKeyExist(pskKeyAlias, isPeerFromUpgrade, osAccountId) != HC_SUCCESS) { in GeneratePskAliasAndCheckExist()
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/
H A Dpake_v1_protocol_task_common.c208 (void)GetBoolFromJson(in, FIELD_IS_PEER_FROM_UPGRADE, &params->isPeerFromUpgrade); in InitDasPakeV1Params()
214 if (params->isPeerFromUpgrade) { in InitDasPakeV1Params()
219 if (params->opCode == AUTHENTICATE && params->isPeerFromUpgrade) { in InitDasPakeV1Params()
274 if (params->isPeerFromUpgrade) { in GeneratePskAlias()
/base/security/device_auth/services/session_manager/src/session/v1/compatible_auth_sub_session/
H A Dcompatible_auth_sub_session_common.c198 bool isPeerFromUpgrade = peerDeviceEntry->upgradeFlag == 1; in AddUpgradeFlagToParams() local
200 if (AddBoolToJson(paramsData, FIELD_IS_PEER_FROM_UPGRADE, isPeerFromUpgrade) != HC_SUCCESS) { in AddUpgradeFlagToParams()

Completed in 8 milliseconds