Searched refs:isPeerFromUpgrade (Results 1 - 7 of 7) sorted by relevance
/base/security/device_auth/services/legacy/authenticators/inc/account_unrelated/iso_task/ |
H A D | iso_base_cur_task.h | 53 bool isPeerFromUpgrade; member
|
/base/security/device_auth/services/legacy/authenticators/inc/account_unrelated/pake_task/ |
H A D | pake_base_cur_task.h | 64 bool isPeerFromUpgrade; member
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_task_common/ |
H A D | iso_task_common.c | 266 if (params->isPeerFromUpgrade) { in GenerateKeyAliasForIso() 279 if (params->isPeerFromUpgrade) { in GenerateKeyAliasForIso() 294 if (params->isPeerFromUpgrade) { in DeleteAuthCode() 305 res = params->baseParams.loader->deleteKey(&keyAliasBuff, params->isPeerFromUpgrade, in DeleteAuthCode() 502 (void)GetBoolFromJson(in, FIELD_IS_PEER_FROM_UPGRADE, ¶ms->isPeerFromUpgrade); in GetUpgradeFlagAndKeyLength() 576 if (params->isPeerFromUpgrade) { in AuthGeneratePsk() 589 if (params->isPeerFromUpgrade) { in AuthGeneratePsk()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/ |
H A D | das_standard_token_manager.c | 259 if (params->isPeerFromUpgrade) { in GeneratePeerKeyAlias() 279 if (params->isPeerFromUpgrade) { in GenerateSharedKeyAlias() 305 .isDeStorage = params->isPeerFromUpgrade, in ComputeAndSavePskInner() 347 res = params->baseParams.loader->checkKeyExist(&peerKeyAlias, params->isPeerFromUpgrade, in ComputeAndSavePskStd()
|
/base/security/device_auth/services/identity_manager/src/ |
H A D | identity_group.c | 654 static int32_t CheckPeerKeyAlias(const Uint8Buff *peerKeyAlias, bool isPeerFromUpgrade, int32_t osAccountId, in CheckPeerKeyAlias() argument 657 int32_t ret = GetLoaderInstance()->checkKeyExist(peerKeyAlias, isPeerFromUpgrade, osAccountId); in CheckPeerKeyAlias() 703 bool isPeerFromUpgrade = peerDeviceEntry->upgradeFlag == 1; in ComputeAndSavePsk() local 704 ret = CheckPeerKeyAlias(&peerKeyAlias, isPeerFromUpgrade, osAccountId, groupId, peerDeviceEntry); in ComputeAndSavePsk() 710 KeyParams peerKeyParams = { { peerKeyAlias.val, peerKeyAlias.length, true }, isPeerFromUpgrade, osAccountId }; in ComputeAndSavePsk() 751 bool isPeerFromUpgrade = deviceEntry->upgradeFlag == 1; in GeneratePskAliasAndCheckExist() local 752 if (isPeerFromUpgrade) { in GeneratePskAliasAndCheckExist() 762 if (GetLoaderInstance()->checkKeyExist(pskKeyAlias, isPeerFromUpgrade, osAccountId) != HC_SUCCESS) { in GeneratePskAliasAndCheckExist()
|
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_protocol_task_common.c | 208 (void)GetBoolFromJson(in, FIELD_IS_PEER_FROM_UPGRADE, ¶ms->isPeerFromUpgrade); in InitDasPakeV1Params() 214 if (params->isPeerFromUpgrade) { in InitDasPakeV1Params() 219 if (params->opCode == AUTHENTICATE && params->isPeerFromUpgrade) { in InitDasPakeV1Params() 274 if (params->isPeerFromUpgrade) { in GeneratePskAlias()
|
/base/security/device_auth/services/session_manager/src/session/v1/compatible_auth_sub_session/ |
H A D | compatible_auth_sub_session_common.c | 198 bool isPeerFromUpgrade = peerDeviceEntry->upgradeFlag == 1; in AddUpgradeFlagToParams() local 200 if (AddBoolToJson(paramsData, FIELD_IS_PEER_FROM_UPGRADE, isPeerFromUpgrade) != HC_SUCCESS) { in AddUpgradeFlagToParams()
|
Completed in 8 milliseconds