/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_message_util.c | 172 int32_t res = GetByteFromJson(in, FIELD_KCF_DATA, params->baseParams.kcfDataPeer.val, in ParsePakeClientConfirmMessage() 173 params->baseParams.kcfDataPeer.length); in ParsePakeClientConfirmMessage() 175 LOGE("Get kcfDataPeer failed, res: %d.", res); in ParsePakeClientConfirmMessage() 178 PRINT_DEBUG_MSG(params->baseParams.kcfDataPeer.val, params->baseParams.kcfDataPeer.length, "kcfDataPeer"); in ParsePakeClientConfirmMessage() 200 int32_t res = GetByteFromJson(in, FIELD_KCF_DATA, params->baseParams.kcfDataPeer.val, in ParsePakeServerConfirmMessage() 201 params->baseParams.kcfDataPeer.length); in ParsePakeServerConfirmMessage() 203 LOGE("Get kcfDataPeer failed, res: %d.", res); in ParsePakeServerConfirmMessage() 206 PRINT_DEBUG_MSG(params->baseParams.kcfDataPeer in ParsePakeServerConfirmMessage() [all...] |
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
H A D | ec_speke_protocol.c | 67 Uint8Buff kcfDataPeer; member 167 if (InitUint8Buff(¶ms->kcfDataPeer, SHA256_LEN) != HC_SUCCESS) { in GetKcfDataPeerFromInput() 168 LOGE("allocate kcfDataPeer fail."); in GetKcfDataPeerFromInput() 172 params->kcfDataPeer.val, params->kcfDataPeer.length) != HC_SUCCESS) { in GetKcfDataPeerFromInput() 173 LOGE("get kcfDataPeer from inputEvent fail."); in GetKcfDataPeerFromInput() 176 PRINT_DEBUG_MSG(params->kcfDataPeer.val, params->kcfDataPeer.length, "kcfDataPeer"); in GetKcfDataPeerFromInput() 630 Uint8Buff kcfDataPeer in VerifyKcfDataPeer() local [all...] |
H A D | dl_speke_protocol.c | 85 Uint8Buff kcfDataPeer; member 192 if (InitUint8Buff(¶ms->kcfDataPeer, SHA256_LEN) != HC_SUCCESS) { in GetKcfDataPeerFromInput() 193 LOGE("allocate kcfDataPeer fail."); in GetKcfDataPeerFromInput() 197 params->kcfDataPeer.val, params->kcfDataPeer.length) != HC_SUCCESS) { in GetKcfDataPeerFromInput() 198 LOGE("get kcfDataPeer from inputData fail."); in GetKcfDataPeerFromInput() 634 Uint8Buff kcfDataPeer = { kcfDataPeerVal, SHA256_LEN }; in VerifyKcfDataPeer() local 635 res = GetLoaderInstance()->sha256(&kcfDataMsg, &kcfDataPeer); in VerifyKcfDataPeer() 638 LOGE("Sha256 for kcfDataPeer failed, res: %x", res); in VerifyKcfDataPeer() 641 if (memcmp(kcfDataPeer in VerifyKcfDataPeer() [all...] |
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
H A D | pake_v1_protocol_common.c | 55 HcFree(params->kcfDataPeer.val); in DestroyPakeV1BaseParams() 56 params->kcfDataPeer.val = NULL; in DestroyPakeV1BaseParams() 112 params->kcfDataPeer.length = HMAC_LEN; in AllocDefaultParams() 113 params->kcfDataPeer.val = (uint8_t *)HcMalloc(params->kcfDataPeer.length, 0); in AllocDefaultParams() 114 if (params->kcfDataPeer.val == NULL) { in AllocDefaultParams() 115 LOGE("Malloc for kcfDataPeer failed."); in AllocDefaultParams() 363 if (memcmp(verifyProof.val, params->kcfDataPeer.val, verifyProof.length) != 0) { in VerifyProof() 364 LOGE("Compare kcfDataPeer failed."); in VerifyProof()
|
/base/security/device_auth/services/protocol/inc/pake_protocol/ |
H A D | pake_defs.h | 64 Uint8Buff kcfDataPeer; member
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
H A D | pake_v2_protocol_common.c | 65 HcFree(params->kcfDataPeer.val);
in DestroyPakeV2BaseParams() 66 params->kcfDataPeer.val = NULL;
in DestroyPakeV2BaseParams() 102 params->kcfDataPeer.length = HMAC_LEN;
in AllocDefaultParams() 103 params->kcfDataPeer.val = (uint8_t *)HcMalloc(params->kcfDataPeer.length, 0);
in AllocDefaultParams() 104 if (params->kcfDataPeer.val == NULL) {
in AllocDefaultParams() 105 LOGE("Malloc for kcfDataPeer failed.");
in AllocDefaultParams() 553 if (memcmp(tmpKcfData.val, params->kcfDataPeer.val, tmpKcfData.length) != EOK) {
in VerifyProof()
|
/base/security/device_auth/services/key_agree_sdk/src/ |
H A D | key_agree_session.c | 276 int32_t res = GetByteFromJson(in, FIELD_KCF_DATA, baseParams->kcfDataPeer.val, in ParsePakeServerConfirmMessage() 277 baseParams->kcfDataPeer.length); in ParsePakeServerConfirmMessage() 279 LOGE("Get kcfDataPeer failed, res: %d.", res); in ParsePakeServerConfirmMessage() 317 int32_t res = GetByteFromJson(in, FIELD_KCF_DATA, baseParams->kcfDataPeer.val, baseParams->kcfDataPeer.length); in ParsePakeClientConfirmMessage() 319 LOGE("Get kcfDataPeer failed, res: %d.", res); in ParsePakeClientConfirmMessage()
|
/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_client_task.c | 219 innerTask->params.pakeParams.kcfDataPeer.val, innerTask->params.pakeParams.kcfDataPeer.length)); in AsyAuthClientStepThree()
|
H A D | pake_v2_auth_server_task.c | 223 FIELD_KCF_DATA, innerTask->params.pakeParams.kcfDataPeer.val, innerTask->params.pakeParams.kcfDataPeer.length)); in AsyAuthServerStepTwo()
|