Home
last modified time | relevance | path

Searched refs:spekeSession (Results 1 - 5 of 5) sorted by relevance

/base/security/device_auth/services/key_agree_sdk/src/
H A Dkey_agree_session.c363 static int32_t FillExtraData(SpekeSession *spekeSession, const CJson *jsonMessage) in FillExtraData() argument
378 res = InitSingleParam(&(spekeSession->baseParam.extraData), versionStrLength); in FillExtraData()
383 res = memcpy_s(spekeSession->baseParam.extraData.val, spekeSession->baseParam.extraData.length, in FillExtraData()
387 HcFree(spekeSession->baseParam.extraData.val); in FillExtraData()
388 spekeSession->baseParam.extraData.val = NULL; in FillExtraData()
396 static int32_t FillPskAndDeviceId(SpekeSession *spekeSession) in FillPskAndDeviceId() argument
398 if (spekeSession->sharedSecret.length < MIN_SHAREDSECRET_LEN || in FillPskAndDeviceId()
399 spekeSession->sharedSecret.length > MAX_SHAREDSECRET_LEN) { in FillPskAndDeviceId()
404 int32_t res = InitSingleParam(&(spekeSession in FillPskAndDeviceId()
486 PackageMsgForPakeResponse(SpekeSession *spekeSession, CJson *outJson, PackageExtraData packageExtraData) PackageMsgForPakeResponse() argument
521 BuildAndPutOutMessage(SpekeSession *spekeSession, KeyAgreeBlob *out, PackageExtraData packageExtraData) BuildAndPutOutMessage() argument
551 PakeResponse(SpekeSession *spekeSession, KeyAgreeBlob *out) PakeResponse() argument
572 CheckPeerProtocolVersion(SpekeSession *spekeSession, CJson *inParams) CheckPeerProtocolVersion() argument
588 PakeConfirm(SpekeSession *spekeSession, CJson *inParams, KeyAgreeBlob *out) PakeConfirm() argument
624 PakeServerConfirm(SpekeSession *spekeSession, CJson *inParams, KeyAgreeBlob *out) PakeServerConfirm() argument
650 PakeClientVerifyConfirm(SpekeSession *spekeSession, CJson *inParams, KeyAgreeBlob *out) PakeClientVerifyConfirm() argument
668 ProcessStep(ProtocolStep step, SpekeSession *spekeSession, CJson *inParams, KeyAgreeBlob *out) ProcessStep() argument
709 ProcessSpekeSession(SpekeSession *spekeSession, const KeyAgreeBlob *in, KeyAgreeBlob *out) ProcessSpekeSession() argument
737 InitSpekeSession(SpekeSession *spekeSession, KeyAgreeProtocol protocol) InitSpekeSession() argument
782 ProcessProtocolInitial(SpekeSession *spekeSession, KeyAgreeBlob *out) ProcessProtocolInitial() argument
826 ProcessProtocolConfirm(SpekeSession *spekeSession, const KeyAgreeBlob *in, KeyAgreeBlob *out) ProcessProtocolConfirm() argument
877 ProcessProtocolAgree(SpekeSession *spekeSession, const KeyAgreeBlob *in, KeyAgreeBlob *out) ProcessProtocolAgree() argument
894 CheckAndInitProtocol(SpekeSession *spekeSession, KeyAgreeProtocol protocol) CheckAndInitProtocol() argument
933 DestroySpekeSession(SpekeSession *spekeSession) DestroySpekeSession() argument
948 SpekeSession *spekeSession = (SpekeSession *)HcMalloc(sizeof(SpekeSession), 0); CreateSpekeSession() local
[all...]
H A Dkey_agree_sdk.c107 static int32_t InitKeyAgreeStartSessionParams(SpekeSession *spekeSession, const KeyAgreeBlob *sharedSecret, in InitKeyAgreeStartSessionParams() argument
112 if (InitSingleParam(&(spekeSession->sharedSecret), sharedSecret->length) != HC_SUCCESS) { in InitKeyAgreeStartSessionParams()
117 if (memcpy_s(spekeSession->sharedSecret.val, spekeSession->sharedSecret.length, in InitKeyAgreeStartSessionParams()
123 if (InitSingleParam(&(spekeSession->deviceId), deviceId->length) != HC_SUCCESS) { in InitKeyAgreeStartSessionParams()
128 if (memcpy_s(spekeSession->deviceId.val, spekeSession->deviceId.length, in InitKeyAgreeStartSessionParams()
139 FreeAndCleanKey(&spekeSession->sharedSecret); in InitKeyAgreeStartSessionParams()
140 FreeAndCleanKey(&spekeSession->deviceId); in InitKeyAgreeStartSessionParams()
141 HcFree(spekeSession in InitKeyAgreeStartSessionParams()
155 SpekeSession *spekeSession = CreateSpekeSession(osAccountId); KeyAgreeInitSession() local
203 SpekeSession *spekeSession = GetManagerInstance()->getSession(session); KeyAgreeStartSession() local
238 SpekeSession *spekeSession = GetManagerInstance()->getSession(session); KeyAgreeGenerateNextMessage() local
278 SpekeSession *spekeSession = sessionManager->getSession(session); KeyAgreeIsFinish() local
307 SpekeSession *spekeSession = sessionManager->getSession(session); KeyAgreeGetResult() local
338 SpekeSession *spekeSession = sessionManager->getSession(session); KeyAgreeFreeSession() local
[all...]
H A Dkey_agree_session_manager.c26 SpekeSession *spekeSession; member
76 static uint32_t AddSessionInner(KeyAgreeSession *session, SpekeSession *spekeSession) in AddSessionInner() argument
91 sessionNode.spekeSession = spekeSession; in AddSessionInner()
135 return sessionNode->spekeSession; in GetSessionInner()
/base/security/device_auth/services/key_agree_sdk/inc/
H A Dkey_agree_session.h87 int32_t (*processProtocolAgree)(struct SpekeSessionT *spekeSession, const KeyAgreeBlob *in, KeyAgreeBlob *out);
88 int32_t (*processSession)(struct SpekeSessionT *spekeSession, const KeyAgreeBlob *in, KeyAgreeBlob *out);
89 int32_t (*initSpekeSession)(struct SpekeSessionT *spekeSession, KeyAgreeProtocol protocol);
90 int32_t (*checkAndInitProtocol)(struct SpekeSessionT *spekeSession, KeyAgreeProtocol protocol);
98 void DestroySpekeSession(SpekeSession *spekeSession);
H A Dkey_agree_session_manager.h23 uint32_t (*addSession)(KeyAgreeSession *sessionId, SpekeSession *spekeSession);

Completed in 4 milliseconds