/foundation/communication/dsoftbus/tests/core/authentication/unittest/ |
H A D | auth_session_key_test.cpp | 62 SessionKey sessionKey = { { 0 }, SESSIONKEY_LEN }; in HWTEST_F() local 64 int32_t ret = AddSessionKey(&clientList, SESSIONKEY_INDEX, &sessionKey, AUTH_LINK_TYPE_WIFI, false); in HWTEST_F() 85 SessionKey sessionKey = { { 0 }, SESSIONKEY_LEN }; in HWTEST_F() local 87 int32_t ret = AddSessionKey(&clientList, SESSIONKEY_INDEX, &sessionKey, AUTH_LINK_TYPE_WIFI, false); in HWTEST_F() 89 ret = AddSessionKey(&clientList, SESSIONKEY_INDEX2, &sessionKey, AUTH_LINK_TYPE_BLE, false); in HWTEST_F() 97 ret = GetLatestSessionKey(&clientList, AUTH_LINK_TYPE_BR, &index, &sessionKey); in HWTEST_F() 99 ret = GetLatestSessionKey(&clientList, AUTH_LINK_TYPE_WIFI, &index, &sessionKey); in HWTEST_F() 102 ret = GetLatestSessionKey(&clientList, AUTH_LINK_TYPE_BLE, &index, &sessionKey); in HWTEST_F() 118 SessionKey sessionKey = { { 0 }, SESSIONKEY_LEN }; in HWTEST_F() local 121 int32_t ret = AddSessionKey(&clientList, SESSIONKEY_INDEX, &sessionKey, AUTH_LINK_TYPE_BL in HWTEST_F() 152 SessionKey sessionKey = { { 0 }, SESSIONKEY_LEN }; HWTEST_F() local 188 SessionKey sessionKey = { { 0 }, SESSIONKEY_LEN }; HWTEST_F() local 224 SessionKey sessionKey = { { 0 }, SESSIONKEY_LEN }; HWTEST_F() local [all...] |
H A D | auth_manager_test.cpp | 159 SessionKey sessionKey = { { 0 }, TEST_DATA_LEN }; in HWTEST_F() local 160 EXPECT_EQ(AddSessionKey(&auth->sessionKeyList, AUTH_SEQ, &sessionKey, AUTH_LINK_TYPE_WIFI, false), SOFTBUS_OK); in HWTEST_F() 299 SessionKey sessionKey = { { 0 }, TEST_DATA_LEN }; in HWTEST_F() local 300 EXPECT_EQ(AddSessionKey(&auth->sessionKeyList, AUTH_SEQ_5, &sessionKey, AUTH_LINK_TYPE_BLE, false), SOFTBUS_OK); in HWTEST_F() 329 SessionKey sessionKey; in HWTEST_F() local 330 (void)memset_s(&sessionKey, sizeof(SessionKey), 0, sizeof(SessionKey)); in HWTEST_F() 331 ASSERT_TRUE(memcpy_s(sessionKey.value, SESSION_KEY_LENGTH, KEY_VALUE, KEY_VALUE_LEN) == EOK); in HWTEST_F() 332 sessionKey.len = KEY_VALUE_LEN; in HWTEST_F() 333 EXPECT_TRUE(AuthManagerSetSessionKey(AUTH_SEQ_1, &info, &sessionKey, false, false) == SOFTBUS_OK); in HWTEST_F() 343 EXPECT_TRUE(AuthManagerSetSessionKey(AUTH_SEQ_1, &info, &sessionKey, tru in HWTEST_F() 360 SessionKey sessionKey; HWTEST_F() local 602 SessionKey sessionKey = { { 0 }, TEST_DATA_LEN }; HWTEST_F() local 742 SessionKey sessionKey = { { 0 }, TEST_DATA_LEN }; HWTEST_F() local 770 SessionKey sessionKey = { { 0 }, TEST_DATA_LEN }; HWTEST_F() local 956 SessionKey sessionKey = { { 0 }, TEST_DATA_LEN }; HWTEST_F() local [all...] |
H A D | auth_test_enhance.cpp | 339 SessionKey sessionKey; in HWTEST_F() local 340 (void)memset_s(&sessionKey, sizeof(SessionKey), 0, sizeof(SessionKey)); in HWTEST_F() 341 sessionKey.len = keyLen; in HWTEST_F() 342 EXPECT_EQ(AuthManagerSetSessionKey(authSeq, &info, &sessionKey, true, false), SOFTBUS_OK); in HWTEST_F() 369 SessionKey sessionKey; in HWTEST_F() local 370 (void)memset_s(&sessionKey, sizeof(SessionKey), 0, sizeof(SessionKey)); in HWTEST_F() 371 sessionKey.len = keyLen; in HWTEST_F() 372 EXPECT_EQ(AuthManagerSetSessionKey(authSeq, &info, &sessionKey, true, false), SOFTBUS_OK); in HWTEST_F()
|
/foundation/communication/dsoftbus/sdk/transmission/trans_channel/udp/stream/adaptor/src/ |
H A D | stream_adaptor.cpp | 92 if (memcpy_s(sessionKey_.first, param->keyLen, param->sessionKey, param->keyLen) != EOK) { in InitAdaptor() 117 std::pair<uint8_t*, uint32_t> sessionKey) in Encrypt() 127 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey.first, sessionKey.second) != EOK) { in Encrypt() 144 std::pair<uint8_t*, uint32_t> sessionKey) in Decrypt() 154 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey.first, sessionKey.second) != EOK) { in Decrypt() 116 Encrypt(const void *in, ssize_t inLen, void *out, ssize_t outLen, std::pair<uint8_t*, uint32_t> sessionKey) Encrypt() argument 143 Decrypt(const void *in, ssize_t inLen, void *out, ssize_t outLen, std::pair<uint8_t*, uint32_t> sessionKey) Decrypt() argument
|
/foundation/communication/dsoftbus/tests/sdk/transmission/fuzztest/vtpstreamsocket_fuzzer/ |
H A D | vtpstreamsocket_fuzzer.cpp | 36 std::pair<uint8_t*, uint32_t> sessionKey = std::make_pair(nullptr, 0); in VtpCreateClientTest() local 38 vtpStreamSocket.CreateClient(ipPort, streamType, sessionKey); in VtpCreateClientTest() 39 vtpStreamSocket.CreateClient(ipPort, ipPort, streamType, sessionKey); in VtpCreateClientTest() 50 std::pair<uint8_t*, uint32_t> sessionKey = std::make_pair(nullptr, 0); in VtpCreateServerTest() local 52 vtpStreamSocket.CreateServer(ipPort, streamType, sessionKey); in VtpCreateServerTest()
|
/foundation/communication/dsoftbus/core/transmission/trans_channel/udp_negotiation/src/ |
H A D | trans_udp_negotiation.c | 129 info.sessionKey = (char*)appInfo->sessionKey; in NotifyUdpChannelOpened() 301 (void)memset_s(newChannel->info.sessionKey, sizeof(newChannel->info.sessionKey), 0, in NewUdpChannelByAppInfo() 302 sizeof(newChannel->info.sessionKey)); in NewUdpChannelByAppInfo() 609 (void)memset_s(channel.info.sessionKey, sizeof(channel.info.sessionKey), 0, sizeof(channel.info.sessionKey)); in TransOnExchangeUdpInfoReply() 805 (void)memset_s(channel->info.sessionKey, sizeof(channel->info.sessionKey), in UdpOnAuthConnOpened() [all...] |
H A D | trans_udp_negotiation_exchange.c | 126 int32_t ret = SoftBusBase64Decode((unsigned char*)appInfo->sessionKey, sizeof(appInfo->sessionKey), &len, in TransUnpackRequestUdpInfo() 129 TRANS_CHECK_AND_RETURN_RET_LOGE(len == sizeof(appInfo->sessionKey), in TransUnpackRequestUdpInfo() 192 (unsigned char*)appInfo->sessionKey, sizeof(appInfo->sessionKey)); in TransPackRequestUdpInfo()
|
H A D | trans_udp_channel_manager.c | 72 (void)memset_s(udpChannel->info.sessionKey, sizeof(udpChannel->info.sessionKey), 0, in NotifyTimeOutUdpChannel() 73 sizeof(udpChannel->info.sessionKey)); in NotifyTimeOutUdpChannel() 147 (void)memset_s(udpChannel->info.sessionKey, sizeof(udpChannel->info.sessionKey), 0, in TransUdpChannelMgrDeinit() 148 sizeof(udpChannel->info.sessionKey)); in TransUdpChannelMgrDeinit() 215 (void)memset_s(udpChannelNode->info.sessionKey, sizeof(udpChannelNode->info.sessionKey), 0, in TransDelUdpChannel() 216 sizeof(udpChannelNode->info.sessionKey)); in TransDelUdpChannel() 240 (void)memset_s(udpChannel->info.sessionKey, sizeo in NotifyUdpChannelCloseInList() [all...] |
/foundation/communication/dsoftbus/core/transmission/trans_channel/tcp_direct/src/ |
H A D | trans_tcp_direct_message.c | 293 (void)memset_s(conn->appInfo.sessionKey, sizeof(conn->appInfo.sessionKey), 0, sizeof(conn->appInfo.sessionKey)); in TransTdcPostBytes() 314 info->sessionKey = conn->appInfo.sessionKey; in GetChannelInfoFromConn() 398 (void)memset_s(conn.appInfo.sessionKey, sizeof(conn.appInfo.sessionKey), 0, sizeof(conn.appInfo.sessionKey)); in NotifyChannelOpened() 407 (void)memset_s(conn.appInfo.sessionKey, sizeof(conn.appInfo.sessionKey), in NotifyChannelOpened() [all...] |
H A D | trans_tcp_direct_listener.c | 91 if (SoftBusGenerateSessionKey(conn->appInfo.sessionKey, SESSION_KEY_LENGTH) != SOFTBUS_OK) { in StartVerifySession() 97 SetSessionKeyByChanId(conn->channelId, conn->appInfo.sessionKey, sizeof(conn->appInfo.sessionKey)); in StartVerifySession() 277 (void)memset_s(conn.appInfo.sessionKey, sizeof(conn.appInfo.sessionKey), 0, sizeof(conn.appInfo.sessionKey)); in TransProcDataRes() 369 (void)memset_s(conn->appInfo.sessionKey, sizeof(conn->appInfo.sessionKey), 0, sizeof(conn->appInfo.sessionKey)); in TdcOnDataEvent()
|
/foundation/communication/dsoftbus/core/transmission/trans_channel/proxy/src/ |
H A D | softbus_proxychannel_message.c | 416 (unsigned char *)appInfo->sessionKey, sizeof(appInfo->sessionKey)); in PackHandshakeMsgForNormal() 513 (uint8_t *)appInfo->sessionKey, sizeof(appInfo->sessionKey)); in TransProxyPackHandshakeMsg() 728 static int32_t TransProxyUnpackNormalHandshakeMsg(cJSON *root, AppInfo *appInfo, char *sessionKey, int32_t keyLen) in TransProxyUnpackNormalHandshakeMsg() argument 734 !GetJsonObjectStringItem(root, JSON_KEY_SESSION_KEY, sessionKey, keyLen)) { in TransProxyUnpackNormalHandshakeMsg() 757 int32_t ret = SoftBusBase64Decode((uint8_t *)appInfo->sessionKey, sizeof(appInfo->sessionKey), in TransProxyUnpackNormalHandshakeMsg() 758 &len, (uint8_t *)sessionKey, strlen(sessionKey)); in TransProxyUnpackNormalHandshakeMsg() 787 TransProxyUnpackInnerHandshakeMsg(cJSON *root, AppInfo *appInfo, char *sessionKey, int32_t keyLen) TransProxyUnpackInnerHandshakeMsg() argument 830 char sessionKey[BASE64KEY] = { 0 }; TransProxyUnpackHandshakeMsg() local 912 TransProxyEncryptFastData(const char *sessionKey, int32_t seq, const char *in, uint32_t inLen, char *out, uint32_t *outLen) TransProxyEncryptFastData() argument [all...] |
H A D | softbus_proxychannel_manager.c | 322 (void)memset_s(item->appInfo.sessionKey, sizeof(item->appInfo.sessionKey), 0, in TransProxyDelChanByChanId() 323 sizeof(item->appInfo.sessionKey)); in TransProxyDelChanByChanId() 613 int32_t TransProxyGetSessionKeyByChanId(int32_t channelId, char *sessionKey, uint32_t sessionKeySize) in TransProxyGetSessionKeyByChanId() argument 616 sessionKey != NULL, SOFTBUS_INVALID_PARAM, TRANS_CTRL, "sessionKey is null"); in TransProxyGetSessionKeyByChanId() 627 if (memcpy_s(sessionKey, sessionKeySize, item->appInfo.sessionKey, in TransProxyGetSessionKeyByChanId() 628 sizeof(item->appInfo.sessionKey)) != EOK) { in TransProxyGetSessionKeyByChanId() 881 (void)memset_s(info.appInfo.sessionKey, sizeo in TransProxyProcessHandshakeAckMsg() [all...] |
/foundation/communication/dsoftbus/tests/sdk/transmission/trans_channel/udp/stream/libsoftbus_stream/stream_manager_test/ |
H A D | stream_manager_test.cpp | 83 std::pair<uint8_t*, uint32_t> sessionKey = std::make_pair(nullptr, 0); in HWTEST_F() local 87 streamType, sessionKey); in HWTEST_F() 91 sessionKey); in HWTEST_F() 118 std::pair<uint8_t*, uint32_t> sessionKey = std::make_pair(nullptr, 0); in HWTEST_F() local 120 int32_t ret = streamSocketListener->CreateStreamServerChannel(*local, *protocol, streamType, sessionKey); in HWTEST_F() 124 ret = streamSocketListener->CreateStreamServerChannel(*local, *protocol, streamType, sessionKey); in HWTEST_F()
|
/foundation/communication/dsoftbus/tests/core/transmission/trans_channel/proxy_channel/ |
H A D | softbus_proxychannel_message_test.cpp | 746 strcpy_s(appInfo->sessionKey, TEST_CHANNEL_IDENTITY_LEN, TEST_SESSION_KEY); in HWTEST_F() 824 strcpy_s(appInfo->sessionKey, TEST_CHANNEL_IDENTITY_LEN, TEST_SESSION_KEY); in HWTEST_F() 863 char sessionKey[FAST_TRANS_DATASIZE] = {0}; in HWTEST_F() local 871 strcpy_s(sessionKey, TEST_CHANNEL_IDENTITY_LEN, TEST_SESSION_KEY); in HWTEST_F() 872 int32_t ret = TransProxyEncryptFastData(sessionKey, seq, in, inLen, out, &outLen); in HWTEST_F() 876 ret = TransProxyEncryptFastData(sessionKey, seq, in, inLen, out, &outLen); in HWTEST_F() 1000 char sessionKey[FAST_TRANS_DATASIZE] = {0}; in HWTEST_F() local 1001 int32_t ret = TransProxyUnpackInnerHandshakeMsg(root, appInfo, sessionKey, FAST_TRANS_DATASIZE); in HWTEST_F() 1030 char sessionKey[FAST_TRANS_DATASIZE] = {0}; in HWTEST_F() local 1031 int32_t ret = TransProxyUnpackNormalHandshakeMsg(root, appInfo, sessionKey, BASE64KE in HWTEST_F() 1142 char sessionKey[FAST_TRANS_DATASIZE] = {0}; HWTEST_F() local 1212 char sessionKey[FAST_TRANS_DATASIZE] = {0}; HWTEST_F() local [all...] |
/foundation/communication/dsoftbus/core/authentication/src/ |
H A D | auth_session_key.c | 246 AUTH_LOGE(AUTH_FSM, "can't find sessionKey, index=%{public}d", index); in SetSessionKeyAvailable() 337 AUTH_LOGI(AUTH_FSM, "sessionKey add type, index=%{public}d, newType=%{public}d, type=%{public}u", in SetSessionKeyAuthLinkType() 341 AUTH_LOGI(AUTH_FSM, "not found sessionKey, index=%{public}d", index); in SetSessionKeyAuthLinkType() 427 SessionKey sessionKey; in EncryptData() local 428 if (GetLatestSessionKey(list, type, &index, &sessionKey) != SOFTBUS_OK) { in EncryptData() 434 AesGcmCipherKey cipherKey = {.keyLen = sessionKey.len}; in EncryptData() 435 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey.value, sessionKey.len) != EOK) { in EncryptData() 437 (void)memset_s(&sessionKey, sizeof(SessionKey), 0, sizeof(SessionKey)); in EncryptData() 440 (void)memset_s(&sessionKey, sizeo in EncryptData() 462 SessionKey sessionKey; DecryptData() local [all...] |
/foundation/communication/dsoftbus/core/transmission/common/src/ |
H A D | softbus_message_open_channel.c | 154 &keyLen, (unsigned char *)appInfo->sessionKey, SESSION_KEY_LENGTH); in PackRequest() 214 char sessionKey[BASE64KEY] = {0}; in ParseMessageToAppInfo() local 217 !GetJsonObjectStringItem(msg, SESSION_KEY, sessionKey, sizeof(sessionKey))) { in ParseMessageToAppInfo() 237 int32_t ret = SoftBusBase64Decode((unsigned char *)appInfo->sessionKey, SESSION_KEY_LENGTH, in ParseMessageToAppInfo() 238 &len, (unsigned char *)sessionKey, strlen(sessionKey)); in ParseMessageToAppInfo() 239 (void)memset_s(sessionKey, sizeof(sessionKey), 0, sizeof(sessionKey)); in ParseMessageToAppInfo() 418 TransTdcEncrypt(const char *sessionKey, const char *in, uint32_t inLen, char *out, uint32_t *outLen) TransTdcEncrypt() argument [all...] |
/foundation/CastEngine/castengine_cast_plus_stream/src/utils/src/ |
H A D | encrypt_decrypt.cpp | 66 int EncryptDecrypt::AES128Encry(ConstPacketData inputData, PacketData &outputData, ConstPacketData sessionKey, in AES128Encry() argument 69 const uint8_t *key = sessionKey.data; in AES128Encry() 72 || (sessionKey.length != AES_KEY_LEN) || (sessionIV.length != AES_IV_LEN)) { in AES128Encry() 113 int EncryptDecrypt::AES128Decrypt(ConstPacketData inputData, PacketData &outputData, ConstPacketData sessionKey, in AES128Decrypt() argument 116 const uint8_t *key = sessionKey.data; in AES128Decrypt() 119 || (sessionKey.length != AES_KEY_LEN) || (sessionIV.length != AES_IV_LEN)) { in AES128Decrypt() 421 ConstPacketData sessionKey = { key, keyLen }; in EncryptData() local 423 ret = AES128Encry(inputData, output, sessionKey, iv); in EncryptData() 473 ConstPacketData sessionKey = { key, keyLen }; in DecryptData() local 476 ret = AES128Decrypt(input, output, sessionKey, i in DecryptData() [all...] |
/foundation/CastEngine/castengine_cast_framework/service/src/session/src/utils/src/ |
H A D | encrypt_decrypt.cpp | 66 int EncryptDecrypt::AES128Encry(ConstPacketData inputData, PacketData &outputData, ConstPacketData sessionKey,
in AES128Encry() argument 69 const uint8_t *key = sessionKey.data;
in AES128Encry() 72 || (sessionKey.length != AES_KEY_LEN) || (sessionIV.length != AES_IV_LEN)) {
in AES128Encry() 113 int EncryptDecrypt::AES128Decrypt(ConstPacketData inputData, PacketData &outputData, ConstPacketData sessionKey,
in AES128Decrypt() argument 116 const uint8_t *key = sessionKey.data;
in AES128Decrypt() 119 || (sessionKey.length != AES_KEY_LEN) || (sessionIV.length != AES_IV_LEN)) {
in AES128Decrypt() 421 ConstPacketData sessionKey = { key, keyLen };
in EncryptData() local 423 ret = AES128Encry(inputData, output, sessionKey, iv);
in EncryptData() 473 ConstPacketData sessionKey = { key, keyLen };
in DecryptData() local 476 ret = AES128Decrypt(input, output, sessionKey, i in DecryptData() [all...] |
/foundation/communication/dsoftbus/sdk/transmission/trans_channel/udp/stream/libsoftbus_stream/ |
H A D | stream_manager.cpp | 45 int streamType, std::pair<uint8_t*, uint32_t> sessionKey) in CreateStreamClientChannel() 60 if (streamSocket->CreateClient(local, remote, streamType, sessionKey)) { in CreateStreamClientChannel() 76 int streamType, std::pair<uint8_t*, uint32_t> sessionKey) in CreateStreamServerChannel() 90 if (!streamSocket->CreateServer(local, streamType, sessionKey)) { in CreateStreamServerChannel() 44 CreateStreamClientChannel(IpAndPort &local, IpAndPort remote, Proto protocol, int streamType, std::pair<uint8_t*, uint32_t> sessionKey) CreateStreamClientChannel() argument 75 CreateStreamServerChannel(IpAndPort &local, Proto protocol, int streamType, std::pair<uint8_t*, uint32_t> sessionKey) CreateStreamServerChannel() argument
|
H A D | i_stream_socket.h | 67 std::pair<uint8_t*, uint32_t> sessionKey) = 0; // socket + bind 69 std::pair<uint8_t*, uint32_t> sessionKey) = 0; 70 virtual bool CreateServer(IpAndPort &local, int streamType, std::pair<uint8_t*, uint32_t> sessionKey) = 0;
|
/foundation/communication/dsoftbus/tests/sdk/transmission/trans_channel/statistics/ |
H A D | client_trans_statistics_test.cpp | 73 info->sessionKey = g_peerSessionKey;
in TestGetErrorChannelInfo() 85 info->sessionKey = g_peerSessionKey;
in TestGetServerChannelInfo() 99 info->sessionKey = g_peerSessionKey;
in TestGetRightChannelInfo()
|
/foundation/communication/dsoftbus/sdk/transmission/trans_channel/udp/stream/adaptor/include/ |
H A D | stream_adaptor.h | 44 std::pair<uint8_t*, uint32_t> sessionKey); 46 std::pair<uint8_t*, uint32_t> sessionKey);
|
/foundation/communication/dsoftbus/sdk/transmission/trans_channel/udp/stream/libsoftbus_stream/include/ |
H A D | i_stream_manager.h | 59 int streamType, std::pair<uint8_t*, uint32_t> sessionKey) = 0; // block 61 int streamType, std::pair<uint8_t*, uint32_t> sessionKey) = 0; // Non-block
|
/foundation/communication/dsoftbus/tests/core/transmission/trans_channel/tcp_direct/unittest/ |
H A D | trans_server_tcp_direct_test.cpp | 177 SessionKey *sessionKey = (SessionKey*)SoftBusCalloc(sizeof(SessionKey)); in TestAddAuthManager() local 178 if (sessionKey == NULL) { in TestAddAuthManager() 182 if (memcpy_s(sessionKey->value, sizeof(sessionKey->value), sessionKeyStr, strlen(sessionKeyStr))) { in TestAddAuthManager() 184 SoftBusFree(sessionKey); in TestAddAuthManager() 187 sessionKey->len = strlen(sessionKeyStr); in TestAddAuthManager() 189 int32_t ret = AuthManagerSetSessionKey(authSeq, info, sessionKey, false, false); in TestAddAuthManager() 278 SessionKey sessionKey; in HWTEST_F() local 280 int32_t ret = AuthManagerSetSessionKey(authSeq, info, &sessionKey, false, false); in HWTEST_F()
|
/foundation/CastEngine/castengine_cast_framework/service/src/device_manager/src/ |
H A D | connection_manager.cpp | 71 const std::string TYPE_SESSION_KEY = "sessionKey"; 574 body[TYPE_SESSION_KEY] = device.sessionKey; in GetConsultationData() 578 EncryptPort(port, device.sessionKey, body); in GetConsultationData() 579 EncryptIp(device.localIp, SOURCE_IP_KEY, device.sessionKey, body); in GetConsultationData() 580 EncryptIp(device.remoteIp, SINK_IP_KEY, device.sessionKey, body); in GetConsultationData() 584 void ConnectionManager::EncryptPort(int port, const uint8_t *sessionKey, json &body) in EncryptPort() argument 592 EncryptDecrypt::GetInstance().EncryptData(EncryptDecrypt::CTR_CODE, sessionKey, SESSION_KEY_LENGTH, inputData, in EncryptPort() 626 void ConnectionManager::EncryptIp(const std::string &ip, const std::string &key, const uint8_t *sessionKey, json &body) in EncryptIp() argument 634 EncryptDecrypt::GetInstance().EncryptData(EncryptDecrypt::CTR_CODE, sessionKey, SESSION_KEY_LENGTH, inputData, in EncryptIp() 1070 // 获取sessionKey in HandleConnectDeviceAction() 1071 uint8_t sessionKey[SESSION_KEY_LENGTH] = {0}; HandleConnectDeviceAction() local 1081 uint8_t sessionKey[SESSION_KEY_LENGTH] = {0}; HandleConnectDeviceAction() local 1090 GetSessionKey(const json &authInfo, uint8_t *sessionKey) GetSessionKey() argument [all...] |