Home
last modified time | relevance | path

Searched refs:HMAC_LEN (Results 1 – 7 of 7) sorted by relevance

/base/security/device_auth/services/authenticators/src/account_unrelated/iso_task/iso_protocol_task/
Diso_client_protocol_task.c215 uint8_t *hmac = (uint8_t *)HcMalloc(HMAC_LEN, 0); in GenerateSessionKey()
221 if (GetByteFromJson(in, FIELD_RETURN_CODE_MAC, hmac, HMAC_LEN) != 0) { in GenerateSessionKey()
228 res = IsoClientGenSessionKey(&params->baseParams, 0, hmac, HMAC_LEN); in GenerateSessionKey()
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/
Dpake_v1_protocol_common.c105 params->kcfData.length = HMAC_LEN; in AllocDefaultParams()
112 params->kcfDataPeer.length = HMAC_LEN; in AllocDefaultParams()
334 uint8_t verifyProofVal[HMAC_LEN] = { 0 }; in VerifyProof()
335 Uint8Buff verifyProof = { verifyProofVal, HMAC_LEN }; in VerifyProof()
/base/security/device_auth/deps_adapter/key_management_adapter/interfaces/
Dalg_defs.h23 #define HMAC_LEN 32 macro
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
Dpake_v2_protocol_common.c95 params->kcfData.length = HMAC_LEN; in AllocDefaultParams()
102 params->kcfDataPeer.length = HMAC_LEN; in AllocDefaultParams()
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/mini/
Dhuks_adapter.c199 CHECK_LEN_EQUAL_RETURN(outHmac->length, HMAC_LEN, "outHmac->length"); in ComputeHmac()
224 if (ret != HKS_SUCCESS || hmacBlob.size != HMAC_LEN) { in ComputeHmac()
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/small/
Dhuks_adapter.c168 CHECK_LEN_EQUAL_RETURN(outHmac->length, HMAC_LEN, "outHmac->length"); in ComputeHmac()
193 if (ret != HKS_SUCCESS || hmacBlob.size != HMAC_LEN) { in ComputeHmac()
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/standard/
Dhuks_adapter.c180 CHECK_LEN_EQUAL_RETURN(outHmac->length, HMAC_LEN, "outHmac->length"); in ComputeHmac()
205 if (ret != HKS_SUCCESS || hmacBlob.size != HMAC_LEN) { in ComputeHmac()