Searched refs:TOKEN_SIZE (Results 1 – 6 of 6) sorted by relevance
541 uint8_t *tmpOut = (uint8_t *)HksMalloc(HANDLE_SIZE + TOKEN_SIZE); in ClientInit()543 struct HksBlob outBlob = { HANDLE_SIZE + TOKEN_SIZE, tmpOut }; in ClientInit()559 if (outBlob.size < (HANDLE_SIZE + TOKEN_SIZE)) { in ClientInit()564 if (token->size < TOKEN_SIZE) { in ClientInit()570 ret = CopyData(outBlob.data + HANDLE_SIZE, TOKEN_SIZE, token); in ClientInit()
63 #define TOKEN_SIZE 32 macro617 uint8_t challenge[TOKEN_SIZE];
83 if (innerParams->outToken->size < TOKEN_SIZE) { in CheckChallengeTypeValidity()157 if (token->size >= TOKEN_SIZE) { in AssignToken()220 uint8_t challenge[TOKEN_SIZE] = {0}; in BuildAuthRuntimeParamSet()221 struct HksBlob challengeBlob = { TOKEN_SIZE, challenge }; in BuildAuthRuntimeParamSet()362 return HksVerifyKeyChallenge(keyNode, authToken, 0, TOKEN_SIZE); in VerifyNormalChallenge()
61 #define TOKEN_SIZE 32 macro
829 uint8_t tmpChallenge[TOKEN_SIZE] = {0}; in HksTestUpdateFinishSignAuthInfo()910 uint8_t tmpChallenge[TOKEN_SIZE] = {0}; in HksTestUpdateFinishVerifySignAuthInfo()
620 uint8_t tokenData[TOKEN_SIZE] = {0}; in IpcServiceInit()627 if ((handle.size != HANDLE_SIZE) || (token.size > TOKEN_SIZE)) { in IpcServiceInit()