Searched refs:challengePeer (Results 1 – 11 of 11) sorted by relevance
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
D | pake_v1_protocol_common.c | 43 HcFree(params->challengePeer.val); in DestroyPakeV1BaseParams() 44 params->challengePeer.val = NULL; in DestroyPakeV1BaseParams() 84 params->challengePeer.length = PAKE_CHALLENGE_LEN; in AllocDefaultParams() 85 params->challengePeer.val = (uint8_t *)HcMalloc(params->challengePeer.length, 0); in AllocDefaultParams() 86 if (params->challengePeer.val == NULL) { in AllocDefaultParams() 300 params->challengePeer.val, params->challengePeer.length) != EOK) { in GenerateProof() 322 …if (memcpy_s(challenge.val, challenge.length, params->challengePeer.val, params->challengePeer.len… in VerifyProof() 327 …if (memcpy_s(challenge.val + params->challengePeer.length, challenge.length - params->challengePee… in VerifyProof()
|
/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/standard_exchange_task/ |
D | standard_exchange_message_util.c | 113 int res = InitSingleParam(&(params->baseParams.challengePeer), PAKE_CHALLENGE_LEN); in GetPeerChallenge() 119 params->baseParams.challengePeer.val, params->baseParams.challengePeer.length); in GetPeerChallenge()
|
D | common_standard_bind_exchange.c | 150 …foLen = pakeParams->baseParams.challengeSelf.length + pakeParams->baseParams.challengePeer.length + in GenerateSignInfo() 166 …memcpy_s(msgInfo.val + usedLen, msgInfo.length - usedLen, pakeParams->baseParams.challengePeer.val, in GenerateSignInfo() 167 pakeParams->baseParams.challengePeer.length) != EOK) { in GenerateSignInfo() 172 usedLen += pakeParams->baseParams.challengePeer.length; in GenerateSignInfo() 321 …uint32_t verifyMsgLen = exchangeParams->authInfo.length + pakeParams->baseParams.challengePeer.len… in VerifySignInfo() 329 if (memcpy_s(verifyMsg.val, verifyMsg.length, pakeParams->baseParams.challengePeer.val, in VerifySignInfo() 330 pakeParams->baseParams.challengePeer.length) != EOK) { in VerifySignInfo() 334 uint32_t usedLen = pakeParams->baseParams.challengePeer.length; in VerifySignInfo()
|
D | standard_client_unbind_exchange_task.c | 53 if (params->baseParams.challengePeer.val == NULL) { in ExchangeRequest()
|
D | standard_server_bind_exchange_task.c | 88 if (params->baseParams.challengePeer.val == NULL) { in ExchangeResponse()
|
D | standard_client_bind_exchange_task.c | 53 if (params->baseParams.challengePeer.val == NULL) { in ExchangeRequest()
|
D | standard_server_unbind_exchange_task.c | 82 if (params->baseParams.challengePeer.val == NULL) { in ExchangeResponse()
|
/base/security/device_auth/services/protocol/inc/pake_protocol/ |
D | pake_defs.h | 53 Uint8Buff challengePeer; member
|
/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
D | pake_v1_server_protocol_task.c | 146 if (GetByteFromJson(in, FIELD_CHALLENGE, params->baseParams.challengePeer.val, in PakeServerConfirm() 147 params->baseParams.challengePeer.length) != HC_SUCCESS) { in PakeServerConfirm()
|
D | pake_v1_client_protocol_task.c | 95 res = GetByteFromJson(in, FIELD_CHALLENGE, params->baseParams.challengePeer.val, in ParseMsgForClientConfirm() 96 params->baseParams.challengePeer.length); in ParseMsgForClientConfirm()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
D | pake_v2_protocol_common.c | 47 HcFree(params->challengePeer.val); in DestroyPakeV2BaseParams() 48 params->challengePeer.val = NULL; in DestroyPakeV2BaseParams() 117 params->challengePeer.val = NULL; in FillDefaultValue() 118 params->challengePeer.length = 0; in FillDefaultValue()
|