Home
last modified time | relevance | path

Searched refs:challengePeer (Results 1 – 11 of 11) sorted by relevance

/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/
Dpake_v1_protocol_common.c43 HcFree(params->challengePeer.val); in DestroyPakeV1BaseParams()
44 params->challengePeer.val = NULL; in DestroyPakeV1BaseParams()
84 params->challengePeer.length = PAKE_CHALLENGE_LEN; in AllocDefaultParams()
85 params->challengePeer.val = (uint8_t *)HcMalloc(params->challengePeer.length, 0); in AllocDefaultParams()
86 if (params->challengePeer.val == NULL) { in AllocDefaultParams()
300 params->challengePeer.val, params->challengePeer.length) != EOK) { in GenerateProof()
322 …if (memcpy_s(challenge.val, challenge.length, params->challengePeer.val, params->challengePeer.len… in VerifyProof()
327 …if (memcpy_s(challenge.val + params->challengePeer.length, challenge.length - params->challengePee… in VerifyProof()
/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/standard_exchange_task/
Dstandard_exchange_message_util.c113 int res = InitSingleParam(&(params->baseParams.challengePeer), PAKE_CHALLENGE_LEN); in GetPeerChallenge()
119 params->baseParams.challengePeer.val, params->baseParams.challengePeer.length); in GetPeerChallenge()
Dcommon_standard_bind_exchange.c150 …foLen = pakeParams->baseParams.challengeSelf.length + pakeParams->baseParams.challengePeer.length + in GenerateSignInfo()
166 …memcpy_s(msgInfo.val + usedLen, msgInfo.length - usedLen, pakeParams->baseParams.challengePeer.val, in GenerateSignInfo()
167 pakeParams->baseParams.challengePeer.length) != EOK) { in GenerateSignInfo()
172 usedLen += pakeParams->baseParams.challengePeer.length; in GenerateSignInfo()
321 …uint32_t verifyMsgLen = exchangeParams->authInfo.length + pakeParams->baseParams.challengePeer.len… in VerifySignInfo()
329 if (memcpy_s(verifyMsg.val, verifyMsg.length, pakeParams->baseParams.challengePeer.val, in VerifySignInfo()
330 pakeParams->baseParams.challengePeer.length) != EOK) { in VerifySignInfo()
334 uint32_t usedLen = pakeParams->baseParams.challengePeer.length; in VerifySignInfo()
Dstandard_client_unbind_exchange_task.c53 if (params->baseParams.challengePeer.val == NULL) { in ExchangeRequest()
Dstandard_server_bind_exchange_task.c88 if (params->baseParams.challengePeer.val == NULL) { in ExchangeResponse()
Dstandard_client_bind_exchange_task.c53 if (params->baseParams.challengePeer.val == NULL) { in ExchangeRequest()
Dstandard_server_unbind_exchange_task.c82 if (params->baseParams.challengePeer.val == NULL) { in ExchangeResponse()
/base/security/device_auth/services/protocol/inc/pake_protocol/
Dpake_defs.h53 Uint8Buff challengePeer; member
/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/
Dpake_v1_server_protocol_task.c146 if (GetByteFromJson(in, FIELD_CHALLENGE, params->baseParams.challengePeer.val, in PakeServerConfirm()
147 params->baseParams.challengePeer.length) != HC_SUCCESS) { in PakeServerConfirm()
Dpake_v1_client_protocol_task.c95 res = GetByteFromJson(in, FIELD_CHALLENGE, params->baseParams.challengePeer.val, in ParseMsgForClientConfirm()
96 params->baseParams.challengePeer.length); in ParseMsgForClientConfirm()
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
Dpake_v2_protocol_common.c47 HcFree(params->challengePeer.val); in DestroyPakeV2BaseParams()
48 params->challengePeer.val = NULL; in DestroyPakeV2BaseParams()
117 params->challengePeer.val = NULL; in FillDefaultValue()
118 params->challengePeer.length = 0; in FillDefaultValue()