/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/ |
D | pake_task_common.c | 147 params->baseParams.idSelf.length = authIdLen; in FillAuthId() 148 params->baseParams.idSelf.val = (uint8_t *)HcMalloc(params->baseParams.idSelf.length, 0); in FillAuthId() 149 if (params->baseParams.idSelf.val == NULL) { in FillAuthId() 153 …if (memcpy_s(params->baseParams.idSelf.val, params->baseParams.idSelf.length, authId, strlen(authI… in FillAuthId()
|
/base/security/device_auth/services/authenticators/src/account_related/auth/pake_v2_auth_task/ |
D | pake_v2_auth_task_common.c | 173 if (InitCharStringBuff(¶ms->pakeParams.idSelf, in ExtractPakeSelfId() 179 …(void)memcpy_s(params->pakeParams.idSelf.val, params->pakeParams.idSelf.length, params->devIdSelf.… in ExtractPakeSelfId() 181 (void)memcpy_s(params->pakeParams.idSelf.val + params->devIdSelf.length, in ExtractPakeSelfId() 182 …params->pakeParams.idSelf.length - params->devIdSelf.length, params->deviceIdSelf.val, deviceIdSel… in ExtractPakeSelfId() 410 GOTO_IF_ERR(InitSingleParam(¶ms->pakeParams.idSelf, deviceIdLen + 1)); in InitPakeAuthParams() 413 (void)memcpy_s(params->pakeParams.idSelf.val, deviceIdLen, deviceId, deviceIdLen); in InitPakeAuthParams() 414 params->pakeParams.idSelf.length = deviceIdLen; in InitPakeAuthParams()
|
/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
D | pake_v1_server_protocol_task.c | 66 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.idSelf.val, in PackageMsgForResponse() 67 params->baseParams.idSelf.length); in PackageMsgForResponse() 92 res = GetAndCheckAuthIdPeer(in, &(params->baseParams.idSelf), &(params->baseParams.idPeer)); in PakeResponse()
|
D | pake_v1_client_protocol_task.c | 67 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.idSelf.val, in PakeRequest() 68 params->baseParams.idSelf.length); in PakeRequest() 102 res = GetAndCheckAuthIdPeer(in, &(params->baseParams.idSelf), &(params->baseParams.idPeer)); in ParseMsgForClientConfirm()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
D | pake_v2_protocol_common.c | 56 HcFree(params->idSelf.val); in DestroyPakeV2BaseParams() 57 params->idSelf.val = NULL; in DestroyPakeV2BaseParams() 127 params->idSelf.val = NULL; in FillDefaultValue() 128 params->idSelf.length = 0; in FillDefaultValue() 212 Uint8Buff idSelfMsg = { NULL, params->idSelf.length + params->innerKeyLen }; in ComputeSidSelf() 220 … if (memcpy_s(idSelfMsg.val, idSelfMsg.length, params->idSelf.val, params->idSelf.length) != EOK) { in ComputeSidSelf() 225 if (memcpy_s(idSelfMsg.val + params->idSelf.length, idSelfMsg.length - params->idSelf.length, in ComputeSidSelf()
|
/base/security/device_auth/services/protocol/inc/pake_protocol/ |
D | pake_defs.h | 58 Uint8Buff idSelf; member
|
/base/security/device_auth/services/key_agree_sdk/src/ |
D | key_agree_session.c | 341 …res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, baseParams->idSelf.val, baseParams->idSelf.length… in PackagePakeClientConfirmData() 416 res = InitSingleParam(&(spekeSession->baseParam.idSelf), spekeSession->deviceId.length); in FillPskAndDeviceId() 422 if (memcpy_s(spekeSession->baseParam.idSelf.val, spekeSession->baseParam.idSelf.length, in FillPskAndDeviceId() 426 FreeAndCleanKey(&spekeSession->baseParam.idSelf); in FillPskAndDeviceId() 478 …res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, baseParams->idSelf.val, baseParams->idSelf.length… in PackagePakeResponseData() 601 …res = GetAuthIdPeerFromPayload(inParams, &(spekeSession->baseParam.idSelf), &(spekeSession->basePa… in PakeConfirm() 631 …res = GetAuthIdPeerFromPayload(inParams, &(spekeSession->baseParam.idSelf), &(spekeSession->basePa… in PakeServerConfirm()
|
/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/standard_exchange_task/ |
D | common_standard_bind_exchange.c | 99 ExtraInfo exInfo = { pakeParams->baseParams.idSelf, -1, -1 }; in PackageAuthInfo() 116 … GOTO_ERR_AND_SET_RET(AddByteToJson(authInfoJson, FIELD_AUTH_ID, pakeParams->baseParams.idSelf.val, in PackageAuthInfo() 117 pakeParams->baseParams.idSelf.length), res); in PackageAuthInfo() 307 &pakeParams->baseParams.idSelf, &pakeParams->baseParams.idPeer); in ParseAuthInfo() 395 …GenerateKeyAlias(&packageName, &serviceType, keyType, &(pakeParams->baseParams.idSelf), &keyAlias); in ClientRequestStandardBindExchange() 431 …GenerateKeyAlias(&packageName, &serviceType, keyType, &(pakeParams->baseParams.idSelf), &keyAlias); in ServerResponseStandardBindExchange() 491 …GenerateKeyAlias(&packageName, &serviceType, keyType, &(pakeParams->baseParams.idSelf), &keyAlias); in ClientConfirmStandardBindExchange()
|
D | common_standard_unbind_exchange.c | 79 GOTO_ERR_AND_SET_RET(AddByteToJson(rmvInfoJson, FIELD_RMV_ID, pakeParams->baseParams.idSelf.val, in PackageRmvInfo() 80 pakeParams->baseParams.idSelf.length), res); in PackageRmvInfo() 171 …res = GetIdPeer(rmvInfoJson, FIELD_RMV_ID, &pakeParams->baseParams.idSelf, &pakeParams->baseParams… in ParseRmvInfo()
|
D | das_standard_token_manager.c | 123 …int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyType, &(params->baseParams.idSelf), … in ComputeAndSavePsk()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
D | pake_v1_protocol_common.c | 58 HcFree(params->idSelf.val); in DestroyPakeV1BaseParams() 59 params->idSelf.val = NULL; in DestroyPakeV1BaseParams() 135 params->idSelf.val = NULL; in FillDefaultValue() 136 params->idSelf.length = 0; in FillDefaultValue()
|