Home
last modified time | relevance | path

Searched refs:idSelf (Results 1 – 11 of 11) sorted by relevance

/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/
Dpake_task_common.c147 params->baseParams.idSelf.length = authIdLen; in FillAuthId()
148 params->baseParams.idSelf.val = (uint8_t *)HcMalloc(params->baseParams.idSelf.length, 0); in FillAuthId()
149 if (params->baseParams.idSelf.val == NULL) { in FillAuthId()
153 …if (memcpy_s(params->baseParams.idSelf.val, params->baseParams.idSelf.length, authId, strlen(authI… in FillAuthId()
/base/security/device_auth/services/authenticators/src/account_related/auth/pake_v2_auth_task/
Dpake_v2_auth_task_common.c173 if (InitCharStringBuff(&params->pakeParams.idSelf, in ExtractPakeSelfId()
179 …(void)memcpy_s(params->pakeParams.idSelf.val, params->pakeParams.idSelf.length, params->devIdSelf.… in ExtractPakeSelfId()
181 (void)memcpy_s(params->pakeParams.idSelf.val + params->devIdSelf.length, in ExtractPakeSelfId()
182 …params->pakeParams.idSelf.length - params->devIdSelf.length, params->deviceIdSelf.val, deviceIdSel… in ExtractPakeSelfId()
410 GOTO_IF_ERR(InitSingleParam(&params->pakeParams.idSelf, deviceIdLen + 1)); in InitPakeAuthParams()
413 (void)memcpy_s(params->pakeParams.idSelf.val, deviceIdLen, deviceId, deviceIdLen); in InitPakeAuthParams()
414 params->pakeParams.idSelf.length = deviceIdLen; in InitPakeAuthParams()
/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/
Dpake_v1_server_protocol_task.c66 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.idSelf.val, in PackageMsgForResponse()
67 params->baseParams.idSelf.length); in PackageMsgForResponse()
92 res = GetAndCheckAuthIdPeer(in, &(params->baseParams.idSelf), &(params->baseParams.idPeer)); in PakeResponse()
Dpake_v1_client_protocol_task.c67 res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, params->baseParams.idSelf.val, in PakeRequest()
68 params->baseParams.idSelf.length); in PakeRequest()
102 res = GetAndCheckAuthIdPeer(in, &(params->baseParams.idSelf), &(params->baseParams.idPeer)); in ParseMsgForClientConfirm()
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
Dpake_v2_protocol_common.c56 HcFree(params->idSelf.val); in DestroyPakeV2BaseParams()
57 params->idSelf.val = NULL; in DestroyPakeV2BaseParams()
127 params->idSelf.val = NULL; in FillDefaultValue()
128 params->idSelf.length = 0; in FillDefaultValue()
212 Uint8Buff idSelfMsg = { NULL, params->idSelf.length + params->innerKeyLen }; in ComputeSidSelf()
220 … if (memcpy_s(idSelfMsg.val, idSelfMsg.length, params->idSelf.val, params->idSelf.length) != EOK) { in ComputeSidSelf()
225 if (memcpy_s(idSelfMsg.val + params->idSelf.length, idSelfMsg.length - params->idSelf.length, in ComputeSidSelf()
/base/security/device_auth/services/protocol/inc/pake_protocol/
Dpake_defs.h58 Uint8Buff idSelf; member
/base/security/device_auth/services/key_agree_sdk/src/
Dkey_agree_session.c341 …res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, baseParams->idSelf.val, baseParams->idSelf.length… in PackagePakeClientConfirmData()
416 res = InitSingleParam(&(spekeSession->baseParam.idSelf), spekeSession->deviceId.length); in FillPskAndDeviceId()
422 if (memcpy_s(spekeSession->baseParam.idSelf.val, spekeSession->baseParam.idSelf.length, in FillPskAndDeviceId()
426 FreeAndCleanKey(&spekeSession->baseParam.idSelf); in FillPskAndDeviceId()
478 …res = AddByteToJson(payload, FIELD_PEER_AUTH_ID, baseParams->idSelf.val, baseParams->idSelf.length… in PackagePakeResponseData()
601 …res = GetAuthIdPeerFromPayload(inParams, &(spekeSession->baseParam.idSelf), &(spekeSession->basePa… in PakeConfirm()
631 …res = GetAuthIdPeerFromPayload(inParams, &(spekeSession->baseParam.idSelf), &(spekeSession->basePa… in PakeServerConfirm()
/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/standard_exchange_task/
Dcommon_standard_bind_exchange.c99 ExtraInfo exInfo = { pakeParams->baseParams.idSelf, -1, -1 }; in PackageAuthInfo()
116 … GOTO_ERR_AND_SET_RET(AddByteToJson(authInfoJson, FIELD_AUTH_ID, pakeParams->baseParams.idSelf.val, in PackageAuthInfo()
117 pakeParams->baseParams.idSelf.length), res); in PackageAuthInfo()
307 &pakeParams->baseParams.idSelf, &pakeParams->baseParams.idPeer); in ParseAuthInfo()
395 …GenerateKeyAlias(&packageName, &serviceType, keyType, &(pakeParams->baseParams.idSelf), &keyAlias); in ClientRequestStandardBindExchange()
431 …GenerateKeyAlias(&packageName, &serviceType, keyType, &(pakeParams->baseParams.idSelf), &keyAlias); in ServerResponseStandardBindExchange()
491 …GenerateKeyAlias(&packageName, &serviceType, keyType, &(pakeParams->baseParams.idSelf), &keyAlias); in ClientConfirmStandardBindExchange()
Dcommon_standard_unbind_exchange.c79 GOTO_ERR_AND_SET_RET(AddByteToJson(rmvInfoJson, FIELD_RMV_ID, pakeParams->baseParams.idSelf.val, in PackageRmvInfo()
80 pakeParams->baseParams.idSelf.length), res); in PackageRmvInfo()
171 …res = GetIdPeer(rmvInfoJson, FIELD_RMV_ID, &pakeParams->baseParams.idSelf, &pakeParams->baseParams… in ParseRmvInfo()
Ddas_standard_token_manager.c123 …int32_t res = GenerateKeyAlias(&packageName, &serviceType, keyType, &(params->baseParams.idSelf), … in ComputeAndSavePsk()
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/
Dpake_v1_protocol_common.c58 HcFree(params->idSelf.val); in DestroyPakeV1BaseParams()
59 params->idSelf.val = NULL; in DestroyPakeV1BaseParams()
135 params->idSelf.val = NULL; in FillDefaultValue()
136 params->idSelf.length = 0; in FillDefaultValue()