Searched refs:TOKEN_SIZE (Results 1 – 6 of 6) sorted by relevance
567 uint8_t *tmpOut = (uint8_t *)HksMalloc(HANDLE_SIZE + TOKEN_SIZE); in ClientInit()569 struct HksBlob outBlob = { HANDLE_SIZE + TOKEN_SIZE, tmpOut }; in ClientInit()585 if (outBlob.size < (HANDLE_SIZE + TOKEN_SIZE)) { in ClientInit()590 if (token->size < TOKEN_SIZE) { in ClientInit()596 ret = CopyData(outBlob.data + HANDLE_SIZE, TOKEN_SIZE, token); in ClientInit()
83 if (innerParams->outToken->size < TOKEN_SIZE) { in CheckChallengeTypeValidity()192 if (token->size >= TOKEN_SIZE) { in AssignToken()255 uint8_t challenge[TOKEN_SIZE] = {0}; in BuildAuthRuntimeParamSet()256 struct HksBlob challengeBlob = { TOKEN_SIZE, challenge }; in BuildAuthRuntimeParamSet()397 return HksVerifyKeyChallenge(keyNode, authToken, 0, TOKEN_SIZE); in VerifyNormalChallenge()
61 #define TOKEN_SIZE 32 macro
71 #define TOKEN_SIZE 32 macro752 uint8_t challenge[TOKEN_SIZE];
838 uint8_t tmpChallenge[TOKEN_SIZE] = {0}; in HksTestUpdateFinishSignAuthInfo()919 uint8_t tmpChallenge[TOKEN_SIZE] = {0}; in HksTestUpdateFinishVerifySignAuthInfo()
619 uint8_t tokenData[TOKEN_SIZE] = {0}; in IpcServiceInit()626 if ((handle.size != HANDLE_SIZE) || (token.size > TOKEN_SIZE)) { in IpcServiceInit()