Searched refs:kcfDataPeer (Results 1 – 8 of 8) sorted by relevance
/base/security/device_auth/services/authenticators/src/account_unrelated/pake_task/ |
D | pake_message_util.c | 171 int32_t res = GetByteFromJson(in, FIELD_KCF_DATA, params->baseParams.kcfDataPeer.val, in ParsePakeClientConfirmMessage() 172 params->baseParams.kcfDataPeer.length); in ParsePakeClientConfirmMessage() 198 int32_t res = GetByteFromJson(in, FIELD_KCF_DATA, params->baseParams.kcfDataPeer.val, in ParsePakeServerConfirmMessage() 199 params->baseParams.kcfDataPeer.length); in ParsePakeServerConfirmMessage()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
D | pake_v1_protocol_common.c | 55 HcFree(params->kcfDataPeer.val); in DestroyPakeV1BaseParams() 56 params->kcfDataPeer.val = NULL; in DestroyPakeV1BaseParams() 112 params->kcfDataPeer.length = HMAC_LEN; in AllocDefaultParams() 113 params->kcfDataPeer.val = (uint8_t *)HcMalloc(params->kcfDataPeer.length, 0); in AllocDefaultParams() 114 if (params->kcfDataPeer.val == NULL) { in AllocDefaultParams() 342 if (memcmp(verifyProof.val, params->kcfDataPeer.val, verifyProof.length) != 0) { in VerifyProof()
|
/base/security/device_auth/services/protocol/inc/pake_protocol/ |
D | pake_defs.h | 64 Uint8Buff kcfDataPeer; member
|
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
D | ec_speke_protocol.c | 67 Uint8Buff kcfDataPeer; member 164 if (InitUint8Buff(¶ms->kcfDataPeer, SHA256_LEN) != HC_SUCCESS) { in GetKcfDataPeerFromInput() 169 params->kcfDataPeer.val, params->kcfDataPeer.length) != HC_SUCCESS) { in GetKcfDataPeerFromInput() 618 Uint8Buff kcfDataPeer = { kcfDataPeerVal, SHA256_LEN }; in VerifyKcfDataPeer() local 619 res = GetLoaderInstance()->sha256(&kcfDataMsg, &kcfDataPeer); in VerifyKcfDataPeer() 625 if (memcmp(kcfDataPeer.val, impl->params.kcfDataPeer.val, kcfDataPeer.length) != 0) { in VerifyKcfDataPeer() 627 (void)memset_s(kcfDataPeer.val, kcfDataPeer.length, 0, kcfDataPeer.length); in VerifyKcfDataPeer() 1078 ClearFreeUint8Buff(&impl->params.kcfDataPeer); in DestroyEcSpekeProtocol()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
D | pake_v2_protocol_common.c | 65 HcFree(params->kcfDataPeer.val); in DestroyPakeV2BaseParams() 66 params->kcfDataPeer.val = NULL; in DestroyPakeV2BaseParams() 102 params->kcfDataPeer.length = HMAC_LEN; in AllocDefaultParams() 103 params->kcfDataPeer.val = (uint8_t *)HcMalloc(params->kcfDataPeer.length, 0); in AllocDefaultParams() 104 if (params->kcfDataPeer.val == NULL) { in AllocDefaultParams() 553 if (memcmp(tmpKcfData.val, params->kcfDataPeer.val, tmpKcfData.length) != EOK) { in VerifyProof()
|
/base/security/device_auth/services/authenticators/src/account_related/auth/pake_v2_auth_task/ |
D | pake_v2_auth_server_task.c | 223 …FIELD_KCF_DATA, innerTask->params.pakeParams.kcfDataPeer.val, innerTask->params.pakeParams.kcfData… in AsyAuthServerStepTwo()
|
D | pake_v2_auth_client_task.c | 219 … innerTask->params.pakeParams.kcfDataPeer.val, innerTask->params.pakeParams.kcfDataPeer.length)); in AsyAuthClientStepThree()
|
/base/security/device_auth/services/key_agree_sdk/src/ |
D | key_agree_session.c | 276 int32_t res = GetByteFromJson(in, FIELD_KCF_DATA, baseParams->kcfDataPeer.val, in ParsePakeServerConfirmMessage() 277 baseParams->kcfDataPeer.length); in ParsePakeServerConfirmMessage() 317 …t res = GetByteFromJson(in, FIELD_KCF_DATA, baseParams->kcfDataPeer.val, baseParams->kcfDataPeer.l… in ParsePakeClientConfirmMessage()
|