Home
last modified time | relevance | path

Searched refs:HMAC_LEN (Results 1 – 7 of 7) sorted by relevance

/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_protocol_task/
Diso_client_protocol_task.c215 uint8_t *hmac = (uint8_t *)HcMalloc(HMAC_LEN, 0); in GenerateSessionKey()
221 if (GetByteFromJson(in, FIELD_RETURN_CODE_MAC, hmac, HMAC_LEN) != 0) { in GenerateSessionKey()
228 res = IsoClientGenSessionKey(&params->baseParams, 0, hmac, HMAC_LEN); in GenerateSessionKey()
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/
Dpake_v1_protocol_common.c105 params->kcfData.length = HMAC_LEN; in AllocDefaultParams()
112 params->kcfDataPeer.length = HMAC_LEN; in AllocDefaultParams()
334 uint8_t verifyProofVal[HMAC_LEN] = { 0 }; in VerifyProof()
335 Uint8Buff verifyProof = { verifyProofVal, HMAC_LEN }; in VerifyProof()
/base/security/device_auth/deps_adapter/key_management_adapter/interfaces/
Dalg_defs.h23 #define HMAC_LEN 32 macro
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
Dpake_v2_protocol_common.c95 params->kcfData.length = HMAC_LEN; in AllocDefaultParams()
102 params->kcfDataPeer.length = HMAC_LEN; in AllocDefaultParams()
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/
Diso_protocol.c604 uint8_t authResultMacVal[HMAC_LEN] = { 0 }; in ClientGenSessKeyParseEvent()
605 Uint8Buff authResultMac = { authResultMacVal, HMAC_LEN }; in ClientGenSessKeyParseEvent()
/base/security/device_auth/services/mk_agree/src/
Dmk_agree_task.c175 if (InitUint8Buff(&kcfData, HMAC_LEN) != HC_SUCCESS) { in GeneratePakeResponsePayloadData()
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/
Dhuks_adapter.c178 CHECK_LEN_EQUAL_RETURN(outHmac->length, HMAC_LEN, "outHmac->length"); in ComputeHmac()
205 if (res != HKS_SUCCESS || hmacBlob.size != HMAC_LEN) { in ComputeHmac()