Searched refs:HMAC_LEN (Results 1 – 7 of 7) sorted by relevance
/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/iso_task/iso_protocol_task/ |
D | iso_client_protocol_task.c | 215 uint8_t *hmac = (uint8_t *)HcMalloc(HMAC_LEN, 0); in GenerateSessionKey() 221 if (GetByteFromJson(in, FIELD_RETURN_CODE_MAC, hmac, HMAC_LEN) != 0) { in GenerateSessionKey() 228 res = IsoClientGenSessionKey(¶ms->baseParams, 0, hmac, HMAC_LEN); in GenerateSessionKey()
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
D | pake_v1_protocol_common.c | 105 params->kcfData.length = HMAC_LEN; in AllocDefaultParams() 112 params->kcfDataPeer.length = HMAC_LEN; in AllocDefaultParams() 334 uint8_t verifyProofVal[HMAC_LEN] = { 0 }; in VerifyProof() 335 Uint8Buff verifyProof = { verifyProofVal, HMAC_LEN }; in VerifyProof()
|
/base/security/device_auth/deps_adapter/key_management_adapter/interfaces/ |
D | alg_defs.h | 23 #define HMAC_LEN 32 macro
|
/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
D | pake_v2_protocol_common.c | 95 params->kcfData.length = HMAC_LEN; in AllocDefaultParams() 102 params->kcfDataPeer.length = HMAC_LEN; in AllocDefaultParams()
|
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
D | iso_protocol.c | 604 uint8_t authResultMacVal[HMAC_LEN] = { 0 }; in ClientGenSessKeyParseEvent() 605 Uint8Buff authResultMac = { authResultMacVal, HMAC_LEN }; in ClientGenSessKeyParseEvent()
|
/base/security/device_auth/services/mk_agree/src/ |
D | mk_agree_task.c | 175 if (InitUint8Buff(&kcfData, HMAC_LEN) != HC_SUCCESS) { in GeneratePakeResponsePayloadData()
|
/base/security/device_auth/deps_adapter/key_management_adapter/impl/src/ |
D | huks_adapter.c | 178 CHECK_LEN_EQUAL_RETURN(outHmac->length, HMAC_LEN, "outHmac->length"); in ComputeHmac() 205 if (res != HKS_SUCCESS || hmacBlob.size != HMAC_LEN) { in ComputeHmac()
|