Home
last modified time | relevance | path

Searched refs:kcfCode (Results 1 – 3 of 3) sorted by relevance

/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
Dpake_v2_protocol_common.c451 const uint8_t *kcfCode = NULL; in CombineProofMsg() local
454 kcfCode = KCF_CODE_CLIENT; in CombineProofMsg()
456 kcfCode = KCF_CODE_SERVER; in CombineProofMsg()
458 if (memcpy_s(proofMsg->val, proofMsg->length, kcfCode, KCF_CODE_LEN) != HC_SUCCESS) { in CombineProofMsg()
/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/
Dec_speke_protocol.c530 …const uint8_t *kcfCode = ((isClient && !isVerify) || (!isClient && isVerify)) ? KCF_CODE_CLIENT : … in GenerateKcfDataMsg() local
531 … if (memcpy_s(kcfDataMsg->val, kcfDataMsg->length, kcfCode, EC_SPEKE_KCF_CODE_LEN) != HC_SUCCESS) { in GenerateKcfDataMsg()
Ddl_speke_protocol.c553 …const uint8_t *kcfCode = ((isClient && !isVerify) || (!isClient && isVerify)) ? KCF_CODE_CLIENT : … in GenerateKcfDataMsg() local
554 … if (memcpy_s(kcfDataMsg->val, kcfDataMsg->length, kcfCode, DL_SPEKE_KCF_CODE_LEN) != HC_SUCCESS) { in GenerateKcfDataMsg()