/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/ |
H A D | standard_exchange_message_util.c | 80 res = InitSingleParam(cipher, exAuthInfoLen - nonce->length); in ParseNonceAndCipherFromJson() 98 int res = InitSingleParam(&(params->baseParams.challengeSelf), PAKE_CHALLENGE_LEN); in GenerateSelfChallenge() 113 int res = InitSingleParam(&(params->baseParams.challengePeer), PAKE_CHALLENGE_LEN); in GetPeerChallenge()
|
H A D | common_standard_bind_exchange.c | 148 res = InitSingleParam(&(exchangeParams->authInfo), HcStrlen(authInfoStr)); in PackageAuthInfo() 241 res = InitSingleParam(&(exchangeParams->exInfoCipher), exchangeInfo.length + AE_TAG_LEN); in EncryptAuthAndSignInfo() 307 res = InitSingleParam(&(exchangeParams->authInfo), exchangeInfo.length - SIGNATURE_LEN); in DecryptAuthAndSignInfo()
|
/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_ec_common/ |
H A D | pake_protocol_ec_common.c | 59 int32_t res = InitSingleParam(&(params->eskSelf), params->eskSelf.length); in InitEcPakeParams() 64 res = InitSingleParam(&(params->epkSelf), keyBufferLen); in InitEcPakeParams() 69 res = InitSingleParam(&(params->base), keyBufferLen); in InitEcPakeParams()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/pake_v2_auth_task/ |
H A D | pake_v2_auth_task_common.c | 133 if (InitSingleParam(param, len + 1) != HC_SUCCESS) { in InitCharStringBuff() 332 if (InitSingleParam(¶ms->pkInfoPeer, len) != HC_SUCCESS) { in GetPkInfoPeer() 369 if (InitSingleParam(¶ms->pkInfoSelf, pkInfoLen) != HC_SUCCESS) { in GetAsyPubKeyInfo() 422 GOTO_IF_ERR(InitSingleParam(¶ms->pakeParams.epkPeer, P256_PUBLIC_SIZE)); in InitPakeAuthParams() 423 GOTO_IF_ERR(InitSingleParam(¶ms->pkInfoSignSelf, SIGNATURE_SIZE)); in InitPakeAuthParams() 424 GOTO_IF_ERR(InitSingleParam(¶ms->pkInfoSignPeer, SIGNATURE_SIZE)); in InitPakeAuthParams() 425 GOTO_IF_ERR(InitSingleParam(¶ms->pakeParams.idSelf, deviceIdLen + 1)); in InitPakeAuthParams()
|
/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_protocol_dl_common/ |
H A D | pake_protocol_dl_common.c | 107 res = InitSingleParam(&(params->eskSelf), params->eskSelf.length); in InitDlPakeParams() 112 res = InitSingleParam(&(params->epkSelf), params->innerKeyLen); in InitDlPakeParams() 117 res = InitSingleParam(&(params->base), params->innerKeyLen); in InitDlPakeParams()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_related/auth/iso_auth_task/ |
H A D | iso_auth_task_common.c | 73 int32_t res = InitSingleParam(¶ms->devIdSelf, DEV_AUTH_DEVICE_ID_SIZE); in FillPayload() 104 … res = InitSingleParam(¶ms->isoBaseParams.authIdSelf, params->isoBaseParams.authIdSelf.length); in FillPayload() 152 res = InitSingleParam(outKey, AUTH_TOKEN_SIZE_BYTE); in GenerateAuthTokenForAccessory() 172 int32_t res = InitSingleParam(authTokenAlias, SHA256_LEN); in GenerateTokenAliasForController() 337 …int32_t res = InitSingleParam(&(params->isoBaseParams.authIdPeer), HcStrlen(payloadHex) / BYTE_TO_… in ExtractPeerAuthId()
|
/ohos5.0/base/security/device_auth/services/protocol/inc/ |
H A D | protocol_common.h | 34 int32_t InitSingleParam(Uint8Buff *param, uint32_t len);
|
/ohos5.0/base/security/device_auth/services/protocol/src/ |
H A D | protocol_common.c | 33 int32_t InitSingleParam(Uint8Buff *param, uint32_t len) in InitSingleParam() function
|
/ohos5.0/base/security/device_auth/services/key_agree_sdk/src/ |
H A D | key_agree_session.c | 60 int32_t res = InitSingleParam(authIdPeer, authIdLen); in GetIdPeer() 302 …int32_t res = InitSingleParam(&(baseParams->epkPeer), HcStrlen(epkPeerHex) / BYTE_TO_HEX_OPER_LENG… in GetDasEpkPeerFromJson() 378 res = InitSingleParam(&(spekeSession->baseParam.extraData), versionStrLength); in FillExtraData() 404 … int32_t res = InitSingleParam(&(spekeSession->baseParam.psk), spekeSession->sharedSecret.length); in FillPskAndDeviceId() 416 res = InitSingleParam(&(spekeSession->baseParam.idSelf), spekeSession->deviceId.length); in FillPskAndDeviceId()
|
H A D | key_agree_sdk.c | 112 if (InitSingleParam(&(spekeSession->sharedSecret), sharedSecret->length) != HC_SUCCESS) { in InitKeyAgreeStartSessionParams() 123 if (InitSingleParam(&(spekeSession->deviceId), deviceId->length) != HC_SUCCESS) { in InitKeyAgreeStartSessionParams()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/ |
H A D | pake_message_util.c | 117 …int res = InitSingleParam(&(params->baseParams.epkPeer), HcStrlen(epkPeerHex) / BYTE_TO_HEX_OPER_L… in GetDasEpkPeerFromJson()
|
H A D | pake_task_common.c | 125 int res = InitSingleParam(&(params->baseParams.psk), HcStrlen(pinString)); in FillPskWithPin()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_protocol_task_common.c | 83 res = InitSingleParam(¶ms->returnKey, params->returnKey.length); in AllocReturnKey() 246 … int res = InitSingleParam(&(params->baseParams.psk), PAKE_PSK_LEN * BYTE_TO_HEX_OPER_LENGTH + 1); in ConvertPakeV1Psk()
|
/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
H A D | pake_v1_protocol_common.c | 266 int32_t res = InitSingleParam(¶ms->sharedSecret, params->innerKeyLen); in GenerateSessionKey()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/common/ |
H A D | das_task_common.c | 475 int32_t res = InitSingleParam(authIdPeer, authIdLen); in GetIdPeer()
|