Home
last modified time | relevance | path

Searched refs:challengePeer (Results 1 – 11 of 11) sorted by relevance

/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/
H A Dpake_v1_protocol_common.c43 HcFree(params->challengePeer.val); in DestroyPakeV1BaseParams()
44 params->challengePeer.val = NULL; in DestroyPakeV1BaseParams()
84 params->challengePeer.length = PAKE_CHALLENGE_LEN; in AllocDefaultParams()
85 params->challengePeer.val = (uint8_t *)HcMalloc(params->challengePeer.length, 0); in AllocDefaultParams()
86 if (params->challengePeer.val == NULL) { in AllocDefaultParams()
307 params->challengePeer.val, params->challengePeer.length) != EOK) { in GenerateProof()
330 …if (memcpy_s(challenge.val, challenge.length, params->challengePeer.val, params->challengePeer.len… in VerifyProof()
335 …if (memcpy_s(challenge.val + params->challengePeer.length, challenge.length - params->challengePee… in VerifyProof()
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/standard_exchange_task/
H A Dstandard_exchange_message_util.c113 int res = InitSingleParam(&(params->baseParams.challengePeer), PAKE_CHALLENGE_LEN); in GetPeerChallenge()
119 params->baseParams.challengePeer.val, params->baseParams.challengePeer.length); in GetPeerChallenge()
H A Dcommon_standard_bind_exchange.c171 …foLen = pakeParams->baseParams.challengeSelf.length + pakeParams->baseParams.challengePeer.length + in GenerateSignInfo()
187 …memcpy_s(msgInfo.val + usedLen, msgInfo.length - usedLen, pakeParams->baseParams.challengePeer.val, in GenerateSignInfo()
188 pakeParams->baseParams.challengePeer.length) != EOK) { in GenerateSignInfo()
193 usedLen += pakeParams->baseParams.challengePeer.length; in GenerateSignInfo()
356 …uint32_t verifyMsgLen = exchangeParams->authInfo.length + pakeParams->baseParams.challengePeer.len… in VerifySignInfo()
364 if (memcpy_s(verifyMsg.val, verifyMsg.length, pakeParams->baseParams.challengePeer.val, in VerifySignInfo()
365 pakeParams->baseParams.challengePeer.length) != EOK) { in VerifySignInfo()
369 uint32_t usedLen = pakeParams->baseParams.challengePeer.length; in VerifySignInfo()
H A Dstandard_client_bind_exchange_task.c53 if (params->baseParams.challengePeer.val == NULL) { in ExchangeRequest()
H A Dstandard_server_bind_exchange_task.c88 if (params->baseParams.challengePeer.val == NULL) { in ExchangeResponse()
/ohos5.0/base/security/device_auth/test/fuzztest/authenticators/account_unrelated/pake/standardexchangetask_fuzzer/
H A Dstandardexchangetask_fuzzer.cpp101 pakeParams.baseParams.challengePeer.val = challengeVal; in StandardExchangeTaskTest003()
102 pakeParams.baseParams.challengePeer.length = challengeLen; in StandardExchangeTaskTest003()
/ohos5.0/base/security/device_auth/test/unittest/deviceauth/source/
H A Dstandard_exchange_task_test.cpp104 pakeParams.baseParams.challengePeer.val = challengeVal;
105 pakeParams.baseParams.challengePeer.length = challengeLen;
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/
H A Dpake_v1_server_protocol_task.c154 if (GetByteFromJson(in, FIELD_CHALLENGE, params->baseParams.challengePeer.val, in PakeServerConfirm()
155 params->baseParams.challengePeer.length) != HC_SUCCESS) { in PakeServerConfirm()
H A Dpake_v1_client_protocol_task.c99 res = GetByteFromJson(in, FIELD_CHALLENGE, params->baseParams.challengePeer.val, in ParseMsgForClientConfirm()
100 params->baseParams.challengePeer.length); in ParseMsgForClientConfirm()
/ohos5.0/base/security/device_auth/services/protocol/inc/pake_protocol/
H A Dpake_defs.h53 Uint8Buff challengePeer; member
/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/
H A Dpake_v2_protocol_common.c47 HcFree(params->challengePeer.val); in DestroyPakeV2BaseParams()
48 params->challengePeer.val = NULL; in DestroyPakeV2BaseParams()
117 params->challengePeer.val = NULL; in FillDefaultValue()
118 params->challengePeer.length = 0; in FillDefaultValue()