/ohos5.0/foundation/communication/dsoftbus/tests/core/authentication/unittest/ |
H A D | auth_session_key_test.cpp | 62 SessionKey sessionKey = { { 0 }, SESSIONKEY_LEN }; variable 85 SessionKey sessionKey = { { 0 }, SESSIONKEY_LEN }; variable 97 ret = GetLatestSessionKey(&clientList, AUTH_LINK_TYPE_BR, &index, &sessionKey); 99 ret = GetLatestSessionKey(&clientList, AUTH_LINK_TYPE_WIFI, &index, &sessionKey); 102 ret = GetLatestSessionKey(&clientList, AUTH_LINK_TYPE_BLE, &index, &sessionKey); 118 SessionKey sessionKey = { { 0 }, SESSIONKEY_LEN }; variable 152 SessionKey sessionKey = { { 0 }, SESSIONKEY_LEN }; variable 171 ret = GetLatestSessionKey(&clientList, AUTH_LINK_TYPE_BLE, &index, &sessionKey); 188 SessionKey sessionKey = { { 0 }, SESSIONKEY_LEN }; variable 210 ret = GetLatestSessionKey(&clientList, AUTH_LINK_TYPE_BLE, &index, &sessionKey); [all …]
|
H A D | auth_manager_test.cpp | 158 SessionKey sessionKey = { { 0 }, TEST_DATA_LEN }; variable 293 SessionKey sessionKey = { { 0 }, TEST_DATA_LEN }; variable 323 SessionKey sessionKey; variable 326 sessionKey.len = KEY_VALUE_LEN; 354 SessionKey sessionKey; variable 357 sessionKey.len = KEY_VALUE_LEN; 596 SessionKey sessionKey = { { 0 }, TEST_DATA_LEN }; variable 736 SessionKey sessionKey = { { 0 }, TEST_DATA_LEN }; variable 764 SessionKey sessionKey = { { 0 }, TEST_DATA_LEN }; variable 781 ret = ProcessEmptySessionKey(&info, keyIndex, false, &sessionKey); [all …]
|
H A D | auth_test_enhance.cpp | 339 SessionKey sessionKey; variable 340 (void)memset_s(&sessionKey, sizeof(SessionKey), 0, sizeof(SessionKey)); 341 sessionKey.len = keyLen; 342 EXPECT_EQ(AuthManagerSetSessionKey(authSeq, &info, &sessionKey, true, false), SOFTBUS_OK); 369 SessionKey sessionKey; variable 370 (void)memset_s(&sessionKey, sizeof(SessionKey), 0, sizeof(SessionKey)); 371 sessionKey.len = keyLen; 372 EXPECT_EQ(AuthManagerSetSessionKey(authSeq, &info, &sessionKey, true, false), SOFTBUS_OK);
|
H A D | auth_session_message_test.cpp | 846 SessionKey sessionKey = { .len = SESSION_KEY_LENGTH, }; variable 847 EXPECT_EQ(SOFTBUS_OK, SoftBusGenerateRandomArray(sessionKey.value, SESSION_KEY_LENGTH)); 866 info.normalizedKey = &sessionKey; 871 EXPECT_EQ(SOFTBUS_OK, PackNormalizedKeyValue(obj, &sessionKey)); 884 SessionKey sessionKey = { .len = SESSION_KEY_LENGTH, }; variable 887 EXPECT_EQ(SOFTBUS_ERR, ParseNormalizedKeyValue(&info, encNormalizedKey, &sessionKey)); 903 SessionKey sessionKey; variable 909 .normalizedKey = &sessionKey, 965 SessionKey sessionKey; variable 966 (void)memset_s(&sessionKey, sizeof(SessionKey), 0, sizeof(SessionKey)); [all …]
|
/ohos5.0/foundation/communication/dsoftbus/core/transmission/trans_channel/tcp_direct/src/ |
H A D | trans_tcp_direct_message.c | 287 …(void)memset_s(conn->appInfo.sessionKey, sizeof(conn->appInfo.sessionKey), 0, sizeof(conn->appInfo… in TransTdcPostBytes() 308 info->sessionKey = conn->appInfo.sessionKey; in GetChannelInfoFromConn() 392 …(void)memset_s(conn.appInfo.sessionKey, sizeof(conn.appInfo.sessionKey), 0, sizeof(conn.appInfo.se… in NotifyChannelOpened() 401 …(void)memset_s(conn.appInfo.sessionKey, sizeof(conn.appInfo.sessionKey), 0, sizeof(conn.appInfo.se… in NotifyChannelOpened() 417 …(void)memset_s(conn.appInfo.sessionKey, sizeof(conn.appInfo.sessionKey), 0, sizeof(conn.appInfo.se… in NotifyChannelOpened() 426 …(void)memset_s(conn.appInfo.sessionKey, sizeof(conn.appInfo.sessionKey), 0, sizeof(conn.appInfo.se… in NotifyChannelOpened() 439 …(void)memset_s(&conn.appInfo.sessionKey, sizeof(conn.appInfo.sessionKey), 0, sizeof(conn.appInfo.s… in NotifyChannelBind() 518 …(void)memset_s(conn.appInfo.sessionKey, sizeof(conn.appInfo.sessionKey), 0, sizeof(conn.appInfo.se… in NotifyChannelOpenFailed() 643 …(void)memset_s(conn.appInfo.sessionKey, sizeof(conn.appInfo.sessionKey), 0, sizeof(conn.appInfo.se… in OpenDataBusReply() 647 …(void)memset_s(conn.appInfo.sessionKey, sizeof(conn.appInfo.sessionKey), 0, sizeof(conn.appInfo.se… in OpenDataBusReply() [all …]
|
H A D | trans_tcp_direct_listener.c | 91 if (SoftBusGenerateSessionKey(conn->appInfo.sessionKey, SESSION_KEY_LENGTH) != SOFTBUS_OK) { in StartVerifySession() 97 …SetSessionKeyByChanId(conn->channelId, conn->appInfo.sessionKey, sizeof(conn->appInfo.sessionKey)); in StartVerifySession() 290 …(void)memset_s(conn.appInfo.sessionKey, sizeof(conn.appInfo.sessionKey), 0, sizeof(conn.appInfo.se… in TransProcDataRes() 386 …(void)memset_s(conn->appInfo.sessionKey, sizeof(conn->appInfo.sessionKey), 0, sizeof(conn->appInfo… in TdcOnDataEvent()
|
H A D | trans_tcp_direct_sessionconn.c | 320 (void)memset_s(item->appInfo.sessionKey, sizeof(item->appInfo.sessionKey), 0, in TransDelSessionConnById() 321 sizeof(item->appInfo.sessionKey)); in TransDelSessionConnById() 517 void SetSessionKeyByChanId(int32_t chanId, const char *sessionKey, int32_t keyLen) in SetSessionKeyByChanId() argument 519 if (sessionKey == NULL || keyLen <= 0) { in SetSessionKeyByChanId() 534 …if (memcpy_s(conn->appInfo.sessionKey, sizeof(conn->appInfo.sessionKey), sessionKey, keyLen) != EO… in SetSessionKeyByChanId()
|
/ohos5.0/foundation/communication/dsoftbus/sdk/transmission/trans_channel/udp/stream/adaptor/src/ |
H A D | stream_adaptor.cpp | 92 if (memcpy_s(sessionKey_.first, param->keyLen, param->sessionKey, param->keyLen) != EOK) { in InitAdaptor() 117 std::pair<uint8_t*, uint32_t> sessionKey) in Encrypt() argument 127 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey.first, sessionKey.second) != EOK) { in Encrypt() 144 std::pair<uint8_t*, uint32_t> sessionKey) in Decrypt() argument 154 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey.first, sessionKey.second) != EOK) { in Decrypt()
|
/ohos5.0/base/security/device_auth/services/legacy/group_auth/src/group_auth_manager/account_unrelated_group_auth/ |
H A D | account_unrelated_group_auth.c | 53 uint8_t *sessionKey = (uint8_t *)HcMalloc(keyLen, 0); in ReturnSessionKey() local 54 if (sessionKey == NULL) { in ReturnSessionKey() 73 callback->onSessionKeyReturned(requestId, sessionKey, keyLen); in ReturnSessionKey() 76 (void)memset_s(sessionKey, keyLen, 0, keyLen); in ReturnSessionKey() 77 HcFree(sessionKey); in ReturnSessionKey() 78 sessionKey = NULL; in ReturnSessionKey() 157 uint8_t *sessionKey = (uint8_t *)HcMalloc(keyLen, 0); in AddSessionKeyToSelfData() local 158 if (sessionKey == NULL) { in AddSessionKeyToSelfData() 175 (void)memset_s(sessionKey, keyLen, 0, keyLen); in AddSessionKeyToSelfData() 176 HcFree(sessionKey); in AddSessionKeyToSelfData() [all …]
|
/ohos5.0/base/security/device_auth/services/key_agree_sdk/src/ |
H A D | key_agree_sdk.c | 291 KeyAgreeResult KeyAgreeGetResult(KeyAgreeSession *session, KeyAgreeBlob *sessionKey) in KeyAgreeGetResult() argument 294 if ((session == NULL) || (sessionKey == NULL)) { in KeyAgreeGetResult() 298 …if ((sessionKey->length < MIN_SESSIONKEY_LENGTH) || (sessionKey->length > MAX_SESSIONKEY_LENGTH)) { in KeyAgreeGetResult() 316 if (memcpy_s(sessionKey->data, spekeSession->baseParam.sessionKey.length + 1, in KeyAgreeGetResult() 317 … spekeSession->baseParam.sessionKey.val, spekeSession->baseParam.sessionKey.length + 1) != EOK) { in KeyAgreeGetResult() 321 sessionKey->length = spekeSession->baseParam.sessionKey.length; in KeyAgreeGetResult()
|
/ohos5.0/foundation/communication/dsoftbus/core/transmission/trans_channel/proxy/src/ |
H A D | softbus_proxychannel_message.c | 427 (unsigned char *)appInfo->sessionKey, sizeof(appInfo->sessionKey)); in PackHandshakeMsgForNormal() 516 &(sessionBase64.len), (uint8_t *)appInfo->sessionKey, sizeof(appInfo->sessionKey)); in TransProxyPackHandshakeMsg() 761 int32_t ret = SoftBusBase64Decode((uint8_t *)appInfo->sessionKey, sizeof(appInfo->sessionKey), in TransProxyUnpackNormalHandshakeMsg() 762 &len, (uint8_t *)sessionKey, strlen(sessionKey)); in TransProxyUnpackNormalHandshakeMsg() 763 if (len != sizeof(appInfo->sessionKey) || ret != SOFTBUS_OK) { in TransProxyUnpackNormalHandshakeMsg() 798 int32_t ret = SoftBusBase64Decode((uint8_t *)appInfo->sessionKey, sizeof(appInfo->sessionKey), in TransProxyUnpackInnerHandshakeMsg() 799 &len, (uint8_t *)sessionKey, strlen(sessionKey)); in TransProxyUnpackInnerHandshakeMsg() 800 if (len != sizeof(appInfo->sessionKey) || ret != SOFTBUS_OK) { in TransProxyUnpackInnerHandshakeMsg() 813 char sessionKey[BASE64KEY] = { 0 }; in TransProxyUnpackHandshakeMsg() local 857 (void)memset_s(sessionKey, sizeof(sessionKey), 0, sizeof(sessionKey)); in TransProxyUnpackHandshakeMsg() [all …]
|
H A D | softbus_proxychannel_manager.c | 322 (void)memset_s(item->appInfo.sessionKey, sizeof(item->appInfo.sessionKey), 0, in TransProxyDelChanByChanId() 625 if (memcpy_s(sessionKey, sessionKeySize, item->appInfo.sessionKey, in TransProxyGetSessionKeyByChanId() 879 …(void)memset_s(info.appInfo.sessionKey, sizeof(info.appInfo.sessionKey), 0, sizeof(info.appInfo.se… in TransProxyProcessHandshakeAckMsg() 1067 (void)memset_s(appInfo.sessionKey, sizeof(appInfo.sessionKey), 0, sizeof(appInfo.sessionKey)); in TransProxyProcessHandshakeAuthMsg() 1345 …(void)memset_s(info->appInfo.sessionKey, sizeof(info->appInfo.sessionKey), 0, sizeof(info->appInfo… in TransProxyProcessResetMsg() 1376 …(void)memset_s(info->appInfo.sessionKey, sizeof(info->appInfo.sessionKey), 0, sizeof(info->appInfo… in TransProxyProcessKeepAlive() 1403 …(void)memset_s(info->appInfo.sessionKey, sizeof(info->appInfo.sessionKey), 0, sizeof(info->appInfo… in TransProxyProcessKeepAliveAck() 1423 …(void)memset_s(info->appInfo.sessionKey, sizeof(info->appInfo.sessionKey), 0, sizeof(info->appInfo… in TransProxyProcessDataRecv() 1542 (void)memset_s(channelInfo->appInfo.sessionKey, sizeof(channelInfo->appInfo.sessionKey), 0, in TransProxyNegoSessionKeySucc() 1634 …(void)memset_s(info->appInfo.sessionKey, sizeof(info->appInfo.sessionKey), 0, sizeof(info->appInfo… in TransProxyCloseProxyChannel() [all …]
|
/ohos5.0/foundation/communication/dsoftbus/tests/core/transmission/trans_channel/proxy_channel/ |
H A D | softbus_proxychannel_message_test.cpp | 746 strcpy_s(appInfo->sessionKey, TEST_CHANNEL_IDENTITY_LEN, TEST_SESSION_KEY); 824 strcpy_s(appInfo->sessionKey, TEST_CHANNEL_IDENTITY_LEN, TEST_SESSION_KEY); 863 char sessionKey[FAST_TRANS_DATASIZE] = {0}; variable 871 strcpy_s(sessionKey, TEST_CHANNEL_IDENTITY_LEN, TEST_SESSION_KEY); 876 ret = TransProxyEncryptFastData(sessionKey, seq, in, inLen, out, &outLen); 1000 char sessionKey[FAST_TRANS_DATASIZE] = {0}; variable 1030 char sessionKey[FAST_TRANS_DATASIZE] = {0}; variable 1142 char sessionKey[FAST_TRANS_DATASIZE] = {0}; variable 1143 strcpy_s(sessionKey, TEST_CHANNEL_IDENTITY_LEN, TEST_SESSION_KEY); 1212 char sessionKey[FAST_TRANS_DATASIZE] = {0}; variable [all …]
|
/ohos5.0/foundation/communication/dsoftbus/core/transmission/trans_channel/udp_negotiation/src/ |
H A D | trans_udp_negotiation.c | 129 info.sessionKey = (char*)appInfo->sessionKey; in NotifyUdpChannelOpened() 301 (void)memset_s(newChannel->info.sessionKey, sizeof(newChannel->info.sessionKey), 0, in NewUdpChannelByAppInfo() 614 …(void)memset_s(channel.info.sessionKey, sizeof(channel.info.sessionKey), 0, sizeof(channel.info.se… in TransOnExchangeUdpInfoReply() 810 (void)memset_s(channel->info.sessionKey, sizeof(channel->info.sessionKey), 0, in UdpOnAuthConnOpened() 845 (void)memset_s(channel->info.sessionKey, sizeof(channel->info.sessionKey), 0, in UdpOnAuthConnOpenFailed() 882 (void)memset_s(channel->info.sessionKey, sizeof(channel->info.sessionKey), 0, in TransCloseUdpChannelByRequestId() 896 …(void)memset_s(channel.info.sessionKey, sizeof(channel.info.sessionKey), 0, sizeof(channel.info.se… in CheckAuthConnStatus() 1001 int32_t ret = SoftBusGenerateSessionKey(appInfo->sessionKey, sizeof(appInfo->sessionKey)); in PrepareAppInfoForUdpOpen() 1041 (void)memset_s(udpChannel.info.sessionKey, sizeof(udpChannel.info.sessionKey), 0, in TransUdpGetChannelAndOpenConn() 1088 (void)memset_s(newChannel->info.sessionKey, sizeof(newChannel->info.sessionKey), 0, in TransOpenUdpChannel() [all …]
|
H A D | trans_udp_channel_manager.c | 72 (void)memset_s(udpChannel->info.sessionKey, sizeof(udpChannel->info.sessionKey), 0, in NotifyTimeOutUdpChannel() 73 sizeof(udpChannel->info.sessionKey)); in NotifyTimeOutUdpChannel() 147 (void)memset_s(udpChannel->info.sessionKey, sizeof(udpChannel->info.sessionKey), 0, in TransUdpChannelMgrDeinit() 148 sizeof(udpChannel->info.sessionKey)); in TransUdpChannelMgrDeinit() 215 … (void)memset_s(udpChannelNode->info.sessionKey, sizeof(udpChannelNode->info.sessionKey), 0, in TransDelUdpChannel() 216 sizeof(udpChannelNode->info.sessionKey)); in TransDelUdpChannel() 240 (void)memset_s(udpChannel->info.sessionKey, sizeof(udpChannel->info.sessionKey), 0, in NotifyUdpChannelCloseInList() 241 sizeof(udpChannel->info.sessionKey)); in NotifyUdpChannelCloseInList()
|
H A D | trans_udp_negotiation_exchange.c | 129 …t32_t ret = SoftBusBase64Decode((unsigned char*)appInfo->sessionKey, sizeof(appInfo->sessionKey), … in TransUnpackRequestUdpInfo() 132 TRANS_CHECK_AND_RETURN_RET_LOGE(len == sizeof(appInfo->sessionKey), in TransUnpackRequestUdpInfo() 195 (unsigned char*)appInfo->sessionKey, sizeof(appInfo->sessionKey)); in TransPackRequestUdpInfo()
|
/ohos5.0/foundation/communication/dsoftbus/tests/sdk/transmission/fuzztest/vtpstreamsocket_fuzzer/ |
H A D | vtpstreamsocket_fuzzer.cpp | 36 std::pair<uint8_t*, uint32_t> sessionKey = std::make_pair(nullptr, 0); in VtpCreateClientTest() local 38 vtpStreamSocket.CreateClient(ipPort, streamType, sessionKey); in VtpCreateClientTest() 39 vtpStreamSocket.CreateClient(ipPort, ipPort, streamType, sessionKey); in VtpCreateClientTest() 50 std::pair<uint8_t*, uint32_t> sessionKey = std::make_pair(nullptr, 0); in VtpCreateServerTest() local 52 vtpStreamSocket.CreateServer(ipPort, streamType, sessionKey); in VtpCreateServerTest()
|
/ohos5.0/foundation/communication/dsoftbus/core/transmission/common/src/ |
H A D | softbus_message_open_channel.c | 153 &keyLen, (unsigned char *)appInfo->sessionKey, SESSION_KEY_LENGTH); in PackRequest() 212 char sessionKey[BASE64KEY] = {0}; in ParseMessageToAppInfo() local 215 !GetJsonObjectStringItem(msg, SESSION_KEY, sessionKey, sizeof(sessionKey))) { in ParseMessageToAppInfo() 235 int32_t ret = SoftBusBase64Decode((unsigned char *)appInfo->sessionKey, SESSION_KEY_LENGTH, in ParseMessageToAppInfo() 236 &len, (unsigned char *)sessionKey, strlen(sessionKey)); in ParseMessageToAppInfo() 237 (void)memset_s(sessionKey, sizeof(sessionKey), 0, sizeof(sessionKey)); in ParseMessageToAppInfo() 416 static int32_t TransTdcEncrypt(const char *sessionKey, const char *in, uint32_t inLen, char *out, u… in TransTdcEncrypt() argument 420 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey, SESSION_KEY_LENGTH) != EOK) { in TransTdcEncrypt() 468 if (TransTdcEncrypt(appInfo->sessionKey, (const char *)appInfo->fastTransData, in TransTdcPackFastData()
|
/ohos5.0/foundation/communication/dsoftbus/core/authentication/src/ |
H A D | auth_session_key.c | 426 SessionKey sessionKey; in EncryptData() local 427 if (GetLatestSessionKey(list, type, &index, &sessionKey) != SOFTBUS_OK) { in EncryptData() 429 AUTH_LOGD(AUTH_FSM, "keyLen=%{public}d", sessionKey.len); in EncryptData() 434 AesGcmCipherKey cipherKey = {.keyLen = sessionKey.len}; in EncryptData() 435 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey.value, sessionKey.len) != EOK) { in EncryptData() 440 (void)memset_s(&sessionKey, sizeof(SessionKey), 0, sizeof(SessionKey)); in EncryptData() 462 SessionKey sessionKey; in DecryptData() local 463 if (GetSessionKeyByIndex(list, index, type, &sessionKey) != SOFTBUS_OK) { in DecryptData() 467 AesGcmCipherKey cipherKey = {.keyLen = sessionKey.len}; in DecryptData() 468 if (memcpy_s(cipherKey.key, SESSION_KEY_LENGTH, sessionKey.value, sessionKey.len) != EOK) { in DecryptData() [all …]
|
/ohos5.0/foundation/communication/dsoftbus/tests/sdk/transmission/trans_channel/udp/stream/libsoftbus_stream/stream_manager_test/ |
H A D | stream_manager_test.cpp | 83 std::pair<uint8_t*, uint32_t> sessionKey = std::make_pair(nullptr, 0); variable 86 sessionKey); 90 sessionKey); 117 std::pair<uint8_t*, uint32_t> sessionKey = std::make_pair(nullptr, 0); variable 119 …t ret = streamSocketListener->CreateStreamServerChannel(*local, *protocol, streamType, sessionKey); 123 … ret = streamSocketListener->CreateStreamServerChannel(*local, *protocol, streamType, sessionKey);
|
/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_v1_protocol/ |
H A D | pake_v1_protocol_common.c | 91 params->sessionKey.length = PAKE_SESSION_KEY_LEN; in AllocDefaultParams() 92 params->sessionKey.val = (uint8_t *)HcMalloc(params->sessionKey.length, 0); in AllocDefaultParams() 93 if (params->sessionKey.val == NULL) { in AllocDefaultParams() 229 unionKey.length = params->sessionKey.length + params->hmacKey.length; in DeriveKeyFromSharedSecret() 248 …if (memcpy_s(params->sessionKey.val, params->sessionKey.length, unionKey.val, params->sessionKey.l… in DeriveKeyFromSharedSecret() 254 unionKey.val + params->sessionKey.length, params->hmacKey.length) != EOK) { in DeriveKeyFromSharedSecret()
|
/ohos5.0/base/security/device_auth/services/legacy/group_auth/src/group_auth_manager/account_related_group_auth/ |
H A D | account_related_group_auth.c | 65 uint8_t *sessionKey = (uint8_t *)HcMalloc(keyLen, 0); in ReturnSessionKey() local 66 if (sessionKey == NULL) { in ReturnSessionKey() 85 callback->onSessionKeyReturned(requestId, sessionKey, keyLen); in ReturnSessionKey() 88 (void)memset_s(sessionKey, keyLen, 0, keyLen); in ReturnSessionKey() 89 HcFree(sessionKey); in ReturnSessionKey() 90 sessionKey = NULL; in ReturnSessionKey() 97 uint8_t *sessionKey = (uint8_t *)HcMalloc(keyLen, 0); in GetSessionKeyForAccount() local 98 if (sessionKey == NULL) { in GetSessionKeyForAccount() 115 (void)memset_s(sessionKey, keyLen, 0, keyLen); in GetSessionKeyForAccount() 116 HcFree(sessionKey); in GetSessionKeyForAccount() [all …]
|
/ohos5.0/foundation/communication/dsoftbus/sdk/transmission/trans_channel/udp/stream/libsoftbus_stream/ |
H A D | stream_manager.cpp | 45 int streamType, std::pair<uint8_t*, uint32_t> sessionKey) in CreateStreamClientChannel() argument 60 if (streamSocket->CreateClient(local, remote, streamType, sessionKey)) { in CreateStreamClientChannel() 76 int streamType, std::pair<uint8_t*, uint32_t> sessionKey) in CreateStreamServerChannel() argument 90 if (!streamSocket->CreateServer(local, streamType, sessionKey)) { in CreateStreamServerChannel()
|
/ohos5.0/foundation/communication/dsoftbus/tests/core/transmission/trans_channel/tcp_direct/unittest/ |
H A D | trans_server_tcp_direct_test.cpp | 177 SessionKey *sessionKey = (SessionKey*)SoftBusCalloc(sizeof(SessionKey)); in TestAddAuthManager() local 178 if (sessionKey == NULL) { in TestAddAuthManager() 182 …if (memcpy_s(sessionKey->value, sizeof(sessionKey->value), sessionKeyStr, strlen(sessionKeyStr))) { in TestAddAuthManager() 184 SoftBusFree(sessionKey); in TestAddAuthManager() 187 sessionKey->len = strlen(sessionKeyStr); in TestAddAuthManager() 189 int32_t ret = AuthManagerSetSessionKey(authSeq, info, sessionKey, false, false); in TestAddAuthManager() 278 SessionKey sessionKey; variable 280 int32_t ret = AuthManagerSetSessionKey(authSeq, info, &sessionKey, false, false);
|
/ohos5.0/base/security/device_auth/services/protocol/src/iso_protocol/ |
H A D | iso_protocol_common.c | 51 params->sessionKey.length = ISO_SESSION_KEY_LEN; in InitIsoBaseParams() 52 params->sessionKey.val = (uint8_t *)HcMalloc(params->sessionKey.length, 0); in InitIsoBaseParams() 53 if (params->sessionKey.val == NULL) { in InitIsoBaseParams() 77 FreeAndCleanKey(¶ms->sessionKey); in DestroyIsoBaseParams() 231 res = params->loader->computeHkdf(&keyParams, &hkdfSaltBuf, &keyInfoBuf, ¶ms->sessionKey); in IsoGenSessionKey() 234 FreeAndCleanKey(¶ms->sessionKey); in IsoGenSessionKey() 391 FreeAndCleanKey(¶ms->sessionKey); in IsoServerGenSessionKeyAndCalToken()
|