Searched refs:InitUint8Buff (Results 1 – 11 of 11) sorted by relevance
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
H A D | ec_speke_protocol.c | 133 if (InitUint8Buff(¶ms->salt, EC_SPEKE_SALT_LEN) != HC_SUCCESS) { in GetSaltFromInput() 165 if (InitUint8Buff(¶ms->kcfDataPeer, SHA256_LEN) != HC_SUCCESS) { in GetKcfDataPeerFromInput() 222 res = InitUint8Buff(¶ms->base, 2 * EC_SPEKE_EC_KEY_LEN); in EcSpekeCalBase() 225 res = InitUint8Buff(¶ms->base, EC_SPEKE_EC_KEY_LEN); in EcSpekeCalBase() 281 res = InitUint8Buff(¶ms->epkSelf, EC_SPEKE_EC_KEY_LEN); in EcSpekeCalEpkSelf() 335 if (InitUint8Buff(&sidSelfMsg, sidSelfMsgLen) != HC_SUCCESS) { in CalSidSelf() 363 if (InitUint8Buff(&sidPeerMsg, sidPeerMsgLen) != HC_SUCCESS) { in CalSidPeer() 445 if (InitUint8Buff(&p, pLen) != HC_SUCCESS) { in GenerateSharedSecretMsg() 493 if (InitUint8Buff(¶ms->sharedSecret, SHA256_LEN)) { in CalSharedSecret() 577 if (InitUint8Buff(&kcfDataMsg, kcfDataMsgLen) != HC_SUCCESS) { in CalKcfDataSelf() [all …]
|
H A D | dl_speke_protocol.c | 147 if (InitUint8Buff(¶ms->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput() 160 if (InitUint8Buff(¶ms->salt, DL_SPEKE_SALT_LEN) != HC_SUCCESS) { in GetSaltFromInput() 192 if (InitUint8Buff(¶ms->kcfDataPeer, SHA256_LEN) != HC_SUCCESS) { in GetKcfDataPeerFromInput() 244 if (InitUint8Buff(¶ms->salt, DL_SPEKE_SALT_LEN) != HC_SUCCESS) { in CalSalt() 289 if (InitUint8Buff(¶ms->base, params->innerKeyLen) != HC_SUCCESS) { in DlSpekeCalBase() 371 if (InitUint8Buff(&sidSelfMsg, sidSelfMsgLen) != HC_SUCCESS) { in CalSidSelf() 399 if (InitUint8Buff(&sidPeerMsg, sidPeerMsgLen) != HC_SUCCESS) { in CalSidPeer() 508 if (InitUint8Buff(&sharedSecretMsg, sharedSecretMsgLen) != HC_SUCCESS) { in CalSharedSecret() 517 if (InitUint8Buff(¶ms->sharedSecret, SHA256_LEN)) { in CalSharedSecret() 596 if (InitUint8Buff(&kcfDataMsg, kcfDataMsgLen) != HC_SUCCESS) { in CalKcfDataSelf() [all …]
|
/ohos5.0/base/security/device_auth/services/mk_agree/src/ |
H A D | mk_agree_task.c | 38 if (InitUint8Buff(&devicePk, PAKE_X25519_KEY_PAIR_LEN) != HC_SUCCESS) { in GeneratePakeRequestPayload() 82 if (InitUint8Buff(payloadData, payloadLen + 1) != HC_SUCCESS) { in GeneratePakeRequestPayloadData() 100 if (InitUint8Buff(&devicePk, PAKE_X25519_KEY_PAIR_LEN) != HC_SUCCESS) { in GeneratePakeResponsePayload() 130 int32_t res = InitUint8Buff(returnSalt, firstSalt->length + secondSalt->length); in CombineSalt() 175 if (InitUint8Buff(&kcfData, HMAC_LEN) != HC_SUCCESS) { in GeneratePakeResponsePayloadData() 207 if (InitUint8Buff(payloadData, payloadLen + 1) != HC_SUCCESS) { in GeneratePakeResponsePayloadData() 379 if (InitUint8Buff(payload, payloadLen) != HC_SUCCESS) { in ParsePakeData()
|
H A D | key_manager.c | 273 if (InitUint8Buff(&pskBuff, MK_LEN) != HC_SUCCESS) { in GeneratePseudonymPsk()
|
/ohos5.0/base/security/device_auth/common_lib/interfaces/ |
H A D | uint8buff_utils.h | 31 int32_t InitUint8Buff(Uint8Buff *buff, uint32_t buffLen);
|
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/ |
H A D | pub_key_exchange.c | 250 if (InitUint8Buff(¶ms->pkSelf, PAKE_ED25519_KEY_PAIR_LEN) != HC_SUCCESS) { in ExportSelfPubKey() 312 if (InitUint8Buff(¶ms->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput() 334 if (InitUint8Buff(¶ms->pkPeer, PAKE_ED25519_KEY_PAIR_LEN) != HC_SUCCESS) { in ServerSendPkInfoParseEvent() 505 if (InitUint8Buff(¶ms->pkPeer, PAKE_ED25519_KEY_PAIR_LEN) != HC_SUCCESS) { in ClientImportPkParseEvent()
|
H A D | auth_code_import.c | 228 if (InitUint8Buff(¶ms->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
|
/ohos5.0/base/security/device_auth/common_lib/impl/src/ |
H A D | uint8buff_utils.c | 23 int32_t InitUint8Buff(Uint8Buff *buff, uint32_t buffLen) in InitUint8Buff() function
|
/ohos5.0/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | mk_agree_test.cpp | 263 ret = InitUint8Buff(&devicePk, PAKE_X25519_KEY_PAIR_LEN);
|
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/ |
H A D | dev_session_v2.c | 593 if (InitUint8Buff(&peerCert->pkInfoSignature, pkInfoSignatureLen) != HC_SUCCESS) { in BuildPeerCertInfo() 748 if (InitUint8Buff(&saltMsg, saltMsgLen) != HC_SUCCESS) { in CalSalt() 768 if (InitUint8Buff(&impl->salt, DEV_SESSION_SALT_LEN) != HC_SUCCESS) { in GenerateDevSessionSalt() 1412 if (InitUint8Buff(&impl->salt, DEV_SESSION_SALT_LEN) != HC_SUCCESS) { in GetSessionSaltFromInput()
|
/ohos5.0/base/security/device_auth/services/identity_manager/src/ |
H A D | credential_operator.c | 244 int32_t res = InitUint8Buff(param->publicKey, PAKE_ED25519_KEY_PAIR_LEN); in DecodeServiceTypeAndPublicKey()
|