Home
last modified time | relevance | path

Searched refs:InitUint8Buff (Results 1 – 11 of 11) sorted by relevance

/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/
H A Dec_speke_protocol.c133 if (InitUint8Buff(&params->salt, EC_SPEKE_SALT_LEN) != HC_SUCCESS) { in GetSaltFromInput()
165 if (InitUint8Buff(&params->kcfDataPeer, SHA256_LEN) != HC_SUCCESS) { in GetKcfDataPeerFromInput()
222 res = InitUint8Buff(&params->base, 2 * EC_SPEKE_EC_KEY_LEN); in EcSpekeCalBase()
225 res = InitUint8Buff(&params->base, EC_SPEKE_EC_KEY_LEN); in EcSpekeCalBase()
281 res = InitUint8Buff(&params->epkSelf, EC_SPEKE_EC_KEY_LEN); in EcSpekeCalEpkSelf()
335 if (InitUint8Buff(&sidSelfMsg, sidSelfMsgLen) != HC_SUCCESS) { in CalSidSelf()
363 if (InitUint8Buff(&sidPeerMsg, sidPeerMsgLen) != HC_SUCCESS) { in CalSidPeer()
445 if (InitUint8Buff(&p, pLen) != HC_SUCCESS) { in GenerateSharedSecretMsg()
493 if (InitUint8Buff(&params->sharedSecret, SHA256_LEN)) { in CalSharedSecret()
577 if (InitUint8Buff(&kcfDataMsg, kcfDataMsgLen) != HC_SUCCESS) { in CalKcfDataSelf()
[all …]
H A Ddl_speke_protocol.c147 if (InitUint8Buff(&params->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
160 if (InitUint8Buff(&params->salt, DL_SPEKE_SALT_LEN) != HC_SUCCESS) { in GetSaltFromInput()
192 if (InitUint8Buff(&params->kcfDataPeer, SHA256_LEN) != HC_SUCCESS) { in GetKcfDataPeerFromInput()
244 if (InitUint8Buff(&params->salt, DL_SPEKE_SALT_LEN) != HC_SUCCESS) { in CalSalt()
289 if (InitUint8Buff(&params->base, params->innerKeyLen) != HC_SUCCESS) { in DlSpekeCalBase()
371 if (InitUint8Buff(&sidSelfMsg, sidSelfMsgLen) != HC_SUCCESS) { in CalSidSelf()
399 if (InitUint8Buff(&sidPeerMsg, sidPeerMsgLen) != HC_SUCCESS) { in CalSidPeer()
508 if (InitUint8Buff(&sharedSecretMsg, sharedSecretMsgLen) != HC_SUCCESS) { in CalSharedSecret()
517 if (InitUint8Buff(&params->sharedSecret, SHA256_LEN)) { in CalSharedSecret()
596 if (InitUint8Buff(&kcfDataMsg, kcfDataMsgLen) != HC_SUCCESS) { in CalKcfDataSelf()
[all …]
/ohos5.0/base/security/device_auth/services/mk_agree/src/
H A Dmk_agree_task.c38 if (InitUint8Buff(&devicePk, PAKE_X25519_KEY_PAIR_LEN) != HC_SUCCESS) { in GeneratePakeRequestPayload()
82 if (InitUint8Buff(payloadData, payloadLen + 1) != HC_SUCCESS) { in GeneratePakeRequestPayloadData()
100 if (InitUint8Buff(&devicePk, PAKE_X25519_KEY_PAIR_LEN) != HC_SUCCESS) { in GeneratePakeResponsePayload()
130 int32_t res = InitUint8Buff(returnSalt, firstSalt->length + secondSalt->length); in CombineSalt()
175 if (InitUint8Buff(&kcfData, HMAC_LEN) != HC_SUCCESS) { in GeneratePakeResponsePayloadData()
207 if (InitUint8Buff(payloadData, payloadLen + 1) != HC_SUCCESS) { in GeneratePakeResponsePayloadData()
379 if (InitUint8Buff(payload, payloadLen) != HC_SUCCESS) { in ParsePakeData()
H A Dkey_manager.c273 if (InitUint8Buff(&pskBuff, MK_LEN) != HC_SUCCESS) { in GeneratePseudonymPsk()
/ohos5.0/base/security/device_auth/common_lib/interfaces/
H A Duint8buff_utils.h31 int32_t InitUint8Buff(Uint8Buff *buff, uint32_t buffLen);
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/
H A Dpub_key_exchange.c250 if (InitUint8Buff(&params->pkSelf, PAKE_ED25519_KEY_PAIR_LEN) != HC_SUCCESS) { in ExportSelfPubKey()
312 if (InitUint8Buff(&params->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
334 if (InitUint8Buff(&params->pkPeer, PAKE_ED25519_KEY_PAIR_LEN) != HC_SUCCESS) { in ServerSendPkInfoParseEvent()
505 if (InitUint8Buff(&params->pkPeer, PAKE_ED25519_KEY_PAIR_LEN) != HC_SUCCESS) { in ClientImportPkParseEvent()
H A Dauth_code_import.c228 if (InitUint8Buff(&params->authIdPeer, authIdPeerStrLen) != HC_SUCCESS) { in GetAuthIdPeerFromInput()
/ohos5.0/base/security/device_auth/common_lib/impl/src/
H A Duint8buff_utils.c23 int32_t InitUint8Buff(Uint8Buff *buff, uint32_t buffLen) in InitUint8Buff() function
/ohos5.0/base/security/device_auth/test/unittest/deviceauth/source/
H A Dmk_agree_test.cpp263 ret = InitUint8Buff(&devicePk, PAKE_X25519_KEY_PAIR_LEN);
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/
H A Ddev_session_v2.c593 if (InitUint8Buff(&peerCert->pkInfoSignature, pkInfoSignatureLen) != HC_SUCCESS) { in BuildPeerCertInfo()
748 if (InitUint8Buff(&saltMsg, saltMsgLen) != HC_SUCCESS) { in CalSalt()
768 if (InitUint8Buff(&impl->salt, DEV_SESSION_SALT_LEN) != HC_SUCCESS) { in GenerateDevSessionSalt()
1412 if (InitUint8Buff(&impl->salt, DEV_SESSION_SALT_LEN) != HC_SUCCESS) { in GetSessionSaltFromInput()
/ohos5.0/base/security/device_auth/services/identity_manager/src/
H A Dcredential_operator.c244 int32_t res = InitUint8Buff(param->publicKey, PAKE_ED25519_KEY_PAIR_LEN); in DecodeServiceTypeAndPublicKey()