/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/ |
H A D | das_standard_token_manager.c | 245 static int32_t GeneratePeerKeyAlias(const PakeParams *params, Uint8Buff *peerKeyAlias) in GeneratePeerKeyAlias() argument 254 …erateKeyAlias(&packageName, &serviceType, keyTypePeer, &(params->baseParams.idPeer), peerKeyAlias); in GeneratePeerKeyAlias() 260 res = ToLowerCase(peerKeyAlias); in GeneratePeerKeyAlias() 290 const Uint8Buff *peerKeyAlias, Uint8Buff *sharedKeyAlias) in ComputeAndSavePskInner() argument 297 KeyBuff peerKeyBuff = { peerKeyAlias->val, peerKeyAlias->length, true }; in ComputeAndSavePskInner() 304 .keyBuff = { peerKeyAlias->val, peerKeyAlias->length, true }, in ComputeAndSavePskInner() 330 Uint8Buff peerKeyAlias = { peerKeyAliasVal, PAKE_KEY_ALIAS_LEN }; in ComputeAndSavePskStd() local 336 res = GeneratePeerKeyAlias(params, &peerKeyAlias); in ComputeAndSavePskStd() 347 res = params->baseParams.loader->checkKeyExist(&peerKeyAlias, params->isPeerFromUpgrade, in ComputeAndSavePskStd() 368 return ComputeAndSavePskInner(params, &selfKeyAlias, &peerKeyAlias, &sharedKeyAlias); in ComputeAndSavePskStd()
|
/ohos5.0/base/security/device_auth/services/identity_manager/src/ |
H A D | identity_p2p.c | 217 Uint8Buff peerKeyAlias = { peerKeyAliasVal, PAKE_KEY_ALIAS_LEN }; in ComputeAndSaveDirectAuthPsk() local 218 … GenerateKeyAlias(&pkgNameBuff, &peerServiceTypeBuff, keyTypePeer, &peerAuthIdBuff, &peerKeyAlias); in ComputeAndSaveDirectAuthPsk() 223 …LOGI("peerKeyAlias: %x %x %x %x****.", peerKeyAlias.val[DEV_AUTH_ZERO], peerKeyAlias.val[DEV_AUTH_… in ComputeAndSaveDirectAuthPsk() 224 peerKeyAlias.val[DEV_AUTH_TWO], peerKeyAlias.val[DEV_AUTH_THREE]); in ComputeAndSaveDirectAuthPsk() 231 ret = GetLoaderInstance()->checkKeyExist(&peerKeyAlias, false, osAccountId); in ComputeAndSaveDirectAuthPsk() 238 KeyBuff peerKeyBuff = { peerKeyAlias.val, peerKeyAlias.length, true }; in ComputeAndSaveDirectAuthPsk()
|
H A D | identity_group.c | 612 …ic int32_t GeneratePeerKeyAlias(const TrustedDeviceEntry *peerDeviceEntry, Uint8Buff *peerKeyAlias) in GeneratePeerKeyAlias() argument 624 …ret = GenerateKeyAlias(&pkgNameBuff, &serviceTypeBuff, keyTypePeer, &peerAuthIdBuff, peerKeyAlias); in GeneratePeerKeyAlias() 630 ret = ToLowerCase(peerKeyAlias); in GeneratePeerKeyAlias() 654 static int32_t CheckPeerKeyAlias(const Uint8Buff *peerKeyAlias, bool isPeerFromUpgrade, int32_t osA… in CheckPeerKeyAlias() argument 657 int32_t ret = GetLoaderInstance()->checkKeyExist(peerKeyAlias, isPeerFromUpgrade, osAccountId); in CheckPeerKeyAlias() 692 Uint8Buff peerKeyAlias = { peerKeyAliasVal, PAKE_KEY_ALIAS_LEN }; in ComputeAndSavePsk() local 693 ret = GeneratePeerKeyAlias(peerDeviceEntry, &peerKeyAlias); in ComputeAndSavePsk() 704 … ret = CheckPeerKeyAlias(&peerKeyAlias, isPeerFromUpgrade, osAccountId, groupId, peerDeviceEntry); in ComputeAndSavePsk() 710 …KeyParams peerKeyParams = { { peerKeyAlias.val, peerKeyAlias.length, true }, isPeerFromUpgrade, os… in ComputeAndSavePsk()
|
H A D | credential_operator.c | 511 Uint8Buff peerKeyAlias = { peerKeyAliasVal, PAKE_KEY_ALIAS_LEN }; in ComputeAndSavePsk() local 528 …= GenerateKeyAliasInner(DEFAULT_PACKAGE_NAME, peerServiceType, peerAuthId, keyType, &peerKeyAlias); in ComputeAndSavePsk() 540 res = GetLoaderInstance()->checkKeyExist(&peerKeyAlias, false, osAccountId); in ComputeAndSavePsk() 557 KeyBuff peerKeyBuff = { peerKeyAlias.val, peerKeyAlias.length, true }; in ComputeAndSavePsk()
|
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/ |
H A D | pub_key_exchange.c | 365 const Uint8Buff *peerKeyAlias, bool isSelfFromUpgrade, Uint8Buff *sharedKeyAlias) in ComputeAndSavePskInner() argument 370 KeyParams keyParams = { { peerKeyAlias->val, peerKeyAlias->length, true }, false, osAccountId }; in ComputeAndSavePskInner() 390 Uint8Buff peerKeyAlias = { peerKeyAliasVal, PAKE_KEY_ALIAS_LEN }; in ComputeAndSavePsk() local 395 res = GenerateKeyAlias(params, false, false, &peerKeyAlias); in ComputeAndSavePsk() 405 res = GetLoaderInstance()->checkKeyExist(&peerKeyAlias, false, params->osAccountId); in ComputeAndSavePsk() 423 …return ComputeAndSavePskInner(params->osAccountId, &selfKeyAlias, &peerKeyAlias, params->isSelfFro… in ComputeAndSavePsk()
|
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/ |
H A D | pake_v1_protocol_task_common.c | 140 Uint8Buff peerKeyAlias = { peerKeyAliasVal, PAKE_KEY_ALIAS_LEN }; in LoadPseudonymFlagIfNeed() local 145 &peerKeyAlias); in LoadPseudonymFlagIfNeed() 150 res = ToLowerCase(&peerKeyAlias); in LoadPseudonymFlagIfNeed() 156 …KeyParams keyParams = { { peerKeyAlias.val, peerKeyAlias.length, true }, true, params->baseParams.… in LoadPseudonymFlagIfNeed()
|