Home
last modified time | relevance | path

Searched refs:peerKeyAlias (Results 1 – 6 of 6) sorted by relevance

/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/creds_manager/
H A Ddas_standard_token_manager.c245 static int32_t GeneratePeerKeyAlias(const PakeParams *params, Uint8Buff *peerKeyAlias) in GeneratePeerKeyAlias() argument
254 …erateKeyAlias(&packageName, &serviceType, keyTypePeer, &(params->baseParams.idPeer), peerKeyAlias); in GeneratePeerKeyAlias()
260 res = ToLowerCase(peerKeyAlias); in GeneratePeerKeyAlias()
290 const Uint8Buff *peerKeyAlias, Uint8Buff *sharedKeyAlias) in ComputeAndSavePskInner() argument
297 KeyBuff peerKeyBuff = { peerKeyAlias->val, peerKeyAlias->length, true }; in ComputeAndSavePskInner()
304 .keyBuff = { peerKeyAlias->val, peerKeyAlias->length, true }, in ComputeAndSavePskInner()
330 Uint8Buff peerKeyAlias = { peerKeyAliasVal, PAKE_KEY_ALIAS_LEN }; in ComputeAndSavePskStd() local
336 res = GeneratePeerKeyAlias(params, &peerKeyAlias); in ComputeAndSavePskStd()
347 res = params->baseParams.loader->checkKeyExist(&peerKeyAlias, params->isPeerFromUpgrade, in ComputeAndSavePskStd()
368 return ComputeAndSavePskInner(params, &selfKeyAlias, &peerKeyAlias, &sharedKeyAlias); in ComputeAndSavePskStd()
/ohos5.0/base/security/device_auth/services/identity_manager/src/
H A Didentity_p2p.c217 Uint8Buff peerKeyAlias = { peerKeyAliasVal, PAKE_KEY_ALIAS_LEN }; in ComputeAndSaveDirectAuthPsk() local
218 … GenerateKeyAlias(&pkgNameBuff, &peerServiceTypeBuff, keyTypePeer, &peerAuthIdBuff, &peerKeyAlias); in ComputeAndSaveDirectAuthPsk()
223 …LOGI("peerKeyAlias: %x %x %x %x****.", peerKeyAlias.val[DEV_AUTH_ZERO], peerKeyAlias.val[DEV_AUTH_… in ComputeAndSaveDirectAuthPsk()
224 peerKeyAlias.val[DEV_AUTH_TWO], peerKeyAlias.val[DEV_AUTH_THREE]); in ComputeAndSaveDirectAuthPsk()
231 ret = GetLoaderInstance()->checkKeyExist(&peerKeyAlias, false, osAccountId); in ComputeAndSaveDirectAuthPsk()
238 KeyBuff peerKeyBuff = { peerKeyAlias.val, peerKeyAlias.length, true }; in ComputeAndSaveDirectAuthPsk()
H A Didentity_group.c612 …ic int32_t GeneratePeerKeyAlias(const TrustedDeviceEntry *peerDeviceEntry, Uint8Buff *peerKeyAlias) in GeneratePeerKeyAlias() argument
624 …ret = GenerateKeyAlias(&pkgNameBuff, &serviceTypeBuff, keyTypePeer, &peerAuthIdBuff, peerKeyAlias); in GeneratePeerKeyAlias()
630 ret = ToLowerCase(peerKeyAlias); in GeneratePeerKeyAlias()
654 static int32_t CheckPeerKeyAlias(const Uint8Buff *peerKeyAlias, bool isPeerFromUpgrade, int32_t osA… in CheckPeerKeyAlias() argument
657 int32_t ret = GetLoaderInstance()->checkKeyExist(peerKeyAlias, isPeerFromUpgrade, osAccountId); in CheckPeerKeyAlias()
692 Uint8Buff peerKeyAlias = { peerKeyAliasVal, PAKE_KEY_ALIAS_LEN }; in ComputeAndSavePsk() local
693 ret = GeneratePeerKeyAlias(peerDeviceEntry, &peerKeyAlias); in ComputeAndSavePsk()
704 … ret = CheckPeerKeyAlias(&peerKeyAlias, isPeerFromUpgrade, osAccountId, groupId, peerDeviceEntry); in ComputeAndSavePsk()
710 …KeyParams peerKeyParams = { { peerKeyAlias.val, peerKeyAlias.length, true }, isPeerFromUpgrade, os… in ComputeAndSavePsk()
H A Dcredential_operator.c511 Uint8Buff peerKeyAlias = { peerKeyAliasVal, PAKE_KEY_ALIAS_LEN }; in ComputeAndSavePsk() local
528 …= GenerateKeyAliasInner(DEFAULT_PACKAGE_NAME, peerServiceType, peerAuthId, keyType, &peerKeyAlias); in ComputeAndSavePsk()
540 res = GetLoaderInstance()->checkKeyExist(&peerKeyAlias, false, osAccountId); in ComputeAndSavePsk()
557 KeyBuff peerKeyBuff = { peerKeyAlias.val, peerKeyAlias.length, true }; in ComputeAndSavePsk()
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/expand_sub_session/expand_process_lib/
H A Dpub_key_exchange.c365 const Uint8Buff *peerKeyAlias, bool isSelfFromUpgrade, Uint8Buff *sharedKeyAlias) in ComputeAndSavePskInner() argument
370 KeyParams keyParams = { { peerKeyAlias->val, peerKeyAlias->length, true }, false, osAccountId }; in ComputeAndSavePskInner()
390 Uint8Buff peerKeyAlias = { peerKeyAliasVal, PAKE_KEY_ALIAS_LEN }; in ComputeAndSavePsk() local
395 res = GenerateKeyAlias(params, false, false, &peerKeyAlias); in ComputeAndSavePsk()
405 res = GetLoaderInstance()->checkKeyExist(&peerKeyAlias, false, params->osAccountId); in ComputeAndSavePsk()
423 …return ComputeAndSavePskInner(params->osAccountId, &selfKeyAlias, &peerKeyAlias, params->isSelfFro… in ComputeAndSavePsk()
/ohos5.0/base/security/device_auth/services/legacy/authenticators/src/account_unrelated/pake_task/pake_v1_task/pake_v1_protocol_task/
H A Dpake_v1_protocol_task_common.c140 Uint8Buff peerKeyAlias = { peerKeyAliasVal, PAKE_KEY_ALIAS_LEN }; in LoadPseudonymFlagIfNeed() local
145 &peerKeyAlias); in LoadPseudonymFlagIfNeed()
150 res = ToLowerCase(&peerKeyAlias); in LoadPseudonymFlagIfNeed()
156 …KeyParams keyParams = { { peerKeyAlias.val, peerKeyAlias.length, true }, true, params->baseParams.… in LoadPseudonymFlagIfNeed()