Searched refs:tmpKcfData (Results 1 – 3 of 3) sorted by relevance
/ohos5.0/base/security/device_auth/test/unittest/deviceauth/source/ |
H A D | mk_agree_test.cpp | 192 Uint8Buff tmpKcfData = { NULL, 0 }; variable 195 &info, &salt, &tmpKcfData); 208 Uint8Buff tmpKcfData = { NULL, 0 }; variable 211 &info, &salt, &tmpKcfData); 224 Uint8Buff tmpKcfData = { NULL, 0 }; variable 227 &info, &salt, &tmpKcfData); 240 Uint8Buff tmpKcfData = { NULL, 0 }; variable 243 &info, &salt, &tmpKcfData); 251 Uint8Buff tmpKcfData = { NULL, 0 }; variable 254 &info, &salt, &tmpKcfData);
|
/ohos5.0/base/security/device_auth/services/mk_agree/src/ |
H A D | mk_agree_task.c | 158 Uint8Buff tmpKcfData = { NULL, 0 }; in ComputeKcfData() local 161 &info, &saltBuff, &tmpKcfData); in ComputeKcfData() 167 returnKcfData->val = tmpKcfData.val; in ComputeKcfData() 168 returnKcfData->length = tmpKcfData.length; in ComputeKcfData()
|
/ohos5.0/base/security/device_auth/services/protocol/src/pake_protocol/pake_v2_protocol/ |
H A D | pake_v2_protocol_common.c | 547 Uint8Buff tmpKcfData = { tmpKcfDataVal, SHA256_LEN }; in VerifyProof() local 548 res = params->loader->sha256(&proofMsg, &tmpKcfData); in VerifyProof() 553 if (memcmp(tmpKcfData.val, params->kcfDataPeer.val, tmpKcfData.length) != EOK) { in VerifyProof()
|