Searched refs:their_msg (Results 1 – 3 of 3) sorted by relevance
65 bool InitCipher(const Data& their_msg);136 bool PairingAuthCtx::InitCipher(const PairingAuthCtx::Data& their_msg) { in InitCipher() argument138 CHECK(!their_msg.empty()); in InitCipher()142 if (their_msg.size() > SPAKE2_MAX_MSG_SIZE) { in InitCipher()143 LOG(ERROR) << "their_msg size [" << their_msg.size() << "] greater then max size [" in InitCipher()151 sizeof(key_material), their_msg.data(), their_msg.size()); in InitCipher()237 bool pairing_auth_init_cipher(PairingAuthCtx* ctx, const uint8_t* their_msg, size_t msg_len) { in pairing_auth_init_cipher() argument239 CHECK(their_msg); in pairing_auth_init_cipher()242 std::vector<uint8_t> p(their_msg, their_msg + msg_len); in pairing_auth_init_cipher()
321 auto their_msg = tls_->ReadFully(header.payload); in DoExchangeMsgs() local322 if (their_msg.empty() || in DoExchangeMsgs()323 !pairing_auth_init_cipher(auth_.get(), their_msg.data(), their_msg.size())) { in DoExchangeMsgs()324 LOG(ERROR) << "Unable to initialize pairing cipher [their_msg.size=" << their_msg.size() in DoExchangeMsgs()
119 bool pairing_auth_init_cipher(PairingAuthCtx* ctx, const uint8_t* their_msg, size_t msg_len)