/optee_os/core/pta/tests/ |
A D | fs_htree.c | 193 b[n] = val_from_bn_n_salt(bn, n, salt); in write_block() 221 size_t bn, uint8_t salt), in do_range() argument 223 size_t num_blocks, size_t salt) in do_range() argument 229 res = fn(ht, n + begin, salt); in do_range() 238 size_t bn, uint8_t salt), in do_range_backwards() argument 240 size_t num_blocks, size_t salt) in do_range_backwards() argument 261 size_t salt = 23; in htree_test_rewrite() local 286 salt++; in htree_test_rewrite() 297 salt++; in htree_test_rewrite() 332 salt + 1); in htree_test_rewrite() [all …]
|
/optee_os/core/lib/libtomcrypt/src/pk/pkcs1/ |
A D | pkcs_1_pss_encode.c | 38 unsigned char *DB, *mask, *salt, *hash; in pkcs_1_pss_encode() local 67 salt = XMALLOC(modulus_len); in pkcs_1_pss_encode() 69 if (DB == NULL || mask == NULL || salt == NULL || hash == NULL) { in pkcs_1_pss_encode() 76 if (salt != NULL) { in pkcs_1_pss_encode() 77 XFREE(salt); in pkcs_1_pss_encode() 88 if (prng_descriptor[prng_idx]->read(salt, saltlen, prng) != saltlen) { in pkcs_1_pss_encode() 105 if ((err = hash_descriptor[hash_idx]->process(&md, salt, saltlen)) != CRYPT_OK) { in pkcs_1_pss_encode() 117 XMEMCPY(DB + x, salt, saltlen); in pkcs_1_pss_encode() 159 zeromem(salt, modulus_len); in pkcs_1_pss_encode() 164 XFREE(salt); in pkcs_1_pss_encode()
|
A D | pkcs_1_pss_decode.c | 36 unsigned char *DB, *mask, *salt, *hash; in pkcs_1_pss_decode() local 65 salt = XMALLOC(modulus_len); in pkcs_1_pss_decode() 67 if (DB == NULL || mask == NULL || salt == NULL || hash == NULL) { in pkcs_1_pss_decode() 74 if (salt != NULL) { in pkcs_1_pss_decode() 75 XFREE(salt); in pkcs_1_pss_decode() 161 zeromem(salt, modulus_len); in pkcs_1_pss_decode() 166 XFREE(salt); in pkcs_1_pss_decode()
|
/optee_os/lib/libmbedtls/mbedtls/library/ |
A D | pkcs12.c | 49 mbedtls_asn1_buf *salt, int *iterations ) in pkcs12_parse_pbe_params() argument 66 if( ( ret = mbedtls_asn1_get_tag( p, end, &salt->len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 ) in pkcs12_parse_pbe_params() 69 salt->p = *p; in pkcs12_parse_pbe_params() 70 *p += salt->len; in pkcs12_parse_pbe_params() 90 mbedtls_asn1_buf salt; in pkcs12_pbe_derive_key_iv() local 97 memset( &salt, 0, sizeof(mbedtls_asn1_buf) ); in pkcs12_pbe_derive_key_iv() 100 if( ( ret = pkcs12_parse_pbe_params( pbe_params, &salt, in pkcs12_pbe_derive_key_iv() 108 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv() 118 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv() 245 const unsigned char *salt, size_t saltlen, in mbedtls_pkcs12_derivation() argument [all …]
|
A D | pkcs5.c | 54 mbedtls_asn1_buf *salt, int *iterations, in pkcs5_parse_pbkdf2_params() argument 74 if( ( ret = mbedtls_asn1_get_tag( &p, end, &salt->len, in pkcs5_parse_pbkdf2_params() 78 salt->p = p; in pkcs5_parse_pbkdf2_params() 79 p += salt->len; in pkcs5_parse_pbkdf2_params() 117 mbedtls_asn1_buf salt; in mbedtls_pkcs5_pbes2() local 150 &salt, &iterations, &keylen, in mbedtls_pkcs5_pbes2() 193 if( ( ret = mbedtls_pkcs5_pbkdf2_hmac( &md_ctx, pwd, pwdlen, salt.p, salt.len, in mbedtls_pkcs5_pbes2() 220 size_t plen, const unsigned char *salt, size_t slen, in mbedtls_pkcs5_pbkdf2_hmac() argument 248 if( ( ret = mbedtls_md_hmac_update( ctx, salt, slen ) ) != 0 ) in mbedtls_pkcs5_pbkdf2_hmac()
|
A D | hkdf.c | 28 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt, in mbedtls_hkdf() argument 36 ret = mbedtls_hkdf_extract( md, salt, salt_len, ikm, ikm_len, prk ); in mbedtls_hkdf() 50 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument 56 if( salt == NULL ) in mbedtls_hkdf_extract() 72 salt = null_salt; in mbedtls_hkdf_extract() 76 return( mbedtls_md_hmac( md, salt, salt_len, ikm, ikm_len, prk ) ); in mbedtls_hkdf_extract()
|
/optee_os/core/lib/libtomcrypt/src/misc/pkcs5/ |
A D | pkcs_5_1.c | 41 const unsigned char *salt, in _pkcs_5_alg1_common() argument 56 LTC_ARGCHK(salt != NULL); in _pkcs_5_alg1_common() 93 if ((err = hash_descriptor[hash_idx]->process(md, salt, 8)) != CRYPT_OK) { in _pkcs_5_alg1_common() 156 const unsigned char *salt, in pkcs_5_alg1() argument 160 return _pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1() 180 const unsigned char *salt, in pkcs_5_alg1_openssl() argument 184 return _pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1_openssl()
|
A D | pkcs_5_2.c | 31 const unsigned char *salt, unsigned long salt_len, in pkcs_5_alg2() argument 42 LTC_ARGCHK(salt != NULL); in pkcs_5_alg2() 80 if ((err = hmac_process(hmac, salt, salt_len)) != CRYPT_OK) { in pkcs_5_alg2()
|
/optee_os/core/lib/libtomcrypt/src/misc/pbes/ |
A D | pbes1.c | 15 const unsigned char *salt, unsigned long salt_len, in _pkcs_5_alg1_wrap() argument 20 return pkcs_5_alg1(password, password_len, salt, iteration_count, hash_idx, out, outlen); in _pkcs_5_alg1_wrap() 24 const unsigned char *salt, unsigned long salt_len, in _pkcs_12_wrap() argument 39 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 1, out, 24)) != CRYPT_… in _pkcs_12_wrap() 41 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 2, out+24, 8)) != CRYP… in _pkcs_12_wrap() 118 res->salt = s->next->child; in pbes1_extract()
|
A D | pbes.c | 60 …if ((err = arg->type.kdf(arg->pwd, arg->pwdlen, arg->salt->data, arg->salt->size, arg->iterations,… in pbes_decrypt()
|
/optee_os/core/tee/ |
A D | tee_cryp_pbkdf2.c | 22 const uint8_t *salt; member 42 if (p->salt && p->salt_len) { in pbkdf2_f() 43 res = crypto_mac_update(h->ctx, p->salt, in pbkdf2_f() 72 size_t password_len, const uint8_t *salt, in tee_cryp_pbkdf2() argument 94 pbkdf2_parms.salt = salt; in tee_cryp_pbkdf2()
|
A D | tee_cryp_hkdf.c | 17 size_t ikm_len, const uint8_t *salt, in hkdf_extract() argument 25 if (!salt || !salt_len) { in hkdf_extract() 31 salt = zero_salt; in hkdf_extract() 47 res = crypto_mac_init(ctx, salt, salt_len); in hkdf_extract() 145 const uint8_t *salt, size_t salt_len, in tee_cryp_hkdf() argument 153 res = hkdf_extract(hash_id, ikm, ikm_len, salt, salt_len, prk, in tee_cryp_hkdf()
|
/optee_os/core/lib/libtomcrypt/src/misc/hkdf/ |
A D | hkdf.c | 20 int hkdf_extract(int hash_idx, const unsigned char *salt, unsigned long saltlen, in hkdf_extract() argument 32 if (salt == NULL || saltlen == 0) { in hkdf_extract() 35 return hmac_memory(hash_idx, salt, saltlen, in, inlen, out, outlen); in hkdf_extract() 109 int hkdf(int hash_idx, const unsigned char *salt, unsigned long saltlen, in hkdf() argument 129 if ((err = hkdf_extract(hash_idx, salt, saltlen, in, inlen, extracted, &hashsize)) != 0) { in hkdf()
|
A D | hkdf_test.c | 47 unsigned char salt[80]; in hkdf_test() 265 if((err = hkdf(hash, cases[i].salt, cases[i].salt_l, in hkdf_test()
|
/optee_os/core/lib/libtomcrypt/src/modes/f8/ |
A D | f8_test_mode.c | 27 static const unsigned char salt[4] = { 0x32, 0xf2, 0x87, 0x0d }; in f8_test_mode() 51 if ((err = f8_start(idx, IV, key, sizeof(key), salt, sizeof(salt), 0, &f8)) != CRYPT_OK) { in f8_test_mode()
|
/optee_os/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_pkcs.h | 86 const unsigned char *salt, 94 const unsigned char *salt, 100 const unsigned char *salt, unsigned long salt_len,
|
A D | tomcrypt_misc.h | 69 const unsigned char *salt, unsigned long saltlen, 79 const unsigned char *salt, unsigned long saltlen,
|
/optee_os/core/drivers/crypto/crypto_api/acipher/ |
A D | rsassa.c | 328 uint8_t *salt = NULL; in emsa_pss_encode() local 361 salt = malloc(ssa_data->salt_len); in emsa_pss_encode() 363 if (!salt) { in emsa_pss_encode() 393 memcpy(buf, salt, ssa_data->salt_len); in emsa_pss_encode() 424 memcpy(buf, salt, ssa_data->salt_len); in emsa_pss_encode() 494 free(salt); in emsa_pss_encode() 518 uint8_t *salt = NULL; in emsa_pss_verify() local 655 salt = malloc(ssa_data->salt_len); in emsa_pss_verify() 656 if (!salt) { in emsa_pss_verify() 661 memcpy(salt, buf, ssa_data->salt_len); in emsa_pss_verify() [all …]
|
/optee_os/out/arm/export-ta_arm32/include/mbedtls/ |
A D | hkdf.h | 71 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt, 101 const unsigned char *salt, size_t salt_len,
|
/optee_os/out/arm/export-ta_arm64/host_include/mbedtls/ |
A D | hkdf.h | 71 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt, 101 const unsigned char *salt, size_t salt_len,
|
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | hkdf.h | 71 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt, 101 const unsigned char *salt, size_t salt_len,
|
/optee_os/out/arm/export-ta_arm64/include/mbedtls/ |
A D | hkdf.h | 71 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt, 101 const unsigned char *salt, size_t salt_len,
|
/optee_os/out/arm/export-ta_arm32/host_include/mbedtls/ |
A D | hkdf.h | 71 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt, 101 const unsigned char *salt, size_t salt_len,
|
/optee_os/core/lib/libtomcrypt/src/misc/pkcs12/ |
A D | pkcs12_kdf.c | 17 const unsigned char *salt, unsigned long saltlen, in pkcs12_kdf() argument 35 LTC_ARGCHK(salt != NULL); in pkcs12_kdf() 44 for (i = 0; i < Slen; i++) I[i] = salt[i % saltlen]; in pkcs12_kdf()
|
/optee_os/ta/pkcs11/src/ |
A D | persistent_token.c | 75 size_t pin_size, uint32_t salt, in do_hash() argument 87 TEE_DigestUpdate(oh, &salt, sizeof(salt)); in do_hash() 99 size_t pin_size, uint32_t *salt, in hash_pin() argument 111 *salt = s; in hash_pin() 116 size_t pin_size, uint32_t salt, in verify_pin() argument 122 rc = do_hash(user, pin, pin_size, salt, tmp_hash); in verify_pin()
|