/optee_os/lib/libmbedtls/mbedtls/library/ |
A D | hkdf.c | 29 size_t salt_len, const unsigned char *ikm, size_t ikm_len, in mbedtls_hkdf() argument 36 ret = mbedtls_hkdf_extract( md, salt, salt_len, ikm, ikm_len, prk ); in mbedtls_hkdf() 50 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument 60 if( salt_len != 0 ) in mbedtls_hkdf_extract() 73 salt_len = hash_len; in mbedtls_hkdf_extract() 76 return( mbedtls_md_hmac( md, salt, salt_len, ikm, ikm_len, prk ) ); in mbedtls_hkdf_extract()
|
A D | x509.c | 205 int *salt_len ) in mbedtls_x509_get_rsassa_pss_params() argument 216 *salt_len = 20; in mbedtls_x509_get_rsassa_pss_params() 293 if( ( ret = mbedtls_asn1_get_int( &p, end2, salt_len ) ) != 0 ) in mbedtls_x509_get_rsassa_pss_params()
|
/optee_os/core/tee/ |
A D | tee_cryp_pbkdf2.c | 23 size_t salt_len; member 42 if (p->salt && p->salt_len) { in pbkdf2_f() 44 p->salt_len); in pbkdf2_f() 73 size_t salt_len, uint32_t iteration_count, in tee_cryp_pbkdf2() argument 95 pbkdf2_parms.salt_len = salt_len; in tee_cryp_pbkdf2()
|
A D | tee_cryp_hkdf.c | 18 size_t salt_len, uint8_t *prk, size_t *prk_len) in hkdf_extract() argument 25 if (!salt || !salt_len) { in hkdf_extract() 32 res = tee_alg_get_digest_size(hash_algo, &salt_len); in hkdf_extract() 47 res = crypto_mac_init(ctx, salt, salt_len); in hkdf_extract() 145 const uint8_t *salt, size_t salt_len, in tee_cryp_hkdf() argument 153 res = hkdf_extract(hash_id, ikm, ikm_len, salt, salt_len, prk, in tee_cryp_hkdf()
|
A D | tee_svc_cryp.c | 2674 void **salt, size_t *salt_len, void **info, in get_hkdf_params() argument 2682 *salt_len = *info_len = *okm_len = 0; in get_hkdf_params() 2689 *salt_len = params[n].content.ref.length; in get_hkdf_params() 2765 size_t *salt_len, size_t *derived_key_len, in get_pbkdf2_params() argument 2780 *salt_len = params[n].content.ref.length; in get_pbkdf2_params() 3069 size_t salt_len, info_len, okm_len; in syscall_cryp_derive_key() local 3127 size_t salt_len, iteration_count, derived_key_len; in syscall_cryp_derive_key() local 3144 salt_len, iteration_count, in syscall_cryp_derive_key() 3536 int salt_len = 0; in syscall_asymm_operate() local 3712 int salt_len = 0; in syscall_asymm_verify() local [all …]
|
/optee_os/core/lib/libtomcrypt/src/misc/pbes/ |
A D | pbes1.c | 15 const unsigned char *salt, unsigned long salt_len, in _pkcs_5_alg1_wrap() argument 19 LTC_UNUSED_PARAM(salt_len); in _pkcs_5_alg1_wrap() 24 const unsigned char *salt, unsigned long salt_len, in _pkcs_12_wrap() argument 39 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 1, out, 24)) != CRYPT_… in _pkcs_12_wrap() 41 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 2, out+24, 8)) != CRYP… in _pkcs_12_wrap()
|
/optee_os/core/drivers/crypto/crypto_api/acipher/ |
A D | rsassa.c | 360 if (ssa_data->salt_len) { in emsa_pss_encode() 361 salt = malloc(ssa_data->salt_len); in emsa_pss_encode() 386 if (ssa_data->salt_len) { in emsa_pss_encode() 389 ssa_data->salt_len, ret); in emsa_pss_encode() 393 memcpy(buf, salt, ssa_data->salt_len); in emsa_pss_encode() 423 if (ssa_data->salt_len) in emsa_pss_encode() 424 memcpy(buf, salt, ssa_data->salt_len); in emsa_pss_encode() 654 if (ssa_data->salt_len) { in emsa_pss_verify() 655 salt = malloc(ssa_data->salt_len); in emsa_pss_verify() 661 memcpy(salt, buf, ssa_data->salt_len); in emsa_pss_verify() [all …]
|
A D | rsa.c | 344 int salt_len, const uint8_t *msg, in crypto_acipher_rsassa_sign() argument 402 rsa_ssa.salt_len = salt_len; in crypto_acipher_rsassa_sign() 426 int salt_len, const uint8_t *msg, in crypto_acipher_rsassa_verify() argument 478 rsa_ssa.salt_len = salt_len; in crypto_acipher_rsassa_verify()
|
/optee_os/out/arm/export-ta_arm32/include/mbedtls/ |
A D | hkdf.h | 72 size_t salt_len, const unsigned char *ikm, size_t ikm_len, 101 const unsigned char *salt, size_t salt_len,
|
A D | x509.h | 318 int *salt_len );
|
/optee_os/out/arm/export-ta_arm64/host_include/mbedtls/ |
A D | hkdf.h | 72 size_t salt_len, const unsigned char *ikm, size_t ikm_len, 101 const unsigned char *salt, size_t salt_len,
|
A D | x509.h | 318 int *salt_len );
|
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | hkdf.h | 72 size_t salt_len, const unsigned char *ikm, size_t ikm_len, 101 const unsigned char *salt, size_t salt_len,
|
A D | x509.h | 318 int *salt_len );
|
/optee_os/out/arm/export-ta_arm64/include/mbedtls/ |
A D | hkdf.h | 72 size_t salt_len, const unsigned char *ikm, size_t ikm_len, 101 const unsigned char *salt, size_t salt_len,
|
A D | x509.h | 318 int *salt_len );
|
/optee_os/out/arm/export-ta_arm32/host_include/mbedtls/ |
A D | hkdf.h | 72 size_t salt_len, const unsigned char *ikm, size_t ikm_len, 101 const unsigned char *salt, size_t salt_len,
|
/optee_os/ta/pkcs11/src/ |
A D | processing_rsa.c | 26 uint32_t salt_len = 0; in pkcs2tee_proc_params_rsa_pss() local 38 rc = serialargs_get_u32(&args, &salt_len); in pkcs2tee_proc_params_rsa_pss() 54 ctx->salt_len = salt_len; in pkcs2tee_proc_params_rsa_pss() 106 if (rsa_pss_ctx->salt_len > (k - 2 - hash_size)) in pkcs2tee_validate_rsa_pss() 124 uint32_t salt_len = 0; in pkcs2tee_algo_rsa_pss() local 136 rc = serialargs_get_u32(&args, &salt_len); in pkcs2tee_algo_rsa_pss()
|
/optee_os/core/lib/libtomcrypt/src/misc/pkcs5/ |
A D | pkcs_5_2.c | 31 const unsigned char *salt, unsigned long salt_len, in pkcs_5_alg2() argument 80 if ((err = hmac_process(hmac, salt, salt_len)) != CRYPT_OK) { in pkcs_5_alg2()
|
/optee_os/core/include/tee/ |
A D | tee_cryp_pbkdf2.h | 13 size_t salt_len, uint32_t iteration_count,
|
A D | tee_cryp_hkdf.h | 12 const uint8_t *salt, size_t salt_len,
|
/optee_os/core/lib/libtomcrypt/ |
A D | rsa.c | 433 int salt_len, const uint8_t *msg, in crypto_acipher_rsassa_sign() argument 509 ltc_hashindex, salt_len, <c_key); in crypto_acipher_rsassa_sign() 525 int salt_len, const uint8_t *msg, in crypto_acipher_rsassa_verify() argument 589 ltc_hashindex, salt_len, &stat, <c_key); in crypto_acipher_rsassa_verify()
|
/optee_os/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_pkcs.h | 100 const unsigned char *salt, unsigned long salt_len,
|
/optee_os/core/include/crypto/ |
A D | crypto.h | 225 int salt_len, const uint8_t *msg, 230 int salt_len, const uint8_t *msg,
|
/optee_os/core/drivers/crypto/crypto_api/include/ |
A D | drvcrypt_acipher.h | 53 size_t salt_len; /* Signature Salt length */ member
|