Home
last modified time | relevance | path

Searched refs:salt_len (Results 1 – 25 of 33) sorted by relevance

12

/optee_os/lib/libmbedtls/mbedtls/library/
A Dhkdf.c29 size_t salt_len, const unsigned char *ikm, size_t ikm_len, in mbedtls_hkdf() argument
36 ret = mbedtls_hkdf_extract( md, salt, salt_len, ikm, ikm_len, prk ); in mbedtls_hkdf()
50 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument
60 if( salt_len != 0 ) in mbedtls_hkdf_extract()
73 salt_len = hash_len; in mbedtls_hkdf_extract()
76 return( mbedtls_md_hmac( md, salt, salt_len, ikm, ikm_len, prk ) ); in mbedtls_hkdf_extract()
A Dx509.c205 int *salt_len ) in mbedtls_x509_get_rsassa_pss_params() argument
216 *salt_len = 20; in mbedtls_x509_get_rsassa_pss_params()
293 if( ( ret = mbedtls_asn1_get_int( &p, end2, salt_len ) ) != 0 ) in mbedtls_x509_get_rsassa_pss_params()
/optee_os/core/tee/
A Dtee_cryp_pbkdf2.c23 size_t salt_len; member
42 if (p->salt && p->salt_len) { in pbkdf2_f()
44 p->salt_len); in pbkdf2_f()
73 size_t salt_len, uint32_t iteration_count, in tee_cryp_pbkdf2() argument
95 pbkdf2_parms.salt_len = salt_len; in tee_cryp_pbkdf2()
A Dtee_cryp_hkdf.c18 size_t salt_len, uint8_t *prk, size_t *prk_len) in hkdf_extract() argument
25 if (!salt || !salt_len) { in hkdf_extract()
32 res = tee_alg_get_digest_size(hash_algo, &salt_len); in hkdf_extract()
47 res = crypto_mac_init(ctx, salt, salt_len); in hkdf_extract()
145 const uint8_t *salt, size_t salt_len, in tee_cryp_hkdf() argument
153 res = hkdf_extract(hash_id, ikm, ikm_len, salt, salt_len, prk, in tee_cryp_hkdf()
A Dtee_svc_cryp.c2674 void **salt, size_t *salt_len, void **info, in get_hkdf_params() argument
2682 *salt_len = *info_len = *okm_len = 0; in get_hkdf_params()
2689 *salt_len = params[n].content.ref.length; in get_hkdf_params()
2765 size_t *salt_len, size_t *derived_key_len, in get_pbkdf2_params() argument
2780 *salt_len = params[n].content.ref.length; in get_pbkdf2_params()
3069 size_t salt_len, info_len, okm_len; in syscall_cryp_derive_key() local
3127 size_t salt_len, iteration_count, derived_key_len; in syscall_cryp_derive_key() local
3144 salt_len, iteration_count, in syscall_cryp_derive_key()
3536 int salt_len = 0; in syscall_asymm_operate() local
3712 int salt_len = 0; in syscall_asymm_verify() local
[all …]
/optee_os/core/lib/libtomcrypt/src/misc/pbes/
A Dpbes1.c15 const unsigned char *salt, unsigned long salt_len, in _pkcs_5_alg1_wrap() argument
19 LTC_UNUSED_PARAM(salt_len); in _pkcs_5_alg1_wrap()
24 const unsigned char *salt, unsigned long salt_len, in _pkcs_12_wrap() argument
39 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 1, out, 24)) != CRYPT_… in _pkcs_12_wrap()
41 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 2, out+24, 8)) != CRYP… in _pkcs_12_wrap()
/optee_os/core/drivers/crypto/crypto_api/acipher/
A Drsassa.c360 if (ssa_data->salt_len) { in emsa_pss_encode()
361 salt = malloc(ssa_data->salt_len); in emsa_pss_encode()
386 if (ssa_data->salt_len) { in emsa_pss_encode()
389 ssa_data->salt_len, ret); in emsa_pss_encode()
393 memcpy(buf, salt, ssa_data->salt_len); in emsa_pss_encode()
423 if (ssa_data->salt_len) in emsa_pss_encode()
424 memcpy(buf, salt, ssa_data->salt_len); in emsa_pss_encode()
654 if (ssa_data->salt_len) { in emsa_pss_verify()
655 salt = malloc(ssa_data->salt_len); in emsa_pss_verify()
661 memcpy(salt, buf, ssa_data->salt_len); in emsa_pss_verify()
[all …]
A Drsa.c344 int salt_len, const uint8_t *msg, in crypto_acipher_rsassa_sign() argument
402 rsa_ssa.salt_len = salt_len; in crypto_acipher_rsassa_sign()
426 int salt_len, const uint8_t *msg, in crypto_acipher_rsassa_verify() argument
478 rsa_ssa.salt_len = salt_len; in crypto_acipher_rsassa_verify()
/optee_os/out/arm/export-ta_arm32/include/mbedtls/
A Dhkdf.h72 size_t salt_len, const unsigned char *ikm, size_t ikm_len,
101 const unsigned char *salt, size_t salt_len,
A Dx509.h318 int *salt_len );
/optee_os/out/arm/export-ta_arm64/host_include/mbedtls/
A Dhkdf.h72 size_t salt_len, const unsigned char *ikm, size_t ikm_len,
101 const unsigned char *salt, size_t salt_len,
A Dx509.h318 int *salt_len );
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
A Dhkdf.h72 size_t salt_len, const unsigned char *ikm, size_t ikm_len,
101 const unsigned char *salt, size_t salt_len,
A Dx509.h318 int *salt_len );
/optee_os/out/arm/export-ta_arm64/include/mbedtls/
A Dhkdf.h72 size_t salt_len, const unsigned char *ikm, size_t ikm_len,
101 const unsigned char *salt, size_t salt_len,
A Dx509.h318 int *salt_len );
/optee_os/out/arm/export-ta_arm32/host_include/mbedtls/
A Dhkdf.h72 size_t salt_len, const unsigned char *ikm, size_t ikm_len,
101 const unsigned char *salt, size_t salt_len,
/optee_os/ta/pkcs11/src/
A Dprocessing_rsa.c26 uint32_t salt_len = 0; in pkcs2tee_proc_params_rsa_pss() local
38 rc = serialargs_get_u32(&args, &salt_len); in pkcs2tee_proc_params_rsa_pss()
54 ctx->salt_len = salt_len; in pkcs2tee_proc_params_rsa_pss()
106 if (rsa_pss_ctx->salt_len > (k - 2 - hash_size)) in pkcs2tee_validate_rsa_pss()
124 uint32_t salt_len = 0; in pkcs2tee_algo_rsa_pss() local
136 rc = serialargs_get_u32(&args, &salt_len); in pkcs2tee_algo_rsa_pss()
/optee_os/core/lib/libtomcrypt/src/misc/pkcs5/
A Dpkcs_5_2.c31 const unsigned char *salt, unsigned long salt_len, in pkcs_5_alg2() argument
80 if ((err = hmac_process(hmac, salt, salt_len)) != CRYPT_OK) { in pkcs_5_alg2()
/optee_os/core/include/tee/
A Dtee_cryp_pbkdf2.h13 size_t salt_len, uint32_t iteration_count,
A Dtee_cryp_hkdf.h12 const uint8_t *salt, size_t salt_len,
/optee_os/core/lib/libtomcrypt/
A Drsa.c433 int salt_len, const uint8_t *msg, in crypto_acipher_rsassa_sign() argument
509 ltc_hashindex, salt_len, &ltc_key); in crypto_acipher_rsassa_sign()
525 int salt_len, const uint8_t *msg, in crypto_acipher_rsassa_verify() argument
589 ltc_hashindex, salt_len, &stat, &ltc_key); in crypto_acipher_rsassa_verify()
/optee_os/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_pkcs.h100 const unsigned char *salt, unsigned long salt_len,
/optee_os/core/include/crypto/
A Dcrypto.h225 int salt_len, const uint8_t *msg,
230 int salt_len, const uint8_t *msg,
/optee_os/core/drivers/crypto/crypto_api/include/
A Ddrvcrypt_acipher.h53 size_t salt_len; /* Signature Salt length */ member

Completed in 29 milliseconds

12