Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 7 of 7) sorted by relevance

/hypervisor/lib/crypto/
A Dcrypto_api.c13 const uint8_t *salt, size_t salt_len, in hkdf_sha256() argument
23 if (mbedtls_hkdf(md, salt, salt_len, secret, secret_len, in hkdf_sha256()
35 const uint8_t *salt, size_t salt_len) in hmac_sha256() argument
40 if ((out_key != NULL) && (secret != NULL) && (salt != NULL)) { in hmac_sha256()
43 if (mbedtls_md_hmac(md, secret, secret_len, salt, salt_len, out_key) == 0) { in hmac_sha256()
/hypervisor/include/lib/crypto/
A Dcrypto_api.h39 const uint8_t *salt, size_t salt_len,
62 const uint8_t *salt, size_t salt_len);
/hypervisor/arch/x86/seed/
A Dseed.c137 const uint8_t *salt, size_t salt_len, const uint8_t *info, size_t info_len) in derive_virtual_seed() argument
150 salt, salt_len, in derive_virtual_seed()
200 const uint8_t salt[] = "Attestation Keybox Encryption Key"; in derive_attkb_enc_key() local
211 if (hmac_sha256(out_key, ikm, ikm_len, salt, sizeof(salt)) != 1) { in derive_attkb_enc_key()
/hypervisor/lib/crypto/mbedtls/
A Dhkdf.h63 int32_t mbedtls_hkdf( const mbedtls_md_info_t *md, const uint8_t *salt,
88 const uint8_t *salt, size_t salt_len,
A Dhkdf.c24 int32_t mbedtls_hkdf(const mbedtls_md_info_t *md, const uint8_t *salt, in mbedtls_hkdf() argument
32 ret = mbedtls_hkdf_extract(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf()
45 const uint8_t *salt, size_t salt_len, in mbedtls_hkdf_extract() argument
51 const uint8_t *tmp_salt = salt; in mbedtls_hkdf_extract()
A DChangeLog100 when calling with a NULL salt and non-zero salt_len. Contributed by
2438 * Fixed incorrect behaviour in case of RSASSA-PSS with a salt length
2516 length salt lengths
/hypervisor/include/arch/x86/asm/
A Dseed.h34 const uint8_t *salt, size_t salt_len, const uint8_t *info, size_t info_len);

Completed in 11 milliseconds