Searched refs:salt (Results 1 – 7 of 7) sorted by relevance
| /hypervisor/lib/crypto/ |
| A D | crypto_api.c | 13 const uint8_t *salt, size_t salt_len, in hkdf_sha256() argument 23 if (mbedtls_hkdf(md, salt, salt_len, secret, secret_len, in hkdf_sha256() 35 const uint8_t *salt, size_t salt_len) in hmac_sha256() argument 40 if ((out_key != NULL) && (secret != NULL) && (salt != NULL)) { in hmac_sha256() 43 if (mbedtls_md_hmac(md, secret, secret_len, salt, salt_len, out_key) == 0) { in hmac_sha256()
|
| /hypervisor/include/lib/crypto/ |
| A D | crypto_api.h | 39 const uint8_t *salt, size_t salt_len, 62 const uint8_t *salt, size_t salt_len);
|
| /hypervisor/arch/x86/seed/ |
| A D | seed.c | 137 const uint8_t *salt, size_t salt_len, const uint8_t *info, size_t info_len) in derive_virtual_seed() argument 150 salt, salt_len, in derive_virtual_seed() 200 const uint8_t salt[] = "Attestation Keybox Encryption Key"; in derive_attkb_enc_key() local 211 if (hmac_sha256(out_key, ikm, ikm_len, salt, sizeof(salt)) != 1) { in derive_attkb_enc_key()
|
| /hypervisor/lib/crypto/mbedtls/ |
| A D | hkdf.h | 63 int32_t mbedtls_hkdf( const mbedtls_md_info_t *md, const uint8_t *salt, 88 const uint8_t *salt, size_t salt_len,
|
| A D | hkdf.c | 24 int32_t mbedtls_hkdf(const mbedtls_md_info_t *md, const uint8_t *salt, in mbedtls_hkdf() argument 32 ret = mbedtls_hkdf_extract(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf() 45 const uint8_t *salt, size_t salt_len, in mbedtls_hkdf_extract() argument 51 const uint8_t *tmp_salt = salt; in mbedtls_hkdf_extract()
|
| A D | ChangeLog | 100 when calling with a NULL salt and non-zero salt_len. Contributed by 2438 * Fixed incorrect behaviour in case of RSASSA-PSS with a salt length 2516 length salt lengths
|
| /hypervisor/include/arch/x86/asm/ |
| A D | seed.h | 34 const uint8_t *salt, size_t salt_len, const uint8_t *info, size_t info_len);
|
Completed in 11 milliseconds