/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | hkdf.c | 29 size_t salt_len, const unsigned char *ikm, size_t ikm_len, in mbedtls_hkdf() argument 36 ret = mbedtls_hkdf_extract( md, salt, salt_len, ikm, ikm_len, prk ); in mbedtls_hkdf() 50 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument 60 if( salt_len != 0 ) in mbedtls_hkdf_extract() 73 salt_len = hash_len; in mbedtls_hkdf_extract() 76 return( mbedtls_md_hmac( md, salt, salt_len, ikm, ikm_len, prk ) ); in mbedtls_hkdf_extract()
|
A D | x509.c | 205 int *salt_len ) in mbedtls_x509_get_rsassa_pss_params() argument 216 *salt_len = 20; in mbedtls_x509_get_rsassa_pss_params() 293 if( ( ret = mbedtls_asn1_get_int( &p, end2, salt_len ) ) != 0 ) in mbedtls_x509_get_rsassa_pss_params()
|
/optee_os-3.20.0/core/tee/ |
A D | tee_cryp_pbkdf2.c | 23 size_t salt_len; member 42 if (p->salt && p->salt_len) { in pbkdf2_f() 44 p->salt_len); in pbkdf2_f() 73 size_t salt_len, uint32_t iteration_count, in tee_cryp_pbkdf2() argument 95 pbkdf2_parms.salt_len = salt_len; in tee_cryp_pbkdf2()
|
A D | tee_cryp_hkdf.c | 18 size_t salt_len, uint8_t *prk, size_t *prk_len) in hkdf_extract() argument 25 if (!salt || !salt_len) { in hkdf_extract() 32 res = tee_alg_get_digest_size(hash_algo, &salt_len); in hkdf_extract() 47 res = crypto_mac_init(ctx, salt, salt_len); in hkdf_extract() 145 const uint8_t *salt, size_t salt_len, in tee_cryp_hkdf() argument 153 res = hkdf_extract(hash_id, ikm, ikm_len, salt, salt_len, prk, in tee_cryp_hkdf()
|
A D | tee_svc_cryp.c | 3118 void **salt, size_t *salt_len, void **info, in get_hkdf_params() argument 3126 *salt_len = *info_len = *okm_len = 0; in get_hkdf_params() 3133 *salt_len = params[n].content.ref.length; in get_hkdf_params() 3209 size_t *salt_len, size_t *derived_key_len, in get_pbkdf2_params() argument 3224 *salt_len = params[n].content.ref.length; in get_pbkdf2_params() 3515 size_t salt_len, info_len, okm_len; in syscall_cryp_derive_key() local 3573 size_t salt_len, iteration_count, derived_key_len; in syscall_cryp_derive_key() local 3590 salt_len, iteration_count, in syscall_cryp_derive_key() 4034 int salt_len = 0; in syscall_asymm_operate() local 4220 int salt_len = 0; in syscall_asymm_verify() local [all …]
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/pbes/ |
A D | pbes1.c | 8 const unsigned char *salt, unsigned long salt_len, in s_pkcs_5_alg1_wrap() argument 12 LTC_UNUSED_PARAM(salt_len); in s_pkcs_5_alg1_wrap() 17 const unsigned char *salt, unsigned long salt_len, in s_pkcs_12_wrap() argument 32 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 1, out, 24)) != CRYPT_… in s_pkcs_12_wrap() 34 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 2, out+24, 8)) != CRYP… in s_pkcs_12_wrap()
|
/optee_os-3.20.0/core/drivers/crypto/crypto_api/acipher/ |
A D | rsassa.c | 362 if (ssa_data->salt_len) { in emsa_pss_encode() 363 salt = malloc(ssa_data->salt_len); in emsa_pss_encode() 388 if (ssa_data->salt_len) { in emsa_pss_encode() 391 ssa_data->salt_len, ret); in emsa_pss_encode() 395 memcpy(buf, salt, ssa_data->salt_len); in emsa_pss_encode() 425 if (ssa_data->salt_len) in emsa_pss_encode() 426 memcpy(buf, salt, ssa_data->salt_len); in emsa_pss_encode() 656 if (ssa_data->salt_len) { in emsa_pss_verify() 657 salt = malloc(ssa_data->salt_len); in emsa_pss_verify() 663 memcpy(salt, buf, ssa_data->salt_len); in emsa_pss_verify() [all …]
|
A D | rsa.c | 348 int salt_len, const uint8_t *msg, in crypto_acipher_rsassa_sign() argument 406 rsa_ssa.salt_len = salt_len; in crypto_acipher_rsassa_sign() 430 int salt_len, const uint8_t *msg, in crypto_acipher_rsassa_verify() argument 484 rsa_ssa.salt_len = salt_len; in crypto_acipher_rsassa_verify()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | hkdf.h | 73 size_t salt_len, const unsigned char *ikm, size_t ikm_len, 102 const unsigned char *salt, size_t salt_len,
|
A D | x509.h | 339 int *salt_len );
|
/optee_os-3.20.0/core/include/tee/ |
A D | tee_cryp_pbkdf2.h | 13 size_t salt_len, uint32_t iteration_count,
|
A D | tee_cryp_hkdf.h | 12 const uint8_t *salt, size_t salt_len,
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/pkcs5/ |
A D | pkcs_5_2.c | 24 const unsigned char *salt, unsigned long salt_len, in pkcs_5_alg2() argument 77 if ((err = hmac_process(hmac, salt, salt_len)) != CRYPT_OK) { in pkcs_5_alg2()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/bcrypt/ |
A D | bcrypt.c | 76 const unsigned char *salt, unsigned long salt_len, in bcrypt_pbkdf_openbsd() argument 91 if ((secret_len == 0) || (salt_len == 0) || (*outlen == 0)) { in bcrypt_pbkdf_openbsd() 140 salt, salt_len, in bcrypt_pbkdf_openbsd()
|
/optee_os-3.20.0/core/drivers/crypto/versal/ |
A D | rsa.c | 223 p->salt_len, in do_ssa_sign() 232 p->salt_len, in do_ssa_sign() 244 p->salt_len, in do_ssa_sign() 270 p->salt_len, in do_ssa_verify() 279 p->salt_len, in do_ssa_verify() 291 p->salt_len, in do_ssa_verify()
|
/optee_os-3.20.0/ta/pkcs11/src/ |
A D | processing_rsa.c | 26 uint32_t salt_len = 0; in pkcs2tee_proc_params_rsa_pss() local 38 rc = serialargs_get_u32(&args, &salt_len); in pkcs2tee_proc_params_rsa_pss() 54 ctx->salt_len = salt_len; in pkcs2tee_proc_params_rsa_pss() 106 if (rsa_pss_ctx->salt_len > (k - 2 - hash_size)) in pkcs2tee_validate_rsa_pss() 124 uint32_t salt_len = 0; in pkcs2tee_algo_rsa_pss() local 136 rc = serialargs_get_u32(&args, &salt_len); in pkcs2tee_algo_rsa_pss()
|
A D | processing.h | 28 uint32_t salt_len; member
|
/optee_os-3.20.0/core/lib/libtomcrypt/ |
A D | rsa.c | 489 int salt_len, const uint8_t *msg, 495 int salt_len, const uint8_t *msg, in sw_crypto_acipher_rsassa_sign() argument 571 ltc_hashindex, salt_len, <c_key); in sw_crypto_acipher_rsassa_sign() 587 int salt_len, const uint8_t *msg, 594 int salt_len, const uint8_t *msg, in sw_crypto_acipher_rsassa_verify() argument 666 ltc_hashindex, salt_len, &stat, <c_key); in sw_crypto_acipher_rsassa_verify()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_pkcs.h | 93 const unsigned char *salt, unsigned long salt_len,
|
A D | tomcrypt_misc.h | 58 const unsigned char *salt, unsigned long salt_len,
|
/optee_os-3.20.0/core/drivers/crypto/crypto_api/include/ |
A D | drvcrypt_acipher.h | 53 size_t salt_len; /* Signature Salt length */ member
|
/optee_os-3.20.0/lib/libmbedtls/core/ |
A D | rsa.c | 569 int salt_len __unused, 575 int salt_len __unused, in sw_crypto_acipher_rsassa_sign() 663 int salt_len __unused, 671 int salt_len __unused, in sw_crypto_acipher_rsassa_verify()
|
/optee_os-3.20.0/core/include/crypto/ |
A D | crypto.h | 261 int salt_len, const uint8_t *msg, 266 int salt_len, const uint8_t *msg,
|
A D | crypto_impl.h | 467 int salt_len, const uint8_t *msg, 473 int salt_len, const uint8_t *msg,
|
/optee_os-3.20.0/core/crypto/ |
A D | crypto.c | 593 int salt_len __unused, in crypto_acipher_rsassa_sign() 604 int salt_len __unused, in crypto_acipher_rsassa_verify()
|