Home
last modified time | relevance | path

Searched refs:saltlen (Results 1 – 15 of 15) sorted by relevance

/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/pkcs1/
A Dpkcs_1_pss_encode.c26 unsigned long saltlen, prng_state *prng, in pkcs_1_pss_encode() argument
53 if ((saltlen > modulus_len) || (modulus_len < hLen + saltlen + 2)) { in pkcs_1_pss_encode()
80 if (saltlen > 0) { in pkcs_1_pss_encode()
81 if (prng_descriptor[prng_idx]->read(salt, saltlen, prng) != saltlen) { in pkcs_1_pss_encode()
98 if ((err = hash_descriptor[hash_idx]->process(&md, salt, saltlen)) != CRYPT_OK) { in pkcs_1_pss_encode()
107 XMEMSET(DB + x, 0, modulus_len - saltlen - hLen - 2); in pkcs_1_pss_encode()
108 x += modulus_len - saltlen - hLen - 2; in pkcs_1_pss_encode()
110 XMEMCPY(DB + x, salt, saltlen); in pkcs_1_pss_encode()
A Dpkcs_1_pss_decode.c27 unsigned long saltlen, int hash_idx, in pkcs_1_pss_decode() argument
51 if ((saltlen > modulus_len) || in pkcs_1_pss_decode()
52 (modulus_len < hLen + saltlen + 2)) { in pkcs_1_pss_decode()
114 for (x = 0; x < modulus_len - saltlen - hLen - 2; x++) { in pkcs_1_pss_decode()
138 if ((err = hash_descriptor[hash_idx]->process(&md, DB+x, saltlen)) != CRYPT_OK) { in pkcs_1_pss_decode()
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/hkdf/
A Dhkdf.c13 int hkdf_extract(int hash_idx, const unsigned char *salt, unsigned long saltlen, in hkdf_extract() argument
25 if (salt == NULL || saltlen == 0) { in hkdf_extract()
28 return hmac_memory(hash_idx, salt, saltlen, in, inlen, out, outlen); in hkdf_extract()
102 int hkdf(int hash_idx, const unsigned char *salt, unsigned long saltlen, in hkdf() argument
122 if ((err = hkdf_extract(hash_idx, salt, saltlen, in, inlen, extracted, &hashsize)) != 0) { in hkdf()
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/bcrypt/
A Dbcrypt.c16 const unsigned char *salt, unsigned long saltlen, in s_bcrypt_hash() argument
23 if ((err = blowfish_setup_with_data(pass, passlen, salt, saltlen, &key)) != CRYPT_OK) { in s_bcrypt_hash()
27 if ((err = blowfish_expand(salt, saltlen, NULL, 0, &key)) != CRYPT_OK) { in s_bcrypt_hash()
56 const unsigned char *salt, unsigned long saltlen, in s_bcrypt_pbkdf_hash() argument
60 return s_bcrypt_hash(pt, pass, passlen, salt, saltlen, out, outlen); in s_bcrypt_pbkdf_hash()
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/pkcs12/
A Dpkcs12_kdf.c10 const unsigned char *salt, unsigned long saltlen, in pkcs12_kdf() argument
17 unsigned long Slen = ((saltlen + v - 1) / v) * v; in pkcs12_kdf()
37 for (i = 0; i < Slen; i++) I[i] = salt[i % saltlen]; in pkcs12_kdf()
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_pkcs.h62 unsigned long saltlen, prng_state *prng,
69 unsigned long saltlen, int hash_idx,
A Dtomcrypt_misc.h69 const unsigned char *salt, unsigned long saltlen,
79 const unsigned char *salt, unsigned long saltlen,
A Dtomcrypt_pk.h65 #define rsa_sign_hash(in, inlen, out, outlen, prng, prng_idx, hash_idx, saltlen, key) \ argument
66 rsa_sign_hash_ex(in, inlen, out, outlen, LTC_PKCS_1_PSS, prng, prng_idx, hash_idx, saltlen, key)
68 #define rsa_verify_hash(sig, siglen, hash, hashlen, hash_idx, saltlen, stat, key) \ argument
69 rsa_verify_hash_ex(sig, siglen, hash, hashlen, LTC_PKCS_1_PSS, hash_idx, saltlen, stat, key)
92 int hash_idx, unsigned long saltlen,
98 int hash_idx, unsigned long saltlen,
A Dtomcrypt_private.h465 const unsigned char *salt, unsigned long saltlen,
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/rsa/
A Drsa_verify_hash.c29 int hash_idx, unsigned long saltlen, in rsa_verify_hash_ex() argument
95 … err = pkcs_1_pss_decode(hash, hashlen, tmpbuf+1, x-1, saltlen, hash_idx, modulus_bitlen, stat); in rsa_verify_hash_ex()
98 err = pkcs_1_pss_decode(hash, hashlen, tmpbuf, x, saltlen, hash_idx, modulus_bitlen, stat); in rsa_verify_hash_ex()
A Drsa_sign_hash.c30 int hash_idx, unsigned long saltlen, in rsa_sign_hash_ex() argument
75 if ((err = pkcs_1_pss_encode(in, inlen, saltlen, prng, prng_idx, in rsa_sign_hash_ex()
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/
A Dpkcs12.c259 const unsigned char *salt, size_t saltlen, in mbedtls_pkcs12_derivation() argument
279 if( datalen > 128 || pwdlen > 64 || saltlen > 64 ) in mbedtls_pkcs12_derivation()
285 if( salt == NULL && saltlen != 0 ) in mbedtls_pkcs12_derivation()
289 use_salt = ( salt && saltlen != 0 ); in mbedtls_pkcs12_derivation()
310 pkcs12_fill_buffer( salt_block, v, salt, saltlen ); in mbedtls_pkcs12_derivation()
A Drsa.c1584 int saltlen, in rsa_rsassa_pss_sign() argument
1627 if (saltlen == MBEDTLS_RSA_SALT_LEN_ANY) in rsa_rsassa_pss_sign()
1644 else if ( (saltlen < 0) || (saltlen + hlen + 2 > olen) ) in rsa_rsassa_pss_sign()
1650 slen = (size_t) saltlen; in rsa_rsassa_pss_sign()
1724 int saltlen, in mbedtls_rsa_rsassa_pss_sign_ext() argument
1728 hashlen, hash, saltlen, sig ); in mbedtls_rsa_rsassa_pss_sign_ext()
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/
A Dpkcs12.h133 const unsigned char *salt, size_t saltlen,
A Drsa.h1038 int saltlen,

Completed in 19 milliseconds