/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/pkcs1/ |
A D | pkcs_1_pss_encode.c | 26 unsigned long saltlen, prng_state *prng, in pkcs_1_pss_encode() argument 53 if ((saltlen > modulus_len) || (modulus_len < hLen + saltlen + 2)) { in pkcs_1_pss_encode() 80 if (saltlen > 0) { in pkcs_1_pss_encode() 81 if (prng_descriptor[prng_idx]->read(salt, saltlen, prng) != saltlen) { in pkcs_1_pss_encode() 98 if ((err = hash_descriptor[hash_idx]->process(&md, salt, saltlen)) != CRYPT_OK) { in pkcs_1_pss_encode() 107 XMEMSET(DB + x, 0, modulus_len - saltlen - hLen - 2); in pkcs_1_pss_encode() 108 x += modulus_len - saltlen - hLen - 2; in pkcs_1_pss_encode() 110 XMEMCPY(DB + x, salt, saltlen); in pkcs_1_pss_encode()
|
A D | pkcs_1_pss_decode.c | 27 unsigned long saltlen, int hash_idx, in pkcs_1_pss_decode() argument 51 if ((saltlen > modulus_len) || in pkcs_1_pss_decode() 52 (modulus_len < hLen + saltlen + 2)) { in pkcs_1_pss_decode() 114 for (x = 0; x < modulus_len - saltlen - hLen - 2; x++) { in pkcs_1_pss_decode() 138 if ((err = hash_descriptor[hash_idx]->process(&md, DB+x, saltlen)) != CRYPT_OK) { in pkcs_1_pss_decode()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/hkdf/ |
A D | hkdf.c | 13 int hkdf_extract(int hash_idx, const unsigned char *salt, unsigned long saltlen, in hkdf_extract() argument 25 if (salt == NULL || saltlen == 0) { in hkdf_extract() 28 return hmac_memory(hash_idx, salt, saltlen, in, inlen, out, outlen); in hkdf_extract() 102 int hkdf(int hash_idx, const unsigned char *salt, unsigned long saltlen, in hkdf() argument 122 if ((err = hkdf_extract(hash_idx, salt, saltlen, in, inlen, extracted, &hashsize)) != 0) { in hkdf()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/bcrypt/ |
A D | bcrypt.c | 16 const unsigned char *salt, unsigned long saltlen, in s_bcrypt_hash() argument 23 if ((err = blowfish_setup_with_data(pass, passlen, salt, saltlen, &key)) != CRYPT_OK) { in s_bcrypt_hash() 27 if ((err = blowfish_expand(salt, saltlen, NULL, 0, &key)) != CRYPT_OK) { in s_bcrypt_hash() 56 const unsigned char *salt, unsigned long saltlen, in s_bcrypt_pbkdf_hash() argument 60 return s_bcrypt_hash(pt, pass, passlen, salt, saltlen, out, outlen); in s_bcrypt_pbkdf_hash()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/pkcs12/ |
A D | pkcs12_kdf.c | 10 const unsigned char *salt, unsigned long saltlen, in pkcs12_kdf() argument 17 unsigned long Slen = ((saltlen + v - 1) / v) * v; in pkcs12_kdf() 37 for (i = 0; i < Slen; i++) I[i] = salt[i % saltlen]; in pkcs12_kdf()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_pkcs.h | 62 unsigned long saltlen, prng_state *prng, 69 unsigned long saltlen, int hash_idx,
|
A D | tomcrypt_misc.h | 69 const unsigned char *salt, unsigned long saltlen, 79 const unsigned char *salt, unsigned long saltlen,
|
A D | tomcrypt_pk.h | 65 #define rsa_sign_hash(in, inlen, out, outlen, prng, prng_idx, hash_idx, saltlen, key) \ argument 66 rsa_sign_hash_ex(in, inlen, out, outlen, LTC_PKCS_1_PSS, prng, prng_idx, hash_idx, saltlen, key) 68 #define rsa_verify_hash(sig, siglen, hash, hashlen, hash_idx, saltlen, stat, key) \ argument 69 rsa_verify_hash_ex(sig, siglen, hash, hashlen, LTC_PKCS_1_PSS, hash_idx, saltlen, stat, key) 92 int hash_idx, unsigned long saltlen, 98 int hash_idx, unsigned long saltlen,
|
A D | tomcrypt_private.h | 465 const unsigned char *salt, unsigned long saltlen,
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/rsa/ |
A D | rsa_verify_hash.c | 29 int hash_idx, unsigned long saltlen, in rsa_verify_hash_ex() argument 95 … err = pkcs_1_pss_decode(hash, hashlen, tmpbuf+1, x-1, saltlen, hash_idx, modulus_bitlen, stat); in rsa_verify_hash_ex() 98 err = pkcs_1_pss_decode(hash, hashlen, tmpbuf, x, saltlen, hash_idx, modulus_bitlen, stat); in rsa_verify_hash_ex()
|
A D | rsa_sign_hash.c | 30 int hash_idx, unsigned long saltlen, in rsa_sign_hash_ex() argument 75 if ((err = pkcs_1_pss_encode(in, inlen, saltlen, prng, prng_idx, in rsa_sign_hash_ex()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | pkcs12.c | 259 const unsigned char *salt, size_t saltlen, in mbedtls_pkcs12_derivation() argument 279 if( datalen > 128 || pwdlen > 64 || saltlen > 64 ) in mbedtls_pkcs12_derivation() 285 if( salt == NULL && saltlen != 0 ) in mbedtls_pkcs12_derivation() 289 use_salt = ( salt && saltlen != 0 ); in mbedtls_pkcs12_derivation() 310 pkcs12_fill_buffer( salt_block, v, salt, saltlen ); in mbedtls_pkcs12_derivation()
|
A D | rsa.c | 1584 int saltlen, in rsa_rsassa_pss_sign() argument 1627 if (saltlen == MBEDTLS_RSA_SALT_LEN_ANY) in rsa_rsassa_pss_sign() 1644 else if ( (saltlen < 0) || (saltlen + hlen + 2 > olen) ) in rsa_rsassa_pss_sign() 1650 slen = (size_t) saltlen; in rsa_rsassa_pss_sign() 1724 int saltlen, in mbedtls_rsa_rsassa_pss_sign_ext() argument 1728 hashlen, hash, saltlen, sig ); in mbedtls_rsa_rsassa_pss_sign_ext()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | pkcs12.h | 133 const unsigned char *salt, size_t saltlen,
|
A D | rsa.h | 1038 int saltlen,
|