Lines Matching refs:ss
3734 struct bignum *ss = NULL; in syscall_cryp_derive_key() local
3757 ss = crypto_bignum_allocate(alloc_size); in syscall_cryp_derive_key()
3758 if (pub && ss) { in syscall_cryp_derive_key()
3761 pub, ss); in syscall_cryp_derive_key()
3763 sk->key_size = crypto_bignum_num_bytes(ss); in syscall_cryp_derive_key()
3764 crypto_bignum_bn2bin(ss, (uint8_t *)(sk + 1)); in syscall_cryp_derive_key()
3774 crypto_bignum_free(&ss); in syscall_cryp_derive_key()
3885 struct tee_cryp_obj_secret *ss = ko->attr; in syscall_cryp_derive_key() local
3886 const uint8_t *shared_secret = (const uint8_t *)(ss + 1); in syscall_cryp_derive_key()
3894 if (derived_key_len > ss->alloc_size) { in syscall_cryp_derive_key()
3899 res = tee_cryp_concat_kdf(hash_id, shared_secret, ss->key_size, in syscall_cryp_derive_key()
3914 struct tee_cryp_obj_secret *ss = ko->attr; in syscall_cryp_derive_key() local
3915 const uint8_t *password = (const uint8_t *)(ss + 1); in syscall_cryp_derive_key()
3923 if (derived_key_len > ss->alloc_size) { in syscall_cryp_derive_key()
3928 res = tee_cryp_pbkdf2(hash_id, password, ss->key_size, salt, in syscall_cryp_derive_key()