| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/ |
| H A D | pkcs12.h | 186 int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8); 189 int saltlen, int iter, 194 unsigned char *salt, int saltlen, int iter, 226 int saltlen, int id, int iter, int n, 229 int saltlen, int id, int iter, int n, 238 unsigned char *salt, int saltlen, int iter, 241 int saltlen, const EVP_MD *md_type);
|
| H A D | x509.h | 1185 const unsigned char *salt, int saltlen); 1188 const unsigned char *salt, int saltlen); 1190 unsigned char *salt, int saltlen); 1192 unsigned char *salt, int saltlen, 1195 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen,
|
| H A D | evp.h | 1024 const unsigned char *salt, int saltlen, int iter, 1027 const unsigned char *salt, int saltlen, int iter,
|
| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | chacha20poly1305.c | 22 unsigned int saltlen; member 29 unsigned int saltlen; member 90 memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen); in chacha_iv() 91 memcpy(iv + sizeof(leicb) + ctx->saltlen, req->iv, in chacha_iv() 92 CHACHA_IV_SIZE - sizeof(leicb) - ctx->saltlen); in chacha_iv() 479 if (keylen != ctx->saltlen + CHACHA_KEY_SIZE) in chachapoly_setkey() 482 keylen -= ctx->saltlen; in chachapoly_setkey() 483 memcpy(ctx->salt, key + keylen, ctx->saltlen); in chachapoly_setkey() 521 ctx->saltlen = ictx->saltlen; in chachapoly_init() 576 ctx->saltlen = CHACHAPOLY_IV_SIZE - ivsize; in chachapoly_create() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/ |
| H A D | pkcs12.h | 123 const unsigned char *salt, size_t saltlen,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/ |
| H A D | pkcs12.h | 123 const unsigned char *salt, size_t saltlen,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/ |
| H A D | pkcs12.h | 123 const unsigned char *salt, size_t saltlen,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/ |
| H A D | pkcs12.h | 123 const unsigned char *salt, size_t saltlen,
|
| /OK3568_Linux_fs/external/security/librkcrypto/test/ |
| H A D | test_rsa.c | 420 uint32_t saltlen = EVP_MD_size(digest_algorithm); in openssl_sign() local 422 if (EVP_PKEY_CTX_set_rsa_pss_saltlen(pkey_ctx, saltlen) <= 0) { in openssl_sign() 489 uint32_t saltlen = EVP_MD_size(digest_algorithm); in openssl_verify() local 491 if (EVP_PKEY_CTX_set_rsa_pss_saltlen(pkey_ctx, saltlen) <= 0) { in openssl_verify()
|
| /OK3568_Linux_fs/kernel/drivers/crypto/caam/ |
| H A D | caamalg.c | 564 unsigned int saltlen = CHACHAPOLY_IV_SIZE - ivsize; in chachapoly_setkey() local 566 if (keylen != CHACHA_KEY_SIZE + saltlen) in chachapoly_setkey() 570 ctx->cdata.keylen = keylen - saltlen; in chachapoly_setkey()
|
| H A D | caamalg_qi2.c | 634 unsigned int saltlen = CHACHAPOLY_IV_SIZE - ivsize; in chachapoly_setkey() local 636 if (keylen != CHACHA_KEY_SIZE + saltlen) in chachapoly_setkey() 640 ctx->cdata.keylen = keylen - saltlen; in chachapoly_setkey()
|
| /OK3568_Linux_fs/recovery/ |
| HD | rootfs.cpio.gz | 107070100A8AEB0000041ED0000000000000000000000116841B48100000000000000FD0000000200000000000000000000000200000000.07070100A8B07C000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000900000000.gitkeep07070100A8B07D000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000B00000000.skip_fsck07070100A8AEB10000A1FF0000000000000000000000016841B0B600000007000000FD0000000200000000000000000000000400000000binusr/bin07070100A8B07E000081A400000000000000000000000168412635000001CC000000FD0000000200000000000000000000001100000000busybox. ... |