Home
last modified time | relevance | path

Searched refs:salt_len (Results 1 – 25 of 31) sorted by relevance

12

/optee_os/core/drivers/crypto/hisilicon/
H A Dsec_pbkdf2.c43 sqe->type2.alen_ivllen = pbkdf2_msg->salt_len; in sec_pbkdf2_fill_sqe()
87 sqe->a_len_key = pbkdf2_msg->salt_len; in sec_pbkdf2_fill_bd3_sqe()
88 sqe->pbkdf2_scene.pbkdf2_salt_len = pbkdf2_msg->salt_len; in sec_pbkdf2_fill_bd3_sqe()
189 size_t salt_len, uint32_t c_num, in sec_pbkdf2_params_check() argument
194 if (!password_len || !salt_len || !c_num || !derived_key_len) { in sec_pbkdf2_params_check()
211 if (salt_len > SEC_MAX_SALT_LEN) { in sec_pbkdf2_params_check()
212 EMSG("Unsupported salt len %zu", salt_len); in sec_pbkdf2_params_check()
276 memcpy(msg->salt, salt, msg->salt_len); in sec_pbkdf2_set_buf()
284 memzero_explicit(msg->salt, msg->salt_len); in sec_pbkdf2_clean_buf()
288 size_t salt_len, size_t derived_key_len, in sec_pbkdf2_msg_init() argument
[all …]
H A Dsec_pbkdf2.h31 uint32_t salt_len; member
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dhkdf.c17 size_t salt_len, const unsigned char *ikm, size_t ikm_len, in mbedtls_hkdf() argument
24 ret = mbedtls_hkdf_extract(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf()
37 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument
46 if (salt_len != 0) { in mbedtls_hkdf_extract()
57 salt_len = hash_len; in mbedtls_hkdf_extract()
60 return mbedtls_md_hmac(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf_extract()
H A Dx509_internal.h33 int *salt_len);
/optee_os/core/tee/
H A Dtee_cryp_pbkdf2.c23 size_t salt_len; member
42 if (p->salt && p->salt_len) { in pbkdf2_f()
44 p->salt_len); in pbkdf2_f()
73 size_t salt_len, uint32_t iteration_count, in tee_cryp_pbkdf2() argument
95 pbkdf2_parms.salt_len = salt_len; in tee_cryp_pbkdf2()
H A Dtee_cryp_hkdf.c18 size_t salt_len, uint8_t *prk, size_t *prk_len) in hkdf_extract() argument
25 if (!salt || !salt_len) { in hkdf_extract()
32 res = tee_alg_get_digest_size(hash_algo, &salt_len); in hkdf_extract()
47 res = crypto_mac_init(ctx, salt, salt_len); in hkdf_extract()
145 const uint8_t *salt, size_t salt_len, in tee_cryp_hkdf() argument
153 res = hkdf_extract(hash_id, ikm, ikm_len, salt, salt_len, prk, in tee_cryp_hkdf()
H A Dtee_svc_cryp.c3340 void **salt, size_t *salt_len, void **info, in get_hkdf_params() argument
3350 *salt_len = *info_len = *okm_len = 0; in get_hkdf_params()
3366 *salt_len = p->content.ref.length; in get_hkdf_params()
3368 *salt_len, salt); in get_hkdf_params()
3468 size_t *salt_len, size_t *derived_key_len, in get_pbkdf2_params() argument
3476 *salt_len = *derived_key_len = *iteration_count = 0; in get_pbkdf2_params()
3486 *salt_len = p->content.ref.length; in get_pbkdf2_params()
3488 *salt_len, salt); in get_pbkdf2_params()
3853 size_t salt_len, info_len, okm_len; in syscall_cryp_derive_key() local
3859 &salt_len, &info, &info_len, &okm_len, in syscall_cryp_derive_key()
[all …]
/optee_os/core/lib/libtomcrypt/src/misc/pbes/
H A Dpbes1.c8 const unsigned char *salt, unsigned long salt_len, in s_pkcs_5_alg1_wrap() argument
12 LTC_UNUSED_PARAM(salt_len); in s_pkcs_5_alg1_wrap()
17 const unsigned char *salt, unsigned long salt_len, in s_pkcs_12_wrap() argument
32 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 1, out, 24)) != CRYPT_… in s_pkcs_12_wrap()
34 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 2, out+24, 8)) != CRYP… in s_pkcs_12_wrap()
/optee_os/core/drivers/crypto/crypto_api/acipher/
H A Drsassa.c356 ps_size = EM->length - ssa_data->digest_size - ssa_data->salt_len - 2; in emsa_pss_encode()
358 msg_size = 8 + ssa_data->digest_size + ssa_data->salt_len; in emsa_pss_encode()
367 if (ssa_data->salt_len) { in emsa_pss_encode()
368 salt = malloc(ssa_data->salt_len); in emsa_pss_encode()
393 if (ssa_data->salt_len) { in emsa_pss_encode()
394 ret = crypto_rng_read(salt, ssa_data->salt_len); in emsa_pss_encode()
396 ssa_data->salt_len, ret); in emsa_pss_encode()
400 memcpy(buf, salt, ssa_data->salt_len); in emsa_pss_encode()
430 if (ssa_data->salt_len) in emsa_pss_encode()
431 memcpy(buf, salt, ssa_data->salt_len); in emsa_pss_encode()
[all …]
H A Drsa.c362 int salt_len, const uint8_t *msg, in crypto_acipher_rsassa_sign() argument
420 rsa_ssa.salt_len = salt_len; in crypto_acipher_rsassa_sign()
444 int salt_len, const uint8_t *msg, in crypto_acipher_rsassa_verify() argument
498 rsa_ssa.salt_len = salt_len; in crypto_acipher_rsassa_verify()
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dhkdf.h57 size_t salt_len, const unsigned char *ikm, size_t ikm_len,
86 const unsigned char *salt, size_t salt_len,
/optee_os/core/drivers/crypto/versal/
H A Drsa.c221 p->salt_len, in do_ssa_sign()
230 p->salt_len, in do_ssa_sign()
242 p->salt_len, in do_ssa_sign()
268 p->salt_len, in do_ssa_verify()
277 p->salt_len, in do_ssa_verify()
289 p->salt_len, in do_ssa_verify()
/optee_os/core/lib/libtomcrypt/src/misc/bcrypt/
H A Dbcrypt.c76 const unsigned char *salt, unsigned long salt_len, in bcrypt_pbkdf_openbsd() argument
91 if ((secret_len == 0) || (salt_len == 0) || (*outlen == 0)) { in bcrypt_pbkdf_openbsd()
140 salt, salt_len, in bcrypt_pbkdf_openbsd()
/optee_os/core/lib/libtomcrypt/src/misc/pkcs5/
H A Dpkcs_5_2.c24 const unsigned char *salt, unsigned long salt_len, in pkcs_5_alg2() argument
77 if ((err = hmac_process(hmac, salt, salt_len)) != CRYPT_OK) { in pkcs_5_alg2()
/optee_os/core/include/tee/
H A Dtee_cryp_pbkdf2.h13 size_t salt_len, uint32_t iteration_count,
H A Dtee_cryp_hkdf.h12 const uint8_t *salt, size_t salt_len,
/optee_os/ta/pkcs11/src/
H A Dprocessing_rsa.c26 uint32_t salt_len = 0; in pkcs2tee_proc_params_rsa_pss() local
38 rc = serialargs_get_u32(&args, &salt_len); in pkcs2tee_proc_params_rsa_pss()
54 ctx->salt_len = salt_len; in pkcs2tee_proc_params_rsa_pss()
106 if (rsa_pss_ctx->salt_len > (k - 2 - hash_size)) in pkcs2tee_validate_rsa_pss()
124 uint32_t salt_len = 0; in pkcs2tee_algo_rsa_pss() local
136 rc = serialargs_get_u32(&args, &salt_len); in pkcs2tee_algo_rsa_pss()
H A Dprocessing.h28 uint32_t salt_len; member
/optee_os/core/lib/libtomcrypt/
H A Drsa.c524 int salt_len, const uint8_t *msg,
530 int salt_len, const uint8_t *msg, in sw_crypto_acipher_rsassa_sign() argument
607 ltc_hashindex, salt_len, &ltc_key); in sw_crypto_acipher_rsassa_sign()
623 int salt_len, const uint8_t *msg,
630 int salt_len, const uint8_t *msg, in sw_crypto_acipher_rsassa_verify() argument
703 ltc_hashindex, salt_len, &stat, &ltc_key); in sw_crypto_acipher_rsassa_verify()
/optee_os/core/lib/libtomcrypt/src/headers/
H A Dtomcrypt_pkcs.h95 const unsigned char *salt, unsigned long salt_len,
H A Dtomcrypt_misc.h58 const unsigned char *salt, unsigned long salt_len,
/optee_os/lib/libmbedtls/core/
H A Drsa.c653 int salt_len __unused,
659 int salt_len __unused, in sw_crypto_acipher_rsassa_sign()
755 int salt_len __unused,
763 int salt_len __unused, in sw_crypto_acipher_rsassa_verify()
/optee_os/core/drivers/crypto/crypto_api/include/
H A Ddrvcrypt_acipher.h53 size_t salt_len; /* Signature Salt length */ member
/optee_os/core/include/crypto/
H A Dcrypto.h275 int salt_len, const uint8_t *msg,
280 int salt_len, const uint8_t *msg,
H A Dcrypto_impl.h551 int salt_len, const uint8_t *msg,
557 int salt_len, const uint8_t *msg,

12