| /optee_os/core/drivers/crypto/hisilicon/ |
| H A D | sec_pbkdf2.c | 43 sqe->type2.alen_ivllen = pbkdf2_msg->salt_len; in sec_pbkdf2_fill_sqe() 87 sqe->a_len_key = pbkdf2_msg->salt_len; in sec_pbkdf2_fill_bd3_sqe() 88 sqe->pbkdf2_scene.pbkdf2_salt_len = pbkdf2_msg->salt_len; in sec_pbkdf2_fill_bd3_sqe() 189 size_t salt_len, uint32_t c_num, in sec_pbkdf2_params_check() argument 194 if (!password_len || !salt_len || !c_num || !derived_key_len) { in sec_pbkdf2_params_check() 211 if (salt_len > SEC_MAX_SALT_LEN) { in sec_pbkdf2_params_check() 212 EMSG("Unsupported salt len %zu", salt_len); in sec_pbkdf2_params_check() 276 memcpy(msg->salt, salt, msg->salt_len); in sec_pbkdf2_set_buf() 284 memzero_explicit(msg->salt, msg->salt_len); in sec_pbkdf2_clean_buf() 288 size_t salt_len, size_t derived_key_len, in sec_pbkdf2_msg_init() argument [all …]
|
| H A D | sec_pbkdf2.h | 31 uint32_t salt_len; member
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | hkdf.c | 17 size_t salt_len, const unsigned char *ikm, size_t ikm_len, in mbedtls_hkdf() argument 24 ret = mbedtls_hkdf_extract(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf() 37 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument 46 if (salt_len != 0) { in mbedtls_hkdf_extract() 57 salt_len = hash_len; in mbedtls_hkdf_extract() 60 return mbedtls_md_hmac(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf_extract()
|
| H A D | x509_internal.h | 33 int *salt_len);
|
| /optee_os/core/tee/ |
| H A D | tee_cryp_pbkdf2.c | 23 size_t salt_len; member 42 if (p->salt && p->salt_len) { in pbkdf2_f() 44 p->salt_len); in pbkdf2_f() 73 size_t salt_len, uint32_t iteration_count, in tee_cryp_pbkdf2() argument 95 pbkdf2_parms.salt_len = salt_len; in tee_cryp_pbkdf2()
|
| H A D | tee_cryp_hkdf.c | 18 size_t salt_len, uint8_t *prk, size_t *prk_len) in hkdf_extract() argument 25 if (!salt || !salt_len) { in hkdf_extract() 32 res = tee_alg_get_digest_size(hash_algo, &salt_len); in hkdf_extract() 47 res = crypto_mac_init(ctx, salt, salt_len); in hkdf_extract() 145 const uint8_t *salt, size_t salt_len, in tee_cryp_hkdf() argument 153 res = hkdf_extract(hash_id, ikm, ikm_len, salt, salt_len, prk, in tee_cryp_hkdf()
|
| H A D | tee_svc_cryp.c | 3340 void **salt, size_t *salt_len, void **info, in get_hkdf_params() argument 3350 *salt_len = *info_len = *okm_len = 0; in get_hkdf_params() 3366 *salt_len = p->content.ref.length; in get_hkdf_params() 3368 *salt_len, salt); in get_hkdf_params() 3468 size_t *salt_len, size_t *derived_key_len, in get_pbkdf2_params() argument 3476 *salt_len = *derived_key_len = *iteration_count = 0; in get_pbkdf2_params() 3486 *salt_len = p->content.ref.length; in get_pbkdf2_params() 3488 *salt_len, salt); in get_pbkdf2_params() 3853 size_t salt_len, info_len, okm_len; in syscall_cryp_derive_key() local 3859 &salt_len, &info, &info_len, &okm_len, in syscall_cryp_derive_key() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/misc/pbes/ |
| H A D | pbes1.c | 8 const unsigned char *salt, unsigned long salt_len, in s_pkcs_5_alg1_wrap() argument 12 LTC_UNUSED_PARAM(salt_len); in s_pkcs_5_alg1_wrap() 17 const unsigned char *salt, unsigned long salt_len, in s_pkcs_12_wrap() argument 32 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 1, out, 24)) != CRYPT_… in s_pkcs_12_wrap() 34 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 2, out+24, 8)) != CRYP… in s_pkcs_12_wrap()
|
| /optee_os/core/drivers/crypto/crypto_api/acipher/ |
| H A D | rsassa.c | 356 ps_size = EM->length - ssa_data->digest_size - ssa_data->salt_len - 2; in emsa_pss_encode() 358 msg_size = 8 + ssa_data->digest_size + ssa_data->salt_len; in emsa_pss_encode() 367 if (ssa_data->salt_len) { in emsa_pss_encode() 368 salt = malloc(ssa_data->salt_len); in emsa_pss_encode() 393 if (ssa_data->salt_len) { in emsa_pss_encode() 394 ret = crypto_rng_read(salt, ssa_data->salt_len); in emsa_pss_encode() 396 ssa_data->salt_len, ret); in emsa_pss_encode() 400 memcpy(buf, salt, ssa_data->salt_len); in emsa_pss_encode() 430 if (ssa_data->salt_len) in emsa_pss_encode() 431 memcpy(buf, salt, ssa_data->salt_len); in emsa_pss_encode() [all …]
|
| H A D | rsa.c | 362 int salt_len, const uint8_t *msg, in crypto_acipher_rsassa_sign() argument 420 rsa_ssa.salt_len = salt_len; in crypto_acipher_rsassa_sign() 444 int salt_len, const uint8_t *msg, in crypto_acipher_rsassa_verify() argument 498 rsa_ssa.salt_len = salt_len; in crypto_acipher_rsassa_verify()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | hkdf.h | 57 size_t salt_len, const unsigned char *ikm, size_t ikm_len, 86 const unsigned char *salt, size_t salt_len,
|
| /optee_os/core/drivers/crypto/versal/ |
| H A D | rsa.c | 221 p->salt_len, in do_ssa_sign() 230 p->salt_len, in do_ssa_sign() 242 p->salt_len, in do_ssa_sign() 268 p->salt_len, in do_ssa_verify() 277 p->salt_len, in do_ssa_verify() 289 p->salt_len, in do_ssa_verify()
|
| /optee_os/core/lib/libtomcrypt/src/misc/bcrypt/ |
| H A D | bcrypt.c | 76 const unsigned char *salt, unsigned long salt_len, in bcrypt_pbkdf_openbsd() argument 91 if ((secret_len == 0) || (salt_len == 0) || (*outlen == 0)) { in bcrypt_pbkdf_openbsd() 140 salt, salt_len, in bcrypt_pbkdf_openbsd()
|
| /optee_os/core/lib/libtomcrypt/src/misc/pkcs5/ |
| H A D | pkcs_5_2.c | 24 const unsigned char *salt, unsigned long salt_len, in pkcs_5_alg2() argument 77 if ((err = hmac_process(hmac, salt, salt_len)) != CRYPT_OK) { in pkcs_5_alg2()
|
| /optee_os/core/include/tee/ |
| H A D | tee_cryp_pbkdf2.h | 13 size_t salt_len, uint32_t iteration_count,
|
| H A D | tee_cryp_hkdf.h | 12 const uint8_t *salt, size_t salt_len,
|
| /optee_os/ta/pkcs11/src/ |
| H A D | processing_rsa.c | 26 uint32_t salt_len = 0; in pkcs2tee_proc_params_rsa_pss() local 38 rc = serialargs_get_u32(&args, &salt_len); in pkcs2tee_proc_params_rsa_pss() 54 ctx->salt_len = salt_len; in pkcs2tee_proc_params_rsa_pss() 106 if (rsa_pss_ctx->salt_len > (k - 2 - hash_size)) in pkcs2tee_validate_rsa_pss() 124 uint32_t salt_len = 0; in pkcs2tee_algo_rsa_pss() local 136 rc = serialargs_get_u32(&args, &salt_len); in pkcs2tee_algo_rsa_pss()
|
| H A D | processing.h | 28 uint32_t salt_len; member
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | rsa.c | 524 int salt_len, const uint8_t *msg, 530 int salt_len, const uint8_t *msg, in sw_crypto_acipher_rsassa_sign() argument 607 ltc_hashindex, salt_len, <c_key); in sw_crypto_acipher_rsassa_sign() 623 int salt_len, const uint8_t *msg, 630 int salt_len, const uint8_t *msg, in sw_crypto_acipher_rsassa_verify() argument 703 ltc_hashindex, salt_len, &stat, <c_key); in sw_crypto_acipher_rsassa_verify()
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_pkcs.h | 95 const unsigned char *salt, unsigned long salt_len,
|
| H A D | tomcrypt_misc.h | 58 const unsigned char *salt, unsigned long salt_len,
|
| /optee_os/lib/libmbedtls/core/ |
| H A D | rsa.c | 653 int salt_len __unused, 659 int salt_len __unused, in sw_crypto_acipher_rsassa_sign() 755 int salt_len __unused, 763 int salt_len __unused, in sw_crypto_acipher_rsassa_verify()
|
| /optee_os/core/drivers/crypto/crypto_api/include/ |
| H A D | drvcrypt_acipher.h | 53 size_t salt_len; /* Signature Salt length */ member
|
| /optee_os/core/include/crypto/ |
| H A D | crypto.h | 275 int salt_len, const uint8_t *msg, 280 int salt_len, const uint8_t *msg,
|
| H A D | crypto_impl.h | 551 int salt_len, const uint8_t *msg, 557 int salt_len, const uint8_t *msg,
|