/device/soc/winnermicro/wm800/board/src/bt/blehost/nimble/host/mesh/src/ |
D | crypto.h | 28 static inline bool bt_mesh_s1(const char *m, u8_t salt[16]) in bt_mesh_s1() 31 return bt_mesh_aes_cmac_one(zero, m, strlen(m), salt); in bt_mesh_s1() 34 int bt_mesh_k1(const u8_t *ikm, size_t ikm_len, const u8_t salt[16], 39 const u8_t salt[16] = salt_str; \ 40 bt_mesh_k1(ikm, ikm_len, salt, info, okm); \ 153 int bt_mesh_prov_conf_salt(const u8_t conf_inputs[145], u8_t salt[16]);
|
D | crypto.c | 52 int bt_mesh_k1(const u8_t *ikm, size_t ikm_len, const u8_t salt[16], in bt_mesh_k1() 56 err = bt_mesh_aes_cmac_one(salt, ikm, ikm_len, okm); in bt_mesh_k1() 68 u8_t salt[16]; in bt_mesh_k2() local 75 err = bt_mesh_s1("smk2", salt); in bt_mesh_k2() 80 err = bt_mesh_aes_cmac_one(salt, n, 16, t); // 16:len in bt_mesh_k2() 170 u8_t salt[16]; // 16:array length in bt_mesh_id128() local 172 err = bt_mesh_s1(s, salt); in bt_mesh_id128() 177 return bt_mesh_k1(n, 16, salt, id128, out); // 16:len in bt_mesh_id128() 756 u8_t salt[16]; // 16:array length in bt_mesh_virtual_addr() local 759 err = bt_mesh_s1("vtad", salt); in bt_mesh_virtual_addr() [all …]
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/platform/system/upg/ |
D | kernel_crypto.c | 129 ctrl.salt = rootkey_iv; in crypto_prepare() 341 hi_u8 salt[IV_BYTE_LENGTH]; in crypto_gen_key_content() local 345 (hi_void)hi_cipher_trng_get_random_bytes(salt, IV_BYTE_LENGTH); in crypto_gen_key_content() 353 ctrl.salt = salt; in crypto_gen_key_content() 354 ctrl.salt_len = sizeof(salt); in crypto_gen_key_content() 603 hi_u8 salt[ROOTKEY_IV_BYTE_LENGTH] = {0}; in crypto_upg_file_prepare() local 605 …ret = (hi_u32)memcpy_s((hi_void *)salt, sizeof(salt), (hi_void *)(para->upg_salt), IV_BYTE_LENGTH); in crypto_upg_file_prepare() 610 ret = (hi_u32)memcpy_s((hi_void *)(salt + IV_BYTE_LENGTH), sizeof(salt) - IV_BYTE_LENGTH, in crypto_upg_file_prepare() 616 ctrl.salt = salt; in crypto_upg_file_prepare()
|
D | upg_check_boot_bin.c | 211 ctrl->salt = rootkey_iv; in upg_boot_decrypt()
|
D | upg_common.c | 1024 ctrl->salt = rootkey_iv; in upg_set_kdf_key()
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/mbedtls/include/mbedtls/ |
D | hkdf.h | 73 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt, 103 const unsigned char *salt, size_t salt_len,
|
D | pkcs5.h | 90 size_t plen, const unsigned char *salt, size_t slen,
|
D | pkcs12.h | 123 const unsigned char *salt, size_t saltlen,
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/boot/flashboot/secure/ |
D | crypto.c | 165 ctrl.salt = rootkey_iv; in crypto_prepare() 392 hi_u8 salt[IV_BYTE_LENGTH]; in crypto_gen_key_content() local 396 (hi_void)hi_cipher_trng_get_random_bytes(salt, IV_BYTE_LENGTH); in crypto_gen_key_content() 405 ctrl.salt = salt; in crypto_gen_key_content() 406 ctrl.salt_len = sizeof(salt); in crypto_gen_key_content() 835 hi_u8 salt[ROOTKEY_IV_BYTE_LENGTH] = {0}; in boot_crypto_upg_file_prepare() local 837 hi_u32 cs = (uintptr_t)salt ^ sizeof(salt) ^ (uintptr_t)(para->upg_salt) ^ IV_BYTE_LENGTH; in boot_crypto_upg_file_prepare() 838 ret = memcpy_s((hi_void *)salt, sizeof(salt), (hi_void *)(para->upg_salt), IV_BYTE_LENGTH, cs); in boot_crypto_upg_file_prepare() 843 cs = (uintptr_t)(salt + IV_BYTE_LENGTH) ^ (sizeof(salt) - IV_BYTE_LENGTH) ^ in boot_crypto_upg_file_prepare() 845 ret = memcpy_s((hi_void *)(salt + IV_BYTE_LENGTH), sizeof(salt) - IV_BYTE_LENGTH, in boot_crypto_upg_file_prepare() [all …]
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/boot/loaderboot/secure/ |
D | load_crypto.c | 115 ctrl.salt = rootkey_iv; in crypto_prepare() 339 hi_u8 salt[IV_BYTE_LENGTH]; in crypto_gen_key_content() local 343 (hi_void)hi_cipher_trng_get_random_bytes(salt, IV_BYTE_LENGTH); in crypto_gen_key_content() 352 ctrl.salt = salt; in crypto_gen_key_content() 353 ctrl.salt_len = sizeof(salt); in crypto_gen_key_content()
|
/device/soc/telink/b91/b91_ble_sdk/algorithm/crypto/ |
D | crypto_alg.h | 138 void blt_crypto_alg_h7(unsigned char *r, unsigned char salt[16], unsigned char w[16]);
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/boot/commonboot/ |
D | hi_cipher.h | 178 const hi_u8 *salt; /* salt for kdf key derivation. */ member
|
/device/soc/hisilicon/hi3516dv300/sdk_linux/drv/interdrv/common/cipher/mbedtls_prepare/ |
D | hisi_mbedtls-2.16.10.patch | 991 * \note This function always uses the maximum possible salt size, 992 * up to the length of the payload hash. This choice of salt 997 * minimum salt size which is the hash size minus 2 bytes. If 998 * this minimum size is too large given the key size (the salt 2083 - unsigned char salt[MBEDTLS_MD_MAX_SIZE]; 2086 + unsigned char salt[MBEDTLS_MD_MAX_SIZE] = {0}; 2118 /* Calculate the largest possible salt length. Normally this is the hash 2119 * length, which is the maximum length the salt can have. If there is not 2120 * enough room, use the maximum salt length that fits. The constraint is 2121 * that the hash length plus the salt length plus 2 bytes must be at most [all …]
|
/device/soc/winnermicro/wm800/board/src/bt/blehost/nimble/host/src/ |
D | ble_sm_alg.c | 239 static const uint8_t salt[16] = { 0x6c, 0x88, 0x83, 0x91, 0xaa, 0xf5, in ble_sm_alg_f5() local 262 rc = ble_sm_alg_aes_cmac(salt, ws, 32, t); // 32:len in ble_sm_alg_f5()
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/include/ |
D | hks_client.h | 496 const struct hks_blob *salt, const struct hks_blob *label);
|
D | hi_cipher.h | 224 const hi_u8 *salt; /**< salt for kdf key derivation. */ member
|
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/smp/ |
D | smp_keys.c | 1685 BT_OCTET16 salt = { in smp_calculate_f5_key() local 1695 p_prnt = salt; in smp_calculate_f5_key() 1705 ARRAY_TO_STREAM(p, salt, BT_OCTET16_LEN); in smp_calculate_f5_key()
|
/device/board/isoftstone/zhiyuan/kernel/driver/ramfs/ |
D | rootfs_arm64.cpio.gz |
|