Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 18 of 18) sorted by relevance

/device/soc/winnermicro/wm800/board/src/bt/blehost/nimble/host/mesh/src/
Dcrypto.h28 static inline bool bt_mesh_s1(const char *m, u8_t salt[16]) in bt_mesh_s1()
31 return bt_mesh_aes_cmac_one(zero, m, strlen(m), salt); in bt_mesh_s1()
34 int bt_mesh_k1(const u8_t *ikm, size_t ikm_len, const u8_t salt[16],
39 const u8_t salt[16] = salt_str; \
40 bt_mesh_k1(ikm, ikm_len, salt, info, okm); \
153 int bt_mesh_prov_conf_salt(const u8_t conf_inputs[145], u8_t salt[16]);
Dcrypto.c52 int bt_mesh_k1(const u8_t *ikm, size_t ikm_len, const u8_t salt[16], in bt_mesh_k1()
56 err = bt_mesh_aes_cmac_one(salt, ikm, ikm_len, okm); in bt_mesh_k1()
68 u8_t salt[16]; in bt_mesh_k2() local
75 err = bt_mesh_s1("smk2", salt); in bt_mesh_k2()
80 err = bt_mesh_aes_cmac_one(salt, n, 16, t); // 16:len in bt_mesh_k2()
170 u8_t salt[16]; // 16:array length in bt_mesh_id128() local
172 err = bt_mesh_s1(s, salt); in bt_mesh_id128()
177 return bt_mesh_k1(n, 16, salt, id128, out); // 16:len in bt_mesh_id128()
756 u8_t salt[16]; // 16:array length in bt_mesh_virtual_addr() local
759 err = bt_mesh_s1("vtad", salt); in bt_mesh_virtual_addr()
[all …]
/device/soc/hisilicon/hi3861v100/sdk_liteos/platform/system/upg/
Dkernel_crypto.c129 ctrl.salt = rootkey_iv; in crypto_prepare()
341 hi_u8 salt[IV_BYTE_LENGTH]; in crypto_gen_key_content() local
345 (hi_void)hi_cipher_trng_get_random_bytes(salt, IV_BYTE_LENGTH); in crypto_gen_key_content()
353 ctrl.salt = salt; in crypto_gen_key_content()
354 ctrl.salt_len = sizeof(salt); in crypto_gen_key_content()
603 hi_u8 salt[ROOTKEY_IV_BYTE_LENGTH] = {0}; in crypto_upg_file_prepare() local
605 …ret = (hi_u32)memcpy_s((hi_void *)salt, sizeof(salt), (hi_void *)(para->upg_salt), IV_BYTE_LENGTH); in crypto_upg_file_prepare()
610 ret = (hi_u32)memcpy_s((hi_void *)(salt + IV_BYTE_LENGTH), sizeof(salt) - IV_BYTE_LENGTH, in crypto_upg_file_prepare()
616 ctrl.salt = salt; in crypto_upg_file_prepare()
Dupg_check_boot_bin.c211 ctrl->salt = rootkey_iv; in upg_boot_decrypt()
Dupg_common.c1024 ctrl->salt = rootkey_iv; in upg_set_kdf_key()
/device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/mbedtls/include/mbedtls/
Dhkdf.h73 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt,
103 const unsigned char *salt, size_t salt_len,
Dpkcs5.h90 size_t plen, const unsigned char *salt, size_t slen,
Dpkcs12.h123 const unsigned char *salt, size_t saltlen,
/device/soc/hisilicon/hi3861v100/sdk_liteos/boot/flashboot/secure/
Dcrypto.c165 ctrl.salt = rootkey_iv; in crypto_prepare()
392 hi_u8 salt[IV_BYTE_LENGTH]; in crypto_gen_key_content() local
396 (hi_void)hi_cipher_trng_get_random_bytes(salt, IV_BYTE_LENGTH); in crypto_gen_key_content()
405 ctrl.salt = salt; in crypto_gen_key_content()
406 ctrl.salt_len = sizeof(salt); in crypto_gen_key_content()
835 hi_u8 salt[ROOTKEY_IV_BYTE_LENGTH] = {0}; in boot_crypto_upg_file_prepare() local
837 hi_u32 cs = (uintptr_t)salt ^ sizeof(salt) ^ (uintptr_t)(para->upg_salt) ^ IV_BYTE_LENGTH; in boot_crypto_upg_file_prepare()
838 ret = memcpy_s((hi_void *)salt, sizeof(salt), (hi_void *)(para->upg_salt), IV_BYTE_LENGTH, cs); in boot_crypto_upg_file_prepare()
843 cs = (uintptr_t)(salt + IV_BYTE_LENGTH) ^ (sizeof(salt) - IV_BYTE_LENGTH) ^ in boot_crypto_upg_file_prepare()
845 ret = memcpy_s((hi_void *)(salt + IV_BYTE_LENGTH), sizeof(salt) - IV_BYTE_LENGTH, in boot_crypto_upg_file_prepare()
[all …]
/device/soc/hisilicon/hi3861v100/sdk_liteos/boot/loaderboot/secure/
Dload_crypto.c115 ctrl.salt = rootkey_iv; in crypto_prepare()
339 hi_u8 salt[IV_BYTE_LENGTH]; in crypto_gen_key_content() local
343 (hi_void)hi_cipher_trng_get_random_bytes(salt, IV_BYTE_LENGTH); in crypto_gen_key_content()
352 ctrl.salt = salt; in crypto_gen_key_content()
353 ctrl.salt_len = sizeof(salt); in crypto_gen_key_content()
/device/soc/telink/b91/b91_ble_sdk/algorithm/crypto/
Dcrypto_alg.h138 void blt_crypto_alg_h7(unsigned char *r, unsigned char salt[16], unsigned char w[16]);
/device/soc/hisilicon/hi3861v100/sdk_liteos/boot/commonboot/
Dhi_cipher.h178 const hi_u8 *salt; /* salt for kdf key derivation. */ member
/device/soc/hisilicon/hi3516dv300/sdk_linux/drv/interdrv/common/cipher/mbedtls_prepare/
Dhisi_mbedtls-2.16.10.patch991 * \note This function always uses the maximum possible salt size,
992 * up to the length of the payload hash. This choice of salt
997 * minimum salt size which is the hash size minus 2 bytes. If
998 * this minimum size is too large given the key size (the salt
2083 - unsigned char salt[MBEDTLS_MD_MAX_SIZE];
2086 + unsigned char salt[MBEDTLS_MD_MAX_SIZE] = {0};
2118 /* Calculate the largest possible salt length. Normally this is the hash
2119 * length, which is the maximum length the salt can have. If there is not
2120 * enough room, use the maximum salt length that fits. The constraint is
2121 * that the hash length plus the salt length plus 2 bytes must be at most
[all …]
/device/soc/winnermicro/wm800/board/src/bt/blehost/nimble/host/src/
Dble_sm_alg.c239 static const uint8_t salt[16] = { 0x6c, 0x88, 0x83, 0x91, 0xaa, 0xf5, in ble_sm_alg_f5() local
262 rc = ble_sm_alg_aes_cmac(salt, ws, 32, t); // 32:len in ble_sm_alg_f5()
/device/soc/hisilicon/hi3861v100/sdk_liteos/include/
Dhks_client.h496 const struct hks_blob *salt, const struct hks_blob *label);
Dhi_cipher.h224 const hi_u8 *salt; /**< salt for kdf key derivation. */ member
/device/soc/esp/esp32/components/bt/host/bluedroid/stack/smp/
Dsmp_keys.c1685 BT_OCTET16 salt = { in smp_calculate_f5_key() local
1695 p_prnt = salt; in smp_calculate_f5_key()
1705 ARRAY_TO_STREAM(p, salt, BT_OCTET16_LEN); in smp_calculate_f5_key()
/device/board/isoftstone/zhiyuan/kernel/driver/ramfs/
Drootfs_arm64.cpio.gz