Home
last modified time | relevance | path

Searched refs:password (Results 1 – 14 of 14) sorted by relevance

/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/pkcs5/
A Dpkcs_5_1.c32 static int s_pkcs_5_alg1_common(const unsigned char *password, in s_pkcs_5_alg1_common() argument
48 LTC_ARGCHK(password != NULL); in s_pkcs_5_alg1_common()
87 if ((err = hash_descriptor[hash_idx]->process(md, password, password_len)) != CRYPT_OK) { in s_pkcs_5_alg1_common()
152 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, in pkcs_5_alg1() argument
157 return s_pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1()
175 int pkcs_5_alg1_openssl(const unsigned char *password, in pkcs_5_alg1_openssl() argument
181 return s_pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1_openssl()
A Dpkcs_5_2.c23 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, in pkcs_5_alg2() argument
34 LTC_ARGCHK(password != NULL); in pkcs_5_alg2()
74 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { in pkcs_5_alg2()
91 … if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) { in pkcs_5_alg2()
/optee_os-3.20.0/core/tee/
A Dtee_cryp_pbkdf2.c20 const uint8_t *password; member
37 res = crypto_mac_init(h->ctx, p->password, p->password_len); in pbkdf2_f()
71 TEE_Result tee_cryp_pbkdf2(uint32_t hash_id, const uint8_t *password, in tee_cryp_pbkdf2() argument
92 pbkdf2_parms.password = password; in tee_cryp_pbkdf2()
A Dtee_svc_cryp.c3576 const uint8_t *password = (const uint8_t *)(ss + 1); in syscall_cryp_derive_key() local
3589 res = tee_cryp_pbkdf2(hash_id, password, ss->key_size, salt, in syscall_cryp_derive_key()
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/pbes/
A Dpbes1.c7 static int s_pkcs_5_alg1_wrap(const unsigned char *password, unsigned long password_len, in s_pkcs_5_alg1_wrap() argument
13 return pkcs_5_alg1(password, password_len, salt, iteration_count, hash_idx, out, outlen); in s_pkcs_5_alg1_wrap()
16 static int s_pkcs_12_wrap(const unsigned char *password, unsigned long password_len, in s_pkcs_12_wrap() argument
28 if ((err = pkcs12_utf8_to_utf16(password, password_len, pw, &pwlen)) != CRYPT_OK) goto LBL_ERROR; in s_pkcs_12_wrap()
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_pkcs.h78 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len,
85 int pkcs_5_alg1_openssl(const unsigned char *password,
92 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
A Dtomcrypt_private.h43 typedef int (*fn_kdf_t)(const unsigned char *password, unsigned long password_len,
/optee_os-3.20.0/core/include/tee/
A Dtee_cryp_pbkdf2.h11 TEE_Result tee_cryp_pbkdf2(uint32_t hash_id, const uint8_t *password,
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/
A Dpkcs5.h91 int mbedtls_pkcs5_pbkdf2_hmac( mbedtls_md_context_t *ctx, const unsigned char *password,
A Dpk.h764 const char *path, const char *password );
/optee_os-3.20.0/scripts/
A Dpem_to_pub_c.py34 key = serialization.load_pem_private_key(data, password=None,
A Dsign_encrypt.py326 return load_pem_private_key(data, password=None,
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/
A Dpkcs5.c219 const unsigned char *password, in mbedtls_pkcs5_pbkdf2_hmac() argument
242 if( ( ret = mbedtls_md_hmac_starts( ctx, password, plen ) ) != 0 ) in mbedtls_pkcs5_pbkdf2_hmac()
/optee_os-3.20.0/lib/libmbedtls/mbedtls/
A DChangeLog195 pkcs12 functions when the password is empty. Fix the documentation to
801 example applications which allows to provide a password for the key file
803 these applications with password-protected key files. Analogously but for
805 set a password for the key file provided through the existing key_file2
2748 mbedtls_pk_parse_key(file)() when the password is > 129 bytes.
3083 * Fix bug in ssl_mail_client when password is longer that username (found

Completed in 27 milliseconds