/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/pkcs5/ |
A D | pkcs_5_1.c | 32 static int s_pkcs_5_alg1_common(const unsigned char *password, in s_pkcs_5_alg1_common() argument 48 LTC_ARGCHK(password != NULL); in s_pkcs_5_alg1_common() 87 if ((err = hash_descriptor[hash_idx]->process(md, password, password_len)) != CRYPT_OK) { in s_pkcs_5_alg1_common() 152 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, in pkcs_5_alg1() argument 157 return s_pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1() 175 int pkcs_5_alg1_openssl(const unsigned char *password, in pkcs_5_alg1_openssl() argument 181 return s_pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1_openssl()
|
A D | pkcs_5_2.c | 23 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, in pkcs_5_alg2() argument 34 LTC_ARGCHK(password != NULL); in pkcs_5_alg2() 74 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { in pkcs_5_alg2() 91 … if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) { in pkcs_5_alg2()
|
/optee_os-3.20.0/core/tee/ |
A D | tee_cryp_pbkdf2.c | 20 const uint8_t *password; member 37 res = crypto_mac_init(h->ctx, p->password, p->password_len); in pbkdf2_f() 71 TEE_Result tee_cryp_pbkdf2(uint32_t hash_id, const uint8_t *password, in tee_cryp_pbkdf2() argument 92 pbkdf2_parms.password = password; in tee_cryp_pbkdf2()
|
A D | tee_svc_cryp.c | 3576 const uint8_t *password = (const uint8_t *)(ss + 1); in syscall_cryp_derive_key() local 3589 res = tee_cryp_pbkdf2(hash_id, password, ss->key_size, salt, in syscall_cryp_derive_key()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/misc/pbes/ |
A D | pbes1.c | 7 static int s_pkcs_5_alg1_wrap(const unsigned char *password, unsigned long password_len, in s_pkcs_5_alg1_wrap() argument 13 return pkcs_5_alg1(password, password_len, salt, iteration_count, hash_idx, out, outlen); in s_pkcs_5_alg1_wrap() 16 static int s_pkcs_12_wrap(const unsigned char *password, unsigned long password_len, in s_pkcs_12_wrap() argument 28 if ((err = pkcs12_utf8_to_utf16(password, password_len, pw, &pwlen)) != CRYPT_OK) goto LBL_ERROR; in s_pkcs_12_wrap()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_pkcs.h | 78 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, 85 int pkcs_5_alg1_openssl(const unsigned char *password, 92 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
|
A D | tomcrypt_private.h | 43 typedef int (*fn_kdf_t)(const unsigned char *password, unsigned long password_len,
|
/optee_os-3.20.0/core/include/tee/ |
A D | tee_cryp_pbkdf2.h | 11 TEE_Result tee_cryp_pbkdf2(uint32_t hash_id, const uint8_t *password,
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | pkcs5.h | 91 int mbedtls_pkcs5_pbkdf2_hmac( mbedtls_md_context_t *ctx, const unsigned char *password,
|
A D | pk.h | 764 const char *path, const char *password );
|
/optee_os-3.20.0/scripts/ |
A D | pem_to_pub_c.py | 34 key = serialization.load_pem_private_key(data, password=None,
|
A D | sign_encrypt.py | 326 return load_pem_private_key(data, password=None,
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | pkcs5.c | 219 const unsigned char *password, in mbedtls_pkcs5_pbkdf2_hmac() argument 242 if( ( ret = mbedtls_md_hmac_starts( ctx, password, plen ) ) != 0 ) in mbedtls_pkcs5_pbkdf2_hmac()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 195 pkcs12 functions when the password is empty. Fix the documentation to 801 example applications which allows to provide a password for the key file 803 these applications with password-protected key files. Analogously but for 805 set a password for the key file provided through the existing key_file2 2748 mbedtls_pk_parse_key(file)() when the password is > 129 bytes. 3083 * Fix bug in ssl_mail_client when password is longer that username (found
|