| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | pem.c | 77 const unsigned char *pwd, size_t pwdlen) in pem_pbkdf1() argument 94 * key[ 0..15] = MD5(pwd || IV) in pem_pbkdf1() 99 if ((ret = mbedtls_md_update(&md5_ctx, pwd, pwdlen)) != 0) { in pem_pbkdf1() 117 * key[16..23] = MD5(key[ 0..15] || pwd || IV]) in pem_pbkdf1() 125 if ((ret = mbedtls_md_update(&md5_ctx, pwd, pwdlen)) != 0) { in pem_pbkdf1() 155 const unsigned char *pwd, size_t pwdlen) in pem_des_decrypt() argument 163 if ((ret = pem_pbkdf1(des_key, 8, des_iv, pwd, pwdlen)) != 0) { in pem_des_decrypt() 185 const unsigned char *pwd, size_t pwdlen) in pem_des3_decrypt() argument 193 if ((ret = pem_pbkdf1(des3_key, 24, des3_iv, pwd, pwdlen)) != 0) { in pem_des3_decrypt() 217 const unsigned char *pwd, size_t pwdlen) in pem_aes_decrypt() argument [all …]
|
| H A D | pkcs12.c | 77 const unsigned char *pwd, size_t pwdlen, in pkcs12_pbe_derive_key_iv() argument 99 unipwd[i * 2 + 1] = pwd[i]; in pkcs12_pbe_derive_key_iv() 125 const unsigned char *pwd, size_t pwdlen, 134 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs12_pbe() argument 145 pwd, pwdlen, data, len, output, SIZE_MAX, in mbedtls_pkcs12_pbe() 152 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs12_pbe_ext() argument 166 if (pwd == NULL && pwdlen != 0) { in mbedtls_pkcs12_pbe_ext() 191 if ((ret = pkcs12_pbe_derive_key_iv(pbe_params, md_type, pwd, pwdlen, in mbedtls_pkcs12_pbe_ext() 327 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs12_derivation() argument 349 if (pwd == NULL && pwdlen != 0) { in mbedtls_pkcs12_derivation() [all …]
|
| H A D | pkparse.c | 868 const unsigned char *pwd, size_t pwdlen, in mbedtls_pk_parse_key_pkcs8_encrypted_der() argument 928 pwd, pwdlen, p, len, buf, len, &outlen)) != 0) { in mbedtls_pk_parse_key_pkcs8_encrypted_der() 941 if ((ret = mbedtls_pkcs5_pbes2_ext(&pbe_params, MBEDTLS_PKCS5_DECRYPT, pwd, pwdlen, in mbedtls_pk_parse_key_pkcs8_encrypted_der() 954 ((void) pwd); in mbedtls_pk_parse_key_pkcs8_encrypted_der() 975 const unsigned char *pwd, size_t pwdlen, in mbedtls_pk_parse_key() argument 999 key, pwd, pwdlen, &len); in mbedtls_pk_parse_key() 1029 key, pwd, pwdlen, &len); in mbedtls_pk_parse_key() 1084 pwd, pwdlen, f_rng, p_rng)) != 0) { in mbedtls_pk_parse_key() 1095 ((void) pwd); in mbedtls_pk_parse_key() 1117 pwd, pwdlen, f_rng, p_rng); in mbedtls_pk_parse_key() [all …]
|
| H A D | pkcs5.c | 106 const unsigned char *pwd, size_t pwdlen, 114 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs5_pbes2() argument 124 return mbedtls_pkcs5_pbes2_ext(pbe_params, mode, pwd, pwdlen, data, in mbedtls_pkcs5_pbes2() 130 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs5_pbes2_ext() argument 219 if ((ret = mbedtls_pkcs5_pbkdf2_hmac_ext(md_type, pwd, pwdlen, salt.p, in mbedtls_pkcs5_pbes2_ext()
|
| H A D | pk_internal.h | 199 const unsigned char *pwd, size_t pwdlen,
|
| H A D | ssl_tls.c | 1968 mbedtls_svc_key_id_t pwd) in mbedtls_ssl_set_hs_ecjpake_password_common() argument 2010 status = psa_pake_set_password_key(&ssl->handshake->psa_pake_ctx, pwd); in mbedtls_ssl_set_hs_ecjpake_password_common() 2058 mbedtls_svc_key_id_t pwd) in mbedtls_ssl_set_hs_ecjpake_password_opaque() argument 2066 if (mbedtls_svc_key_id_is_null(pwd)) { in mbedtls_ssl_set_hs_ecjpake_password_opaque() 2070 status = mbedtls_ssl_set_hs_ecjpake_password_common(ssl, pwd); in mbedtls_ssl_set_hs_ecjpake_password_opaque()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | pkcs12.h | 72 * \param pwd Latin1-encoded password used. This may only be \c NULL when 92 const unsigned char *pwd, size_t pwdlen, 118 * \param pwd Latin1-encoded password used. This may only be \c NULL when 141 const unsigned char *pwd, size_t pwdlen, 160 * \param pwd The password to use. For compliance with PKCS#12 §B.1, this 178 const unsigned char *pwd, size_t pwdlen,
|
| H A D | pkcs5.h | 68 * \param pwd password to use when generating key 85 const unsigned char *pwd, size_t pwdlen, 106 * \param pwd password to use when generating key 126 const unsigned char *pwd, size_t pwdlen,
|
| H A D | pem.h | 74 * \param pwd password for decryption (can be NULL) 94 const unsigned char *pwd,
|
| H A D | pk.h | 1091 * \param pwd Optional password for decryption. 1097 * Ignored if \p pwd is \c NULL. 1111 const unsigned char *pwd, size_t pwdlen,
|
| H A D | ssl.h | 4260 * \param pwd EC J-PAKE opaque password 4265 mbedtls_svc_key_id_t pwd);
|
| /optee_os/core/lib/libtomcrypt/src/pk/asn1/pkcs8/ |
| H A D | pkcs8_decode_flexi.c | 12 @param pwd Pointer to the password that was used when encrypting 18 const void *pwd, unsigned long pwdlen, in pkcs8_decode_flexi() argument 62 pbes.pwd = pwd; in pkcs8_decode_flexi()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ed25519/ |
| H A D | ed25519_import_pkcs8.c | 22 const void *pwd, unsigned long pwdlen, in ed25519_import_pkcs8() argument 25 …return ec25519_import_pkcs8(in, inlen, pwd, pwdlen, LTC_OID_ED25519, tweetnacl_crypto_sk_to_pk, ke… in ed25519_import_pkcs8()
|
| /optee_os/core/lib/libtomcrypt/src/pk/x25519/ |
| H A D | x25519_import_pkcs8.c | 22 const void *pwd, unsigned long pwdlen, in x25519_import_pkcs8() argument 25 …return ec25519_import_pkcs8(in, inlen, pwd, pwdlen, LTC_OID_X25519, tweetnacl_crypto_scalarmult_ba… in x25519_import_pkcs8()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ec25519/ |
| H A D | ec25519_import_pkcs8.c | 22 const void *pwd, unsigned long pwdlen, in ec25519_import_pkcs8() argument 38 if ((err = pkcs8_decode_flexi(in, inlen, pwd, pwdlen, &l)) == CRYPT_OK) { in ec25519_import_pkcs8()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ecc_import_pkcs8.c | 41 const void *pwd, unsigned long pwdlen, in ecc_import_pkcs8() argument 67 if (pkcs8_decode_flexi(in, inlen, pwd, pwdlen, &l) == CRYPT_OK) { in ecc_import_pkcs8()
|
| /optee_os/core/lib/libtomcrypt/src/misc/pbes/ |
| H A D | pbes.c | 53 …if ((err = arg->type.kdf(arg->pwd, arg->pwdlen, arg->salt->data, arg->salt->size, arg->iterations,… in pbes_decrypt()
|
| /optee_os/scripts/ |
| H A D | checkpatch.sh | 16 CHECKPATCH=$(find "$PWD/../linux" -name checkpatch.pl -print -quit)
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_private.h | 84 const void *pwd; member 406 const void *pwd, unsigned long pwdlen, 477 const void *pwd, unsigned long pwdlen,
|
| H A D | tomcrypt_pk.h | 283 int ecc_import_pkcs8(const unsigned char *in, unsigned long inlen, const void *pwd, unsigned long p… 357 const void *pwd, unsigned long pwdlen, 397 const void *pwd, unsigned long pwdlen,
|
| /optee_os/ |
| H A D | Makefile | 118 ${q}find $(PWD) -name "*.[chSs]" | grep -v export-ta_ | \
|