Home
last modified time | relevance | path

Searched refs:password (Results 1 – 20 of 20) sorted by relevance

/optee_os/core/lib/libtomcrypt/src/misc/pkcs5/
H A Dpkcs_5_1.c32 static int s_pkcs_5_alg1_common(const unsigned char *password, in s_pkcs_5_alg1_common() argument
48 LTC_ARGCHK(password != NULL); in s_pkcs_5_alg1_common()
87 if ((err = hash_descriptor[hash_idx]->process(md, password, password_len)) != CRYPT_OK) { in s_pkcs_5_alg1_common()
152 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, in pkcs_5_alg1() argument
157 return s_pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1()
175 int pkcs_5_alg1_openssl(const unsigned char *password, in pkcs_5_alg1_openssl() argument
181 return s_pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1_openssl()
H A Dpkcs_5_2.c23 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, in pkcs_5_alg2() argument
34 LTC_ARGCHK(password != NULL); in pkcs_5_alg2()
74 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { in pkcs_5_alg2()
91 … if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) { in pkcs_5_alg2()
/optee_os/core/tee/
H A Dtee_cryp_pbkdf2.c20 const uint8_t *password; member
37 res = crypto_mac_init(h->ctx, p->password, p->password_len); in pbkdf2_f()
71 TEE_Result tee_cryp_pbkdf2(uint32_t hash_id, const uint8_t *password, in tee_cryp_pbkdf2() argument
92 pbkdf2_parms.password = password; in tee_cryp_pbkdf2()
H A Dtee_svc_cryp.c3915 const uint8_t *password = (const uint8_t *)(ss + 1); in syscall_cryp_derive_key() local
3928 res = tee_cryp_pbkdf2(hash_id, password, ss->key_size, salt, in syscall_cryp_derive_key()
/optee_os/core/lib/libtomcrypt/src/misc/pbes/
H A Dpbes1.c7 static int s_pkcs_5_alg1_wrap(const unsigned char *password, unsigned long password_len, in s_pkcs_5_alg1_wrap() argument
13 return pkcs_5_alg1(password, password_len, salt, iteration_count, hash_idx, out, outlen); in s_pkcs_5_alg1_wrap()
16 static int s_pkcs_12_wrap(const unsigned char *password, unsigned long password_len, in s_pkcs_12_wrap() argument
28 if ((err = pkcs12_utf8_to_utf16(password, password_len, pw, &pwlen)) != CRYPT_OK) goto LBL_ERROR; in s_pkcs_12_wrap()
/optee_os/core/lib/libtomcrypt/src/headers/
H A Dtomcrypt_pkcs.h80 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len,
87 int pkcs_5_alg1_openssl(const unsigned char *password,
94 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
H A Dtomcrypt_private.h64 typedef int (*fn_kdf_t)(const unsigned char *password, unsigned long password_len,
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dpsa_crypto_pake.c138 operation->password, in psa_pake_ecjpake_setup()
141 mbedtls_platform_zeroize(operation->password, operation->password_len); in psa_pake_ecjpake_setup()
184 operation->password = mbedtls_calloc(1, password_len); in mbedtls_psa_pake_setup()
185 if (operation->password == NULL) { in mbedtls_psa_pake_setup()
202 status = psa_crypto_driver_pake_get_password(inputs, operation->password, in mbedtls_psa_pake_setup()
550 mbedtls_zeroize_and_free(operation->password, operation->password_len); in mbedtls_psa_pake_abort()
551 operation->password = NULL; in mbedtls_psa_pake_abort()
H A Dpkcs5.c269 const unsigned char *password, in pkcs5_pbkdf2_hmac() argument
292 if ((ret = mbedtls_md_hmac_starts(ctx, password, plen)) != 0) { in pkcs5_pbkdf2_hmac()
359 const unsigned char *password, in mbedtls_pkcs5_pbkdf2_hmac() argument
364 return pkcs5_pbkdf2_hmac(ctx, password, plen, salt, slen, iteration_count, in mbedtls_pkcs5_pbkdf2_hmac()
370 const unsigned char *password, in mbedtls_pkcs5_pbkdf2_hmac_ext() argument
389 ret = pkcs5_pbkdf2_hmac(&md_ctx, password, plen, salt, slen, in mbedtls_pkcs5_pbkdf2_hmac_ext()
H A Dpsa_crypto.c6124 pbkdf2->password, in psa_key_derivation_pbkdf2_generate_block()
6156 pbkdf2->password, in psa_key_derivation_pbkdf2_generate_block()
7460 pbkdf2->password, in psa_pbkdf2_set_password()
7467 pbkdf2->password, in psa_pbkdf2_set_password()
8606 memcpy(buffer, inputs->password, inputs->password_len); in psa_crypto_driver_pake_get_password()
8739 mbedtls_svc_key_id_t password) in psa_pake_set_password_key() argument
8751 status = psa_get_and_lock_key_slot_with_policy(password, &slot, in psa_pake_set_password_key()
8766 operation->data.inputs.password = mbedtls_calloc(1, slot->key.bytes); in psa_pake_set_password_key()
8767 if (operation->data.inputs.password == NULL) { in psa_pake_set_password_key()
8772 memcpy(operation->data.inputs.password, slot->key.data, slot->key.bytes); in psa_pake_set_password_key()
[all …]
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dpkcs5.h150 const unsigned char *password,
174 const unsigned char *password,
H A Dpk.h1175 const char *path, const char *password,
/optee_os/core/drivers/crypto/hisilicon/
H A Dsec_pbkdf2.c251 static TEE_Result sec_pbkdf2_set_buf(const uint8_t *password, in sec_pbkdf2_set_buf() argument
273 if (password) in sec_pbkdf2_set_buf()
274 memcpy(msg->base_key, password, msg->key_len); in sec_pbkdf2_set_buf()
299 TEE_Result tee_cryp_pbkdf2(uint32_t hash_id, const uint8_t *password, in tee_cryp_pbkdf2() argument
307 if (!IS_ENABLED(CFG_CRYPTO_HW_PBKDF2_WITH_EFUSE) && !password) { in tee_cryp_pbkdf2()
333 ret = sec_pbkdf2_set_buf(password, salt, msg); in tee_cryp_pbkdf2()
/optee_os/core/include/tee/
H A Dtee_cryp_pbkdf2.h11 TEE_Result tee_cryp_pbkdf2(uint32_t hash_id, const uint8_t *password,
/optee_os/scripts/
H A Dpem_to_pub_c.py34 key = serialization.load_pem_private_key(data, password=None,
H A Dsign_encrypt.py327 return load_pem_private_key(data, password=None,
/optee_os/lib/libmbedtls/mbedtls/include/psa/
H A Dcrypto_builtin_key_derivation.h110 uint8_t MBEDTLS_PRIVATE(password)[PSA_HMAC_MAX_HASH_BLOCK_SIZE];
H A Dcrypto_builtin_composites.h194 uint8_t *MBEDTLS_PRIVATE(password);
H A Dcrypto_extra.h1066 uint8_t *MBEDTLS_PRIVATE(password);
1529 mbedtls_svc_key_id_t password);
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog1060 * It is now possible to use a PSA-held (opaque) password with the TLS 1.2
1647 * In mbedtls_pk_parse_key(), if no password is provided, don't allocate a
1799 pkcs12 functions when the password is empty. Fix the documentation to
2690 example applications which allows to provide a password for the key file
2692 these applications with password-protected key files. Analogously but for
2694 set a password for the key file provided through the existing key_file2
4637 mbedtls_pk_parse_key(file)() when the password is > 129 bytes.
4972 * Fix bug in ssl_mail_client when password is longer that username (found