| /optee_os/core/lib/libtomcrypt/src/misc/pkcs5/ |
| H A D | pkcs_5_1.c | 32 static int s_pkcs_5_alg1_common(const unsigned char *password, in s_pkcs_5_alg1_common() argument 48 LTC_ARGCHK(password != NULL); in s_pkcs_5_alg1_common() 87 if ((err = hash_descriptor[hash_idx]->process(md, password, password_len)) != CRYPT_OK) { in s_pkcs_5_alg1_common() 152 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, in pkcs_5_alg1() argument 157 return s_pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1() 175 int pkcs_5_alg1_openssl(const unsigned char *password, in pkcs_5_alg1_openssl() argument 181 return s_pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1_openssl()
|
| H A D | pkcs_5_2.c | 23 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, in pkcs_5_alg2() argument 34 LTC_ARGCHK(password != NULL); in pkcs_5_alg2() 74 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { in pkcs_5_alg2() 91 … if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) { in pkcs_5_alg2()
|
| /optee_os/core/tee/ |
| H A D | tee_cryp_pbkdf2.c | 20 const uint8_t *password; member 37 res = crypto_mac_init(h->ctx, p->password, p->password_len); in pbkdf2_f() 71 TEE_Result tee_cryp_pbkdf2(uint32_t hash_id, const uint8_t *password, in tee_cryp_pbkdf2() argument 92 pbkdf2_parms.password = password; in tee_cryp_pbkdf2()
|
| H A D | tee_svc_cryp.c | 3915 const uint8_t *password = (const uint8_t *)(ss + 1); in syscall_cryp_derive_key() local 3928 res = tee_cryp_pbkdf2(hash_id, password, ss->key_size, salt, in syscall_cryp_derive_key()
|
| /optee_os/core/lib/libtomcrypt/src/misc/pbes/ |
| H A D | pbes1.c | 7 static int s_pkcs_5_alg1_wrap(const unsigned char *password, unsigned long password_len, in s_pkcs_5_alg1_wrap() argument 13 return pkcs_5_alg1(password, password_len, salt, iteration_count, hash_idx, out, outlen); in s_pkcs_5_alg1_wrap() 16 static int s_pkcs_12_wrap(const unsigned char *password, unsigned long password_len, in s_pkcs_12_wrap() argument 28 if ((err = pkcs12_utf8_to_utf16(password, password_len, pw, &pwlen)) != CRYPT_OK) goto LBL_ERROR; in s_pkcs_12_wrap()
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_pkcs.h | 80 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, 87 int pkcs_5_alg1_openssl(const unsigned char *password, 94 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
|
| H A D | tomcrypt_private.h | 64 typedef int (*fn_kdf_t)(const unsigned char *password, unsigned long password_len,
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | psa_crypto_pake.c | 138 operation->password, in psa_pake_ecjpake_setup() 141 mbedtls_platform_zeroize(operation->password, operation->password_len); in psa_pake_ecjpake_setup() 184 operation->password = mbedtls_calloc(1, password_len); in mbedtls_psa_pake_setup() 185 if (operation->password == NULL) { in mbedtls_psa_pake_setup() 202 status = psa_crypto_driver_pake_get_password(inputs, operation->password, in mbedtls_psa_pake_setup() 550 mbedtls_zeroize_and_free(operation->password, operation->password_len); in mbedtls_psa_pake_abort() 551 operation->password = NULL; in mbedtls_psa_pake_abort()
|
| H A D | pkcs5.c | 269 const unsigned char *password, in pkcs5_pbkdf2_hmac() argument 292 if ((ret = mbedtls_md_hmac_starts(ctx, password, plen)) != 0) { in pkcs5_pbkdf2_hmac() 359 const unsigned char *password, in mbedtls_pkcs5_pbkdf2_hmac() argument 364 return pkcs5_pbkdf2_hmac(ctx, password, plen, salt, slen, iteration_count, in mbedtls_pkcs5_pbkdf2_hmac() 370 const unsigned char *password, in mbedtls_pkcs5_pbkdf2_hmac_ext() argument 389 ret = pkcs5_pbkdf2_hmac(&md_ctx, password, plen, salt, slen, in mbedtls_pkcs5_pbkdf2_hmac_ext()
|
| H A D | psa_crypto.c | 6124 pbkdf2->password, in psa_key_derivation_pbkdf2_generate_block() 6156 pbkdf2->password, in psa_key_derivation_pbkdf2_generate_block() 7460 pbkdf2->password, in psa_pbkdf2_set_password() 7467 pbkdf2->password, in psa_pbkdf2_set_password() 8606 memcpy(buffer, inputs->password, inputs->password_len); in psa_crypto_driver_pake_get_password() 8739 mbedtls_svc_key_id_t password) in psa_pake_set_password_key() argument 8751 status = psa_get_and_lock_key_slot_with_policy(password, &slot, in psa_pake_set_password_key() 8766 operation->data.inputs.password = mbedtls_calloc(1, slot->key.bytes); in psa_pake_set_password_key() 8767 if (operation->data.inputs.password == NULL) { in psa_pake_set_password_key() 8772 memcpy(operation->data.inputs.password, slot->key.data, slot->key.bytes); in psa_pake_set_password_key() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | pkcs5.h | 150 const unsigned char *password, 174 const unsigned char *password,
|
| H A D | pk.h | 1175 const char *path, const char *password,
|
| /optee_os/core/drivers/crypto/hisilicon/ |
| H A D | sec_pbkdf2.c | 251 static TEE_Result sec_pbkdf2_set_buf(const uint8_t *password, in sec_pbkdf2_set_buf() argument 273 if (password) in sec_pbkdf2_set_buf() 274 memcpy(msg->base_key, password, msg->key_len); in sec_pbkdf2_set_buf() 299 TEE_Result tee_cryp_pbkdf2(uint32_t hash_id, const uint8_t *password, in tee_cryp_pbkdf2() argument 307 if (!IS_ENABLED(CFG_CRYPTO_HW_PBKDF2_WITH_EFUSE) && !password) { in tee_cryp_pbkdf2() 333 ret = sec_pbkdf2_set_buf(password, salt, msg); in tee_cryp_pbkdf2()
|
| /optee_os/core/include/tee/ |
| H A D | tee_cryp_pbkdf2.h | 11 TEE_Result tee_cryp_pbkdf2(uint32_t hash_id, const uint8_t *password,
|
| /optee_os/scripts/ |
| H A D | pem_to_pub_c.py | 34 key = serialization.load_pem_private_key(data, password=None,
|
| H A D | sign_encrypt.py | 327 return load_pem_private_key(data, password=None,
|
| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_builtin_key_derivation.h | 110 uint8_t MBEDTLS_PRIVATE(password)[PSA_HMAC_MAX_HASH_BLOCK_SIZE];
|
| H A D | crypto_builtin_composites.h | 194 uint8_t *MBEDTLS_PRIVATE(password);
|
| H A D | crypto_extra.h | 1066 uint8_t *MBEDTLS_PRIVATE(password); 1529 mbedtls_svc_key_id_t password);
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 1060 * It is now possible to use a PSA-held (opaque) password with the TLS 1.2 1647 * In mbedtls_pk_parse_key(), if no password is provided, don't allocate a 1799 pkcs12 functions when the password is empty. Fix the documentation to 2690 example applications which allows to provide a password for the key file 2692 these applications with password-protected key files. Analogously but for 2694 set a password for the key file provided through the existing key_file2 4637 mbedtls_pk_parse_key(file)() when the password is > 129 bytes. 4972 * Fix bug in ssl_mail_client when password is longer that username (found
|