Home
last modified time | relevance | path

Searched refs:password_len (Results 1 – 12 of 12) sorted by relevance

/optee_os/core/lib/libtomcrypt/src/misc/pkcs5/
H A Dpkcs_5_1.c33 unsigned long password_len, in s_pkcs_5_alg1_common() argument
87 if ((err = hash_descriptor[hash_idx]->process(md, password, password_len)) != CRYPT_OK) { in s_pkcs_5_alg1_common()
152 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, in pkcs_5_alg1() argument
157 return s_pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1()
176 unsigned long password_len, in pkcs_5_alg1_openssl() argument
181 return s_pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1_openssl()
H A Dpkcs_5_2.c23 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, in pkcs_5_alg2() argument
74 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { in pkcs_5_alg2()
91 … if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) { in pkcs_5_alg2()
/optee_os/core/lib/libtomcrypt/src/misc/pbes/
H A Dpbes1.c7 static int s_pkcs_5_alg1_wrap(const unsigned char *password, unsigned long password_len, in s_pkcs_5_alg1_wrap() argument
13 return pkcs_5_alg1(password, password_len, salt, iteration_count, hash_idx, out, outlen); in s_pkcs_5_alg1_wrap()
16 static int s_pkcs_12_wrap(const unsigned char *password, unsigned long password_len, in s_pkcs_12_wrap() argument
23 unsigned long pwlen = password_len * 2; in s_pkcs_12_wrap()
28 if ((err = pkcs12_utf8_to_utf16(password, password_len, pw, &pwlen)) != CRYPT_OK) goto LBL_ERROR; in s_pkcs_12_wrap()
/optee_os/core/drivers/crypto/hisilicon/
H A Dsec_pbkdf2.c188 static TEE_Result sec_pbkdf2_params_check(uint32_t hash_id, size_t password_len, in sec_pbkdf2_params_check() argument
194 if (!password_len || !salt_len || !c_num || !derived_key_len) { in sec_pbkdf2_params_check()
200 (password_len > (SEC_MAX_PASSWORD_LEN / 2))) { in sec_pbkdf2_params_check()
202 password_len, alg); in sec_pbkdf2_params_check()
206 if (password_len > SEC_MAX_PASSWORD_LEN) { in sec_pbkdf2_params_check()
207 EMSG("Unsupported password len %zu", password_len); in sec_pbkdf2_params_check()
287 static TEE_Result sec_pbkdf2_msg_init(uint32_t hash_id, size_t password_len, in sec_pbkdf2_msg_init() argument
292 msg->key_len = password_len; in sec_pbkdf2_msg_init()
300 size_t password_len, const uint8_t *salt, in tee_cryp_pbkdf2() argument
317 ret = sec_pbkdf2_params_check(hash_id, password_len, salt_len, in tee_cryp_pbkdf2()
[all …]
/optee_os/core/tee/
H A Dtee_cryp_pbkdf2.c21 size_t password_len; member
37 res = crypto_mac_init(h->ctx, p->password, p->password_len); in pbkdf2_f()
72 size_t password_len, const uint8_t *salt, in tee_cryp_pbkdf2() argument
93 pbkdf2_parms.password_len = password_len; in tee_cryp_pbkdf2()
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dpsa_crypto_pake.c139 operation->password_len); in psa_pake_ecjpake_setup()
141 mbedtls_platform_zeroize(operation->password, operation->password_len); in psa_pake_ecjpake_setup()
159 size_t user_len = 0, peer_len = 0, password_len = 0; in mbedtls_psa_pake_setup() local
164 status = psa_crypto_driver_pake_get_password_len(inputs, &password_len); in mbedtls_psa_pake_setup()
184 operation->password = mbedtls_calloc(1, password_len); in mbedtls_psa_pake_setup()
203 password_len, &actual_password_len); in mbedtls_psa_pake_setup()
220 operation->password_len = actual_password_len; in mbedtls_psa_pake_setup()
550 mbedtls_zeroize_and_free(operation->password, operation->password_len); in mbedtls_psa_pake_abort()
552 operation->password_len = 0; in mbedtls_psa_pake_abort()
H A Dpsa_crypto.c8583 size_t *password_len) in psa_crypto_driver_pake_get_password_len() argument
8585 if (inputs->password_len == 0) { in psa_crypto_driver_pake_get_password_len()
8589 *password_len = inputs->password_len; in psa_crypto_driver_pake_get_password_len()
8598 if (inputs->password_len == 0) { in psa_crypto_driver_pake_get_password()
8602 if (buffer_size < inputs->password_len) { in psa_crypto_driver_pake_get_password()
8606 memcpy(buffer, inputs->password, inputs->password_len); in psa_crypto_driver_pake_get_password()
8607 *buffer_length = inputs->password_len; in psa_crypto_driver_pake_get_password()
8773 operation->data.inputs.password_len = slot->key.bytes; in psa_pake_set_password_key()
8939 if (inputs.password_len == 0) { in psa_pake_complete_inputs()
8955 mbedtls_zeroize_and_free(inputs.password, inputs.password_len); in psa_pake_complete_inputs()
[all …]
/optee_os/core/lib/libtomcrypt/src/headers/
H A Dtomcrypt_pkcs.h80 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len,
88 unsigned long password_len,
94 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
H A Dtomcrypt_private.h64 typedef int (*fn_kdf_t)(const unsigned char *password, unsigned long password_len,
/optee_os/core/include/tee/
H A Dtee_cryp_pbkdf2.h12 size_t password_len, const uint8_t *salt,
/optee_os/lib/libmbedtls/mbedtls/include/psa/
H A Dcrypto_builtin_composites.h195 size_t MBEDTLS_PRIVATE(password_len);
H A Dcrypto_extra.h1067 size_t MBEDTLS_PRIVATE(password_len);
1314 size_t *password_len);