| /optee_os/core/lib/libtomcrypt/src/misc/pkcs5/ |
| H A D | pkcs_5_1.c | 33 unsigned long password_len, in s_pkcs_5_alg1_common() argument 87 if ((err = hash_descriptor[hash_idx]->process(md, password, password_len)) != CRYPT_OK) { in s_pkcs_5_alg1_common() 152 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, in pkcs_5_alg1() argument 157 return s_pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1() 176 unsigned long password_len, in pkcs_5_alg1_openssl() argument 181 return s_pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1_openssl()
|
| H A D | pkcs_5_2.c | 23 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, in pkcs_5_alg2() argument 74 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { in pkcs_5_alg2() 91 … if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) { in pkcs_5_alg2()
|
| /optee_os/core/lib/libtomcrypt/src/misc/pbes/ |
| H A D | pbes1.c | 7 static int s_pkcs_5_alg1_wrap(const unsigned char *password, unsigned long password_len, in s_pkcs_5_alg1_wrap() argument 13 return pkcs_5_alg1(password, password_len, salt, iteration_count, hash_idx, out, outlen); in s_pkcs_5_alg1_wrap() 16 static int s_pkcs_12_wrap(const unsigned char *password, unsigned long password_len, in s_pkcs_12_wrap() argument 23 unsigned long pwlen = password_len * 2; in s_pkcs_12_wrap() 28 if ((err = pkcs12_utf8_to_utf16(password, password_len, pw, &pwlen)) != CRYPT_OK) goto LBL_ERROR; in s_pkcs_12_wrap()
|
| /optee_os/core/drivers/crypto/hisilicon/ |
| H A D | sec_pbkdf2.c | 188 static TEE_Result sec_pbkdf2_params_check(uint32_t hash_id, size_t password_len, in sec_pbkdf2_params_check() argument 194 if (!password_len || !salt_len || !c_num || !derived_key_len) { in sec_pbkdf2_params_check() 200 (password_len > (SEC_MAX_PASSWORD_LEN / 2))) { in sec_pbkdf2_params_check() 202 password_len, alg); in sec_pbkdf2_params_check() 206 if (password_len > SEC_MAX_PASSWORD_LEN) { in sec_pbkdf2_params_check() 207 EMSG("Unsupported password len %zu", password_len); in sec_pbkdf2_params_check() 287 static TEE_Result sec_pbkdf2_msg_init(uint32_t hash_id, size_t password_len, in sec_pbkdf2_msg_init() argument 292 msg->key_len = password_len; in sec_pbkdf2_msg_init() 300 size_t password_len, const uint8_t *salt, in tee_cryp_pbkdf2() argument 317 ret = sec_pbkdf2_params_check(hash_id, password_len, salt_len, in tee_cryp_pbkdf2() [all …]
|
| /optee_os/core/tee/ |
| H A D | tee_cryp_pbkdf2.c | 21 size_t password_len; member 37 res = crypto_mac_init(h->ctx, p->password, p->password_len); in pbkdf2_f() 72 size_t password_len, const uint8_t *salt, in tee_cryp_pbkdf2() argument 93 pbkdf2_parms.password_len = password_len; in tee_cryp_pbkdf2()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | psa_crypto_pake.c | 139 operation->password_len); in psa_pake_ecjpake_setup() 141 mbedtls_platform_zeroize(operation->password, operation->password_len); in psa_pake_ecjpake_setup() 159 size_t user_len = 0, peer_len = 0, password_len = 0; in mbedtls_psa_pake_setup() local 164 status = psa_crypto_driver_pake_get_password_len(inputs, &password_len); in mbedtls_psa_pake_setup() 184 operation->password = mbedtls_calloc(1, password_len); in mbedtls_psa_pake_setup() 203 password_len, &actual_password_len); in mbedtls_psa_pake_setup() 220 operation->password_len = actual_password_len; in mbedtls_psa_pake_setup() 550 mbedtls_zeroize_and_free(operation->password, operation->password_len); in mbedtls_psa_pake_abort() 552 operation->password_len = 0; in mbedtls_psa_pake_abort()
|
| H A D | psa_crypto.c | 8583 size_t *password_len) in psa_crypto_driver_pake_get_password_len() argument 8585 if (inputs->password_len == 0) { in psa_crypto_driver_pake_get_password_len() 8589 *password_len = inputs->password_len; in psa_crypto_driver_pake_get_password_len() 8598 if (inputs->password_len == 0) { in psa_crypto_driver_pake_get_password() 8602 if (buffer_size < inputs->password_len) { in psa_crypto_driver_pake_get_password() 8606 memcpy(buffer, inputs->password, inputs->password_len); in psa_crypto_driver_pake_get_password() 8607 *buffer_length = inputs->password_len; in psa_crypto_driver_pake_get_password() 8773 operation->data.inputs.password_len = slot->key.bytes; in psa_pake_set_password_key() 8939 if (inputs.password_len == 0) { in psa_pake_complete_inputs() 8955 mbedtls_zeroize_and_free(inputs.password, inputs.password_len); in psa_pake_complete_inputs() [all …]
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_pkcs.h | 80 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, 88 unsigned long password_len, 94 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
|
| H A D | tomcrypt_private.h | 64 typedef int (*fn_kdf_t)(const unsigned char *password, unsigned long password_len,
|
| /optee_os/core/include/tee/ |
| H A D | tee_cryp_pbkdf2.h | 12 size_t password_len, const uint8_t *salt,
|
| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_builtin_composites.h | 195 size_t MBEDTLS_PRIVATE(password_len);
|
| H A D | crypto_extra.h | 1067 size_t MBEDTLS_PRIVATE(password_len); 1314 size_t *password_len);
|