Searched refs:pw (Results 1 – 5 of 5) sorted by relevance
| /optee_os/core/lib/libtomcrypt/src/misc/pbes/ |
| H A D | pbes1.c | 24 unsigned char* pw; in s_pkcs_12_wrap() local 26 pw = XMALLOC(pwlen + 2); in s_pkcs_12_wrap() 27 if (pw == NULL) return CRYPT_MEM; in s_pkcs_12_wrap() 28 if ((err = pkcs12_utf8_to_utf16(password, password_len, pw, &pwlen)) != CRYPT_OK) goto LBL_ERROR; in s_pkcs_12_wrap() 29 pw[pwlen++] = 0; in s_pkcs_12_wrap() 30 pw[pwlen++] = 0; in s_pkcs_12_wrap() 32 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 1, out, 24)) != CRYPT_… in s_pkcs_12_wrap() 34 …if ((err = pkcs12_kdf(hash_idx, pw, pwlen, salt, salt_len, iteration_count, 2, out+24, 8)) != CRYP… in s_pkcs_12_wrap() 38 zeromem(pw, pwlen); in s_pkcs_12_wrap() 39 XFREE(pw); in s_pkcs_12_wrap()
|
| /optee_os/core/lib/libtomcrypt/src/misc/pkcs12/ |
| H A D | pkcs12_kdf.c | 9 const unsigned char *pw, unsigned long pwlen, in pkcs12_kdf() argument 27 LTC_ARGCHK(pw != NULL); in pkcs12_kdf() 38 for (i = 0; i < Plen; i++) I[Slen + i] = pw[i % pwlen]; /* I = Salt || Pass */ in pkcs12_kdf()
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_private.h | 489 const unsigned char *pw, unsigned long pwlen,
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ssl_tls.c | 2021 const unsigned char *pw, in mbedtls_ssl_set_hs_ecjpake_password() argument 2032 if ((pw == NULL) || (pw_len == 0)) { in mbedtls_ssl_set_hs_ecjpake_password() 2040 status = psa_import_key(&attributes, pw, pw_len, in mbedtls_ssl_set_hs_ecjpake_password() 2080 const unsigned char *pw, in mbedtls_ssl_set_hs_ecjpake_password() argument 2090 if ((pw == NULL) || (pw_len == 0)) { in mbedtls_ssl_set_hs_ecjpake_password() 2104 pw, pw_len); in mbedtls_ssl_set_hs_ecjpake_password()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | ssl.h | 4247 const unsigned char *pw,
|