Home
last modified time | relevance | path

Searched refs:password (Results 1 – 24 of 24) sorted by relevance

/optee_os/core/lib/libtomcrypt/src/misc/pkcs5/
A Dpkcs_5_1.c39 static int _pkcs_5_alg1_common(const unsigned char *password, in _pkcs_5_alg1_common() argument
55 LTC_ARGCHK(password != NULL); in _pkcs_5_alg1_common()
90 if ((err = hash_descriptor[hash_idx]->process(md, password, password_len)) != CRYPT_OK) { in _pkcs_5_alg1_common()
155 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, in pkcs_5_alg1() argument
160 return _pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1()
178 int pkcs_5_alg1_openssl(const unsigned char *password, in pkcs_5_alg1_openssl() argument
184 return _pkcs_5_alg1_common(password, password_len, salt, iteration_count, in pkcs_5_alg1_openssl()
A Dpkcs_5_2.c30 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, in pkcs_5_alg2() argument
41 LTC_ARGCHK(password != NULL); in pkcs_5_alg2()
77 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { in pkcs_5_alg2()
94 … if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) { in pkcs_5_alg2()
/optee_os/core/tee/
A Dtee_cryp_pbkdf2.c20 const uint8_t *password; member
37 res = crypto_mac_init(h->ctx, p->password, p->password_len); in pbkdf2_f()
71 TEE_Result tee_cryp_pbkdf2(uint32_t hash_id, const uint8_t *password, in tee_cryp_pbkdf2() argument
92 pbkdf2_parms.password = password; in tee_cryp_pbkdf2()
A Dtee_svc_cryp.c3130 const uint8_t *password = (const uint8_t *)(ss + 1); in syscall_cryp_derive_key() local
3143 res = tee_cryp_pbkdf2(hash_id, password, ss->key_size, salt, in syscall_cryp_derive_key()
/optee_os/core/lib/libtomcrypt/src/misc/pbes/
A Dpbes1.c14 static int _pkcs_5_alg1_wrap(const unsigned char *password, unsigned long password_len, in _pkcs_5_alg1_wrap() argument
20 return pkcs_5_alg1(password, password_len, salt, iteration_count, hash_idx, out, outlen); in _pkcs_5_alg1_wrap()
23 static int _pkcs_12_wrap(const unsigned char *password, unsigned long password_len, in _pkcs_12_wrap() argument
35 if ((err = pkcs12_utf8_to_utf16(password, password_len, pw, &pwlen)) != CRYPT_OK) goto LBL_ERROR; in _pkcs_12_wrap()
/optee_os/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_pkcs.h85 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len,
92 int pkcs_5_alg1_openssl(const unsigned char *password,
99 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
A Dtomcrypt_private.h42 typedef int (*fn_kdf_t)(const unsigned char *password, unsigned long password_len,
/optee_os/core/include/tee/
A Dtee_cryp_pbkdf2.h11 TEE_Result tee_cryp_pbkdf2(uint32_t hash_id, const uint8_t *password,
/optee_os/out/arm/export-ta_arm32/host_include/mbedtls/
A Dpkcs5.h87 int mbedtls_pkcs5_pbkdf2_hmac( mbedtls_md_context_t *ctx, const unsigned char *password,
A Dpk.h726 const char *path, const char *password );
/optee_os/out/arm/export-ta_arm32/include/mbedtls/
A Dpkcs5.h87 int mbedtls_pkcs5_pbkdf2_hmac( mbedtls_md_context_t *ctx, const unsigned char *password,
A Dpk.h726 const char *path, const char *password );
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
A Dpkcs5.h87 int mbedtls_pkcs5_pbkdf2_hmac( mbedtls_md_context_t *ctx, const unsigned char *password,
A Dpk.h726 const char *path, const char *password );
/optee_os/out/arm/export-ta_arm64/include/mbedtls/
A Dpkcs5.h87 int mbedtls_pkcs5_pbkdf2_hmac( mbedtls_md_context_t *ctx, const unsigned char *password,
A Dpk.h726 const char *path, const char *password );
/optee_os/out/arm/export-ta_arm64/host_include/mbedtls/
A Dpkcs5.h87 int mbedtls_pkcs5_pbkdf2_hmac( mbedtls_md_context_t *ctx, const unsigned char *password,
A Dpk.h726 const char *path, const char *password );
/optee_os/lib/libmbedtls/mbedtls/library/
A Dpkcs5.c219 const unsigned char *password, in mbedtls_pkcs5_pbkdf2_hmac() argument
242 if( ( ret = mbedtls_md_hmac_starts( ctx, password, plen ) ) != 0 ) in mbedtls_pkcs5_pbkdf2_hmac()
/optee_os/scripts/
A Dpem_to_pub_c.py34 key = serialization.load_pem_private_key(data, password=None,
A Dsign_encrypt.py197 password=None,
/optee_os/out/arm/export-ta_arm32/scripts/
A Dsign_encrypt.py197 password=None,
/optee_os/out/arm/export-ta_arm64/scripts/
A Dsign_encrypt.py197 password=None,
/optee_os/lib/libmbedtls/mbedtls/
A DChangeLog586 example applications which allows to provide a password for the key file
588 these applications with password-protected key files. Analogously but for
590 set a password for the key file provided through the existing key_file2
2533 mbedtls_pk_parse_key(file)() when the password is > 129 bytes.
2868 * Fix bug in ssl_mail_client when password is longer that username (found

Completed in 35 milliseconds