/third_party/mbedtls/library/ |
H A D | pkcs12.c | 77 const unsigned char *pwd, size_t pwdlen, in pkcs12_pbe_derive_key_iv() 86 if (pwdlen > PKCS12_MAX_PWDLEN) { in pkcs12_pbe_derive_key_iv() 98 for (i = 0; i < pwdlen; i++) { in pkcs12_pbe_derive_key_iv() 102 if ((ret = mbedtls_pkcs12_derivation(key, keylen, unipwd, pwdlen * 2 + 2, in pkcs12_pbe_derive_key_iv() 112 if ((ret = mbedtls_pkcs12_derivation(iv, ivlen, unipwd, pwdlen * 2 + 2, in pkcs12_pbe_derive_key_iv() 125 const unsigned char *pwd, size_t pwdlen, 134 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs12_pbe() 145 pwd, pwdlen, data, len, output, SIZE_MAX, in mbedtls_pkcs12_pbe() 152 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs12_pbe_ext() 166 if (pwd == NULL && pwdlen ! in mbedtls_pkcs12_pbe_ext() 76 pkcs12_pbe_derive_key_iv(mbedtls_asn1_buf *pbe_params, mbedtls_md_type_t md_type, const unsigned char *pwd, size_t pwdlen, unsigned char *key, size_t keylen, unsigned char *iv, size_t ivlen) pkcs12_pbe_derive_key_iv() argument 132 mbedtls_pkcs12_pbe(mbedtls_asn1_buf *pbe_params, int mode, mbedtls_cipher_type_t cipher_type, mbedtls_md_type_t md_type, const unsigned char *pwd, size_t pwdlen, const unsigned char *data, size_t len, unsigned char *output) mbedtls_pkcs12_pbe() argument 150 mbedtls_pkcs12_pbe_ext(mbedtls_asn1_buf *pbe_params, int mode, mbedtls_cipher_type_t cipher_type, mbedtls_md_type_t md_type, const unsigned char *pwd, size_t pwdlen, const unsigned char *data, size_t len, unsigned char *output, size_t output_size, size_t *output_len) mbedtls_pkcs12_pbe_ext() argument 326 mbedtls_pkcs12_derivation(unsigned char *data, size_t datalen, const unsigned char *pwd, size_t pwdlen, const unsigned char *salt, size_t saltlen, mbedtls_md_type_t md_type, int id, int iterations) mbedtls_pkcs12_derivation() argument [all...] |
H A D | pem.c | 77 const unsigned char *pwd, size_t pwdlen) in pem_pbkdf1() 99 if ((ret = mbedtls_md_update(&md5_ctx, pwd, pwdlen)) != 0) { in pem_pbkdf1() 125 if ((ret = mbedtls_md_update(&md5_ctx, pwd, pwdlen)) != 0) { in pem_pbkdf1() 155 const unsigned char *pwd, size_t pwdlen) in pem_des_decrypt() 163 if ((ret = pem_pbkdf1(des_key, 8, des_iv, pwd, pwdlen)) != 0) { in pem_des_decrypt() 185 const unsigned char *pwd, size_t pwdlen) in pem_des3_decrypt() 193 if ((ret = pem_pbkdf1(des3_key, 24, des3_iv, pwd, pwdlen)) != 0) { in pem_des3_decrypt() 217 const unsigned char *pwd, size_t pwdlen) in pem_aes_decrypt() 225 if ((ret = pem_pbkdf1(aes_key, keylen, aes_iv, pwd, pwdlen)) != 0) { in pem_aes_decrypt() 270 size_t pwdlen, size_ in mbedtls_pem_read_buffer() 75 pem_pbkdf1(unsigned char *key, size_t keylen, unsigned char *iv, const unsigned char *pwd, size_t pwdlen) pem_pbkdf1() argument 153 pem_des_decrypt(unsigned char des_iv[8], unsigned char *buf, size_t buflen, const unsigned char *pwd, size_t pwdlen) pem_des_decrypt() argument 183 pem_des3_decrypt(unsigned char des3_iv[8], unsigned char *buf, size_t buflen, const unsigned char *pwd, size_t pwdlen) pem_des3_decrypt() argument 215 pem_aes_decrypt(unsigned char aes_iv[16], unsigned int keylen, unsigned char *buf, size_t buflen, const unsigned char *pwd, size_t pwdlen) pem_aes_decrypt() argument 268 mbedtls_pem_read_buffer(mbedtls_pem_context *ctx, const char *header, const char *footer, const unsigned char *data, const unsigned char *pwd, size_t pwdlen, size_t *use_len) mbedtls_pem_read_buffer() argument [all...] |
H A D | pkparse.c | 868 const unsigned char *pwd, size_t pwdlen, in mbedtls_pk_parse_key_pkcs8_encrypted_der() 885 if (pwdlen == 0) { in mbedtls_pk_parse_key_pkcs8_encrypted_der() 928 pwd, pwdlen, p, len, buf, len, &outlen)) != 0) { in mbedtls_pk_parse_key_pkcs8_encrypted_der() 941 if ((ret = mbedtls_pkcs5_pbes2_ext(&pbe_params, MBEDTLS_PKCS5_DECRYPT, pwd, pwdlen, in mbedtls_pk_parse_key_pkcs8_encrypted_der() 975 const unsigned char *pwd, size_t pwdlen, in mbedtls_pk_parse_key() 999 key, pwd, pwdlen, &len); in mbedtls_pk_parse_key() 1029 key, pwd, pwdlen, &len); in mbedtls_pk_parse_key() 1084 pwd, pwdlen, f_rng, p_rng)) != 0) { in mbedtls_pk_parse_key() 1096 ((void) pwdlen); in mbedtls_pk_parse_key() 1107 if (pwdlen ! in mbedtls_pk_parse_key() 865 mbedtls_pk_parse_key_pkcs8_encrypted_der( mbedtls_pk_context *pk, unsigned char *key, size_t keylen, const unsigned char *pwd, size_t pwdlen, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) mbedtls_pk_parse_key_pkcs8_encrypted_der() argument 973 mbedtls_pk_parse_key(mbedtls_pk_context *pk, const unsigned char *key, size_t keylen, const unsigned char *pwd, size_t pwdlen, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) mbedtls_pk_parse_key() argument [all...] |
H A D | pkcs5.c | 106 const unsigned char *pwd, size_t pwdlen, 114 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs5_pbes2() 124 return mbedtls_pkcs5_pbes2_ext(pbe_params, mode, pwd, pwdlen, data, in mbedtls_pkcs5_pbes2() 130 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs5_pbes2_ext() 219 if ((ret = mbedtls_pkcs5_pbkdf2_hmac_ext(md_type, pwd, pwdlen, salt.p, in mbedtls_pkcs5_pbes2_ext() 113 mbedtls_pkcs5_pbes2(const mbedtls_asn1_buf *pbe_params, int mode, const unsigned char *pwd, size_t pwdlen, const unsigned char *data, size_t datalen, unsigned char *output) mbedtls_pkcs5_pbes2() argument 129 mbedtls_pkcs5_pbes2_ext(const mbedtls_asn1_buf *pbe_params, int mode, const unsigned char *pwd, size_t pwdlen, const unsigned char *data, size_t datalen, unsigned char *output, size_t output_size, size_t *output_len) mbedtls_pkcs5_pbes2_ext() argument
|
H A D | pk_internal.h | 199 const unsigned char *pwd, size_t pwdlen,
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/mbedtls/include/mbedtls/ |
H A D | pkcs12.h | 64 * \param pwdlen length of the password (may be 0) 72 const unsigned char *pwd, size_t pwdlen, 85 * \param pwdlen length of the password (may be 0) 94 const unsigned char *pwd, size_t pwdlen, 111 * \param pwdlen length of the password (may be 0) 122 const unsigned char *pwd, size_t pwdlen,
|
H A D | pem.h | 84 * \param pwdlen length of password 100 size_t pwdlen, size_t *use_len );
|
H A D | pkcs5.h | 61 * \param pwdlen length of password 69 const unsigned char *pwd, size_t pwdlen,
|
H A D | pk.h | 561 * Pass a string of \p pwdlen bytes if expecting an encrypted 564 * \param pwdlen Size of the password in bytes. 577 const unsigned char *pwd, size_t pwdlen );
|
/third_party/mbedtls/include/mbedtls/ |
H A D | pkcs12.h | 65 * \p pwdlen is 0. No null terminator should be used. 66 * \param pwdlen length of the password (may be 0) 75 const unsigned char *pwd, size_t pwdlen, 96 * \param pwdlen length of the password (may be 0). 109 const unsigned char *pwd, size_t pwdlen,
|
H A D | pkcs5.h | 69 * \param pwdlen length of password 85 const unsigned char *pwd, size_t pwdlen, 107 * \param pwdlen length of password 126 const unsigned char *pwd, size_t pwdlen,
|
H A D | pem.h | 87 * \param pwdlen length of password 107 size_t pwdlen, size_t *use_len);
|
H A D | pk.h | 1085 * Pass a string of \p pwdlen bytes if expecting an encrypted 1088 * \param pwdlen Size of the password in bytes. 1103 const unsigned char *pwd, size_t pwdlen,
|