Lines Matching refs:pbkdf2

5594         if (operation->ctx.pbkdf2.salt != NULL) {
5595 mbedtls_zeroize_and_free(operation->ctx.pbkdf2.salt,
5596 operation->ctx.pbkdf2.salt_length);
5930 psa_pbkdf2_key_derivation_t *pbkdf2, argument
5939 uint8_t *U_accumulator = pbkdf2->output_block;
5945 MBEDTLS_PUT_UINT32_BE(pbkdf2->block_number, block_counter, 0);
5949 pbkdf2->password,
5950 pbkdf2->password_length,
5955 status = psa_mac_update(&mac_operation, pbkdf2->salt, pbkdf2->salt_length);
5976 for (i = 1; i < pbkdf2->input_cost; i++) {
5981 pbkdf2->password,
5982 pbkdf2->password_length,
6000 psa_pbkdf2_key_derivation_t *pbkdf2, argument
6009 psa_set_key_bits(&attributes, PSA_BYTES_TO_BITS(pbkdf2->password_length));
6024 switch (pbkdf2->state) {
6027 pbkdf2->bytes_used = prf_output_length;
6028 pbkdf2->state = PSA_PBKDF2_STATE_OUTPUT;
6037 uint8_t n = prf_output_length - pbkdf2->bytes_used;
6041 memcpy(output, pbkdf2->output_block + pbkdf2->bytes_used, n);
6044 pbkdf2->bytes_used += n;
6051 pbkdf2->bytes_used = 0;
6052 pbkdf2->block_number++;
6054 status = psa_key_derivation_pbkdf2_generate_block(pbkdf2, prf_alg,
6126 status = psa_key_derivation_pbkdf2_read(&operation->ctx.pbkdf2, kdf_alg,
7161 psa_pbkdf2_key_derivation_t *pbkdf2, argument
7169 if (pbkdf2->state != PSA_PBKDF2_STATE_INIT) {
7181 pbkdf2->input_cost = data;
7182 pbkdf2->state = PSA_PBKDF2_STATE_INPUT_COST_SET;
7187 static psa_status_t psa_pbkdf2_set_salt(psa_pbkdf2_key_derivation_t *pbkdf2, argument
7191 if (pbkdf2->state == PSA_PBKDF2_STATE_INPUT_COST_SET) {
7192 pbkdf2->state = PSA_PBKDF2_STATE_SALT_SET;
7193 } else if (pbkdf2->state == PSA_PBKDF2_STATE_SALT_SET) {
7204 next_salt = mbedtls_calloc(1, data_length + pbkdf2->salt_length);
7209 if (pbkdf2->salt_length != 0) {
7210 memcpy(next_salt, pbkdf2->salt, pbkdf2->salt_length);
7212 memcpy(next_salt + pbkdf2->salt_length, data, data_length);
7213 pbkdf2->salt_length += data_length;
7214 mbedtls_free(pbkdf2->salt);
7215 pbkdf2->salt = next_salt;
7271 static psa_status_t psa_pbkdf2_set_password(psa_pbkdf2_key_derivation_t *pbkdf2, argument
7277 if (pbkdf2->state != PSA_PBKDF2_STATE_SALT_SET) {
7285 pbkdf2->password,
7286 &pbkdf2->password_length);
7292 pbkdf2->password,
7293 &pbkdf2->password_length);
7300 pbkdf2->state = PSA_PBKDF2_STATE_PASSWORD_SET;
7305 static psa_status_t psa_pbkdf2_input(psa_pbkdf2_key_derivation_t *pbkdf2, argument
7313 return psa_pbkdf2_set_salt(pbkdf2, data, data_length);
7315 return psa_pbkdf2_set_password(pbkdf2, kdf_alg, data, data_length);
7419 status = psa_pbkdf2_input(&operation->ctx.pbkdf2, kdf_alg,
7449 &operation->ctx.pbkdf2, step, value);