Home
last modified time | relevance | path

Searched refs:passlen (Results 1 – 25 of 29) sorted by relevance

12

/dflybsd-src/crypto/libressl/include/openssl/
H A Dpkcs12.h169 const char *pass, int passlen, unsigned char *salt, int saltlen, int iter,
181 int passlen);
183 const char *pass, int passlen);
185 const char *pass, int passlen, unsigned char *salt, int saltlen, int iter,
189 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
192 int passlen);
210 int passlen, const unsigned char *in, int inlen, unsigned char **data,
213 const char *pass, int passlen, const ASN1_OCTET_STRING *oct, int zbuf);
215 const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf);
217 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
[all …]
H A Dcms.h200 ssize_t passlen);
230 ssize_t passlen);
233 int wrap_nid, int pbe_nid, unsigned char *pass, ssize_t passlen,
H A Devp.h306 typedef int (EVP_PBE_KEYGEN)(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
868 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
870 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen,
873 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt,
876 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
882 int EVP_PBE_CipherInit (ASN1_OBJECT *pbe_obj, const char *pass, int passlen,
/dflybsd-src/crypto/libressl/crypto/pkcs12/
H A Dp12_kiss.c68 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen,
72 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts);
74 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen,
175 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, in parse_pk12() argument
191 bags = PKCS12_unpack_p7encdata(p7, pass, passlen); in parse_pk12()
198 if (!parse_bags(bags, pass, passlen, pkey, ocerts)) { in parse_pk12()
210 parse_bags(STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass, int passlen, in parse_bags() argument
216 if (!parse_bag(sk_PKCS12_SAFEBAG_value(bags, i), pass, passlen, in parse_bags()
224 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, in parse_bag() argument
250 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) in parse_bag()
[all …]
H A Dp12_decr.c72 PKCS12_pbe_crypt(const X509_ALGOR *algor, const char *pass, int passlen, in PKCS12_pbe_crypt() argument
82 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen, in PKCS12_pbe_crypt()
126 const char *pass, int passlen, const ASN1_OCTET_STRING *oct, int zbuf) in PKCS12_item_decrypt_d2i() argument
133 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length, in PKCS12_item_decrypt_d2i()
154 const char *pass, int passlen, in PKCS12_item_i2d_encrypt() argument
170 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data, in PKCS12_item_i2d_encrypt()
H A Dp12_add.c135 PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata() argument
166 pbe, &PKCS12_SAFEBAGS_it, pass, passlen, bags, 1))) { in PKCS12_pack_p7encdata()
179 PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen) in STACK_OF()
184 &PKCS12_SAFEBAGS_it, pass, passlen, in STACK_OF()
189 PKCS12_decrypt_skey(const PKCS12_SAFEBAG *bag, const char *pass, int passlen) in PKCS12_decrypt_skey() argument
191 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen); in PKCS12_decrypt_skey()
H A Dp12_key.c74 PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument
85 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_asc()
98 PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni() argument
127 if (passlen) in PKCS12_key_gen_uni()
128 Plen = v * ((passlen + v - 1) / v); in PKCS12_key_gen_uni()
142 *p++ = pass[i % passlen]; in PKCS12_key_gen_uni()
H A Dp12_mutl.c111 PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument
146 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, in PKCS12_gen_mac()
173 PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument
182 if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) { in PKCS12_verify_mac()
195 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, in PKCS12_set_mac() argument
208 if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) { in PKCS12_set_mac()
H A Dp12_crpt.c73 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen() argument
104 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen()
110 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen()
H A Dp12_p8d.c66 PKCS8_decrypt(const X509_SIG *p8, const char *pass, int passlen) in PKCS8_decrypt() argument
69 &PKCS8_PRIV_KEY_INFO_it, pass, passlen, p8->digest, 1); in PKCS8_decrypt()
H A Dp12_p8e.c68 int passlen, unsigned char *salt, int saltlen, int iter, in PKCS8_encrypt() argument
91 &PKCS8_PRIV_KEY_INFO_it, pass, passlen, p8inf, 1); in PKCS8_encrypt()
H A Dp12_sbag.c205 PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid, const char *pass, int passlen, in PKCS12_SAFEBAG_create_pkcs8_encrypt() argument
215 if ((p8 = PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, in PKCS12_SAFEBAG_create_pkcs8_encrypt()
/dflybsd-src/crypto/libressl/crypto/evp/
H A Dp5_crpt2.c82 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, in PKCS5_PBKDF2_HMAC() argument
98 passlen = 0; in PKCS5_PBKDF2_HMAC()
99 else if (passlen == -1) in PKCS5_PBKDF2_HMAC()
100 passlen = strlen(pass); in PKCS5_PBKDF2_HMAC()
101 if (!HMAC_Init_ex(&hctx_tpl, pass, passlen, digest, NULL)) { in PKCS5_PBKDF2_HMAC()
154 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, in PKCS5_PBKDF2_HMAC_SHA1() argument
157 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1()
167 PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS5_v2_PBE_keyivgen() argument
214 rv = PKCS5_v2_PBKDF2_keyivgen(ctx, pass, passlen, in PKCS5_v2_PBE_keyivgen()
223 PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS5_v2_PBKDF2_keyivgen() argument
[all …]
H A Dp5_crpt.c78 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen() argument
120 passlen = 0; in PKCS5_PBE_keyivgen()
121 else if (passlen == -1) in PKCS5_PBE_keyivgen()
122 passlen = strlen(pass); in PKCS5_PBE_keyivgen()
128 if (!EVP_DigestUpdate(&ctx, pass, passlen)) in PKCS5_PBE_keyivgen()
H A Devp_pbe.c122 EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, in EVP_PBE_CipherInit() argument
143 passlen = 0; in EVP_PBE_CipherInit()
144 else if (passlen == -1) in EVP_PBE_CipherInit()
145 passlen = strlen(pass); in EVP_PBE_CipherInit()
167 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) { in EVP_PBE_CipherInit()
H A Devp_locl.h270 int PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
/dflybsd-src/crypto/libressl/crypto/cms/
H A Dcms_pwri.c70 ssize_t passlen) in CMS_RecipientInfo_set0_password() argument
81 if (pass && passlen < 0) in CMS_RecipientInfo_set0_password()
82 passlen = strlen((char *)pass); in CMS_RecipientInfo_set0_password()
83 pwri->passlen = passlen; in CMS_RecipientInfo_set0_password()
90 int pbe_nid, unsigned char *pass, ssize_t passlen, in CMS_add0_recipient_password() argument
198 CMS_RecipientInfo_set0_password(ri, pass, passlen); in CMS_add0_recipient_password()
388 pwri->passlen, algtmp->parameter, kekctx, en_de) < 0) { in cms_RecipientInfo_pwri_crypt()
H A Dcms_smime.c786 ssize_t passlen) in CMS_decrypt_set1_password() argument
797 CMS_RecipientInfo_set0_password(ri, pass, passlen); in CMS_decrypt_set1_password()
/dflybsd-src/lib/libtcplay/
H A Dhdr.c153 create_hdr(unsigned char *pass, int passlen, struct pbkdf_prf_algo *prf_algo, in create_hdr() argument
209 error = pbkdf2(prf_algo, (char *)pass, passlen, in create_hdr()
217 error = pbkdf2(prf_algo, (char *)pass, passlen, in create_hdr()
306 struct tchdr_enc *copy_reencrypt_hdr(unsigned char *pass, int passlen, in copy_reencrypt_hdr() argument
355 error = pbkdf2(prf_algo, (char *)pass, passlen, in copy_reencrypt_hdr()
363 error = pbkdf2(prf_algo, (char *)pass, passlen, in copy_reencrypt_hdr()
H A Dtcplay.h253 int read_passphrase(const char *prompt, char *pass, size_t passlen,
274 int pbkdf2(struct pbkdf_prf_algo *hash, const char *pass, int passlen,
281 struct tchdr_enc *create_hdr(unsigned char *pass, int passlen,
289 struct tchdr_enc *copy_reencrypt_hdr(unsigned char *pass, int passlen,
311 int process_hdr(const char *dev, int flags, unsigned char *pass, int passlen,
H A Dpbkdf2-openssl.c37 pbkdf2(struct pbkdf_prf_algo *hash, const char *pass, int passlen, in pbkdf2() argument
51 r = PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, in pbkdf2()
H A Dio.c394 read_passphrase(const char *prompt, char *pass, size_t passlen, size_t bufsz, time_t timeout) in read_passphrase() argument
452 "characters, discarding rest.\n", passlen); in read_passphrase()
455 pass[passlen] = '\0'; in read_passphrase()
/dflybsd-src/crypto/libressl/apps/openssl/
H A Dpkcs12.c82 static int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen,
85 char *pass, int passlen, int options, char *pempass);
87 int passlen, int options, char *pempass);
827 dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, in dump_certs_keys_p12() argument
851 bags = PKCS12_unpack_p7encdata(p7, pass, passlen); in dump_certs_keys_p12()
856 if (!dump_certs_pkeys_bags(out, bags, pass, passlen, in dump_certs_keys_p12()
873 char *pass, int passlen, int options, char *pempass) in dump_certs_pkeys_bags() argument
880 pass, passlen, in dump_certs_pkeys_bags()
888 dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bag, char *pass, int passlen, in dump_certs_pkeys_bag() argument
935 if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen)) == NULL) in dump_certs_pkeys_bag()
[all …]
/dflybsd-src/lib/libssh/openbsd-compat/
H A Dbcrypt_pbkdf.c114 bcrypt_pbkdf(const char *pass, size_t passlen, const uint8_t *salt, size_t saltlen, in bcrypt_pbkdf() argument
129 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf()
140 crypto_hash_sha512(sha2pass, pass, passlen); in bcrypt_pbkdf()
/dflybsd-src/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_teap.c1121 u8 userlen, passlen; in eap_teap_process_basic_auth_resp() local
1151 passlen = *pos++; in eap_teap_process_basic_auth_resp()
1152 if (end - pos < passlen) { in eap_teap_process_basic_auth_resp()
1159 pos += passlen; in eap_teap_process_basic_auth_resp()
1162 password, passlen); in eap_teap_process_basic_auth_resp()
1186 if (sm->user->password_len != passlen || in eap_teap_process_basic_auth_resp()
1187 os_memcmp_const(sm->user->password, password, passlen) != 0) { in eap_teap_process_basic_auth_resp()

12