| /dflybsd-src/crypto/libressl/include/openssl/ |
| H A D | pkcs12.h | 169 const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, 181 int passlen); 183 const char *pass, int passlen); 185 const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, 189 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 192 int passlen); 210 int passlen, const unsigned char *in, int inlen, unsigned char **data, 213 const char *pass, int passlen, const ASN1_OCTET_STRING *oct, int zbuf); 215 const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf); 217 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, [all …]
|
| H A D | cms.h | 200 ssize_t passlen); 230 ssize_t passlen); 233 int wrap_nid, int pbe_nid, unsigned char *pass, ssize_t passlen,
|
| H A D | evp.h | 306 typedef int (EVP_PBE_KEYGEN)(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 868 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 870 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, 873 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, 876 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 882 int EVP_PBE_CipherInit (ASN1_OBJECT *pbe_obj, const char *pass, int passlen,
|
| /dflybsd-src/crypto/libressl/crypto/pkcs12/ |
| H A D | p12_kiss.c | 68 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, 72 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts); 74 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen, 175 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, in parse_pk12() argument 191 bags = PKCS12_unpack_p7encdata(p7, pass, passlen); in parse_pk12() 198 if (!parse_bags(bags, pass, passlen, pkey, ocerts)) { in parse_pk12() 210 parse_bags(STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass, int passlen, in parse_bags() argument 216 if (!parse_bag(sk_PKCS12_SAFEBAG_value(bags, i), pass, passlen, in parse_bags() 224 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, in parse_bag() argument 250 if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) in parse_bag() [all …]
|
| H A D | p12_decr.c | 72 PKCS12_pbe_crypt(const X509_ALGOR *algor, const char *pass, int passlen, in PKCS12_pbe_crypt() argument 82 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen, in PKCS12_pbe_crypt() 126 const char *pass, int passlen, const ASN1_OCTET_STRING *oct, int zbuf) in PKCS12_item_decrypt_d2i() argument 133 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length, in PKCS12_item_decrypt_d2i() 154 const char *pass, int passlen, in PKCS12_item_i2d_encrypt() argument 170 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data, in PKCS12_item_i2d_encrypt()
|
| H A D | p12_add.c | 135 PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata() argument 166 pbe, &PKCS12_SAFEBAGS_it, pass, passlen, bags, 1))) { in PKCS12_pack_p7encdata() 179 PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen) in STACK_OF() 184 &PKCS12_SAFEBAGS_it, pass, passlen, in STACK_OF() 189 PKCS12_decrypt_skey(const PKCS12_SAFEBAG *bag, const char *pass, int passlen) in PKCS12_decrypt_skey() argument 191 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen); in PKCS12_decrypt_skey()
|
| H A D | p12_key.c | 74 PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument 85 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_asc() 98 PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni() argument 127 if (passlen) in PKCS12_key_gen_uni() 128 Plen = v * ((passlen + v - 1) / v); in PKCS12_key_gen_uni() 142 *p++ = pass[i % passlen]; in PKCS12_key_gen_uni()
|
| H A D | p12_mutl.c | 111 PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument 146 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, in PKCS12_gen_mac() 173 PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument 182 if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) { in PKCS12_verify_mac() 195 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, in PKCS12_set_mac() argument 208 if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) { in PKCS12_set_mac()
|
| H A D | p12_crpt.c | 73 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen() argument 104 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen() 110 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen()
|
| H A D | p12_p8d.c | 66 PKCS8_decrypt(const X509_SIG *p8, const char *pass, int passlen) in PKCS8_decrypt() argument 69 &PKCS8_PRIV_KEY_INFO_it, pass, passlen, p8->digest, 1); in PKCS8_decrypt()
|
| H A D | p12_p8e.c | 68 int passlen, unsigned char *salt, int saltlen, int iter, in PKCS8_encrypt() argument 91 &PKCS8_PRIV_KEY_INFO_it, pass, passlen, p8inf, 1); in PKCS8_encrypt()
|
| H A D | p12_sbag.c | 205 PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid, const char *pass, int passlen, in PKCS12_SAFEBAG_create_pkcs8_encrypt() argument 215 if ((p8 = PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, in PKCS12_SAFEBAG_create_pkcs8_encrypt()
|
| /dflybsd-src/crypto/libressl/crypto/evp/ |
| H A D | p5_crpt2.c | 82 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, in PKCS5_PBKDF2_HMAC() argument 98 passlen = 0; in PKCS5_PBKDF2_HMAC() 99 else if (passlen == -1) in PKCS5_PBKDF2_HMAC() 100 passlen = strlen(pass); in PKCS5_PBKDF2_HMAC() 101 if (!HMAC_Init_ex(&hctx_tpl, pass, passlen, digest, NULL)) { in PKCS5_PBKDF2_HMAC() 154 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, in PKCS5_PBKDF2_HMAC_SHA1() argument 157 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1() 167 PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS5_v2_PBE_keyivgen() argument 214 rv = PKCS5_v2_PBKDF2_keyivgen(ctx, pass, passlen, in PKCS5_v2_PBE_keyivgen() 223 PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS5_v2_PBKDF2_keyivgen() argument [all …]
|
| H A D | p5_crpt.c | 78 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen() argument 120 passlen = 0; in PKCS5_PBE_keyivgen() 121 else if (passlen == -1) in PKCS5_PBE_keyivgen() 122 passlen = strlen(pass); in PKCS5_PBE_keyivgen() 128 if (!EVP_DigestUpdate(&ctx, pass, passlen)) in PKCS5_PBE_keyivgen()
|
| H A D | evp_pbe.c | 122 EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, in EVP_PBE_CipherInit() argument 143 passlen = 0; in EVP_PBE_CipherInit() 144 else if (passlen == -1) in EVP_PBE_CipherInit() 145 passlen = strlen(pass); in EVP_PBE_CipherInit() 167 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) { in EVP_PBE_CipherInit()
|
| H A D | evp_locl.h | 270 int PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
|
| /dflybsd-src/crypto/libressl/crypto/cms/ |
| H A D | cms_pwri.c | 70 ssize_t passlen) in CMS_RecipientInfo_set0_password() argument 81 if (pass && passlen < 0) in CMS_RecipientInfo_set0_password() 82 passlen = strlen((char *)pass); in CMS_RecipientInfo_set0_password() 83 pwri->passlen = passlen; in CMS_RecipientInfo_set0_password() 90 int pbe_nid, unsigned char *pass, ssize_t passlen, in CMS_add0_recipient_password() argument 198 CMS_RecipientInfo_set0_password(ri, pass, passlen); in CMS_add0_recipient_password() 388 pwri->passlen, algtmp->parameter, kekctx, en_de) < 0) { in cms_RecipientInfo_pwri_crypt()
|
| H A D | cms_smime.c | 786 ssize_t passlen) in CMS_decrypt_set1_password() argument 797 CMS_RecipientInfo_set0_password(ri, pass, passlen); in CMS_decrypt_set1_password()
|
| /dflybsd-src/lib/libtcplay/ |
| H A D | hdr.c | 153 create_hdr(unsigned char *pass, int passlen, struct pbkdf_prf_algo *prf_algo, in create_hdr() argument 209 error = pbkdf2(prf_algo, (char *)pass, passlen, in create_hdr() 217 error = pbkdf2(prf_algo, (char *)pass, passlen, in create_hdr() 306 struct tchdr_enc *copy_reencrypt_hdr(unsigned char *pass, int passlen, in copy_reencrypt_hdr() argument 355 error = pbkdf2(prf_algo, (char *)pass, passlen, in copy_reencrypt_hdr() 363 error = pbkdf2(prf_algo, (char *)pass, passlen, in copy_reencrypt_hdr()
|
| H A D | tcplay.h | 253 int read_passphrase(const char *prompt, char *pass, size_t passlen, 274 int pbkdf2(struct pbkdf_prf_algo *hash, const char *pass, int passlen, 281 struct tchdr_enc *create_hdr(unsigned char *pass, int passlen, 289 struct tchdr_enc *copy_reencrypt_hdr(unsigned char *pass, int passlen, 311 int process_hdr(const char *dev, int flags, unsigned char *pass, int passlen,
|
| H A D | pbkdf2-openssl.c | 37 pbkdf2(struct pbkdf_prf_algo *hash, const char *pass, int passlen, in pbkdf2() argument 51 r = PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, in pbkdf2()
|
| H A D | io.c | 394 read_passphrase(const char *prompt, char *pass, size_t passlen, size_t bufsz, time_t timeout) in read_passphrase() argument 452 "characters, discarding rest.\n", passlen); in read_passphrase() 455 pass[passlen] = '\0'; in read_passphrase()
|
| /dflybsd-src/crypto/libressl/apps/openssl/ |
| H A D | pkcs12.c | 82 static int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, 85 char *pass, int passlen, int options, char *pempass); 87 int passlen, int options, char *pempass); 827 dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, in dump_certs_keys_p12() argument 851 bags = PKCS12_unpack_p7encdata(p7, pass, passlen); in dump_certs_keys_p12() 856 if (!dump_certs_pkeys_bags(out, bags, pass, passlen, in dump_certs_keys_p12() 873 char *pass, int passlen, int options, char *pempass) in dump_certs_pkeys_bags() argument 880 pass, passlen, in dump_certs_pkeys_bags() 888 dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bag, char *pass, int passlen, in dump_certs_pkeys_bag() argument 935 if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen)) == NULL) in dump_certs_pkeys_bag() [all …]
|
| /dflybsd-src/lib/libssh/openbsd-compat/ |
| H A D | bcrypt_pbkdf.c | 114 bcrypt_pbkdf(const char *pass, size_t passlen, const uint8_t *salt, size_t saltlen, in bcrypt_pbkdf() argument 129 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf() 140 crypto_hash_sha512(sha2pass, pass, passlen); in bcrypt_pbkdf()
|
| /dflybsd-src/contrib/wpa_supplicant/src/eap_server/ |
| H A D | eap_server_teap.c | 1121 u8 userlen, passlen; in eap_teap_process_basic_auth_resp() local 1151 passlen = *pos++; in eap_teap_process_basic_auth_resp() 1152 if (end - pos < passlen) { in eap_teap_process_basic_auth_resp() 1159 pos += passlen; in eap_teap_process_basic_auth_resp() 1162 password, passlen); in eap_teap_process_basic_auth_resp() 1186 if (sm->user->password_len != passlen || in eap_teap_process_basic_auth_resp() 1187 os_memcmp_const(sm->user->password, password, passlen) != 0) { in eap_teap_process_basic_auth_resp()
|