/netbsd-src/crypto/external/bsd/openssl/dist/crypto/pkcs12/ |
H A D | p12_key.c | 19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument 31 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_asc_ex() 41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument 45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc() 49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument 61 } else if (!OPENSSL_utf82uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_utf8_ex() 71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument 75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8() 79 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni_ex() argument 104 pass, passlen); in PKCS12_key_gen_uni_ex() [all …]
|
H A D | p12_decr.c | 20 const char *pass, int passlen, in PKCS12_pbe_crypt_ex() argument 36 if (!EVP_PBE_CipherInit_ex(algor->algorithm, pass, passlen, in PKCS12_pbe_crypt_ex() 87 passlen == 0 ? "empty password" in PKCS12_pbe_crypt_ex() 116 const char *pass, int passlen, in PKCS12_pbe_crypt() argument 120 return PKCS12_pbe_crypt_ex(algor, pass, passlen, in, inlen, data, datalen, in PKCS12_pbe_crypt() 130 const char *pass, int passlen, in PKCS12_item_decrypt_d2i_ex() argument 140 if (!PKCS12_pbe_crypt_ex(algor, pass, passlen, oct->data, oct->length, in PKCS12_item_decrypt_d2i_ex() 159 const char *pass, int passlen, in PKCS12_item_decrypt_d2i() argument 162 return PKCS12_item_decrypt_d2i_ex(algor, it, pass, passlen, oct, zbuf, in PKCS12_item_decrypt_d2i() 173 const char *pass, int passlen, in PKCS12_item_i2d_encrypt_ex() argument [all …]
|
H A D | p12_p8e.c | 17 const char *pass, int passlen, in PKCS8_encrypt_ex() argument 51 p8 = PKCS8_set0_pbe_ex(pass, passlen, p8inf, pbe, libctx, propq); in PKCS8_encrypt_ex() 61 const char *pass, int passlen, in PKCS8_encrypt() argument 65 return PKCS8_encrypt_ex(pbe_nid, cipher, pass, passlen, salt, saltlen, iter, in PKCS8_encrypt() 69 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, in PKCS8_set0_pbe_ex() argument 78 pass, passlen, p8inf, 1, ctx, propq); in PKCS8_set0_pbe_ex() 97 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, in PKCS8_set0_pbe() argument 100 return PKCS8_set0_pbe_ex(pass, passlen, p8inf, pbe, NULL, NULL); in PKCS8_set0_pbe()
|
H A D | p12_mutl.c | 55 static int pkcs12_gen_gost_mac_key(const char *pass, int passlen, in pkcs12_gen_gost_mac_key() argument 66 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key() 76 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in pkcs12_gen_mac() argument 78 int (*pkcs12_key_gen)(const char *pass, int passlen, in pkcs12_gen_mac() 139 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac() 146 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac() 153 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac() 178 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument 181 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL); in PKCS12_gen_mac() 185 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument [all …]
|
H A D | p12_kiss.c | 17 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 21 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts); 23 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, 136 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument 152 bags = PKCS12_unpack_p7encdata(p7, pass, passlen); in parse_pk12() 159 if (!parse_bags(bags, pass, passlen, pkey, ocerts)) { in parse_pk12() 172 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) in parse_bags() argument 177 pass, passlen, pkey, ocerts)) in parse_bags() 184 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, in parse_bag() argument 211 if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen)) == NULL) in parse_bag() [all …]
|
H A D | p12_add.c | 92 PKCS7 *PKCS12_pack_p7encdata_ex(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata_ex() argument 132 passlen, bags, 1, ctx, propq))) { in PKCS12_pack_p7encdata_ex() 146 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata() argument 150 return PKCS12_pack_p7encdata_ex(pbe_nid, pass, passlen, salt, saltlen, in PKCS12_pack_p7encdata() 155 int passlen) in STACK_OF() 167 pass, passlen, in STACK_OF() 173 const char *pass, int passlen, in PKCS12_decrypt_skey_ex() argument 176 return PKCS8_decrypt_ex(bag->value.shkeybag, pass, passlen, ctx, propq); in PKCS12_decrypt_skey_ex() 180 const char *pass, int passlen) in PKCS12_decrypt_skey() argument 182 return PKCS12_decrypt_skey_ex(bag, pass, passlen, NULL, NULL); in PKCS12_decrypt_skey()
|
H A D | p12_p8d.c | 15 int passlen, OSSL_LIB_CTX *ctx, in PKCS8_decrypt_ex() argument 24 passlen, doct, 1, ctx, propq); in PKCS8_decrypt_ex() 28 int passlen) in PKCS8_decrypt() argument 30 return PKCS8_decrypt_ex(p8, pass, passlen, NULL, NULL); in PKCS8_decrypt()
|
H A D | p12_crpt.c | 23 int PKCS12_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen_ex() argument 51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen_ex() 60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen_ex() 78 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen() argument 82 return PKCS12_PBE_keyivgen_ex(ctx, pass, passlen, param, cipher, md, en_de, in PKCS12_PBE_keyivgen()
|
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | p5_crpt2.c | 22 int ossl_pkcs5_pbkdf2_hmac_ex(const char *pass, int passlen, in ossl_pkcs5_pbkdf2_hmac_ex() argument 37 passlen = 0; in ossl_pkcs5_pbkdf2_hmac_ex() 38 } else if (passlen == -1) { in ossl_pkcs5_pbkdf2_hmac_ex() 39 passlen = strlen(pass); in ossl_pkcs5_pbkdf2_hmac_ex() 52 (char *)pass, (size_t)passlen); in ossl_pkcs5_pbkdf2_hmac_ex() 68 0, passlen, pass, passlen); in ossl_pkcs5_pbkdf2_hmac_ex() 83 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, in PKCS5_PBKDF2_HMAC() argument 87 return ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, digest, in PKCS5_PBKDF2_HMAC() 92 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, in PKCS5_PBKDF2_HMAC_SHA1() argument 100 r = ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1() [all …]
|
H A D | p5_crpt.c | 26 int PKCS5_PBE_keyivgen_ex(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen_ex() argument 76 passlen = 0; in PKCS5_PBE_keyivgen_ex() 77 else if (passlen == -1) in PKCS5_PBE_keyivgen_ex() 78 passlen = strlen(pass); in PKCS5_PBE_keyivgen_ex() 90 (char *)pass, (size_t)passlen); in PKCS5_PBE_keyivgen_ex() 113 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen() argument 117 return PKCS5_PBE_keyivgen_ex(cctx, pass, passlen, param, cipher, md, en_de, in PKCS5_PBE_keyivgen()
|
H A D | pbe_scrypt.c | 37 int EVP_PBE_scrypt_ex(const char *pass, size_t passlen, in EVP_PBE_scrypt_ex() argument 57 passlen = 0; in EVP_PBE_scrypt_ex() 75 passlen); in EVP_PBE_scrypt_ex() 90 int EVP_PBE_scrypt(const char *pass, size_t passlen, in EVP_PBE_scrypt() argument 95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem, in EVP_PBE_scrypt()
|
H A D | evp_pbe.c | 89 int EVP_PBE_CipherInit_ex(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, in EVP_PBE_CipherInit_ex() argument 115 passlen = 0; in EVP_PBE_CipherInit_ex() 116 else if (passlen == -1) in EVP_PBE_CipherInit_ex() 117 passlen = strlen(pass); in EVP_PBE_CipherInit_ex() 151 ret = keygen_ex(ctx, pass, passlen, param, cipher, md, en_de, libctx, propq); in EVP_PBE_CipherInit_ex() 153 ret = keygen(ctx, pass, passlen, param, cipher, md, en_de); in EVP_PBE_CipherInit_ex() 162 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, in EVP_PBE_CipherInit() argument 165 return EVP_PBE_CipherInit_ex(pbe_obj, pass, passlen, param, ctx, en_de, NULL, NULL); in EVP_PBE_CipherInit()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/include/openssl/ |
H A D | pkcs12.h | 104 int passlen, 112 int passlen); 114 const char *pass, int passlen); 116 const char *pass, int passlen, unsigned char *salt, 118 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, 122 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 126 int passlen); 148 const char *pass, int passlen, 153 const char *pass, int passlen, 157 const char *pass, int passlen, [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/include/openssl/ |
H A D | pkcs12.h.in | 124 int passlen, 130 int passlen, 140 int passlen); 142 int passlen, OSSL_LIB_CTX *ctx, 145 const char *pass, int passlen); 147 const char *pass, int passlen, 151 const char *pass, int passlen, unsigned char *salt, 154 const char *pass, int passlen, unsigned char *salt, 157 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, 159 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, [all …]
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/ |
H A D | p12_kiss.c | 16 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 20 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts); 22 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, 131 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument 147 bags = PKCS12_unpack_p7encdata(p7, pass, passlen); in parse_pk12() 154 if (!parse_bags(bags, pass, passlen, pkey, ocerts)) { in parse_pk12() 166 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) in parse_bags() argument 171 pass, passlen, pkey, ocerts)) in parse_bags() 177 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, in parse_bag() argument 204 if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen)) == NULL) in parse_bag() [all …]
|
H A D | p12_mutl.c | 49 static int pkcs12_gen_gost_mac_key(const char *pass, int passlen, in pkcs12_gen_gost_mac_key() argument 60 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key() 70 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in pkcs12_gen_mac() argument 72 int (*pkcs12_key_gen)(const char *pass, int passlen, in pkcs12_gen_mac() 117 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac() 123 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac() 143 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument 146 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL); in PKCS12_gen_mac() 150 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument 160 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, in PKCS12_verify_mac() [all …]
|
H A D | p12_key.c | 30 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument 41 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_asc() 53 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument 64 } else if (!OPENSSL_utf82uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_utf8() 76 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni() argument 97 fprintf(stderr, "Password (length %d):\n", passlen); in PKCS12_key_gen_uni() 98 h__dump(pass, passlen); in PKCS12_key_gen_uni() 110 if (passlen) in PKCS12_key_gen_uni() 111 Plen = v * ((passlen + v - 1) / v); in PKCS12_key_gen_uni() 124 *p++ = pass[i % passlen]; in PKCS12_key_gen_uni()
|
H A D | p12_decr.c | 24 const char *pass, int passlen, in PKCS12_pbe_crypt() argument 38 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen, in PKCS12_pbe_crypt() 83 const char *pass, int passlen, in PKCS12_item_decrypt_d2i() argument 91 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length, in PKCS12_item_decrypt_d2i() 126 const char *pass, int passlen, in PKCS12_item_i2d_encrypt() argument 142 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data, in PKCS12_item_i2d_encrypt()
|
H A D | p12_add.c | 84 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata() argument 118 passlen, bags, 1))) { in PKCS12_pack_p7encdata() 131 int passlen) in STACK_OF() 137 pass, passlen, in STACK_OF() 142 const char *pass, int passlen) in PKCS12_decrypt_skey() argument 144 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen); in PKCS12_decrypt_skey()
|
H A D | p12_p8e.c | 16 const char *pass, int passlen, in PKCS8_encrypt() argument 35 p8 = PKCS8_set0_pbe(pass, passlen, p8inf, pbe); in PKCS8_encrypt() 44 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, in PKCS8_set0_pbe() argument 52 pass, passlen, p8inf, 1); in PKCS8_set0_pbe()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
H A D | p5_crpt2.c | 31 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, in PKCS5_PBKDF2_HMAC() argument 52 passlen = 0; in PKCS5_PBKDF2_HMAC() 53 } else if (passlen == -1) { in PKCS5_PBKDF2_HMAC() 54 passlen = strlen(pass); in PKCS5_PBKDF2_HMAC() 56 if (!HMAC_Init_ex(hctx_tpl, pass, passlen, digest, NULL)) { in PKCS5_PBKDF2_HMAC() 114 h__dump(pass, passlen); in PKCS5_PBKDF2_HMAC() 124 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, in PKCS5_PBKDF2_HMAC_SHA1() argument 128 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), in PKCS5_PBKDF2_HMAC_SHA1() 138 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS5_v2_PBE_keyivgen() argument 180 rv = kdf(ctx, pass, passlen, pbe2->keyfunc->parameter, NULL, NULL, en_de); in PKCS5_v2_PBE_keyivgen() [all …]
|
H A D | p5_crpt.c | 24 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen() argument 72 passlen = 0; in PKCS5_PBE_keyivgen() 73 else if (passlen == -1) in PKCS5_PBE_keyivgen() 74 passlen = strlen(pass); in PKCS5_PBE_keyivgen() 84 if (!EVP_DigestUpdate(ctx, pass, passlen)) in PKCS5_PBE_keyivgen()
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | PKCS8_encrypt.pod | 13 int passlen); 15 int passlen, OSSL_LIB_CTX *ctx, 18 const char *pass, int passlen, unsigned char *salt, 21 const char *pass, int passlen, unsigned char *salt, 24 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, 26 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, 33 the password I<pass> of length I<passlen>, salt I<salt> of length I<saltlen> 39 I<p8> using the password I<pass> of length I<passlen> along with algorithm 43 using the password I<pass> of length I<passlen> and parameters I<pbe>.
|
H A D | PKCS12_item_decrypt_d2i.pod | 14 const char *pass, int passlen, 17 const char *pass, int passlen, 23 const char *pass, int passlen, 27 const char *pass, int passlen, 36 password I<pass> of length I<passlen>. If I<zbuf> is nonzero then the output 41 I<passlen>, returning an encoded object in I<obj>. If I<zbuf> is nonzero then
|
H A D | PKCS12_PBE_keyivgen.pod | 12 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 15 int PKCS12_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 20 const char *pass, int passlen, 25 const char *pass, int passlen, 34 length I<passlen>, parameters I<param> and a message digest function I<md_type> 44 based on the algorithm in I<algor> and password I<pass> of length I<passlen>. 53 I<pass> is the password used in the derivation of length I<passlen>. I<pass> 54 is an optional parameter and can be NULL. If I<passlen> is -1, then the
|