Searched refs:passlen (Results 1 - 25 of 30) sorted by relevance

12

/freebsd-12-stable/crypto/openssl/crypto/pkcs12/
H A Dp12_p8d.c15 int passlen)
22 passlen, doct, 1);
14 PKCS8_decrypt(const X509_SIG *p8, const char *pass, int passlen) argument
H A Dp12_crpt.c20 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument
28 int (*pkcs12_key_gen)(const char *pass, int passlen,
53 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_KEY_ID,
59 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_IV_ID,
H A Dp12_p8e.c16 const char *pass, int passlen,
35 p8 = PKCS8_set0_pbe(pass, passlen, p8inf, pbe);
44 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, argument
52 pass, passlen, p8inf, 1);
15 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
H A Dp12_decr.c24 const char *pass, int passlen,
38 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen,
83 const char *pass, int passlen,
91 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length,
126 const char *pass, int passlen,
142 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data,
23 PKCS12_pbe_crypt(const X509_ALGOR *algor, const char *pass, int passlen, const unsigned char *in, int inlen, unsigned char **data, int *datalen, int en_de) argument
82 PKCS12_item_decrypt_d2i(const X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, const ASN1_OCTET_STRING *oct, int zbuf) argument
124 PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf) argument
H A Dp12_mutl.c49 static int pkcs12_gen_gost_mac_key(const char *pass, int passlen, argument
60 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter,
70 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument
72 int (*pkcs12_key_gen)(const char *pass, int passlen,
117 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter,
123 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID,
143 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument
146 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL);
150 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) argument
160 if (!pkcs12_gen_mac(p12, pass, passlen, ma
175 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
[all...]
H A Dp12_kiss.c16 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
20 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts);
22 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen,
131 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, argument
147 bags = PKCS12_unpack_p7encdata(p7, pass, passlen);
154 if (!parse_bags(bags, pass, passlen, pkey, ocerts)) {
166 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts)
171 pass, passlen, pkey, ocerts))
177 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, argument
204 if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen))
[all...]
H A Dp12_key.c30 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, argument
41 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) {
53 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, argument
64 } else if (!OPENSSL_utf82uni(pass, passlen, &unipass, &uniplen)) {
76 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, argument
97 fprintf(stderr, "Password (length %d):\n", passlen);
98 h__dump(pass, passlen);
110 if (passlen)
111 Plen = v * ((passlen + v - 1) / v);
124 *p++ = pass[i % passlen];
[all...]
H A Dp12_add.c84 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, argument
118 passlen, bags, 1))) {
131 int passlen)
137 pass, passlen,
142 const char *pass, int passlen)
144 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen);
141 PKCS12_decrypt_skey(const PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument
H A Dp12_sbag.c139 int passlen,
152 p8 = PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter,
137 PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
/freebsd-12-stable/crypto/openssl/include/openssl/
H A Dpkcs12.h104 int passlen,
112 int passlen);
114 const char *pass, int passlen);
116 const char *pass, int passlen, unsigned char *salt,
118 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen,
122 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
126 int passlen);
148 const char *pass, int passlen,
153 const char *pass, int passlen,
157 const char *pass, int passlen,
[all...]
H A Dkdf.h69 # define EVP_PKEY_CTX_set1_pbe_pass(pctx, pass, passlen) \
71 EVP_PKEY_CTRL_PASS, passlen, (void *)(pass))
H A Dcms.h150 unsigned char *pass, ossl_ssize_t passlen);
190 ossl_ssize_t passlen);
196 ossl_ssize_t passlen,
H A Devp.h404 int passlen, ASN1_TYPE *param,
1084 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
1087 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen,
1090 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen,
1093 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
1098 int EVP_PBE_scrypt(const char *pass, size_t passlen,
1104 int passlen, ASN1_TYPE *param,
1110 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen,
/freebsd-12-stable/crypto/openssl/crypto/evp/
H A Dp5_crpt2.c31 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, argument
52 passlen = 0;
53 } else if (passlen == -1) {
54 passlen = strlen(pass);
56 if (!HMAC_Init_ex(hctx_tpl, pass, passlen, digest, NULL)) {
114 h__dump(pass, passlen);
124 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, argument
128 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(),
138 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument
180 rv = kdf(ctx, pass, passlen, pbe
186 PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, int en_de) argument
[all...]
H A Dp5_crpt.c24 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, argument
72 passlen = 0;
73 else if (passlen == -1)
74 passlen = strlen(pass);
84 if (!EVP_DigestUpdate(ctx, pass, passlen))
H A Devp_local.h45 int passlen, ASN1_TYPE *param,
H A Devp_pbe.c84 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, argument
105 passlen = 0;
106 else if (passlen == -1)
107 passlen = strlen(pass);
129 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) {
H A Dpbe_scrypt.c158 int EVP_PBE_scrypt(const char *pass, size_t passlen, argument
248 if (PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, 1, EVP_sha256(),
255 if (PKCS5_PBKDF2_HMAC(pass, passlen, B, (int)Blen, 1, EVP_sha256(),
/freebsd-12-stable/tests/sys/geom/class/eli/
H A Dgentestvect.py58 for passlen in xrange(8, 80, 8):
60 passwd = randgen(passlen, '\x00')
/freebsd-12-stable/sys/geom/eli/
H A Dpkcs5v2.c59 u_int i, bsize, passlen; local
63 passlen = strlen(passphrase);
74 g_eli_crypto_hmac_init(&startpoint, passphrase, passlen);
/freebsd-12-stable/crypto/openssl/crypto/cms/
H A Dcms_pwri.c22 unsigned char *pass, ossl_ssize_t passlen)
32 if (pass && passlen < 0)
33 passlen = strlen((char *)pass);
34 pwri->passlen = passlen;
42 ossl_ssize_t passlen,
152 CMS_RecipientInfo_set0_password(ri, pass, passlen);
340 (char *)pwri->pass, pwri->passlen,
21 CMS_RecipientInfo_set0_password(CMS_RecipientInfo *ri, unsigned char *pass, ossl_ssize_t passlen) argument
38 CMS_add0_recipient_password(CMS_ContentInfo *cms, int iter, int wrap_nid, int pbe_nid, unsigned char *pass, ossl_ssize_t passlen, const EVP_CIPHER *kekciph) argument
/freebsd-12-stable/crypto/openssh/openbsd-compat/
H A Dbcrypt_pbkdf.c111 bcrypt_pbkdf(const char *pass, size_t passlen, const u_int8_t *salt, size_t saltlen, argument
126 if (passlen == 0 || saltlen == 0 || keylen == 0 ||
137 crypto_hash_sha512(sha2pass, pass, passlen);
/freebsd-12-stable/crypto/heimdal/lib/krb5/
H A Dsalt-des.c87 size_t passlen; local
98 passlen = min(sizeof(password), pw.length + cell.length);
103 DES_cbc_cksum ((void*)password, &ivec, passlen, &schedule, &ivec);
108 DES_cbc_cksum ((void*)password, key, passlen, &schedule, &ivec);
/freebsd-12-stable/crypto/openssl/apps/
H A Dpkcs12.c32 const char *pass, int passlen, int options,
35 const char *pass, int passlen, int options,
38 const char *pass, int passlen,
597 int passlen, int options, char *pempass,
620 bags = PKCS12_unpack_p7encdata(p7, pass, passlen);
626 if (!dump_certs_pkeys_bags(out, bags, pass, passlen,
642 const char *pass, int passlen, int options,
649 pass, passlen, options, pempass, enc))
656 const char *pass, int passlen, int options,
696 if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen))
596 dump_certs_keys_p12(BIO *out, const PKCS12 *p12, const char *pass, int passlen, int options, char *pempass, const EVP_CIPHER *enc) argument
641 dump_certs_pkeys_bags(BIO *out, const STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass, int passlen, int options, char *pempass, const EVP_CIPHER *enc) argument
655 dump_certs_pkeys_bag(BIO *out, const PKCS12_SAFEBAG *bag, const char *pass, int passlen, int options, char *pempass, const EVP_CIPHER *enc) argument
[all...]
/freebsd-12-stable/crypto/openssl/crypto/asn1/
H A Dp5_scrypt.c213 int passlen, ASN1_TYPE *param,
264 if (EVP_PBE_scrypt(pass, passlen, salt, saltlen, N, r, p, 0, key, keylen)
212 PKCS5_v2_scrypt_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, int en_de) argument

Completed in 178 milliseconds

12