/freebsd-12-stable/crypto/openssl/crypto/pkcs12/ |
H A D | p12_p8d.c | 15 int passlen) 22 passlen, doct, 1); 14 PKCS8_decrypt(const X509_SIG *p8, const char *pass, int passlen) argument
|
H A D | p12_crpt.c | 20 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument 28 int (*pkcs12_key_gen)(const char *pass, int passlen, 53 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_KEY_ID, 59 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
H A D | p12_p8e.c | 16 const char *pass, int passlen, 35 p8 = PKCS8_set0_pbe(pass, passlen, p8inf, pbe); 44 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, argument 52 pass, passlen, p8inf, 1); 15 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
|
H A D | p12_decr.c | 24 const char *pass, int passlen, 38 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen, 83 const char *pass, int passlen, 91 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length, 126 const char *pass, int passlen, 142 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data, 23 PKCS12_pbe_crypt(const X509_ALGOR *algor, const char *pass, int passlen, const unsigned char *in, int inlen, unsigned char **data, int *datalen, int en_de) argument 82 PKCS12_item_decrypt_d2i(const X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, const ASN1_OCTET_STRING *oct, int zbuf) argument 124 PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf) argument
|
H A D | p12_mutl.c | 49 static int pkcs12_gen_gost_mac_key(const char *pass, int passlen, argument 60 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, 70 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument 72 int (*pkcs12_key_gen)(const char *pass, int passlen, 117 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, 123 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, 143 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument 146 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL); 150 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) argument 160 if (!pkcs12_gen_mac(p12, pass, passlen, ma 175 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument [all...] |
H A D | p12_kiss.c | 16 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 20 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts); 22 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, 131 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, argument 147 bags = PKCS12_unpack_p7encdata(p7, pass, passlen); 154 if (!parse_bags(bags, pass, passlen, pkey, ocerts)) { 166 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) 171 pass, passlen, pkey, ocerts)) 177 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, argument 204 if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen)) [all...] |
H A D | p12_key.c | 30 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, argument 41 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { 53 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, argument 64 } else if (!OPENSSL_utf82uni(pass, passlen, &unipass, &uniplen)) { 76 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, argument 97 fprintf(stderr, "Password (length %d):\n", passlen); 98 h__dump(pass, passlen); 110 if (passlen) 111 Plen = v * ((passlen + v - 1) / v); 124 *p++ = pass[i % passlen]; [all...] |
H A D | p12_add.c | 84 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, argument 118 passlen, bags, 1))) { 131 int passlen) 137 pass, passlen, 142 const char *pass, int passlen) 144 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen); 141 PKCS12_decrypt_skey(const PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument
|
H A D | p12_sbag.c | 139 int passlen, 152 p8 = PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, 137 PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
|
/freebsd-12-stable/crypto/openssl/include/openssl/ |
H A D | pkcs12.h | 104 int passlen, 112 int passlen); 114 const char *pass, int passlen); 116 const char *pass, int passlen, unsigned char *salt, 118 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, 122 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 126 int passlen); 148 const char *pass, int passlen, 153 const char *pass, int passlen, 157 const char *pass, int passlen, [all...] |
H A D | kdf.h | 69 # define EVP_PKEY_CTX_set1_pbe_pass(pctx, pass, passlen) \ 71 EVP_PKEY_CTRL_PASS, passlen, (void *)(pass))
|
H A D | cms.h | 150 unsigned char *pass, ossl_ssize_t passlen); 190 ossl_ssize_t passlen); 196 ossl_ssize_t passlen,
|
H A D | evp.h | 404 int passlen, ASN1_TYPE *param, 1084 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 1087 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, 1090 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, 1093 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 1098 int EVP_PBE_scrypt(const char *pass, size_t passlen, 1104 int passlen, ASN1_TYPE *param, 1110 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen,
|
/freebsd-12-stable/crypto/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 31 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, argument 52 passlen = 0; 53 } else if (passlen == -1) { 54 passlen = strlen(pass); 56 if (!HMAC_Init_ex(hctx_tpl, pass, passlen, digest, NULL)) { 114 h__dump(pass, passlen); 124 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, argument 128 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), 138 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument 180 rv = kdf(ctx, pass, passlen, pbe 186 PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, int en_de) argument [all...] |
H A D | p5_crpt.c | 24 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, argument 72 passlen = 0; 73 else if (passlen == -1) 74 passlen = strlen(pass); 84 if (!EVP_DigestUpdate(ctx, pass, passlen))
|
H A D | evp_local.h | 45 int passlen, ASN1_TYPE *param,
|
H A D | evp_pbe.c | 84 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, argument 105 passlen = 0; 106 else if (passlen == -1) 107 passlen = strlen(pass); 129 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) {
|
H A D | pbe_scrypt.c | 158 int EVP_PBE_scrypt(const char *pass, size_t passlen, argument 248 if (PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, 1, EVP_sha256(), 255 if (PKCS5_PBKDF2_HMAC(pass, passlen, B, (int)Blen, 1, EVP_sha256(),
|
/freebsd-12-stable/tests/sys/geom/class/eli/ |
H A D | gentestvect.py | 58 for passlen in xrange(8, 80, 8): 60 passwd = randgen(passlen, '\x00')
|
/freebsd-12-stable/sys/geom/eli/ |
H A D | pkcs5v2.c | 59 u_int i, bsize, passlen; local 63 passlen = strlen(passphrase); 74 g_eli_crypto_hmac_init(&startpoint, passphrase, passlen);
|
/freebsd-12-stable/crypto/openssl/crypto/cms/ |
H A D | cms_pwri.c | 22 unsigned char *pass, ossl_ssize_t passlen) 32 if (pass && passlen < 0) 33 passlen = strlen((char *)pass); 34 pwri->passlen = passlen; 42 ossl_ssize_t passlen, 152 CMS_RecipientInfo_set0_password(ri, pass, passlen); 340 (char *)pwri->pass, pwri->passlen, 21 CMS_RecipientInfo_set0_password(CMS_RecipientInfo *ri, unsigned char *pass, ossl_ssize_t passlen) argument 38 CMS_add0_recipient_password(CMS_ContentInfo *cms, int iter, int wrap_nid, int pbe_nid, unsigned char *pass, ossl_ssize_t passlen, const EVP_CIPHER *kekciph) argument
|
/freebsd-12-stable/crypto/openssh/openbsd-compat/ |
H A D | bcrypt_pbkdf.c | 111 bcrypt_pbkdf(const char *pass, size_t passlen, const u_int8_t *salt, size_t saltlen, argument 126 if (passlen == 0 || saltlen == 0 || keylen == 0 || 137 crypto_hash_sha512(sha2pass, pass, passlen);
|
/freebsd-12-stable/crypto/heimdal/lib/krb5/ |
H A D | salt-des.c | 87 size_t passlen; local 98 passlen = min(sizeof(password), pw.length + cell.length); 103 DES_cbc_cksum ((void*)password, &ivec, passlen, &schedule, &ivec); 108 DES_cbc_cksum ((void*)password, key, passlen, &schedule, &ivec);
|
/freebsd-12-stable/crypto/openssl/apps/ |
H A D | pkcs12.c | 32 const char *pass, int passlen, int options, 35 const char *pass, int passlen, int options, 38 const char *pass, int passlen, 597 int passlen, int options, char *pempass, 620 bags = PKCS12_unpack_p7encdata(p7, pass, passlen); 626 if (!dump_certs_pkeys_bags(out, bags, pass, passlen, 642 const char *pass, int passlen, int options, 649 pass, passlen, options, pempass, enc)) 656 const char *pass, int passlen, int options, 696 if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen)) 596 dump_certs_keys_p12(BIO *out, const PKCS12 *p12, const char *pass, int passlen, int options, char *pempass, const EVP_CIPHER *enc) argument 641 dump_certs_pkeys_bags(BIO *out, const STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass, int passlen, int options, char *pempass, const EVP_CIPHER *enc) argument 655 dump_certs_pkeys_bag(BIO *out, const PKCS12_SAFEBAG *bag, const char *pass, int passlen, int options, char *pempass, const EVP_CIPHER *enc) argument [all...] |
/freebsd-12-stable/crypto/openssl/crypto/asn1/ |
H A D | p5_scrypt.c | 213 int passlen, ASN1_TYPE *param, 264 if (EVP_PBE_scrypt(pass, passlen, salt, saltlen, N, r, p, 0, key, keylen) 212 PKCS5_v2_scrypt_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, int en_de) argument
|