| /freebsd/crypto/openssl/crypto/pkcs12/ |
| H A D | p12_key.c | 19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument 31 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_asc_ex() 41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument 45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc() 49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument 61 } else if (!OPENSSL_utf82uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_utf8_ex() 71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument 75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8() 79 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni_ex() argument 104 pass, passlen); in PKCS12_key_gen_uni_ex() [all …]
|
| H A D | p12_decr.c | 20 const char *pass, int passlen, in PKCS12_pbe_crypt_ex() argument 37 if (!EVP_PBE_CipherInit_ex(algor->algorithm, pass, passlen, in PKCS12_pbe_crypt_ex() 95 passlen == 0 ? "empty password" in PKCS12_pbe_crypt_ex() 125 const char *pass, int passlen, in PKCS12_pbe_crypt() argument 129 return PKCS12_pbe_crypt_ex(algor, pass, passlen, in, inlen, data, datalen, in PKCS12_pbe_crypt() 139 const char *pass, int passlen, in PKCS12_item_decrypt_d2i_ex() argument 154 if (!PKCS12_pbe_crypt_ex(algor, pass, passlen, oct->data, oct->length, in PKCS12_item_decrypt_d2i_ex() 175 const char *pass, int passlen, in PKCS12_item_decrypt_d2i() argument 178 return PKCS12_item_decrypt_d2i_ex(algor, it, pass, passlen, oct, zbuf, in PKCS12_item_decrypt_d2i() 189 const char *pass, int passlen, in PKCS12_item_i2d_encrypt_ex() argument [all …]
|
| H A D | p12_p8e.c | 17 const char *pass, int passlen, in PKCS8_encrypt_ex() argument 51 p8 = PKCS8_set0_pbe_ex(pass, passlen, p8inf, pbe, libctx, propq); in PKCS8_encrypt_ex() 61 const char *pass, int passlen, in PKCS8_encrypt() argument 65 return PKCS8_encrypt_ex(pbe_nid, cipher, pass, passlen, salt, saltlen, iter, in PKCS8_encrypt() 69 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, in PKCS8_set0_pbe_ex() argument 77 pass, passlen, p8inf, 1, ctx, propq); in PKCS8_set0_pbe_ex() 95 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, in PKCS8_set0_pbe() argument 98 return PKCS8_set0_pbe_ex(pass, passlen, p8inf, pbe, NULL, NULL); in PKCS8_set0_pbe()
|
| H A D | p12_mutl.c | 25 static int pkcs12_pbmac1_pbkdf2_key_gen(const char *pass, int passlen, 62 static int pkcs12_gen_gost_mac_key(const char *pass, int passlen, in pkcs12_gen_gost_mac_key() argument 73 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key() 109 const char *pass, int passlen, in PBMAC1_PBKDF2_HMAC() argument 155 if (PKCS5_PBKDF2_HMAC(pass, passlen, pbkdf2_salt->data, pbkdf2_salt->length, in PBMAC1_PBKDF2_HMAC() 171 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in pkcs12_gen_mac() argument 174 int (*pkcs12_key_gen)(const char *pass, int passlen, in pkcs12_gen_mac() 238 pass, passlen, macalg, key); in pkcs12_gen_mac() 246 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac() 266 int res = (*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac() [all …]
|
| H A D | p12_kiss.c | 17 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 21 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts, 24 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, 138 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument 154 bags = PKCS12_unpack_p7encdata(p7, pass, passlen); in parse_pk12() 161 if (!parse_bags(bags, pass, passlen, pkey, ocerts, in parse_pk12() 175 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts, in parse_bags() argument 181 pass, passlen, pkey, ocerts, in parse_bags() 189 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, in parse_bag() argument 224 if ((p8 = PKCS12_decrypt_skey_ex(bag, pass, passlen, in parse_bag() [all …]
|
| H A D | p12_add.c | 94 PKCS7 *PKCS12_pack_p7encdata_ex(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata_ex() argument 133 passlen, bags, 1, ctx, propq))) { in PKCS12_pack_p7encdata_ex() 147 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata() argument 151 return PKCS12_pack_p7encdata_ex(pbe_nid, pass, passlen, salt, saltlen, in PKCS12_pack_p7encdata() 156 int passlen) in STACK_OF() 168 pass, passlen, in STACK_OF() 174 const char *pass, int passlen, in PKCS12_decrypt_skey_ex() argument 177 return PKCS8_decrypt_ex(bag->value.shkeybag, pass, passlen, ctx, propq); in PKCS12_decrypt_skey_ex() 181 const char *pass, int passlen) in PKCS12_decrypt_skey() argument 183 return PKCS12_decrypt_skey_ex(bag, pass, passlen, NULL, NULL); in PKCS12_decrypt_skey()
|
| H A D | p12_p8d.c | 15 int passlen, OSSL_LIB_CTX *ctx, in PKCS8_decrypt_ex() argument 24 passlen, doct, 1, ctx, propq); in PKCS8_decrypt_ex() 28 int passlen) in PKCS8_decrypt() argument 30 return PKCS8_decrypt_ex(p8, pass, passlen, NULL, NULL); in PKCS8_decrypt()
|
| H A D | p12_crpt.c | 23 int PKCS12_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen_ex() argument 51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen_ex() 60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen_ex() 78 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen() argument 82 return PKCS12_PBE_keyivgen_ex(ctx, pass, passlen, param, cipher, md, en_de, in PKCS12_PBE_keyivgen()
|
| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | p5_crpt2.c | 22 int ossl_pkcs5_pbkdf2_hmac_ex(const char *pass, int passlen, in ossl_pkcs5_pbkdf2_hmac_ex() argument 37 passlen = 0; in ossl_pkcs5_pbkdf2_hmac_ex() 38 } else if (passlen == -1) { in ossl_pkcs5_pbkdf2_hmac_ex() 39 passlen = strlen(pass); in ossl_pkcs5_pbkdf2_hmac_ex() 52 (char *)pass, (size_t)passlen); in ossl_pkcs5_pbkdf2_hmac_ex() 69 0, passlen, pass, passlen); in ossl_pkcs5_pbkdf2_hmac_ex() 85 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, in PKCS5_PBKDF2_HMAC() argument 89 return ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, digest, in PKCS5_PBKDF2_HMAC() 93 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, in PKCS5_PBKDF2_HMAC_SHA1() argument 101 r = ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1() [all …]
|
| H A D | p5_crpt.c | 26 int PKCS5_PBE_keyivgen_ex(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen_ex() argument 75 passlen = 0; in PKCS5_PBE_keyivgen_ex() 76 else if (passlen == -1) in PKCS5_PBE_keyivgen_ex() 77 passlen = strlen(pass); in PKCS5_PBE_keyivgen_ex() 89 (char *)pass, (size_t)passlen); in PKCS5_PBE_keyivgen_ex() 112 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen() argument 116 return PKCS5_PBE_keyivgen_ex(cctx, pass, passlen, param, cipher, md, en_de, in PKCS5_PBE_keyivgen()
|
| H A D | pbe_scrypt.c | 37 int EVP_PBE_scrypt_ex(const char *pass, size_t passlen, in EVP_PBE_scrypt_ex() argument 57 passlen = 0; in EVP_PBE_scrypt_ex() 75 passlen); in EVP_PBE_scrypt_ex() 90 int EVP_PBE_scrypt(const char *pass, size_t passlen, in EVP_PBE_scrypt() argument 95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem, in EVP_PBE_scrypt()
|
| H A D | evp_pbe.c | 96 int EVP_PBE_CipherInit_ex(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, in EVP_PBE_CipherInit_ex() argument 122 passlen = 0; in EVP_PBE_CipherInit_ex() 123 else if (passlen == -1) in EVP_PBE_CipherInit_ex() 124 passlen = strlen(pass); in EVP_PBE_CipherInit_ex() 158 ret = keygen_ex(ctx, pass, passlen, param, cipher, md, en_de, libctx, propq); in EVP_PBE_CipherInit_ex() 160 ret = keygen(ctx, pass, passlen, param, cipher, md, en_de); in EVP_PBE_CipherInit_ex() 169 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, in EVP_PBE_CipherInit() argument 172 return EVP_PBE_CipherInit_ex(pbe_obj, pass, passlen, param, ctx, en_de, NULL, NULL); in EVP_PBE_CipherInit()
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | pkcs12.h | 157 int passlen, 163 int passlen, 173 int passlen); 175 int passlen, OSSL_LIB_CTX *ctx, 178 const char *pass, int passlen); 180 const char *pass, int passlen, 184 const char *pass, int passlen, unsigned char *salt, 187 const char *pass, int passlen, unsigned char *salt, 190 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, 192 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, [all …]
|
| H A D | pkcs12.h.in | 134 int passlen, 140 int passlen, 150 int passlen); 152 int passlen, OSSL_LIB_CTX *ctx, 155 const char *pass, int passlen); 157 const char *pass, int passlen, 161 const char *pass, int passlen, unsigned char *salt, 164 const char *pass, int passlen, unsigned char *salt, 167 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, 169 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | PKCS8_encrypt.pod | 13 int passlen); 15 int passlen, OSSL_LIB_CTX *ctx, 18 const char *pass, int passlen, unsigned char *salt, 21 const char *pass, int passlen, unsigned char *salt, 24 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, 26 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, 33 the password I<pass> of length I<passlen>, salt I<salt> of length I<saltlen> 39 I<p8> using the password I<pass> of length I<passlen> along with algorithm 43 using the password I<pass> of length I<passlen> and parameters I<pbe>.
|
| H A D | PKCS12_item_decrypt_d2i.pod | 14 const char *pass, int passlen, 17 const char *pass, int passlen, 23 const char *pass, int passlen, 27 const char *pass, int passlen, 36 password I<pass> of length I<passlen>. If I<zbuf> is nonzero then the output 41 I<passlen>, returning an encoded object in I<obj>. If I<zbuf> is nonzero then
|
| H A D | PKCS12_PBE_keyivgen.pod | 12 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 15 int PKCS12_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 20 const char *pass, int passlen, 25 const char *pass, int passlen, 34 length I<passlen>, parameters I<param> and a message digest function I<md_type> 44 based on the algorithm in I<algor> and password I<pass> of length I<passlen>. 53 I<pass> is the password used in the derivation of length I<passlen>. I<pass> 54 is an optional parameter and can be NULL. If I<passlen> is -1, then the
|
| H A D | PKCS12_key_gen_utf8_ex.pod | 13 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 16 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, 20 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, 23 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, 27 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, 30 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, 38 with an input password I<pass> of length I<passlen>, a salt I<salt> of length 79 I<pass> is the password used in the derivation of length I<passlen>. I<pass> 80 is an optional parameter and can be NULL. If I<passlen> is -1, then the
|
| H A D | PKCS5_PBE_keyivgen.pod | 17 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 20 int PKCS5_PBE_keyivgen_ex(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, 24 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 27 int PKCS5_v2_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 31 int EVP_PBE_scrypt(const char *pass, size_t passlen, 35 int EVP_PBE_scrypt_ex(const char *pass, size_t passlen, 41 int passlen, ASN1_TYPE *param, 44 int passlen, ASN1_TYPE *param, 87 length I<passlen>, parameters I<param> and a message digest function I<md_type> 92 I<pass> is an optional parameter and can be NULL. If I<passlen> is -1, then the
|
| H A D | PKCS12_decrypt_skey.pod | 13 const char *pass, int passlen); 15 const char *pass, int passlen, 22 using the supplied password I<pass> of length I<passlen>.
|
| H A D | PKCS5_PBKDF2_HMAC.pod | 11 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, 16 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, 25 B<pass> is the password used in the derivation of length B<passlen>. B<pass> 26 is an optional parameter and can be NULL. If B<passlen> is -1, then the
|
| H A D | PKCS12_pack_p7encdata.pod | 12 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 15 PKCS7 *PKCS12_pack_p7encdata_ex(int pbe_nid, const char *pass, int passlen, 27 The password I<pass> of length I<passlen>, salt I<salt> of length I<saltlen>
|
| /freebsd/crypto/openssl/crypto/cms/ |
| H A D | cms_pwri.c | 23 unsigned char *pass, ossl_ssize_t passlen) in CMS_RecipientInfo_set0_password() argument 33 if (pass && passlen < 0) in CMS_RecipientInfo_set0_password() 34 passlen = strlen((char *)pass); in CMS_RecipientInfo_set0_password() 35 pwri->passlen = passlen; in CMS_RecipientInfo_set0_password() 43 ossl_ssize_t passlen, in CMS_add0_recipient_password() argument 176 CMS_RecipientInfo_set0_password(ri, pass, passlen); in CMS_add0_recipient_password() 371 (char *)pwri->pass, (int)pwri->passlen, in ossl_cms_RecipientInfo_pwri_crypt()
|
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | salt-des.c | 87 size_t passlen; in krb5_DES_AFS3_Transarc_string_to_key() local 98 passlen = min(sizeof(password), pw.length + cell.length); in krb5_DES_AFS3_Transarc_string_to_key() 103 DES_cbc_cksum ((void*)password, &ivec, passlen, &schedule, &ivec); in krb5_DES_AFS3_Transarc_string_to_key() 108 DES_cbc_cksum ((void*)password, key, passlen, &schedule, &ivec); in krb5_DES_AFS3_Transarc_string_to_key()
|
| /freebsd/crypto/openssh/openbsd-compat/ |
| H A D | bcrypt_pbkdf.c | 114 bcrypt_pbkdf(const char *pass, size_t passlen, const uint8_t *salt, size_t saltlen, in bcrypt_pbkdf() argument 129 if (passlen == 0 || saltlen == 0 || keylen == 0 || in bcrypt_pbkdf() 140 crypto_hash_sha512(sha2pass, pass, passlen); in bcrypt_pbkdf()
|