/third_party/openssl/include/openssl/ |
D | pkcs12.h | 104 int passlen, 112 int passlen); 114 const char *pass, int passlen); 116 const char *pass, int passlen, unsigned char *salt, 118 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, 122 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 126 int passlen); 148 const char *pass, int passlen, 153 const char *pass, int passlen, 157 const char *pass, int passlen, [all …]
|
D | kdf.h | 69 # define EVP_PKEY_CTX_set1_pbe_pass(pctx, pass, passlen) \ argument 71 EVP_PKEY_CTRL_PASS, passlen, (void *)(pass))
|
D | cms.h | 150 unsigned char *pass, ossl_ssize_t passlen); 190 ossl_ssize_t passlen); 196 ossl_ssize_t passlen,
|
D | evp.h | 404 int passlen, ASN1_TYPE *param, 1084 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 1087 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, 1090 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, 1093 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 1098 int EVP_PBE_scrypt(const char *pass, size_t passlen, 1104 int passlen, ASN1_TYPE *param, 1110 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen,
|
/third_party/openssl/crypto/pkcs12/ |
D | p12_kiss.c | 16 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 20 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts); 22 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, 131 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument 147 bags = PKCS12_unpack_p7encdata(p7, pass, passlen); in parse_pk12() 154 if (!parse_bags(bags, pass, passlen, pkey, ocerts)) { in parse_pk12() 166 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) in parse_bags() argument 171 pass, passlen, pkey, ocerts)) in parse_bags() 177 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, in parse_bag() argument 204 if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen)) == NULL) in parse_bag() [all …]
|
D | p12_mutl.c | 49 static int pkcs12_gen_gost_mac_key(const char *pass, int passlen, in pkcs12_gen_gost_mac_key() argument 60 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key() 70 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in pkcs12_gen_mac() argument 72 int (*pkcs12_key_gen)(const char *pass, int passlen, in pkcs12_gen_mac() 117 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac() 123 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac() 143 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument 146 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL); in PKCS12_gen_mac() 150 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument 160 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, in PKCS12_verify_mac() [all …]
|
D | p12_key.c | 30 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument 41 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_asc() 53 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument 64 } else if (!OPENSSL_utf82uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_utf8() 76 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni() argument 97 fprintf(stderr, "Password (length %d):\n", passlen); in PKCS12_key_gen_uni() 98 h__dump(pass, passlen); in PKCS12_key_gen_uni() 110 if (passlen) in PKCS12_key_gen_uni() 111 Plen = v * ((passlen + v - 1) / v); in PKCS12_key_gen_uni() 124 *p++ = pass[i % passlen]; in PKCS12_key_gen_uni()
|
D | p12_decr.c | 24 const char *pass, int passlen, in PKCS12_pbe_crypt() argument 38 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen, in PKCS12_pbe_crypt() 83 const char *pass, int passlen, in PKCS12_item_decrypt_d2i() argument 91 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length, in PKCS12_item_decrypt_d2i() 126 const char *pass, int passlen, in PKCS12_item_i2d_encrypt() argument 142 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data, in PKCS12_item_i2d_encrypt()
|
D | p12_p8e.c | 16 const char *pass, int passlen, in PKCS8_encrypt() argument 35 p8 = PKCS8_set0_pbe(pass, passlen, p8inf, pbe); in PKCS8_encrypt() 44 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, in PKCS8_set0_pbe() argument 52 pass, passlen, p8inf, 1); in PKCS8_set0_pbe()
|
D | p12_add.c | 84 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata() argument 118 passlen, bags, 1))) { in PKCS12_pack_p7encdata() 131 int passlen) in STACK_OF() 137 pass, passlen, in STACK_OF() 142 const char *pass, int passlen) in PKCS12_decrypt_skey() argument 144 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen); in PKCS12_decrypt_skey()
|
D | p12_crpt.c | 20 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen() argument 28 int (*pkcs12_key_gen)(const char *pass, int passlen, in PKCS12_PBE_keyivgen() 53 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen() 59 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen()
|
D | p12_p8d.c | 15 int passlen) in PKCS8_decrypt() argument 22 passlen, doct, 1); in PKCS8_decrypt()
|
D | p12_sbag.c | 139 int passlen, in PKCS12_SAFEBAG_create_pkcs8_encrypt() argument 152 p8 = PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, in PKCS12_SAFEBAG_create_pkcs8_encrypt()
|
/third_party/openssl/crypto/evp/ |
D | p5_crpt2.c | 31 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, in PKCS5_PBKDF2_HMAC() argument 52 passlen = 0; in PKCS5_PBKDF2_HMAC() 53 } else if (passlen == -1) { in PKCS5_PBKDF2_HMAC() 54 passlen = strlen(pass); in PKCS5_PBKDF2_HMAC() 56 if (!HMAC_Init_ex(hctx_tpl, pass, passlen, digest, NULL)) { in PKCS5_PBKDF2_HMAC() 114 h__dump(pass, passlen); in PKCS5_PBKDF2_HMAC() 124 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, in PKCS5_PBKDF2_HMAC_SHA1() argument 128 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), in PKCS5_PBKDF2_HMAC_SHA1() 138 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS5_v2_PBE_keyivgen() argument 180 rv = kdf(ctx, pass, passlen, pbe2->keyfunc->parameter, NULL, NULL, en_de); in PKCS5_v2_PBE_keyivgen() [all …]
|
D | p5_crpt.c | 24 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen() argument 72 passlen = 0; in PKCS5_PBE_keyivgen() 73 else if (passlen == -1) in PKCS5_PBE_keyivgen() 74 passlen = strlen(pass); in PKCS5_PBE_keyivgen() 84 if (!EVP_DigestUpdate(ctx, pass, passlen)) in PKCS5_PBE_keyivgen()
|
D | evp_pbe.c | 84 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, in EVP_PBE_CipherInit() argument 105 passlen = 0; in EVP_PBE_CipherInit() 106 else if (passlen == -1) in EVP_PBE_CipherInit() 107 passlen = strlen(pass); in EVP_PBE_CipherInit() 129 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) { in EVP_PBE_CipherInit()
|
D | pbe_scrypt.c | 158 int EVP_PBE_scrypt(const char *pass, size_t passlen, in EVP_PBE_scrypt() argument 248 if (PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, 1, EVP_sha256(), in EVP_PBE_scrypt() 255 if (PKCS5_PBKDF2_HMAC(pass, passlen, B, (int)Blen, 1, EVP_sha256(), in EVP_PBE_scrypt()
|
D | evp_local.h | 45 int passlen, ASN1_TYPE *param,
|
/third_party/openssl/crypto/cms/ |
D | cms_pwri.c | 22 unsigned char *pass, ossl_ssize_t passlen) in CMS_RecipientInfo_set0_password() argument 32 if (pass && passlen < 0) in CMS_RecipientInfo_set0_password() 33 passlen = strlen((char *)pass); in CMS_RecipientInfo_set0_password() 34 pwri->passlen = passlen; in CMS_RecipientInfo_set0_password() 42 ossl_ssize_t passlen, in CMS_add0_recipient_password() argument 152 CMS_RecipientInfo_set0_password(ri, pass, passlen); in CMS_add0_recipient_password() 340 (char *)pwri->pass, pwri->passlen, in cms_RecipientInfo_pwri_crypt()
|
/third_party/openssl/doc/man3/ |
D | PKCS5_PBKDF2_HMAC.pod | 11 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, 16 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, 25 B<pass> is the password used in the derivation of length B<passlen>. B<pass> 26 is an optional parameter and can be NULL. If B<passlen> is -1, then the
|
D | EVP_PKEY_CTX_set1_pbe_pass.pod | 13 int passlen); 19 EVP_PKEY_CTX_set1_pbe_pass() sets the password to the B<passlen> first
|
/third_party/openssl/apps/ |
D | pkcs12.c | 32 const char *pass, int passlen, int options, 35 const char *pass, int passlen, int options, 38 const char *pass, int passlen, 597 int passlen, int options, char *pempass, in dump_certs_keys_p12() argument 620 bags = PKCS12_unpack_p7encdata(p7, pass, passlen); in dump_certs_keys_p12() 626 if (!dump_certs_pkeys_bags(out, bags, pass, passlen, in dump_certs_keys_p12() 642 const char *pass, int passlen, int options, in dump_certs_pkeys_bags() argument 649 pass, passlen, options, pempass, enc)) in dump_certs_pkeys_bags() 656 const char *pass, int passlen, int options, in dump_certs_pkeys_bag() argument 696 if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen)) == NULL) in dump_certs_pkeys_bag() [all …]
|
/third_party/node/deps/npm/node_modules/bcrypt-pbkdf/ |
D | README.md | 10 ### `bcrypt_pbkdf.pbkdf(pass, passlen, salt, saltlen, key, keylen, rounds)` 21 * `pass`, a Uint8Array of length `passlen` 22 * `passlen`, an integer Number
|
D | index.js | 497 function bcrypt_pbkdf(pass, passlen, salt, saltlen, key, keylen, rounds) { argument 508 if (passlen === 0 || saltlen === 0 || keylen === 0 || 518 crypto_hash_sha512(sha2pass, pass, passlen);
|
/third_party/openssl/crypto/asn1/ |
D | p5_scrypt.c | 213 int passlen, ASN1_TYPE *param, in PKCS5_v2_scrypt_keyivgen() argument 264 if (EVP_PBE_scrypt(pass, passlen, salt, saltlen, N, r, p, 0, key, keylen) in PKCS5_v2_scrypt_keyivgen()
|