Home
last modified time | relevance | path

Searched refs:passlen (Results 1 – 25 of 33) sorted by relevance

12

/third_party/openssl/include/openssl/
Dpkcs12.h104 int passlen,
112 int passlen);
114 const char *pass, int passlen);
116 const char *pass, int passlen, unsigned char *salt,
118 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen,
122 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
126 int passlen);
148 const char *pass, int passlen,
153 const char *pass, int passlen,
157 const char *pass, int passlen,
[all …]
Dkdf.h69 # define EVP_PKEY_CTX_set1_pbe_pass(pctx, pass, passlen) \ argument
71 EVP_PKEY_CTRL_PASS, passlen, (void *)(pass))
Dcms.h150 unsigned char *pass, ossl_ssize_t passlen);
190 ossl_ssize_t passlen);
196 ossl_ssize_t passlen,
Devp.h404 int passlen, ASN1_TYPE *param,
1084 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
1087 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen,
1090 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen,
1093 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
1098 int EVP_PBE_scrypt(const char *pass, size_t passlen,
1104 int passlen, ASN1_TYPE *param,
1110 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen,
/third_party/openssl/crypto/pkcs12/
Dp12_kiss.c16 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
20 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts);
22 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen,
131 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument
147 bags = PKCS12_unpack_p7encdata(p7, pass, passlen); in parse_pk12()
154 if (!parse_bags(bags, pass, passlen, pkey, ocerts)) { in parse_pk12()
166 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) in parse_bags() argument
171 pass, passlen, pkey, ocerts)) in parse_bags()
177 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, in parse_bag() argument
204 if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen)) == NULL) in parse_bag()
[all …]
Dp12_mutl.c49 static int pkcs12_gen_gost_mac_key(const char *pass, int passlen, in pkcs12_gen_gost_mac_key() argument
60 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key()
70 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in pkcs12_gen_mac() argument
72 int (*pkcs12_key_gen)(const char *pass, int passlen, in pkcs12_gen_mac()
117 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, in pkcs12_gen_mac()
123 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, in pkcs12_gen_mac()
143 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument
146 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL); in PKCS12_gen_mac()
150 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument
160 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, in PKCS12_verify_mac()
[all …]
Dp12_key.c30 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument
41 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_asc()
53 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument
64 } else if (!OPENSSL_utf82uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_utf8()
76 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_uni() argument
97 fprintf(stderr, "Password (length %d):\n", passlen); in PKCS12_key_gen_uni()
98 h__dump(pass, passlen); in PKCS12_key_gen_uni()
110 if (passlen) in PKCS12_key_gen_uni()
111 Plen = v * ((passlen + v - 1) / v); in PKCS12_key_gen_uni()
124 *p++ = pass[i % passlen]; in PKCS12_key_gen_uni()
Dp12_decr.c24 const char *pass, int passlen, in PKCS12_pbe_crypt() argument
38 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen, in PKCS12_pbe_crypt()
83 const char *pass, int passlen, in PKCS12_item_decrypt_d2i() argument
91 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length, in PKCS12_item_decrypt_d2i()
126 const char *pass, int passlen, in PKCS12_item_i2d_encrypt() argument
142 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data, in PKCS12_item_i2d_encrypt()
Dp12_p8e.c16 const char *pass, int passlen, in PKCS8_encrypt() argument
35 p8 = PKCS8_set0_pbe(pass, passlen, p8inf, pbe); in PKCS8_encrypt()
44 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, in PKCS8_set0_pbe() argument
52 pass, passlen, p8inf, 1); in PKCS8_set0_pbe()
Dp12_add.c84 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata() argument
118 passlen, bags, 1))) { in PKCS12_pack_p7encdata()
131 int passlen) in STACK_OF()
137 pass, passlen, in STACK_OF()
142 const char *pass, int passlen) in PKCS12_decrypt_skey() argument
144 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen); in PKCS12_decrypt_skey()
Dp12_crpt.c20 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen() argument
28 int (*pkcs12_key_gen)(const char *pass, int passlen, in PKCS12_PBE_keyivgen()
53 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen()
59 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen()
Dp12_p8d.c15 int passlen) in PKCS8_decrypt() argument
22 passlen, doct, 1); in PKCS8_decrypt()
Dp12_sbag.c139 int passlen, in PKCS12_SAFEBAG_create_pkcs8_encrypt() argument
152 p8 = PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, in PKCS12_SAFEBAG_create_pkcs8_encrypt()
/third_party/openssl/crypto/evp/
Dp5_crpt2.c31 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, in PKCS5_PBKDF2_HMAC() argument
52 passlen = 0; in PKCS5_PBKDF2_HMAC()
53 } else if (passlen == -1) { in PKCS5_PBKDF2_HMAC()
54 passlen = strlen(pass); in PKCS5_PBKDF2_HMAC()
56 if (!HMAC_Init_ex(hctx_tpl, pass, passlen, digest, NULL)) { in PKCS5_PBKDF2_HMAC()
114 h__dump(pass, passlen); in PKCS5_PBKDF2_HMAC()
124 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, in PKCS5_PBKDF2_HMAC_SHA1() argument
128 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), in PKCS5_PBKDF2_HMAC_SHA1()
138 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS5_v2_PBE_keyivgen() argument
180 rv = kdf(ctx, pass, passlen, pbe2->keyfunc->parameter, NULL, NULL, en_de); in PKCS5_v2_PBE_keyivgen()
[all …]
Dp5_crpt.c24 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen() argument
72 passlen = 0; in PKCS5_PBE_keyivgen()
73 else if (passlen == -1) in PKCS5_PBE_keyivgen()
74 passlen = strlen(pass); in PKCS5_PBE_keyivgen()
84 if (!EVP_DigestUpdate(ctx, pass, passlen)) in PKCS5_PBE_keyivgen()
Devp_pbe.c84 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, in EVP_PBE_CipherInit() argument
105 passlen = 0; in EVP_PBE_CipherInit()
106 else if (passlen == -1) in EVP_PBE_CipherInit()
107 passlen = strlen(pass); in EVP_PBE_CipherInit()
129 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) { in EVP_PBE_CipherInit()
Dpbe_scrypt.c158 int EVP_PBE_scrypt(const char *pass, size_t passlen, in EVP_PBE_scrypt() argument
248 if (PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, 1, EVP_sha256(), in EVP_PBE_scrypt()
255 if (PKCS5_PBKDF2_HMAC(pass, passlen, B, (int)Blen, 1, EVP_sha256(), in EVP_PBE_scrypt()
Devp_local.h45 int passlen, ASN1_TYPE *param,
/third_party/openssl/crypto/cms/
Dcms_pwri.c22 unsigned char *pass, ossl_ssize_t passlen) in CMS_RecipientInfo_set0_password() argument
32 if (pass && passlen < 0) in CMS_RecipientInfo_set0_password()
33 passlen = strlen((char *)pass); in CMS_RecipientInfo_set0_password()
34 pwri->passlen = passlen; in CMS_RecipientInfo_set0_password()
42 ossl_ssize_t passlen, in CMS_add0_recipient_password() argument
152 CMS_RecipientInfo_set0_password(ri, pass, passlen); in CMS_add0_recipient_password()
340 (char *)pwri->pass, pwri->passlen, in cms_RecipientInfo_pwri_crypt()
/third_party/openssl/doc/man3/
DPKCS5_PBKDF2_HMAC.pod11 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen,
16 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen,
25 B<pass> is the password used in the derivation of length B<passlen>. B<pass>
26 is an optional parameter and can be NULL. If B<passlen> is -1, then the
DEVP_PKEY_CTX_set1_pbe_pass.pod13 int passlen);
19 EVP_PKEY_CTX_set1_pbe_pass() sets the password to the B<passlen> first
/third_party/openssl/apps/
Dpkcs12.c32 const char *pass, int passlen, int options,
35 const char *pass, int passlen, int options,
38 const char *pass, int passlen,
597 int passlen, int options, char *pempass, in dump_certs_keys_p12() argument
620 bags = PKCS12_unpack_p7encdata(p7, pass, passlen); in dump_certs_keys_p12()
626 if (!dump_certs_pkeys_bags(out, bags, pass, passlen, in dump_certs_keys_p12()
642 const char *pass, int passlen, int options, in dump_certs_pkeys_bags() argument
649 pass, passlen, options, pempass, enc)) in dump_certs_pkeys_bags()
656 const char *pass, int passlen, int options, in dump_certs_pkeys_bag() argument
696 if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen)) == NULL) in dump_certs_pkeys_bag()
[all …]
/third_party/node/deps/npm/node_modules/bcrypt-pbkdf/
DREADME.md10 ### `bcrypt_pbkdf.pbkdf(pass, passlen, salt, saltlen, key, keylen, rounds)`
21 * `pass`, a Uint8Array of length `passlen`
22 * `passlen`, an integer Number
Dindex.js497 function bcrypt_pbkdf(pass, passlen, salt, saltlen, key, keylen, rounds) { argument
508 if (passlen === 0 || saltlen === 0 || keylen === 0 ||
518 crypto_hash_sha512(sha2pass, pass, passlen);
/third_party/openssl/crypto/asn1/
Dp5_scrypt.c213 int passlen, ASN1_TYPE *param, in PKCS5_v2_scrypt_keyivgen() argument
264 if (EVP_PBE_scrypt(pass, passlen, salt, saltlen, N, r, p, 0, key, keylen) in PKCS5_v2_scrypt_keyivgen()

12