Home
last modified time | relevance | path

Searched refs:passlen (Results 1 – 25 of 46) sorted by relevance

12

/openssl/crypto/pkcs12/
H A Dp12_key.c19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument
31 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_asc_ex()
41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument
45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc()
49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument
61 } else if (!OPENSSL_utf82uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_utf8_ex()
71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument
75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8()
104 pass, passlen); in PKCS12_key_gen_uni_ex()
113 BIO_printf(trc_out, "Password (length %d):\n", passlen); in PKCS12_key_gen_uni_ex()
[all …]
H A Dp12_decr.c20 const char *pass, int passlen, in PKCS12_pbe_crypt_ex() argument
37 if (!EVP_PBE_CipherInit_ex(algor->algorithm, pass, passlen, in PKCS12_pbe_crypt_ex()
93 passlen == 0 ? "empty password" in PKCS12_pbe_crypt_ex()
122 const char *pass, int passlen, in PKCS12_pbe_crypt() argument
136 const char *pass, int passlen, in PKCS12_item_decrypt_d2i_ex() argument
146 if (!PKCS12_pbe_crypt_ex(algor, pass, passlen, oct->data, oct->length, in PKCS12_item_decrypt_d2i_ex()
165 const char *pass, int passlen, in PKCS12_item_decrypt_d2i() argument
168 return PKCS12_item_decrypt_d2i_ex(algor, it, pass, passlen, oct, zbuf, in PKCS12_item_decrypt_d2i()
179 const char *pass, int passlen, in PKCS12_item_i2d_encrypt_ex() argument
197 if (!PKCS12_pbe_crypt_ex(algor, pass, passlen, in, inlen, &oct->data, in PKCS12_item_i2d_encrypt_ex()
[all …]
H A Dp12_p8e.c17 const char *pass, int passlen, in PKCS8_encrypt_ex() argument
51 p8 = PKCS8_set0_pbe_ex(pass, passlen, p8inf, pbe, libctx, propq); in PKCS8_encrypt_ex()
61 const char *pass, int passlen, in PKCS8_encrypt() argument
65 return PKCS8_encrypt_ex(pbe_nid, cipher, pass, passlen, salt, saltlen, iter, in PKCS8_encrypt()
69 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, in PKCS8_set0_pbe_ex() argument
78 pass, passlen, p8inf, 1, ctx, propq); in PKCS8_set0_pbe_ex()
96 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, in PKCS8_set0_pbe() argument
99 return PKCS8_set0_pbe_ex(pass, passlen, p8inf, pbe, NULL, NULL); in PKCS8_set0_pbe()
H A Dp12_mutl.c25 static int pkcs12_pbmac1_pbkdf2_key_gen(const char *pass, int passlen,
62 static int pkcs12_gen_gost_mac_key(const char *pass, int passlen, in pkcs12_gen_gost_mac_key() argument
73 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key()
109 const char *pass, int passlen, in PBMAC1_PBKDF2_HMAC() argument
156 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in pkcs12_gen_mac() argument
223 pass, passlen, macalg, key); in pkcs12_gen_mac()
288 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument
295 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument
344 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_set_mac() argument
382 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_pbmac1_pbkdf2_key_gen()
[all …]
H A Dp12_kiss.c17 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
21 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts,
24 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen,
139 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument
155 bags = PKCS12_unpack_p7encdata(p7, pass, passlen); in parse_pk12()
162 if (!parse_bags(bags, pass, passlen, pkey, ocerts, in parse_pk12()
176 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts, in parse_bags() argument
182 pass, passlen, pkey, ocerts, in parse_bags()
190 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, in parse_bag() argument
219 if ((p8 = PKCS12_decrypt_skey_ex(bag, pass, passlen, in parse_bag()
[all …]
H A Dp12_p8d.c15 int passlen, OSSL_LIB_CTX *ctx, in PKCS8_decrypt_ex() argument
24 passlen, doct, 1, ctx, propq); in PKCS8_decrypt_ex()
28 int passlen) in PKCS8_decrypt() argument
30 return PKCS8_decrypt_ex(p8, pass, passlen, NULL, NULL); in PKCS8_decrypt()
H A Dp12_add.c94 PKCS7 *PKCS12_pack_p7encdata_ex(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata_ex() argument
134 passlen, bags, 1, ctx, propq))) { in PKCS12_pack_p7encdata_ex()
148 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata() argument
152 return PKCS12_pack_p7encdata_ex(pbe_nid, pass, passlen, salt, saltlen, in PKCS12_pack_p7encdata()
157 int passlen) in STACK_OF()
169 pass, passlen, in STACK_OF()
175 const char *pass, int passlen, in PKCS12_decrypt_skey_ex() argument
178 return PKCS8_decrypt_ex(bag->value.shkeybag, pass, passlen, ctx, propq); in PKCS12_decrypt_skey_ex()
182 const char *pass, int passlen) in PKCS12_decrypt_skey() argument
184 return PKCS12_decrypt_skey_ex(bag, pass, passlen, NULL, NULL); in PKCS12_decrypt_skey()
H A Dp12_crpt.c23 int PKCS12_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen_ex() argument
51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen_ex()
60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen_ex()
78 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen() argument
82 return PKCS12_PBE_keyivgen_ex(ctx, pass, passlen, param, cipher, md, en_de, in PKCS12_PBE_keyivgen()
H A Dp12_sbag.c240 int passlen, in PKCS12_SAFEBAG_create_pkcs8_encrypt_ex() argument
261 p8 = PKCS8_encrypt_ex(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, in PKCS12_SAFEBAG_create_pkcs8_encrypt_ex()
277 int passlen, in PKCS12_SAFEBAG_create_pkcs8_encrypt() argument
282 return PKCS12_SAFEBAG_create_pkcs8_encrypt_ex(pbe_nid, pass, passlen, in PKCS12_SAFEBAG_create_pkcs8_encrypt()
/openssl/crypto/evp/
H A Dp5_crpt2.c22 int ossl_pkcs5_pbkdf2_hmac_ex(const char *pass, int passlen, in ossl_pkcs5_pbkdf2_hmac_ex() argument
37 passlen = 0; in ossl_pkcs5_pbkdf2_hmac_ex()
38 } else if (passlen == -1) { in ossl_pkcs5_pbkdf2_hmac_ex()
39 passlen = strlen(pass); in ossl_pkcs5_pbkdf2_hmac_ex()
52 (char *)pass, (size_t)passlen); in ossl_pkcs5_pbkdf2_hmac_ex()
68 0, passlen, pass, passlen); in ossl_pkcs5_pbkdf2_hmac_ex()
92 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, in PKCS5_PBKDF2_HMAC_SHA1() argument
100 r = ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1()
173 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS5_v2_PBE_keyivgen() argument
181 int passlen, ASN1_TYPE *param, in PKCS5_v2_PBKDF2_keyivgen_ex() argument
[all …]
H A Dp5_crpt.c26 int PKCS5_PBE_keyivgen_ex(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen_ex() argument
76 passlen = 0; in PKCS5_PBE_keyivgen_ex()
77 else if (passlen == -1) in PKCS5_PBE_keyivgen_ex()
78 passlen = strlen(pass); in PKCS5_PBE_keyivgen_ex()
90 (char *)pass, (size_t)passlen); in PKCS5_PBE_keyivgen_ex()
113 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen() argument
117 return PKCS5_PBE_keyivgen_ex(cctx, pass, passlen, param, cipher, md, en_de, in PKCS5_PBE_keyivgen()
H A Dpbe_scrypt.c37 int EVP_PBE_scrypt_ex(const char *pass, size_t passlen, in EVP_PBE_scrypt_ex() argument
57 passlen = 0; in EVP_PBE_scrypt_ex()
75 passlen); in EVP_PBE_scrypt_ex()
90 int EVP_PBE_scrypt(const char *pass, size_t passlen, in EVP_PBE_scrypt() argument
95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem, in EVP_PBE_scrypt()
H A Devp_pbe.c96 int EVP_PBE_CipherInit_ex(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, in EVP_PBE_CipherInit_ex() argument
122 passlen = 0; in EVP_PBE_CipherInit_ex()
123 else if (passlen == -1) in EVP_PBE_CipherInit_ex()
124 passlen = strlen(pass); in EVP_PBE_CipherInit_ex()
158 ret = keygen_ex(ctx, pass, passlen, param, cipher, md, en_de, libctx, propq); in EVP_PBE_CipherInit_ex()
160 ret = keygen(ctx, pass, passlen, param, cipher, md, en_de); in EVP_PBE_CipherInit_ex()
169 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, in EVP_PBE_CipherInit() argument
172 return EVP_PBE_CipherInit_ex(pbe_obj, pass, passlen, param, ctx, en_de, NULL, NULL); in EVP_PBE_CipherInit()
/openssl/include/openssl/
H A Dpkcs12.h.in130 int passlen,
146 int passlen);
163 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen,
165 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen,
179 int passlen);
206 const char *pass, int passlen,
211 const char *pass, int passlen,
217 const char *pass, int passlen,
220 const char *pass, int passlen,
266 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
[all …]
/openssl/doc/man3/
H A DPKCS8_encrypt.pod13 int passlen);
15 int passlen, OSSL_LIB_CTX *ctx,
18 const char *pass, int passlen, unsigned char *salt,
21 const char *pass, int passlen, unsigned char *salt,
24 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen,
26 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen,
33 the password I<pass> of length I<passlen>, salt I<salt> of length I<saltlen>
39 I<p8> using the password I<pass> of length I<passlen> along with algorithm
43 using the password I<pass> of length I<passlen> and parameters I<pbe>.
H A DPKCS12_item_decrypt_d2i.pod14 const char *pass, int passlen,
17 const char *pass, int passlen,
23 const char *pass, int passlen,
27 const char *pass, int passlen,
36 password I<pass> of length I<passlen>. If I<zbuf> is nonzero then the output
41 I<passlen>, returning an encoded object in I<obj>. If I<zbuf> is nonzero then
H A DPKCS12_PBE_keyivgen.pod12 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
15 int PKCS12_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
20 const char *pass, int passlen,
25 const char *pass, int passlen,
34 length I<passlen>, parameters I<param> and a message digest function I<md_type>
44 based on the algorithm in I<algor> and password I<pass> of length I<passlen>.
53 I<pass> is the password used in the derivation of length I<passlen>. I<pass>
54 is an optional parameter and can be NULL. If I<passlen> is -1, then the
H A DPKCS12_key_gen_utf8_ex.pod13 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
16 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt,
20 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt,
23 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt,
27 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt,
30 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt,
38 with an input password I<pass> of length I<passlen>, a salt I<salt> of length
79 I<pass> is the password used in the derivation of length I<passlen>. I<pass>
80 is an optional parameter and can be NULL. If I<passlen> is -1, then the
H A DPKCS5_PBE_keyivgen.pod17 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
20 int PKCS5_PBE_keyivgen_ex(EVP_CIPHER_CTX *cctx, const char *pass, int passlen,
24 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
27 int PKCS5_v2_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
31 int EVP_PBE_scrypt(const char *pass, size_t passlen,
35 int EVP_PBE_scrypt_ex(const char *pass, size_t passlen,
41 int passlen, ASN1_TYPE *param,
44 int passlen, ASN1_TYPE *param,
87 length I<passlen>, parameters I<param> and a message digest function I<md_type>
92 I<pass> is an optional parameter and can be NULL. If I<passlen> is -1, then the
H A DPKCS12_decrypt_skey.pod13 const char *pass, int passlen);
15 const char *pass, int passlen,
22 using the supplied password I<pass> of length I<passlen>.
H A DPKCS5_PBKDF2_HMAC.pod11 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen,
16 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen,
25 B<pass> is the password used in the derivation of length B<passlen>. B<pass>
26 is an optional parameter and can be NULL. If B<passlen> is -1, then the
H A DPKCS12_pack_p7encdata.pod12 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
15 PKCS7 *PKCS12_pack_p7encdata_ex(int pbe_nid, const char *pass, int passlen,
27 The password I<pass> of length I<passlen>, salt I<salt> of length I<saltlen>
H A DPKCS12_gen_mac.pod13 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
15 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
16 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
19 int PKCS12_set_pbmac1_pbkdf2(PKCS12 *p12, const char *pass, int passlen,
/openssl/crypto/cms/
H A Dcms_pwri.c23 unsigned char *pass, ossl_ssize_t passlen) in CMS_RecipientInfo_set0_password() argument
33 if (pass && passlen < 0) in CMS_RecipientInfo_set0_password()
34 passlen = strlen((char *)pass); in CMS_RecipientInfo_set0_password()
35 pwri->passlen = passlen; in CMS_RecipientInfo_set0_password()
43 ossl_ssize_t passlen, in CMS_add0_recipient_password() argument
176 CMS_RecipientInfo_set0_password(ri, pass, passlen); in CMS_add0_recipient_password()
372 (char *)pwri->pass, pwri->passlen, in ossl_cms_RecipientInfo_pwri_crypt()
/openssl/crypto/asn1/
H A Dp5_scrypt.c237 int passlen, ASN1_TYPE *param, in PKCS5_v2_scrypt_keyivgen_ex() argument
293 if (EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, 0, key, in PKCS5_v2_scrypt_keyivgen_ex()
305 int passlen, ASN1_TYPE *param, in PKCS5_v2_scrypt_keyivgen() argument
308 return PKCS5_v2_scrypt_keyivgen_ex(ctx, pass, passlen, param, c, md, en_de, NULL, NULL); in PKCS5_v2_scrypt_keyivgen()

Completed in 34 milliseconds

12