/openssl/crypto/pkcs12/ |
H A D | p12_key.c | 19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument 31 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_asc_ex() 41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument 45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc() 49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument 61 } else if (!OPENSSL_utf82uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_utf8_ex() 71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument 75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8() 104 pass, passlen); in PKCS12_key_gen_uni_ex() 113 BIO_printf(trc_out, "Password (length %d):\n", passlen); in PKCS12_key_gen_uni_ex() [all …]
|
H A D | p12_decr.c | 20 const char *pass, int passlen, in PKCS12_pbe_crypt_ex() argument 37 if (!EVP_PBE_CipherInit_ex(algor->algorithm, pass, passlen, in PKCS12_pbe_crypt_ex() 93 passlen == 0 ? "empty password" in PKCS12_pbe_crypt_ex() 122 const char *pass, int passlen, in PKCS12_pbe_crypt() argument 136 const char *pass, int passlen, in PKCS12_item_decrypt_d2i_ex() argument 146 if (!PKCS12_pbe_crypt_ex(algor, pass, passlen, oct->data, oct->length, in PKCS12_item_decrypt_d2i_ex() 165 const char *pass, int passlen, in PKCS12_item_decrypt_d2i() argument 168 return PKCS12_item_decrypt_d2i_ex(algor, it, pass, passlen, oct, zbuf, in PKCS12_item_decrypt_d2i() 179 const char *pass, int passlen, in PKCS12_item_i2d_encrypt_ex() argument 197 if (!PKCS12_pbe_crypt_ex(algor, pass, passlen, in, inlen, &oct->data, in PKCS12_item_i2d_encrypt_ex() [all …]
|
H A D | p12_p8e.c | 17 const char *pass, int passlen, in PKCS8_encrypt_ex() argument 51 p8 = PKCS8_set0_pbe_ex(pass, passlen, p8inf, pbe, libctx, propq); in PKCS8_encrypt_ex() 61 const char *pass, int passlen, in PKCS8_encrypt() argument 65 return PKCS8_encrypt_ex(pbe_nid, cipher, pass, passlen, salt, saltlen, iter, in PKCS8_encrypt() 69 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, in PKCS8_set0_pbe_ex() argument 78 pass, passlen, p8inf, 1, ctx, propq); in PKCS8_set0_pbe_ex() 96 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, in PKCS8_set0_pbe() argument 99 return PKCS8_set0_pbe_ex(pass, passlen, p8inf, pbe, NULL, NULL); in PKCS8_set0_pbe()
|
H A D | p12_mutl.c | 25 static int pkcs12_pbmac1_pbkdf2_key_gen(const char *pass, int passlen, 62 static int pkcs12_gen_gost_mac_key(const char *pass, int passlen, in pkcs12_gen_gost_mac_key() argument 73 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key() 109 const char *pass, int passlen, in PBMAC1_PBKDF2_HMAC() argument 156 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in pkcs12_gen_mac() argument 223 pass, passlen, macalg, key); in pkcs12_gen_mac() 288 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument 295 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument 344 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_set_mac() argument 382 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_pbmac1_pbkdf2_key_gen() [all …]
|
H A D | p12_kiss.c | 17 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 21 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts, 24 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, 139 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, in parse_pk12() argument 155 bags = PKCS12_unpack_p7encdata(p7, pass, passlen); in parse_pk12() 162 if (!parse_bags(bags, pass, passlen, pkey, ocerts, in parse_pk12() 176 int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts, in parse_bags() argument 182 pass, passlen, pkey, ocerts, in parse_bags() 190 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, in parse_bag() argument 219 if ((p8 = PKCS12_decrypt_skey_ex(bag, pass, passlen, in parse_bag() [all …]
|
H A D | p12_p8d.c | 15 int passlen, OSSL_LIB_CTX *ctx, in PKCS8_decrypt_ex() argument 24 passlen, doct, 1, ctx, propq); in PKCS8_decrypt_ex() 28 int passlen) in PKCS8_decrypt() argument 30 return PKCS8_decrypt_ex(p8, pass, passlen, NULL, NULL); in PKCS8_decrypt()
|
H A D | p12_add.c | 94 PKCS7 *PKCS12_pack_p7encdata_ex(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata_ex() argument 134 passlen, bags, 1, ctx, propq))) { in PKCS12_pack_p7encdata_ex() 148 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata() argument 152 return PKCS12_pack_p7encdata_ex(pbe_nid, pass, passlen, salt, saltlen, in PKCS12_pack_p7encdata() 157 int passlen) in STACK_OF() 169 pass, passlen, in STACK_OF() 175 const char *pass, int passlen, in PKCS12_decrypt_skey_ex() argument 178 return PKCS8_decrypt_ex(bag->value.shkeybag, pass, passlen, ctx, propq); in PKCS12_decrypt_skey_ex() 182 const char *pass, int passlen) in PKCS12_decrypt_skey() argument 184 return PKCS12_decrypt_skey_ex(bag, pass, passlen, NULL, NULL); in PKCS12_decrypt_skey()
|
H A D | p12_crpt.c | 23 int PKCS12_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen_ex() argument 51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen_ex() 60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen_ex() 78 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen() argument 82 return PKCS12_PBE_keyivgen_ex(ctx, pass, passlen, param, cipher, md, en_de, in PKCS12_PBE_keyivgen()
|
H A D | p12_sbag.c | 240 int passlen, in PKCS12_SAFEBAG_create_pkcs8_encrypt_ex() argument 261 p8 = PKCS8_encrypt_ex(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, in PKCS12_SAFEBAG_create_pkcs8_encrypt_ex() 277 int passlen, in PKCS12_SAFEBAG_create_pkcs8_encrypt() argument 282 return PKCS12_SAFEBAG_create_pkcs8_encrypt_ex(pbe_nid, pass, passlen, in PKCS12_SAFEBAG_create_pkcs8_encrypt()
|
/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 22 int ossl_pkcs5_pbkdf2_hmac_ex(const char *pass, int passlen, in ossl_pkcs5_pbkdf2_hmac_ex() argument 37 passlen = 0; in ossl_pkcs5_pbkdf2_hmac_ex() 38 } else if (passlen == -1) { in ossl_pkcs5_pbkdf2_hmac_ex() 39 passlen = strlen(pass); in ossl_pkcs5_pbkdf2_hmac_ex() 52 (char *)pass, (size_t)passlen); in ossl_pkcs5_pbkdf2_hmac_ex() 68 0, passlen, pass, passlen); in ossl_pkcs5_pbkdf2_hmac_ex() 92 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, in PKCS5_PBKDF2_HMAC_SHA1() argument 100 r = ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1() 173 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS5_v2_PBE_keyivgen() argument 181 int passlen, ASN1_TYPE *param, in PKCS5_v2_PBKDF2_keyivgen_ex() argument [all …]
|
H A D | p5_crpt.c | 26 int PKCS5_PBE_keyivgen_ex(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen_ex() argument 76 passlen = 0; in PKCS5_PBE_keyivgen_ex() 77 else if (passlen == -1) in PKCS5_PBE_keyivgen_ex() 78 passlen = strlen(pass); in PKCS5_PBE_keyivgen_ex() 90 (char *)pass, (size_t)passlen); in PKCS5_PBE_keyivgen_ex() 113 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen() argument 117 return PKCS5_PBE_keyivgen_ex(cctx, pass, passlen, param, cipher, md, en_de, in PKCS5_PBE_keyivgen()
|
H A D | pbe_scrypt.c | 37 int EVP_PBE_scrypt_ex(const char *pass, size_t passlen, in EVP_PBE_scrypt_ex() argument 57 passlen = 0; in EVP_PBE_scrypt_ex() 75 passlen); in EVP_PBE_scrypt_ex() 90 int EVP_PBE_scrypt(const char *pass, size_t passlen, in EVP_PBE_scrypt() argument 95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem, in EVP_PBE_scrypt()
|
H A D | evp_pbe.c | 96 int EVP_PBE_CipherInit_ex(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, in EVP_PBE_CipherInit_ex() argument 122 passlen = 0; in EVP_PBE_CipherInit_ex() 123 else if (passlen == -1) in EVP_PBE_CipherInit_ex() 124 passlen = strlen(pass); in EVP_PBE_CipherInit_ex() 158 ret = keygen_ex(ctx, pass, passlen, param, cipher, md, en_de, libctx, propq); in EVP_PBE_CipherInit_ex() 160 ret = keygen(ctx, pass, passlen, param, cipher, md, en_de); in EVP_PBE_CipherInit_ex() 169 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, in EVP_PBE_CipherInit() argument 172 return EVP_PBE_CipherInit_ex(pbe_obj, pass, passlen, param, ctx, en_de, NULL, NULL); in EVP_PBE_CipherInit()
|
/openssl/include/openssl/ |
H A D | pkcs12.h.in | 130 int passlen, 146 int passlen); 163 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, 165 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, 179 int passlen); 206 const char *pass, int passlen, 211 const char *pass, int passlen, 217 const char *pass, int passlen, 220 const char *pass, int passlen, 266 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, [all …]
|
/openssl/doc/man3/ |
H A D | PKCS8_encrypt.pod | 13 int passlen); 15 int passlen, OSSL_LIB_CTX *ctx, 18 const char *pass, int passlen, unsigned char *salt, 21 const char *pass, int passlen, unsigned char *salt, 24 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, 26 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, 33 the password I<pass> of length I<passlen>, salt I<salt> of length I<saltlen> 39 I<p8> using the password I<pass> of length I<passlen> along with algorithm 43 using the password I<pass> of length I<passlen> and parameters I<pbe>.
|
H A D | PKCS12_item_decrypt_d2i.pod | 14 const char *pass, int passlen, 17 const char *pass, int passlen, 23 const char *pass, int passlen, 27 const char *pass, int passlen, 36 password I<pass> of length I<passlen>. If I<zbuf> is nonzero then the output 41 I<passlen>, returning an encoded object in I<obj>. If I<zbuf> is nonzero then
|
H A D | PKCS12_PBE_keyivgen.pod | 12 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 15 int PKCS12_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 20 const char *pass, int passlen, 25 const char *pass, int passlen, 34 length I<passlen>, parameters I<param> and a message digest function I<md_type> 44 based on the algorithm in I<algor> and password I<pass> of length I<passlen>. 53 I<pass> is the password used in the derivation of length I<passlen>. I<pass> 54 is an optional parameter and can be NULL. If I<passlen> is -1, then the
|
H A D | PKCS12_key_gen_utf8_ex.pod | 13 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 16 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, 20 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, 23 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, 27 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, 30 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, 38 with an input password I<pass> of length I<passlen>, a salt I<salt> of length 79 I<pass> is the password used in the derivation of length I<passlen>. I<pass> 80 is an optional parameter and can be NULL. If I<passlen> is -1, then the
|
H A D | PKCS5_PBE_keyivgen.pod | 17 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 20 int PKCS5_PBE_keyivgen_ex(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, 24 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 27 int PKCS5_v2_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, 31 int EVP_PBE_scrypt(const char *pass, size_t passlen, 35 int EVP_PBE_scrypt_ex(const char *pass, size_t passlen, 41 int passlen, ASN1_TYPE *param, 44 int passlen, ASN1_TYPE *param, 87 length I<passlen>, parameters I<param> and a message digest function I<md_type> 92 I<pass> is an optional parameter and can be NULL. If I<passlen> is -1, then the
|
H A D | PKCS12_decrypt_skey.pod | 13 const char *pass, int passlen); 15 const char *pass, int passlen, 22 using the supplied password I<pass> of length I<passlen>.
|
H A D | PKCS5_PBKDF2_HMAC.pod | 11 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, 16 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, 25 B<pass> is the password used in the derivation of length B<passlen>. B<pass> 26 is an optional parameter and can be NULL. If B<passlen> is -1, then the
|
H A D | PKCS12_pack_p7encdata.pod | 12 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 15 PKCS7 *PKCS12_pack_p7encdata_ex(int pbe_nid, const char *pass, int passlen, 27 The password I<pass> of length I<passlen>, salt I<salt> of length I<saltlen>
|
H A D | PKCS12_gen_mac.pod | 13 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 15 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); 16 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 19 int PKCS12_set_pbmac1_pbkdf2(PKCS12 *p12, const char *pass, int passlen,
|
/openssl/crypto/cms/ |
H A D | cms_pwri.c | 23 unsigned char *pass, ossl_ssize_t passlen) in CMS_RecipientInfo_set0_password() argument 33 if (pass && passlen < 0) in CMS_RecipientInfo_set0_password() 34 passlen = strlen((char *)pass); in CMS_RecipientInfo_set0_password() 35 pwri->passlen = passlen; in CMS_RecipientInfo_set0_password() 43 ossl_ssize_t passlen, in CMS_add0_recipient_password() argument 176 CMS_RecipientInfo_set0_password(ri, pass, passlen); in CMS_add0_recipient_password() 372 (char *)pwri->pass, pwri->passlen, in ossl_cms_RecipientInfo_pwri_crypt()
|
/openssl/crypto/asn1/ |
H A D | p5_scrypt.c | 237 int passlen, ASN1_TYPE *param, in PKCS5_v2_scrypt_keyivgen_ex() argument 293 if (EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, 0, key, in PKCS5_v2_scrypt_keyivgen_ex() 305 int passlen, ASN1_TYPE *param, in PKCS5_v2_scrypt_keyivgen() argument 308 return PKCS5_v2_scrypt_keyivgen_ex(ctx, pass, passlen, param, c, md, en_de, NULL, NULL); in PKCS5_v2_scrypt_keyivgen()
|