/external/boringssl/src/crypto/pkcs8/ |
D | internal.h | 71 const char *pass, size_t pass_len, const uint8_t *in, 82 int pkcs12_key_gen(const char *pass, size_t pass_len, const uint8_t *salt, 90 size_t pass_len, const uint8_t *salt, 105 const char *pass, size_t pass_len, CBS *param); 112 const char *pass, size_t pass_len, CBS *param); 119 const char *pass, size_t pass_len,
|
D | pkcs8.c | 109 int pkcs12_key_gen(const char *pass, size_t pass_len, const uint8_t *salt, in pkcs12_key_gen() argument 128 !pkcs12_encode_password(pass, pass_len, &pass_raw, &pass_raw_len)) { in pkcs12_key_gen() 235 const char *pass, size_t pass_len, in pkcs12_pbe_cipher_init() argument 243 if (!pkcs12_key_gen(pass, pass_len, salt, salt_len, PKCS12_KEY_ID, iterations, in pkcs12_pbe_cipher_init() 245 !pkcs12_key_gen(pass, pass_len, salt, salt_len, PKCS12_IV_ID, iterations, in pkcs12_pbe_cipher_init() 259 size_t pass_len, CBS *param) { in pkcs12_pbe_decrypt_init() argument 277 pass_len, CBS_data(&salt), CBS_len(&salt), in pkcs12_pbe_decrypt_init() 335 size_t pass_len, const uint8_t *salt, in pkcs12_pbe_encrypt_init() argument 356 return pkcs12_pbe_cipher_init(suite, ctx, iterations, pass, pass_len, salt, in pkcs12_pbe_encrypt_init() 361 const char *pass, size_t pass_len, const uint8_t *in, in pkcs8_pbe_decrypt() argument [all …]
|
D | p5_pbev2.c | 144 size_t pass_len, const uint8_t *salt, in pkcs5_pbe2_cipher_init() argument 153 int ret = PKCS5_PBKDF2_HMAC_SHA1(pass, pass_len, salt, salt_len, iterations, in pkcs5_pbe2_cipher_init() 162 const char *pass, size_t pass_len, in PKCS5_pbe2_encrypt_init() argument 204 return pkcs5_pbe2_cipher_init(ctx, cipher, iterations, pass, pass_len, salt, in PKCS5_pbe2_encrypt_init() 210 const char *pass, size_t pass_len, CBS *param) { in PKCS5_pbe2_decrypt_init() argument 305 pass_len, CBS_data(&salt), CBS_len(&salt), in PKCS5_pbe2_decrypt_init()
|
D | pkcs8_x509.c | 169 size_t pass_len; in PKCS8_decrypt() local 171 pass_len = strlen(pass); in PKCS8_decrypt() 173 pass_len = (size_t)pass_len_in; in PKCS8_decrypt() 188 pkey = PKCS8_parse_encrypted_private_key(&cbs, pass, pass_len); in PKCS8_decrypt() 204 size_t pass_len; in PKCS8_encrypt() local 206 pass_len = strlen(pass); in PKCS8_encrypt() 208 pass_len = (size_t)pass_len_in; in PKCS8_encrypt() 223 pass_len, salt, salt_len, iterations, in PKCS8_encrypt()
|
/external/boringssl/src/include/openssl/ |
D | pkcs8.h | 86 const char *pass, int pass_len, 96 size_t pass_len, const uint8_t *salt, size_t salt_len, int iterations, 112 int pass_len); 119 size_t pass_len);
|
/external/webrtc/webrtc/base/ |
D | socketadapters.cc | 779 uint8_t ver, user_len, pass_len; in HandleAuth() local 784 !request->ReadUInt8(&pass_len) || in HandleAuth() 785 !request->ReadString(&pass, pass_len)) { in HandleAuth()
|
/external/wpa_supplicant_8/src/common/ |
D | dpp.c | 4256 size_t pass_len; in dpp_configuration_parse() local 4260 pass_len = end ? (size_t) (end - pos) : os_strlen(pos); in dpp_configuration_parse() 4261 pass_len /= 2; in dpp_configuration_parse() 4262 if (pass_len > 63 || pass_len < 8) in dpp_configuration_parse() 4264 conf->passphrase = os_zalloc(pass_len + 1); in dpp_configuration_parse() 4266 hexstr2bin(pos, (u8 *) conf->passphrase, pass_len) < 0) in dpp_configuration_parse()
|