/hostap-latest/src/tls/ |
D | tlsv1_cred.c | 307 const char *passwd) in tlsv1_set_key_enc_pem() argument 314 if (passwd == NULL) in tlsv1_set_key_enc_pem() 327 pkey = crypto_private_key_import(der, der_len, passwd); in tlsv1_set_key_enc_pem() 425 const char *passwd) in pkcs12_pkcs8_keybag() argument 430 key = pkcs8_enc_key_import(buf, len, passwd); in pkcs12_pkcs8_keybag() 607 const u8 *buf, size_t len, const char *passwd) in pkcs12_safebag() argument 669 return pkcs12_pkcs8_keybag(cred, value, value_len, passwd); in pkcs12_safebag() 680 const char *passwd) in pkcs12_safecontents() argument 709 if (pkcs12_safebag(cred, hdr.payload, hdr.length, passwd) < 0) in pkcs12_safecontents() 720 const char *passwd) in pkcs12_parse_content_data() argument [all …]
|
D | pkcs5.c | 362 pkcs5_crypto_init_pbes2(struct pkcs5_params *params, const char *passwd) in pkcs5_crypto_init_pbes2() argument 371 passwd, os_strlen(passwd)); in pkcs5_crypto_init_pbes2() 376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 489 pkcs12_crypto_init_sha1(struct pkcs5_params *params, const char *passwd) in pkcs12_crypto_init_sha1() argument 500 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1() 506 WPA_PUT_BE16(&pw[2 * i], passwd[i]); in pkcs12_crypto_init_sha1() 530 const char *passwd) in pkcs5_crypto_init() argument 538 return pkcs5_crypto_init_pbes2(params, passwd); in pkcs5_crypto_init() 541 return pkcs12_crypto_init_sha1(params, passwd); in pkcs5_crypto_init() 546 addr[0] = (const u8 *) passwd; in pkcs5_crypto_init() [all …]
|
D | pkcs8.c | 111 pkcs8_enc_key_import(const u8 *buf, size_t len, const char *passwd) in pkcs8_enc_key_import() argument 119 if (passwd == NULL) in pkcs8_enc_key_import() 159 passwd, &data_len); in pkcs8_enc_key_import()
|
D | pkcs5.h | 14 const char *passwd, size_t *data_len);
|
D | pkcs8.h | 14 pkcs8_enc_key_import(const u8 *buf, size_t len, const char *passwd);
|
/hostap-latest/src/crypto/ |
D | crypto_internal-rsa.c | 40 const char *passwd) in crypto_private_key_import() argument 49 if (passwd) { in crypto_private_key_import() 51 res = pkcs8_enc_key_import(key, len, passwd); in crypto_private_key_import()
|
D | tls_wolfssl.c | 532 char *passwd = NULL; in tls_connection_private_key() local 539 passwd = os_strdup(private_key_passwd); in tls_connection_private_key() 540 if (!passwd) in tls_connection_private_key() 545 wolfSSL_CTX_set_default_passwd_cb_userdata(ctx, passwd); in tls_connection_private_key() 593 os_free(passwd); in tls_connection_private_key() 1431 char *passwd = NULL; in tls_global_private_key() local 1438 passwd = os_strdup(private_key_passwd); in tls_global_private_key() 1439 if (!passwd) in tls_global_private_key() 1444 wolfSSL_CTX_set_default_passwd_cb_userdata(ctx, passwd); in tls_global_private_key() 1456 os_free(passwd); in tls_global_private_key()
|
D | tls_openssl.c | 3581 const char *passwd) in tls_parse_pkcs12() argument 3592 if (!passwd) in tls_parse_pkcs12() 3593 passwd = ""; in tls_parse_pkcs12() 3594 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { in tls_parse_pkcs12() 3712 const char *private_key, const char *passwd) in tls_read_pkcs12() argument 3731 return tls_parse_pkcs12(data, ssl, p12, passwd); in tls_read_pkcs12() 3742 const u8 *blob, size_t len, const char *passwd) in tls_read_pkcs12_blob() argument 3754 return tls_parse_pkcs12(data, ssl, p12, passwd); in tls_read_pkcs12_blob()
|
D | crypto.h | 319 const char *passwd);
|
D | crypto_libtomcrypt.c | 452 const char *passwd) in crypto_private_key_import() argument
|
/hostap-latest/tests/hwsim/vm/ |
D | inside.sh | 80 cat > /etc/passwd <<EOF
|
/hostap-latest/doc/ |
D | ctrl_iface.doxygen | 811 config methods, dev passwd id, request type, [dev name].
|