/dovecot/src/auth/ |
H A D | password-scheme-sodium.c | 66 const unsigned char *raw_password, size_t size, 69 const char *passwd = t_strndup(raw_password, size); 65 verify_argon2(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED, const unsigned char *raw_password, size_t size, const char **error_r ATTR_UNUSED) argument
|
H A D | test-libpassword.c | 40 const unsigned char *raw_password; local 47 test_assert(password_decode(crypted, scheme, &raw_password, &siz, &error) == 1); 48 test_assert(password_verify(plaintext, ¶ms, scheme, raw_password, siz, &error) == 1); 53 test_assert(password_decode(crypted, scheme, &raw_password, &siz, &error) == 1); 54 test_assert(password_verify(plaintext, ¶ms, scheme, raw_password, siz, &error) == 1); 75 const unsigned char *raw_password; local 83 test_assert(password_decode(crypted, scheme, &raw_password, &siz, &error) == 1); 84 test_assert(password_verify(plaintext, ¶ms, scheme, raw_password, siz, &error) == 0); 89 test_assert(password_decode(crypted, scheme, &raw_password, &siz, &error) == 0);
|
H A D | password-scheme-pbkdf2.c | 51 const unsigned char *raw_password, size_t size, 61 if (size < 3 || memcmp(raw_password, "$1$", 3) != 0) { 66 fields = t_strsplit(t_strndup(raw_password + 3, size - 3), "$"); 50 pbkdf2_verify(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED, const unsigned char *raw_password, size_t size, const char **error_r) argument
|
H A D | password-scheme-crypt.c | 67 const unsigned char *raw_password, size_t size, 78 password = t_strndup(raw_password, size); 66 crypt_verify_blowfish(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED, const unsigned char *raw_password, size_t size, const char **error_r) argument
|
H A D | password-scheme-scram.c | 94 const unsigned char *raw_password, size_t size, 109 if (scram_sha1_scheme_parse(raw_password, size, &iter_count, 93 scram_sha1_verify(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED, const unsigned char *raw_password, size_t size, const char **error_r) argument
|
H A D | password-scheme.c | 67 const char *scheme, const unsigned char *raw_password, 83 ret = s->password_verify(plaintext, params, raw_password, size, 91 mem_equals_timing_safe(generated, raw_password, size) ? 1 : 0; 221 const unsigned char *raw_password; local 230 s->password_generate(plaintext, params, &raw_password, &size); 233 *password_r = t_strndup(raw_password, size); 237 base64_encode(raw_password, size, str); 241 *password_r = binary_to_hex(raw_password, size); 288 const unsigned char *raw_password; local 295 &raw_password, 65 password_verify(const char *plaintext, const struct password_generate_params *params, const char *scheme, const unsigned char *raw_password, size_t size, const char **error_r) argument 309 crypt_verify(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED, const unsigned char *raw_password, size_t size, const char **error_r) argument 337 md5_verify(const char *plaintext, const struct password_generate_params *params, const unsigned char *raw_password, size_t size, const char **error_r) argument 360 md5_crypt_verify(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED, const unsigned char *raw_password, size_t size, const char **error_r ATTR_UNUSED) argument 449 ssha_verify(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED, const unsigned char *raw_password, size_t size, const char **error_r) argument 490 ssha256_verify(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED, const unsigned char *raw_password, size_t size, const char **error_r) argument 533 ssha512_verify(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED, const unsigned char *raw_password, size_t size, const char **error_r) argument 576 smd5_verify(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED, const unsigned char *raw_password, size_t size, const char **error_r) argument 605 plain_verify(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED, const unsigned char *raw_password, size_t size, const char **error_r ATTR_UNUSED) argument 617 plain_trunc_verify(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED, const unsigned char *raw_password, size_t size, const char **error_r) argument 746 otp_verify(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED, const unsigned char *raw_password, size_t size, const char **error_r) argument [all...] |
H A D | auth-request.c | 2524 const unsigned char *raw_password; local 2548 &raw_password, &raw_password_size, &error); 2565 scheme, raw_password, raw_password_size, &error);
|
/dovecot/src/doveadm/ |
H A D | doveadm-pw.c | 111 const unsigned char *raw_password; local 122 if (password_decode(hash, scheme, &raw_password, &size, 127 raw_password, size, &error) <= 0) {
|