hex and base64 encoded passwords. */
unsigned int raw_password_len;
- int (*password_verify)(const char *plaintext, const struct password_generate_params *params,
+ int (*password_verify)(const char *plaintext,
+ const struct password_generate_params *params,
const unsigned char *raw_password, size_t size,
const char **error_r);
- void (*password_generate)(const char *plaintext, const struct password_generate_params *params,
+ void (*password_generate)(const char *plaintext,
+ const struct password_generate_params *params,
const unsigned char **raw_password_r,
size_t *size_r);
};
/* Returns 1 = matched, 0 = didn't match, -1 = unknown scheme or invalid
raw_password */
-int password_verify(const char *plaintext, const struct password_generate_params *params,
- const char *scheme, const unsigned char *raw_password, size_t size,
+int password_verify(const char *plaintext,
+ const struct password_generate_params *params,
+ const char *scheme,
+ const unsigned char *raw_password, size_t size,
const char **error_r);
/* Extracts scheme from password, or returns NULL if it isn't found.
/* Create password with wanted scheme out of plaintext password and username.
Potential base64/hex directives are ignored in scheme. Returns FALSE if
the scheme is unknown. */
-bool password_generate(const char *plaintext, const struct password_generate_params *params,
+bool password_generate(const char *plaintext,
+ const struct password_generate_params *params,
const char *scheme,
const unsigned char **raw_password_r, size_t *size_r);
/* Like above, but generate encoded passwords. If hex/base64 directive isn't
specified in the scheme, the default encoding for the scheme is used.
Returns FALSE if the scheme is unknown. */
-bool password_generate_encoded(const char *plaintext, const struct password_generate_params *params,
+bool password_generate_encoded(const char *plaintext,
+ const struct password_generate_params *params,
const char *scheme, const char **password_r);
/* Returns TRUE if schemes are equivalent. */
ATTR_NULL(2);
void password_generate_rpa(const char *pw, unsigned char result[]);
-int crypt_verify(const char *plaintext, const struct password_generate_params *params,
+int crypt_verify(const char *plaintext,
+ const struct password_generate_params *params,
const unsigned char *raw_password, size_t size,
const char **error_r);
unsigned int *iter_count_r, const char **salt_r,
unsigned char stored_key_r[],
unsigned char server_key_r[], const char **error_r);
-int scram_sha1_verify(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED,
+int scram_sha1_verify(const char *plaintext,
+ const struct password_generate_params *params ATTR_UNUSED,
const unsigned char *raw_password, size_t size,
const char **error_r ATTR_UNUSED);
-void scram_sha1_generate(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED,
+void scram_sha1_generate(const char *plaintext,
+ const struct password_generate_params *params ATTR_UNUSED,
const unsigned char **raw_password_r, size_t *size_r);
-void pbkdf2_generate(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED,
+
+void pbkdf2_generate(const char *plaintext,
+ const struct password_generate_params *params ATTR_UNUSED,
const unsigned char **raw_password_r, size_t *size_r);
-int pbkdf2_verify(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED,
+int pbkdf2_verify(const char *plaintext,
+ const struct password_generate_params *params ATTR_UNUSED,
const unsigned char *raw_password, size_t size,
const char **error_r);