Home
last modified time | relevance | path

Searched refs:salt (Results 51 – 75 of 137) sorted by relevance

123456

/openssl/providers/implementations/digests/
H A Dblake2s_prov.c86 memset(P->salt, 0, sizeof(P->salt)); in ossl_blake2s_param_init()
107 void ossl_blake2s_param_set_salt(BLAKE2S_PARAM *P, const uint8_t *salt, in ossl_blake2s_param_set_salt() argument
110 memcpy(P->salt, salt, len); in ossl_blake2s_param_set_salt()
111 memset(P->salt + len, 0, BLAKE2S_SALTBYTES - len);} in ossl_blake2s_param_set_salt()
/openssl/doc/man1/
H A Dopenssl-enc.pod.in27 [B<-S> I<salt>]
28 [B<-salt>]
144 Set the salt length to use when using the B<-pbkdf2> option.
148 and a fixed salt length of 8 is used. The salt length used when
157 =item B<-salt>
159 Use salt (randomly generated or provide with B<-S> option) when
162 =item B<-S> I<salt>
166 again during decryption. This salt may be truncated or zero padded to
167 match the salt length (See B<-saltlen>).
281 is expected to not have a prepended salt value.
[all …]
/openssl/doc/man7/
H A DEVP_KDF-PBKDF1.pod14 using a salt and iteration count.
29 =item "salt" (B<OSSL_KDF_PARAM_SALT>) <octet string>
46 encryption algorithm from a password in the "pass", a salt in "salt",
H A DEVP_KDF-PKCS12KDF.pod15 using a salt, iteration count and the intended usage.
30 =item "salt" (B<OSSL_KDF_PARAM_SALT>) <octet string>
53 encryption algorithm from a password in the "pass", a salt in "salt",
H A DEVP_KDF-HKDF.pod35 =item "salt" (B<OSSL_KDF_PARAM_SALT>) <octet string>
59 In this mode the digest, key, salt and info values must be set before a key is
69 The digest, key and salt values must be set before a key is derived otherwise
124 salt value "salt" and info value "label":
142 "salt", (size_t)4);
H A DEVP_SIGNATURE-RSA.pod111 The "pss" mode minimum salt length. The value can either be an integer,
122 Use the maximum salt length.
126 Auto detect the salt length.
130 Auto detect the salt length when verifying. Maximize the salt length up to the
152 verification if salt length (B<OSSL_SIGNATURE_PARAM_PSS_SALTLEN>) is not between
/openssl/doc/man3/
H A DEVP_BytesToKey.pod12 const unsigned char *salt,
20 The B<salt> parameter is used as a salt in the derivation: it should point to
21 an 8 byte buffer or NULL if no salt is used. B<data> is a buffer containing
47 D_i = HASH^count(D_(i-1) || data || salt)
H A DEVP_PKEY_CTX_set_scrypt_N.pod16 int EVP_PKEY_CTX_set1_scrypt_salt(EVP_PKEY_CTX *pctx, unsigned char *salt,
34 EVP_PKEY_CTX_set1_scrypt_salt() sets the B<saltlen> bytes long salt
49 Similarly, the B<salt> can either be specified using the B<type>
50 parameter "salt" or in hex encoding by using the "hexsalt" parameter.
H A DPKCS8_encrypt.pod18 const char *pass, int passlen, unsigned char *salt,
21 const char *pass, int passlen, unsigned char *salt,
33 the password I<pass> of length I<passlen>, salt I<salt> of length I<saltlen>
H A DEVP_PKEY_CTX_set_rsa_pss_keygen_md.pod38 The EVP_PKEY_CTX_set_rsa_pss_saltlen() macro is used to set the salt length.
40 made to set the salt length below the minimum value. It is otherwise similar
41 to the B<RSA> operation except detection of the salt length (using
59 parameters are restricted. For example, setting a minimum salt length also
74 EVP_PKEY_CTX_set_rsa_pss_keygen_saltlen() restricts the minimum salt length
H A DPKCS12_SAFEBAG_create_cert.pod24 unsigned char *salt,
30 unsigned char *salt,
59 value of 2048 is used. If I<salt> is NULL then a salt is generated randomly.
H A DPKCS12_PBE_keyivgen.pod57 I<salt> is the salt used in the derivation of length I<saltlen>. If the
58 I<salt> is NULL, then I<saltlen> must be 0. The function will not
59 attempt to calculate the length of the I<salt> because it is not assumed to
/openssl/crypto/pkcs12/
H A Dp12_add.c95 unsigned char *salt, int saltlen, int iter, in PKCS12_pack_p7encdata_ex() argument
120 pbe = PKCS5_pbe2_set_iv_ex(pbe_ciph, iter, salt, saltlen, NULL, -1, ctx); in PKCS12_pack_p7encdata_ex()
122 pbe = PKCS5_pbe_set_ex(pbe_nid, iter, salt, saltlen, ctx); in PKCS12_pack_p7encdata_ex()
149 unsigned char *salt, int saltlen, int iter, in PKCS12_pack_p7encdata() argument
152 return PKCS12_pack_p7encdata_ex(pbe_nid, pass, passlen, salt, saltlen, in PKCS12_pack_p7encdata()
H A Dp12_sbag.c241 unsigned char *salt, in PKCS12_SAFEBAG_create_pkcs8_encrypt_ex() argument
261 p8 = PKCS8_encrypt_ex(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, in PKCS12_SAFEBAG_create_pkcs8_encrypt_ex()
278 unsigned char *salt, in PKCS12_SAFEBAG_create_pkcs8_encrypt() argument
283 salt, saltlen, iter, p8inf, in PKCS12_SAFEBAG_create_pkcs8_encrypt()
/openssl/crypto/hpke/
H A Dhpke_util.c249 const unsigned char *salt, size_t saltlen, in kdf_derive() argument
257 if (salt != NULL) in kdf_derive()
259 (char *)salt, saltlen); in kdf_derive()
275 const unsigned char *salt, size_t saltlen, in ossl_hpke_kdf_extract() argument
279 salt, saltlen, ikm, ikmlen, NULL, 0); in ossl_hpke_kdf_extract()
297 const unsigned char *salt, size_t saltlen, in ossl_hpke_labeled_extract() argument
333 ret = ossl_hpke_kdf_extract(kctx, prk, prklen, salt, saltlen, in ossl_hpke_labeled_extract()
/openssl/providers/common/
H A Dprovider_seeding.c107 const void *salt, size_t salt_len) in ossl_prov_get_nonce() argument
112 return c_get_user_nonce(handle, pout, min_len, max_len, salt, salt_len); in ossl_prov_get_nonce()
114 return c_get_nonce(handle, pout, min_len, max_len, salt, salt_len); in ossl_prov_get_nonce()
/openssl/crypto/evp/
H A Devp_key.c79 const unsigned char *salt, const unsigned char *data, in EVP_BytesToKey() argument
107 if (salt != NULL) in EVP_BytesToKey()
108 if (!EVP_DigestUpdate(c, salt, PKCS5_SALT_LEN)) in EVP_BytesToKey()
/openssl/apps/
H A Dpasswd.c96 char *infile = NULL, *salt = NULL, *passwd = NULL, **passwds = NULL; in passwd_main() local
169 salt = opt_arg(); in passwd_main()
262 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, bio_out, in passwd_main()
286 (passed_salt, &salt, &salt_malloc, passwd, bio_out, quiet, in passwd_main()
314 static char *md5crypt(const char *passwd, const char *magic, const char *salt) in md5crypt() argument
339 OPENSSL_strlcpy(ascii_salt, salt, sizeof(ascii_salt)); in md5crypt()
496 static char *shacrypt(const char *passwd, const char *magic, const char *salt) in shacrypt() argument
547 if (strncmp(salt, rounds_prefix, sizeof(rounds_prefix) - 1) == 0) { in shacrypt()
548 const char *num = salt + sizeof(rounds_prefix) - 1; in shacrypt()
552 salt = endp + 1; in shacrypt()
[all …]
H A Denc.c137 unsigned char *buff = NULL, salt[EVP_MAX_IV_LENGTH]; in enc_main() local
302 if (saltlen > (int)sizeof(salt)) in enc_main()
303 saltlen = (int)sizeof(salt); in enc_main()
510 if (hsalt != NULL && !set_hex(hsalt, salt, saltlen)) { in enc_main()
516 if (RAND_bytes(salt, saltlen) <= 0) { in enc_main()
528 (char *)salt, in enc_main()
541 if (BIO_read(rbio, salt, in enc_main()
552 sptr = salt; in enc_main()
663 printf("%02X", salt[i]); in enc_main()
/openssl/test/recipes/30-test_evp_data/
H A Devpkdf_tls13_kdf.txt49 Ctrl.salt = hexsalt:153b6394a9c03cf3f5accc6e455a7693281138a1bcfa3803c26735dd1194d216
75 Ctrl.salt = hexsalt:cbb0740fd37e5eff32b76cf88511eb83fc9694da4130ca48de754c7f80f561bd
145 Ctrl.salt = hexsalt:33ad0a1c607ec03b09e6cd9893680ce210adf300aa1f2660e1b22e10f170f92a
171 Ctrl.salt = hexsalt:7a6d31fe71da649e8e8168a42c5ab12c668f39499df77bc94405853530b85702
241 Ctrl.salt = hexsalt:33ad0a1c607ec03b09e6cd9893680ce210adf300aa1f2660e1b22e10f170f92a
267 Ctrl.salt = hexsalt:18420b91716670f5330e9281ff0816663cb16de070ce6d0378fddbbf2e3d2284
337 Ctrl.salt = hexsalt:33ad0a1c607ec03b09e6cd9893680ce210adf300aa1f2660e1b22e10f170f92a
363 Ctrl.salt = hexsalt:bb6ebdf3a3790704ba46b29277e0f699cc8d4eb0320c922c4537e3d2897dda7b
433 Ctrl.salt = hexsalt:33ad0a1c607ec03b09e6cd9893680ce210adf300aa1f2660e1b22e10f170f92a
459 Ctrl.salt = hexsalt:ab43c87709e09c9acbdaad583da6fe1e8e6756a43fddf59382113981a33621b1
[all …]
/openssl/include/crypto/
H A Drand.h123 const void *salt, size_t salt_len);
126 const void *salt, size_t salt_len);
/openssl/test/
H A Devp_kdf_test.c194 size_t keylen, char *salt, char *info) in construct_hkdf_params() argument
206 salt, strlen(salt)); in construct_hkdf_params()
488 (unsigned char *)salt, strlen(salt)); in construct_pbkdf1_params()
608 (unsigned char *)salt, strlen(salt)); in construct_pbkdf2_params()
1120 size_t keylen, char *salt, char *info, int *r) in construct_kbkdf_params() argument
1137 OSSL_KDF_PARAM_SALT, salt, strlen(salt)); in construct_kbkdf_params()
1600 static unsigned char salt[] = { in test_kdf_ss_hmac() local
1616 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SALT, salt, in test_kdf_ss_hmac()
1617 sizeof(salt)); in test_kdf_ss_hmac()
1642 static unsigned char salt[] = { in test_kdf_ss_kmac() local
[all …]
/openssl/include/internal/
H A Dhpke_util.h73 const unsigned char *salt, size_t saltlen,
83 const unsigned char *salt, size_t saltlen,
/openssl/doc/internal/man3/
H A Dossl_rand_get_entropy.pod27 size_t max_len, const void *salt, size_t salt_len);
30 const void *salt, size_t salt_len);
57 ossl_rand_get_nonce() retrieves a nonce using the passed I<salt> parameter
59 The I<salt> should contain uniquely identifying information and this is
/openssl/include/openssl/
H A Dsrp.h.in119 char *SRP_create_verifier_ex(const char *user, const char *pass, char **salt,
123 char *SRP_create_verifier(const char *user, const char *pass, char **salt,
126 int SRP_create_verifier_BN_ex(const char *user, const char *pass, BIGNUM **salt,
131 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt,

Completed in 116 milliseconds

123456