Home
last modified time | relevance | path

Searched refs:pass (Results 1 – 25 of 242) sorted by relevance

12345678910

/openssl/test/recipes/30-test_evp_data/
H A Devpkdf_pbkdf1.txt18 Ctrl.pass = pass:password
26 Ctrl.pass = pass:password
34 Ctrl.pass = pass:password
42 Ctrl.pass = pass:password
50 Ctrl.pass = pass:password
58 Ctrl.pass = pass:password
66 Ctrl.pass = pass:password
74 Ctrl.pass = pass:password
116 Ctrl.pass = pass:
124 Ctrl.pass = pass:
[all …]
H A Devpkdf_pbkdf2.txt19 Ctrl.pass = pass:password
28 Ctrl.pass = pass:password
37 Ctrl.pass = pass:password
46 Ctrl.pass = pass:password
55 Ctrl.pass = pass:password
64 Ctrl.pass = pass:password
73 Ctrl.pass = pass:password
82 Ctrl.pass = pass:password
186 Ctrl.pass = pass:
195 Ctrl.pass = pass:
[all …]
H A Devppkey_kdf_scrypt.txt17 Ctrl.pass = pass:
25 Ctrl.pass = pass:password
41 Ctrl.pass = pass:password
49 Ctrl.pass = pass:pleaseletmein
58 Ctrl.pass = pass:pleaseletmein
H A Devpkdf_scrypt.txt17 Ctrl.pass = pass:
25 Ctrl.pass = pass:password
41 Ctrl.pass = pass:password
49 Ctrl.pass = pass:pleaseletmein
58 Ctrl.pass = pass:pleaseletmein
H A Devpkdf_argon2.txt8 Ctrl.pass = hexpass:0101010101010101010101010101010101010101010101010101010101010101
18 Ctrl.pass = hexpass:0101010101010101010101010101010101010101010101010101010101010101
29 Ctrl.pass = hexpass:0101010101010101010101010101010101010101010101010101010101010101
39 Ctrl.pass = hexpass:0101010101010101010101010101010101010101010101010101010101010101
45 Ctrl.pass = hexpass:31323334353637383930
57 Ctrl.pass = hexpass:31323334353637383930
64 Ctrl.pass = hexpass:31323334353637383930
72 Ctrl.pass = hexpass:0101010101010101010101010101010101010101010101010101010101010101
89 Ctrl.pass = pass:1234567890
116 Ctrl.pass = hexpass:31323334353637383930
[all …]
H A Devpkdf_pvkkdf.txt19 Ctrl.pass = pass:password
26 Ctrl.pass = pass:password
33 Ctrl.pass = pass:password
/openssl/test/recipes/80-test_cmp_http_data/
H A Dtest_credentials.csv5 0,wrong secret without ref, -section,,BLANK,, -secret,pass:wrong,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,…
6 …ret - correct cert, -section,,BLANK,, -secret,pass:wrong, -cert,signer.crt, -key,signer.p12, -keyp…
13 0,cert missing arg, -section,,BLANK,,BLANK,, -cert,, -key,signer.p12, -keypass,pass:12345,BLANK,,BL…
14 0,key missing arg, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,, -keypass,pass:12345,BLANK,,BLA…
16 0,keypass empty string, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:,…
19 0,wrong keypass, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:123456,B…
21 0,no cert, -section,,BLANK,,BLANK,,BLANK,, -key,signer.p12, -keypass,pass:12345,BLANK,,BLANK,,BLANK…
22 0,no key, -section,,BLANK,,BLANK,, -cert,signer.crt,BLANK,, -keypass,pass:12345,BLANK,,BLANK,,BLANK…
24 0,wrong cert, -section,,BLANK,,BLANK,, -cert,trusted.crt, -key,signer.p12, -keypass,pass:12345,BLAN…
27 0,empty cert file, -section,,BLANK,,BLANK,, -cert,empty.txt, -key,signer.p12, -keypass,pass:12345,B…
[all …]
H A Dtest_enrollment.csv6 0,missing chain, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLA…
8 0,newkey missing arg, -section,, -cmd,ir, -newkey,,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK…
28 1,issuer, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,, -issuer,_CA_DN,BLANK,,BLANK,,B…
31 1,days 1, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,, -days,1,BLANK,,BLANK,,B…
32 1,days 0, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,, -days,0,BLANK,,BLANK,,B…
60 0,popo NONE, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK,,…
72 0,no certout, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK,…
73 0,certout missing arg, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLAN…
75 0,certout too many parameters, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLA…
77 1,no out_trusted, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BL…
[all …]
/openssl/crypto/pkcs12/
H A Dp12_kiss.c17 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
61 if (pass == NULL || *pass == '\0') { in PKCS12_parse()
63 pass = NULL; in PKCS12_parse()
65 pass = ""; in PKCS12_parse()
70 } else if (!PKCS12_verify_mac(p12, pass, -1)) { in PKCS12_parse()
74 } else if (pass == NULL || *pass == '\0') { in PKCS12_parse()
75 pass = NULL; in PKCS12_parse()
85 if (!parse_pk12(p12, pass, -1, pkey, ocerts)) { in PKCS12_parse()
162 if (!parse_bags(bags, pass, passlen, pkey, ocerts, in parse_pk12()
182 pass, passlen, pkey, ocerts, in parse_bags()
[all …]
H A Dp12_key.c19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument
28 if (pass == NULL) { in PKCS12_key_gen_asc_ex()
31 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_asc_ex()
41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument
45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc()
58 if (pass == NULL) { in PKCS12_key_gen_utf8_ex()
61 } else if (!OPENSSL_utf82uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_utf8_ex()
71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument
75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8()
104 pass, passlen); in PKCS12_key_gen_uni_ex()
[all …]
H A Dp12_decr.c20 const char *pass, int passlen, in PKCS12_pbe_crypt_ex() argument
37 if (!EVP_PBE_CipherInit_ex(algor->algorithm, pass, passlen, in PKCS12_pbe_crypt_ex()
122 const char *pass, int passlen, in PKCS12_pbe_crypt() argument
126 return PKCS12_pbe_crypt_ex(algor, pass, passlen, in, inlen, data, datalen, in PKCS12_pbe_crypt()
136 const char *pass, int passlen, in PKCS12_item_decrypt_d2i_ex() argument
146 if (!PKCS12_pbe_crypt_ex(algor, pass, passlen, oct->data, oct->length, in PKCS12_item_decrypt_d2i_ex()
165 const char *pass, int passlen, in PKCS12_item_decrypt_d2i() argument
168 return PKCS12_item_decrypt_d2i_ex(algor, it, pass, passlen, oct, zbuf, in PKCS12_item_decrypt_d2i()
179 const char *pass, int passlen, in PKCS12_item_i2d_encrypt_ex() argument
197 if (!PKCS12_pbe_crypt_ex(algor, pass, passlen, in, inlen, &oct->data, in PKCS12_item_i2d_encrypt_ex()
[all …]
H A Dp12_p8e.c17 const char *pass, int passlen, in PKCS8_encrypt_ex() argument
51 p8 = PKCS8_set0_pbe_ex(pass, passlen, p8inf, pbe, libctx, propq); in PKCS8_encrypt_ex()
61 const char *pass, int passlen, in PKCS8_encrypt() argument
65 return PKCS8_encrypt_ex(pbe_nid, cipher, pass, passlen, salt, saltlen, iter, in PKCS8_encrypt()
69 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, in PKCS8_set0_pbe_ex() argument
78 pass, passlen, p8inf, 1, ctx, propq); in PKCS8_set0_pbe_ex()
96 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, in PKCS8_set0_pbe() argument
99 return PKCS8_set0_pbe_ex(pass, passlen, p8inf, pbe, NULL, NULL); in PKCS8_set0_pbe()
H A Dp12_mutl.c25 static int pkcs12_pbmac1_pbkdf2_key_gen(const char *pass, int passlen,
62 static int pkcs12_gen_gost_mac_key(const char *pass, int passlen, in pkcs12_gen_gost_mac_key() argument
73 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key()
109 const char *pass, int passlen, in PBMAC1_PBKDF2_HMAC() argument
156 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in pkcs12_gen_mac() argument
223 pass, passlen, macalg, key); in pkcs12_gen_mac()
288 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument
295 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument
344 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_set_mac() argument
382 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_pbmac1_pbkdf2_key_gen()
[all …]
H A Dp12_crt.c35 PKCS12 *PKCS12_create_ex2(const char *pass, const char *name, EVP_PKEY *pkey, in PKCS12_create_ex2() argument
111 if (bags && !PKCS12_add_safe_ex(&safes, bags, nid_cert, iter, pass, in PKCS12_create_ex2()
119 bag = PKCS12_add_key_ex(&bags, pkey, keytype, iter, nid_key, pass, in PKCS12_create_ex2()
161 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) in PKCS12_create_ex2()
179 return PKCS12_create_ex2(pass, name, pkey, cert, ca, nid_key, nid_cert, in PKCS12_create_ex()
188 return PKCS12_create_ex(pass, name, pkey, cert, ca, nid_key, nid_cert, in PKCS12_create()
239 int nid_key, const char *pass, in PKCS12_add_key_ex() argument
277 int nid_key, const char *pass) in PKCS12_add_key() argument
279 return PKCS12_add_key_ex(pbags, key, key_usage, iter, nid_key, pass, in PKCS12_add_key()
302 int nid_safe, int iter, const char *pass, in PKCS12_add_safe_ex() argument
[all …]
H A Dp12_p8d.c14 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt_ex(const X509_SIG *p8, const char *pass, in PKCS8_decrypt_ex() argument
23 ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), pass, in PKCS8_decrypt_ex()
27 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(const X509_SIG *p8, const char *pass, in PKCS8_decrypt() argument
30 return PKCS8_decrypt_ex(p8, pass, passlen, NULL, NULL); in PKCS8_decrypt()
H A Dp12_add.c94 PKCS7 *PKCS12_pack_p7encdata_ex(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata_ex() argument
133 PKCS12_item_i2d_encrypt_ex(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, in PKCS12_pack_p7encdata_ex()
148 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata() argument
152 return PKCS12_pack_p7encdata_ex(pbe_nid, pass, passlen, salt, saltlen, in PKCS12_pack_p7encdata()
156 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, in STACK_OF()
169 pass, passlen, in STACK_OF()
175 const char *pass, int passlen, in PKCS12_decrypt_skey_ex() argument
178 return PKCS8_decrypt_ex(bag->value.shkeybag, pass, passlen, ctx, propq); in PKCS12_decrypt_skey_ex()
182 const char *pass, int passlen) in PKCS12_decrypt_skey() argument
184 return PKCS12_decrypt_skey_ex(bag, pass, passlen, NULL, NULL); in PKCS12_decrypt_skey()
H A Dp12_crpt.c23 int PKCS12_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen_ex() argument
51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen_ex()
60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen_ex()
78 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen() argument
82 return PKCS12_PBE_keyivgen_ex(ctx, pass, passlen, param, cipher, md, en_de, in PKCS12_PBE_keyivgen()
/openssl/test/
H A Duitest.c36 char pass[16]; in test_old() local
48 pass, 0, sizeof(pass) - 1) <= 0) in test_old()
61 if (TEST_str_eq(pass, defpass)) in test_old()
78 char pass[16]; in test_new_ui() local
82 if (TEST_int_gt(password_callback(pass, sizeof(pass), 0, &cb_data), 0) in test_new_ui()
83 && TEST_str_eq(pass, cb_data.password)) in test_new_ui()
/openssl/crypto/evp/
H A Dp5_crpt2.c22 int ossl_pkcs5_pbkdf2_hmac_ex(const char *pass, int passlen, in ossl_pkcs5_pbkdf2_hmac_ex() argument
35 if (pass == NULL) { in ossl_pkcs5_pbkdf2_hmac_ex()
36 pass = empty; in ossl_pkcs5_pbkdf2_hmac_ex()
39 passlen = strlen(pass); in ossl_pkcs5_pbkdf2_hmac_ex()
52 (char *)pass, (size_t)passlen); in ossl_pkcs5_pbkdf2_hmac_ex()
68 0, passlen, pass, passlen); in ossl_pkcs5_pbkdf2_hmac_ex()
92 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, in PKCS5_PBKDF2_HMAC_SHA1() argument
100 r = ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1()
173 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS5_v2_PBE_keyivgen() argument
180 int PKCS5_v2_PBKDF2_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, in PKCS5_v2_PBKDF2_keyivgen_ex() argument
[all …]
H A Dpbe_scrypt.c37 int EVP_PBE_scrypt_ex(const char *pass, size_t passlen, in EVP_PBE_scrypt_ex() argument
55 if (pass == NULL) { in EVP_PBE_scrypt_ex()
56 pass = empty; in EVP_PBE_scrypt_ex()
74 (unsigned char *)pass, in EVP_PBE_scrypt_ex()
90 int EVP_PBE_scrypt(const char *pass, size_t passlen, in EVP_PBE_scrypt() argument
95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem, in EVP_PBE_scrypt()
H A Dp5_crpt.c26 int PKCS5_PBE_keyivgen_ex(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen_ex() argument
75 if (pass == NULL) in PKCS5_PBE_keyivgen_ex()
78 passlen = strlen(pass); in PKCS5_PBE_keyivgen_ex()
90 (char *)pass, (size_t)passlen); in PKCS5_PBE_keyivgen_ex()
113 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen() argument
117 return PKCS5_PBE_keyivgen_ex(cctx, pass, passlen, param, cipher, md, en_de, in PKCS5_PBE_keyivgen()
/openssl/doc/man7/
H A Dpassphrase-encoding.pod8 - How diverse parts of OpenSSL treat pass phrases character encoding
12 In a modern world with all sorts of character encodings, the treatment of pass
19 The OpenSSL library doesn't treat pass phrases in any special way as a general
23 ISO-8859-1, that object needs to be decrypted using a pass phrase encoded in
29 PKCS#12 is a bit different regarding pass phrase encoding.
30 The standard stipulates that the pass phrase shall be encoded as an ASN.1
47 Assumes that the pass phrase is encoded in ASCII or ISO-8859-1 and
82 potentially protected with a pass phrase, a PIN or something else.
84 other pass phrase encoding may give undefined results.
114 For creating new pass phrase protected objects, make sure the pass phrase is
[all …]
/openssl/include/openssl/
H A Dpkcs12.h.in163 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen,
165 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen,
206 const char *pass, int passlen,
211 const char *pass, int passlen,
217 const char *pass, int passlen,
220 const char *pass, int passlen,
266 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
269 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
312 int key_nid, const char *pass);
315 int key_nid, const char *pass,
[all …]
/openssl/crypto/
H A Dpassphrase.c116 static int do_ui_passphrase(char *pass, size_t pass_size, size_t *pass_len, in do_ui_passphrase() argument
125 if (!ossl_assert(pass != NULL && pass_size != 0 && pass_len != NULL)) { in do_ui_passphrase()
190 memcpy(pass, ipass, *pass_len); in do_ui_passphrase()
204 int ossl_pw_get_passphrase(char *pass, size_t pass_size, size_t *pass_len, in ossl_pw_get_passphrase() argument
230 memcpy(pass, source, source_len); in ossl_pw_get_passphrase()
241 ret = cb(pass, pass_size, pass_len, params, cbarg); in ossl_pw_get_passphrase()
280 ret = do_ui_passphrase(pass, pass_size, pass_len, prompt_info, verify, in ossl_pw_get_passphrase()
295 OPENSSL_cleanse(pass, *pass_len); in ossl_pw_get_passphrase()
300 memcpy(data->cached_passphrase, pass, *pass_len); in ossl_pw_get_passphrase()
334 int ossl_pw_passphrase_callback_enc(char *pass, size_t pass_size, in ossl_pw_passphrase_callback_enc() argument
[all …]
/openssl/doc/man3/
H A DPKCS8_encrypt.pod12 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(const X509_SIG *p8, const char *pass,
14 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt_ex(const X509_SIG *p8, const char *pass,
18 const char *pass, int passlen, unsigned char *salt,
21 const char *pass, int passlen, unsigned char *salt,
24 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen,
26 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen,
33 the password I<pass> of length I<passlen>, salt I<salt> of length I<saltlen>
39 I<p8> using the password I<pass> of length I<passlen> along with algorithm
43 using the password I<pass> of length I<passlen> and parameters I<pbe>.

Completed in 36 milliseconds

12345678910