Home
last modified time | relevance | path

Searched refs:passphrase (Results 1 – 25 of 65) sorted by relevance

123

/openssl/demos/encode/
H A Dec_encode.c29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) in load_key() argument
63 if (passphrase != NULL) { in load_key()
65 (const unsigned char *)passphrase, in load_key()
66 strlen(passphrase)) == 0) { in load_key()
101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) in store_key() argument
121 selection = (passphrase != NULL) in store_key()
143 if (passphrase != NULL) { in store_key()
155 (const unsigned char *)passphrase, in store_key()
156 strlen(passphrase)) == 0) { in store_key()
H A Drsa_encode.c29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) in load_key() argument
63 if (passphrase != NULL) { in load_key()
65 (const unsigned char *)passphrase, in load_key()
66 strlen(passphrase)) == 0) { in load_key()
101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) in store_key() argument
121 selection = (passphrase != NULL) in store_key()
143 if (passphrase != NULL) { in store_key()
152 (const unsigned char *)passphrase, in store_key()
153 strlen(passphrase)) == 0) { in store_key()
/openssl/doc/man3/
H A DPKCS12_gen_mac.pod48 I<pass> is the passphrase to use in the HMAC. I<salt> is the salt value to use,
64 given passphrase. See L<passphrase-encoding(7)> for more information.
80 L<passphrase-encoding(7)>
H A DUI_UTIL_read_pw.pod20 UI_UTIL_read_pw_string() asks for a passphrase, using B<prompt> as a
28 verification passphrase.
33 passphrase entry without (0) or with (1) verification.
H A DPEM_bytes_read_bio.pod29 the data will be decrypted, waiting on user input to supply a passphrase
31 the decryption passphrase, if applicable.
71 L<passphrase-encoding(7)>
H A DPKCS12_add_cert.pod35 algorithm, using I<pass> as the passphrase and I<iter> as the iteration count. If
54 See L<passphrase-encoding(7)> for more information.
H A DPKCS12_add_safe.pod33 contentInfo is created. The algorithm uses I<pass> as the passphrase and I<iter>
58 See L<passphrase-encoding(7)> for more information.
H A DPKCS12_SAFEBAG_create_cert.pod58 passphrase and I<iter> is the iteration count. If I<iter> is zero then a default
69 See L<passphrase-encoding(7)> for more information.
H A DPEM_X509_INFO_read_bio_ex.pod52 See L<PEM_read_bio_PrivateKey(3)> and L<passphrase-encoding(7)> for details.
67 L<passphrase-encoding(7)>
H A DPKCS12_parse.pod18 B<p12> is the B<PKCS12> structure to parse. B<pass> is the passphrase to use.
66 L<passphrase-encoding(7)>
H A DPEM_read_bio_PrivateKey.pod348 I<klen> bytes at I<kstr> are used as the passphrase and I<cb> is
353 to use as the passphrase. If both I<cb> and I<u> are NULL then the
355 passphrase on the current terminal with echoing turned off.
357 The default passphrase callback is sometimes inappropriate (for example
363 I<buf> is the buffer to write the passphrase to. I<size> is the maximum
364 length of the passphrase (i.e. the size of buf). I<rwflag> is a flag
366 will ask the user to verify the passphrase (for example by prompting
371 I<must> return the number of characters in the passphrase or -1 if
372 an error occurred. The passphrase can be arbitrary data; in the case where it
561 L<passphrase-encoding(7)>
H A DPKCS12_create.pod30 I<pass> is the passphrase to use. I<name> is the B<friendlyName> to use for
98 See L<passphrase-encoding(7)> for more information.
116 L<passphrase-encoding(7)>
H A DPKCS12_init.pod33 L<passphrase-encoding(7)>
H A Dd2i_PKCS8PrivateKey_bio.pod63 L<passphrase-encoding(7)>
H A DOSSL_CALLBACK.pod41 user for a passphrase. When calling this callback function, a buffer to
H A DOSSL_STORE_open.pod142 See L<passphrase-encoding(7)> for further information.
166 L<passphrase-encoding(7)>
/openssl/crypto/
H A Dpassphrase.c34 const unsigned char *passphrase, in ossl_pw_set_passphrase() argument
37 if (!ossl_assert(data != NULL && passphrase != NULL)) { in ossl_pw_set_passphrase()
44 passphrase_len != 0 ? OPENSSL_memdup(passphrase, passphrase_len) in ossl_pw_set_passphrase()
/openssl/include/internal/
H A Dpassphrase.h91 const unsigned char *passphrase,
/openssl/doc/man7/
H A Dossl_store-file.pod56 See L<passphrase-encoding(7)> for more information.
60 L<ossl_store(7)>, L<passphrase-encoding(7)>
H A Dprovider-storemgmt.pod109 case a passphrase needs to be prompted to unlock an object, I<pw_cb> should
129 case a passphrase needs to be prompted to remove an object, I<pw_cb> should be
136 callback that can be used to request a passphrase in cases where the whole
/openssl/doc/man1/
H A Dopenssl-gendsa.pod.in52 The passphrase used for the output file.
53 See L<openssl-passphrase-options(1)>.
H A Dopenssl-passphrase-options.pod5 openssl-passphrase-options - Pass phrase options
25 L<passphrase-encoding(7)>.
H A Dtsget.pod86 file can optionally be protected by a passphrase. The B<-c> option must also
91 (HTTPS) Specifies the passphrase for the private key specified by the B<-k>
92 argument. If this option is omitted and the key is passphrase protected,
169 client authentication (it will ask for the passphrase if F<client_key.pem> is
/openssl/engines/
H A De_loader_attic.txt13 ATTIC_R_PASSPHRASE_CALLBACK_ERROR:104:passphrase callback error
/openssl/test/
H A Dprovider_pkey_test.c365 const char *passphrase = FAKE_PASSPHRASE; in fake_pw_read_string() local
368 UI_set_result(ui, uis, passphrase); in fake_pw_read_string()

Completed in 39 milliseconds

123