Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 107) sorted by relevance

12345

/openssl/test/ssl-tests/
H A D23-srp.cnf6 test-1 = 1-srp-bad-password
8 test-3 = 3-srp-auth-bad-password
36 SRPPassword = password
40 SRPPassword = password
46 [1-srp-bad-password]
49 [1-srp-bad-password-ssl]
71 SRPPassword = password
106 SRPPassword = password
110 SRPPassword = password
116 [3-srp-auth-bad-password]
[all …]
H A D23-srp.cnf.in24 "SRPPassword" => "password",
32 "SRPPassword" => "password",
40 name => "srp-bad-password",
46 "SRPPassword" => "password",
69 "SRPPassword" => "password",
77 "SRPPassword" => "password",
85 name => "srp-auth-bad-password",
91 "SRPPassword" => "password",
/openssl/doc/man3/
H A DSSL_CTX_set_default_passwd_cb.pod27 SSL_CTX_set_default_passwd_cb() sets the default password callback called
31 which will be provided to the password callback on invocation.
46 password to be used during decryption.
49 B<buf> which is of size B<size>. The actual length of the password must
57 When loading or storing private keys, a password might be supplied to
63 password could be stored into the userdata storage and the
64 callback only returns the password already stored.
66 When asking for the password interactively, the callback can use
68 In this case the password dialog may ask for the same password twice
82 calling function. The password is considered to be a '\0' terminated
[all …]
H A DPKCS12_newpass.pod5 PKCS12_newpass - change the password of a PKCS12 structure
15 PKCS12_newpass() changes the password of a PKCS12 structure.
17 B<p12> is a pointer to a PKCS12 structure. B<oldpass> is the existing password
18 and B<newpass> is the new password.
30 If the PKCS#12 structure does not have a password, then you must use the empty
34 If the wrong password is used for B<oldpass> then the function will fail,
46 This example loads a PKCS#12 file, changes its password and writes out
61 fprintf(stderr, "Usage: pkread p12file password newpass opfile\n");
76 fprintf(stderr, "Error changing password\n");
95 The password format is a NULL terminated ASCII string which is converted to
H A DUI_UTIL_read_pw.pod24 If B<verify> is nonzero, the password will be verified as well.
31 B<UI_METHOD> that wraps a given PEM password callback B<cb>.
44 UI_UTIL_wrap_read_pem_callback() will generate password strings in the
45 encoding that the given password callback generates.
46 The default password prompting functions (apart from
H A DSSL_CTX_set_srp_password.pod29 int SSL_CTX_set_srp_password(SSL_CTX *ctx, char *password);
57 and passwords over unencrypted channels without revealing the password to an
68 The SSL_CTX_set_srp_password() function sets the SRP password for B<ctx>. This
93 The SSL_CTX_set_srp_client_pwd_callback() function sets the client password
98 It should return the client password in text form or NULL to abort the connection.
117 user salt, B<v> the password verifier and B<info> is the optional user info.
120 connection B<s> by generating a random salt and a password verifier.
121 B<user> is the username, B<pass> the password and B<grp> the SRP group parameters
152 const char *password = "password";
159 if (!SSL_CTX_set_srp_password(ctx, password))
[all …]
H A DPKCS5_PBKDF2_HMAC.pod5 PKCS5_PBKDF2_HMAC, PKCS5_PBKDF2_HMAC_SHA1 - password based derivation routines with salt and iterat…
22 PKCS5_PBKDF2_HMAC() derives a key from a password using a salt and iteration count
25 B<pass> is the password used in the derivation of length B<passlen>. B<pass>
48 encryption algorithm from a password in the B<pass>, a salt in B<salt>,
55 These functions make no assumption regarding the given password.
H A DPKCS12_key_gen_utf8_ex.pod38 with an input password I<pass> of length I<passlen>, a salt I<salt> of length
61 The intended format of the supplied password is determined by the method chosen:
67 PKCS12_key_gen_asc() and PKCS12_key_gen_asc_ex() expect an ASCII-formatted password.
71 PKCS12_key_gen_uni() and PKCS12_key_gen_uni_ex() expect a Unicode-formatted password.
75 PKCS12_key_gen_utf8() and PKCS12_key_gen_utf8_ex() expect a UTF-8 encoded password.
79 I<pass> is the password used in the derivation of length I<passlen>. I<pass>
103 encryption algorithm from a password in the I<pass>, a salt in I<salt>,
/openssl/doc/man1/
H A Dopenssl-passphrase-options.pod16 Several OpenSSL commands accept password arguments, typically using B<-passin>
18 the password to be obtained from a variety of sources. Both of these
20 password argument is given and a password is required then the user is
35 =item B<pass:>I<password>
37 The actual password is I<password>. Since the password is visible
43 Obtain the password from the environment variable I<var>. Since
49 Reads the password from the specified file I<pathname>, which can be a regular
54 arguments, the first line will be used for the input password, and the next
55 line will be used for the output password.
59 Reads the password from the file descriptor I<number>. This can be useful for
[all …]
H A Dopenssl-passwd.pod.in6 openssl-passwd - compute password hashes
26 [I<password>]
30 This command computes the hash of a password typed at
31 run-time or the hash of each password in a list. The password list is
45 Use the MD5 based BSD password algorithm B<1> (default).
65 When reading a password from the terminal, this implies B<-noverify>.
77 Don't verify when reading a password from the terminal.
86 to each password hash.
100 % openssl passwd -1 -salt xxxxxxxx password
103 % openssl passwd -apr1 -salt xxxxxxxx password
[all …]
H A Dopenssl-kdf.pod.in25 password.
88 Specifies the password as an alphanumeric string (use if the password contains
90 The password must be specified for PBKDF2 and scrypt.
95 the password is specified in hexadecimal form (two hex digits per byte).
186 Use PBKDF2 to create a hex-encoded derived key from a password and salt:
188 openssl kdf -keylen 32 -kdfopt digest:SHA256 -kdfopt pass:password \
191 Use scrypt to create a hex-encoded derived key from a password and salt:
193 openssl kdf -keylen 64 -kdfopt pass:password -kdfopt salt:NaCl \
H A Dopenssl-enc.pod.in23 [B<-k> I<password>]
84 The password source. For more information about the format of I<arg>
115 =item B<-k> I<password>
122 Read the password to derive the key from the first line of I<filename>.
175 password will be taken. It does not make much sense to specify both key
176 and password.
183 one of the other options, the IV is generated from this password.
246 A password will be prompted for to derive the key and IV if necessary.
443 Encrypt a file using AES-128 using a prompted password
448 Decrypt a file using a supplied password:
[all …]
/openssl/test/recipes/30-test_evp_data/
H A Devppbe_pbkdf2.txt17 Password = "password"
24 Password = "password"
31 Password = "password"
38 Password = "password"
45 Password = "password"
52 Password = "password"
59 Password = "password"
66 Password = "password"
73 Password = "password"
122 Password = "password"
[all …]
H A Devpkdf_pbkdf2.txt19 Ctrl.pass = pass:password
28 Ctrl.pass = pass:password
37 Ctrl.pass = pass:password
46 Ctrl.pass = pass:password
55 Ctrl.pass = pass:password
64 Ctrl.pass = pass:password
73 Ctrl.pass = pass:password
82 Ctrl.pass = pass:password
91 Ctrl.pass = pass:password
148 Ctrl.pass = pass:password
[all …]
H A Devpkdf_pbkdf1.txt18 Ctrl.pass = pass:password
26 Ctrl.pass = pass:password
34 Ctrl.pass = pass:password
42 Ctrl.pass = pass:password
50 Ctrl.pass = pass:password
58 Ctrl.pass = pass:password
66 Ctrl.pass = pass:password
74 Ctrl.pass = pass:password
82 Ctrl.pass = pass:password
H A Devpkdf_pvkkdf.txt19 Ctrl.pass = pass:password
26 Ctrl.pass = pass:password
33 Ctrl.pass = pass:password
/openssl/apps/lib/
H A Dapps_ui.c37 const char *password = in ui_read() local
38 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; in ui_read()
40 if (password != NULL) { in ui_read()
41 UI_set_result(ui, uis, password); in ui_read()
72 const char *password = in ui_write() local
73 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; in ui_write()
75 if (password != NULL) in ui_write()
/openssl/apps/
H A Dsrp.c126 char password[1025]; in srp_verify_user() local
133 cb_tmp.password = passin; in srp_verify_user()
135 len = password_callback(password, sizeof(password)-1, 0, &cb_tmp); in srp_verify_user()
137 password[len] = 0; in srp_verify_user()
143 BIO_printf(bio_err, "Pass %s\n", password); in srp_verify_user()
154 OPENSSL_cleanse(password, len); in srp_verify_user()
163 char password[1025]; in srp_create_user() local
169 cb_tmp.password = passout; in srp_create_user()
171 len = password_callback(password, sizeof(password)-1, 1, &cb_tmp); in srp_create_user()
173 password[len] = 0; in srp_create_user()
[all …]
/openssl/doc/man7/
H A DEVP_KDF-PBKDF1.pod9 Support for computing the B<PBKDF1> password-based KDF through the B<EVP_KDF>
12 The EVP_KDF-PBKDF1 algorithm implements the PBKDF1 password-based key
13 derivation function, as described in RFC 8018; it derives a key from a password
46 encryption algorithm from a password in the "pass", a salt in "salt",
53 No assumption is made regarding the given password; it is simply treated as a
H A DEVP_KDF-PKCS12KDF.pod9 Support for computing the B<PKCS#12> password-based KDF through the B<EVP_KDF>
12 The EVP_KDF-PKCS12KDF algorithm implements the PKCS#12 password-based key
14 Personal Information Exchange Syntax); it derives a key from a password
53 encryption algorithm from a password in the "pass", a salt in "salt",
60 No assumption is made regarding the given password; it is simply treated as a
H A DEVP_KDF-PBKDF2.pod9 Support for computing the B<PBKDF2> password-based KDF through the B<EVP_KDF>
12 The EVP_KDF-PBKDF2 algorithm implements the PBKDF2 password-based key
13 derivation function, as described in SP800-132; it derives a key from a password
79 encryption algorithm from a password in the "pass", a salt in "salt",
86 No assumption is made regarding the given password; it is simply treated as a
/openssl/demos/kdf/
H A Dpbkdf2.c26 static unsigned char password[] = { variable
88 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password, in main()
89 sizeof(password)); in main()
H A Dscrypt.c26 static unsigned char password[] = { variable
90 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password, in main()
91 sizeof(password)); in main()
H A Dargon2.c29 static unsigned char password[] = { variable
120 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password, sizeof(password)); in main()
/openssl/doc/HOWTO/
H A Dkeys.txt26 With this variant, you will be prompted for a protecting password. If
27 you don't want your key to be protected by a password, remove the flag
55 With this variant, you will be prompted for a protecting password. If
56 you don't want your key to be protected by a password, remove the flag
81 With this variant, you will be prompted for a password to protect your key.
82 If you don't want your key to be protected by a password, remove the flag
97 it may be reasonable to avoid protecting it with a password, since
98 otherwise someone would have to type in the password every time the

Completed in 31 milliseconds

12345