/openssl/demos/encode/ |
H A D | ec_encode.c | 29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) in load_key() argument 63 if (passphrase != NULL) { in load_key() 65 (const unsigned char *)passphrase, in load_key() 66 strlen(passphrase)) == 0) { in load_key() 101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) in store_key() argument 121 selection = (passphrase != NULL) in store_key() 143 if (passphrase != NULL) { in store_key() 155 (const unsigned char *)passphrase, in store_key() 156 strlen(passphrase)) == 0) { in store_key()
|
H A D | rsa_encode.c | 29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) in load_key() argument 63 if (passphrase != NULL) { in load_key() 65 (const unsigned char *)passphrase, in load_key() 66 strlen(passphrase)) == 0) { in load_key() 101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) in store_key() argument 121 selection = (passphrase != NULL) in store_key() 143 if (passphrase != NULL) { in store_key() 152 (const unsigned char *)passphrase, in store_key() 153 strlen(passphrase)) == 0) { in store_key()
|
/openssl/doc/man3/ |
H A D | PKCS12_gen_mac.pod | 48 I<pass> is the passphrase to use in the HMAC. I<salt> is the salt value to use, 64 given passphrase. See L<passphrase-encoding(7)> for more information. 80 L<passphrase-encoding(7)>
|
H A D | UI_UTIL_read_pw.pod | 20 UI_UTIL_read_pw_string() asks for a passphrase, using B<prompt> as a 28 verification passphrase. 33 passphrase entry without (0) or with (1) verification.
|
H A D | PEM_bytes_read_bio.pod | 29 the data will be decrypted, waiting on user input to supply a passphrase 31 the decryption passphrase, if applicable. 71 L<passphrase-encoding(7)>
|
H A D | PKCS12_add_cert.pod | 35 algorithm, using I<pass> as the passphrase and I<iter> as the iteration count. If 54 See L<passphrase-encoding(7)> for more information.
|
H A D | PKCS12_add_safe.pod | 33 contentInfo is created. The algorithm uses I<pass> as the passphrase and I<iter> 58 See L<passphrase-encoding(7)> for more information.
|
H A D | PKCS12_SAFEBAG_create_cert.pod | 58 passphrase and I<iter> is the iteration count. If I<iter> is zero then a default 69 See L<passphrase-encoding(7)> for more information.
|
H A D | PEM_X509_INFO_read_bio_ex.pod | 52 See L<PEM_read_bio_PrivateKey(3)> and L<passphrase-encoding(7)> for details. 67 L<passphrase-encoding(7)>
|
H A D | PKCS12_parse.pod | 18 B<p12> is the B<PKCS12> structure to parse. B<pass> is the passphrase to use. 66 L<passphrase-encoding(7)>
|
H A D | PEM_read_bio_PrivateKey.pod | 348 I<klen> bytes at I<kstr> are used as the passphrase and I<cb> is 353 to use as the passphrase. If both I<cb> and I<u> are NULL then the 355 passphrase on the current terminal with echoing turned off. 357 The default passphrase callback is sometimes inappropriate (for example 363 I<buf> is the buffer to write the passphrase to. I<size> is the maximum 364 length of the passphrase (i.e. the size of buf). I<rwflag> is a flag 366 will ask the user to verify the passphrase (for example by prompting 371 I<must> return the number of characters in the passphrase or -1 if 372 an error occurred. The passphrase can be arbitrary data; in the case where it 561 L<passphrase-encoding(7)>
|
H A D | PKCS12_create.pod | 30 I<pass> is the passphrase to use. I<name> is the B<friendlyName> to use for 98 See L<passphrase-encoding(7)> for more information. 116 L<passphrase-encoding(7)>
|
H A D | PKCS12_init.pod | 33 L<passphrase-encoding(7)>
|
H A D | d2i_PKCS8PrivateKey_bio.pod | 63 L<passphrase-encoding(7)>
|
H A D | OSSL_CALLBACK.pod | 41 user for a passphrase. When calling this callback function, a buffer to
|
H A D | OSSL_STORE_open.pod | 142 See L<passphrase-encoding(7)> for further information. 166 L<passphrase-encoding(7)>
|
/openssl/crypto/ |
H A D | passphrase.c | 34 const unsigned char *passphrase, in ossl_pw_set_passphrase() argument 37 if (!ossl_assert(data != NULL && passphrase != NULL)) { in ossl_pw_set_passphrase() 44 passphrase_len != 0 ? OPENSSL_memdup(passphrase, passphrase_len) in ossl_pw_set_passphrase()
|
/openssl/include/internal/ |
H A D | passphrase.h | 91 const unsigned char *passphrase,
|
/openssl/doc/man7/ |
H A D | ossl_store-file.pod | 56 See L<passphrase-encoding(7)> for more information. 60 L<ossl_store(7)>, L<passphrase-encoding(7)>
|
H A D | provider-storemgmt.pod | 109 case a passphrase needs to be prompted to unlock an object, I<pw_cb> should 129 case a passphrase needs to be prompted to remove an object, I<pw_cb> should be 136 callback that can be used to request a passphrase in cases where the whole
|
/openssl/doc/man1/ |
H A D | openssl-gendsa.pod.in | 52 The passphrase used for the output file. 53 See L<openssl-passphrase-options(1)>.
|
H A D | openssl-passphrase-options.pod | 5 openssl-passphrase-options - Pass phrase options 25 L<passphrase-encoding(7)>.
|
H A D | tsget.pod | 86 file can optionally be protected by a passphrase. The B<-c> option must also 91 (HTTPS) Specifies the passphrase for the private key specified by the B<-k> 92 argument. If this option is omitted and the key is passphrase protected, 169 client authentication (it will ask for the passphrase if F<client_key.pem> is
|
/openssl/engines/ |
H A D | e_loader_attic.txt | 13 ATTIC_R_PASSPHRASE_CALLBACK_ERROR:104:passphrase callback error
|
/openssl/test/ |
H A D | provider_pkey_test.c | 365 const char *passphrase = FAKE_PASSPHRASE; in fake_pw_read_string() local 368 UI_set_result(ui, uis, passphrase); in fake_pw_read_string()
|