/openssl/test/recipes/30-test_evp_data/ |
H A D | evpkdf_pbkdf1.txt | 18 Ctrl.pass = pass:password 26 Ctrl.pass = pass:password 34 Ctrl.pass = pass:password 42 Ctrl.pass = pass:password 50 Ctrl.pass = pass:password 58 Ctrl.pass = pass:password 66 Ctrl.pass = pass:password 74 Ctrl.pass = pass:password 116 Ctrl.pass = pass: 124 Ctrl.pass = pass: [all …]
|
H A D | evpkdf_pbkdf2.txt | 19 Ctrl.pass = pass:password 28 Ctrl.pass = pass:password 37 Ctrl.pass = pass:password 46 Ctrl.pass = pass:password 55 Ctrl.pass = pass:password 64 Ctrl.pass = pass:password 73 Ctrl.pass = pass:password 82 Ctrl.pass = pass:password 186 Ctrl.pass = pass: 195 Ctrl.pass = pass: [all …]
|
H A D | evppkey_kdf_scrypt.txt | 17 Ctrl.pass = pass: 25 Ctrl.pass = pass:password 41 Ctrl.pass = pass:password 49 Ctrl.pass = pass:pleaseletmein 58 Ctrl.pass = pass:pleaseletmein
|
H A D | evpkdf_scrypt.txt | 17 Ctrl.pass = pass: 25 Ctrl.pass = pass:password 41 Ctrl.pass = pass:password 49 Ctrl.pass = pass:pleaseletmein 58 Ctrl.pass = pass:pleaseletmein
|
H A D | evpkdf_argon2.txt | 8 Ctrl.pass = hexpass:0101010101010101010101010101010101010101010101010101010101010101 18 Ctrl.pass = hexpass:0101010101010101010101010101010101010101010101010101010101010101 29 Ctrl.pass = hexpass:0101010101010101010101010101010101010101010101010101010101010101 39 Ctrl.pass = hexpass:0101010101010101010101010101010101010101010101010101010101010101 45 Ctrl.pass = hexpass:31323334353637383930 57 Ctrl.pass = hexpass:31323334353637383930 64 Ctrl.pass = hexpass:31323334353637383930 72 Ctrl.pass = hexpass:0101010101010101010101010101010101010101010101010101010101010101 89 Ctrl.pass = pass:1234567890 116 Ctrl.pass = hexpass:31323334353637383930 [all …]
|
H A D | evpkdf_pvkkdf.txt | 19 Ctrl.pass = pass:password 26 Ctrl.pass = pass:password 33 Ctrl.pass = pass:password
|
/openssl/test/recipes/80-test_cmp_http_data/ |
H A D | test_credentials.csv | 5 0,wrong secret without ref, -section,,BLANK,, -secret,pass:wrong,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,… 6 …ret - correct cert, -section,,BLANK,, -secret,pass:wrong, -cert,signer.crt, -key,signer.p12, -keyp… 13 0,cert missing arg, -section,,BLANK,,BLANK,, -cert,, -key,signer.p12, -keypass,pass:12345,BLANK,,BL… 14 0,key missing arg, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,, -keypass,pass:12345,BLANK,,BLA… 16 0,keypass empty string, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:,… 19 0,wrong keypass, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:123456,B… 21 0,no cert, -section,,BLANK,,BLANK,,BLANK,, -key,signer.p12, -keypass,pass:12345,BLANK,,BLANK,,BLANK… 22 0,no key, -section,,BLANK,,BLANK,, -cert,signer.crt,BLANK,, -keypass,pass:12345,BLANK,,BLANK,,BLANK… 24 0,wrong cert, -section,,BLANK,,BLANK,, -cert,trusted.crt, -key,signer.p12, -keypass,pass:12345,BLAN… 27 0,empty cert file, -section,,BLANK,,BLANK,, -cert,empty.txt, -key,signer.p12, -keypass,pass:12345,B… [all …]
|
H A D | test_enrollment.csv | 6 0,missing chain, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLA… 8 0,newkey missing arg, -section,, -cmd,ir, -newkey,,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK… 28 1,issuer, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,, -issuer,_CA_DN,BLANK,,BLANK,,B… 31 1,days 1, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,, -days,1,BLANK,,BLANK,,B… 32 1,days 0, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,, -days,0,BLANK,,BLANK,,B… 60 0,popo NONE, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK,,… 72 0,no certout, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK,… 73 0,certout missing arg, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLAN… 75 0,certout too many parameters, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLA… 77 1,no out_trusted, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BL… [all …]
|
/openssl/crypto/pkcs12/ |
H A D | p12_kiss.c | 17 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 61 if (pass == NULL || *pass == '\0') { in PKCS12_parse() 63 pass = NULL; in PKCS12_parse() 65 pass = ""; in PKCS12_parse() 70 } else if (!PKCS12_verify_mac(p12, pass, -1)) { in PKCS12_parse() 74 } else if (pass == NULL || *pass == '\0') { in PKCS12_parse() 75 pass = NULL; in PKCS12_parse() 85 if (!parse_pk12(p12, pass, -1, pkey, ocerts)) { in PKCS12_parse() 162 if (!parse_bags(bags, pass, passlen, pkey, ocerts, in parse_pk12() 182 pass, passlen, pkey, ocerts, in parse_bags() [all …]
|
H A D | p12_key.c | 19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument 28 if (pass == NULL) { in PKCS12_key_gen_asc_ex() 31 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_asc_ex() 41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument 45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc() 58 if (pass == NULL) { in PKCS12_key_gen_utf8_ex() 61 } else if (!OPENSSL_utf82uni(pass, passlen, &unipass, &uniplen)) { in PKCS12_key_gen_utf8_ex() 71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument 75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8() 104 pass, passlen); in PKCS12_key_gen_uni_ex() [all …]
|
H A D | p12_decr.c | 20 const char *pass, int passlen, in PKCS12_pbe_crypt_ex() argument 37 if (!EVP_PBE_CipherInit_ex(algor->algorithm, pass, passlen, in PKCS12_pbe_crypt_ex() 122 const char *pass, int passlen, in PKCS12_pbe_crypt() argument 126 return PKCS12_pbe_crypt_ex(algor, pass, passlen, in, inlen, data, datalen, in PKCS12_pbe_crypt() 136 const char *pass, int passlen, in PKCS12_item_decrypt_d2i_ex() argument 146 if (!PKCS12_pbe_crypt_ex(algor, pass, passlen, oct->data, oct->length, in PKCS12_item_decrypt_d2i_ex() 165 const char *pass, int passlen, in PKCS12_item_decrypt_d2i() argument 168 return PKCS12_item_decrypt_d2i_ex(algor, it, pass, passlen, oct, zbuf, in PKCS12_item_decrypt_d2i() 179 const char *pass, int passlen, in PKCS12_item_i2d_encrypt_ex() argument 197 if (!PKCS12_pbe_crypt_ex(algor, pass, passlen, in, inlen, &oct->data, in PKCS12_item_i2d_encrypt_ex() [all …]
|
H A D | p12_p8e.c | 17 const char *pass, int passlen, in PKCS8_encrypt_ex() argument 51 p8 = PKCS8_set0_pbe_ex(pass, passlen, p8inf, pbe, libctx, propq); in PKCS8_encrypt_ex() 61 const char *pass, int passlen, in PKCS8_encrypt() argument 65 return PKCS8_encrypt_ex(pbe_nid, cipher, pass, passlen, salt, saltlen, iter, in PKCS8_encrypt() 69 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, in PKCS8_set0_pbe_ex() argument 78 pass, passlen, p8inf, 1, ctx, propq); in PKCS8_set0_pbe_ex() 96 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, in PKCS8_set0_pbe() argument 99 return PKCS8_set0_pbe_ex(pass, passlen, p8inf, pbe, NULL, NULL); in PKCS8_set0_pbe()
|
H A D | p12_mutl.c | 25 static int pkcs12_pbmac1_pbkdf2_key_gen(const char *pass, int passlen, 62 static int pkcs12_gen_gost_mac_key(const char *pass, int passlen, in pkcs12_gen_gost_mac_key() argument 73 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_gen_gost_mac_key() 109 const char *pass, int passlen, in PBMAC1_PBKDF2_HMAC() argument 156 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in pkcs12_gen_mac() argument 223 pass, passlen, macalg, key); in pkcs12_gen_mac() 288 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_gen_mac() argument 295 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) in PKCS12_verify_mac() argument 344 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, in PKCS12_set_mac() argument 382 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, in pkcs12_pbmac1_pbkdf2_key_gen() [all …]
|
H A D | p12_crt.c | 35 PKCS12 *PKCS12_create_ex2(const char *pass, const char *name, EVP_PKEY *pkey, in PKCS12_create_ex2() argument 111 if (bags && !PKCS12_add_safe_ex(&safes, bags, nid_cert, iter, pass, in PKCS12_create_ex2() 119 bag = PKCS12_add_key_ex(&bags, pkey, keytype, iter, nid_key, pass, in PKCS12_create_ex2() 161 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) in PKCS12_create_ex2() 179 return PKCS12_create_ex2(pass, name, pkey, cert, ca, nid_key, nid_cert, in PKCS12_create_ex() 188 return PKCS12_create_ex(pass, name, pkey, cert, ca, nid_key, nid_cert, in PKCS12_create() 239 int nid_key, const char *pass, in PKCS12_add_key_ex() argument 277 int nid_key, const char *pass) in PKCS12_add_key() argument 279 return PKCS12_add_key_ex(pbags, key, key_usage, iter, nid_key, pass, in PKCS12_add_key() 302 int nid_safe, int iter, const char *pass, in PKCS12_add_safe_ex() argument [all …]
|
H A D | p12_p8d.c | 14 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt_ex(const X509_SIG *p8, const char *pass, in PKCS8_decrypt_ex() argument 23 ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), pass, in PKCS8_decrypt_ex() 27 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(const X509_SIG *p8, const char *pass, in PKCS8_decrypt() argument 30 return PKCS8_decrypt_ex(p8, pass, passlen, NULL, NULL); in PKCS8_decrypt()
|
H A D | p12_add.c | 94 PKCS7 *PKCS12_pack_p7encdata_ex(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata_ex() argument 133 PKCS12_item_i2d_encrypt_ex(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, in PKCS12_pack_p7encdata_ex() 148 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, in PKCS12_pack_p7encdata() argument 152 return PKCS12_pack_p7encdata_ex(pbe_nid, pass, passlen, salt, saltlen, in PKCS12_pack_p7encdata() 156 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, in STACK_OF() 169 pass, passlen, in STACK_OF() 175 const char *pass, int passlen, in PKCS12_decrypt_skey_ex() argument 178 return PKCS8_decrypt_ex(bag->value.shkeybag, pass, passlen, ctx, propq); in PKCS12_decrypt_skey_ex() 182 const char *pass, int passlen) in PKCS12_decrypt_skey() argument 184 return PKCS12_decrypt_skey_ex(bag, pass, passlen, NULL, NULL); in PKCS12_decrypt_skey()
|
H A D | p12_crpt.c | 23 int PKCS12_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen_ex() argument 51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen_ex() 60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen_ex() 78 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS12_PBE_keyivgen() argument 82 return PKCS12_PBE_keyivgen_ex(ctx, pass, passlen, param, cipher, md, en_de, in PKCS12_PBE_keyivgen()
|
/openssl/test/ |
H A D | uitest.c | 36 char pass[16]; in test_old() local 48 pass, 0, sizeof(pass) - 1) <= 0) in test_old() 61 if (TEST_str_eq(pass, defpass)) in test_old() 78 char pass[16]; in test_new_ui() local 82 if (TEST_int_gt(password_callback(pass, sizeof(pass), 0, &cb_data), 0) in test_new_ui() 83 && TEST_str_eq(pass, cb_data.password)) in test_new_ui()
|
/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 22 int ossl_pkcs5_pbkdf2_hmac_ex(const char *pass, int passlen, in ossl_pkcs5_pbkdf2_hmac_ex() argument 35 if (pass == NULL) { in ossl_pkcs5_pbkdf2_hmac_ex() 36 pass = empty; in ossl_pkcs5_pbkdf2_hmac_ex() 39 passlen = strlen(pass); in ossl_pkcs5_pbkdf2_hmac_ex() 52 (char *)pass, (size_t)passlen); in ossl_pkcs5_pbkdf2_hmac_ex() 68 0, passlen, pass, passlen); in ossl_pkcs5_pbkdf2_hmac_ex() 92 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, in PKCS5_PBKDF2_HMAC_SHA1() argument 100 r = ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1() 173 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, in PKCS5_v2_PBE_keyivgen() argument 180 int PKCS5_v2_PBKDF2_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, in PKCS5_v2_PBKDF2_keyivgen_ex() argument [all …]
|
H A D | pbe_scrypt.c | 37 int EVP_PBE_scrypt_ex(const char *pass, size_t passlen, in EVP_PBE_scrypt_ex() argument 55 if (pass == NULL) { in EVP_PBE_scrypt_ex() 56 pass = empty; in EVP_PBE_scrypt_ex() 74 (unsigned char *)pass, in EVP_PBE_scrypt_ex() 90 int EVP_PBE_scrypt(const char *pass, size_t passlen, in EVP_PBE_scrypt() argument 95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem, in EVP_PBE_scrypt()
|
H A D | p5_crpt.c | 26 int PKCS5_PBE_keyivgen_ex(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen_ex() argument 75 if (pass == NULL) in PKCS5_PBE_keyivgen_ex() 78 passlen = strlen(pass); in PKCS5_PBE_keyivgen_ex() 90 (char *)pass, (size_t)passlen); in PKCS5_PBE_keyivgen_ex() 113 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, in PKCS5_PBE_keyivgen() argument 117 return PKCS5_PBE_keyivgen_ex(cctx, pass, passlen, param, cipher, md, en_de, in PKCS5_PBE_keyivgen()
|
/openssl/doc/man7/ |
H A D | passphrase-encoding.pod | 8 - How diverse parts of OpenSSL treat pass phrases character encoding 12 In a modern world with all sorts of character encodings, the treatment of pass 19 The OpenSSL library doesn't treat pass phrases in any special way as a general 23 ISO-8859-1, that object needs to be decrypted using a pass phrase encoded in 29 PKCS#12 is a bit different regarding pass phrase encoding. 30 The standard stipulates that the pass phrase shall be encoded as an ASN.1 47 Assumes that the pass phrase is encoded in ASCII or ISO-8859-1 and 82 potentially protected with a pass phrase, a PIN or something else. 84 other pass phrase encoding may give undefined results. 114 For creating new pass phrase protected objects, make sure the pass phrase is [all …]
|
/openssl/include/openssl/ |
H A D | pkcs12.h.in | 163 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, 165 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, 206 const char *pass, int passlen, 211 const char *pass, int passlen, 217 const char *pass, int passlen, 220 const char *pass, int passlen, 266 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, 269 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, 312 int key_nid, const char *pass); 315 int key_nid, const char *pass, [all …]
|
/openssl/crypto/ |
H A D | passphrase.c | 116 static int do_ui_passphrase(char *pass, size_t pass_size, size_t *pass_len, in do_ui_passphrase() argument 125 if (!ossl_assert(pass != NULL && pass_size != 0 && pass_len != NULL)) { in do_ui_passphrase() 190 memcpy(pass, ipass, *pass_len); in do_ui_passphrase() 204 int ossl_pw_get_passphrase(char *pass, size_t pass_size, size_t *pass_len, in ossl_pw_get_passphrase() argument 230 memcpy(pass, source, source_len); in ossl_pw_get_passphrase() 241 ret = cb(pass, pass_size, pass_len, params, cbarg); in ossl_pw_get_passphrase() 280 ret = do_ui_passphrase(pass, pass_size, pass_len, prompt_info, verify, in ossl_pw_get_passphrase() 295 OPENSSL_cleanse(pass, *pass_len); in ossl_pw_get_passphrase() 300 memcpy(data->cached_passphrase, pass, *pass_len); in ossl_pw_get_passphrase() 334 int ossl_pw_passphrase_callback_enc(char *pass, size_t pass_size, in ossl_pw_passphrase_callback_enc() argument [all …]
|
/openssl/doc/man3/ |
H A D | PKCS8_encrypt.pod | 12 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(const X509_SIG *p8, const char *pass, 14 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt_ex(const X509_SIG *p8, const char *pass, 18 const char *pass, int passlen, unsigned char *salt, 21 const char *pass, int passlen, unsigned char *salt, 24 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, 26 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, 33 the password I<pass> of length I<passlen>, salt I<salt> of length I<saltlen> 39 I<p8> using the password I<pass> of length I<passlen> along with algorithm 43 using the password I<pass> of length I<passlen> and parameters I<pbe>.
|