/openssl/test/ssl-tests/ |
H A D | 23-srp.cnf | 6 test-1 = 1-srp-bad-password 8 test-3 = 3-srp-auth-bad-password 36 SRPPassword = password 40 SRPPassword = password 46 [1-srp-bad-password] 49 [1-srp-bad-password-ssl] 71 SRPPassword = password 106 SRPPassword = password 110 SRPPassword = password 116 [3-srp-auth-bad-password] [all …]
|
H A D | 23-srp.cnf.in | 24 "SRPPassword" => "password", 32 "SRPPassword" => "password", 40 name => "srp-bad-password", 46 "SRPPassword" => "password", 69 "SRPPassword" => "password", 77 "SRPPassword" => "password", 85 name => "srp-auth-bad-password", 91 "SRPPassword" => "password",
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_default_passwd_cb.pod | 27 SSL_CTX_set_default_passwd_cb() sets the default password callback called 31 which will be provided to the password callback on invocation. 46 password to be used during decryption. 49 B<buf> which is of size B<size>. The actual length of the password must 57 When loading or storing private keys, a password might be supplied to 63 password could be stored into the userdata storage and the 64 callback only returns the password already stored. 66 When asking for the password interactively, the callback can use 68 In this case the password dialog may ask for the same password twice 82 calling function. The password is considered to be a '\0' terminated [all …]
|
H A D | PKCS12_newpass.pod | 5 PKCS12_newpass - change the password of a PKCS12 structure 15 PKCS12_newpass() changes the password of a PKCS12 structure. 17 B<p12> is a pointer to a PKCS12 structure. B<oldpass> is the existing password 18 and B<newpass> is the new password. 30 If the PKCS#12 structure does not have a password, then you must use the empty 34 If the wrong password is used for B<oldpass> then the function will fail, 46 This example loads a PKCS#12 file, changes its password and writes out 61 fprintf(stderr, "Usage: pkread p12file password newpass opfile\n"); 76 fprintf(stderr, "Error changing password\n"); 95 The password format is a NULL terminated ASCII string which is converted to
|
H A D | UI_UTIL_read_pw.pod | 24 If B<verify> is nonzero, the password will be verified as well. 31 B<UI_METHOD> that wraps a given PEM password callback B<cb>. 44 UI_UTIL_wrap_read_pem_callback() will generate password strings in the 45 encoding that the given password callback generates. 46 The default password prompting functions (apart from
|
H A D | SSL_CTX_set_srp_password.pod | 29 int SSL_CTX_set_srp_password(SSL_CTX *ctx, char *password); 57 and passwords over unencrypted channels without revealing the password to an 68 The SSL_CTX_set_srp_password() function sets the SRP password for B<ctx>. This 93 The SSL_CTX_set_srp_client_pwd_callback() function sets the client password 98 It should return the client password in text form or NULL to abort the connection. 117 user salt, B<v> the password verifier and B<info> is the optional user info. 120 connection B<s> by generating a random salt and a password verifier. 121 B<user> is the username, B<pass> the password and B<grp> the SRP group parameters 152 const char *password = "password"; 159 if (!SSL_CTX_set_srp_password(ctx, password)) [all …]
|
H A D | PKCS5_PBKDF2_HMAC.pod | 5 PKCS5_PBKDF2_HMAC, PKCS5_PBKDF2_HMAC_SHA1 - password based derivation routines with salt and iterat… 22 PKCS5_PBKDF2_HMAC() derives a key from a password using a salt and iteration count 25 B<pass> is the password used in the derivation of length B<passlen>. B<pass> 48 encryption algorithm from a password in the B<pass>, a salt in B<salt>, 55 These functions make no assumption regarding the given password.
|
H A D | PKCS12_key_gen_utf8_ex.pod | 38 with an input password I<pass> of length I<passlen>, a salt I<salt> of length 61 The intended format of the supplied password is determined by the method chosen: 67 PKCS12_key_gen_asc() and PKCS12_key_gen_asc_ex() expect an ASCII-formatted password. 71 PKCS12_key_gen_uni() and PKCS12_key_gen_uni_ex() expect a Unicode-formatted password. 75 PKCS12_key_gen_utf8() and PKCS12_key_gen_utf8_ex() expect a UTF-8 encoded password. 79 I<pass> is the password used in the derivation of length I<passlen>. I<pass> 103 encryption algorithm from a password in the I<pass>, a salt in I<salt>,
|
/openssl/doc/man1/ |
H A D | openssl-passphrase-options.pod | 16 Several OpenSSL commands accept password arguments, typically using B<-passin> 18 the password to be obtained from a variety of sources. Both of these 20 password argument is given and a password is required then the user is 35 =item B<pass:>I<password> 37 The actual password is I<password>. Since the password is visible 43 Obtain the password from the environment variable I<var>. Since 49 Reads the password from the specified file I<pathname>, which can be a regular 54 arguments, the first line will be used for the input password, and the next 55 line will be used for the output password. 59 Reads the password from the file descriptor I<number>. This can be useful for [all …]
|
H A D | openssl-passwd.pod.in | 6 openssl-passwd - compute password hashes 26 [I<password>] 30 This command computes the hash of a password typed at 31 run-time or the hash of each password in a list. The password list is 45 Use the MD5 based BSD password algorithm B<1> (default). 65 When reading a password from the terminal, this implies B<-noverify>. 77 Don't verify when reading a password from the terminal. 86 to each password hash. 100 % openssl passwd -1 -salt xxxxxxxx password 103 % openssl passwd -apr1 -salt xxxxxxxx password [all …]
|
H A D | openssl-kdf.pod.in | 25 password. 88 Specifies the password as an alphanumeric string (use if the password contains 90 The password must be specified for PBKDF2 and scrypt. 95 the password is specified in hexadecimal form (two hex digits per byte). 186 Use PBKDF2 to create a hex-encoded derived key from a password and salt: 188 openssl kdf -keylen 32 -kdfopt digest:SHA256 -kdfopt pass:password \ 191 Use scrypt to create a hex-encoded derived key from a password and salt: 193 openssl kdf -keylen 64 -kdfopt pass:password -kdfopt salt:NaCl \
|
H A D | openssl-enc.pod.in | 23 [B<-k> I<password>] 84 The password source. For more information about the format of I<arg> 115 =item B<-k> I<password> 122 Read the password to derive the key from the first line of I<filename>. 175 password will be taken. It does not make much sense to specify both key 176 and password. 183 one of the other options, the IV is generated from this password. 246 A password will be prompted for to derive the key and IV if necessary. 443 Encrypt a file using AES-128 using a prompted password 448 Decrypt a file using a supplied password: [all …]
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppbe_pbkdf2.txt | 17 Password = "password" 24 Password = "password" 31 Password = "password" 38 Password = "password" 45 Password = "password" 52 Password = "password" 59 Password = "password" 66 Password = "password" 73 Password = "password" 122 Password = "password" [all …]
|
H A D | evpkdf_pbkdf2.txt | 19 Ctrl.pass = pass:password 28 Ctrl.pass = pass:password 37 Ctrl.pass = pass:password 46 Ctrl.pass = pass:password 55 Ctrl.pass = pass:password 64 Ctrl.pass = pass:password 73 Ctrl.pass = pass:password 82 Ctrl.pass = pass:password 91 Ctrl.pass = pass:password 148 Ctrl.pass = pass:password [all …]
|
H A D | evpkdf_pbkdf1.txt | 18 Ctrl.pass = pass:password 26 Ctrl.pass = pass:password 34 Ctrl.pass = pass:password 42 Ctrl.pass = pass:password 50 Ctrl.pass = pass:password 58 Ctrl.pass = pass:password 66 Ctrl.pass = pass:password 74 Ctrl.pass = pass:password 82 Ctrl.pass = pass:password
|
H A D | evpkdf_pvkkdf.txt | 19 Ctrl.pass = pass:password 26 Ctrl.pass = pass:password 33 Ctrl.pass = pass:password
|
/openssl/apps/lib/ |
H A D | apps_ui.c | 37 const char *password = in ui_read() local 38 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; in ui_read() 40 if (password != NULL) { in ui_read() 41 UI_set_result(ui, uis, password); in ui_read() 72 const char *password = in ui_write() local 73 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; in ui_write() 75 if (password != NULL) in ui_write()
|
/openssl/apps/ |
H A D | srp.c | 126 char password[1025]; in srp_verify_user() local 133 cb_tmp.password = passin; in srp_verify_user() 135 len = password_callback(password, sizeof(password)-1, 0, &cb_tmp); in srp_verify_user() 137 password[len] = 0; in srp_verify_user() 143 BIO_printf(bio_err, "Pass %s\n", password); in srp_verify_user() 154 OPENSSL_cleanse(password, len); in srp_verify_user() 163 char password[1025]; in srp_create_user() local 169 cb_tmp.password = passout; in srp_create_user() 171 len = password_callback(password, sizeof(password)-1, 1, &cb_tmp); in srp_create_user() 173 password[len] = 0; in srp_create_user() [all …]
|
/openssl/doc/man7/ |
H A D | EVP_KDF-PBKDF1.pod | 9 Support for computing the B<PBKDF1> password-based KDF through the B<EVP_KDF> 12 The EVP_KDF-PBKDF1 algorithm implements the PBKDF1 password-based key 13 derivation function, as described in RFC 8018; it derives a key from a password 46 encryption algorithm from a password in the "pass", a salt in "salt", 53 No assumption is made regarding the given password; it is simply treated as a
|
H A D | EVP_KDF-PKCS12KDF.pod | 9 Support for computing the B<PKCS#12> password-based KDF through the B<EVP_KDF> 12 The EVP_KDF-PKCS12KDF algorithm implements the PKCS#12 password-based key 14 Personal Information Exchange Syntax); it derives a key from a password 53 encryption algorithm from a password in the "pass", a salt in "salt", 60 No assumption is made regarding the given password; it is simply treated as a
|
H A D | EVP_KDF-PBKDF2.pod | 9 Support for computing the B<PBKDF2> password-based KDF through the B<EVP_KDF> 12 The EVP_KDF-PBKDF2 algorithm implements the PBKDF2 password-based key 13 derivation function, as described in SP800-132; it derives a key from a password 79 encryption algorithm from a password in the "pass", a salt in "salt", 86 No assumption is made regarding the given password; it is simply treated as a
|
/openssl/demos/kdf/ |
H A D | pbkdf2.c | 26 static unsigned char password[] = { variable 88 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password, in main() 89 sizeof(password)); in main()
|
H A D | scrypt.c | 26 static unsigned char password[] = { variable 90 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password, in main() 91 sizeof(password)); in main()
|
H A D | argon2.c | 29 static unsigned char password[] = { variable 120 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password, sizeof(password)); in main()
|
/openssl/doc/HOWTO/ |
H A D | keys.txt | 26 With this variant, you will be prompted for a protecting password. If 27 you don't want your key to be protected by a password, remove the flag 55 With this variant, you will be prompted for a protecting password. If 56 you don't want your key to be protected by a password, remove the flag 81 With this variant, you will be prompted for a password to protect your key. 82 If you don't want your key to be protected by a password, remove the flag 97 it may be reasonable to avoid protecting it with a password, since 98 otherwise someone would have to type in the password every time the
|