/openssl/test/recipes/30-test_evp_data/ |
H A D | evpkdf_pbkdf2.txt | 20 Ctrl.salt = salt:salt 29 Ctrl.salt = salt:salt 38 Ctrl.salt = salt:salt 47 Ctrl.salt = salt:salt 56 Ctrl.salt = salt:salt 65 Ctrl.salt = salt:salt 74 Ctrl.salt = salt:salt 83 Ctrl.salt = salt:salt 92 Ctrl.salt = salt:salt 149 Ctrl.salt = salt:salt [all …]
|
H A D | evpkdf_pbkdf1.txt | 19 Ctrl.salt = salt:saltsalt 27 Ctrl.salt = salt:saltsalt 35 Ctrl.salt = salt:saltsalt 43 Ctrl.salt = salt:saltsalt 51 Ctrl.salt = salt:saltsalt 59 Ctrl.salt = salt:saltsalt 67 Ctrl.salt = salt:saltsalt 75 Ctrl.salt = salt:saltsalt 83 Ctrl.salt = salt:saltsalt 91 Ctrl.salt = salt:saltSALT [all …]
|
H A D | evppkey_kdf_hkdf.txt | 19 Ctrl.salt = hexsalt:000102030405060708090a0b0c 61 Ctrl.salt = salt: 69 Ctrl.salt = salt: 127 Ctrl.salt = salt: 135 Ctrl.salt = salt: 148 Ctrl.salt = salt: 156 Ctrl.salt = salt: 168 Ctrl.salt = salt: 175 Ctrl.salt = salt: 189 Ctrl.salt = salt: [all …]
|
H A D | evppbe_pbkdf2.txt | 18 Salt = "salt" 25 Salt = "salt" 32 Salt = "salt" 39 Salt = "salt" 46 Salt = "salt" 53 Salt = "salt" 60 Salt = "salt" 67 Salt = "salt" 74 Salt = "salt" 123 Salt = "salt" [all …]
|
H A D | evpkdf_hkdf.txt | 61 Ctrl.salt = salt: 69 Ctrl.salt = salt: 127 Ctrl.salt = salt: 135 Ctrl.salt = salt: 148 Ctrl.salt = salt: 156 Ctrl.salt = salt: 168 Ctrl.salt = salt: 175 Ctrl.salt = salt: 189 Ctrl.salt = salt: 196 Ctrl.salt = salt: [all …]
|
H A D | evpkdf_argon2.txt | 9 Ctrl.salt = hexsalt:02020202020202020202020202020202 19 Ctrl.salt = hexsalt:02020202020202020202020202020202 30 Ctrl.salt = hexsalt:02020202020202020202020202020202 40 Ctrl.salt = hexsalt:02020202020202020202020202020202 46 Ctrl.salt = hexsalt:73616C7473616C74 58 Ctrl.salt = hexsalt:73616C7473616C74 65 Ctrl.salt = hexsalt:73616C7473616C74 90 Ctrl.salt = hexsalt:73616C7473616C74 117 Ctrl.salt = hexsalt:73616C7473616C74 127 Ctrl.salt = hexsalt:73616C7473616C74 [all …]
|
H A D | evppkey_kdf_scrypt.txt | 18 Ctrl.salt = salt: 26 Ctrl.salt = salt:NaCl 34 Ctrl.salt = salt:NaCl 50 Ctrl.salt = salt:SodiumChloride 59 Ctrl.salt = salt:SodiumChloride
|
H A D | evpkdf_scrypt.txt | 18 Ctrl.salt = salt: 26 Ctrl.salt = salt:NaCl 34 Ctrl.salt = salt:NaCl 50 Ctrl.salt = salt:SodiumChloride 59 Ctrl.salt = salt:SodiumChloride
|
H A D | evpkdf_pvkkdf.txt | 20 Ctrl.salt = salt:saltsalt 27 Ctrl.salt = salt:salt 34 Ctrl.salt = salt:saltsalt
|
/openssl/test/recipes/ |
H A D | 20-test_passwd.t | 22 salt => 'saltstring', 26 salt => 'rounds=10000$saltstringsaltstring', 30 salt => 'rounds=5000$toolongsaltstring', 34 salt => 'rounds=1400$anotherlongsaltstring', 38 salt => 'rounds=10$roundstoolow', 42 salt => 'saltstring', 50 salt => 'rounds=5000$toolongsaltstring', 58 salt => 'rounds=10$roundstoolow', 66 salt => 'rounds=77777$short', 70 salt => 'rounds=123456$asaltof16chars..', [all …]
|
/openssl/crypto/asn1/ |
H A D | p5_pbe.c | 20 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING), 29 const unsigned char *salt, int saltlen, 56 if (salt) 57 memcpy(sstr, salt, saltlen); 61 ASN1_STRING_set0(pbe->salt, sstr, saltlen); 83 const unsigned char *salt, int saltlen) in PKCS5_pbe_set0_algor() argument 85 return PKCS5_pbe_set0_algor_ex(algor, alg, iter, salt, saltlen, NULL); in PKCS5_pbe_set0_algor() 91 const unsigned char *salt, int saltlen, in PKCS5_pbe_set_ex() argument 101 if (PKCS5_pbe_set0_algor_ex(ret, alg, iter, salt, saltlen, ctx)) in PKCS5_pbe_set_ex() 109 const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument [all …]
|
H A D | p5_pbev2.c | 30 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY), 52 unsigned char *salt, int saltlen, 167 unsigned char *salt, int saltlen, in PKCS5_pbe2_set_iv() argument 170 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, aiv, prf_nid, in PKCS5_pbe2_set_iv() 175 unsigned char *salt, int saltlen) in PKCS5_pbe2_set() argument 177 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, NULL, -1, in PKCS5_pbe2_set() 199 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set_ex() 200 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set_ex() 214 if (salt) { in PKCS5_pbkdf2_set_ex() 215 memcpy(osalt->data, salt, saltlen); in PKCS5_pbkdf2_set_ex() [all …]
|
H A D | p5_scrypt.c | 24 ASN1_SIMPLE(SCRYPT_PARAMS, salt, ASN1_OCTET_STRING), 33 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, 42 const unsigned char *salt, int saltlen, in PKCS5_pbe2_set_scrypt() argument 118 pbe2->keyfunc = pkcs5_scrypt_set(salt, saltlen, keylen, N, r, p); in PKCS5_pbe2_set_scrypt() 156 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, in pkcs5_scrypt_set() argument 172 if (ASN1_STRING_set(sparam->salt, salt, saltlen) == 0) { in pkcs5_scrypt_set() 177 if (salt == NULL && RAND_bytes(sparam->salt->data, saltlen) <= 0) in pkcs5_scrypt_set() 241 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; in PKCS5_v2_scrypt_keyivgen_ex() local 291 salt = sparam->salt->data; in PKCS5_v2_scrypt_keyivgen_ex() 292 saltlen = sparam->salt->length; in PKCS5_v2_scrypt_keyivgen_ex() [all …]
|
/openssl/crypto/pkcs12/ |
H A D | p12_key.c | 19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument 35 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_asc_ex() 41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument 45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc() 49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument 65 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_utf8_ex() 71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument 75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8() 106 salt, saltlen); in PKCS12_key_gen_uni_ex() 117 BIO_hex_string(trc_out, 0, saltlen, salt, saltlen); in PKCS12_key_gen_uni_ex() [all …]
|
H A D | p12_mutl.c | 45 *psalt = p12->mac->salt; in PKCS12_get0_mac() 126 pbkdf2_salt = pbkdf2_param->salt->value.octet_string; in PBMAC1_PBKDF2_HMAC() 169 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local 187 salt = p12->mac->salt->data; in pkcs12_gen_mac() 188 saltlen = p12->mac->salt->length; in pkcs12_gen_mac() 412 p12->mac->salt->length = saltlen; in pkcs12_setup_mac() 413 if (salt == NULL) { in pkcs12_setup_mac() 418 memcpy(p12->mac->salt->data, salt, saltlen); in pkcs12_setup_mac() 473 if (salt == NULL) { in PKCS12_set_pbmac1_pbkdf2() 486 alg = PKCS5_pbkdf2_set(iter, salt ? salt : known_salt, saltlen, prf_nid, keylen); in PKCS12_set_pbmac1_pbkdf2() [all …]
|
H A D | p12_crpt.c | 30 unsigned char *salt; in PKCS12_PBE_keyivgen_ex() local 49 salt = pbe->salt->data; in PKCS12_PBE_keyivgen_ex() 50 saltlen = pbe->salt->length; in PKCS12_PBE_keyivgen_ex() 51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen_ex() 60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen_ex()
|
H A D | p12_p8e.c | 18 unsigned char *salt, int saltlen, int iter, in PKCS8_encrypt_ex() argument 30 pbe = PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, NULL, -1, in PKCS8_encrypt_ex() 40 pbe = PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, NULL, in PKCS8_encrypt_ex() 44 pbe = PKCS5_pbe_set_ex(pbe_nid, iter, salt, saltlen, libctx); in PKCS8_encrypt_ex() 62 unsigned char *salt, int saltlen, int iter, in PKCS8_encrypt() argument 65 return PKCS8_encrypt_ex(pbe_nid, cipher, pass, passlen, salt, saltlen, iter, in PKCS8_encrypt()
|
/openssl/crypto/des/ |
H A D | fcrypt.c | 64 char *DES_crypt(const char *buf, const char *salt) in DES_crypt() argument 69 return DES_fcrypt(buf, salt, buff); in DES_crypt() 75 if (salt[0] == '\0' || salt[1] == '\0') in DES_crypt() 79 e_salt[0] = salt[0]; in DES_crypt() 80 e_salt[1] = salt[1]; in DES_crypt() 97 char *DES_fcrypt(const char *buf, const char *salt, char *ret) in DES_fcrypt() argument 108 x = ret[0] = salt[0]; in DES_fcrypt() 112 x = ret[1] = salt[1]; in DES_fcrypt()
|
/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 23 const unsigned char *salt, int saltlen, int iter, in ossl_pkcs5_pbkdf2_hmac_ex() argument 41 if (salt == NULL && saltlen == 0) in ossl_pkcs5_pbkdf2_hmac_ex() 42 salt = (unsigned char *)empty; in ossl_pkcs5_pbkdf2_hmac_ex() 55 (unsigned char *)salt, saltlen); in ossl_pkcs5_pbkdf2_hmac_ex() 72 0, saltlen, salt, saltlen); in ossl_pkcs5_pbkdf2_hmac_ex() 93 const unsigned char *salt, int saltlen, int iter, in PKCS5_PBKDF2_HMAC_SHA1() argument 100 r = ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1() 185 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; in PKCS5_v2_PBKDF2_keyivgen_ex() local 245 if (kdf->salt->type != V_ASN1_OCTET_STRING) { in PKCS5_v2_PBKDF2_keyivgen_ex() 251 salt = kdf->salt->value.octet_string->data; in PKCS5_v2_PBKDF2_keyivgen_ex() [all …]
|
H A D | pbe_scrypt.c | 38 const unsigned char *salt, size_t saltlen, in EVP_PBE_scrypt_ex() argument 59 if (salt == NULL) { in EVP_PBE_scrypt_ex() 60 salt = (const unsigned char *)empty; in EVP_PBE_scrypt_ex() 77 (unsigned char *)salt, saltlen); in EVP_PBE_scrypt_ex() 91 const unsigned char *salt, size_t saltlen, in EVP_PBE_scrypt() argument 95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem, in EVP_PBE_scrypt()
|
/openssl/doc/man3/ |
H A D | PKCS5_PBE_keyivgen.pod | 32 const unsigned char *salt, size_t saltlen, 36 const unsigned char *salt, size_t saltlen, 51 const unsigned char *salt, int saltlen); 53 const unsigned char *salt, int saltlen, 57 const unsigned char *salt, int saltlen); 63 unsigned char *salt, int saltlen); 65 unsigned char *salt, int saltlen, 68 unsigned char *salt, int saltlen, 102 I<salt> is the salt used in the derivation of length I<saltlen>. If the 103 I<salt> is NULL, then I<saltlen> must be 0. The function will not [all …]
|
H A D | PKCS5_PBKDF2_HMAC.pod | 5 PKCS5_PBKDF2_HMAC, PKCS5_PBKDF2_HMAC_SHA1 - password based derivation routines with salt and iterat… 12 const unsigned char *salt, int saltlen, int iter, 17 const unsigned char *salt, int saltlen, int iter, 22 PKCS5_PBKDF2_HMAC() derives a key from a password using a salt and iteration count 29 B<salt> is the salt used in the derivation of length B<saltlen>. If the 30 B<salt> is NULL, then B<saltlen> must be 0. The function will not 31 attempt to calculate the length of the B<salt> because it is not assumed to 48 encryption algorithm from a password in the B<pass>, a salt in B<salt>,
|
H A D | PKCS12_key_gen_utf8_ex.pod | 13 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 16 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, 20 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, 23 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, 27 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, 30 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, 38 with an input password I<pass> of length I<passlen>, a salt I<salt> of length 83 I<salt> is the salt used in the derivation of length I<saltlen>. If the 84 I<salt> is NULL, then I<saltlen> must be 0. The function will not 85 attempt to calculate the length of the I<salt> because it is not assumed to [all …]
|
H A D | SRP_create_verifier.pod | 21 int SRP_create_verifier_BN_ex(const char *user, const char *pass, BIGNUM **salt, 25 char *SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, 27 char *SRP_create_verifier_ex(const char *user, const char *pass, char **salt, 30 char *SRP_create_verifier(const char *user, const char *pass, char **salt, 51 the verifier and (if a salt was not provided) I<*salt> will be populated with a 52 newly allocated BIGNUM containing a random salt. If I<*salt> is not NULL then 53 the provided salt is used instead. 54 The caller is responsible for freeing the allocated I<*salt> and I<*verifier> 64 The caller is responsible for freeing the allocated I<*salt> and I<*verifier> 106 BIGNUM *salt = NULL, *verifier = NULL; [all …]
|
/openssl/crypto/crmf/ |
H A D | crmf_pbm.c | 44 unsigned char *salt = NULL; in OSSL_CRMF_pbmp_new() local 54 if ((salt = OPENSSL_malloc(slen)) == NULL) in OSSL_CRMF_pbmp_new() 56 if (RAND_bytes_ex(libctx, salt, slen, 0) <= 0) { in OSSL_CRMF_pbmp_new() 60 if (!ASN1_OCTET_STRING_set(pbm->salt, salt, (int)slen)) in OSSL_CRMF_pbmp_new() 107 OPENSSL_free(salt); in OSSL_CRMF_pbmp_new() 110 OPENSSL_free(salt); in OSSL_CRMF_pbmp_new() 173 if (!EVP_DigestUpdate(ctx, pbmp->salt->data, pbmp->salt->length)) in OSSL_CRMF_pbm_new()
|