Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 137) sorted by relevance

123456

/openssl/test/recipes/30-test_evp_data/
H A Devpkdf_pbkdf2.txt20 Ctrl.salt = salt:salt
29 Ctrl.salt = salt:salt
38 Ctrl.salt = salt:salt
47 Ctrl.salt = salt:salt
56 Ctrl.salt = salt:salt
65 Ctrl.salt = salt:salt
74 Ctrl.salt = salt:salt
83 Ctrl.salt = salt:salt
92 Ctrl.salt = salt:salt
149 Ctrl.salt = salt:salt
[all …]
H A Devpkdf_pbkdf1.txt19 Ctrl.salt = salt:saltsalt
27 Ctrl.salt = salt:saltsalt
35 Ctrl.salt = salt:saltsalt
43 Ctrl.salt = salt:saltsalt
51 Ctrl.salt = salt:saltsalt
59 Ctrl.salt = salt:saltsalt
67 Ctrl.salt = salt:saltsalt
75 Ctrl.salt = salt:saltsalt
83 Ctrl.salt = salt:saltsalt
91 Ctrl.salt = salt:saltSALT
[all …]
H A Devppkey_kdf_hkdf.txt19 Ctrl.salt = hexsalt:000102030405060708090a0b0c
61 Ctrl.salt = salt:
69 Ctrl.salt = salt:
127 Ctrl.salt = salt:
135 Ctrl.salt = salt:
148 Ctrl.salt = salt:
156 Ctrl.salt = salt:
168 Ctrl.salt = salt:
175 Ctrl.salt = salt:
189 Ctrl.salt = salt:
[all …]
H A Devppbe_pbkdf2.txt18 Salt = "salt"
25 Salt = "salt"
32 Salt = "salt"
39 Salt = "salt"
46 Salt = "salt"
53 Salt = "salt"
60 Salt = "salt"
67 Salt = "salt"
74 Salt = "salt"
123 Salt = "salt"
[all …]
H A Devpkdf_hkdf.txt61 Ctrl.salt = salt:
69 Ctrl.salt = salt:
127 Ctrl.salt = salt:
135 Ctrl.salt = salt:
148 Ctrl.salt = salt:
156 Ctrl.salt = salt:
168 Ctrl.salt = salt:
175 Ctrl.salt = salt:
189 Ctrl.salt = salt:
196 Ctrl.salt = salt:
[all …]
H A Devpkdf_argon2.txt9 Ctrl.salt = hexsalt:02020202020202020202020202020202
19 Ctrl.salt = hexsalt:02020202020202020202020202020202
30 Ctrl.salt = hexsalt:02020202020202020202020202020202
40 Ctrl.salt = hexsalt:02020202020202020202020202020202
46 Ctrl.salt = hexsalt:73616C7473616C74
58 Ctrl.salt = hexsalt:73616C7473616C74
65 Ctrl.salt = hexsalt:73616C7473616C74
90 Ctrl.salt = hexsalt:73616C7473616C74
117 Ctrl.salt = hexsalt:73616C7473616C74
127 Ctrl.salt = hexsalt:73616C7473616C74
[all …]
H A Devppkey_kdf_scrypt.txt18 Ctrl.salt = salt:
26 Ctrl.salt = salt:NaCl
34 Ctrl.salt = salt:NaCl
50 Ctrl.salt = salt:SodiumChloride
59 Ctrl.salt = salt:SodiumChloride
H A Devpkdf_scrypt.txt18 Ctrl.salt = salt:
26 Ctrl.salt = salt:NaCl
34 Ctrl.salt = salt:NaCl
50 Ctrl.salt = salt:SodiumChloride
59 Ctrl.salt = salt:SodiumChloride
H A Devpkdf_pvkkdf.txt20 Ctrl.salt = salt:saltsalt
27 Ctrl.salt = salt:salt
34 Ctrl.salt = salt:saltsalt
/openssl/test/recipes/
H A D20-test_passwd.t22 salt => 'saltstring',
26 salt => 'rounds=10000$saltstringsaltstring',
30 salt => 'rounds=5000$toolongsaltstring',
34 salt => 'rounds=1400$anotherlongsaltstring',
38 salt => 'rounds=10$roundstoolow',
42 salt => 'saltstring',
50 salt => 'rounds=5000$toolongsaltstring',
58 salt => 'rounds=10$roundstoolow',
66 salt => 'rounds=77777$short',
70 salt => 'rounds=123456$asaltof16chars..',
[all …]
/openssl/crypto/asn1/
H A Dp5_pbe.c20 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
29 const unsigned char *salt, int saltlen,
56 if (salt)
57 memcpy(sstr, salt, saltlen);
61 ASN1_STRING_set0(pbe->salt, sstr, saltlen);
83 const unsigned char *salt, int saltlen) in PKCS5_pbe_set0_algor() argument
85 return PKCS5_pbe_set0_algor_ex(algor, alg, iter, salt, saltlen, NULL); in PKCS5_pbe_set0_algor()
91 const unsigned char *salt, int saltlen, in PKCS5_pbe_set_ex() argument
101 if (PKCS5_pbe_set0_algor_ex(ret, alg, iter, salt, saltlen, ctx)) in PKCS5_pbe_set_ex()
109 const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument
[all …]
H A Dp5_pbev2.c30 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY),
52 unsigned char *salt, int saltlen,
167 unsigned char *salt, int saltlen, in PKCS5_pbe2_set_iv() argument
170 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, aiv, prf_nid, in PKCS5_pbe2_set_iv()
175 unsigned char *salt, int saltlen) in PKCS5_pbe2_set() argument
177 return PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, NULL, -1, in PKCS5_pbe2_set()
199 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set_ex()
200 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set_ex()
214 if (salt) { in PKCS5_pbkdf2_set_ex()
215 memcpy(osalt->data, salt, saltlen); in PKCS5_pbkdf2_set_ex()
[all …]
H A Dp5_scrypt.c24 ASN1_SIMPLE(SCRYPT_PARAMS, salt, ASN1_OCTET_STRING),
33 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen,
42 const unsigned char *salt, int saltlen, in PKCS5_pbe2_set_scrypt() argument
118 pbe2->keyfunc = pkcs5_scrypt_set(salt, saltlen, keylen, N, r, p); in PKCS5_pbe2_set_scrypt()
156 static X509_ALGOR *pkcs5_scrypt_set(const unsigned char *salt, size_t saltlen, in pkcs5_scrypt_set() argument
172 if (ASN1_STRING_set(sparam->salt, salt, saltlen) == 0) { in pkcs5_scrypt_set()
177 if (salt == NULL && RAND_bytes(sparam->salt->data, saltlen) <= 0) in pkcs5_scrypt_set()
241 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; in PKCS5_v2_scrypt_keyivgen_ex() local
291 salt = sparam->salt->data; in PKCS5_v2_scrypt_keyivgen_ex()
292 saltlen = sparam->salt->length; in PKCS5_v2_scrypt_keyivgen_ex()
[all …]
/openssl/crypto/pkcs12/
H A Dp12_key.c19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc_ex() argument
35 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_asc_ex()
41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_asc() argument
45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc()
49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8_ex() argument
65 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_utf8_ex()
71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, in PKCS12_key_gen_utf8() argument
75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8()
106 salt, saltlen); in PKCS12_key_gen_uni_ex()
117 BIO_hex_string(trc_out, 0, saltlen, salt, saltlen); in PKCS12_key_gen_uni_ex()
[all …]
H A Dp12_mutl.c45 *psalt = p12->mac->salt; in PKCS12_get0_mac()
126 pbkdf2_salt = pbkdf2_param->salt->value.octet_string; in PBMAC1_PBKDF2_HMAC()
169 unsigned char key[EVP_MAX_MD_SIZE], *salt; in pkcs12_gen_mac() local
187 salt = p12->mac->salt->data; in pkcs12_gen_mac()
188 saltlen = p12->mac->salt->length; in pkcs12_gen_mac()
412 p12->mac->salt->length = saltlen; in pkcs12_setup_mac()
413 if (salt == NULL) { in pkcs12_setup_mac()
418 memcpy(p12->mac->salt->data, salt, saltlen); in pkcs12_setup_mac()
473 if (salt == NULL) { in PKCS12_set_pbmac1_pbkdf2()
486 alg = PKCS5_pbkdf2_set(iter, salt ? salt : known_salt, saltlen, prf_nid, keylen); in PKCS12_set_pbmac1_pbkdf2()
[all …]
H A Dp12_crpt.c30 unsigned char *salt; in PKCS12_PBE_keyivgen_ex() local
49 salt = pbe->salt->data; in PKCS12_PBE_keyivgen_ex()
50 saltlen = pbe->salt->length; in PKCS12_PBE_keyivgen_ex()
51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen_ex()
60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen_ex()
H A Dp12_p8e.c18 unsigned char *salt, int saltlen, int iter, in PKCS8_encrypt_ex() argument
30 pbe = PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, NULL, -1, in PKCS8_encrypt_ex()
40 pbe = PKCS5_pbe2_set_iv_ex(cipher, iter, salt, saltlen, NULL, in PKCS8_encrypt_ex()
44 pbe = PKCS5_pbe_set_ex(pbe_nid, iter, salt, saltlen, libctx); in PKCS8_encrypt_ex()
62 unsigned char *salt, int saltlen, int iter, in PKCS8_encrypt() argument
65 return PKCS8_encrypt_ex(pbe_nid, cipher, pass, passlen, salt, saltlen, iter, in PKCS8_encrypt()
/openssl/crypto/des/
H A Dfcrypt.c64 char *DES_crypt(const char *buf, const char *salt) in DES_crypt() argument
69 return DES_fcrypt(buf, salt, buff); in DES_crypt()
75 if (salt[0] == '\0' || salt[1] == '\0') in DES_crypt()
79 e_salt[0] = salt[0]; in DES_crypt()
80 e_salt[1] = salt[1]; in DES_crypt()
97 char *DES_fcrypt(const char *buf, const char *salt, char *ret) in DES_fcrypt() argument
108 x = ret[0] = salt[0]; in DES_fcrypt()
112 x = ret[1] = salt[1]; in DES_fcrypt()
/openssl/crypto/evp/
H A Dp5_crpt2.c23 const unsigned char *salt, int saltlen, int iter, in ossl_pkcs5_pbkdf2_hmac_ex() argument
41 if (salt == NULL && saltlen == 0) in ossl_pkcs5_pbkdf2_hmac_ex()
42 salt = (unsigned char *)empty; in ossl_pkcs5_pbkdf2_hmac_ex()
55 (unsigned char *)salt, saltlen); in ossl_pkcs5_pbkdf2_hmac_ex()
72 0, saltlen, salt, saltlen); in ossl_pkcs5_pbkdf2_hmac_ex()
93 const unsigned char *salt, int saltlen, int iter, in PKCS5_PBKDF2_HMAC_SHA1() argument
100 r = ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, in PKCS5_PBKDF2_HMAC_SHA1()
185 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; in PKCS5_v2_PBKDF2_keyivgen_ex() local
245 if (kdf->salt->type != V_ASN1_OCTET_STRING) { in PKCS5_v2_PBKDF2_keyivgen_ex()
251 salt = kdf->salt->value.octet_string->data; in PKCS5_v2_PBKDF2_keyivgen_ex()
[all …]
H A Dpbe_scrypt.c38 const unsigned char *salt, size_t saltlen, in EVP_PBE_scrypt_ex() argument
59 if (salt == NULL) { in EVP_PBE_scrypt_ex()
60 salt = (const unsigned char *)empty; in EVP_PBE_scrypt_ex()
77 (unsigned char *)salt, saltlen); in EVP_PBE_scrypt_ex()
91 const unsigned char *salt, size_t saltlen, in EVP_PBE_scrypt() argument
95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem, in EVP_PBE_scrypt()
/openssl/doc/man3/
H A DPKCS5_PBE_keyivgen.pod32 const unsigned char *salt, size_t saltlen,
36 const unsigned char *salt, size_t saltlen,
51 const unsigned char *salt, int saltlen);
53 const unsigned char *salt, int saltlen,
57 const unsigned char *salt, int saltlen);
63 unsigned char *salt, int saltlen);
65 unsigned char *salt, int saltlen,
68 unsigned char *salt, int saltlen,
102 I<salt> is the salt used in the derivation of length I<saltlen>. If the
103 I<salt> is NULL, then I<saltlen> must be 0. The function will not
[all …]
H A DPKCS5_PBKDF2_HMAC.pod5 PKCS5_PBKDF2_HMAC, PKCS5_PBKDF2_HMAC_SHA1 - password based derivation routines with salt and iterat…
12 const unsigned char *salt, int saltlen, int iter,
17 const unsigned char *salt, int saltlen, int iter,
22 PKCS5_PBKDF2_HMAC() derives a key from a password using a salt and iteration count
29 B<salt> is the salt used in the derivation of length B<saltlen>. If the
30 B<salt> is NULL, then B<saltlen> must be 0. The function will not
31 attempt to calculate the length of the B<salt> because it is not assumed to
48 encryption algorithm from a password in the B<pass>, a salt in B<salt>,
H A DPKCS12_key_gen_utf8_ex.pod13 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
16 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt,
20 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt,
23 int PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt,
27 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt,
30 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt,
38 with an input password I<pass> of length I<passlen>, a salt I<salt> of length
83 I<salt> is the salt used in the derivation of length I<saltlen>. If the
84 I<salt> is NULL, then I<saltlen> must be 0. The function will not
85 attempt to calculate the length of the I<salt> because it is not assumed to
[all …]
H A DSRP_create_verifier.pod21 int SRP_create_verifier_BN_ex(const char *user, const char *pass, BIGNUM **salt,
25 char *SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt,
27 char *SRP_create_verifier_ex(const char *user, const char *pass, char **salt,
30 char *SRP_create_verifier(const char *user, const char *pass, char **salt,
51 the verifier and (if a salt was not provided) I<*salt> will be populated with a
52 newly allocated BIGNUM containing a random salt. If I<*salt> is not NULL then
53 the provided salt is used instead.
54 The caller is responsible for freeing the allocated I<*salt> and I<*verifier>
64 The caller is responsible for freeing the allocated I<*salt> and I<*verifier>
106 BIGNUM *salt = NULL, *verifier = NULL;
[all …]
/openssl/crypto/crmf/
H A Dcrmf_pbm.c44 unsigned char *salt = NULL; in OSSL_CRMF_pbmp_new() local
54 if ((salt = OPENSSL_malloc(slen)) == NULL) in OSSL_CRMF_pbmp_new()
56 if (RAND_bytes_ex(libctx, salt, slen, 0) <= 0) { in OSSL_CRMF_pbmp_new()
60 if (!ASN1_OCTET_STRING_set(pbm->salt, salt, (int)slen)) in OSSL_CRMF_pbmp_new()
107 OPENSSL_free(salt); in OSSL_CRMF_pbmp_new()
110 OPENSSL_free(salt); in OSSL_CRMF_pbmp_new()
173 if (!EVP_DigestUpdate(ctx, pbmp->salt->data, pbmp->salt->length)) in OSSL_CRMF_pbm_new()

Completed in 34 milliseconds

123456