aboutsummaryrefslogtreecommitdiff
path: root/src/openssl/crypto/pkcs5.rs.html
diff options
context:
space:
mode:
Diffstat (limited to 'src/openssl/crypto/pkcs5.rs.html')
-rw-r--r--src/openssl/crypto/pkcs5.rs.html335
1 files changed, 335 insertions, 0 deletions
diff --git a/src/openssl/crypto/pkcs5.rs.html b/src/openssl/crypto/pkcs5.rs.html
new file mode 100644
index 0000000..5ac11c1
--- /dev/null
+++ b/src/openssl/crypto/pkcs5.rs.html
@@ -0,0 +1,335 @@
+<!DOCTYPE html>
+<html lang="en">
+<head>
+ <meta charset="utf-8">
+ <meta name="viewport" content="width=device-width, initial-scale=1.0">
+ <meta name="generator" content="rustdoc">
+ <meta name="description" content="Source to the Rust file `/home/travis/.cargo/registry/src/github.com-0a35038f75765ae4/openssl-0.6.3/src/crypto/pkcs5.rs`.">
+ <meta name="keywords" content="rust, rustlang, rust-lang">
+
+ <title>pkcs5.rs.html -- source</title>
+
+ <link rel="stylesheet" type="text/css" href="../../../main.css">
+
+
+
+</head>
+<body class="rustdoc">
+ <!--[if lte IE 8]>
+ <div class="warning">
+ This old browser is unsupported and will most likely display funky
+ things.
+ </div>
+ <![endif]-->
+
+
+
+ <section class="sidebar">
+
+
+ </section>
+
+ <nav class="sub">
+ <form class="search-form js-only">
+ <div class="search-container">
+ <input class="search-input" name="search"
+ autocomplete="off"
+ placeholder="Click or press 'S' to search, '?' for more options..."
+ type="search">
+ </div>
+ </form>
+ </nav>
+
+ <section id='main' class="content source"><pre class="line-numbers"><span id="1"> 1</span>
+<span id="2"> 2</span>
+<span id="3"> 3</span>
+<span id="4"> 4</span>
+<span id="5"> 5</span>
+<span id="6"> 6</span>
+<span id="7"> 7</span>
+<span id="8"> 8</span>
+<span id="9"> 9</span>
+<span id="10"> 10</span>
+<span id="11"> 11</span>
+<span id="12"> 12</span>
+<span id="13"> 13</span>
+<span id="14"> 14</span>
+<span id="15"> 15</span>
+<span id="16"> 16</span>
+<span id="17"> 17</span>
+<span id="18"> 18</span>
+<span id="19"> 19</span>
+<span id="20"> 20</span>
+<span id="21"> 21</span>
+<span id="22"> 22</span>
+<span id="23"> 23</span>
+<span id="24"> 24</span>
+<span id="25"> 25</span>
+<span id="26"> 26</span>
+<span id="27"> 27</span>
+<span id="28"> 28</span>
+<span id="29"> 29</span>
+<span id="30"> 30</span>
+<span id="31"> 31</span>
+<span id="32"> 32</span>
+<span id="33"> 33</span>
+<span id="34"> 34</span>
+<span id="35"> 35</span>
+<span id="36"> 36</span>
+<span id="37"> 37</span>
+<span id="38"> 38</span>
+<span id="39"> 39</span>
+<span id="40"> 40</span>
+<span id="41"> 41</span>
+<span id="42"> 42</span>
+<span id="43"> 43</span>
+<span id="44"> 44</span>
+<span id="45"> 45</span>
+<span id="46"> 46</span>
+<span id="47"> 47</span>
+<span id="48"> 48</span>
+<span id="49"> 49</span>
+<span id="50"> 50</span>
+<span id="51"> 51</span>
+<span id="52"> 52</span>
+<span id="53"> 53</span>
+<span id="54"> 54</span>
+<span id="55"> 55</span>
+<span id="56"> 56</span>
+<span id="57"> 57</span>
+<span id="58"> 58</span>
+<span id="59"> 59</span>
+<span id="60"> 60</span>
+<span id="61"> 61</span>
+<span id="62"> 62</span>
+<span id="63"> 63</span>
+<span id="64"> 64</span>
+<span id="65"> 65</span>
+<span id="66"> 66</span>
+<span id="67"> 67</span>
+<span id="68"> 68</span>
+<span id="69"> 69</span>
+<span id="70"> 70</span>
+<span id="71"> 71</span>
+<span id="72"> 72</span>
+<span id="73"> 73</span>
+<span id="74"> 74</span>
+<span id="75"> 75</span>
+<span id="76"> 76</span>
+<span id="77"> 77</span>
+<span id="78"> 78</span>
+<span id="79"> 79</span>
+<span id="80"> 80</span>
+<span id="81"> 81</span>
+<span id="82"> 82</span>
+<span id="83"> 83</span>
+<span id="84"> 84</span>
+<span id="85"> 85</span>
+<span id="86"> 86</span>
+<span id="87"> 87</span>
+<span id="88"> 88</span>
+<span id="89"> 89</span>
+<span id="90"> 90</span>
+<span id="91"> 91</span>
+<span id="92"> 92</span>
+<span id="93"> 93</span>
+<span id="94"> 94</span>
+<span id="95"> 95</span>
+<span id="96"> 96</span>
+<span id="97"> 97</span>
+<span id="98"> 98</span>
+<span id="99"> 99</span>
+<span id="100">100</span>
+<span id="101">101</span>
+<span id="102">102</span>
+<span id="103">103</span>
+<span id="104">104</span>
+<span id="105">105</span>
+<span id="106">106</span>
+<span id="107">107</span>
+<span id="108">108</span>
+<span id="109">109</span>
+<span id="110">110</span>
+<span id="111">111</span>
+<span id="112">112</span>
+<span id="113">113</span>
+<span id="114">114</span>
+<span id="115">115</span>
+<span id="116">116</span>
+<span id="117">117</span>
+<span id="118">118</span>
+<span id="119">119</span>
+</pre><pre class='rust '>
+<span class='kw'>use</span> <span class='ident'>libc</span>::<span class='ident'>c_int</span>;
+<span class='kw'>use</span> <span class='ident'>ffi</span>;
+
+<span class='doccomment'>/// Derives a key from a password and salt using the PBKDF2-HMAC-SHA1 algorithm.</span>
+<span class='kw'>pub</span> <span class='kw'>fn</span> <span class='ident'>pbkdf2_hmac_sha1</span>(<span class='ident'>pass</span>: <span class='kw-2'>&amp;</span><span class='ident'>str</span>, <span class='ident'>salt</span>: <span class='kw-2'>&amp;</span>[<span class='ident'>u8</span>], <span class='ident'>iter</span>: <span class='ident'>usize</span>, <span class='ident'>keylen</span>: <span class='ident'>usize</span>) <span class='op'>-&gt;</span> <span class='ident'>Vec</span><span class='op'>&lt;</span><span class='ident'>u8</span><span class='op'>&gt;</span> {
+ <span class='kw'>unsafe</span> {
+ <span class='macro'>assert</span><span class='macro'>!</span>(<span class='ident'>iter</span> <span class='op'>&gt;=</span> <span class='number'>1</span>);
+ <span class='macro'>assert</span><span class='macro'>!</span>(<span class='ident'>keylen</span> <span class='op'>&gt;=</span> <span class='number'>1</span>);
+
+ <span class='kw'>let</span> <span class='kw-2'>mut</span> <span class='ident'>out</span> <span class='op'>=</span> <span class='ident'>Vec</span>::<span class='ident'>with_capacity</span>(<span class='ident'>keylen</span>);
+
+ <span class='ident'>ffi</span>::<span class='ident'>init</span>();
+
+ <span class='kw'>let</span> <span class='ident'>r</span> <span class='op'>=</span> <span class='ident'>ffi</span>::<span class='ident'>PKCS5_PBKDF2_HMAC_SHA1</span>(
+ <span class='ident'>pass</span>.<span class='ident'>as_ptr</span>(), <span class='ident'>pass</span>.<span class='ident'>len</span>() <span class='kw'>as</span> <span class='ident'>c_int</span>,
+ <span class='ident'>salt</span>.<span class='ident'>as_ptr</span>(), <span class='ident'>salt</span>.<span class='ident'>len</span>() <span class='kw'>as</span> <span class='ident'>c_int</span>,
+ <span class='ident'>iter</span> <span class='kw'>as</span> <span class='ident'>c_int</span>, <span class='ident'>keylen</span> <span class='kw'>as</span> <span class='ident'>c_int</span>,
+ <span class='ident'>out</span>.<span class='ident'>as_mut_ptr</span>());
+
+ <span class='kw'>if</span> <span class='ident'>r</span> <span class='op'>!=</span> <span class='number'>1</span> { <span class='macro'>panic</span><span class='macro'>!</span>(); }
+
+ <span class='ident'>out</span>.<span class='ident'>set_len</span>(<span class='ident'>keylen</span>);
+
+ <span class='ident'>out</span>
+ }
+}
+
+<span class='attribute'>#[<span class='ident'>cfg</span>(<span class='ident'>test</span>)]</span>
+<span class='kw'>mod</span> <span class='ident'>tests</span> {
+ <span class='comment'>// Test vectors from</span>
+ <span class='comment'>// http://tools.ietf.org/html/draft-josefsson-pbkdf2-test-vectors-06</span>
+ <span class='attribute'>#[<span class='ident'>test</span>]</span>
+ <span class='kw'>fn</span> <span class='ident'>test_pbkdf2_hmac_sha1</span>() {
+ <span class='macro'>assert_eq</span><span class='macro'>!</span>(
+ <span class='ident'>super</span>::<span class='ident'>pbkdf2_hmac_sha1</span>(
+ <span class='string'>&quot;password&quot;</span>,
+ <span class='string'>&quot;salt&quot;</span>.<span class='ident'>as_bytes</span>(),
+ <span class='number'>1</span>,
+ <span class='number'>20</span>
+ ),
+ <span class='macro'>vec</span><span class='macro'>!</span>(
+ <span class='number'>0x0c_u8</span>, <span class='number'>0x60_u8</span>, <span class='number'>0xc8_u8</span>, <span class='number'>0x0f_u8</span>, <span class='number'>0x96_u8</span>, <span class='number'>0x1f_u8</span>, <span class='number'>0x0e_u8</span>,
+ <span class='number'>0x71_u8</span>, <span class='number'>0xf3_u8</span>, <span class='number'>0xa9_u8</span>, <span class='number'>0xb5_u8</span>, <span class='number'>0x24_u8</span>, <span class='number'>0xaf_u8</span>, <span class='number'>0x60_u8</span>,
+ <span class='number'>0x12_u8</span>, <span class='number'>0x06_u8</span>, <span class='number'>0x2f_u8</span>, <span class='number'>0xe0_u8</span>, <span class='number'>0x37_u8</span>, <span class='number'>0xa6_u8</span>
+ )
+ );
+
+ <span class='macro'>assert_eq</span><span class='macro'>!</span>(
+ <span class='ident'>super</span>::<span class='ident'>pbkdf2_hmac_sha1</span>(
+ <span class='string'>&quot;password&quot;</span>,
+ <span class='string'>&quot;salt&quot;</span>.<span class='ident'>as_bytes</span>(),
+ <span class='number'>2</span>,
+ <span class='number'>20</span>
+ ),
+ <span class='macro'>vec</span><span class='macro'>!</span>(
+ <span class='number'>0xea_u8</span>, <span class='number'>0x6c_u8</span>, <span class='number'>0x01_u8</span>, <span class='number'>0x4d_u8</span>, <span class='number'>0xc7_u8</span>, <span class='number'>0x2d_u8</span>, <span class='number'>0x6f_u8</span>,
+ <span class='number'>0x8c_u8</span>, <span class='number'>0xcd_u8</span>, <span class='number'>0x1e_u8</span>, <span class='number'>0xd9_u8</span>, <span class='number'>0x2a_u8</span>, <span class='number'>0xce_u8</span>, <span class='number'>0x1d_u8</span>,
+ <span class='number'>0x41_u8</span>, <span class='number'>0xf0_u8</span>, <span class='number'>0xd8_u8</span>, <span class='number'>0xde_u8</span>, <span class='number'>0x89_u8</span>, <span class='number'>0x57_u8</span>
+ )
+ );
+
+ <span class='macro'>assert_eq</span><span class='macro'>!</span>(
+ <span class='ident'>super</span>::<span class='ident'>pbkdf2_hmac_sha1</span>(
+ <span class='string'>&quot;password&quot;</span>,
+ <span class='string'>&quot;salt&quot;</span>.<span class='ident'>as_bytes</span>(),
+ <span class='number'>4096</span>,
+ <span class='number'>20</span>
+ ),
+ <span class='macro'>vec</span><span class='macro'>!</span>(
+ <span class='number'>0x4b_u8</span>, <span class='number'>0x00_u8</span>, <span class='number'>0x79_u8</span>, <span class='number'>0x01_u8</span>, <span class='number'>0xb7_u8</span>, <span class='number'>0x65_u8</span>, <span class='number'>0x48_u8</span>,
+ <span class='number'>0x9a_u8</span>, <span class='number'>0xbe_u8</span>, <span class='number'>0xad_u8</span>, <span class='number'>0x49_u8</span>, <span class='number'>0xd9_u8</span>, <span class='number'>0x26_u8</span>, <span class='number'>0xf7_u8</span>,
+ <span class='number'>0x21_u8</span>, <span class='number'>0xd0_u8</span>, <span class='number'>0x65_u8</span>, <span class='number'>0xa4_u8</span>, <span class='number'>0x29_u8</span>, <span class='number'>0xc1_u8</span>
+ )
+ );
+
+ <span class='macro'>assert_eq</span><span class='macro'>!</span>(
+ <span class='ident'>super</span>::<span class='ident'>pbkdf2_hmac_sha1</span>(
+ <span class='string'>&quot;password&quot;</span>,
+ <span class='string'>&quot;salt&quot;</span>.<span class='ident'>as_bytes</span>(),
+ <span class='number'>16777216</span>,
+ <span class='number'>20</span>
+ ),
+ <span class='macro'>vec</span><span class='macro'>!</span>(
+ <span class='number'>0xee_u8</span>, <span class='number'>0xfe_u8</span>, <span class='number'>0x3d_u8</span>, <span class='number'>0x61_u8</span>, <span class='number'>0xcd_u8</span>, <span class='number'>0x4d_u8</span>, <span class='number'>0xa4_u8</span>,
+ <span class='number'>0xe4_u8</span>, <span class='number'>0xe9_u8</span>, <span class='number'>0x94_u8</span>, <span class='number'>0x5b_u8</span>, <span class='number'>0x3d_u8</span>, <span class='number'>0x6b_u8</span>, <span class='number'>0xa2_u8</span>,
+ <span class='number'>0x15_u8</span>, <span class='number'>0x8c_u8</span>, <span class='number'>0x26_u8</span>, <span class='number'>0x34_u8</span>, <span class='number'>0xe9_u8</span>, <span class='number'>0x84_u8</span>
+ )
+ );
+
+ <span class='macro'>assert_eq</span><span class='macro'>!</span>(
+ <span class='ident'>super</span>::<span class='ident'>pbkdf2_hmac_sha1</span>(
+ <span class='string'>&quot;passwordPASSWORDpassword&quot;</span>,
+ <span class='string'>&quot;saltSALTsaltSALTsaltSALTsaltSALTsalt&quot;</span>.<span class='ident'>as_bytes</span>(),
+ <span class='number'>4096</span>,
+ <span class='number'>25</span>
+ ),
+ <span class='macro'>vec</span><span class='macro'>!</span>(
+ <span class='number'>0x3d_u8</span>, <span class='number'>0x2e_u8</span>, <span class='number'>0xec_u8</span>, <span class='number'>0x4f_u8</span>, <span class='number'>0xe4_u8</span>, <span class='number'>0x1c_u8</span>, <span class='number'>0x84_u8</span>,
+ <span class='number'>0x9b_u8</span>, <span class='number'>0x80_u8</span>, <span class='number'>0xc8_u8</span>, <span class='number'>0xd8_u8</span>, <span class='number'>0x36_u8</span>, <span class='number'>0x62_u8</span>, <span class='number'>0xc0_u8</span>,
+ <span class='number'>0xe4_u8</span>, <span class='number'>0x4a_u8</span>, <span class='number'>0x8b_u8</span>, <span class='number'>0x29_u8</span>, <span class='number'>0x1a_u8</span>, <span class='number'>0x96_u8</span>, <span class='number'>0x4c_u8</span>,
+ <span class='number'>0xf2_u8</span>, <span class='number'>0xf0_u8</span>, <span class='number'>0x70_u8</span>, <span class='number'>0x38_u8</span>
+ )
+ );
+
+ <span class='macro'>assert_eq</span><span class='macro'>!</span>(
+ <span class='ident'>super</span>::<span class='ident'>pbkdf2_hmac_sha1</span>(
+ <span class='string'>&quot;pass\x00word&quot;</span>,
+ <span class='string'>&quot;sa\x00lt&quot;</span>.<span class='ident'>as_bytes</span>(),
+ <span class='number'>4096</span>,
+ <span class='number'>16</span>
+ ),
+ <span class='macro'>vec</span><span class='macro'>!</span>(
+ <span class='number'>0x56_u8</span>, <span class='number'>0xfa_u8</span>, <span class='number'>0x6a_u8</span>, <span class='number'>0xa7_u8</span>, <span class='number'>0x55_u8</span>, <span class='number'>0x48_u8</span>, <span class='number'>0x09_u8</span>,
+ <span class='number'>0x9d_u8</span>, <span class='number'>0xcc_u8</span>, <span class='number'>0x37_u8</span>, <span class='number'>0xd7_u8</span>, <span class='number'>0xf0_u8</span>, <span class='number'>0x34_u8</span>, <span class='number'>0x25_u8</span>,
+ <span class='number'>0xe0_u8</span>, <span class='number'>0xc3_u8</span>
+ )
+ );
+ }
+}
+</pre>
+</section>
+ <section id='search' class="content hidden"></section>
+
+ <section class="footer"></section>
+
+ <div id="help" class="hidden">
+ <div class="shortcuts">
+ <h1>Keyboard shortcuts</h1>
+ <dl>
+ <dt>?</dt>
+ <dd>Show this help dialog</dd>
+ <dt>S</dt>
+ <dd>Focus the search field</dd>
+ <dt>&larrb;</dt>
+ <dd>Move up in search results</dd>
+ <dt>&rarrb;</dt>
+ <dd>Move down in search results</dd>
+ <dt>&#9166;</dt>
+ <dd>Go to active search result</dd>
+ </dl>
+ </div>
+ <div class="infos">
+ <h1>Search tricks</h1>
+ <p>
+ Prefix searches with a type followed by a colon (e.g.
+ <code>fn:</code>) to restrict the search to a given type.
+ </p>
+ <p>
+ Accepted types are: <code>fn</code>, <code>mod</code>,
+ <code>struct</code>, <code>enum</code>,
+ <code>trait</code>, <code>typedef</code> (or
+ <code>tdef</code>).
+ </p>
+ <p>
+ Search functions by type signature (e.g.
+ <code>vec -> usize</code>)
+ </p>
+ </div>
+ </div>
+
+
+
+ <script>
+ window.rootPath = "../../../";
+ window.currentCrate = "openssl";
+ window.playgroundUrl = "";
+ </script>
+ <script src="../../../jquery.js"></script>
+ <script src="../../../main.js"></script>
+
+ <script async src="../../../search-index.js"></script>
+</body>
+</html> \ No newline at end of file