Home
last modified time | relevance | path

Searched refs:pbkdf2 (Results 1 – 25 of 34) sorted by relevance

12

/third_party/node/test/parallel/
Dtest-crypto-pbkdf2.js17 crypto.pbkdf2(password, salt, iterations, keylen, 'sha256',
52 crypto.pbkdf2('password', 'salt', 32, 32, 'sha256',
61 () => crypto.pbkdf2('password', 'salt', 1, 20, 'sha1'),
95 crypto.pbkdf2('password', 'salt', 1, input, 'sha256',
108 crypto.pbkdf2('password', 'salt', 1, input, 'sha256',
120 crypto.pbkdf2('', '', 1, 32, 'sha256', common.mustSucceed());
123 () => crypto.pbkdf2('password', 'salt', 8, 8, common.mustNotCall()),
152 () => crypto.pbkdf2(input, 'salt', 8, 8, 'sha256', common.mustNotCall()),
161 () => crypto.pbkdf2('pass', input, 8, 8, 'sha256', common.mustNotCall()),
191 () => crypto.pbkdf2('pass', 'salt', i, 8, 'sha256', common.mustNotCall()),
[all …]
Dtest-domain-crypto.js43 crypto.pbkdf2('password', 'salt', 8, 8, 'sha1', common.mustSucceed());
Dtest-crypto-domains.js42 crypto.pbkdf2('a', 'b', 1, 8, 'sha1', function() {
Dtest-crypto-domain.js44 crypto.pbkdf2('password', 'salt', 1, 8, cb);
Dtest-crypto-binary-default.js697 crypto.pbkdf2(password, salt, iterations, keylen, 'sha256', cb);
/third_party/openssl/test/recipes/30-test_evp_data/
Devppbe.txt107 PBE = pbkdf2
114 PBE = pbkdf2
121 PBE = pbkdf2
128 PBE = pbkdf2
135 PBE = pbkdf2
142 PBE = pbkdf2
149 PBE = pbkdf2
156 PBE = pbkdf2
163 PBE = pbkdf2
170 PBE = pbkdf2
[all …]
/third_party/node/lib/internal/crypto/
Dpbkdf2.js5 const { pbkdf2: _pbkdf2 } = internalBinding('crypto');
18 function pbkdf2(password, salt, iterations, keylen, digest, callback) { function
75 pbkdf2, property
/third_party/python/Lib/test/
Dtest_hashlib.py997 def _test_pbkdf2_hmac(self, pbkdf2, supported): argument
1006 out = pbkdf2(digest_name, password, salt, rounds, dklen)
1009 out = pbkdf2(digest_name, memoryview(password),
1012 out = pbkdf2(digest_name, bytearray(password),
1016 out = pbkdf2(digest_name, password, salt, rounds)
1021 pbkdf2('unknown', b'pass', b'salt', 1)
1025 TypeError, pbkdf2, b'sha1', b'pass', b'salt', 1
1028 TypeError, pbkdf2, 'sha1', 'pass', 'salt', 1
1031 ValueError, pbkdf2, 'sha1', b'pass', b'salt', 0
1034 ValueError, pbkdf2, 'sha1', b'pass', b'salt', -1
[all …]
/third_party/node/lib/
Dcrypto.js58 pbkdf2,
176 pbkdf2, property
/third_party/openssl/apps/
Denc.c113 int pbkdf2 = 0; in enc_main() local
266 pbkdf2 = 1; in enc_main()
269 pbkdf2 = 1; in enc_main()
463 if (pbkdf2 == 1) { in enc_main()
/third_party/node/test/async-hooks/
Dtest-crypto-pbkdf2.js20 crypto.pbkdf2('password', 'salt', 1, 20, 'sha256', common.mustCall(onpbkdf2));
Dcoverage.md16 | PBKDF2REQUEST | test-crypto-pbkdf2.js |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
DMakefile35 sha1-pbkdf2.o \
/third_party/openssl/doc/man1/
Denc.pod32 [B<-pbkdf2>]
125 =item B<-pbkdf2>
398 openssl enc -aes128 -pbkdf2 -in file.txt -out file.aes128
402 openssl enc -aes128 -pbkdf2 -d -in file.aes128 -out file.txt \
408 openssl enc -aes-256-ctr -pbkdf2 -a -in file.txt -out file.aes256
412 openssl enc -aes-256-ctr -pbkdf2 -d -a -in file.aes256 -out file.txt \
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
DMakefile46 sha1-pbkdf2.o \
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dnmake.mak67 $(OBJDIR)\sha1-pbkdf2.obj \
165 $(OBJDIR)\sha1-pbkdf2.obj \
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Dnmake.mak67 $(OBJDIR)\sha1-pbkdf2.obj \
165 $(OBJDIR)\sha1-pbkdf2.obj \
/third_party/node/test/sequential/
Dtest-async-wrap-getasyncid.js128 crypto.pbkdf2('password', 'salt', 1, 20, 'sha256', mc);
/third_party/node/doc/api/
Ddeprecations.md230 ### DEP0009: `crypto.pbkdf2` without digest
252 Use of the [`crypto.pbkdf2()`][] API without specifying a digest was deprecated
255 Node.js 8.0.0, calling `crypto.pbkdf2()` or `crypto.pbkdf2Sync()` with
1992 [`crypto.pbkdf2()`][] or [`crypto.scrypt()`][] and to use
2707 [`crypto.pbkdf2()`]: crypto.md#crypto_crypto_pbkdf2_password_salt_iterations_keylen_digest_callback
Dcrypto.md2356 ### `crypto.pbkdf2(password, salt, iterations, keylen, digest, callback)`
2409 crypto.pbkdf2('secret', 'salt', 100000, 64, 'sha512', (err, derivedKey) => {
2422 crypto.pbkdf2('secret', 'salt', 100000, 512, 'sha512', (err, derivedKey) => {
Dcli.md1645 * asynchronous crypto APIs such as `crypto.pbkdf2()`, `crypto.scrypt()`,
/third_party/node/deps/npm/node_modules/psl/
Dyarn.lock1002 pbkdf2 "^3.0.3"
3225 pbkdf2 "^3.0.3"
3296 pbkdf2@^3.0.3:
3298 …resolved "https://registry.yarnpkg.com/pbkdf2/-/pbkdf2-3.0.16.tgz#7404208ec6b01b62d85bf83853a8064f…
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/
DCMakeLists.txt300 src/crypto/sha1-pbkdf2.c
/third_party/node/doc/changelogs/
DCHANGELOG_ARCHIVE.md348 * crypto: support custom pbkdf2 digest methods (Ben Noordhuis)
456 * crypto: make randomBytes/pbkdf2 callbacks domain aware (Ben Noordhuis)
885 * crypto: add sync interface to crypto.pbkdf2() (Ben Noordhuis)
1147 * crypto, tls: Domainify setSNICallback, pbkdf2, randomBytes (Ben Noordhuis)
/third_party/openssl/crypto/err/
Dopenssl.txt2293 EVP_R_PBKDF2_ERROR:181:pbkdf2 error

12