/third_party/node/test/parallel/ |
D | test-crypto-pbkdf2.js | 17 crypto.pbkdf2(password, salt, iterations, keylen, 'sha256', 52 crypto.pbkdf2('password', 'salt', 32, 32, 'sha256', 61 () => crypto.pbkdf2('password', 'salt', 1, 20, 'sha1'), 95 crypto.pbkdf2('password', 'salt', 1, input, 'sha256', 108 crypto.pbkdf2('password', 'salt', 1, input, 'sha256', 120 crypto.pbkdf2('', '', 1, 32, 'sha256', common.mustSucceed()); 123 () => crypto.pbkdf2('password', 'salt', 8, 8, common.mustNotCall()), 152 () => crypto.pbkdf2(input, 'salt', 8, 8, 'sha256', common.mustNotCall()), 161 () => crypto.pbkdf2('pass', input, 8, 8, 'sha256', common.mustNotCall()), 191 () => crypto.pbkdf2('pass', 'salt', i, 8, 'sha256', common.mustNotCall()), [all …]
|
D | test-domain-crypto.js | 43 crypto.pbkdf2('password', 'salt', 8, 8, 'sha1', common.mustSucceed());
|
D | test-crypto-domains.js | 42 crypto.pbkdf2('a', 'b', 1, 8, 'sha1', function() {
|
D | test-crypto-domain.js | 44 crypto.pbkdf2('password', 'salt', 1, 8, cb);
|
D | test-crypto-binary-default.js | 697 crypto.pbkdf2(password, salt, iterations, keylen, 'sha256', cb);
|
/third_party/openssl/test/recipes/30-test_evp_data/ |
D | evppbe.txt | 107 PBE = pbkdf2 114 PBE = pbkdf2 121 PBE = pbkdf2 128 PBE = pbkdf2 135 PBE = pbkdf2 142 PBE = pbkdf2 149 PBE = pbkdf2 156 PBE = pbkdf2 163 PBE = pbkdf2 170 PBE = pbkdf2 [all …]
|
/third_party/node/lib/internal/crypto/ |
D | pbkdf2.js | 5 const { pbkdf2: _pbkdf2 } = internalBinding('crypto'); 18 function pbkdf2(password, salt, iterations, keylen, digest, callback) { function 75 pbkdf2, property
|
/third_party/python/Lib/test/ |
D | test_hashlib.py | 997 def _test_pbkdf2_hmac(self, pbkdf2, supported): argument 1006 out = pbkdf2(digest_name, password, salt, rounds, dklen) 1009 out = pbkdf2(digest_name, memoryview(password), 1012 out = pbkdf2(digest_name, bytearray(password), 1016 out = pbkdf2(digest_name, password, salt, rounds) 1021 pbkdf2('unknown', b'pass', b'salt', 1) 1025 TypeError, pbkdf2, b'sha1', b'pass', b'salt', 1 1028 TypeError, pbkdf2, 'sha1', 'pass', 'salt', 1 1031 ValueError, pbkdf2, 'sha1', b'pass', b'salt', 0 1034 ValueError, pbkdf2, 'sha1', b'pass', b'salt', -1 [all …]
|
/third_party/node/lib/ |
D | crypto.js | 58 pbkdf2, 176 pbkdf2, property
|
/third_party/openssl/apps/ |
D | enc.c | 113 int pbkdf2 = 0; in enc_main() local 266 pbkdf2 = 1; in enc_main() 269 pbkdf2 = 1; in enc_main() 463 if (pbkdf2 == 1) { in enc_main()
|
/third_party/node/test/async-hooks/ |
D | test-crypto-pbkdf2.js | 20 crypto.pbkdf2('password', 'salt', 1, 20, 'sha256', common.mustCall(onpbkdf2));
|
D | coverage.md | 16 | PBKDF2REQUEST | test-crypto-pbkdf2.js |
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | Makefile | 35 sha1-pbkdf2.o \
|
/third_party/openssl/doc/man1/ |
D | enc.pod | 32 [B<-pbkdf2>] 125 =item B<-pbkdf2> 398 openssl enc -aes128 -pbkdf2 -in file.txt -out file.aes128 402 openssl enc -aes128 -pbkdf2 -d -in file.aes128 -out file.txt \ 408 openssl enc -aes-256-ctr -pbkdf2 -a -in file.txt -out file.aes256 412 openssl enc -aes-256-ctr -pbkdf2 -d -a -in file.aes256 -out file.txt \
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | Makefile | 46 sha1-pbkdf2.o \
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | nmake.mak | 67 $(OBJDIR)\sha1-pbkdf2.obj \ 165 $(OBJDIR)\sha1-pbkdf2.obj \
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | nmake.mak | 67 $(OBJDIR)\sha1-pbkdf2.obj \ 165 $(OBJDIR)\sha1-pbkdf2.obj \
|
/third_party/node/test/sequential/ |
D | test-async-wrap-getasyncid.js | 128 crypto.pbkdf2('password', 'salt', 1, 20, 'sha256', mc);
|
/third_party/node/doc/api/ |
D | deprecations.md | 230 ### DEP0009: `crypto.pbkdf2` without digest 252 Use of the [`crypto.pbkdf2()`][] API without specifying a digest was deprecated 255 Node.js 8.0.0, calling `crypto.pbkdf2()` or `crypto.pbkdf2Sync()` with 1992 [`crypto.pbkdf2()`][] or [`crypto.scrypt()`][] and to use 2707 [`crypto.pbkdf2()`]: crypto.md#crypto_crypto_pbkdf2_password_salt_iterations_keylen_digest_callback
|
D | crypto.md | 2356 ### `crypto.pbkdf2(password, salt, iterations, keylen, digest, callback)` 2409 crypto.pbkdf2('secret', 'salt', 100000, 64, 'sha512', (err, derivedKey) => { 2422 crypto.pbkdf2('secret', 'salt', 100000, 512, 'sha512', (err, derivedKey) => {
|
D | cli.md | 1645 * asynchronous crypto APIs such as `crypto.pbkdf2()`, `crypto.scrypt()`,
|
/third_party/node/deps/npm/node_modules/psl/ |
D | yarn.lock | 1002 pbkdf2 "^3.0.3" 3225 pbkdf2 "^3.0.3" 3296 pbkdf2@^3.0.3: 3298 …resolved "https://registry.yarnpkg.com/pbkdf2/-/pbkdf2-3.0.16.tgz#7404208ec6b01b62d85bf83853a8064f…
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/ |
D | CMakeLists.txt | 300 src/crypto/sha1-pbkdf2.c
|
/third_party/node/doc/changelogs/ |
D | CHANGELOG_ARCHIVE.md | 348 * crypto: support custom pbkdf2 digest methods (Ben Noordhuis) 456 * crypto: make randomBytes/pbkdf2 callbacks domain aware (Ben Noordhuis) 885 * crypto: add sync interface to crypto.pbkdf2() (Ben Noordhuis) 1147 * crypto, tls: Domainify setSNICallback, pbkdf2, randomBytes (Ben Noordhuis)
|
/third_party/openssl/crypto/err/ |
D | openssl.txt | 2293 EVP_R_PBKDF2_ERROR:181:pbkdf2 error
|