Home
last modified time | relevance | path

Searched refs:pbkdf2 (Results 1 – 25 of 162) sorted by relevance

1234567

/third_party/openssl/test/recipes/30-test_evp_data/
Devppbe_pbkdf2.txt16 PBE = pbkdf2
23 PBE = pbkdf2
30 PBE = pbkdf2
37 PBE = pbkdf2
44 PBE = pbkdf2
51 PBE = pbkdf2
58 PBE = pbkdf2
65 PBE = pbkdf2
72 PBE = pbkdf2
79 PBE = pbkdf2
[all …]
/third_party/node/test/parallel/
Dtest-crypto-pbkdf2.js13 crypto.pbkdf2(password, salt, iterations, keylen, hash,
59 () => crypto.pbkdf2('password', 'salt', 1, 20, 'sha1'),
91 crypto.pbkdf2('password', 'salt', 1, input, 'sha256',
104 crypto.pbkdf2('password', 'salt', 1, input, 'sha256',
114 crypto.pbkdf2('', '', 1, 32, 'sha256', common.mustSucceed());
117 () => crypto.pbkdf2('password', 'salt', 8, 8, common.mustNotCall()),
144 () => crypto.pbkdf2(input, 'salt', 8, 8, 'sha256', common.mustNotCall()),
152 () => crypto.pbkdf2('pass', input, 8, 8, 'sha256', common.mustNotCall()),
179 () => crypto.pbkdf2('pass', 'salt', i, 8, 'sha256', common.mustNotCall()),
205 () => crypto.pbkdf2('pass', 'salt', 8, 8, 'md55', common.mustNotCall()),
Dtest-domain-crypto.js43 crypto.pbkdf2('password', 'salt', 8, 8, 'sha1', common.mustSucceed());
Dtest-crypto-domains.js42 crypto.pbkdf2('a', 'b', 1, 8, 'sha1', function() {
Dtest-crypto-domain.js44 crypto.pbkdf2('password', 'salt', 1, 8, cb);
Dtest-crypto-binary-default.js698 crypto.pbkdf2(password, salt, iterations, keylen, 'sha256', cb);
/third_party/openssl/demos/kdf/
DMakefile10 all: hkdf pbkdf2 scrypt
16 pbkdf2: pbkdf2.o target
22 $(RM) *.o hkdf pbkdf2 scrypt
/third_party/node/lib/internal/crypto/
Dpbkdf2.js33 function pbkdf2(password, salt, iterations, keylen, digest, callback) { function
99 const pbkdf2Promise = promisify(pbkdf2);
134 pbkdf2, property
/third_party/python/Lib/test/
Dtest_hashlib.py1006 def _test_pbkdf2_hmac(self, pbkdf2, supported): argument
1015 out = pbkdf2(digest_name, password, salt, rounds, dklen)
1018 out = pbkdf2(digest_name, memoryview(password),
1021 out = pbkdf2(digest_name, bytearray(password),
1025 out = pbkdf2(digest_name, password, salt, rounds)
1030 pbkdf2('unknown', b'pass', b'salt', 1)
1034 TypeError, pbkdf2, b'sha1', b'pass', b'salt', 1
1037 TypeError, pbkdf2, 'sha1', 'pass', 'salt', 1
1040 ValueError, pbkdf2, 'sha1', b'pass', b'salt', 0
1043 ValueError, pbkdf2, 'sha1', b'pass', b'salt', -1
[all …]
/third_party/openssl/apps/
Denc.c136 int pbkdf2 = 0; in enc_main() local
279 pbkdf2 = 1; in enc_main()
282 pbkdf2 = 1; in enc_main()
490 if (pbkdf2 == 1) { in enc_main()
/third_party/node/deps/openssl/openssl/apps/
Denc.c136 int pbkdf2 = 0; in enc_main() local
279 pbkdf2 = 1; in enc_main()
282 pbkdf2 = 1; in enc_main()
490 if (pbkdf2 == 1) { in enc_main()
/third_party/node/lib/
Dcrypto.js60 pbkdf2,
202 pbkdf2, property
/third_party/node/test/async-hooks/
Dtest-crypto-pbkdf2.js20 crypto.pbkdf2('password', 'salt', 1, 20, 'sha256', common.mustCall(onpbkdf2));
Dcoverage.md16 | PBKDF2REQUEST | test-crypto-pbkdf2.js |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
DMakefile35 sha1-pbkdf2.o \
/third_party/openssl/providers/implementations/kdfs/
Dbuild.info26 SOURCE[$PBKDF2_GOAL]=pbkdf2.c
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/
Dbuild.info26 SOURCE[$PBKDF2_GOAL]=pbkdf2.c
/third_party/openssl/doc/man1/
Dopenssl-enc.pod.in33 [B<-pbkdf2>]
130 =item B<-pbkdf2>
417 openssl enc -aes128 -pbkdf2 -in file.txt -out file.aes128
421 openssl enc -aes128 -pbkdf2 -d -in file.aes128 -out file.txt \
427 openssl enc -aes-256-ctr -pbkdf2 -a -in file.txt -out file.aes256
431 openssl enc -aes-256-ctr -pbkdf2 -d -a -in file.aes256 -out file.txt \
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
DMakefile46 sha1-pbkdf2.o \
/third_party/openssl/demos/
DREADME.txt25 pbkdf2.c Demonstration of PBKDF2 password based key derivation
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Dnmake.mak67 $(OBJDIR)\sha1-pbkdf2.obj \
165 $(OBJDIR)\sha1-pbkdf2.obj \
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dnmake.mak67 $(OBJDIR)\sha1-pbkdf2.obj \
165 $(OBJDIR)\sha1-pbkdf2.obj \
/third_party/node/test/sequential/
Dtest-async-wrap-getasyncid.js141 crypto.pbkdf2('password', 'salt', 1, 20, 'sha256', mc);
/third_party/node/deps/openssl/openssl/providers/
Dfips.module.sources562 providers/implementations/kdfs/pbkdf2.c
563 providers/implementations/kdfs/pbkdf2.h
/third_party/openssl/providers/
Dfips.module.sources562 providers/implementations/kdfs/pbkdf2.c
563 providers/implementations/kdfs/pbkdf2.h

1234567