Home
last modified time | relevance | path

Searched refs:saltSize (Results 1 – 5 of 5) sorted by relevance

/third_party/node/test/parallel/
Dtest-webcrypto-derivebits-hkdf.js225 saltSize, argument
230 salt: Buffer.from(kSalts[saltSize], 'hex'),
243 kDerivations[size][saltSize][hash][infoSize]);
249 saltSize, argument
254 salt: Buffer.from(kSalts[saltSize], 'hex'),
285 saltSize, argument
288 const salt = Buffer.from(kSalts[saltSize], 'hex');
318 saltSize, argument
323 salt: Buffer.from(kSalts[saltSize], 'hex'),
337 saltSize, argument
[all …]
/third_party/node/test/pummel/
Dtest-webcrypto-derivebits-pbkdf2.js416 saltSize, argument
421 salt: Buffer.from(kSalts[saltSize], 'hex'),
431 kDerivations[size][saltSize][hash][iterations]);
437 saltSize, argument
442 salt: Buffer.from(kSalts[saltSize], 'hex'),
473 saltSize, argument
476 const salt = Buffer.from(kSalts[saltSize], 'hex');
505 saltSize, argument
510 salt: Buffer.from(kSalts[saltSize], 'hex'),
525 saltSize, argument
[all …]
/third_party/node/test/fixtures/wpt/WebCryptoAPI/derive_bits_keys/
Dpbkdf2.js30 Object.keys(derivations[passwordSize]).forEach(function(saltSize) { argument
31 Object.keys(derivations[passwordSize][saltSize]).forEach(function(hashName) {
32 … Object.keys(derivations[passwordSize][saltSize][hashName]).forEach(function(iterations) {
33 …var testName = passwordSize + " password, " + saltSize + " salt, " + hashName + ", with " + iterat…
37 …return subtle.deriveBits({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parse…
39 …assert_true(equalBuffers(derivation, derivations[passwordSize][saltSize][hashName][iterations]), "…
52 …testName += " using " + passwordSize + " password, " + saltSize + " salt, " + hashName + ", with "…
56 …return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseI…
61 …assert_true(equalBuffers(buffer, derivations[passwordSize][saltSize][hashName][iterations].slice(0…
76 …return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: badHash, iterations: parseIn…
[all …]
Dhkdf.js32 Object.keys(derivations[derivedKeySize]).forEach(function(saltSize) { argument
33 Object.keys(derivations[derivedKeySize][saltSize]).forEach(function(hashName) {
34 … Object.keys(derivations[derivedKeySize][saltSize][hashName]).forEach(function(infoSize) {
35 …var testName = derivedKeySize + " derivedKey, " + saltSize + " salt, " + hashName + ", with " + in…
36 … var algorithm = {name: "HKDF", salt: salts[saltSize], info: infos[infoSize], hash: hashName};
42 …assert_true(equalBuffers(derivation, derivations[derivedKeySize][saltSize][hashName][infoSize]), "…
65 …testName += " using " + derivedKeySize + " derivedKey, " + saltSize + " salt, " + hashName + ", wi…
74 …assert_true(equalBuffers(buffer, derivations[derivedKeySize][saltSize][hashName][infoSize].slice(0…
89 … var badAlgorithm = {name: "HKDF", salt: salts[saltSize], hash: badHash, info: algorithm.info};
134 …return subtle.deriveBits({name: "HKDF", salt: salts[saltSize], hash: hashName}, baseKeys[derivedKe…
[all …]
/third_party/lzma/CPP/7zip/Crypto/
D7zAes.cpp269 unsigned saltSize = ((b0 >> 7) & 1) + (b1 >> 4); in Z7_COM7F_IMF() local
272 if (size != 2 + saltSize + ivSize) in Z7_COM7F_IMF()
274 _key.SaltSize = saltSize; in Z7_COM7F_IMF()
276 for (i = 0; i < saltSize; i++) in Z7_COM7F_IMF()