Home
last modified time | relevance | path

Searched refs:scrypt (Results 1 – 25 of 109) sorted by relevance

12345

/third_party/node/test/parallel/
Dtest-crypto-scrypt.js164 crypto.scrypt(pass, salt, keylen, options, common.mustSucceed((actual) => {
173 assert.throws(() => crypto.scrypt('pass', 'salt', 1, options, () => {}),
183 assert.throws(() => crypto.scrypt('pass', 'salt', 1, options, () => {}),
194 crypto.scrypt('pass', 'salt', 1, common.mustSucceed((actual) => {
209 crypto.scrypt('pass', 'salt', 1, common.mustSucceed((actual) => {
217 assert.throws(() => crypto.scrypt(...args), expected);
223 assert.throws(() => crypto.scrypt('', '', 42, null), expected);
224 assert.throws(() => crypto.scrypt('', '', 42, {}, null), expected);
225 assert.throws(() => crypto.scrypt('', '', 42, {}), expected);
226 assert.throws(() => crypto.scrypt('', '', 42, {}, {}), expected);
[all …]
/third_party/openssl/test/recipes/30-test_evp_data/
Devppkey_kdf_scrypt.txt14 Title = id-scrypt tests (from draft-josefsson-id-scrypt-kdf-03 and others)
16 PKEYKDF = scrypt
24 PKEYKDF = scrypt
32 PKEYKDF = scrypt
40 PKEYKDF = scrypt
48 PKEYKDF = scrypt
57 PKEYKDF = scrypt
Devppbe_scrypt.txt14 Title = scrypt tests (from draft-josefsson-scrypt-kdf-03 and others) Using PBE
16 PBE = scrypt
24 PBE = scrypt
32 PBE = scrypt
41 # scrypt memory limit and return an error. To run this test without error
44 PBE = scrypt
Devpkdf_scrypt.txt14 Title = Scrypt tests (from draft-josefsson-id-scrypt-kdf-03 and others)
16 KDF = id-scrypt
24 KDF = id-scrypt
32 KDF = id-scrypt
40 KDF = id-scrypt
48 KDF = id-scrypt
57 KDF = id-scrypt
/third_party/openssl/demos/kdf/
DMakefile10 all: hkdf pbkdf2 scrypt
17 scrypt: scrypt.o target
22 $(RM) *.o hkdf pbkdf2 scrypt
/third_party/openssl/doc/man7/
DEVP_KDF-SCRYPT.pod5 EVP_KDF-SCRYPT - The scrypt EVP_KDF implementation
9 Support for computing the B<scrypt> password-based KDF through the B<EVP_KDF>
12 The EVP_KDF-SCRYPT algorithm implements the scrypt password-based key
19 scrypt provides three work factors that can be customized: N, r and p. N, which
23 greater than zero. The amount of RAM that scrypt requires for its computation
33 may be used by scrypt defaults to 1025 MiB.
60 These parameters configure the scrypt work factors N, r, maxmem and p.
73 A context for scrypt can be obtained by calling:
78 The output length of an scrypt key derivation is specified via the
83 This example derives a 64-byte long test vector using scrypt with the password
Dprovider-kdf.pod228 Sets the scrypt work factor parameter N in the associated KDF ctx.
232 Sets the scrypt work factor parameter r in the associated KDF ctx.
236 Sets the scrypt work factor parameter p in the associated KDF ctx.
240 Sets the scrypt work factor parameter maxmem in the associated KDF ctx.
/third_party/openssl/doc/man3/
DEVP_PKEY_CTX_set_scrypt_N.pod10 - EVP_PKEY scrypt KDF support functions
31 scrypt KDF.
32 For more information on scrypt, see L<EVP_KDF-SCRYPT(7)>.
47 scrypt also supports string based control operations via
60 The scrypt KDF also uses EVP_PKEY_CTX_set1_pbe_pass() as well as
DEVP_KDF.pod241 Memory-hard password-based KDF algorithms, such as scrypt, use an amount of
/third_party/python/Lib/test/
Dtest_hashlib.py1072 result = hashlib.scrypt(password, salt=salt, n=n, r=r, p=p)
1076 hashlib.scrypt(b'password', salt=b'salt', n=2, r=8, p=1)
1079 hashlib.scrypt('password', salt=b'salt', n=2, r=8, p=1)
1081 hashlib.scrypt(b'password', salt='salt', n=2, r=8, p=1)
1084 hashlib.scrypt(b'password')
1086 hashlib.scrypt(b'password', b'salt')
1088 hashlib.scrypt(b'password', 2, 8, 1, salt=b'salt')
1091 hashlib.scrypt(b'password', salt=b'salt', n=n, r=8, p=1)
1094 hashlib.scrypt(b'password', salt=b'salt', n=2, r=r, p=1)
1097 hashlib.scrypt(b'password', salt=b'salt', n=2, r=8, p=p)
[all …]
/third_party/node/deps/openssl/openssl/providers/implementations/exchange/
Dkdf_exch.c78 KDF_NEWCTX(scrypt, "SCRYPT")
198 KDF_SETTABLE_CTX_PARAMS(scrypt, "SCRYPT")
215 KDF_KEYEXCH_FUNCTIONS(scrypt)
/third_party/openssl/providers/implementations/exchange/
Dkdf_exch.c78 KDF_NEWCTX(scrypt, "SCRYPT")
198 KDF_SETTABLE_CTX_PARAMS(scrypt, "SCRYPT")
215 KDF_KEYEXCH_FUNCTIONS(scrypt)
/third_party/rust/crates/rust-openssl/openssl/src/
Dpkcs5.rs120 pub fn scrypt( in scrypt() function
290 fn scrypt() { in scrypt() function
298 super::scrypt( in scrypt()
/third_party/node/lib/internal/crypto/
Dscrypt.js41 function scrypt(password, salt, keylen, options, callback = defaults) { function
139 scrypt, property
/third_party/node/lib/
Dcrypto.js64 scrypt,
217 scrypt, property
/third_party/openssl/doc/man1/
Dopenssl-kdf.pod.in92 The password must be specified for PBKDF2 and scrypt.
97 The password must be specified for PBKDF2 and scrypt.
166 Use scrypt to create a hex-encoded derived key from a password and salt:
Dopenssl-pkcs8.pod.in26 [B<-scrypt>]
140 =item B<-scrypt>
142 Uses the B<scrypt> algorithm for private key encryption using default
149 Sets the scrypt I<N>, I<r> or I<p> parameters.
Dopenssl-pkeyutl.pod.in379 Derive a key using B<scrypt> where the password is read from command line:
381 openssl pkeyutl -kdf scrypt -kdflen 16 -pkeyopt_passin pass \
386 openssl pkeyutl -kdf scrypt -kdflen 16 -pkeyopt_passin pass:env:MYPASS \
/third_party/openssl/providers/implementations/kdfs/
Dbuild.info35 SOURCE[$SCRYPT_GOAL]=scrypt.c
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/
Dbuild.info35 SOURCE[$SCRYPT_GOAL]=scrypt.c
/third_party/openssl/demos/
DREADME.txt26 scrypt.c Demonstration of SCRYPT password based key derivation
/third_party/python/Lib/
Dhashlib.py252 from _hashlib import scrypt
/third_party/node/doc/api/
Dcrypto.md328 scrypt,
338 scrypt(password, 'salt', 24, (err, key) => {
361 scrypt,
371 scrypt(password, 'salt', 24, (err, key) => {
405 scrypt,
415 scrypt(password, 'salt', 24, (err, key) => {
444 scrypt,
454 scrypt(password, 'salt', 24, (err, key) => {
476 scrypt,
486 scrypt(password, 'salt', 24, (err, key) => {
[all …]
/third_party/node/test/sequential/
Dtest-async-wrap-getasyncid.js148 crypto.scrypt('password', 'salt', 8, common.mustCall(function() {
/third_party/python/Doc/library/
Dhashlib.rst277 .. function:: scrypt(password, *, salt, n, r, p, maxmem=0, dklen=64)
279 The function provides scrypt password-based key derivation function as

12345