/third_party/node/test/parallel/ |
D | test-crypto-scrypt.js | 164 crypto.scrypt(pass, salt, keylen, options, common.mustSucceed((actual) => { 173 assert.throws(() => crypto.scrypt('pass', 'salt', 1, options, () => {}), 183 assert.throws(() => crypto.scrypt('pass', 'salt', 1, options, () => {}), 194 crypto.scrypt('pass', 'salt', 1, common.mustSucceed((actual) => { 209 crypto.scrypt('pass', 'salt', 1, common.mustSucceed((actual) => { 217 assert.throws(() => crypto.scrypt(...args), expected); 223 assert.throws(() => crypto.scrypt('', '', 42, null), expected); 224 assert.throws(() => crypto.scrypt('', '', 42, {}, null), expected); 225 assert.throws(() => crypto.scrypt('', '', 42, {}), expected); 226 assert.throws(() => crypto.scrypt('', '', 42, {}, {}), expected); [all …]
|
/third_party/openssl/test/recipes/30-test_evp_data/ |
D | evppkey_kdf_scrypt.txt | 14 Title = id-scrypt tests (from draft-josefsson-id-scrypt-kdf-03 and others) 16 PKEYKDF = scrypt 24 PKEYKDF = scrypt 32 PKEYKDF = scrypt 40 PKEYKDF = scrypt 48 PKEYKDF = scrypt 57 PKEYKDF = scrypt
|
D | evppbe_scrypt.txt | 14 Title = scrypt tests (from draft-josefsson-scrypt-kdf-03 and others) Using PBE 16 PBE = scrypt 24 PBE = scrypt 32 PBE = scrypt 41 # scrypt memory limit and return an error. To run this test without error 44 PBE = scrypt
|
D | evpkdf_scrypt.txt | 14 Title = Scrypt tests (from draft-josefsson-id-scrypt-kdf-03 and others) 16 KDF = id-scrypt 24 KDF = id-scrypt 32 KDF = id-scrypt 40 KDF = id-scrypt 48 KDF = id-scrypt 57 KDF = id-scrypt
|
/third_party/openssl/demos/kdf/ |
D | Makefile | 10 all: hkdf pbkdf2 scrypt 17 scrypt: scrypt.o target 22 $(RM) *.o hkdf pbkdf2 scrypt
|
/third_party/openssl/doc/man7/ |
D | EVP_KDF-SCRYPT.pod | 5 EVP_KDF-SCRYPT - The scrypt EVP_KDF implementation 9 Support for computing the B<scrypt> password-based KDF through the B<EVP_KDF> 12 The EVP_KDF-SCRYPT algorithm implements the scrypt password-based key 19 scrypt provides three work factors that can be customized: N, r and p. N, which 23 greater than zero. The amount of RAM that scrypt requires for its computation 33 may be used by scrypt defaults to 1025 MiB. 60 These parameters configure the scrypt work factors N, r, maxmem and p. 73 A context for scrypt can be obtained by calling: 78 The output length of an scrypt key derivation is specified via the 83 This example derives a 64-byte long test vector using scrypt with the password
|
D | provider-kdf.pod | 228 Sets the scrypt work factor parameter N in the associated KDF ctx. 232 Sets the scrypt work factor parameter r in the associated KDF ctx. 236 Sets the scrypt work factor parameter p in the associated KDF ctx. 240 Sets the scrypt work factor parameter maxmem in the associated KDF ctx.
|
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_CTX_set_scrypt_N.pod | 10 - EVP_PKEY scrypt KDF support functions 31 scrypt KDF. 32 For more information on scrypt, see L<EVP_KDF-SCRYPT(7)>. 47 scrypt also supports string based control operations via 60 The scrypt KDF also uses EVP_PKEY_CTX_set1_pbe_pass() as well as
|
D | EVP_KDF.pod | 241 Memory-hard password-based KDF algorithms, such as scrypt, use an amount of
|
/third_party/python/Lib/test/ |
D | test_hashlib.py | 1072 result = hashlib.scrypt(password, salt=salt, n=n, r=r, p=p) 1076 hashlib.scrypt(b'password', salt=b'salt', n=2, r=8, p=1) 1079 hashlib.scrypt('password', salt=b'salt', n=2, r=8, p=1) 1081 hashlib.scrypt(b'password', salt='salt', n=2, r=8, p=1) 1084 hashlib.scrypt(b'password') 1086 hashlib.scrypt(b'password', b'salt') 1088 hashlib.scrypt(b'password', 2, 8, 1, salt=b'salt') 1091 hashlib.scrypt(b'password', salt=b'salt', n=n, r=8, p=1) 1094 hashlib.scrypt(b'password', salt=b'salt', n=2, r=r, p=1) 1097 hashlib.scrypt(b'password', salt=b'salt', n=2, r=8, p=p) [all …]
|
/third_party/node/deps/openssl/openssl/providers/implementations/exchange/ |
D | kdf_exch.c | 78 KDF_NEWCTX(scrypt, "SCRYPT") 198 KDF_SETTABLE_CTX_PARAMS(scrypt, "SCRYPT") 215 KDF_KEYEXCH_FUNCTIONS(scrypt)
|
/third_party/openssl/providers/implementations/exchange/ |
D | kdf_exch.c | 78 KDF_NEWCTX(scrypt, "SCRYPT") 198 KDF_SETTABLE_CTX_PARAMS(scrypt, "SCRYPT") 215 KDF_KEYEXCH_FUNCTIONS(scrypt)
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
D | pkcs5.rs | 120 pub fn scrypt( in scrypt() function 290 fn scrypt() { in scrypt() function 298 super::scrypt( in scrypt()
|
/third_party/node/lib/internal/crypto/ |
D | scrypt.js | 41 function scrypt(password, salt, keylen, options, callback = defaults) { function 139 scrypt, property
|
/third_party/node/lib/ |
D | crypto.js | 64 scrypt, 217 scrypt, property
|
/third_party/openssl/doc/man1/ |
D | openssl-kdf.pod.in | 92 The password must be specified for PBKDF2 and scrypt. 97 The password must be specified for PBKDF2 and scrypt. 166 Use scrypt to create a hex-encoded derived key from a password and salt:
|
D | openssl-pkcs8.pod.in | 26 [B<-scrypt>] 140 =item B<-scrypt> 142 Uses the B<scrypt> algorithm for private key encryption using default 149 Sets the scrypt I<N>, I<r> or I<p> parameters.
|
D | openssl-pkeyutl.pod.in | 379 Derive a key using B<scrypt> where the password is read from command line: 381 openssl pkeyutl -kdf scrypt -kdflen 16 -pkeyopt_passin pass \ 386 openssl pkeyutl -kdf scrypt -kdflen 16 -pkeyopt_passin pass:env:MYPASS \
|
/third_party/openssl/providers/implementations/kdfs/ |
D | build.info | 35 SOURCE[$SCRYPT_GOAL]=scrypt.c
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
D | build.info | 35 SOURCE[$SCRYPT_GOAL]=scrypt.c
|
/third_party/openssl/demos/ |
D | README.txt | 26 scrypt.c Demonstration of SCRYPT password based key derivation
|
/third_party/python/Lib/ |
D | hashlib.py | 252 from _hashlib import scrypt
|
/third_party/node/doc/api/ |
D | crypto.md | 328 scrypt, 338 scrypt(password, 'salt', 24, (err, key) => { 361 scrypt, 371 scrypt(password, 'salt', 24, (err, key) => { 405 scrypt, 415 scrypt(password, 'salt', 24, (err, key) => { 444 scrypt, 454 scrypt(password, 'salt', 24, (err, key) => { 476 scrypt, 486 scrypt(password, 'salt', 24, (err, key) => { [all …]
|
/third_party/node/test/sequential/ |
D | test-async-wrap-getasyncid.js | 148 crypto.scrypt('password', 'salt', 8, common.mustCall(function() {
|
/third_party/python/Doc/library/ |
D | hashlib.rst | 277 .. function:: scrypt(password, *, salt, n, r, p, maxmem=0, dklen=64) 279 The function provides scrypt password-based key derivation function as
|