/third_party/node/lib/internal/crypto/ |
H A D | scrypt.js | 38 maxmem: 32 << 20, // 32 MiB, matches SCRYPT_MAX_MEM. 48 const { N, r, p, maxmem } = options; 54 kCryptoJobAsync, password, salt, N, r, p, maxmem, keylen); 71 const { N, r, p, maxmem } = options; 74 kCryptoJobSync, password, salt, N, r, p, maxmem, keylen); 93 let { N, r, p, maxmem } = defaults; 125 if (options.maxmem !== undefined) { 126 maxmem = options.maxmem; 127 validateInteger(maxmem, 'maxme [all...] |
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | pbe_scrypt.c | 39 uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, in EVP_PBE_scrypt_ex() 63 if (maxmem == 0) in EVP_PBE_scrypt_ex() 64 maxmem = SCRYPT_MAX_MEM; in EVP_PBE_scrypt_ex() 81 *z++ = OSSL_PARAM_construct_uint64(OSSL_KDF_PARAM_SCRYPT_MAXMEM, &maxmem); in EVP_PBE_scrypt_ex() 92 uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, in EVP_PBE_scrypt() 95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem, in EVP_PBE_scrypt() 37 EVP_PBE_scrypt_ex(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, OSSL_LIB_CTX *ctx, const char *propq) EVP_PBE_scrypt_ex() argument 90 EVP_PBE_scrypt(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen) EVP_PBE_scrypt() argument
|
/third_party/openssl/crypto/evp/ |
H A D | pbe_scrypt.c | 39 uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, in EVP_PBE_scrypt_ex() 63 if (maxmem == 0) in EVP_PBE_scrypt_ex() 64 maxmem = SCRYPT_MAX_MEM; in EVP_PBE_scrypt_ex() 81 *z++ = OSSL_PARAM_construct_uint64(OSSL_KDF_PARAM_SCRYPT_MAXMEM, &maxmem); in EVP_PBE_scrypt_ex() 92 uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, in EVP_PBE_scrypt() 95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem, in EVP_PBE_scrypt() 37 EVP_PBE_scrypt_ex(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, OSSL_LIB_CTX *ctx, const char *propq) EVP_PBE_scrypt_ex() argument 90 EVP_PBE_scrypt(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen) EVP_PBE_scrypt() argument
|
/third_party/node/src/crypto/ |
H A D | crypto_scrypt.cc | 30 maxmem(other.maxmem), 88 CHECK(args[offset + 5]->IsNumber()); // maxmem in AdditionalConfig() 94 params->maxmem = args[offset + 5]->IntegerValue(env->context()).ToChecked(); in AdditionalConfig() 104 params->maxmem, in AdditionalConfig() 132 params.maxmem, in DeriveBits()
|
H A D | crypto_scrypt.h | 34 uint64_t maxmem; member
|
/third_party/curl/tests/ |
H A D | memanalyze.pl | 62 my $maxmem; # the high water mark 68 if($newtot > $maxmem) { 69 $maxmem= $newtot; 432 print "Maximum allocated: $maxmem\n";
|
/third_party/node/test/parallel/ |
H A D | test-crypto-scrypt.js | 105 // Test vectors where 128*N*r exceeds maxmem. 110 { N: 2 ** 10, p: 1, r: 8, maxmem: 2 ** 20 }, 230 // Values for maxmem that do not fit in 32 bits but that are still safe 232 crypto.scrypt('', '', 4, { maxmem: 2 ** 52 }, 238 assert.throws(() => crypto.scryptSync('', '', 0, { maxmem: 2 ** 53 }), {
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | scrypt.c | 38 uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, 412 uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, in scrypt_alg() 478 if (maxmem > SIZE_MAX) in scrypt_alg() 479 maxmem = SIZE_MAX; in scrypt_alg() 481 if (Blen + Vlen > maxmem) { in scrypt_alg() 410 scrypt_alg(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, EVP_MD *sha256, OSSL_LIB_CTX *libctx, const char *propq) scrypt_alg() argument
|
/third_party/openssl/providers/implementations/kdfs/ |
H A D | scrypt.c | 38 uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, 412 uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, in scrypt_alg() 478 if (maxmem > SIZE_MAX) in scrypt_alg() 479 maxmem = SIZE_MAX; in scrypt_alg() 481 if (Blen + Vlen > maxmem) { in scrypt_alg() 410 scrypt_alg(const char *pass, size_t passlen, const unsigned char *salt, size_t saltlen, uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, unsigned char *key, size_t keylen, EVP_MD *sha256, OSSL_LIB_CTX *libctx, const char *propq) scrypt_alg() argument
|
/third_party/python/Modules/ |
H A D | _hashopenssl.c | 1311 maxmem: long = 0 1321 long maxmem, long dklen) in _hashlib_scrypt_impl() 1372 if (maxmem < 0 || maxmem > INT_MAX) { in _hashlib_scrypt_impl() 1373 /* OpenSSL 1.1.0 restricts maxmem to 32 MiB. It may change in the in _hashlib_scrypt_impl() 1374 future. The maxmem constant is private to OpenSSL. */ in _hashlib_scrypt_impl() 1376 "maxmem must be positive and smaller than %d", in _hashlib_scrypt_impl() 1389 retval = EVP_PBE_scrypt(NULL, 0, NULL, 0, n, r, p, maxmem, NULL, 0); in _hashlib_scrypt_impl() 1391 _setException(PyExc_ValueError, "Invalid parameter combination for n, r, p, maxmem."); in _hashlib_scrypt_impl() 1405 n, r, p, maxmem, in _hashlib_scrypt_impl() 1319 _hashlib_scrypt_impl(PyObject *module, Py_buffer *password, Py_buffer *salt, PyObject *n_obj, PyObject *r_obj, PyObject *p_obj, long maxmem, long dklen) _hashlib_scrypt_impl() argument [all...] |
/third_party/python/Modules/clinic/ |
H A D | _hashopenssl.c.h | 957 " maxmem=0, dklen=64)\n" 968 long maxmem, long dklen); 974 static const char * const _keywords[] = {"password", "salt", "n", "r", "p", "maxmem", "dklen", NULL}; in _hashlib_scrypt() 983 long maxmem = 0; in _hashlib_scrypt() local 1043 maxmem = PyLong_AsLong(args[5]); in _hashlib_scrypt() 1044 if (maxmem == -1 && PyErr_Occurred()) { in _hashlib_scrypt() 1056 return_value = _hashlib_scrypt_impl(module, &password, &salt, n_obj, r_obj, p_obj, maxmem, dklen); in _hashlib_scrypt()
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | pkcs5.rs | 126 maxmem: u64, in scrypt() 139 maxmem.try_into().unwrap(), in scrypt()
|
/third_party/ltp/testcases/kernel/mce-test/stress/ |
H A D | hwpoison.sh | 141 local maxmem=0 164 maxmem=`cat /proc/meminfo | grep MemTotal | awk '{print $2}'` 165 let "g_maxpfn= $maxmem / 4"
|
/third_party/python/Lib/test/ |
H A D | test_hashlib.py | 1144 for maxmem in [-1, None]: 1147 maxmem=maxmem)
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
H A D | evp.rs | 495 maxmem: u64, in EVP_PBE_scrypt()
|
/third_party/openssl/test/ |
H A D | evp_kdf_test.c | 815 unsigned int nu = 1024, ru = 8, pu = 16, maxmem = 16; in test_kdf_scrypt() local 834 *p++ = OSSL_PARAM_construct_uint(OSSL_KDF_PARAM_SCRYPT_MAXMEM, &maxmem); in test_kdf_scrypt()
|
H A D | evp_test.c | 2022 uint64_t N, r, p, maxmem; member 2074 if (strcmp(keyword, "maxmem") == 0) in scrypt_test_parse() 2075 return parse_uint64(value, &pdata->maxmem); in scrypt_test_parse() 2198 expected->maxmem, key, expected->key_len) == 0) { in pbe_test_run()
|
/third_party/node/deps/openssl/openssl/include/openssl/ |
H A D | evp.h | 1500 uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, 1504 uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem,
|
/third_party/openssl/include/openssl/ |
H A D | evp.h | 1498 uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem, 1502 uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem,
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | evp.h | 1100 uint64_t N, uint64_t r, uint64_t p, uint64_t maxmem,
|