/third_party/node/test/parallel/ |
H A D | test-crypto-pbkdf2.js | 13 crypto.pbkdf2(password, salt, iterations, keylen, hash, 59 () => crypto.pbkdf2('password', 'salt', 1, 20, 'sha1'), 91 crypto.pbkdf2('password', 'salt', 1, input, 'sha256', 104 crypto.pbkdf2('password', 'salt', 1, input, 'sha256', 114 crypto.pbkdf2('', '', 1, 32, 'sha256', common.mustSucceed()); 117 () => crypto.pbkdf2('password', 'salt', 8, 8, common.mustNotCall()), 144 () => crypto.pbkdf2(input, 'salt', 8, 8, 'sha256', common.mustNotCall()), 152 () => crypto.pbkdf2('pass', input, 8, 8, 'sha256', common.mustNotCall()), 179 () => crypto.pbkdf2('pass', 'salt', i, 8, 'sha256', common.mustNotCall()), 205 () => crypto.pbkdf2('pas [all...] |
H A D | test-crypto-binary-default.js | 698 crypto.pbkdf2(password, salt, iterations, keylen, 'sha256', cb);
|
/third_party/openssl/demos/kdf/ |
H A D | Makefile | 10 all: hkdf pbkdf2 scrypt 16 pbkdf2: pbkdf2.o 22 $(RM) *.o hkdf pbkdf2 scrypt
|
/third_party/node/lib/internal/crypto/ |
H A D | pbkdf2.js | 33 function pbkdf2(password, salt, iterations, keylen, digest, callback) { function 99 const pbkdf2Promise = promisify(pbkdf2); 134 pbkdf2,
|
/third_party/python/Lib/test/ |
H A D | test_hashlib.py | 1052 def _test_pbkdf2_hmac(self, pbkdf2, supported): 1061 out = pbkdf2(digest_name, password, salt, rounds, dklen) 1064 out = pbkdf2(digest_name, memoryview(password), 1067 out = pbkdf2(digest_name, bytearray(password), 1071 out = pbkdf2(digest_name, password, salt, rounds) 1076 pbkdf2('unknown', b'pass', b'salt', 1) 1080 TypeError, pbkdf2, b'sha1', b'pass', b'salt', 1 1083 TypeError, pbkdf2, 'sha1', 'pass', 'salt', 1 1086 ValueError, pbkdf2, 'sha1', b'pass', b'salt', 0 1089 ValueError, pbkdf2, 'sha [all...] |
/third_party/mbedtls/library/ |
H A D | psa_crypto.c | 5532 if (operation->ctx.pbkdf2.salt != NULL) { in psa_key_derivation_abort() 5533 mbedtls_zeroize_and_free(operation->ctx.pbkdf2.salt, in psa_key_derivation_abort() 5534 operation->ctx.pbkdf2.salt_length); in psa_key_derivation_abort() 5868 psa_pbkdf2_key_derivation_t *pbkdf2, in psa_key_derivation_pbkdf2_generate_block() 5877 uint8_t *U_accumulator = pbkdf2->output_block; in psa_key_derivation_pbkdf2_generate_block() 5883 MBEDTLS_PUT_UINT32_BE(pbkdf2->block_number, block_counter, 0); in psa_key_derivation_pbkdf2_generate_block() 5887 pbkdf2->password, in psa_key_derivation_pbkdf2_generate_block() 5888 pbkdf2->password_length, in psa_key_derivation_pbkdf2_generate_block() 5893 status = psa_mac_update(&mac_operation, pbkdf2->salt, pbkdf2 in psa_key_derivation_pbkdf2_generate_block() 5867 psa_key_derivation_pbkdf2_generate_block( psa_pbkdf2_key_derivation_t *pbkdf2, psa_algorithm_t prf_alg, uint8_t prf_output_length, psa_key_attributes_t *attributes) psa_key_derivation_pbkdf2_generate_block() argument 5937 psa_key_derivation_pbkdf2_read( psa_pbkdf2_key_derivation_t *pbkdf2, psa_algorithm_t kdf_alg, uint8_t *output, size_t output_length) psa_key_derivation_pbkdf2_read() argument 7081 psa_pbkdf2_set_input_cost( psa_pbkdf2_key_derivation_t *pbkdf2, psa_key_derivation_step_t step, uint64_t data) psa_pbkdf2_set_input_cost() argument 7108 psa_pbkdf2_set_salt(psa_pbkdf2_key_derivation_t *pbkdf2, const uint8_t *data, size_t data_length) psa_pbkdf2_set_salt() argument 7192 psa_pbkdf2_set_password(psa_pbkdf2_key_derivation_t *pbkdf2, psa_algorithm_t kdf_alg, const uint8_t *data, size_t data_length) psa_pbkdf2_set_password() argument 7226 psa_pbkdf2_input(psa_pbkdf2_key_derivation_t *pbkdf2, psa_algorithm_t kdf_alg, psa_key_derivation_step_t step, const uint8_t *data, size_t data_length) psa_pbkdf2_input() argument [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | enc.c | 98 {"pbkdf2", OPT_PBKDF2, '-', 136 int pbkdf2 = 0; in enc_main() local 279 pbkdf2 = 1; in enc_main() 282 pbkdf2 = 1; in enc_main() 490 if (pbkdf2 == 1) { in enc_main() 511 "Using -iter or -pbkdf2 would be better.\n"); in enc_main()
|
/third_party/openssl/apps/ |
H A D | enc.c | 98 {"pbkdf2", OPT_PBKDF2, '-', 136 int pbkdf2 = 0; in enc_main() local 279 pbkdf2 = 1; in enc_main() 282 pbkdf2 = 1; in enc_main() 490 if (pbkdf2 == 1) { in enc_main() 511 "Using -iter or -pbkdf2 would be better.\n"); in enc_main()
|
/third_party/mbedtls/include/psa/ |
H A D | crypto_driver_contexts_key_derivation.h | 47 psa_pbkdf2_key_derivation_t MBEDTLS_PRIVATE(pbkdf2);
|
/third_party/node/lib/ |
H A D | crypto.js | 60 pbkdf2, 62 } = require('internal/crypto/pbkdf2'); 202 pbkdf2,
|
/third_party/node/test/async-hooks/ |
H A D | test-crypto-pbkdf2.js | 20 crypto.pbkdf2('password', 'salt', 1, 20, 'sha256', common.mustCall(onpbkdf2));
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | Makefile | 35 sha1-pbkdf2.o \
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | Makefile | 46 sha1-pbkdf2.o \
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | nmake.mak | 67 $(OBJDIR)\sha1-pbkdf2.obj \ 165 $(OBJDIR)\sha1-pbkdf2.obj \
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | nmake.mak | 67 $(OBJDIR)\sha1-pbkdf2.obj \ 165 $(OBJDIR)\sha1-pbkdf2.obj \
|
/third_party/node/test/sequential/ |
H A D | test-async-wrap-getasyncid.js | 141 crypto.pbkdf2('password', 'salt', 1, 20, 'sha256', mc);
|