Home
last modified time | relevance | path

Searched refs:pbkdf2 (Results 1 - 16 of 16) sorted by relevance

/third_party/node/test/parallel/
H A Dtest-crypto-pbkdf2.js13 crypto.pbkdf2(password, salt, iterations, keylen, hash,
59 () => crypto.pbkdf2('password', 'salt', 1, 20, 'sha1'),
91 crypto.pbkdf2('password', 'salt', 1, input, 'sha256',
104 crypto.pbkdf2('password', 'salt', 1, input, 'sha256',
114 crypto.pbkdf2('', '', 1, 32, 'sha256', common.mustSucceed());
117 () => crypto.pbkdf2('password', 'salt', 8, 8, common.mustNotCall()),
144 () => crypto.pbkdf2(input, 'salt', 8, 8, 'sha256', common.mustNotCall()),
152 () => crypto.pbkdf2('pass', input, 8, 8, 'sha256', common.mustNotCall()),
179 () => crypto.pbkdf2('pass', 'salt', i, 8, 'sha256', common.mustNotCall()),
205 () => crypto.pbkdf2('pas
[all...]
H A Dtest-crypto-binary-default.js698 crypto.pbkdf2(password, salt, iterations, keylen, 'sha256', cb);
/third_party/openssl/demos/kdf/
H A DMakefile10 all: hkdf pbkdf2 scrypt
16 pbkdf2: pbkdf2.o
22 $(RM) *.o hkdf pbkdf2 scrypt
/third_party/node/lib/internal/crypto/
H A Dpbkdf2.js33 function pbkdf2(password, salt, iterations, keylen, digest, callback) { function
99 const pbkdf2Promise = promisify(pbkdf2);
134 pbkdf2,
/third_party/python/Lib/test/
H A Dtest_hashlib.py1052 def _test_pbkdf2_hmac(self, pbkdf2, supported):
1061 out = pbkdf2(digest_name, password, salt, rounds, dklen)
1064 out = pbkdf2(digest_name, memoryview(password),
1067 out = pbkdf2(digest_name, bytearray(password),
1071 out = pbkdf2(digest_name, password, salt, rounds)
1076 pbkdf2('unknown', b'pass', b'salt', 1)
1080 TypeError, pbkdf2, b'sha1', b'pass', b'salt', 1
1083 TypeError, pbkdf2, 'sha1', 'pass', 'salt', 1
1086 ValueError, pbkdf2, 'sha1', b'pass', b'salt', 0
1089 ValueError, pbkdf2, 'sha
[all...]
/third_party/mbedtls/library/
H A Dpsa_crypto.c5532 if (operation->ctx.pbkdf2.salt != NULL) { in psa_key_derivation_abort()
5533 mbedtls_zeroize_and_free(operation->ctx.pbkdf2.salt, in psa_key_derivation_abort()
5534 operation->ctx.pbkdf2.salt_length); in psa_key_derivation_abort()
5868 psa_pbkdf2_key_derivation_t *pbkdf2, in psa_key_derivation_pbkdf2_generate_block()
5877 uint8_t *U_accumulator = pbkdf2->output_block; in psa_key_derivation_pbkdf2_generate_block()
5883 MBEDTLS_PUT_UINT32_BE(pbkdf2->block_number, block_counter, 0); in psa_key_derivation_pbkdf2_generate_block()
5887 pbkdf2->password, in psa_key_derivation_pbkdf2_generate_block()
5888 pbkdf2->password_length, in psa_key_derivation_pbkdf2_generate_block()
5893 status = psa_mac_update(&mac_operation, pbkdf2->salt, pbkdf2 in psa_key_derivation_pbkdf2_generate_block()
5867 psa_key_derivation_pbkdf2_generate_block( psa_pbkdf2_key_derivation_t *pbkdf2, psa_algorithm_t prf_alg, uint8_t prf_output_length, psa_key_attributes_t *attributes) psa_key_derivation_pbkdf2_generate_block() argument
5937 psa_key_derivation_pbkdf2_read( psa_pbkdf2_key_derivation_t *pbkdf2, psa_algorithm_t kdf_alg, uint8_t *output, size_t output_length) psa_key_derivation_pbkdf2_read() argument
7081 psa_pbkdf2_set_input_cost( psa_pbkdf2_key_derivation_t *pbkdf2, psa_key_derivation_step_t step, uint64_t data) psa_pbkdf2_set_input_cost() argument
7108 psa_pbkdf2_set_salt(psa_pbkdf2_key_derivation_t *pbkdf2, const uint8_t *data, size_t data_length) psa_pbkdf2_set_salt() argument
7192 psa_pbkdf2_set_password(psa_pbkdf2_key_derivation_t *pbkdf2, psa_algorithm_t kdf_alg, const uint8_t *data, size_t data_length) psa_pbkdf2_set_password() argument
7226 psa_pbkdf2_input(psa_pbkdf2_key_derivation_t *pbkdf2, psa_algorithm_t kdf_alg, psa_key_derivation_step_t step, const uint8_t *data, size_t data_length) psa_pbkdf2_input() argument
[all...]
/third_party/node/deps/openssl/openssl/apps/
H A Denc.c98 {"pbkdf2", OPT_PBKDF2, '-',
136 int pbkdf2 = 0; in enc_main() local
279 pbkdf2 = 1; in enc_main()
282 pbkdf2 = 1; in enc_main()
490 if (pbkdf2 == 1) { in enc_main()
511 "Using -iter or -pbkdf2 would be better.\n"); in enc_main()
/third_party/openssl/apps/
H A Denc.c98 {"pbkdf2", OPT_PBKDF2, '-',
136 int pbkdf2 = 0; in enc_main() local
279 pbkdf2 = 1; in enc_main()
282 pbkdf2 = 1; in enc_main()
490 if (pbkdf2 == 1) { in enc_main()
511 "Using -iter or -pbkdf2 would be better.\n"); in enc_main()
/third_party/mbedtls/include/psa/
H A Dcrypto_driver_contexts_key_derivation.h47 psa_pbkdf2_key_derivation_t MBEDTLS_PRIVATE(pbkdf2);
/third_party/node/lib/
H A Dcrypto.js60 pbkdf2,
62 } = require('internal/crypto/pbkdf2');
202 pbkdf2,
/third_party/node/test/async-hooks/
H A Dtest-crypto-pbkdf2.js20 crypto.pbkdf2('password', 'salt', 1, 20, 'sha256', common.mustCall(onpbkdf2));
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A DMakefile35 sha1-pbkdf2.o \
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A DMakefile46 sha1-pbkdf2.o \
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dnmake.mak67 $(OBJDIR)\sha1-pbkdf2.obj \
165 $(OBJDIR)\sha1-pbkdf2.obj \
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dnmake.mak67 $(OBJDIR)\sha1-pbkdf2.obj \
165 $(OBJDIR)\sha1-pbkdf2.obj \
/third_party/node/test/sequential/
H A Dtest-async-wrap-getasyncid.js141 crypto.pbkdf2('password', 'salt', 1, 20, 'sha256', mc);

Completed in 15 milliseconds