Home
last modified time | relevance | path

Searched refs:scrypt (Results 1 – 20 of 20) sorted by relevance

/openssl-master/test/recipes/30-test_evp_data/
A Devppkey_kdf_scrypt.txt14 Title = id-scrypt tests (from draft-josefsson-id-scrypt-kdf-03 and others)
16 PKEYKDF = scrypt
24 PKEYKDF = scrypt
32 PKEYKDF = scrypt
40 PKEYKDF = scrypt
48 PKEYKDF = scrypt
57 PKEYKDF = scrypt
A Devppbe_scrypt.txt14 Title = scrypt tests (from draft-josefsson-scrypt-kdf-03 and others) Using PBE
16 PBE = scrypt
24 PBE = scrypt
32 PBE = scrypt
41 # scrypt memory limit and return an error. To run this test without error
44 PBE = scrypt
A Devpkdf_scrypt.txt14 Title = Scrypt tests (from draft-josefsson-id-scrypt-kdf-03 and others)
16 KDF = id-scrypt
24 KDF = id-scrypt
32 KDF = id-scrypt
40 KDF = id-scrypt
48 KDF = id-scrypt
57 KDF = id-scrypt
/openssl-master/demos/kdf/
A DMakefile10 all: hkdf pbkdf2 scrypt
17 scrypt: scrypt.o target
22 $(RM) *.o hkdf pbkdf2 scrypt
/openssl-master/doc/man7/
A DEVP_KDF-SCRYPT.pod5 EVP_KDF-SCRYPT - The scrypt EVP_KDF implementation
9 Support for computing the B<scrypt> password-based KDF through the B<EVP_KDF>
12 The EVP_KDF-SCRYPT algorithm implements the scrypt password-based key
19 scrypt provides three work factors that can be customized: N, r and p. N, which
23 greater than zero. The amount of RAM that scrypt requires for its computation
33 may be used by scrypt defaults to 1025 MiB.
60 These parameters configure the scrypt work factors N, r, maxmem and p.
73 A context for scrypt can be obtained by calling:
78 The output length of an scrypt key derivation is specified via the
83 This example derives a 64-byte long test vector using scrypt with the password
A Dprovider-kdf.pod228 Sets the scrypt work factor parameter N in the associated KDF ctx.
232 Sets the scrypt work factor parameter r in the associated KDF ctx.
236 Sets the scrypt work factor parameter p in the associated KDF ctx.
240 Sets the scrypt work factor parameter maxmem in the associated KDF ctx.
A Dmigration_guide.pod159 (scrypt, TLS1 PRF and HKDF) may be slower as they use an EVP_KDF bridge
/openssl-master/doc/man3/
A DEVP_PKEY_CTX_set_scrypt_N.pod10 - EVP_PKEY scrypt KDF support functions
31 scrypt KDF.
32 For more information on scrypt, see L<EVP_KDF-SCRYPT(7)>.
47 scrypt also supports string based control operations via
60 The scrypt KDF also uses EVP_PKEY_CTX_set1_pbe_pass() as well as
A DEVP_KDF.pod244 Memory-hard password-based KDF algorithms, such as scrypt, use an amount of
/openssl-master/providers/implementations/exchange/
A Dkdf_exch.c75 KDF_NEWCTX(scrypt, "SCRYPT")
178 KDF_SETTABLE_CTX_PARAMS(scrypt, "SCRYPT")
195 KDF_KEYEXCH_FUNCTIONS(scrypt)
/openssl-master/doc/man1/
A Dopenssl-kdf.pod.in92 The password must be specified for PBKDF2 and scrypt.
97 The password must be specified for PBKDF2 and scrypt.
166 Use scrypt to create a hex-encoded derived key from a password and salt:
A Dopenssl-pkcs8.pod.in26 [B<-scrypt>]
140 =item B<-scrypt>
142 Uses the B<scrypt> algorithm for private key encryption using default
149 Sets the scrypt I<N>, I<r> or I<p> parameters.
A Dopenssl-pkeyutl.pod.in379 Derive a key using B<scrypt> where the password is read from command line:
381 openssl pkeyutl -kdf scrypt -kdflen 16 -pkeyopt_passin pass \
386 openssl pkeyutl -kdf scrypt -kdflen 16 -pkeyopt_passin pass:env:MYPASS \
/openssl-master/providers/implementations/kdfs/
A Dbuild.info38 SOURCE[$SCRYPT_GOAL]=scrypt.c
/openssl-master/demos/
A DREADME.txt24 scrypt.c Demonstration of SCRYPT password based key derivation
/openssl-master/crypto/objects/
A Dobjects.txt1644 !Cname id-scrypt
1645 1 3 6 1 4 1 11591 4 11 : id-scrypt : scrypt
/openssl-master/crypto/err/
A Dopenssl.txt63 ASN1_R_INVALID_SCRYPT_PARAMETERS:227:invalid scrypt parameters
680 EVP_R_ILLEGAL_SCRYPT_PARAMETERS:171:illegal scrypt parameters
/openssl-master/
A DINSTALL.md987 poly1305|rc2|rc4|rmd160|scrypt|seed|
A DNEWS.md350 * Support for scrypt algorithm
A DCHANGES.md1343 (scrypt, TLS1 PRF and HKDF). The low-level KDF functions for PBKDF2
1344 and scrypt are now wrappers that call EVP_KDF.

Completed in 49 milliseconds