/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/cargo-crates/nettle-src-3.5.1-2/nettle/ |
H A D | pbkdf2.h | 46 #define pbkdf2_hmac_sha1 nettle_pbkdf2_hmac_sha1 macro 70 pbkdf2_hmac_sha1 (size_t key_length, const uint8_t *key,
|
H A D | pbkdf2-hmac-sha1.c | 43 pbkdf2_hmac_sha1 (size_t key_length, const uint8_t *key, in pbkdf2_hmac_sha1() function
|
H A D | nettle.info | 3857 -- Function: void pbkdf2_hmac_sha1 (size_t KEY_LENGTH, const uint8_t 5912 * pbkdf2_hmac_sha1: Key derivation functions.
|
H A D | nettle.texinfo | 3938 @deftypefun void pbkdf2_hmac_sha1 (size_t @var{key_length}, const uint8_t *@var{key}, unsigned @var…
|
/dports/security/nettle/nettle-3.7.3/ |
H A D | pbkdf2.h | 46 #define pbkdf2_hmac_sha1 nettle_pbkdf2_hmac_sha1 macro 73 pbkdf2_hmac_sha1 (size_t key_length, const uint8_t *key,
|
H A D | pbkdf2-hmac-sha1.c | 43 pbkdf2_hmac_sha1 (size_t key_length, const uint8_t *key, in pbkdf2_hmac_sha1() function
|
H A D | nettle.info | 4221 -- Function: void pbkdf2_hmac_sha1 (size_t KEY_LENGTH, const uint8_t 6478 * pbkdf2_hmac_sha1: Key derivation functions.
|
H A D | nettle.texinfo | 4320 @deftypefun void pbkdf2_hmac_sha1 (size_t @var{key_length}, const uint8_t *@var{key}, unsigned @var…
|
/dports/lang/ruby26/ruby-2.6.9/ext/openssl/lib/openssl/ |
H A D | pkcs5.rb | 18 def pbkdf2_hmac_sha1(pass, salt, iter, keylen) method
|
/dports/emulators/yuzu/yuzu-0b47f7a46/externals/libzip/libzip/lib/ |
H A D | zip_crypto_gnutls.h | 65 … key_length, salt, salt_length, iterations, output, output_length) (pbkdf2_hmac_sha1((key_length),…
|
/dports/archivers/libzip/libzip-1.7.3/lib/ |
H A D | zip_crypto_gnutls.h | 66 … key_length, salt, salt_length, iterations, output, output_length) (pbkdf2_hmac_sha1((key_length),…
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/cargo-crates/nettle-src-3.5.1-2/nettle/testsuite/ |
H A D | pbkdf2-test.c | 107 PBKDF2_HMAC_TEST(pbkdf2_hmac_sha1, LDATA("password"), 1, LDATA("salt"), in test_main()
|
/dports/www/srt/srt-1.4.4/haicrypt/ |
H A D | cryspr-gnutls.c | 133 pbkdf2_hmac_sha1(passwd_len,(const uint8_t *)passwd,itr,salt_len,salt,key_len,out); in crysprGnuTLS_KmPbkdf2()
|
/dports/lang/ruby26/ruby-2.6.9/test/openssl/ |
H A D | test_kdf.rb | 10 assert_equal(expected, OpenSSL::PKCS5.pbkdf2_hmac_sha1("password", "salt", 1, 20))
|
/dports/security/nettle/nettle-3.7.3/testsuite/ |
H A D | pbkdf2-test.c | 111 PBKDF2_HMAC_TEST(pbkdf2_hmac_sha1, LDATA("password"), 1, LDATA("salt"), in test_main()
|
/dports/www/epiphany/epiphany-41.0/lib/sync/ |
H A D | ephy-password-import.c | 92 …pbkdf2_hmac_sha1 (strlen (phrase), (unsigned char *)phrase, 1, sizeof (salt), salt, sizeof (key), … in decrypt()
|
/dports/graphics/aseprite/aseprite-1.2.9/third_party/libarchive/libarchive/ |
H A D | archive_cryptor.c | 94 pbkdf2_hmac_sha1((unsigned)pw_len, (const uint8_t *)pw, rounds, in pbkdf2_sha1()
|
/dports/databases/xtrabackup/percona-xtrabackup-2.4.21/storage/innobase/xtrabackup/src/libarchive/libarchive/ |
H A D | archive_cryptor.c | 94 pbkdf2_hmac_sha1((unsigned)pw_len, (const uint8_t *)pw, rounds, in pbkdf2_sha1()
|
/dports/archivers/libarchive/libarchive-3.5.2/libarchive/ |
H A D | archive_cryptor.c | 123 pbkdf2_hmac_sha1((unsigned)pw_len, (const uint8_t *)pw, rounds, in pbkdf2_sha1()
|
/dports/devel/cmake-gui/cmake-3.22.1/Utilities/cmlibarchive/libarchive/ |
H A D | archive_cryptor.c | 123 pbkdf2_hmac_sha1((unsigned)pw_len, (const uint8_t *)pw, rounds, in pbkdf2_sha1()
|
/dports/devel/cmake-doc/cmake-3.22.1/Utilities/cmlibarchive/libarchive/ |
H A D | archive_cryptor.c | 123 pbkdf2_hmac_sha1((unsigned)pw_len, (const uint8_t *)pw, rounds, in pbkdf2_sha1()
|
/dports/devel/cmake/cmake-3.22.1/Utilities/cmlibarchive/libarchive/ |
H A D | archive_cryptor.c | 123 pbkdf2_hmac_sha1((unsigned)pw_len, (const uint8_t *)pw, rounds, in pbkdf2_sha1()
|
/dports/security/john/john-1.9.0-jumbo-1/src/ |
H A D | pbkdf2_hmac_sha1.h | 323 #error pbkdf2_hmac_sha1.h can not use a PLAINTEXT_LENGTH larger than 64
|
/dports/security/john/john-1.9.0-jumbo-1/run/ |
H A D | pass_gen.pl | 3695 sub pbkdf2_hmac_sha1 { subroutine
|
/dports/security/john/john-1.9.0-jumbo-1/doc/ |
H A D | CHANGES-jumbo | 6227 pbkdf2_hmac_sha1.h: ixed this core file to run properly on BE 7955 pbkdf2_hmac_sha1.h: disable vectorization of a loop 12331 Modified pbkdf2_hmac_sha1.h to also do PBKDF1 algo, and modified 15355 Rename keychain.h to pbkdf2_hmac_sha1.h, add pbkdf2_hmac_sha256.h
|