Home
last modified time | relevance | path

Searched refs:scrypt (Results 1 – 23 of 23) sorted by relevance

/openssl/test/recipes/30-test_evp_data/
H A Devppkey_kdf_scrypt.txt14 Title = id-scrypt tests (from draft-josefsson-id-scrypt-kdf-03 and others)
16 PKEYKDF = scrypt
24 PKEYKDF = scrypt
32 PKEYKDF = scrypt
40 PKEYKDF = scrypt
48 PKEYKDF = scrypt
57 PKEYKDF = scrypt
H A Devppbe_scrypt.txt14 Title = scrypt tests (from draft-josefsson-scrypt-kdf-03 and others) Using PBE
16 PBE = scrypt
24 PBE = scrypt
32 PBE = scrypt
41 # scrypt memory limit and return an error. To run this test without error
44 PBE = scrypt
H A Devpkdf_scrypt.txt14 Title = Scrypt tests (from draft-josefsson-id-scrypt-kdf-03 and others)
16 KDF = id-scrypt
24 KDF = id-scrypt
32 KDF = id-scrypt
40 KDF = id-scrypt
48 KDF = id-scrypt
57 KDF = id-scrypt
/openssl/demos/kdf/
H A Dbuild.info9 scrypt \
20 INCLUDE[scrypt]=../../include
21 SOURCE[scrypt]=scrypt.c
22 DEPEND[scrypt]=../../libcrypto
H A DMakefile9 scrypt \
20 scrypt: scrypt.o target
/openssl/doc/man7/
H A DEVP_KDF-SCRYPT.pod5 EVP_KDF-SCRYPT - The scrypt EVP_KDF implementation
9 Support for computing the B<scrypt> password-based KDF through the B<EVP_KDF>
12 The EVP_KDF-SCRYPT algorithm implements the scrypt password-based key
19 scrypt provides three work factors that can be customized: N, r and p. N, which
23 greater than zero. The amount of RAM that scrypt requires for its computation
33 may be used by scrypt defaults to 1025 MiB.
60 These parameters configure the scrypt work factors N, r, maxmem and p.
73 A context for scrypt can be obtained by calling:
78 The output length of an scrypt key derivation is specified via the
83 This example derives a 64-byte long test vector using scrypt with the password
H A Dprovider-kdf.pod228 Sets the scrypt work factor parameter N in the associated KDF ctx.
232 Sets the scrypt work factor parameter r in the associated KDF ctx.
236 Sets the scrypt work factor parameter p in the associated KDF ctx.
240 Sets the scrypt work factor parameter maxmem in the associated KDF ctx.
H A Dossl-guide-migration.pod203 (scrypt, TLS1 PRF and HKDF) may be slower as they use an EVP_KDF bridge
/openssl/doc/man3/
H A DEVP_PKEY_CTX_set_scrypt_N.pod10 - EVP_PKEY scrypt KDF support functions
31 scrypt KDF.
32 For more information on scrypt, see L<EVP_KDF-SCRYPT(7)>.
47 scrypt also supports string based control operations via
60 The scrypt KDF also uses EVP_PKEY_CTX_set1_pbe_pass() as well as
H A DEVP_KDF.pod250 Memory-hard password-based KDF algorithms, such as scrypt, use an amount of
/openssl/providers/implementations/exchange/
H A Dkdf_exch.c82 KDF_NEWCTX(scrypt, "SCRYPT")
209 KDF_SETTABLE_CTX_PARAMS(scrypt, "SCRYPT")
237 KDF_GETTABLE_CTX_PARAMS(scrypt, "SCRYPT")
257 KDF_KEYEXCH_FUNCTIONS(scrypt)
/openssl/providers/implementations/kdfs/
H A Dbuild.info40 SOURCE[$SCRYPT_GOAL]=scrypt.c
/openssl/doc/man1/
H A Dopenssl-pkcs8.pod.in26 [B<-scrypt>]
141 =item B<-scrypt>
143 Uses the B<scrypt> algorithm for private key encryption using default
150 Sets the scrypt I<N>, I<r> or I<p> parameters.
H A Dopenssl-kdf.pod.in90 The password must be specified for PBKDF2 and scrypt.
191 Use scrypt to create a hex-encoded derived key from a password and salt:
H A Dopenssl-pkeyutl.pod.in429 Derive a key using B<scrypt> where the password is read from command line:
431 openssl pkeyutl -kdf scrypt -kdflen 16 -pkeyopt_passin pass \
436 openssl pkeyutl -kdf scrypt -kdflen 16 -pkeyopt_passin pass:env:MYPASS \
/openssl/demos/
H A DREADME.txt48 scrypt.c Demonstration of SCRYPT password based key derivation
/openssl/doc/designs/
H A Dfast-param-find.md153 A worked example for scrypt:
/openssl/.github/workflows/
H A Drun-checker-daily.yml99 no-scrypt,
/openssl/crypto/objects/
H A Dobjects.txt1756 !Cname id-scrypt
1757 1 3 6 1 4 1 11591 4 11 : id-scrypt : scrypt
/openssl/crypto/err/
H A Dopenssl.txt64 ASN1_R_INVALID_SCRYPT_PARAMETERS:227:invalid scrypt parameters
745 EVP_R_ILLEGAL_SCRYPT_PARAMETERS:171:illegal scrypt parameters
/openssl/
H A DINSTALL.md1180 poly1305|rc2|rc4|rmd160|scrypt|seed|
H A DNEWS.md801 * Support for scrypt algorithm
H A DCHANGES.md616 * Changed the default salt length used by PBES2 KDF's (PBKDF2 and scrypt)
3205 (scrypt, TLS1 PRF and HKDF). The low-level KDF functions for PBKDF2
3206 and scrypt are now wrappers that call EVP_KDF.

Completed in 86 milliseconds