/frameworks/base/tools/obbtool/ |
pbkdf2gen.cpp | 32 #define SALT_LEN 8 50 unsigned char salt[SALT_LEN]; 52 if (read(fd, &salt, SALT_LEN) != SALT_LEN) { 61 if (PKCS5_PBKDF2_HMAC_SHA1(argv[1], strlen(argv[1]), salt, SALT_LEN, 68 for (int i = 0; i < SALT_LEN; i++) {
|
Main.cpp | 33 #define SALT_LEN 8 64 unsigned char salt[SALT_LEN]; 103 obb->setSalt(info->salt, SALT_LEN); 147 for (int i = 0; i < SALT_LEN; i++) { 219 if (strlen(optarg) != SALT_LEN * 2) { 228 for (int i = 0, j = 0; i < SALT_LEN; i++, j+=2) {
|
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_2.c | 24 @param salt_len The length of the salt (octets) 32 const unsigned char *salt, unsigned long salt_len, 81 if ((err = hmac_process(hmac, salt, salt_len)) != CRYPT_OK) {
|
/external/srtp/test/ |
dtls_srtp_driver.c | 127 unsigned int key_len, salt_len; local 174 salt_len = srtp_profile_get_master_salt_length(profile); 176 memset(salt, 0xee, salt_len); 177 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/wpa_supplicant_8/src/tls/ |
pkcs5.c | 30 size_t salt_len; member in struct:pkcs5_params 110 params->salt_len = hdr.length; 112 params->salt, params->salt_len); 159 len[1] = params->salt_len;
|
/external/chromium/chrome/browser/chromeos/cros/ |
cryptohome_library.cc | 112 int salt_len; local 113 bool result = chromeos::CryptohomeGetSystemSaltSafe(&salt_buf, &salt_len); 115 system_salt.resize(salt_len); 116 if ((int)system_salt.size() == salt_len) { 118 salt_len);
|
/external/openssl/apps/ |
passwd.c | 318 size_t passwd_len, salt_len; local 329 salt_len = strlen(salt_out); 330 assert(salt_len <= 8); 338 EVP_DigestUpdate(&md, salt_out, salt_len); 343 EVP_DigestUpdate(&md2, salt_out, salt_len); 365 EVP_DigestUpdate(&md2, salt_out, salt_len); 390 output = salt_out + salt_len;
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 81 const unsigned char *salt, unsigned long salt_len,
|
/system/vold/ |
cryptfs.h | 32 #define SALT_LEN 16
|
cryptfs.c | 202 if ( (cnt = write(fd, salt, SALT_LEN)) != SALT_LEN) { 326 if ( (cnt = read(fd, salt, SALT_LEN)) != SALT_LEN) { 469 PKCS5_PBKDF2_HMAC_SHA1(passwd, strlen(passwd), salt, SALT_LEN, 552 read(fd, salt, SALT_LEN); 727 unsigned char salt[SALT_LEN]; 765 unsigned char salt[SALT_LEN]; 924 unsigned char salt[SALT_LEN]; [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
google_authenticator.cc | 463 unsigned int salt_len = system_salt_.size(); local 464 char ascii_salt[2 * salt_len + 1]; 466 salt_len,
|
parallel_authenticator.cc | 604 unsigned int salt_len = system_salt_.size(); local 605 char ascii_salt[2 * salt_len + 1]; 607 salt_len,
|
/external/srtp/srtp/ |
srtp.c | 379 int salt_len = cipher_get_key_length(srtp->rtp_cipher) - base_key_len; local 385 tmp_key + base_key_len, salt_len); 428 int salt_len = cipher_get_key_length(srtp->rtcp_cipher) - base_key_len; local 434 tmp_key + base_key_len, salt_len); [all...] |
/external/dropbear/libtomcrypt/ |
crypt.tex | [all...] |