/external/srtp/crypto/include/ |
cipher.h | 119 * cipher_test_case_t is a (list of) key, salt, xtd_seq_num_t, 154 * key length, key and salt values
|
crypto_types.h | 103 * This cipher uses a 16-octet key and a 30-octet offset (or salt) value. 119 * This cipher uses a 16-octet key and a 30-octet offset (or salt) value.
|
/libcore/luni/src/test/java/tests/security/spec/ |
PSSParameterSpecTest.java | 202 * Assertion: returns salt length value 246 * Assertion: default salt length value is 20
|
/system/security/keystore/ |
keystore.cpp | 502 // we read the raw blob to just to get the salt to generate 509 // find salt at EOF if present, otherwise we have an old file 510 uint8_t* salt; local 512 salt = (uint8_t*) &rawBlob + length - SALT_SIZE; 514 salt = NULL; 517 generateKeyFromPassword(passwordKey, MASTER_KEY_SIZE_BYTES, pw, salt); 526 // if salt was missing, generate one and write a new master key file with the salt. 527 if (salt == NULL) { 729 static void generateKeyFromPassword(uint8_t* key, ssize_t keySize, Value* pw, uint8_t* salt) { [all...] |
/external/openssl/crypto/pem/ |
pvkfmt.c | 131 /* Salt length for PVK files */ 708 const unsigned char *salt, unsigned int saltlen, 715 || !EVP_DigestUpdate(&mctx, salt, saltlen) 851 unsigned char *p, *salt = NULL; local 888 salt = p; 908 if (!derive_pvk_key(keybuf, salt, PVK_SALTLEN, 913 p = salt + PVK_SALTLEN + 8;
|
/external/openssh/ |
sshconnect2.c | 970 pw_encrypt(const char *password, const char *crypt_scheme, const char *salt) 977 return xstrdup(crypt(password, salt)); 985 const char *salt) 996 if ((crypted = pw_encrypt(password, crypt_scheme, salt)) == NULL) { 1004 debug3("%s: salt = %s", __func__, salt); 1034 char *crypt_scheme, *salt; local 1045 salt = packet_get_string(NULL); 1056 pctx->s = jpake_password_to_secret(authctxt, crypt_scheme, salt); 1058 bzero(salt, strlen(salt)) [all...] |
/external/dropbear/libtomcrypt/src/pk/rsa/ |
rsa_sign_hash.c | 30 @param saltlen The length of the salt desired (octets)
|
/external/dropbear/ |
svr-authpasswd.c | 83 /* the first bytes of passwdcrypt are the salt */
|
/external/ppp/pppd/ |
srp-entry.8 | 36 password salt. These latter two values are encoded in base64 notation.
|
srp-entry.c | 187 t_tob64(saltbuf, (char *)pwval.pebuf.salt.data, 188 pwval.pebuf.salt.len));
|
/external/srtp/crypto/cipher/ |
aes_icm.c | 68 * | salt |000000|->(+) 103 * salt so this function is called with key_len = 24. 160 * the salt is unpredictable (but not necessarily secret) data which 170 /* FIX!!! this assumes the salt is at key + 16, and thus that the */
|
/external/chromium/chrome/browser/chromeos/login/ |
google_authenticator.h | 114 // If we don't have the system salt yet, loads it from the CryptohomeLibrary. 128 // Returns the ascii encoding of the system salt.
|
parallel_authenticator.h | 203 // If we don't have the system salt yet, loads it from the CryptohomeLibrary. 219 // Returns the ascii encoding of the system salt.
|
/frameworks/base/libs/androidfw/ |
ObbFile.cpp | 37 * 64-bit salt (8 bytes) 280 ALOGW("couldn't write salt: %s\n", strerror(errno));
|
/frameworks/base/tools/obbtool/ |
mkobb.sh | 262 echo "salt for use with obbtool is:" 263 echo "${salt}"
|
/external/srtp/doc/ |
rfc3711.txt | 473 * a master salt, to be used in the key derivation of session keys. 475 master salt is strongly RECOMMENDED, see Section 9.2. A "NULL" 476 salt is treated as 00...0. 603 3. Determine the master key and master salt. This is done using the 607 4. Determine the session keys and session salt (if they are used by 609 master salt, key_derivation_rate, and session key-lengths in the 615 the session encryption key and the session salt (if used) found in 652 3. Determine the master key and master salt. If the MKI indicator in 657 4. Determine the session keys, and session salt (if used by the 659 salt, key_derivation_rate and session key-lengths in th [all...] |
/external/openssl/crypto/x509/ |
x509.h | 561 ASN1_OCTET_STRING *salt; member in struct:PBEPARAM_st 573 ASN1_TYPE *salt; /* Usually OCTET STRING but could be anything */ member in struct:PBKDF2PARAM_st [all...] |
/external/openssl/include/openssl/ |
x509.h | 561 ASN1_OCTET_STRING *salt; member in struct:PBEPARAM_st 573 ASN1_TYPE *salt; /* Usually OCTET STRING but could be anything */ member in struct:PBKDF2PARAM_st [all...] |
des_old.h | 376 char *_ossl_old_des_fcrypt(const char *buf,const char *salt, char *ret); 377 char *_ossl_old_des_crypt(const char *buf,const char *salt); 379 char *_ossl_old_crypt(const char *buf,const char *salt);
|
/external/srtp/srtp/ |
srtp.c | 374 * to generate the salt value 377 /* FIX!!! this is really the cipher key length; rest is salt */ 381 debug_print(mod_srtp, "found aes_icm, generating salt", NULL); 383 /* generate encryption salt, put after encryption key */ 423 * to generate the salt value 426 /* FIX!!! this is really the cipher key length; rest is salt */ 430 debug_print(mod_srtp, "found aes_icm, generating rtcp salt", NULL); 432 /* generate encryption salt, put after encryption key */ [all...] |
/external/openssl/apps/ |
srp.c | 249 char *salt = NULL; local 256 if (!(gNid =SRP_create_verifier(user, password, &salt, srp_verifier, N, g))) 261 *srp_usersalt = salt; 262 VVERBOSE BIO_printf(bio,"gNid=%s salt =\"%s\"\n verifier =\"%s\"\n", gNid,salt, *srp_verifier);
|
/external/libppp/src/ |
chap_ms.c | 401 static u_char salt[] = "KGS!@#$%"; /* RASAPI32.dll */ local 411 DesEncrypt(salt, SECRET, hash); 412 DesEncrypt(salt, SECRET + 7, hash + 8);
|
/external/openssl/crypto/des/ |
des_old.h | 376 char *_ossl_old_des_fcrypt(const char *buf,const char *salt, char *ret); 377 char *_ossl_old_des_crypt(const char *buf,const char *salt); 379 char *_ossl_old_crypt(const char *buf,const char *salt);
|
des.h | 207 char *DES_fcrypt(const char *buf,const char *salt, char *ret); 208 char *DES_crypt(const char *buf,const char *salt);
|
/external/srtp/test/ |
rtpw.c | 346 "error: too few digits in key/salt " 353 "error: too many digits in key/salt " 359 printf("set master key/salt to %s/", octet_string_hex_string(key, 16));
|