HomeSort by relevance Sort by last modified time
    Searched full:salt (Results 51 - 75 of 262) sorted by null

1 23 4 5 6 7 8 91011

  /external/openssl/crypto/rsa/
rsa_pss.c 101 * -2 salt length is autorecovered from signature
201 unsigned char *H, *salt = NULL, *p; local
213 * -2 salt length is maximized
242 salt = OPENSSL_malloc(sLen);
243 if (!salt)
248 if (RAND_bytes(salt, sLen) <= 0)
258 if (sLen && !EVP_DigestUpdate(&ctx, salt, sLen))
279 *p++ ^= salt[i];
291 if (salt)
292 OPENSSL_free(salt);
    [all...]
  /external/openssl/apps/
enc.c 112 unsigned char salt[PKCS5_SALT_LEN]; local
200 else if (strcmp(*argv,"-salt") == 0)
309 BIO_printf(bio_err,"%-14s salt in hex is the next argument\n","-S");
511 * line, so we get no salt in that case. Is this a bug?
515 /* Salt handling: if encrypting generate a salt and
516 * write to output BIO. If decrypting read salt from
524 if(!set_hex(hsalt,salt,sizeof salt)) {
526 "invalid hex salt value\n")
    [all...]
  /external/openssh/
hostfile.c 67 extract_salt(const char *s, u_int l, char *salt, size_t salt_len)
84 debug2("extract_salt: missing salt termination character");
91 debug2("extract_salt: bad encoded salt length %u", b64len);
98 ret = __b64_pton(b64salt, salt, salt_len);
101 debug2("extract_salt: salt decode error");
105 debug2("extract_salt: expected salt len %d, got %d",
118 char salt[256], result[256], uu_salt[512], uu_result[512]; local
125 /* Create new salt */
127 salt[i] = arc4random();
129 /* Extract salt from known host entry *
    [all...]
  /external/openssl/crypto/srp/
srp_vfy.c 356 * string(username):base64(v):base64(salt):int(index)
522 create a verifier (*salt,*verifier,g and N are in base64)
524 char *SRP_create_verifier(const char *user, const char *pass, char **salt,
537 (salt == NULL)||
559 if (*salt == NULL)
567 if (!(len = t_fromb64(tmp2, *salt)))
581 if (*salt == NULL)
590 *salt = tmp_salt;
605 create a verifier (*salt,*verifier,g and N are BIGNUMs)
607 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g
    [all...]
  /system/vold/
cryptfs.c 142 /* key or salt can be NULL, in which case just skip writing that value. Useful to
146 unsigned char *key, unsigned char *salt)
209 if (salt) {
210 /* Compute the offset from the last write to the salt */
216 SLOGE("Cannot seek to real block device salt \n");
220 if ( (cnt = write(fd, salt, SALT_LEN)) != SALT_LEN) {
221 SLOGE("Cannot write salt for real block device %s\n", fname);
245 unsigned char *key, unsigned char *salt)
340 SLOGE("Cannot seek to real block device salt\n");
344 if ( (cnt = read(fd, salt, SALT_LEN)) != SALT_LEN)
737 unsigned char salt[SALT_LEN]; local
784 unsigned char salt[SALT_LEN]; local
886 unsigned char key[32], salt[32]; local
937 unsigned char salt[SALT_LEN]; local
1140 unsigned char salt[SALT_LEN]; local
1455 unsigned char salt[SALT_LEN]; local
    [all...]
cryptfs.h 22 * Finally there is the salt used with the user password.
23 * The salt is fixed at 16 bytes long.
  /external/chromium/chrome/browser/sync/util/
user_settings.cc 69 static const char SALT[] = "salt2";
356 const string salt = APEncode(string(binary_salt, sizeof(binary_salt))); local
358 md5.AddData(salt.data(), salt.size());
381 statement.bind_string(1, SALT);
382 statement.bind_string(2, salt);
401 query.bind_string(2, SALT);
403 string salt; local
407 if (key == SALT)
408 salt = query.column_string(1)
    [all...]
nigori.h 64 static const char kSaltSalt[]; // The salt used to derive the user salt.
  /external/openssl/crypto/evp/
p5_crpt.c 82 unsigned char *salt; local
103 salt = pbe->salt->data;
104 saltlen = pbe->salt->length;
113 if (!EVP_DigestUpdate(&ctx, salt, saltlen))
  /external/chromium/chrome/common/
visitedlink_common.cc 79 const uint8 salt[LINK_SALT_LENGTH]) {
84 MD5Update(&ctx, salt, sizeof(salt));
  /external/dropbear/libtomcrypt/src/modes/f8/
f8_test_mode.c 28 static const unsigned char salt[4] = { 0x32, 0xf2, 0x87, 0x0d };
52 if ((err = f8_start(idx, IV, key, sizeof(key), salt, sizeof(salt), 0, &f8)) != CRYPT_OK) {
  /external/openssl/crypto/pkcs12/
p12_p8e.c 65 unsigned char *salt, int saltlen, int iter,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
p12_key.c 77 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
92 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen,
103 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt,
131 fprintf(stderr, "Salt (length %d):\n", saltlen);
132 h__dump(salt, saltlen);
152 for (i = 0; i < Slen; i++) *p++ = salt[i % saltlen];
pkcs12.h 101 ASN1_OCTET_STRING *salt; member in struct:__anon11415
183 unsigned char *salt, int saltlen, int iter,
186 int passlen, unsigned char *salt,
192 unsigned char *salt, int saltlen, int iter,
218 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
221 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type);
229 unsigned char *salt, int saltlen, int iter,
231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/lib/
libcrypt-2.7.so 
libcrypt.so 
libcrypt.so.1 
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/lib/
libcrypt-2.7.so 
libcrypt.so 
libcrypt.so.1 
  /external/openssl/crypto/des/
des_old.c 190 char *_ossl_old_des_fcrypt(const char *buf,const char *salt, char *ret)
192 return DES_fcrypt(buf, salt, ret);
194 char *_ossl_old_des_crypt(const char *buf,const char *salt)
196 return DES_crypt(buf, salt);
198 char *_ossl_old_crypt(const char *buf,const char *salt)
200 return DES_crypt(buf, salt);
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_pkcs.h 75 const unsigned char *salt,
81 const unsigned char *salt, unsigned long salt_len,
  /external/openssl/include/openssl/
pkcs12.h 101 ASN1_OCTET_STRING *salt; member in struct:__anon11458
183 unsigned char *salt, int saltlen, int iter,
186 int passlen, unsigned char *salt,
192 unsigned char *salt, int saltlen, int iter,
218 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
221 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type);
229 unsigned char *salt, int saltlen, int iter,
231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
  /external/chromium/chrome/browser/password_manager/
encryptor_linux.cc 15 // Salt for Symmetric key derivation.
41 std::string salt(kSalt);
43 // Create an encryption key from our password and salt.
47 salt,
  /external/grub/stage2/
md5.h 25 CRYPTED must have a salt. */

Completed in 323 milliseconds

1 23 4 5 6 7 8 91011