/external/openssl/crypto/des/ |
des.h | 207 char *DES_fcrypt(const char *buf,const char *salt, char *ret); 208 char *DES_crypt(const char *buf,const char *salt);
|
/external/openssl/include/openssl/ |
des.h | 207 char *DES_fcrypt(const char *buf,const char *salt, char *ret); 208 char *DES_crypt(const char *buf,const char *salt);
|
/libcore/luni/src/main/files/cacerts/ |
4fbd6bfa.0 | 33 Issuer: C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN - DATACorp SGC 37 Subject: C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN - DATACorp SGC
|
d8274e24.0 | 33 Issuer: C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN-USERFirst-Network Applications 37 Subject: C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN-USERFirst-Network Applications
|
ff783690.0 | 33 Issuer: C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN-USERFirst-Hardware 37 Subject: C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN-USERFirst-Hardware
|
/external/chromium/chrome/browser/chromeos/cros/ |
cryptohome_library.h | 104 // Asks cryptohomed for the system salt.
|
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
srtpfilter.h | 54 // Key is 128 bits and salt is 112 bits == 30 bytes. B64 bloat => 40 bytes.
|
/external/chromium/webkit/glue/resources/ |
webkit_strings_ro.xtb | 11 <translation id="4202807286478387388">Salt</translation>
|
webkit_strings_tr.xtb | 47 <translation id="2226276347425096477">Lütfen bu metni <ph name="MAX_CHARACTERS"/> veya daha az karakter olacak ?ekilde k?salt?n (?u anda <ph name="CURRENT_LENGTH"/> karakter kullan?yorsunuz).</translation>
|
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_oaep_decode.c | 63 /* allocate ram for DB/mask/salt of size modulus_len */
|
pkcs_1_oaep_encode.c | 66 /* allocate ram for DB/mask/salt of size modulus_len */
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
rsa_verify_hash.c | 28 @param saltlen The length of the salt used during signature
|
/external/openssh/ |
auth-passwd.c | 204 /* Encrypt the candidate password using the proper salt. */
|
/external/openssh/openbsd-compat/ |
openbsd-compat.h | 221 char *xcrypt(const char *password, const char *salt);
|
/external/openssl/crypto/pkcs12/ |
p12_asn.c | 76 ASN1_SIMPLE(PKCS12_MAC_DATA, salt, ASN1_OCTET_STRING),
|
p12_npas.c | 222 *psaltlen = pbe->salt->length;
|
/ndk/sources/host-tools/sed-4.2.1/ |
basicdefs.h | 135 Defining isascii to 1 should let any compiler worth its salt
|
/frameworks/base/services/java/com/android/server/ |
BackupManagerService.java | 421 // persisted) salt. Validation is performed by running the challenge text through the 422 // same PBKDF2 cycle with the persisted salt; if the resulting derived key string matches 762 // integer length of the salt array, followed by the salt, 765 byte[] salt = new byte[saltLen]; 766 in.readFully(salt); 768 mPasswordSalt = salt; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
JDKPKCS12KeyStore.java | 699 byte[] salt = mData.getSalt(); 706 byte[] res = calculatePbeMac(algId.getObjectId(), salt, itCount, password, false, data); 717 res = calculatePbeMac(algId.getObjectId(), salt, itCount, password, true, data); [all...] |
/frameworks/base/core/java/com/android/internal/widget/ |
LockPatternUtils.java | 818 long salt = getLong(LOCK_PASSWORD_SALT_KEY, 0); local 819 if (salt == 0) { 821 salt = SecureRandom.getInstance("SHA1PRNG").nextLong(); 822 setLong(LOCK_PASSWORD_SALT_KEY, salt); 823 Log.v(TAG, "Initialized lock password salt"); 829 return Long.toHexString(salt); [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
google_authenticator.cc | 432 // Get salt, ascii encode, update sha with that, then update with ascii 438 // Hash salt and password
|
/external/chromium/chrome/browser/visitedlink/ |
visitedlink_master.h | 143 // Bytes in the file header, including the salt. 181 uint8 salt[LINK_SALT_LENGTH]);
|
/external/openssl/crypto/rsa/ |
rsa_ameth.c | 354 if (BIO_puts(bp, "Salt Length: ") <= 0) 523 /* Could perform more salt length sanity checks but the main
|
/external/openssl/crypto/evp/ |
evp_err.c | 222 {ERR_REASON(EVP_R_UNSUPPORTED_SALT_TYPE) ,"unsupported salt type"},
|
/external/ppp/pppd/plugins/radius/ |
radius.c | 787 u_char *salt = vp->strvalue; local 802 if ((salt[0] & 0x80) == 0) { 803 error("RADIUS: Illegal salt value for MS-MPPE-%s-Key attribute", type); 812 MD5_Update(&Context, salt, 2); [all...] |