/external/openssl/crypto/pkcs12/ |
p12_crpt.c | 74 unsigned char *salt; local 93 salt = pbe->salt->data; 94 saltlen = pbe->salt->length; 95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
p12_p8e.c | 65 unsigned char *salt, int saltlen, int iter, 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
|
p12_key.c | 77 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 92 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen, 103 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, 131 fprintf(stderr, "Salt (length %d):\n", saltlen); 132 h__dump(salt, saltlen); 152 for (i = 0; i < Slen; i++) *p++ = salt[i % saltlen];
|
pkcs12.h | 101 ASN1_OCTET_STRING *salt; member in struct:__anon12667 183 unsigned char *salt, int saltlen, int iter, 186 int passlen, unsigned char *salt, 192 unsigned char *salt, int saltlen, int iter, 218 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 221 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 229 unsigned char *salt, int saltlen, int iter, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
|
/external/openssl/apps/ |
passwd.c | 49 * -salt string - salt 66 char *salt = NULL, *passwd = NULL, **passwds = NULL; local 105 else if (strcmp(argv[i], "-salt") == 0) 107 if ((argv[i+1] != NULL) && (salt == NULL)) 110 salt = argv[++i]; 180 BIO_printf(bio_err, "-salt string use provided salt\n"); 245 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out, 274 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out [all...] |
enc.c | 112 unsigned char salt[PKCS5_SALT_LEN]; local 200 else if (strcmp(*argv,"-salt") == 0) 309 BIO_printf(bio_err,"%-14s salt in hex is the next argument\n","-S"); 511 * line, so we get no salt in that case. Is this a bug? 515 /* Salt handling: if encrypting generate a salt and 516 * write to output BIO. If decrypting read salt from 524 if(!set_hex(hsalt,salt,sizeof salt)) { 526 "invalid hex salt value\n") [all...] |
/external/openssl/crypto/rsa/ |
rsa_pss.c | 101 * -2 salt length is autorecovered from signature 201 unsigned char *H, *salt = NULL, *p; local 213 * -2 salt length is maximized 242 salt = OPENSSL_malloc(sLen); 243 if (!salt) 248 if (RAND_bytes(salt, sLen) <= 0) 258 if (sLen && !EVP_DigestUpdate(&ctx, salt, sLen)) 279 *p++ ^= salt[i]; 291 if (salt) 292 OPENSSL_free(salt); [all...] |
/external/openssh/ |
hostfile.c | 67 extract_salt(const char *s, u_int l, char *salt, size_t salt_len) 84 debug2("extract_salt: missing salt termination character"); 91 debug2("extract_salt: bad encoded salt length %u", b64len); 98 ret = __b64_pton(b64salt, salt, salt_len); 101 debug2("extract_salt: salt decode error"); 105 debug2("extract_salt: expected salt len %d, got %d", 118 char salt[256], result[256], uu_salt[512], uu_result[512]; local 125 /* Create new salt */ 127 salt[i] = arc4random(); 129 /* Extract salt from known host entry * [all...] |
/external/openssl/crypto/srp/ |
srp_vfy.c | 356 * string(username):base64(v):base64(salt):int(index) 522 create a verifier (*salt,*verifier,g and N are in base64) 524 char *SRP_create_verifier(const char *user, const char *pass, char **salt, 537 (salt == NULL)|| 559 if (*salt == NULL) 567 if (!(len = t_fromb64(tmp2, *salt))) 581 if (*salt == NULL) 591 *salt = tmp_salt; 606 create a verifier (*salt,*verifier,g and N are BIGNUMs) 608 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g [all...] |
/system/vold/ |
cryptfs.c | 129 /* key or salt can be NULL, in which case just skip writing that value. Useful to 133 unsigned char *key, unsigned char *salt) 196 if (salt) { 197 /* Compute the offset from the last write to the salt */ 203 SLOGE("Cannot seek to real block device salt \n"); 207 if ( (cnt = write(fd, salt, SALT_LEN)) != SALT_LEN) { 208 SLOGE("Cannot write salt for real block device %s\n", fname); 232 unsigned char *key, unsigned char *salt) 327 SLOGE("Cannot seek to real block device salt\n"); 331 if ( (cnt = read(fd, salt, SALT_LEN)) != SALT_LEN) 795 unsigned char salt[SALT_LEN]; local 842 unsigned char salt[SALT_LEN]; local 944 unsigned char key[32], salt[32]; local 995 unsigned char salt[SALT_LEN]; local 1198 unsigned char salt[SALT_LEN]; local 1513 unsigned char salt[SALT_LEN]; local [all...] |
cryptfs.h | 22 * Finally there is the salt used with the user password. 23 * The salt is fixed at 16 bytes long.
|
/external/chromium/chrome/browser/sync/util/ |
user_settings.cc | 69 static const char SALT[] = "salt2"; 356 const string salt = APEncode(string(binary_salt, sizeof(binary_salt))); local 358 md5.AddData(salt.data(), salt.size()); 381 statement.bind_string(1, SALT); 382 statement.bind_string(2, salt); 401 query.bind_string(2, SALT); 403 string salt; local 407 if (key == SALT) 408 salt = query.column_string(1) [all...] |
nigori.h | 64 static const char kSaltSalt[]; // The salt used to derive the user salt.
|
/external/openssl/crypto/evp/ |
p5_crpt.c | 82 unsigned char *salt; local 103 salt = pbe->salt->data; 104 saltlen = pbe->salt->length; 113 if (!EVP_DigestUpdate(&ctx, salt, saltlen))
|
/external/chromium/chrome/common/ |
visitedlink_common.cc | 79 const uint8 salt[LINK_SALT_LENGTH]) { 84 MD5Update(&ctx, salt, sizeof(salt));
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_test_mode.c | 28 static const unsigned char salt[4] = { 0x32, 0xf2, 0x87, 0x0d }; 52 if ((err = f8_start(idx, IV, key, sizeof(key), salt, sizeof(salt), 0, &f8)) != CRYPT_OK) {
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/lib/ |
libcrypt-2.7.so | |
libcrypt.so | |
libcrypt.so.1 | |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/lib/ |
libcrypt-2.7.so | |
libcrypt.so | |
libcrypt.so.1 | |
/external/openssl/crypto/des/ |
des_old.c | 190 char *_ossl_old_des_fcrypt(const char *buf,const char *salt, char *ret) 192 return DES_fcrypt(buf, salt, ret); 194 char *_ossl_old_des_crypt(const char *buf,const char *salt) 196 return DES_crypt(buf, salt); 198 char *_ossl_old_crypt(const char *buf,const char *salt) 200 return DES_crypt(buf, salt);
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 75 const unsigned char *salt, 81 const unsigned char *salt, unsigned long salt_len,
|
/external/openssl/include/openssl/ |
pkcs12.h | 101 ASN1_OCTET_STRING *salt; member in struct:__anon12710 183 unsigned char *salt, int saltlen, int iter, 186 int passlen, unsigned char *salt, 192 unsigned char *salt, int saltlen, int iter, 218 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 221 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 229 unsigned char *salt, int saltlen, int iter, 231 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
|