/external/chromium/chrome/browser/password_manager/ |
encryptor_linux.cc | 15 // Salt for Symmetric key derivation. 41 std::string salt(kSalt); 43 // Create an encryption key from our password and salt. 47 salt,
|
/external/grub/stage2/ |
md5.h | 25 CRYPTED must have a salt. */
|
/external/srtp/googlepatches/ |
google-5-buffer-overflow.patch | 12 /* FIX!!! this assumes the salt is at key + 16, and thus that the */
|
/external/openssl/crypto/pkcs12/ |
p12_add.c | 105 int passlen, unsigned char *salt, int saltlen, int iter, 125 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, 169 unsigned char *salt, int saltlen, int iter, 188 pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen); 190 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
KnownHosts.java | 163 byte[] salt = new byte[sha1.getDigestLength()]; 165 new SecureRandom().nextBytes(salt); 167 byte[] hash = hmacSha1Hash(salt, hostname); 169 String base64_salt = new String(Base64.encode(salt)); 175 private static byte[] hmacSha1Hash(byte[] salt, String hostname) 179 if (salt.length != sha1.getDigestLength()) 181 throw new IllegalArgumentException("Salt has wrong length (" + salt.length + ")"); 184 HMAC hmac = new HMAC(sha1, salt, salt.length) [all...] |
/external/chromium/crypto/ |
symmetric_key.h | 42 // Derives a key from the supplied password and salt using PBKDF2, suitable 48 const std::string& salt,
|
symmetric_key_mac.cc | 85 const std::string& salt, 96 CSSM_DATA salt_data = StringToData(salt);
|
symmetric_key_win.cc | 240 const std::string& salt, 247 // password P and the concatenation of the salt S and the block index i: 260 ok = CryptHashData(safe_hash, reinterpret_cast<const BYTE*>(salt.data()), 261 salt.size(), 0); 357 const std::string& salt, 433 // to the password P, the salt S, the iteration count c, and the block 444 if (!ComputePBKDF2Block(prf, hLen, salt, iterations, block_index,
|
/external/srtp/include/ |
rtp.h | 91 unsigned char *input_key /* master key/salt in hex */ 98 unsigned char *input_key /* master key/salt in hex */
|
/external/chromium/chrome/browser/visitedlink/ |
visitedlink_master.cc | 54 // Fills the given salt structure with some quasi-random values 57 void GenerateSalt(uint8 salt[LINK_SALT_LENGTH]) { 58 DCHECK_EQ(LINK_SALT_LENGTH, 8) << "This code assumes the length of the salt"; 60 memcpy(salt, &randval, 8); 170 const uint8 salt[LINK_SALT_LENGTH]); 197 // Salt for this new table. 577 // The salt must be generated before the table so that it can be copied to 604 uint8 salt[LINK_SALT_LENGTH]) { 644 // Read the salt. 645 memcpy(salt, &header[kFileHeaderSaltOffset], LINK_SALT_LENGTH) [all...] |
/ndk/sources/host-tools/sed-4.2.1/testsuite/ |
linecnt.inp | 8 I nibble at a lump of salt,
|
linecnt.good | 16 I nibble at a lump of salt,
|
/external/chromium/chrome/browser/autofill/ |
autofill_ie_toolbar_import_win_unittest.cc | 33 const wchar_t* const kSaltValue = L"salt"; 73 L"salt", L"\x1\x2\x3\x4\x5\x6\x7\x8\x9\xA\xB\xC\xD\xE\xF\x10\x11\x12\x13\x14" 81 L"salt", L"\x4854\xB906\x9C7C\x50A6\x4376\xFD9D\x1E02"
|
/external/openssl/crypto/evp/ |
evp_key.c | 116 const unsigned char *salt, const unsigned char *data, int datal, 141 if (salt != NULL) 142 if (!EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN))
|
/external/srtp/test/ |
dtls_srtp_driver.c | 126 uint8_t salt[SRTP_MAX_KEY_LEN]; local 176 memset(salt, 0xee, salt_len); 177 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/openssl/crypto/rsa/ |
rsa_err.c | 163 {ERR_REASON(RSA_R_INVALID_SALT_LENGTH) ,"invalid salt length"}, 181 {ERR_REASON(RSA_R_SLEN_CHECK_FAILED) ,"salt length check failed"}, 182 {ERR_REASON(RSA_R_SLEN_RECOVERY_FAILED) ,"salt length recovery failed"},
|
/external/srtp/ |
README | 109 In order to get random 30-byte values for use as key/salt pairs , you 124 set master key/salt to C1EEC3717DA76195BB878578790AF71C/4EE9F859E197A414A78D5ABC7451 134 set master key/salt to C1EEC3717DA76195BB878578790AF71C/4EE9F859E197A414A78D5ABC7451
|
/external/chromium/chrome/browser/chromeos/cros/ |
cryptohome_library.cc | 344 CryptohomeBlob salt = CryptohomeBlob(); local 345 salt.push_back(0); 346 salt.push_back(0); 347 return salt;
|
/external/wpa_supplicant_8/src/radius/ |
radius.c | 957 /* key: 16-bit salt followed by encrypted key info */ 976 /* b(1) = MD5(Secret + Request-Authenticator + Salt) 985 elen[2] = 2; /* Salt */ 1017 static void encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, 1027 WPA_PUT_BE16(saltbuf, salt); 1041 /* b(1) = MD5(Secret + Request-Authenticator + Salt) 1149 u16 salt; local 1164 salt = os_random() | 0x8000; 1165 WPA_PUT_BE16(pos, salt); 1167 encrypt_ms_key(send_key, send_key_len, salt, req_authenticator, secret 1418 const u8 *salt; local [all...] |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/ |
crypt.h | 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/ |
crypt.h | 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/ |
crypt.h | 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ |
PSSParameterSpecTest.java | 210 * Assertion: returns salt length value 254 * Assertion: default salt length value is 20
|
/external/openssl/crypto/des/ |
DES.xs | 20 des_crypt(buf,salt) 22 char * salt
|
/external/openssl/crypto/srp/ |
srp.h | 121 char *SRP_create_verifier(const char *user, const char *pass, char **salt, 123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g);
|