HomeSort by relevance Sort by last modified time
    Searched full:salt (Results 76 - 100 of 266) sorted by null

1 2 34 5 6 7 8 91011

  /external/chromium/chrome/browser/password_manager/
encryptor_linux.cc 15 // Salt for Symmetric key derivation.
41 std::string salt(kSalt);
43 // Create an encryption key from our password and salt.
47 salt,
  /external/grub/stage2/
md5.h 25 CRYPTED must have a salt. */
  /external/srtp/googlepatches/
google-5-buffer-overflow.patch 12 /* FIX!!! this assumes the salt is at key + 16, and thus that the */
  /external/openssl/crypto/pkcs12/
p12_add.c 105 int passlen, unsigned char *salt, int saltlen, int iter,
125 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter,
169 unsigned char *salt, int saltlen, int iter,
188 pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen);
190 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/
KnownHosts.java 163 byte[] salt = new byte[sha1.getDigestLength()];
165 new SecureRandom().nextBytes(salt);
167 byte[] hash = hmacSha1Hash(salt, hostname);
169 String base64_salt = new String(Base64.encode(salt));
175 private static byte[] hmacSha1Hash(byte[] salt, String hostname)
179 if (salt.length != sha1.getDigestLength())
181 throw new IllegalArgumentException("Salt has wrong length (" + salt.length + ")");
184 HMAC hmac = new HMAC(sha1, salt, salt.length)
    [all...]
  /external/chromium/crypto/
symmetric_key.h 42 // Derives a key from the supplied password and salt using PBKDF2, suitable
48 const std::string& salt,
symmetric_key_mac.cc 85 const std::string& salt,
96 CSSM_DATA salt_data = StringToData(salt);
symmetric_key_win.cc 240 const std::string& salt,
247 // password P and the concatenation of the salt S and the block index i:
260 ok = CryptHashData(safe_hash, reinterpret_cast<const BYTE*>(salt.data()),
261 salt.size(), 0);
357 const std::string& salt,
433 // to the password P, the salt S, the iteration count c, and the block
444 if (!ComputePBKDF2Block(prf, hLen, salt, iterations, block_index,
  /external/srtp/include/
rtp.h 91 unsigned char *input_key /* master key/salt in hex */
98 unsigned char *input_key /* master key/salt in hex */
  /external/chromium/chrome/browser/visitedlink/
visitedlink_master.cc 54 // Fills the given salt structure with some quasi-random values
57 void GenerateSalt(uint8 salt[LINK_SALT_LENGTH]) {
58 DCHECK_EQ(LINK_SALT_LENGTH, 8) << "This code assumes the length of the salt";
60 memcpy(salt, &randval, 8);
170 const uint8 salt[LINK_SALT_LENGTH]);
197 // Salt for this new table.
577 // The salt must be generated before the table so that it can be copied to
604 uint8 salt[LINK_SALT_LENGTH]) {
644 // Read the salt.
645 memcpy(salt, &header[kFileHeaderSaltOffset], LINK_SALT_LENGTH)
    [all...]
  /ndk/sources/host-tools/sed-4.2.1/testsuite/
linecnt.inp 8 I nibble at a lump of salt,
linecnt.good 16 I nibble at a lump of salt,
  /external/chromium/chrome/browser/autofill/
autofill_ie_toolbar_import_win_unittest.cc 33 const wchar_t* const kSaltValue = L"salt";
73 L"salt", L"\x1\x2\x3\x4\x5\x6\x7\x8\x9\xA\xB\xC\xD\xE\xF\x10\x11\x12\x13\x14"
81 L"salt", L"\x4854\xB906\x9C7C\x50A6\x4376\xFD9D\x1E02"
  /external/openssl/crypto/evp/
evp_key.c 116 const unsigned char *salt, const unsigned char *data, int datal,
141 if (salt != NULL)
142 if (!EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN))
  /external/srtp/test/
dtls_srtp_driver.c 126 uint8_t salt[SRTP_MAX_KEY_LEN]; local
176 memset(salt, 0xee, salt_len);
177 append_salt_to_key(key, key_len, salt, salt_len);
  /external/openssl/crypto/rsa/
rsa_err.c 163 {ERR_REASON(RSA_R_INVALID_SALT_LENGTH) ,"invalid salt length"},
181 {ERR_REASON(RSA_R_SLEN_CHECK_FAILED) ,"salt length check failed"},
182 {ERR_REASON(RSA_R_SLEN_RECOVERY_FAILED) ,"salt length recovery failed"},
  /external/srtp/
README 109 In order to get random 30-byte values for use as key/salt pairs , you
124 set master key/salt to C1EEC3717DA76195BB878578790AF71C/4EE9F859E197A414A78D5ABC7451
134 set master key/salt to C1EEC3717DA76195BB878578790AF71C/4EE9F859E197A414A78D5ABC7451
  /external/chromium/chrome/browser/chromeos/cros/
cryptohome_library.cc 344 CryptohomeBlob salt = CryptohomeBlob(); local
345 salt.push_back(0);
346 salt.push_back(0);
347 return salt;
  /external/wpa_supplicant_8/src/radius/
radius.c 957 /* key: 16-bit salt followed by encrypted key info */
976 /* b(1) = MD5(Secret + Request-Authenticator + Salt)
985 elen[2] = 2; /* Salt */
1017 static void encrypt_ms_key(const u8 *key, size_t key_len, u16 salt,
1027 WPA_PUT_BE16(saltbuf, salt);
1041 /* b(1) = MD5(Secret + Request-Authenticator + Salt)
1149 u16 salt; local
1164 salt = os_random() | 0x8000;
1165 WPA_PUT_BE16(pos, salt);
1167 encrypt_ms_key(send_key, send_key_len, salt, req_authenticator, secret
1418 const u8 *salt; local
    [all...]
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/
crypt.h 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/
crypt.h 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/
crypt.h 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/spec/
PSSParameterSpecTest.java 210 * Assertion: returns salt length value
254 * Assertion: default salt length value is 20
  /external/openssl/crypto/des/
DES.xs 20 des_crypt(buf,salt)
22 char * salt
  /external/openssl/crypto/srp/
srp.h 121 char *SRP_create_verifier(const char *user, const char *pass, char **salt,
123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g);

Completed in 1066 milliseconds

1 2 34 5 6 7 8 91011