HomeSort by relevance Sort by last modified time
    Searched full:salt_len (Results 1 - 18 of 18) sorted by null

  /frameworks/base/tools/obbtool/
pbkdf2gen.cpp 32 #define SALT_LEN 8
50 unsigned char salt[SALT_LEN];
52 if (read(fd, &salt, SALT_LEN) != SALT_LEN) {
61 if (PKCS5_PBKDF2_HMAC_SHA1(argv[1], strlen(argv[1]), salt, SALT_LEN,
68 for (int i = 0; i < SALT_LEN; i++) {
Main.cpp 33 #define SALT_LEN 8
64 unsigned char salt[SALT_LEN];
103 obb->setSalt(info->salt, SALT_LEN);
147 for (int i = 0; i < SALT_LEN; i++) {
219 if (strlen(optarg) != SALT_LEN * 2) {
228 for (int i = 0, j = 0; i < SALT_LEN; i++, j+=2) {
  /external/openssh/
auth2-jpake.c 277 u_int secret_len, salt_len; local
293 salt_len = 3 + 2 + 1 + 22 + 1;
294 *salt = xmalloc(salt_len);
295 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
303 salt_len = 4 + 2 + 1 + 22 + 1;
304 *salt = xmalloc(salt_len);
305 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len);
315 salt_len = (cp - authctxt->pw->pw_passwd) + 1;
316 *salt = xmalloc(salt_len);
318 salt_len);
    [all...]
hostfile.c 67 extract_salt(const char *s, u_int l, char *salt, size_t salt_len)
98 ret = __b64_pton(b64salt, salt, salt_len);
  /external/dropbear/libtomcrypt/src/misc/pkcs5/
pkcs_5_2.c 24 @param salt_len The length of the salt (octets)
32 const unsigned char *salt, unsigned long salt_len,
81 if ((err = hmac_process(hmac, salt, salt_len)) != CRYPT_OK) {
  /external/srtp/test/
dtls_srtp_driver.c 127 unsigned int key_len, salt_len; local
174 salt_len = srtp_profile_get_master_salt_length(profile);
176 memset(salt, 0xee, salt_len);
177 append_salt_to_key(key, key_len, salt, salt_len);
  /external/wpa_supplicant_8/src/tls/
pkcs5.c 24 size_t salt_len; member in struct:pkcs5_params
104 params->salt_len = hdr.length;
106 params->salt, params->salt_len);
153 len[1] = params->salt_len;
  /external/chromium/chrome/browser/chromeos/cros/
cryptohome_library.cc 112 int salt_len; local
113 bool result = chromeos::CryptohomeGetSystemSaltSafe(&salt_buf, &salt_len);
115 system_salt.resize(salt_len);
116 if ((int)system_salt.size() == salt_len) {
118 salt_len);
  /external/openssl/apps/
passwd.c 318 size_t passwd_len, salt_len; local
329 salt_len = strlen(salt_out);
330 assert(salt_len <= 8);
338 EVP_DigestUpdate(&md, salt_out, salt_len);
343 EVP_DigestUpdate(&md2, salt_out, salt_len);
365 EVP_DigestUpdate(&md2, salt_out, salt_len);
390 output = salt_out + salt_len;
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_pkcs.h 81 const unsigned char *salt, unsigned long salt_len,
  /system/vold/
cryptfs.h 32 #define SALT_LEN 16
cryptfs.c 207 if ( (cnt = write(fd, salt, SALT_LEN)) != SALT_LEN) {
331 if ( (cnt = read(fd, salt, SALT_LEN)) != SALT_LEN) {
554 PKCS5_PBKDF2_HMAC_SHA1(passwd, strlen(passwd), salt, SALT_LEN,
637 read(fd, salt, SALT_LEN);
795 unsigned char salt[SALT_LEN];
842 unsigned char salt[SALT_LEN];
995 unsigned char salt[SALT_LEN];
    [all...]
  /external/chromium/chrome/browser/chromeos/login/
google_authenticator.cc 463 unsigned int salt_len = system_salt_.size(); local
464 char ascii_salt[2 * salt_len + 1];
466 salt_len,
parallel_authenticator.cc 604 unsigned int salt_len = system_salt_.size(); local
605 char ascii_salt[2 * salt_len + 1];
607 salt_len,
  /external/libppp/src/
radius.c 117 #define SALT_LEN 2
159 if (mlen % 16 != SALT_LEN) {
176 C = (const u_char *)mangled + SALT_LEN; /* Then the ciphertext */
177 Clen = mlen - SALT_LEN;
185 MD5Update(&Context, A, SALT_LEN);
    [all...]
  /external/srtp/srtp/
srtp.c 379 int salt_len = cipher_get_key_length(srtp->rtp_cipher) - base_key_len; local
385 tmp_key + base_key_len, salt_len);
428 int salt_len = cipher_get_key_length(srtp->rtcp_cipher) - base_key_len; local
434 tmp_key + base_key_len, salt_len);
    [all...]
  /prebuilts/devtools/tools/lib/
jobb.jar 
  /external/dropbear/libtomcrypt/
crypt.tex     [all...]

Completed in 1782 milliseconds