HomeSort by relevance Sort by last modified time
    Searched full:salt (Results 126 - 150 of 402) sorted by null

1 2 3 4 56 7 8 91011>>

  /external/srtp/googlepatches/
google-5-buffer-overflow.patch 12 /* FIX!!! this assumes the salt is at key + 16, and thus that the */
  /system/vold/
cryptfs.h 23 * The fields after salt are only valid in rev 1.1 and later stuctures.
79 unsigned char salt[SALT_LEN]; /* The salt used for this encryption */ member in struct:crypt_mnt_ftr
139 typedef void (*kdf_func)(char *passwd, unsigned char *salt, unsigned char *ikey, void *params);
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
p12_add.c 105 int passlen, unsigned char *salt, int saltlen, int iter,
125 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter,
169 unsigned char *salt, int saltlen, int iter,
188 pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen);
190 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
  /external/openssl/crypto/pkcs12/
p12_add.c 105 int passlen, unsigned char *salt, int saltlen, int iter,
125 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter,
169 unsigned char *salt, int saltlen, int iter,
188 pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen);
190 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/
KnownHosts.java 163 byte[] salt = new byte[sha1.getDigestLength()];
165 new SecureRandom().nextBytes(salt);
167 byte[] hash = hmacSha1Hash(salt, hostname);
169 String base64_salt = new String(Base64.encode(salt));
175 private static byte[] hmacSha1Hash(byte[] salt, String hostname)
179 if (salt.length != sha1.getDigestLength())
181 throw new IllegalArgumentException("Salt has wrong length (" + salt.length + ")");
184 HMAC hmac = new HMAC(sha1, salt, salt.length)
    [all...]
  /frameworks/base/services/java/com/android/server/pm/
UserManagerService.java 87 private static final String ATTR_SALT = "salt";
143 long salt; field in class:UserManagerService.RestrictionsPinState
646 if (pinState.salt != 0) {
647 serializer.attribute(null, ATTR_SALT, Long.toString(pinState.salt));
745 long salt = 0L; local
781 salt = readLongAttribute(parser, ATTR_SALT, 0L);
824 if (salt != 0L) {
830 pinState.salt = salt;
1478 final long salt = pinState == null ? 0 : pinState.salt; local
    [all...]
  /external/chromium/crypto/
symmetric_key.h 42 // Derives a key from the supplied password and salt using PBKDF2, suitable
48 const std::string& salt,
symmetric_key_mac.cc 85 const std::string& salt,
96 CSSM_DATA salt_data = StringToData(salt);
symmetric_key_win.cc 240 const std::string& salt,
247 // password P and the concatenation of the salt S and the block index i:
260 ok = CryptHashData(safe_hash, reinterpret_cast<const BYTE*>(salt.data()),
261 salt.size(), 0);
357 const std::string& salt,
433 // to the password P, the salt S, the iteration count c, and the block
444 if (!ComputePBKDF2Block(prf, hLen, salt, iterations, block_index,
  /external/chromium_org/components/visitedlink/common/
visitedlink_common.cc 81 const uint8 salt[LINK_SALT_LENGTH]) {
86 base::MD5Update(&ctx, base::StringPiece(reinterpret_cast<const char*>(salt),
  /external/chromium_org/crypto/
symmetric_key.h 42 // Derives a key from the supplied password and salt using PBKDF2, suitable
49 const std::string& salt,
  /external/srtp/include/
rtp.h 91 unsigned char *input_key /* master key/salt in hex */
98 unsigned char *input_key /* master key/salt in hex */
  /external/chromium/chrome/browser/visitedlink/
visitedlink_master.cc 54 // Fills the given salt structure with some quasi-random values
57 void GenerateSalt(uint8 salt[LINK_SALT_LENGTH]) {
58 DCHECK_EQ(LINK_SALT_LENGTH, 8) << "This code assumes the length of the salt";
60 memcpy(salt, &randval, 8);
170 const uint8 salt[LINK_SALT_LENGTH]);
197 // Salt for this new table.
577 // The salt must be generated before the table so that it can be copied to
604 uint8 salt[LINK_SALT_LENGTH]) {
644 // Read the salt.
645 memcpy(salt, &header[kFileHeaderSaltOffset], LINK_SALT_LENGTH)
    [all...]
  /ndk/sources/host-tools/sed-4.2.1/testsuite/
linecnt.inp 8 I nibble at a lump of salt,
  /external/chromium/chrome/browser/autofill/
autofill_ie_toolbar_import_win_unittest.cc 33 const wchar_t* const kSaltValue = L"salt";
73 L"salt", L"\x1\x2\x3\x4\x5\x6\x7\x8\x9\xA\xB\xC\xD\xE\xF\x10\x11\x12\x13\x14"
81 L"salt", L"\x4854\xB906\x9C7C\x50A6\x4376\xFD9D\x1E02"
  /external/chromium_org/chromeos/dbus/
fake_cryptohome_client.cc 15 // A fake system salt. GetSystemSalt copies it to the given buffer.
142 bool FakeCryptohomeClient::GetSystemSalt(std::vector<uint8>* salt) {
143 salt->assign(kStubSystemSalt,
  /external/chromium_org/components/autofill/core/browser/
autofill_ie_toolbar_import_win_unittest.cc 36 const wchar_t* const kSaltValue = L"salt";
73 L"salt", L"\x1\x2\x3\x4\x5\x6\x7\x8\x9\xA\xB\xC\xD\xE\xF\x10\x11\x12\x13\x14"
81 L"salt", L"\x4854\xB906\x9C7C\x50A6\x4376\xFD9D\x1E02"
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
evp_key.c 116 const unsigned char *salt, const unsigned char *data, int datal,
141 if (salt != NULL)
142 if (!EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN))
  /external/chromium_org/third_party/yasm/source/patched-yasm/tools/genperf/
perfect.h 57 INLINE_HM, /* user will do initial hash, we must choose salt for them */
124 void findhash(bstuff **tabb, hstuff **tabh, ub4 *alen, ub4 *blen, ub4 *salt,
129 int inithex(key *keys, ub4 nkeys, ub4 alen, ub4 blen, ub4 smax, ub4 salt,
perfect.c 30 using different values of *salt* until all pairs are distinct.
199 ub4 salt, /* used to initialize the hash function */
205 ub4 initlev = (salt*0x9e3779b9)&0xffffffff; /* the golden ratio; an arbitrary value */
229 ub4 initlev = (salt*0x9e3779b9)&0xffffffff; /* the golden ratio; an arbitrary value */
265 ub4 salt, /* used to initialize the hash function */
271 ub4 initval = salt*0x9e3779b9; /* the golden ratio; an arbitrary value */
318 ub4 salt, /* used to initialize the hash function */
326 initnorm(keys, alen, blen, smax, salt, final);
329 initinl(keys, alen, blen, smax, salt, final);
334 finished = inithex(keys, nkeys, alen, blen, smax, salt, final, form);
    [all...]
  /external/openssl/crypto/evp/
evp_key.c 116 const unsigned char *salt, const unsigned char *data, int datal,
141 if (salt != NULL)
142 if (!EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN))
  /external/srtp/test/
dtls_srtp_driver.c 126 uint8_t salt[SRTP_MAX_KEY_LEN]; local
176 memset(salt, 0xee, salt_len);
177 append_salt_to_key(key, key_len, salt, salt_len);
  /external/chromium_org/components/visitedlink/browser/
visitedlink_master.cc 60 // Fills the given salt structure with some quasi-random values
63 void GenerateSalt(uint8 salt[LINK_SALT_LENGTH]) {
64 DCHECK_EQ(LINK_SALT_LENGTH, 8) << "This code assumes the length of the salt";
66 memcpy(salt, &randval, 8);
145 const uint8 salt[LINK_SALT_LENGTH]);
170 // Salt for this new table.
577 // The salt must be generated before the table so that it can be copied to
605 uint8 salt[LINK_SALT_LENGTH]) {
647 // Read the salt.
648 memcpy(salt, &header[kFileHeaderSaltOffset], LINK_SALT_LENGTH)
    [all...]
  /external/scrypt/lib/crypto/
crypto_scrypt-neon.c 184 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen):
185 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
194 const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p,
267 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B);
269 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
crypto_scrypt-ref.c 211 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen):
212 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
221 const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p,
263 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B);
265 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);

Completed in 1525 milliseconds

1 2 3 4 56 7 8 91011>>