/external/srtp/googlepatches/ |
google-5-buffer-overflow.patch | 12 /* FIX!!! this assumes the salt is at key + 16, and thus that the */
|
/system/vold/ |
cryptfs.h | 23 * The fields after salt are only valid in rev 1.1 and later stuctures. 79 unsigned char salt[SALT_LEN]; /* The salt used for this encryption */ member in struct:crypt_mnt_ftr 139 typedef void (*kdf_func)(char *passwd, unsigned char *salt, unsigned char *ikey, void *params);
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/ |
p12_add.c | 105 int passlen, unsigned char *salt, int saltlen, int iter, 125 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, 169 unsigned char *salt, int saltlen, int iter, 188 pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen); 190 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
|
/external/openssl/crypto/pkcs12/ |
p12_add.c | 105 int passlen, unsigned char *salt, int saltlen, int iter, 125 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, 169 unsigned char *salt, int saltlen, int iter, 188 pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen); 190 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
KnownHosts.java | 163 byte[] salt = new byte[sha1.getDigestLength()]; 165 new SecureRandom().nextBytes(salt); 167 byte[] hash = hmacSha1Hash(salt, hostname); 169 String base64_salt = new String(Base64.encode(salt)); 175 private static byte[] hmacSha1Hash(byte[] salt, String hostname) 179 if (salt.length != sha1.getDigestLength()) 181 throw new IllegalArgumentException("Salt has wrong length (" + salt.length + ")"); 184 HMAC hmac = new HMAC(sha1, salt, salt.length) [all...] |
/frameworks/base/services/java/com/android/server/pm/ |
UserManagerService.java | 87 private static final String ATTR_SALT = "salt"; 143 long salt; field in class:UserManagerService.RestrictionsPinState 646 if (pinState.salt != 0) { 647 serializer.attribute(null, ATTR_SALT, Long.toString(pinState.salt)); 745 long salt = 0L; local 781 salt = readLongAttribute(parser, ATTR_SALT, 0L); 824 if (salt != 0L) { 830 pinState.salt = salt; 1478 final long salt = pinState == null ? 0 : pinState.salt; local [all...] |
/external/chromium/crypto/ |
symmetric_key.h | 42 // Derives a key from the supplied password and salt using PBKDF2, suitable 48 const std::string& salt,
|
symmetric_key_mac.cc | 85 const std::string& salt, 96 CSSM_DATA salt_data = StringToData(salt);
|
symmetric_key_win.cc | 240 const std::string& salt, 247 // password P and the concatenation of the salt S and the block index i: 260 ok = CryptHashData(safe_hash, reinterpret_cast<const BYTE*>(salt.data()), 261 salt.size(), 0); 357 const std::string& salt, 433 // to the password P, the salt S, the iteration count c, and the block 444 if (!ComputePBKDF2Block(prf, hLen, salt, iterations, block_index,
|
/external/chromium_org/components/visitedlink/common/ |
visitedlink_common.cc | 81 const uint8 salt[LINK_SALT_LENGTH]) { 86 base::MD5Update(&ctx, base::StringPiece(reinterpret_cast<const char*>(salt),
|
/external/chromium_org/crypto/ |
symmetric_key.h | 42 // Derives a key from the supplied password and salt using PBKDF2, suitable 49 const std::string& salt,
|
/external/srtp/include/ |
rtp.h | 91 unsigned char *input_key /* master key/salt in hex */ 98 unsigned char *input_key /* master key/salt in hex */
|
/external/chromium/chrome/browser/visitedlink/ |
visitedlink_master.cc | 54 // Fills the given salt structure with some quasi-random values 57 void GenerateSalt(uint8 salt[LINK_SALT_LENGTH]) { 58 DCHECK_EQ(LINK_SALT_LENGTH, 8) << "This code assumes the length of the salt"; 60 memcpy(salt, &randval, 8); 170 const uint8 salt[LINK_SALT_LENGTH]); 197 // Salt for this new table. 577 // The salt must be generated before the table so that it can be copied to 604 uint8 salt[LINK_SALT_LENGTH]) { 644 // Read the salt. 645 memcpy(salt, &header[kFileHeaderSaltOffset], LINK_SALT_LENGTH) [all...] |
/ndk/sources/host-tools/sed-4.2.1/testsuite/ |
linecnt.inp | 8 I nibble at a lump of salt,
|
/external/chromium/chrome/browser/autofill/ |
autofill_ie_toolbar_import_win_unittest.cc | 33 const wchar_t* const kSaltValue = L"salt"; 73 L"salt", L"\x1\x2\x3\x4\x5\x6\x7\x8\x9\xA\xB\xC\xD\xE\xF\x10\x11\x12\x13\x14" 81 L"salt", L"\x4854\xB906\x9C7C\x50A6\x4376\xFD9D\x1E02"
|
/external/chromium_org/chromeos/dbus/ |
fake_cryptohome_client.cc | 15 // A fake system salt. GetSystemSalt copies it to the given buffer. 142 bool FakeCryptohomeClient::GetSystemSalt(std::vector<uint8>* salt) { 143 salt->assign(kStubSystemSalt,
|
/external/chromium_org/components/autofill/core/browser/ |
autofill_ie_toolbar_import_win_unittest.cc | 36 const wchar_t* const kSaltValue = L"salt"; 73 L"salt", L"\x1\x2\x3\x4\x5\x6\x7\x8\x9\xA\xB\xC\xD\xE\xF\x10\x11\x12\x13\x14" 81 L"salt", L"\x4854\xB906\x9C7C\x50A6\x4376\xFD9D\x1E02"
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
evp_key.c | 116 const unsigned char *salt, const unsigned char *data, int datal, 141 if (salt != NULL) 142 if (!EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN))
|
/external/chromium_org/third_party/yasm/source/patched-yasm/tools/genperf/ |
perfect.h | 57 INLINE_HM, /* user will do initial hash, we must choose salt for them */ 124 void findhash(bstuff **tabb, hstuff **tabh, ub4 *alen, ub4 *blen, ub4 *salt, 129 int inithex(key *keys, ub4 nkeys, ub4 alen, ub4 blen, ub4 smax, ub4 salt,
|
perfect.c | 30 using different values of *salt* until all pairs are distinct. 199 ub4 salt, /* used to initialize the hash function */ 205 ub4 initlev = (salt*0x9e3779b9)&0xffffffff; /* the golden ratio; an arbitrary value */ 229 ub4 initlev = (salt*0x9e3779b9)&0xffffffff; /* the golden ratio; an arbitrary value */ 265 ub4 salt, /* used to initialize the hash function */ 271 ub4 initval = salt*0x9e3779b9; /* the golden ratio; an arbitrary value */ 318 ub4 salt, /* used to initialize the hash function */ 326 initnorm(keys, alen, blen, smax, salt, final); 329 initinl(keys, alen, blen, smax, salt, final); 334 finished = inithex(keys, nkeys, alen, blen, smax, salt, final, form); [all...] |
/external/openssl/crypto/evp/ |
evp_key.c | 116 const unsigned char *salt, const unsigned char *data, int datal, 141 if (salt != NULL) 142 if (!EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN))
|
/external/srtp/test/ |
dtls_srtp_driver.c | 126 uint8_t salt[SRTP_MAX_KEY_LEN]; local 176 memset(salt, 0xee, salt_len); 177 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/chromium_org/components/visitedlink/browser/ |
visitedlink_master.cc | 60 // Fills the given salt structure with some quasi-random values 63 void GenerateSalt(uint8 salt[LINK_SALT_LENGTH]) { 64 DCHECK_EQ(LINK_SALT_LENGTH, 8) << "This code assumes the length of the salt"; 66 memcpy(salt, &randval, 8); 145 const uint8 salt[LINK_SALT_LENGTH]); 170 // Salt for this new table. 577 // The salt must be generated before the table so that it can be copied to 605 uint8 salt[LINK_SALT_LENGTH]) { 647 // Read the salt. 648 memcpy(salt, &header[kFileHeaderSaltOffset], LINK_SALT_LENGTH) [all...] |
/external/scrypt/lib/crypto/ |
crypto_scrypt-neon.c | 184 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen): 185 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r, 194 const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p, 267 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); 269 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
|
crypto_scrypt-ref.c | 211 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen): 212 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r, 221 const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p, 263 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); 265 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
|