/external/chromium_org/crypto/ |
symmetric_key_win.cc | 240 const std::string& salt, 247 // password P and the concatenation of the salt S and the block index i: 260 ok = CryptHashData(safe_hash, reinterpret_cast<const BYTE*>(salt.data()), 261 static_cast<DWORD>(salt.size()), 0); 357 const std::string& salt, 433 // to the password P, the salt S, the iteration count c, and the block 444 if (!ComputePBKDF2Block(prf, hLen, salt, iterations, block_index,
|
openpgp_symmetric_encryption.cc | 102 base::StringPiece salt, 105 const std::string combined = salt.as_string() + passphrase.as_string(); 404 base::StringPiece salt; local 409 if (!reader->Prefix(8, &salt)) 413 SaltedIteratedS2K(cipher_key_length, hash_function, passphrase, salt, 414 passphrase.size() + salt.size(), key); 417 if (!reader->Prefix(8, &salt) || 422 cipher_key_length, hash_function, passphrase, salt, 685 ByteString salt(sizeof(salt64), 0);
|
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
rsa_err.c | 163 {ERR_REASON(RSA_R_INVALID_SALT_LENGTH) ,"invalid salt length"}, 181 {ERR_REASON(RSA_R_SLEN_CHECK_FAILED) ,"salt length check failed"}, 182 {ERR_REASON(RSA_R_SLEN_RECOVERY_FAILED) ,"salt length recovery failed"},
|
/external/openssl/crypto/rsa/ |
rsa_err.c | 163 {ERR_REASON(RSA_R_INVALID_SALT_LENGTH) ,"invalid salt length"}, 181 {ERR_REASON(RSA_R_SLEN_CHECK_FAILED) ,"salt length check failed"}, 182 {ERR_REASON(RSA_R_SLEN_RECOVERY_FAILED) ,"salt length recovery failed"},
|
/external/srtp/ |
README | 109 In order to get random 30-byte values for use as key/salt pairs , you 124 set master key/salt to C1EEC3717DA76195BB878578790AF71C/4EE9F859E197A414A78D5ABC7451 134 set master key/salt to C1EEC3717DA76195BB878578790AF71C/4EE9F859E197A414A78D5ABC7451
|
/external/chromium/chrome/browser/chromeos/cros/ |
cryptohome_library.cc | 344 CryptohomeBlob salt = CryptohomeBlob(); local 345 salt.push_back(0); 346 salt.push_back(0); 347 return salt;
|
/external/chromium_org/third_party/sqlite/src/tool/ |
showwal.c | 146 print_decode_line(aData, 8, 4, 1, "Salt-1"); 147 print_decode_line(aData,12, 4, 1, "Salt-2"); 193 print_decode_line(aData, 16,4, 1, "Salt-1"); 194 print_decode_line(aData, 20,4, 1, "Salt-2");
|
/external/wpa_supplicant_8/src/radius/ |
radius.c | 957 /* key: 16-bit salt followed by encrypted key info */ 976 /* b(1) = MD5(Secret + Request-Authenticator + Salt) 985 elen[2] = 2; /* Salt */ 1017 static void encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, 1027 WPA_PUT_BE16(saltbuf, salt); 1041 /* b(1) = MD5(Secret + Request-Authenticator + Salt) 1149 u16 salt; local 1164 salt = os_random() | 0x8000; 1165 WPA_PUT_BE16(pos, salt); 1167 encrypt_ms_key(send_key, send_key_len, salt, req_authenticator, secret 1418 const u8 *salt; local [all...] |
/ndk/sources/host-tools/sed-4.2.1/testsuite/ |
linecnt.good | 16 I nibble at a lump of salt,
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/ |
crypt.h | 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/ |
crypt.h | 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/ |
crypt.h | 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ |
PSSParameterSpecTest.java | 210 * Assertion: returns salt length value 254 * Assertion: default salt length value is 20
|
/external/chromium_org/third_party/openssl/openssl/crypto/des/ |
DES.xs | 20 des_crypt(buf,salt) 22 char * salt
|
/external/chromium_org/third_party/openssl/openssl/crypto/srp/ |
srp.h | 121 char *SRP_create_verifier(const char *user, const char *pass, char **salt, 123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g);
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
srp.h | 121 char *SRP_create_verifier(const char *user, const char *pass, char **salt, 123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g);
|
/external/chromium_org/third_party/tlslite/scripts/ |
tlsdb.py | 116 N, g, salt, verifier = VerifierDB.makeVerifier(username, password, bits) 117 db[username] = N, g, salt, verifier
|
/external/openssl/crypto/des/ |
DES.xs | 20 des_crypt(buf,salt) 22 char * salt
|
/external/openssl/crypto/srp/ |
srp.h | 121 char *SRP_create_verifier(const char *user, const char *pass, char **salt, 123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g);
|
/external/openssl/include/openssl/ |
srp.h | 121 char *SRP_create_verifier(const char *user, const char *pass, char **salt, 123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g);
|
/external/srtp/crypto/include/ |
cipher.h | 119 * cipher_test_case_t is a (list of) key, salt, xtd_seq_num_t, 154 * key length, key and salt values
|
crypto_types.h | 103 * This cipher uses a 16-octet key and a 30-octet offset (or salt) value. 119 * This cipher uses a 16-octet key and a 30-octet offset (or salt) value.
|
/libcore/luni/src/test/java/tests/security/spec/ |
PSSParameterSpecTest.java | 202 * Assertion: returns salt length value 246 * Assertion: default salt length value is 20
|
/external/chromium_org/chromeos/network/onc/ |
onc_utils.cc | 62 std::string salt; local 76 !root.GetString(encrypted::kSalt, &salt) || 105 if (!base::Base64Decode(salt, &salt)) { 113 salt,
|
/external/scrypt/lib/crypto/ |
crypto_scrypt-sse.c | 257 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen): 258 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r, 267 const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p, 340 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); 342 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
|