HomeSort by relevance Sort by last modified time
    Searched full:salt (Results 151 - 175 of 402) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/chromium_org/crypto/
symmetric_key_win.cc 240 const std::string& salt,
247 // password P and the concatenation of the salt S and the block index i:
260 ok = CryptHashData(safe_hash, reinterpret_cast<const BYTE*>(salt.data()),
261 static_cast<DWORD>(salt.size()), 0);
357 const std::string& salt,
433 // to the password P, the salt S, the iteration count c, and the block
444 if (!ComputePBKDF2Block(prf, hLen, salt, iterations, block_index,
openpgp_symmetric_encryption.cc 102 base::StringPiece salt,
105 const std::string combined = salt.as_string() + passphrase.as_string();
404 base::StringPiece salt; local
409 if (!reader->Prefix(8, &salt))
413 SaltedIteratedS2K(cipher_key_length, hash_function, passphrase, salt,
414 passphrase.size() + salt.size(), key);
417 if (!reader->Prefix(8, &salt) ||
422 cipher_key_length, hash_function, passphrase, salt,
685 ByteString salt(sizeof(salt64), 0);
  /external/chromium_org/third_party/openssl/openssl/crypto/rsa/
rsa_err.c 163 {ERR_REASON(RSA_R_INVALID_SALT_LENGTH) ,"invalid salt length"},
181 {ERR_REASON(RSA_R_SLEN_CHECK_FAILED) ,"salt length check failed"},
182 {ERR_REASON(RSA_R_SLEN_RECOVERY_FAILED) ,"salt length recovery failed"},
  /external/openssl/crypto/rsa/
rsa_err.c 163 {ERR_REASON(RSA_R_INVALID_SALT_LENGTH) ,"invalid salt length"},
181 {ERR_REASON(RSA_R_SLEN_CHECK_FAILED) ,"salt length check failed"},
182 {ERR_REASON(RSA_R_SLEN_RECOVERY_FAILED) ,"salt length recovery failed"},
  /external/srtp/
README 109 In order to get random 30-byte values for use as key/salt pairs , you
124 set master key/salt to C1EEC3717DA76195BB878578790AF71C/4EE9F859E197A414A78D5ABC7451
134 set master key/salt to C1EEC3717DA76195BB878578790AF71C/4EE9F859E197A414A78D5ABC7451
  /external/chromium/chrome/browser/chromeos/cros/
cryptohome_library.cc 344 CryptohomeBlob salt = CryptohomeBlob(); local
345 salt.push_back(0);
346 salt.push_back(0);
347 return salt;
  /external/chromium_org/third_party/sqlite/src/tool/
showwal.c 146 print_decode_line(aData, 8, 4, 1, "Salt-1");
147 print_decode_line(aData,12, 4, 1, "Salt-2");
193 print_decode_line(aData, 16,4, 1, "Salt-1");
194 print_decode_line(aData, 20,4, 1, "Salt-2");
  /external/wpa_supplicant_8/src/radius/
radius.c 957 /* key: 16-bit salt followed by encrypted key info */
976 /* b(1) = MD5(Secret + Request-Authenticator + Salt)
985 elen[2] = 2; /* Salt */
1017 static void encrypt_ms_key(const u8 *key, size_t key_len, u16 salt,
1027 WPA_PUT_BE16(saltbuf, salt);
1041 /* b(1) = MD5(Secret + Request-Authenticator + Salt)
1149 u16 salt; local
1164 salt = os_random() | 0x8000;
1165 WPA_PUT_BE16(pos, salt);
1167 encrypt_ms_key(send_key, send_key_len, salt, req_authenticator, secret
1418 const u8 *salt; local
    [all...]
  /ndk/sources/host-tools/sed-4.2.1/testsuite/
linecnt.good 16 I nibble at a lump of salt,
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/
crypt.h 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/
crypt.h 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/
crypt.h 32 /* Encrypt at most 8 characters from KEY using salt to perturb DES. */
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/spec/
PSSParameterSpecTest.java 210 * Assertion: returns salt length value
254 * Assertion: default salt length value is 20
  /external/chromium_org/third_party/openssl/openssl/crypto/des/
DES.xs 20 des_crypt(buf,salt)
22 char * salt
  /external/chromium_org/third_party/openssl/openssl/crypto/srp/
srp.h 121 char *SRP_create_verifier(const char *user, const char *pass, char **salt,
123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g);
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
srp.h 121 char *SRP_create_verifier(const char *user, const char *pass, char **salt,
123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g);
  /external/chromium_org/third_party/tlslite/scripts/
tlsdb.py 116 N, g, salt, verifier = VerifierDB.makeVerifier(username, password, bits)
117 db[username] = N, g, salt, verifier
  /external/openssl/crypto/des/
DES.xs 20 des_crypt(buf,salt)
22 char * salt
  /external/openssl/crypto/srp/
srp.h 121 char *SRP_create_verifier(const char *user, const char *pass, char **salt,
123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g);
  /external/openssl/include/openssl/
srp.h 121 char *SRP_create_verifier(const char *user, const char *pass, char **salt,
123 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g);
  /external/srtp/crypto/include/
cipher.h 119 * cipher_test_case_t is a (list of) key, salt, xtd_seq_num_t,
154 * key length, key and salt values
crypto_types.h 103 * This cipher uses a 16-octet key and a 30-octet offset (or salt) value.
119 * This cipher uses a 16-octet key and a 30-octet offset (or salt) value.
  /libcore/luni/src/test/java/tests/security/spec/
PSSParameterSpecTest.java 202 * Assertion: returns salt length value
246 * Assertion: default salt length value is 20
  /external/chromium_org/chromeos/network/onc/
onc_utils.cc 62 std::string salt; local
76 !root.GetString(encrypted::kSalt, &salt) ||
105 if (!base::Base64Decode(salt, &salt)) {
113 salt,
  /external/scrypt/lib/crypto/
crypto_scrypt-sse.c 257 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen):
258 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
267 const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p,
340 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B);
342 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);

Completed in 2395 milliseconds

1 2 3 4 5 67 8 91011>>