HomeSort by relevance Sort by last modified time
    Searched full:salt (Results 176 - 200 of 402) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/scrypt/patches/
arm-neon.patch 316 + * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen):
317 + * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
326 + const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p,
399 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B);
401 + PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
  /external/chromium_org/third_party/openssl/openssl/crypto/pem/
pvkfmt.c 131 /* Salt length for PVK files */
708 const unsigned char *salt, unsigned int saltlen,
715 || !EVP_DigestUpdate(&mctx, salt, saltlen)
851 unsigned char *p, *salt = NULL; local
888 salt = p;
908 if (!derive_pvk_key(keybuf, salt, PVK_SALTLEN,
913 p = salt + PVK_SALTLEN + 8;
  /external/openssl/crypto/pem/
pvkfmt.c 131 /* Salt length for PVK files */
708 const unsigned char *salt, unsigned int saltlen,
715 || !EVP_DigestUpdate(&mctx, salt, saltlen)
851 unsigned char *p, *salt = NULL; local
888 salt = p;
908 if (!derive_pvk_key(keybuf, salt, PVK_SALTLEN,
913 p = salt + PVK_SALTLEN + 8;
  /external/chromium_org/chrome/browser/chromeos/login/managed/
managed_user_authenticator.cc 101 // Returns hash of |password|, salted with the system salt.
103 // Get salt, ascii encode, update sha with that, then update with ascii
108 // Hash salt and password
  /external/chromium_org/crypto/
signature_verifier_unittest.cc 276 // Salt length: 20 octets
311 // Salt:
333 // Salt:
366 // Salt:
385 // Salt:
413 // Salt:
446 // Salt:
498 // Salt:
527 // Salt:
563 // Salt
912 const char* salt; member in struct:SignatureExample
1074 std::vector<uint8> salt; local
    [all...]
  /external/openssh/
sshconnect2.c 970 pw_encrypt(const char *password, const char *crypt_scheme, const char *salt)
977 return xstrdup(crypt(password, salt));
985 const char *salt)
996 if ((crypted = pw_encrypt(password, crypt_scheme, salt)) == NULL) {
1004 debug3("%s: salt = %s", __func__, salt);
1034 char *crypt_scheme, *salt; local
1045 salt = packet_get_string(NULL);
1056 pctx->s = jpake_password_to_secret(authctxt, crypt_scheme, salt);
1058 bzero(salt, strlen(salt))
    [all...]
  /external/dropbear/libtomcrypt/src/pk/rsa/
rsa_sign_hash.c 30 @param saltlen The length of the salt desired (octets)
  /external/dropbear/
svr-authpasswd.c 83 /* the first bytes of passwdcrypt are the salt */
  /external/ppp/pppd/
srp-entry.8 36 password salt. These latter two values are encoded in base64 notation.
srp-entry.c 187 t_tob64(saltbuf, (char *)pwval.pebuf.salt.data,
188 pwval.pebuf.salt.len));
  /external/srtp/crypto/cipher/
aes_icm.c 68 * | salt |000000|->(+)
103 * salt so this function is called with key_len = 24.
160 * the salt is unpredictable (but not necessarily secret) data which
170 /* FIX!!! this assumes the salt is at key + 16, and thus that the */
  /system/vold/
cryptfs.c 236 /* key or salt can be NULL, in which case just skip writing that value. Useful to
868 static void pbkdf2(char *passwd, unsigned char *salt, unsigned char *ikey, void *params) {
870 PKCS5_PBKDF2_HMAC_SHA1(passwd, strlen(passwd), salt, SALT_LEN,
874 static void scrypt(char *passwd, unsigned char *salt, unsigned char *ikey, void *params) {
882 crypto_scrypt((unsigned char *) passwd, strlen(passwd), salt, SALT_LEN, N, r, p, ikey,
886 static int encrypt_master_key(char *passwd, unsigned char *salt,
897 scrypt(passwd, salt, ikey, crypt_ftr);
925 static int decrypt_master_key(char *passwd, unsigned char *salt,
935 kdf(passwd, salt, ikey, kdf_params);
977 ret = decrypt_master_key(passwd, crypt_ftr->salt, crypt_ftr->master_key, decrypted_master_key, kdf
    [all...]
  /external/chromium/chrome/browser/chromeos/login/
google_authenticator.h 114 // If we don't have the system salt yet, loads it from the CryptohomeLibrary.
128 // Returns the ascii encoding of the system salt.
  /frameworks/base/libs/androidfw/
ObbFile.cpp 37 * 64-bit salt (8 bytes)
280 ALOGW("couldn't write salt: %s\n", strerror(errno));
  /frameworks/base/tools/obbtool/
mkobb.sh 262 echo "salt for use with obbtool is:"
263 echo "${salt}"
  /external/srtp/doc/
rfc3711.txt 473 * a master salt, to be used in the key derivation of session keys.
475 master salt is strongly RECOMMENDED, see Section 9.2. A "NULL"
476 salt is treated as 00...0.
603 3. Determine the master key and master salt. This is done using the
607 4. Determine the session keys and session salt (if they are used by
609 master salt, key_derivation_rate, and session key-lengths in the
615 the session encryption key and the session salt (if used) found in
652 3. Determine the master key and master salt. If the MKI indicator in
657 4. Determine the session keys, and session salt (if used by the
659 salt, key_derivation_rate and session key-lengths in th
    [all...]
  /system/security/keystore/
keystore.cpp 710 // we read the raw blob to just to get the salt to generate
717 // find salt at EOF if present, otherwise we have an old file
718 uint8_t* salt; local
720 salt = (uint8_t*) &rawBlob + length - SALT_SIZE;
722 salt = NULL;
725 generateKeyFromPassword(passwordKey, MASTER_KEY_SIZE_BYTES, pw, salt);
735 // if salt was missing, generate one and write a new master key file with the salt.
736 if (salt == NULL) {
815 uint8_t* salt) {
826 PKCS5_PBKDF2_HMAC_SHA1(reinterpret_cast<const char*>(pw.string()), pw.length(), salt, local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/x509/
x509.h 561 ASN1_OCTET_STRING *salt; member in struct:PBEPARAM_st
573 ASN1_TYPE *salt; /* Usually OCTET STRING but could be anything */ member in struct:PBKDF2PARAM_st
    [all...]
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
x509.h 561 ASN1_OCTET_STRING *salt; member in struct:PBEPARAM_st
573 ASN1_TYPE *salt; /* Usually OCTET STRING but could be anything */ member in struct:PBKDF2PARAM_st
    [all...]
  /external/openssl/crypto/x509/
x509.h 561 ASN1_OCTET_STRING *salt; member in struct:PBEPARAM_st
573 ASN1_TYPE *salt; /* Usually OCTET STRING but could be anything */ member in struct:PBKDF2PARAM_st
    [all...]
  /external/openssl/include/openssl/
x509.h 561 ASN1_OCTET_STRING *salt; member in struct:PBEPARAM_st
573 ASN1_TYPE *salt; /* Usually OCTET STRING but could be anything */ member in struct:PBKDF2PARAM_st
    [all...]
  /external/srtp/srtp/
srtp.c 374 * to generate the salt value
377 /* FIX!!! this is really the cipher key length; rest is salt */
381 debug_print(mod_srtp, "found aes_icm, generating salt", NULL);
383 /* generate encryption salt, put after encryption key */
423 * to generate the salt value
426 /* FIX!!! this is really the cipher key length; rest is salt */
430 debug_print(mod_srtp, "found aes_icm, generating rtcp salt", NULL);
432 /* generate encryption salt, put after encryption key */
    [all...]
  /external/chromium_org/third_party/openssl/openssl/apps/
srp.c 249 char *salt = NULL; local
256 if (!(gNid =SRP_create_verifier(user, password, &salt, srp_verifier, N, g)))
261 *srp_usersalt = salt;
262 VVERBOSE BIO_printf(bio,"gNid=%s salt =\"%s\"\n verifier =\"%s\"\n", gNid,salt, *srp_verifier);
  /external/openssl/apps/
srp.c 249 char *salt = NULL; local
256 if (!(gNid =SRP_create_verifier(user, password, &salt, srp_verifier, N, g)))
261 *srp_usersalt = salt;
262 VVERBOSE BIO_printf(bio,"gNid=%s salt =\"%s\"\n verifier =\"%s\"\n", gNid,salt, *srp_verifier);
  /external/chromium_org/third_party/openssl/openssl/crypto/des/
des_old.h 376 char *_ossl_old_des_fcrypt(const char *buf,const char *salt, char *ret);
377 char *_ossl_old_des_crypt(const char *buf,const char *salt);
379 char *_ossl_old_crypt(const char *buf,const char *salt);

Completed in 1723 milliseconds

1 2 3 4 5 6 78 91011>>