HomeSort by relevance Sort by last modified time
    Searched full:salt (Results 226 - 250 of 402) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
p12_asn.c 76 ASN1_SIMPLE(PKCS12_MAC_DATA, salt, ASN1_OCTET_STRING),
p12_npas.c 222 *psaltlen = pbe->salt->length;
  /external/chromium_org/third_party/sqlite/src/test/
tkt1443.test 85 salt BINARY,
  /external/dropbear/libtomcrypt/src/pk/pkcs1/
pkcs_1_oaep_decode.c 63 /* allocate ram for DB/mask/salt of size modulus_len */
pkcs_1_oaep_encode.c 66 /* allocate ram for DB/mask/salt of size modulus_len */
  /external/dropbear/libtomcrypt/src/pk/rsa/
rsa_verify_hash.c 28 @param saltlen The length of the salt used during signature
  /external/openssh/
auth-passwd.c 204 /* Encrypt the candidate password using the proper salt. */
  /external/openssh/openbsd-compat/
openbsd-compat.h 221 char *xcrypt(const char *password, const char *salt);
  /external/openssl/crypto/pkcs12/
p12_asn.c 76 ASN1_SIMPLE(PKCS12_MAC_DATA, salt, ASN1_OCTET_STRING),
p12_npas.c 222 *psaltlen = pbe->salt->length;
  /ndk/sources/host-tools/sed-4.2.1/
basicdefs.h 135 Defining isascii to 1 should let any compiler worth its salt
  /frameworks/base/services/java/com/android/server/
BackupManagerService.java 421 // persisted) salt. Validation is performed by running the challenge text through the
422 // same PBKDF2 cycle with the persisted salt; if the resulting derived key string matches
762 // integer length of the salt array, followed by the salt,
765 byte[] salt = new byte[saltLen];
766 in.readFully(salt);
768 mPasswordSalt = salt;
    [all...]
  /frameworks/base/core/java/com/android/internal/widget/
LockPatternUtils.java 800 long salt = getLong(LOCK_PASSWORD_SALT_KEY, 0); local
801 if (salt == 0) {
803 salt = SecureRandom.getInstance("SHA1PRNG").nextLong();
804 setLong(LOCK_PASSWORD_SALT_KEY, salt);
805 Log.v(TAG, "Initialized lock password salt");
811 return Long.toHexString(salt);
    [all...]
  /external/chromium/chrome/browser/chromeos/login/
google_authenticator.cc 432 // Get salt, ascii encode, update sha with that, then update with ascii
438 // Hash salt and password
  /external/chromium/chrome/browser/visitedlink/
visitedlink_master.h 143 // Bytes in the file header, including the salt.
181 uint8 salt[LINK_SALT_LENGTH]);
  /external/chromium_org/chromeos/dbus/
cryptohome_client.h 98 // The original content of |salt| is lost.
99 virtual bool GetSystemSalt(std::vector<uint8>* salt) = 0;
  /external/chromium_org/third_party/openssl/openssl/crypto/rsa/
rsa_ameth.c 354 if (BIO_puts(bp, "Salt Length: ") <= 0)
523 /* Could perform more salt length sanity checks but the main
  /external/openssl/crypto/rsa/
rsa_ameth.c 354 if (BIO_puts(bp, "Salt Length: ") <= 0)
523 /* Could perform more salt length sanity checks but the main
  /external/chromium_org/chromeos/network/onc/
onc_constants.cc 170 const char kSalt[] = "Salt";
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
evp_err.c 222 {ERR_REASON(EVP_R_UNSUPPORTED_SALT_TYPE) ,"unsupported salt type"},
  /external/chromium_org/webkit/glue/resources/
webkit_strings_ro.xtb 15 <translation id="4202807286478387388">Salt</translation>
webkit_strings_tr.xtb 83 <translation id="2226276347425096477">Lütfen bu metni <ph name="MAX_CHARACTERS"/> veya daha az karakter olacak ?ekilde k?salt?n (?u anda <ph name="CURRENT_LENGTH"/> karakter kullan?yorsunuz).</translation>
  /external/openssl/crypto/evp/
evp_err.c 222 {ERR_REASON(EVP_R_UNSUPPORTED_SALT_TYPE) ,"unsupported salt type"},
  /external/ppp/pppd/plugins/radius/
radius.c 787 u_char *salt = vp->strvalue; local
802 if ((salt[0] & 0x80) == 0) {
803 error("RADIUS: Illegal salt value for MS-MPPE-%s-Key attribute", type);
812 MD5_Update(&Context, salt, 2);
    [all...]
  /external/wpa_supplicant_8/src/common/
sae.c 312 * H(salt, ikm) = HMAC-SHA256(salt, ikm)
384 * H(salt, ikm) = HMAC-SHA256(salt, ikm)

Completed in 1084 milliseconds

1 2 3 4 5 6 7 8 91011>>