/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/ |
p12_asn.c | 76 ASN1_SIMPLE(PKCS12_MAC_DATA, salt, ASN1_OCTET_STRING),
|
p12_npas.c | 222 *psaltlen = pbe->salt->length;
|
/external/chromium_org/third_party/sqlite/src/test/ |
tkt1443.test | 85 salt BINARY,
|
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_oaep_decode.c | 63 /* allocate ram for DB/mask/salt of size modulus_len */
|
pkcs_1_oaep_encode.c | 66 /* allocate ram for DB/mask/salt of size modulus_len */
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
rsa_verify_hash.c | 28 @param saltlen The length of the salt used during signature
|
/external/openssh/ |
auth-passwd.c | 204 /* Encrypt the candidate password using the proper salt. */
|
/external/openssh/openbsd-compat/ |
openbsd-compat.h | 221 char *xcrypt(const char *password, const char *salt);
|
/external/openssl/crypto/pkcs12/ |
p12_asn.c | 76 ASN1_SIMPLE(PKCS12_MAC_DATA, salt, ASN1_OCTET_STRING),
|
p12_npas.c | 222 *psaltlen = pbe->salt->length;
|
/ndk/sources/host-tools/sed-4.2.1/ |
basicdefs.h | 135 Defining isascii to 1 should let any compiler worth its salt
|
/frameworks/base/services/java/com/android/server/ |
BackupManagerService.java | 421 // persisted) salt. Validation is performed by running the challenge text through the 422 // same PBKDF2 cycle with the persisted salt; if the resulting derived key string matches 762 // integer length of the salt array, followed by the salt, 765 byte[] salt = new byte[saltLen]; 766 in.readFully(salt); 768 mPasswordSalt = salt; [all...] |
/frameworks/base/core/java/com/android/internal/widget/ |
LockPatternUtils.java | 800 long salt = getLong(LOCK_PASSWORD_SALT_KEY, 0); local 801 if (salt == 0) { 803 salt = SecureRandom.getInstance("SHA1PRNG").nextLong(); 804 setLong(LOCK_PASSWORD_SALT_KEY, salt); 805 Log.v(TAG, "Initialized lock password salt"); 811 return Long.toHexString(salt); [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
google_authenticator.cc | 432 // Get salt, ascii encode, update sha with that, then update with ascii 438 // Hash salt and password
|
/external/chromium/chrome/browser/visitedlink/ |
visitedlink_master.h | 143 // Bytes in the file header, including the salt. 181 uint8 salt[LINK_SALT_LENGTH]);
|
/external/chromium_org/chromeos/dbus/ |
cryptohome_client.h | 98 // The original content of |salt| is lost. 99 virtual bool GetSystemSalt(std::vector<uint8>* salt) = 0;
|
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
rsa_ameth.c | 354 if (BIO_puts(bp, "Salt Length: ") <= 0) 523 /* Could perform more salt length sanity checks but the main
|
/external/openssl/crypto/rsa/ |
rsa_ameth.c | 354 if (BIO_puts(bp, "Salt Length: ") <= 0) 523 /* Could perform more salt length sanity checks but the main
|
/external/chromium_org/chromeos/network/onc/ |
onc_constants.cc | 170 const char kSalt[] = "Salt";
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
evp_err.c | 222 {ERR_REASON(EVP_R_UNSUPPORTED_SALT_TYPE) ,"unsupported salt type"},
|
/external/chromium_org/webkit/glue/resources/ |
webkit_strings_ro.xtb | 15 <translation id="4202807286478387388">Salt</translation>
|
webkit_strings_tr.xtb | 83 <translation id="2226276347425096477">Lütfen bu metni <ph name="MAX_CHARACTERS"/> veya daha az karakter olacak ?ekilde k?salt?n (?u anda <ph name="CURRENT_LENGTH"/> karakter kullan?yorsunuz).</translation>
|
/external/openssl/crypto/evp/ |
evp_err.c | 222 {ERR_REASON(EVP_R_UNSUPPORTED_SALT_TYPE) ,"unsupported salt type"},
|
/external/ppp/pppd/plugins/radius/ |
radius.c | 787 u_char *salt = vp->strvalue; local 802 if ((salt[0] & 0x80) == 0) { 803 error("RADIUS: Illegal salt value for MS-MPPE-%s-Key attribute", type); 812 MD5_Update(&Context, salt, 2); [all...] |
/external/wpa_supplicant_8/src/common/ |
sae.c | 312 * H(salt, ikm) = HMAC-SHA256(salt, ikm) 384 * H(salt, ikm) = HMAC-SHA256(salt, ikm)
|