HomeSort by relevance Sort by last modified time
    Searched full:salt (Results 76 - 100 of 402) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/chromium_org/crypto/
hkdf.cc 15 const base::StringPiece& salt,
20 base::StringPiece actual_salt = salt;
23 // If salt is not given, HashLength zeros are used.
29 // salt into the pseudorandom key (PRK) used for Expand.
  /external/scrypt/patches/
use_openssl_pbkdf2.patch 22 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B);
24 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
62 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B);
64 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
  /external/grub/stage2/
md5.c 205 CRYPTED must have a salt. */
210 char *salt = crypted + 3; /* skip $1$ header */ local
224 saltlen = strstr (salt, "$") - salt;
228 char *end = strstr (salt, "$");
229 if (end && end - salt < 8)
230 saltlen = end - salt;
234 salt[saltlen] = '$';
239 md5_update (salt, saltlen);
268 md5_update (salt, saltlen)
    [all...]
  /external/scrypt/lib/crypto/
crypto_scrypt.h 35 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen):
36 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
p12_crpt.c 74 unsigned char *salt; local
93 salt = pbe->salt->data;
94 saltlen = pbe->salt->length;
95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
p12_p8e.c 65 unsigned char *salt, int saltlen, int iter,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
  /external/openssl/crypto/pkcs12/
p12_crpt.c 74 unsigned char *salt; local
93 salt = pbe->salt->data;
94 saltlen = pbe->salt->length;
95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
p12_p8e.c 65 unsigned char *salt, int saltlen, int iter,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
  /external/chromium_org/third_party/openssl/openssl/apps/
passwd.c 49 * -salt string - salt
66 char *salt = NULL, *passwd = NULL, **passwds = NULL; local
105 else if (strcmp(argv[i], "-salt") == 0)
107 if ((argv[i+1] != NULL) && (salt == NULL))
110 salt = argv[++i];
180 BIO_printf(bio_err, "-salt string use provided salt\n");
245 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out,
274 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out
    [all...]
enc.c 112 unsigned char salt[PKCS5_SALT_LEN]; local
200 else if (strcmp(*argv,"-salt") == 0)
309 BIO_printf(bio_err,"%-14s salt in hex is the next argument\n","-S");
511 * line, so we get no salt in that case. Is this a bug?
515 /* Salt handling: if encrypting generate a salt and
516 * write to output BIO. If decrypting read salt from
524 if(!set_hex(hsalt,salt,sizeof salt)) {
526 "invalid hex salt value\n")
    [all...]
  /external/openssl/apps/
passwd.c 49 * -salt string - salt
66 char *salt = NULL, *passwd = NULL, **passwds = NULL; local
105 else if (strcmp(argv[i], "-salt") == 0)
107 if ((argv[i+1] != NULL) && (salt == NULL))
110 salt = argv[++i];
180 BIO_printf(bio_err, "-salt string use provided salt\n");
245 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out,
274 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out
    [all...]
enc.c 112 unsigned char salt[PKCS5_SALT_LEN]; local
200 else if (strcmp(*argv,"-salt") == 0)
309 BIO_printf(bio_err,"%-14s salt in hex is the next argument\n","-S");
511 * line, so we get no salt in that case. Is this a bug?
515 /* Salt handling: if encrypting generate a salt and
516 * write to output BIO. If decrypting read salt from
524 if(!set_hex(hsalt,salt,sizeof salt)) {
526 "invalid hex salt value\n")
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/rsa/
rsa_pss.c 101 * -2 salt length is autorecovered from signature
201 unsigned char *H, *salt = NULL, *p; local
213 * -2 salt length is maximized
242 salt = OPENSSL_malloc(sLen);
243 if (!salt)
248 if (RAND_bytes(salt, sLen) <= 0)
258 if (sLen && !EVP_DigestUpdate(&ctx, salt, sLen))
279 *p++ ^= salt[i];
291 if (salt)
292 OPENSSL_free(salt);
    [all...]
  /external/openssl/crypto/rsa/
rsa_pss.c 101 * -2 salt length is autorecovered from signature
201 unsigned char *H, *salt = NULL, *p; local
213 * -2 salt length is maximized
242 salt = OPENSSL_malloc(sLen);
243 if (!salt)
248 if (RAND_bytes(salt, sLen) <= 0)
258 if (sLen && !EVP_DigestUpdate(&ctx, salt, sLen))
279 *p++ ^= salt[i];
291 if (salt)
292 OPENSSL_free(salt);
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/srp/
srp_vfy.c 356 * string(username):base64(v):base64(salt):int(index)
522 create a verifier (*salt,*verifier,g and N are in base64)
524 char *SRP_create_verifier(const char *user, const char *pass, char **salt,
537 (salt == NULL)||
559 if (*salt == NULL)
567 if (!(len = t_fromb64(tmp2, *salt)))
581 if (*salt == NULL)
591 *salt = tmp_salt;
606 create a verifier (*salt,*verifier,g and N are BIGNUMs)
608 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g
    [all...]
  /external/openssh/
hostfile.c 67 extract_salt(const char *s, u_int l, char *salt, size_t salt_len)
84 debug2("extract_salt: missing salt termination character");
91 debug2("extract_salt: bad encoded salt length %u", b64len);
98 ret = __b64_pton(b64salt, salt, salt_len);
101 debug2("extract_salt: salt decode error");
105 debug2("extract_salt: expected salt len %d, got %d",
118 char salt[256], result[256], uu_salt[512], uu_result[512]; local
125 /* Create new salt */
127 salt[i] = arc4random();
129 /* Extract salt from known host entry *
    [all...]
  /external/openssl/crypto/srp/
srp_vfy.c 356 * string(username):base64(v):base64(salt):int(index)
522 create a verifier (*salt,*verifier,g and N are in base64)
524 char *SRP_create_verifier(const char *user, const char *pass, char **salt,
537 (salt == NULL)||
559 if (*salt == NULL)
567 if (!(len = t_fromb64(tmp2, *salt)))
581 if (*salt == NULL)
591 *salt = tmp_salt;
606 create a verifier (*salt,*verifier,g and N are BIGNUMs)
608 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g
    [all...]
  /external/chromium/chrome/browser/sync/util/
user_settings.cc 69 static const char SALT[] = "salt2";
356 const string salt = APEncode(string(binary_salt, sizeof(binary_salt))); local
358 md5.AddData(salt.data(), salt.size());
381 statement.bind_string(1, SALT);
382 statement.bind_string(2, salt);
401 query.bind_string(2, SALT);
403 string salt; local
407 if (key == SALT)
408 salt = query.column_string(1)
    [all...]
  /external/chromium_org/components/autofill/core/browser/
autofill_ie_toolbar_import_win.cc 45 const wchar_t* const kSaltValue = L"salt";
66 bool IsEmptySalt(std::wstring const& salt) {
67 // Empty salt in IE Toolbar is \x1\x2...\x14
68 if (salt.length() != 20)
70 for (size_t i = 0; i < salt.length(); ++i) {
71 if (salt[i] != i + 1)
274 base::string16 salt; local
278 salt = ReadAndDecryptValue(cc_key, kSaltValue);
282 if (password_hash.empty() && IsEmptySalt(salt)) {
  /external/chromium_org/base/ios/
device_util.mm 32 // Default salt for device ids.
33 const char kDefaultSalt[] = "Salt";
129 std::string GetDeviceIdentifier(const char* salt) {
151 salt ? salt : kDefaultSalt] dataUsingEncoding:NSUTF8StringEncoding];
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
p5_crpt.c 82 unsigned char *salt; local
103 salt = pbe->salt->data;
104 saltlen = pbe->salt->length;
113 if (!EVP_DigestUpdate(&ctx, salt, saltlen))
  /external/openssl/crypto/evp/
p5_crpt.c 82 unsigned char *salt; local
103 salt = pbe->salt->data;
104 saltlen = pbe->salt->length;
113 if (!EVP_DigestUpdate(&ctx, salt, saltlen))
  /external/chromium/chrome/common/
visitedlink_common.cc 79 const uint8 salt[LINK_SALT_LENGTH]) {
84 MD5Update(&ctx, salt, sizeof(salt));
  /external/dropbear/libtomcrypt/src/modes/f8/
f8_test_mode.c 28 static const unsigned char salt[4] = { 0x32, 0xf2, 0x87, 0x0d };
52 if ((err = f8_start(idx, IV, key, sizeof(key), salt, sizeof(salt), 0, &f8)) != CRYPT_OK) {
  /external/scrypt/tests/
scrypt_test.cpp 33 const char *pw, *salt; member in struct:android::scrypt_test_setting_t
70 crypto_scrypt((const uint8_t*) s.pw, strlen(s.pw), (const uint8_t*) s.salt,
71 strlen(s.salt), s.Nfactor, s.rfactor, s.pfactor, output, sizeof(output)))

Completed in 1460 milliseconds

1 2 34 5 6 7 8 91011>>