/frameworks/base/tools/obbtool/ |
pbkdf2gen.cpp | 32 #define SALT_LEN 8 50 unsigned char salt[SALT_LEN]; 52 if (read(fd, &salt, SALT_LEN) != SALT_LEN) { 61 if (PKCS5_PBKDF2_HMAC_SHA1(argv[1], strlen(argv[1]), salt, SALT_LEN, 68 for (int i = 0; i < SALT_LEN; i++) {
|
Main.cpp | 33 #define SALT_LEN 8 64 unsigned char salt[SALT_LEN]; 103 obb->setSalt(info->salt, SALT_LEN); 147 for (int i = 0; i < SALT_LEN; i++) { 219 if (strlen(optarg) != SALT_LEN * 2) { 228 for (int i = 0, j = 0; i < SALT_LEN; i++, j+=2) {
|
/external/chromium_org/crypto/ |
signature_verifier_nss.cc | 35 unsigned int salt_len, 57 salt_len); 140 int salt_len, 158 salt_len_ = salt_len;
|
signature_verifier.h | 73 // |hash_alg|, |mask_hash_alg|, and |salt_len| arguments. 87 int salt_len,
|
signature_verifier_openssl.cc | 76 int salt_len, 98 rv = EVP_PKEY_CTX_set_rsa_pss_saltlen(pkey_ctx, salt_len);
|
/external/openssh/ |
auth2-jpake.c | 277 u_int secret_len, salt_len; local 293 salt_len = 3 + 2 + 1 + 22 + 1; 294 *salt = xmalloc(salt_len); 295 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len); 303 salt_len = 4 + 2 + 1 + 22 + 1; 304 *salt = xmalloc(salt_len); 305 strlcpy(*salt, authctxt->pw->pw_passwd, salt_len); 315 salt_len = (cp - authctxt->pw->pw_passwd) + 1; 316 *salt = xmalloc(salt_len); 318 salt_len); [all...] |
hostfile.c | 67 extract_salt(const char *s, u_int l, char *salt, size_t salt_len) 98 ret = __b64_pton(b64salt, salt, salt_len);
|
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_2.c | 24 @param salt_len The length of the salt (octets) 32 const unsigned char *salt, unsigned long salt_len, 81 if ((err = hmac_process(hmac, salt, salt_len)) != CRYPT_OK) {
|
/external/srtp/test/ |
dtls_srtp_driver.c | 127 unsigned int key_len, salt_len; local 174 salt_len = srtp_profile_get_master_salt_length(profile); 176 memset(salt, 0xee, salt_len); 177 append_salt_to_key(key, key_len, salt, salt_len);
|
/external/wpa_supplicant_8/src/tls/ |
pkcs5.c | 24 size_t salt_len; member in struct:pkcs5_params 104 params->salt_len = hdr.length; 106 params->salt, params->salt_len); 153 len[1] = params->salt_len;
|
/external/chromium/chrome/browser/chromeos/cros/ |
cryptohome_library.cc | 112 int salt_len; local 113 bool result = chromeos::CryptohomeGetSystemSaltSafe(&salt_buf, &salt_len); 115 system_salt.resize(salt_len); 116 if ((int)system_salt.size() == salt_len) { 118 salt_len);
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
passwd.c | 318 size_t passwd_len, salt_len; local 329 salt_len = strlen(salt_out); 330 assert(salt_len <= 8); 338 EVP_DigestUpdate(&md, salt_out, salt_len); 343 EVP_DigestUpdate(&md2, salt_out, salt_len); 365 EVP_DigestUpdate(&md2, salt_out, salt_len); 390 output = salt_out + salt_len;
|
/external/openssl/apps/ |
passwd.c | 318 size_t passwd_len, salt_len; local 329 salt_len = strlen(salt_out); 330 assert(salt_len <= 8); 338 EVP_DigestUpdate(&md, salt_out, salt_len); 343 EVP_DigestUpdate(&md2, salt_out, salt_len); 365 EVP_DigestUpdate(&md2, salt_out, salt_len); 390 output = salt_out + salt_len;
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 81 const unsigned char *salt, unsigned long salt_len,
|
/system/vold/ |
cryptfs.h | 42 #define SALT_LEN 16 79 unsigned char salt[SALT_LEN]; /* The salt used for this encryption */
|
cryptfs.c | 873 PKCS5_PBKDF2_HMAC_SHA1(passwd, strlen(passwd), salt, SALT_LEN, 885 crypto_scrypt((unsigned char *) passwd, strlen(passwd), salt, SALT_LEN, N, r, p, ikey, 999 read(fd, salt, SALT_LEN); [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
google_authenticator.cc | 463 unsigned int salt_len = system_salt_.size(); local 464 char ascii_salt[2 * salt_len + 1]; 466 salt_len,
|
parallel_authenticator.cc | 604 unsigned int salt_len = system_salt_.size(); local 605 char ascii_salt[2 * salt_len + 1]; 607 salt_len,
|
/external/libppp/src/ |
radius.c | 117 #define SALT_LEN 2 159 if (mlen % 16 != SALT_LEN) { 176 C = (const u_char *)mangled + SALT_LEN; /* Then the ciphertext */ 177 Clen = mlen - SALT_LEN; 185 MD5Update(&Context, A, SALT_LEN); [all...] |
/external/srtp/srtp/ |
srtp.c | 379 int salt_len = cipher_get_key_length(srtp->rtp_cipher) - base_key_len; local 385 tmp_key + base_key_len, salt_len); 428 int salt_len = cipher_get_key_length(srtp->rtcp_cipher) - base_key_len; local 434 tmp_key + base_key_len, salt_len); [all...] |
/prebuilts/devtools/tools/lib/ |
jobb.jar | |
/external/dropbear/libtomcrypt/ |
crypt.tex | [all...] |