/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ |
PSSParameterSpecTest.java | 58 * if <code>saltLen</code> less than 0 123 * if <code>saltLen<code> less than 0
|
/libcore/luni/src/test/java/tests/security/spec/ |
PSSParameterSpecTest.java | 51 * if <code>saltLen</code> less than 0 116 * if <code>saltLen<code> less than 0
|
/external/scrypt/lib/crypto/ |
crypto_scrypt-sse.c | 257 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen): 258 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r, 267 const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p, 340 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); 342 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
|
/external/scrypt/patches/ |
arm-neon.patch | 316 + * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen): 317 + * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r, 326 + const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p, 399 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); 401 + PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
|
/frameworks/base/tools/obbtool/ |
Main.cpp | 144 size_t saltLen; 145 const unsigned char* salt = obb->getSalt(&saltLen);
|
/external/openssl/crypto/x509/ |
x509.h | [all...] |
/external/openssl/include/openssl/ |
x509.h | [all...] |
evp.h | [all...] |
/external/openssl/crypto/rsa/ |
rsa_err.c | 162 {ERR_REASON(RSA_R_INVALID_PSS_SALTLEN) ,"invalid pss saltlen"},
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
x509.h | [all...] |
/external/openssl/crypto/evp/ |
evp.h | [all...] |
/frameworks/base/services/backup/java/com/android/server/backup/ |
BackupManagerService.java | [all...] |