HomeSort by relevance Sort by last modified time
    Searched full:salt (Results 101 - 125 of 262) sorted by null

1 2 3 45 6 7 8 91011

  /frameworks/base/libs/androidfw/
ObbFile.cpp 37 * 64-bit salt (8 bytes)
280 ALOGW("couldn't write salt: %s\n", strerror(errno));
  /frameworks/base/tools/obbtool/
mkobb.sh 262 echo "salt for use with obbtool is:"
263 echo "${salt}"
  /external/boringssl/src/include/openssl/
rsa.h 293 * argument specifies the expected salt length in bytes. If |sLen| is -1 then
294 * the salt length is the same as the hash length. If -2, then the salt length
307 * argument specifies the expected salt length in bytes. If |sLen| is -1 then
308 * the salt length is the same as the hash length. If -2, then the salt length
x509.h 513 ASN1_OCTET_STRING *salt; member in struct:PBEPARAM_st
525 ASN1_TYPE *salt; /* Usually OCTET STRING but could be anything */ member in struct:PBKDF2PARAM_st
    [all...]
  /external/srtp/doc/
rfc3711.txt 473 * a master salt, to be used in the key derivation of session keys.
475 master salt is strongly RECOMMENDED, see Section 9.2. A "NULL"
476 salt is treated as 00...0.
603 3. Determine the master key and master salt. This is done using the
607 4. Determine the session keys and session salt (if they are used by
609 master salt, key_derivation_rate, and session key-lengths in the
615 the session encryption key and the session salt (if used) found in
652 3. Determine the master key and master salt. If the MKI indicator in
657 4. Determine the session keys, and session salt (if used by the
659 salt, key_derivation_rate and session key-lengths in th
    [all...]
  /external/srtp/srtp/
srtp.c 374 * to generate the salt value
377 /* FIX!!! this is really the cipher key length; rest is salt */
381 debug_print(mod_srtp, "found aes_icm, generating salt", NULL);
383 /* generate encryption salt, put after encryption key */
423 * to generate the salt value
426 /* FIX!!! this is really the cipher key length; rest is salt */
430 debug_print(mod_srtp, "found aes_icm, generating rtcp salt", NULL);
432 /* generate encryption salt, put after encryption key */
    [all...]
  /external/llvm/lib/IR/
Module.cpp 67 SmallString<32> Salt(P->getPassName());
74 // We could store this salt in NamedMetadata, but this would make
78 // store salt metadata from the Module constructor.
79 Salt += sys::path::filename(getModuleIdentifier());
81 return new RandomNumberGenerator(Salt);
  /external/vboot_reference/scripts/image_signing/
sign_official_build.sh 207 salt=$(get_verity_arg "${vroot_dev}" salt)
211 if [ -n "$salt" ]; then
212 salt_arg="salt=$salt"
ensure_secure_kernelparams.sh 36 sed -e 's/salt=[0-9a-fA-F]*/salt=MAGIC_SALT'/)
  /docs/source.android.com/src/devices/tech/security/verifiedboot/
dm-verity.jd 87 &lt;your block device name&gt; &lt;your block device name&gt; &lt;block size&gt; &lt;block size&gt; &lt;image size in blocks&gt; &lt;image size in blocks + 8&gt; &lt;root hash&gt; &lt;salt&gt;
114 <li>Choose a random salt (hexadecimal encoding).</li>
124 <p>The result of this is a single hash, which is your root hash. This and your salt
  /external/srtp/test/
rtpw.c 346 "error: too few digits in key/salt "
353 "error: too many digits in key/salt "
359 printf("set master key/salt to %s/", octet_string_hex_string(key, 16));
  /docs/source.android.com/src/devices/tech/security/encryption/
index.jd 79 and then hashes it with a default password and stored salt. The default password is: "default_password"
364 Previously, we encrypted the master key with a key generated by applying scrypt to the user's password and the stored salt. In order to make the key resilient
368 <li>Generate random 16-byte disk encryption key (DEK) and 16-byte salt.
369 <li>Apply scrypt to the user password and the salt to produce 32-byte intermediate
375 <li>Apply scrypt to IK2 and salt (same salt as step 2) to produce 32-byte IK3.
  /frameworks/base/core/java/com/android/internal/widget/
LockPatternUtils.java 911 long salt = getLong(LOCK_PASSWORD_SALT_KEY, 0, userId); local
    [all...]
  /libcore/luni/src/main/files/cacerts/
4fbd6bfa.0 33 Issuer: C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN - DATACorp SGC
37 Subject: C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN - DATACorp SGC
ff783690.0 33 Issuer: C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN-USERFirst-Hardware
37 Subject: C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN-USERFirst-Hardware
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/
SHA1.java 118 throw new InvalidKeySpecException("missing required salt");
  /external/openssh/
auth-passwd.c 205 /* Encrypt the candidate password using the proper salt. */
  /external/pdfium/core/src/fpdfapi/fpdf_parser/
fpdf_parser_encrypt.cpp 218 void Revision6_Hash(FX_LPCBYTE password, FX_DWORD size, FX_LPCBYTE salt, FX_LPCBYTE vector, FX_LPBYTE hash)
224 CRYPT_SHA256Update(sha, salt, 8);
683 FXSYS_memcpy32(key1 + m_KeyLen + 5, "sAlT", 4);
750 FXSYS_memcpy32(key1 + m_KeyLen + 5, "sAlT", 4);
    [all...]
  /packages/apps/Contacts/res/values-tr/
strings.xml 71 <string name="readOnlyContactWarning" msgid="7808825687289848259">"Ki?ileri salt okunur hesaplardan silemezsiniz, ancak bu ki?ileri ki?iler listenizde gizleyebilirsiniz."</string>
72 <string name="readOnlyContactDeleteConfirmation" msgid="2137170726670196909">"Bu ki?i birden fazla hesaptan bilgiler içeriyor. Salt okunur hesaplardaki bilgiler silinmez, ki?iler listelerinizde gizlenir."</string>
76 <string name="batch_delete_read_only_contact_confirmation" msgid="6614878716815412523">"Salt okunur hesaplara ait bilgiler ki?i listelerinizde silinmeyecek, gizlenecektir."</string>
77 <string name="batch_delete_multiple_accounts_confirmation" msgid="5189722181586680185">"Bu ki?iler birden fazla hesaba ait bilgi içeriyor. Salt okunur hesaplara ait bilgiler ki?i listelerinizde silinmeyecek, gizlenecektir."</string>
  /packages/inputmethods/LatinIME/tests/src/com/android/inputmethod/latin/personalization/
UserHistoryDictionaryTestsHelper.java 121 * @param random salt used for generating random words.
  /system/bt/stack/smp/
smp_keys.c 1701 BT_OCTET16 salt = { local
    [all...]
  /system/security/keystore/
keystore.cpp 838 // we read the raw blob to just to get the salt to generate
845 // find salt at EOF if present, otherwise we have an old file
846 uint8_t* salt; local
848 salt = (uint8_t*) &rawBlob + length - SALT_SIZE;
850 salt = NULL;
853 generateKeyFromPassword(passwordKey, MASTER_KEY_SIZE_BYTES, pw, salt);
863 // if salt was missing, generate one and write a new master key file with the salt.
864 if (salt == NULL) {
930 uint8_t* salt) {
941 PKCS5_PBKDF2_HMAC_SHA1(reinterpret_cast<const char*>(pw.string()), pw.length(), salt, local
    [all...]
  /external/boringssl/src/crypto/evp/
p_rsa_asn1.c 353 BIO_puts(bp, "Salt Length: 0x") <= 0) {
602 /* Could perform more salt length sanity checks but the main
  /external/boringssl/src/crypto/hkdf/
hkdf_test.c 28 const uint8_t salt[80]; member in struct:__anon4779
224 test->salt, test->salt_len, test->info, test->info_len)) {
  /external/openssh/openbsd-compat/
openbsd-compat.h 261 char *xcrypt(const char *password, const char *salt);

Completed in 508 milliseconds

1 2 3 45 6 7 8 91011