/frameworks/base/libs/androidfw/ |
ObbFile.cpp | 37 * 64-bit salt (8 bytes) 280 ALOGW("couldn't write salt: %s\n", strerror(errno));
|
/frameworks/base/tools/obbtool/ |
mkobb.sh | 262 echo "salt for use with obbtool is:" 263 echo "${salt}"
|
/external/boringssl/src/include/openssl/ |
rsa.h | 293 * argument specifies the expected salt length in bytes. If |sLen| is -1 then 294 * the salt length is the same as the hash length. If -2, then the salt length 307 * argument specifies the expected salt length in bytes. If |sLen| is -1 then 308 * the salt length is the same as the hash length. If -2, then the salt length
|
x509.h | 513 ASN1_OCTET_STRING *salt; member in struct:PBEPARAM_st 525 ASN1_TYPE *salt; /* Usually OCTET STRING but could be anything */ member in struct:PBKDF2PARAM_st [all...] |
/external/srtp/doc/ |
rfc3711.txt | 473 * a master salt, to be used in the key derivation of session keys. 475 master salt is strongly RECOMMENDED, see Section 9.2. A "NULL" 476 salt is treated as 00...0. 603 3. Determine the master key and master salt. This is done using the 607 4. Determine the session keys and session salt (if they are used by 609 master salt, key_derivation_rate, and session key-lengths in the 615 the session encryption key and the session salt (if used) found in 652 3. Determine the master key and master salt. If the MKI indicator in 657 4. Determine the session keys, and session salt (if used by the 659 salt, key_derivation_rate and session key-lengths in th [all...] |
/external/srtp/srtp/ |
srtp.c | 374 * to generate the salt value 377 /* FIX!!! this is really the cipher key length; rest is salt */ 381 debug_print(mod_srtp, "found aes_icm, generating salt", NULL); 383 /* generate encryption salt, put after encryption key */ 423 * to generate the salt value 426 /* FIX!!! this is really the cipher key length; rest is salt */ 430 debug_print(mod_srtp, "found aes_icm, generating rtcp salt", NULL); 432 /* generate encryption salt, put after encryption key */ [all...] |
/external/llvm/lib/IR/ |
Module.cpp | 67 SmallString<32> Salt(P->getPassName()); 74 // We could store this salt in NamedMetadata, but this would make 78 // store salt metadata from the Module constructor. 79 Salt += sys::path::filename(getModuleIdentifier()); 81 return new RandomNumberGenerator(Salt);
|
/external/vboot_reference/scripts/image_signing/ |
sign_official_build.sh | 207 salt=$(get_verity_arg "${vroot_dev}" salt) 211 if [ -n "$salt" ]; then 212 salt_arg="salt=$salt"
|
ensure_secure_kernelparams.sh | 36 sed -e 's/salt=[0-9a-fA-F]*/salt=MAGIC_SALT'/)
|
/docs/source.android.com/src/devices/tech/security/verifiedboot/ |
dm-verity.jd | 87 <your block device name> <your block device name> <block size> <block size> <image size in blocks> <image size in blocks + 8> <root hash> <salt> 114 <li>Choose a random salt (hexadecimal encoding).</li> 124 <p>The result of this is a single hash, which is your root hash. This and your salt
|
/external/srtp/test/ |
rtpw.c | 346 "error: too few digits in key/salt " 353 "error: too many digits in key/salt " 359 printf("set master key/salt to %s/", octet_string_hex_string(key, 16));
|
/docs/source.android.com/src/devices/tech/security/encryption/ |
index.jd | 79 and then hashes it with a default password and stored salt. The default password is: "default_password" 364 Previously, we encrypted the master key with a key generated by applying scrypt to the user's password and the stored salt. In order to make the key resilient 368 <li>Generate random 16-byte disk encryption key (DEK) and 16-byte salt. 369 <li>Apply scrypt to the user password and the salt to produce 32-byte intermediate 375 <li>Apply scrypt to IK2 and salt (same salt as step 2) to produce 32-byte IK3.
|
/frameworks/base/core/java/com/android/internal/widget/ |
LockPatternUtils.java | 911 long salt = getLong(LOCK_PASSWORD_SALT_KEY, 0, userId); local [all...] |
/libcore/luni/src/main/files/cacerts/ |
4fbd6bfa.0 | 33 Issuer: C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN - DATACorp SGC 37 Subject: C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN - DATACorp SGC
|
ff783690.0 | 33 Issuer: C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN-USERFirst-Hardware 37 Subject: C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN-USERFirst-Hardware
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
SHA1.java | 118 throw new InvalidKeySpecException("missing required salt");
|
/external/openssh/ |
auth-passwd.c | 205 /* Encrypt the candidate password using the proper salt. */
|
/external/pdfium/core/src/fpdfapi/fpdf_parser/ |
fpdf_parser_encrypt.cpp | 218 void Revision6_Hash(FX_LPCBYTE password, FX_DWORD size, FX_LPCBYTE salt, FX_LPCBYTE vector, FX_LPBYTE hash) 224 CRYPT_SHA256Update(sha, salt, 8); 683 FXSYS_memcpy32(key1 + m_KeyLen + 5, "sAlT", 4); 750 FXSYS_memcpy32(key1 + m_KeyLen + 5, "sAlT", 4); [all...] |
/packages/apps/Contacts/res/values-tr/ |
strings.xml | 71 <string name="readOnlyContactWarning" msgid="7808825687289848259">"Ki?ileri salt okunur hesaplardan silemezsiniz, ancak bu ki?ileri ki?iler listenizde gizleyebilirsiniz."</string> 72 <string name="readOnlyContactDeleteConfirmation" msgid="2137170726670196909">"Bu ki?i birden fazla hesaptan bilgiler içeriyor. Salt okunur hesaplardaki bilgiler silinmez, ki?iler listelerinizde gizlenir."</string> 76 <string name="batch_delete_read_only_contact_confirmation" msgid="6614878716815412523">"Salt okunur hesaplara ait bilgiler ki?i listelerinizde silinmeyecek, gizlenecektir."</string> 77 <string name="batch_delete_multiple_accounts_confirmation" msgid="5189722181586680185">"Bu ki?iler birden fazla hesaba ait bilgi içeriyor. Salt okunur hesaplara ait bilgiler ki?i listelerinizde silinmeyecek, gizlenecektir."</string>
|
/packages/inputmethods/LatinIME/tests/src/com/android/inputmethod/latin/personalization/ |
UserHistoryDictionaryTestsHelper.java | 121 * @param random salt used for generating random words.
|
/system/bt/stack/smp/ |
smp_keys.c | 1701 BT_OCTET16 salt = { local [all...] |
/system/security/keystore/ |
keystore.cpp | 838 // we read the raw blob to just to get the salt to generate 845 // find salt at EOF if present, otherwise we have an old file 846 uint8_t* salt; local 848 salt = (uint8_t*) &rawBlob + length - SALT_SIZE; 850 salt = NULL; 853 generateKeyFromPassword(passwordKey, MASTER_KEY_SIZE_BYTES, pw, salt); 863 // if salt was missing, generate one and write a new master key file with the salt. 864 if (salt == NULL) { 930 uint8_t* salt) { 941 PKCS5_PBKDF2_HMAC_SHA1(reinterpret_cast<const char*>(pw.string()), pw.length(), salt, local [all...] |
/external/boringssl/src/crypto/evp/ |
p_rsa_asn1.c | 353 BIO_puts(bp, "Salt Length: 0x") <= 0) { 602 /* Could perform more salt length sanity checks but the main
|
/external/boringssl/src/crypto/hkdf/ |
hkdf_test.c | 28 const uint8_t salt[80]; member in struct:__anon4779 224 test->salt, test->salt_len, test->info, test->info_len)) {
|
/external/openssh/openbsd-compat/ |
openbsd-compat.h | 261 char *xcrypt(const char *password, const char *salt);
|