HomeSort by relevance Sort by last modified time
    Searched full:salt (Results 51 - 75 of 262) sorted by null

1 23 4 5 6 7 8 91011

  /external/scrypt/lib/crypto/
crypto_scrypt.h 35 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen):
36 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
  /external/openssh/openbsd-compat/
bcrypt_pbkdf.c 45 * 1. The input password and salt are preprocessed with SHA512.
109 bcrypt_pbkdf(const char *pass, size_t passlen, const u_int8_t *salt, size_t saltlen,
132 memcpy(countsalt, salt, saltlen);
144 /* first round, salt is salt */
151 /* subsequent rounds, salt is previous output */
  /external/toybox/lib/
password.c 9 // generate appropriate random salt string for given encryption algorithm.
10 int get_salt(char *salt, char *algo)
20 char *s = salt;
24 // Read appropriate number of random bytes for salt
40 salt[len] = 0;
42 return s-salt;
  /external/scrypt/tests/
scrypt_test.cpp 33 const char *pw, *salt; member in struct:android::scrypt_test_setting_t
70 crypto_scrypt((const uint8_t*) s.pw, strlen(s.pw), (const uint8_t*) s.salt,
71 strlen(s.salt), s.Nfactor, s.rfactor, s.pfactor, output, sizeof(output)))
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/lib32/
libcrypt-2.11.1.so 
libcrypt.so 
libcrypt.so.1 
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/lib32/
libcrypt-2.15.so 
libcrypt.so 
libcrypt.so.1 
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
sha256.pem 74 i:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
101 3 s:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
102 i:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
sha256.pem 74 i:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
101 3 s:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
102 i:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
  /external/libvncserver/x11vnc/
enc.h 150 " use 'noultra:...' to skip steps involving salt and IV to try to be\n"
170 " Also: cipher may be cipher@n,m where n is the salt size and m is the\n"
171 " initialization vector size. E.g. aesv2@8,16 Use n=-1 to disable salt\n"
268 static int noultra = 0; /* manage salt/iv differently from ultradsm */
269 static int nomd = 0; /* use the keydata directly, no md5 or salt */
277 /* Size of salt and IV; based on UltraVNC DSM */
278 #define SALT 16
282 /* Set default values of salt and IV */
283 static int salt_size = SALT;
374 msrc4_sc = 1; /* no salt/iv workaround *
704 unsigned char salt[SALT+1]; local
    [all...]
  /external/boringssl/src/crypto/evp/
pbkdf.c 64 const uint8_t *salt, size_t salt_len, unsigned iterations,
96 if (!HMAC_Update(&hctx, salt, salt_len) ||
130 const uint8_t *salt, size_t salt_len,
133 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
  /external/boringssl/src/crypto/pkcs8/
pkcs8.c 107 const uint8_t *salt, size_t salt_len,
143 *p++ = salt[i % salt_len];
223 uint8_t *salt; local
246 salt = pbe->salt->data;
247 salt_len = pbe->salt->length;
248 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_KEY_ID,
254 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_IV_ID,
490 int pass_len, uint8_t *salt, size_t salt_len,
507 salt, salt_len, iterations, p8inf)
952 CBS mac, hash_type_seq, hash_oid, salt, expected_mac; local
    [all...]
  /external/srtp/googlepatches/
google-5-buffer-overflow.patch 12 /* FIX!!! this assumes the salt is at key + 16, and thus that the */
  /system/vold/
Ext4Crypt.cpp 62 const char* salt = "salt"; member in namespace:__anon70185::tag
89 && props.Set<std::string>(tag::salt,
90 std::string((const char*) crypt_ftr.salt,
127 std::string salt = props.Get<std::string>(tag::salt); local
128 if (salt.size() != SALT_LEN) {
129 SLOGE("Salt wrong length");
132 memcpy(crypt_ftr.salt, &salt[0], SALT_LEN)
    [all...]
cryptfs.h 23 * The fields after salt are only valid in rev 1.1 and later stuctures.
105 unsigned char salt[SALT_LEN]; /* The salt used for this encryption */ member in struct:crypt_mnt_ftr
214 typedef int (*kdf_func)(const char *passwd, const unsigned char *salt,
  /external/boringssl/src/include/openssl/
pkcs8.h 77 * If |salt| is NULL, a random salt of |salt_len| bytes is generated. If
78 * |salt_len| is zero, a default salt length is used instead.
88 uint8_t *salt, size_t salt_len,
113 uint8_t *salt, size_t salt_len,
  /external/openssh/
hostfile.c 73 extract_salt(const char *s, u_int l, u_char *salt, size_t salt_len)
90 debug2("extract_salt: missing salt termination character");
97 debug2("extract_salt: bad encoded salt length %u", b64len);
104 ret = __b64_pton(b64salt, salt, salt_len);
107 debug2("extract_salt: salt decode error");
111 debug2("extract_salt: expected salt len %zd, got %d",
123 u_char salt[256], result[256]; local
131 /* Create new salt */
133 salt[i] = arc4random();
135 /* Extract salt from known host entry *
    [all...]
PROTOCOL.key 25 string salt
  /external/srtp/include/
rtp.h 91 unsigned char *input_key /* master key/salt in hex */
98 unsigned char *input_key /* master key/salt in hex */
  /external/vboot_reference/scripts/image_signing/sample-test-configs/
ensure_secure_kernelparams.config 28 'vroot none ro,0 1740800 verity payload=%U+1 hashtree=%U+1 hashstart=1740800 alg=sha1 root_hexdigest=MAGIC_HASH salt=MAGIC_SALT'
  /external/boringssl/src/crypto/cipher/
derive_key.c 70 const uint8_t *salt, const uint8_t *data, size_t data_len,
101 if (salt != NULL) {
102 if (!EVP_DigestUpdate(&c, salt, PKCS5_SALT_LEN)) {
  /external/srtp/test/
dtls_srtp_driver.c 126 uint8_t salt[SRTP_MAX_KEY_LEN]; local
176 memset(salt, 0xee, salt_len);
177 append_salt_to_key(key, key_len, salt, salt_len);

Completed in 469 milliseconds

1 23 4 5 6 7 8 91011