/external/scrypt/lib/crypto/ |
crypto_scrypt.h | 35 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen): 36 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
|
/external/openssh/openbsd-compat/ |
bcrypt_pbkdf.c | 45 * 1. The input password and salt are preprocessed with SHA512. 109 bcrypt_pbkdf(const char *pass, size_t passlen, const u_int8_t *salt, size_t saltlen, 132 memcpy(countsalt, salt, saltlen); 144 /* first round, salt is salt */ 151 /* subsequent rounds, salt is previous output */
|
/external/toybox/lib/ |
password.c | 9 // generate appropriate random salt string for given encryption algorithm. 10 int get_salt(char *salt, char *algo) 20 char *s = salt; 24 // Read appropriate number of random bytes for salt 40 salt[len] = 0; 42 return s-salt;
|
/external/scrypt/tests/ |
scrypt_test.cpp | 33 const char *pw, *salt; member in struct:android::scrypt_test_setting_t 70 crypto_scrypt((const uint8_t*) s.pw, strlen(s.pw), (const uint8_t*) s.salt, 71 strlen(s.salt), s.Nfactor, s.rfactor, s.pfactor, output, sizeof(output)))
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/lib32/ |
libcrypt-2.11.1.so | |
libcrypt.so | |
libcrypt.so.1 | |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/lib32/ |
libcrypt-2.15.so | |
libcrypt.so | |
libcrypt.so.1 | |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
sha256.pem | 74 i:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware 101 3 s:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware 102 i:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
sha256.pem | 74 i:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware 101 3 s:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware 102 i:/C=US/ST=UT/L=Salt Lake City/O=The USERTRUST Network/OU=http://www.usertrust.com/CN=UTN-USERFirst-Hardware
|
/external/libvncserver/x11vnc/ |
enc.h | 150 " use 'noultra:...' to skip steps involving salt and IV to try to be\n" 170 " Also: cipher may be cipher@n,m where n is the salt size and m is the\n" 171 " initialization vector size. E.g. aesv2@8,16 Use n=-1 to disable salt\n" 268 static int noultra = 0; /* manage salt/iv differently from ultradsm */ 269 static int nomd = 0; /* use the keydata directly, no md5 or salt */ 277 /* Size of salt and IV; based on UltraVNC DSM */ 278 #define SALT 16 282 /* Set default values of salt and IV */ 283 static int salt_size = SALT; 374 msrc4_sc = 1; /* no salt/iv workaround * 704 unsigned char salt[SALT+1]; local [all...] |
/external/boringssl/src/crypto/evp/ |
pbkdf.c | 64 const uint8_t *salt, size_t salt_len, unsigned iterations, 96 if (!HMAC_Update(&hctx, salt, salt_len) || 130 const uint8_t *salt, size_t salt_len, 133 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
|
/external/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 107 const uint8_t *salt, size_t salt_len, 143 *p++ = salt[i % salt_len]; 223 uint8_t *salt; local 246 salt = pbe->salt->data; 247 salt_len = pbe->salt->length; 248 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_KEY_ID, 254 if (!pkcs12_key_gen_raw(pass_raw, pass_raw_len, salt, salt_len, PKCS12_IV_ID, 490 int pass_len, uint8_t *salt, size_t salt_len, 507 salt, salt_len, iterations, p8inf) 952 CBS mac, hash_type_seq, hash_oid, salt, expected_mac; local [all...] |
/external/srtp/googlepatches/ |
google-5-buffer-overflow.patch | 12 /* FIX!!! this assumes the salt is at key + 16, and thus that the */
|
/system/vold/ |
Ext4Crypt.cpp | 62 const char* salt = "salt"; member in namespace:__anon70185::tag 89 && props.Set<std::string>(tag::salt, 90 std::string((const char*) crypt_ftr.salt, 127 std::string salt = props.Get<std::string>(tag::salt); local 128 if (salt.size() != SALT_LEN) { 129 SLOGE("Salt wrong length"); 132 memcpy(crypt_ftr.salt, &salt[0], SALT_LEN) [all...] |
cryptfs.h | 23 * The fields after salt are only valid in rev 1.1 and later stuctures. 105 unsigned char salt[SALT_LEN]; /* The salt used for this encryption */ member in struct:crypt_mnt_ftr 214 typedef int (*kdf_func)(const char *passwd, const unsigned char *salt,
|
/external/boringssl/src/include/openssl/ |
pkcs8.h | 77 * If |salt| is NULL, a random salt of |salt_len| bytes is generated. If 78 * |salt_len| is zero, a default salt length is used instead. 88 uint8_t *salt, size_t salt_len, 113 uint8_t *salt, size_t salt_len,
|
/external/openssh/ |
hostfile.c | 73 extract_salt(const char *s, u_int l, u_char *salt, size_t salt_len) 90 debug2("extract_salt: missing salt termination character"); 97 debug2("extract_salt: bad encoded salt length %u", b64len); 104 ret = __b64_pton(b64salt, salt, salt_len); 107 debug2("extract_salt: salt decode error"); 111 debug2("extract_salt: expected salt len %zd, got %d", 123 u_char salt[256], result[256]; local 131 /* Create new salt */ 133 salt[i] = arc4random(); 135 /* Extract salt from known host entry * [all...] |
PROTOCOL.key | 25 string salt
|
/external/srtp/include/ |
rtp.h | 91 unsigned char *input_key /* master key/salt in hex */ 98 unsigned char *input_key /* master key/salt in hex */
|
/external/vboot_reference/scripts/image_signing/sample-test-configs/ |
ensure_secure_kernelparams.config | 28 'vroot none ro,0 1740800 verity payload=%U+1 hashtree=%U+1 hashstart=1740800 alg=sha1 root_hexdigest=MAGIC_HASH salt=MAGIC_SALT'
|
/external/boringssl/src/crypto/cipher/ |
derive_key.c | 70 const uint8_t *salt, const uint8_t *data, size_t data_len, 101 if (salt != NULL) { 102 if (!EVP_DigestUpdate(&c, salt, PKCS5_SALT_LEN)) {
|
/external/srtp/test/ |
dtls_srtp_driver.c | 126 uint8_t salt[SRTP_MAX_KEY_LEN]; local 176 memset(salt, 0xee, salt_len); 177 append_salt_to_key(key, key_len, salt, salt_len);
|