HomeSort by relevance Sort by last modified time
    Searched full:scrypt (Results 26 - 50 of 58) sorted by null

12 3

  /frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
KeySyncTaskTest.java 312 verify(mMockScrypt).scrypt(eq(password.getBytes()), any(),
349 verify(mMockScrypt, never()).scrypt(any(), any(), anyInt(), anyInt(), anyInt(), anyInt());
383 verify(mMockScrypt).scrypt(eq(shortPassword.getBytes()), any(),
435 verify(mMockScrypt, never()).scrypt(any(), any(), anyInt(), anyInt(), anyInt(), anyInt());
458 verify(mMockScrypt, never()).scrypt(any(), any(), anyInt(), anyInt(), anyInt(), anyInt());
636 verify(mMockScrypt).scrypt(eq(password.getBytes()), any(),
669 verify(mMockScrypt).scrypt(eq(pin.getBytes()), any(),
    [all...]
  /system/vold/
cryptfs.h 126 /* scrypt parameters. See www.tarsnap.com/scrypt/scrypt.pdf */
144 /* Store scrypt of salted intermediate key. When decryption fails, we can
Keymaster.h 130 * needed by cryptfs scrypt. The compatibility check checks whether
KeyStorage.cpp 70 static const std::string kStretchPrefix_scrypt = "scrypt ";
310 LOG(ERROR) << "Unable to parse scrypt params in stretching: " << stretching;
318 LOG(ERROR) << "scrypt failed with params: " << stretching;
cryptfs.cpp 382 * Gets the default device scrypt parameters for key derivation time tuning.
392 SLOGW("bad scrypt parameters '%s' should be like '12:8:1'; using defaults", paramstr);
1191 static int scrypt(const char *passwd, const unsigned char *salt, function
    [all...]
  /external/scrypt/tests/
scrypt_test.cpp 71 << "scrypt call should succeed for " << i << "; error=" << strerror(errno);
  /frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
MockSyntheticPasswordManager.java 96 protected byte[] scrypt(String password, byte[] salt, int N, int r, int p, int outLen) { method in class:MockSyntheticPasswordManager
  /external/python/cpython3/Lib/
hashlib.py 233 # OpenSSL's scrypt requires OpenSSL 1.1+
234 from _hashlib import scrypt
  /external/boringssl/src/tool/
speed.cc 595 if (!selected.empty() && selected.find("scrypt") == std::string::npos) {
610 fprintf(stderr, "scrypt failed.\n");
613 results.Print("scrypt (N = 1024, r = 8, p = 16)");
621 fprintf(stderr, "scrypt failed.\n");
624 results.Print("scrypt (N = 16384, r = 8, p = 1)");
  /compatibility/cdd/9_security-model/
9_9_full-disk-encryption.md 94 (e.g. PBKDF2 or scrypt).
  /device/generic/goldfish/gatekeeper/
SoftGateKeeper.h 46 // scrypt params
  /device/google/cuttlefish_common/guest/hals/gatekeeper/
SoftGateKeeper.h 46 // scrypt params
  /system/core/gatekeeperd/
SoftGateKeeper.h 46 // scrypt params
  /external/scrypt/lib/crypto/
crypto_scrypt-neon.c 184 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
crypto_scrypt-ref.c 212 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
crypto_scrypt-sse.c 258 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
  /external/python/cpython3/Modules/
_hashopenssl.c 726 _hashlib.scrypt
738 scrypt password-based key derivation function.
  /external/boringssl/
eureka.mk 113 src/crypto/evp/scrypt.c\
sources.bp 115 "src/crypto/evp/scrypt.c",
sources.mk 113 src/crypto/evp/scrypt.c\
  /external/scrypt/patches/
arm_neon.patch 316 + * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
  /external/python/cpython3/Doc/library/
hashlib.rst 260 .. function:: scrypt(password, *, salt, n, r, p, maxmem=0, dklen=64)
262 The function provides scrypt password-based key derivation function as
  /frameworks/base/services/core/java/com/android/server/locksettings/
SyntheticPasswordManager.java 1151 protected byte[] scrypt(String password, byte[] salt, int N, int r, int p, int outLen) { method in class:SyntheticPasswordManager
    [all...]
  /device/google/marlin/
device-common.mk 588 #Reduce cost of scrypt for FBE CE decryption
  /external/boringssl/src/include/openssl/
evp.h 433 // scrypt, as described in RFC 7914, and writes the result to |out_key|. It
    [all...]

Completed in 1284 milliseconds

12 3