/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/identity/ |
H A D | UniqueIdentificationGenerator.java | 19 * @param salt the salt to use for the unique ID. 22 String getUniqueId(@Nullable String salt); argument
|
H A D | SettingsSecureBasedIdentificationGenerator.java | 31 public String getUniqueId(@Nullable String salt) { argument 38 new HashUtil.Params(androidId).withSalt(salt));
|
H A D | UuidBasedUniqueIdentificationGenerator.java | 31 public String getUniqueId(@Nullable String salt) { argument
|
/external/openssh/openbsd-compat/ |
H A D | xcrypt.c | 61 xcrypt(const char *password, const char *salt) argument 66 if (is_md5_salt(salt)) 67 crypted = md5_crypt(password, salt); 69 crypted = crypt(password, salt); 72 crypted = bigcrypt(password, salt); 74 crypted = crypt(password, salt); 76 crypted = bigcrypt(password, salt); 78 crypted = crypt(password, salt);
|
H A D | port-uw.c | 56 char *salt; local 66 /* Encrypt the candidate password using the proper salt. */ 67 salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx"; 75 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0) 76 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0)); 80 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
H A D | MacData.java | 21 byte[] salt; field in class:MacData 44 this.salt = ((ASN1OctetString)seq.getObjectAt(1)).getOctets(); 58 byte[] salt, 62 this.salt = salt; 73 return salt; 97 v.add(new DEROctetString(salt)); 56 MacData( DigestInfo digInfo, byte[] salt, int iterationCount) argument
|
H A D | PBEParameter.java | 18 ASN1OctetString salt; field in class:PBEParameter 21 byte[] salt, 24 if (salt.length != 8) 26 throw new IllegalArgumentException("salt length must be 8"); 28 this.salt = new DEROctetString(salt); 35 salt = (ASN1OctetString)seq.getObjectAt(0); 61 return salt.getOctets(); 68 v.add(salt); 20 PBEParameter( byte[] salt, int iterations) argument
|
H A D | PBKDF2Params.java | 39 byte[] salt, 42 this.octStr = new DEROctetString(salt); 47 byte[] salt, 51 this(salt, iterationCount); 38 PBKDF2Params( byte[] salt, int iterationCount) argument 46 PBKDF2Params( byte[] salt, int iterationCount, int keyLength) argument
|
H A D | PKCS12PBEParams.java | 21 byte[] salt, 24 this.iv = new DEROctetString(salt); 20 PKCS12PBEParams( byte[] salt, int iterations) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
H A D | OpenSSLPBEParametersGenerator.java | 37 * @param salt salt to use. 41 byte[] salt) 43 super.init(password, salt, 1); 47 * the derived key function, the ith hash of the password and the salt. 59 digest.update(salt, 0, salt.length); 83 * Generate a key parameter derived from the password, salt, and iteration 102 * the password, salt, and iteration count we are currently initialised 124 * salt, an 39 init( byte[] password, byte[] salt) argument [all...] |
/external/chromium/chrome/common/ |
H A D | visitedlink_common.cc | 79 const uint8 salt[LINK_SALT_LENGTH]) { 84 MD5Update(&ctx, salt, sizeof(salt)); 76 ComputeURLFingerprint( const char* canonical_url, size_t url_len, const uint8 salt[LINK_SALT_LENGTH]) argument
|
/external/chromium/crypto/ |
H A D | symmetric_key_openssl.cc | 45 const std::string& salt, 57 reinterpret_cast<const uint8*>(salt.data()), 58 salt.length(), iterations, 43 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
|
H A D | symmetric_key_unittest.cc | 71 const char* salt; member in struct:PBKDF2TestVector 84 // The OS X crypto libraries have minimum salt and iteration requirements 86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) { 95 test_data.password, test_data.salt, 113 "salt", 121 "salt", 129 "salt", 139 "salt",
|
/external/chromium_org/chrome/android/javatests/src/org/chromium/chrome/browser/identity/ |
H A D | UniqueIdentificationGeneratorFactoryTest.java | 55 public String getUniqueId(@Nullable String salt) { argument
|
/external/chromium_org/chrome/browser/media/ |
H A D | media_device_id_salt.cc | 18 std::string salt; local 19 base::Base64Encode(base::RandBytesAsString(16), &salt); 20 DCHECK(!salt.empty()); 21 return salt;
|
/external/chromium_org/content/public/browser/ |
H A D | media_device_id.cc | 21 std::string salt = sc.Run(); local 23 hmac.Sign(raw_unique_id + salt, &digest[0], digest.size());
|
/external/chromium_org/crypto/ |
H A D | symmetric_key_openssl.cc | 45 const std::string& salt, 60 reinterpret_cast<const uint8*>(salt.data()), 61 salt.length(), iterations, 43 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
|
H A D | symmetric_key_unittest.cc | 71 const char* salt; member in struct:PBKDF2TestVector 84 // The OS X crypto libraries have minimum salt and iteration requirements 86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) { 95 test_data.password, test_data.salt, 113 "salt", 121 "salt", 129 "salt", 139 "salt",
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local 82 salt = p12->mac->salt->data; 83 saltlen = p12->mac->salt->length; 94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument 171 p12->mac->salt->length = saltlen; 172 if (!(p12->mac->salt 132 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument [all...] |
H A D | p12_p8e.c | 65 unsigned char *salt, int saltlen, int iter, 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); 63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
|
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
H A D | pkcs_5_1.c | 22 @param salt The salt (or nonce) which is 8 octets long 30 const unsigned char *salt, 40 LTC_ARGCHK(salt != NULL); 62 /* hash initial password + salt */ 69 if ((err = hash_descriptor[hash_idx].process(md, salt, 8)) != CRYPT_OK) { 29 pkcs_5_alg1(const unsigned char *password, unsigned long password_len, const unsigned char *salt, int iteration_count, int hash_idx, unsigned char *out, unsigned long *outlen) argument
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local 82 salt = p12->mac->salt->data; 83 saltlen = p12->mac->salt->length; 94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument 171 p12->mac->salt->length = saltlen; 172 if (!(p12->mac->salt 132 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument [all...] |
H A D | p12_p8e.c | 65 unsigned char *salt, int saltlen, int iter, 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); 63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
|
/external/scrypt/tests/ |
H A D | scrypt_test.cpp | 33 const char *pw, *salt; member in struct:android::scrypt_test_setting_t 70 crypto_scrypt((const uint8_t*) s.pw, strlen(s.pw), (const uint8_t*) s.salt, 71 strlen(s.salt), s.Nfactor, s.rfactor, s.pfactor, output, sizeof(output)))
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
H A D | PBEParametersGenerator.java | 11 protected byte[] salt; field in class:PBEParametersGenerator 25 * @param salt the salt to be mixed with the password. 31 byte[] salt, 35 this.salt = salt; 50 * return the salt byte array. 52 * @return the salt byte array. 56 return salt; 29 init( byte[] password, byte[] salt, int iterationCount) argument
|