Searched defs:salt (Results 1 - 3 of 3) sorted by relevance
/system/vold/ |
H A D | cryptfs.h | 23 * The fields after salt are only valid in rev 1.1 and later stuctures. 79 unsigned char salt[SALT_LEN]; /* The salt used for this encryption */ member in struct:crypt_mnt_ftr 139 typedef void (*kdf_func)(char *passwd, unsigned char *salt, unsigned char *ikey, void *params);
|
H A D | cryptfs.c | 236 /* key or salt can be NULL, in which case just skip writing that value. Useful to 871 static void pbkdf2(char *passwd, unsigned char *salt, unsigned char *ikey, void *params) { argument 873 PKCS5_PBKDF2_HMAC_SHA1(passwd, strlen(passwd), salt, SALT_LEN, 877 static void scrypt(char *passwd, unsigned char *salt, unsigned char *ikey, void *params) { argument 885 crypto_scrypt((unsigned char *) passwd, strlen(passwd), salt, SALT_LEN, N, r, p, ikey, 889 static int encrypt_master_key(char *passwd, unsigned char *salt, argument 900 scrypt(passwd, salt, ikey, crypt_ftr); 928 static int decrypt_master_key_aux(char *passwd, unsigned char *salt, argument 938 kdf(passwd, salt, ikey, kdf_params); 980 ret = decrypt_master_key_aux(passwd, crypt_ftr->salt, crypt_ft 989 create_encrypted_random_key(char *passwd, unsigned char *master_key, unsigned char *salt, struct crypt_mnt_ftr *crypt_ftr) argument [all...] |
/system/security/keystore/ |
H A D | keystore.cpp | 710 // we read the raw blob to just to get the salt to generate 717 // find salt at EOF if present, otherwise we have an old file 718 uint8_t* salt; local 720 salt = (uint8_t*) &rawBlob + length - SALT_SIZE; 722 salt = NULL; 725 generateKeyFromPassword(passwordKey, MASTER_KEY_SIZE_BYTES, pw, salt); 735 // if salt was missing, generate one and write a new master key file with the salt. 736 if (salt == NULL) { 815 uint8_t* salt) { 814 generateKeyFromPassword(uint8_t* key, ssize_t keySize, const android::String8& pw, uint8_t* salt) argument 826 PKCS5_PBKDF2_HMAC_SHA1(reinterpret_cast<const char*>(pw.string()), pw.length(), salt, local [all...] |
Completed in 137 milliseconds