Searched defs:salt (Results 1 - 3 of 3) sorted by relevance

/system/vold/
H A Dcryptfs.h23 * The fields after salt are only valid in rev 1.1 and later stuctures.
79 unsigned char salt[SALT_LEN]; /* The salt used for this encryption */ member in struct:crypt_mnt_ftr
139 typedef void (*kdf_func)(char *passwd, unsigned char *salt, unsigned char *ikey, void *params);
H A Dcryptfs.c236 /* key or salt can be NULL, in which case just skip writing that value. Useful to
871 static void pbkdf2(char *passwd, unsigned char *salt, unsigned char *ikey, void *params) { argument
873 PKCS5_PBKDF2_HMAC_SHA1(passwd, strlen(passwd), salt, SALT_LEN,
877 static void scrypt(char *passwd, unsigned char *salt, unsigned char *ikey, void *params) { argument
885 crypto_scrypt((unsigned char *) passwd, strlen(passwd), salt, SALT_LEN, N, r, p, ikey,
889 static int encrypt_master_key(char *passwd, unsigned char *salt, argument
900 scrypt(passwd, salt, ikey, crypt_ftr);
928 static int decrypt_master_key_aux(char *passwd, unsigned char *salt, argument
938 kdf(passwd, salt, ikey, kdf_params);
980 ret = decrypt_master_key_aux(passwd, crypt_ftr->salt, crypt_ft
989 create_encrypted_random_key(char *passwd, unsigned char *master_key, unsigned char *salt, struct crypt_mnt_ftr *crypt_ftr) argument
[all...]
/system/security/keystore/
H A Dkeystore.cpp710 // we read the raw blob to just to get the salt to generate
717 // find salt at EOF if present, otherwise we have an old file
718 uint8_t* salt; local
720 salt = (uint8_t*) &rawBlob + length - SALT_SIZE;
722 salt = NULL;
725 generateKeyFromPassword(passwordKey, MASTER_KEY_SIZE_BYTES, pw, salt);
735 // if salt was missing, generate one and write a new master key file with the salt.
736 if (salt == NULL) {
815 uint8_t* salt) {
814 generateKeyFromPassword(uint8_t* key, ssize_t keySize, const android::String8& pw, uint8_t* salt) argument
826 PKCS5_PBKDF2_HMAC_SHA1(reinterpret_cast<const char*>(pw.string()), pw.length(), salt, local
[all...]

Completed in 137 milliseconds