Home
last modified time | relevance | path

Searched refs:kSalt (Results 1 – 13 of 13) sorted by relevance

/external/angle/third_party/abseil-cpp/absl/hash/internal/
Dwyhash_test.cc24 static const uint64_t kSalt[5] = {0xa0761d6478bd642f, 0xe7037ed1a0b428dbl, variable
34 absl::hash_internal::Wyhash(s.c_str(), s.length(), kCurrentSeed, kSalt), in TEST()
41 absl::hash_internal::Wyhash(s.c_str(), s.length(), kCurrentSeed, kSalt), in TEST()
48 absl::hash_internal::Wyhash(s.c_str(), s.length(), kCurrentSeed, kSalt), in TEST()
57 kCurrentSeed, kSalt), in TEST()
60 kSalt), in TEST()
67 absl::hash_internal::Wyhash(s.c_str(), s.length(), kCurrentSeed, kSalt), in TEST()
80 absl::hash_internal::Wyhash(s.c_str(), s.length(), kCurrentSeed, kSalt), in TEST()
481 expected_result.seed, kSalt), in TEST()
/external/rust/crates/quiche/deps/boringssl/src/crypto/evp/
Dpbkdf_test.cc128 static const uint8_t kSalt[] = {1, 2, 3, 4}; in TEST() local
129 const size_t salt_len = sizeof(kSalt); in TEST()
136 ASSERT_TRUE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
144 ASSERT_FALSE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
Dscrypt_test.cc64 static const char kSalt[] = "SodiumChloride"; in TEST() local
69 reinterpret_cast<const uint8_t *>(kSalt), in TEST()
70 strlen(kSalt), 1048576 /* N */, 8 /* r */, in TEST()
/external/boringssl/src/crypto/evp/
Dpbkdf_test.cc128 static const uint8_t kSalt[] = {1, 2, 3, 4}; in TEST() local
129 const size_t salt_len = sizeof(kSalt); in TEST()
136 ASSERT_TRUE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
144 ASSERT_FALSE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
Dscrypt_test.cc64 static const char kSalt[] = "SodiumChloride"; in TEST() local
69 reinterpret_cast<const uint8_t *>(kSalt), in TEST()
70 strlen(kSalt), 1048576 /* N */, 8 /* r */, in TEST()
/external/ukey2/src/main/cpp/src/securegcm/
Dd2d_crypto_ops.cc42 const uint8_t D2DCryptoOps::kSalt[] = { member in securegcm::D2DCryptoOps
48 const size_t D2DCryptoOps::kSaltLength = sizeof(D2DCryptoOps::kSalt);
135 string(reinterpret_cast<const char *>(kSalt), kSaltLength), in DeriveNewKeyForPurpose()
Dd2d_connection_context_v1.cc155 ByteBuffer data_to_hash(D2DCryptoOps::kSalt, D2DCryptoOps::kSaltLength); in GetSessionUnique()
/external/ukey2/src/main/cpp/include/securegcm/
Dd2d_crypto_ops.h52 static const uint8_t kSalt[]; variable
/external/boringssl/src/tool/
Dspeed.cc866 static const uint8_t kSalt[] = "NaCl"; in SpeedScrypt() local
870 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt()
871 sizeof(kSalt) - 1, 1024, 8, 16, 0 /* max_mem */, in SpeedScrypt()
881 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt()
882 sizeof(kSalt) - 1, 16384, 8, 1, 0 /* max_mem */, in SpeedScrypt()
/external/rust/crates/quiche/deps/boringssl/src/tool/
Dspeed.cc865 static const uint8_t kSalt[] = "NaCl"; in SpeedScrypt() local
869 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt()
870 sizeof(kSalt) - 1, 1024, 8, 16, 0 /* max_mem */, in SpeedScrypt()
880 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt()
881 sizeof(kSalt) - 1, 16384, 8, 1, 0 /* max_mem */, in SpeedScrypt()
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jcajce/provider/keystore/pkcs12/
DPKCS12KeyStoreSpi.java1386 byte[] kSalt = new byte[SALT_SIZE]; in doStore()
1388 random.nextBytes(kSalt); in doStore()
1392 PKCS12PBEParams kParams = new PKCS12PBEParams(kSalt, MIN_ITERATIONS); in doStore()
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/keystore/pkcs12/
DPKCS12KeyStoreSpi.java1386 byte[] kSalt = new byte[SALT_SIZE]; in doStore()
1388 random.nextBytes(kSalt); in doStore()
1392 PKCS12PBEParams kParams = new PKCS12PBEParams(kSalt, MIN_ITERATIONS); in doStore()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/
DPKCS12KeyStoreSpi.java1382 byte[] kSalt = new byte[SALT_SIZE]; in doStore()
1384 random.nextBytes(kSalt); in doStore()
1388 PKCS12PBEParams kParams = new PKCS12PBEParams(kSalt, MIN_ITERATIONS); in doStore()