/external/boringssl/src/third_party/wycheproof_testvectors/ |
D | hkdf_sha1_test.txt | 15 salt = 000102030405060708090a0b0c 26 salt = 606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d… 37 salt = 47 salt = 58 salt = 67 salt = 76 salt = 85 salt = 94 salt = 103 salt = [all …]
|
D | hkdf_sha256_test.txt | 15 salt = 000102030405060708090a0b0c 24 salt = 36 salt = 606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d… 46 salt = 55 salt = 64 salt = 73 salt = 82 salt = 91 salt = 100 salt = 41f0f173d307d40436c25856cf559f96 [all …]
|
D | hkdf_sha384_test.txt | 14 salt = 23 salt = 32 salt = 41 salt = 50 salt = 59 salt = 68 salt = 41f0f173d307d40436c25856cf559f96 76 salt = 57a0db708b25a51afc4271803aa35204 84 salt = 0c164c443edcdfaedb1ab150f047951f 92 salt = fea9bfc92b74337e43a201a2dc199e27 [all …]
|
D | hkdf_sha512_test.txt | 14 salt = 23 salt = 32 salt = 41 salt = 50 salt = 59 salt = 68 salt = 41f0f173d307d40436c25856cf559f96 76 salt = 57a0db708b25a51afc4271803aa35204 84 salt = 0c164c443edcdfaedb1ab150f047951f 92 salt = fea9bfc92b74337e43a201a2dc199e27 [all …]
|
/external/openssh/openbsd-compat/ |
D | xcrypt.c | 78 static char salt[32]; in pick_salt() local 80 if (salt[0] != '\0') in pick_salt() 81 return salt; in pick_salt() 82 strlcpy(salt, "xx", sizeof(salt)); in pick_salt() 89 strlcpy(salt, passwd, MIN(typelen, sizeof(salt))); in pick_salt() 96 return salt; in pick_salt() 100 xcrypt(const char *password, const char *salt) in xcrypt() argument 108 if (salt == NULL) in xcrypt() 109 salt = pick_salt(); in xcrypt() 112 if (is_md5_salt(salt)) in xcrypt() [all …]
|
/external/rust/crates/ring/tests/ |
D | pbkdf2_tests.txt | 8 S = "salt" 15 S = "salt" 22 S = "salt" 31 # S = "salt" 56 S = "salt" 63 S = "salt" 70 S = "salt" 90 # OpenSSL::PKCS5.pbkdf2_hmac("1byteboundarytest", "salt", 8, 1, digest).unpack("H*") 93 S = "salt" 101 S = "salt" [all …]
|
/external/e2fsprogs/misc/ |
D | e4crypt.c | 180 struct salt { struct 181 unsigned char *salt; argument 187 struct salt *salt_list; argument 192 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument 195 struct salt *p; in find_by_salt() 199 !memcmp(p->salt, salt, salt_len)) in find_by_salt() 204 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument 206 if (find_by_salt(salt, salt_len)) in add_salt() 210 salt_list = realloc(salt_list, max_salt * sizeof(struct salt)); in add_salt() 216 salt_list[num_salt].salt = salt; in add_salt() [all …]
|
/external/f2fs-tools/tools/ |
D | f2fscrypt.c | 227 struct salt { struct 228 unsigned char *salt; argument 234 struct salt *salt_list; argument 239 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) in find_by_salt() argument 242 struct salt *p; in find_by_salt() 246 !memcmp(p->salt, salt, salt_len)) in find_by_salt() 251 static void add_salt(unsigned char *salt, size_t salt_len) in add_salt() argument 253 if (find_by_salt(salt, salt_len)) in add_salt() 257 salt_list = realloc(salt_list, max_salt * sizeof(struct salt)); in add_salt() 263 salt_list[num_salt].salt = salt; in add_salt() [all …]
|
/external/python/cryptography/tests/hazmat/primitives/ |
D | test_scrypt.py | 53 salt = params["salt"] 56 scrypt = Scrypt(salt, length, work_factor, block_size, 65 salt = b"NaCl" 69 Scrypt(salt, length, work_factor, block_size, 77 salt = 1 80 Scrypt(salt, length, work_factor, block_size, 89 salt = b"NaCl" 91 scrypt = Scrypt(salt, length, work_factor, block_size, 103 salt = b"NaCl" 105 scrypt = Scrypt(salt, length, work_factor, block_size, [all …]
|
D | test_hkdf.py | 33 salt=None, 42 salt=None, 55 salt=None, 68 salt=None, 77 salt=None, 88 salt=None, 101 salt=u"foo", 110 salt=None, 119 salt=None, 130 salt=None, [all …]
|
/external/tensorflow/tensorflow/python/keras/layers/preprocessing/ |
D | hashing.py | 137 def __init__(self, num_bins, mask_value=None, salt=None, name=None, **kwargs): argument 144 self.strong_hash = True if salt is not None else False 145 if salt is not None: 146 if isinstance(salt, (tuple, list)) and len(salt) == 2: 147 self.salt = salt 148 elif isinstance(salt, int): 149 self.salt = [salt, salt] 152 'single integer, given {}'.format(salt)) 154 self.salt = _DEFAULT_SALT_KEY 205 string_ops.string_to_hash_bucket_strong, key=self.salt) [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
D | PKCS12KeyWithParameters.java | 14 private final byte[] salt; field in PKCS12KeyWithParameters 24 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount) in PKCS12KeyWithParameters() argument 28 this.salt = Arrays.clone(salt); in PKCS12KeyWithParameters() 42 …hParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount) in PKCS12KeyWithParameters() argument 46 this.salt = Arrays.clone(salt); in PKCS12KeyWithParameters() 57 return salt; in getSalt()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/ |
D | PKCS12KeyWithParameters.java | 16 private final byte[] salt; field in PKCS12KeyWithParameters 26 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount) in PKCS12KeyWithParameters() argument 30 this.salt = Arrays.clone(salt); in PKCS12KeyWithParameters() 44 …hParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount) in PKCS12KeyWithParameters() argument 48 this.salt = Arrays.clone(salt); in PKCS12KeyWithParameters() 59 return salt; in getSalt()
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jcajce/ |
D | PKCS12KeyWithParameters.java | 16 private final byte[] salt; field in PKCS12KeyWithParameters 26 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount) in PKCS12KeyWithParameters() argument 30 this.salt = Arrays.clone(salt); in PKCS12KeyWithParameters() 44 …hParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount) in PKCS12KeyWithParameters() argument 48 this.salt = Arrays.clone(salt); in PKCS12KeyWithParameters() 59 return salt; in getSalt()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
D | PBEParameter.java | 18 ASN1OctetString salt; field in PBEParameter 21 byte[] salt, in PBEParameter() argument 24 if (salt.length != 8) in PBEParameter() 28 this.salt = new DEROctetString(salt); in PBEParameter() 35 salt = (ASN1OctetString)seq.getObjectAt(0); in PBEParameter() 61 return salt.getOctets(); in getSalt() 68 v.add(salt); in toASN1Primitive()
|
/external/python/cpython3/Lib/test/ |
D | test_crypt.py | 38 salt = crypt.mksalt(method) 39 self.assertIn(len(salt) - method.salt_chars, {0, 1, 3, 4, 6, 7}) 41 self.assertIn(method.ident, salt[:len(salt)-method.salt_chars]) 69 salt = crypt.mksalt(method, rounds=rounds) 70 self.assertIn('$rounds=%d$' % rounds, salt) 71 self.assertEqual(len(salt) - method.salt_chars, 73 cr = crypt.crypt('mypassword', salt) 83 salt = crypt.mksalt(crypt.METHOD_BLOWFISH, rounds=1 << log_rounds) 84 self.assertIn('$%02d$' % log_rounds, salt) 85 self.assertIn(len(salt) - crypt.METHOD_BLOWFISH.salt_chars, {6, 7}) [all …]
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/pkcs/ |
D | PBEParameter.java | 22 ASN1OctetString salt; field in PBEParameter 25 byte[] salt, in PBEParameter() argument 28 if (salt.length != 8) in PBEParameter() 32 this.salt = new DEROctetString(salt); in PBEParameter() 39 salt = (ASN1OctetString)seq.getObjectAt(0); in PBEParameter() 65 return salt.getOctets(); in getSalt() 72 v.add(salt); in toASN1Primitive()
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/asn1/pkcs/ |
D | PBEParameter.java | 22 ASN1OctetString salt; field in PBEParameter 25 byte[] salt, in PBEParameter() argument 28 if (salt.length != 8) in PBEParameter() 32 this.salt = new DEROctetString(salt); in PBEParameter() 39 salt = (ASN1OctetString)seq.getObjectAt(0); in PBEParameter() 65 return salt.getOctets(); in getSalt() 72 v.add(salt); in toASN1Primitive()
|
/external/python/cpython3/Lib/ |
D | crypt.py | 70 def crypt(word, salt=None): argument 80 if salt is None or isinstance(salt, _Method): 81 salt = mksalt(salt) 82 return _crypt.crypt(word, salt) 91 salt = mksalt(method, rounds=rounds) 94 result = crypt('', salt)
|
/external/angle/third_party/abseil-cpp/absl/hash/internal/ |
D | wyhash.cc | 31 const uint64_t salt[]) { in Wyhash() argument 34 uint64_t current_state = seed ^ salt[0]; in Wyhash() 52 uint64_t cs0 = WyhashMix(a ^ salt[1], b ^ current_state); in Wyhash() 53 uint64_t cs1 = WyhashMix(c ^ salt[2], d ^ current_state); in Wyhash() 56 uint64_t ds0 = WyhashMix(e ^ salt[3], f ^ duplicated_state); in Wyhash() 57 uint64_t ds1 = WyhashMix(g ^ salt[4], h ^ duplicated_state); in Wyhash() 73 current_state = WyhashMix(a ^ salt[1], b ^ current_state); in Wyhash() 104 uint64_t w = WyhashMix(a ^ salt[1], b ^ current_state); in Wyhash() 105 uint64_t z = salt[1] ^ starting_length; in Wyhash()
|
/external/libbrillo/brillo/ |
D | cryptohome.cc | 42 static std::string* salt = nullptr; variable 45 if (salt && !salt->empty()) in EnsureSystemSaltIsLoaded() 66 if (!salt) in EnsureSystemSaltIsLoaded() 67 salt = new std::string(); in EnsureSystemSaltIsLoaded() 68 salt->assign(buf.data(), file_size); in EnsureSystemSaltIsLoaded() 82 SHA1_Update(&ctx, salt->data(), salt->size()); in SanitizeUserName() 156 return salt; in GetSystemSalt() 160 salt = value; in SetSystemSalt()
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jcajce/provider/keystore/bc/ |
D | BcKeyStoreSpi.java | 152 byte[] salt = new byte[KEY_SALT_SIZE]; in StoreEntry() 154 random.nextBytes(salt); in StoreEntry() 162 dOut.writeInt(salt.length); in StoreEntry() 163 dOut.write(salt); in StoreEntry() 166 … cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); in StoreEntry() 238 byte[] salt = new byte[dIn.readInt()]; in getObject() 240 dIn.readFully(salt); in getObject() 244 …ipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); in getObject() 257 salt = new byte[dIn.readInt()]; in getObject() 259 dIn.readFully(salt); in getObject() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/ |
D | BcKeyStoreSpi.java | 148 byte[] salt = new byte[KEY_SALT_SIZE]; in StoreEntry() 150 random.nextBytes(salt); in StoreEntry() 158 dOut.writeInt(salt.length); in StoreEntry() 159 dOut.write(salt); in StoreEntry() 162 … cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); in StoreEntry() 234 byte[] salt = new byte[dIn.readInt()]; in getObject() 236 dIn.readFully(salt); in getObject() 240 …ipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); in getObject() 253 salt = new byte[dIn.readInt()]; in getObject() 255 dIn.readFully(salt); in getObject() [all …]
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/keystore/bc/ |
D | BcKeyStoreSpi.java | 152 byte[] salt = new byte[KEY_SALT_SIZE]; in StoreEntry() 154 random.nextBytes(salt); in StoreEntry() 162 dOut.writeInt(salt.length); in StoreEntry() 163 dOut.write(salt); in StoreEntry() 166 … cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); in StoreEntry() 238 byte[] salt = new byte[dIn.readInt()]; in getObject() 240 dIn.readFully(salt); in getObject() 244 …ipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); in getObject() 257 salt = new byte[dIn.readInt()]; in getObject() 259 dIn.readFully(salt); in getObject() [all …]
|
/external/rust/crates/unicode-normalization/src/ |
D | perfect_hash.rs | 16 fn my_hash(key: u32, salt: u32, n: usize) -> usize { in my_hash() 17 let y = key.wrapping_add(salt).wrapping_mul(2654435769); in my_hash() 32 salt: &[u16], in mph_lookup() 43 let s = salt[my_hash(x, 0, salt.len())] as u32; in mph_lookup() 44 let key_val = kv[my_hash(x, s, salt.len())]; in mph_lookup()
|