Home
last modified time | relevance | path

Searched refs:kSalt (Results 1 – 21 of 21) sorted by relevance

/external/rust/crates/grpcio-sys/grpc/third_party/abseil-cpp/absl/hash/internal/
Dwyhash_test.cc24 static const uint64_t kSalt[5] = {0xa0761d6478bd642f, 0xe7037ed1a0b428dbl, variable
34 absl::hash_internal::Wyhash(s.c_str(), s.length(), kCurrentSeed, kSalt), in TEST()
41 absl::hash_internal::Wyhash(s.c_str(), s.length(), kCurrentSeed, kSalt), in TEST()
48 absl::hash_internal::Wyhash(s.c_str(), s.length(), kCurrentSeed, kSalt), in TEST()
57 kCurrentSeed, kSalt), in TEST()
60 kSalt), in TEST()
67 absl::hash_internal::Wyhash(s.c_str(), s.length(), kCurrentSeed, kSalt), in TEST()
80 absl::hash_internal::Wyhash(s.c_str(), s.length(), kCurrentSeed, kSalt), in TEST()
481 expected_result.seed, kSalt), in TEST()
/external/rust/crates/quiche/deps/boringssl/src/crypto/evp/
Dpbkdf_test.cc128 static const uint8_t kSalt[] = {1, 2, 3, 4}; in TEST() local
129 const size_t salt_len = sizeof(kSalt); in TEST()
136 ASSERT_TRUE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
144 ASSERT_FALSE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
Dscrypt_test.cc64 static const char kSalt[] = "SodiumChloride"; in TEST() local
69 reinterpret_cast<const uint8_t *>(kSalt), in TEST()
70 strlen(kSalt), 1048576 /* N */, 8 /* r */, in TEST()
/external/cronet/third_party/boringssl/src/crypto/evp/
Dpbkdf_test.cc128 static const uint8_t kSalt[] = {1, 2, 3, 4}; in TEST() local
129 const size_t salt_len = sizeof(kSalt); in TEST()
136 ASSERT_TRUE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
144 ASSERT_FALSE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
Dscrypt_test.cc64 static const char kSalt[] = "SodiumChloride"; in TEST() local
69 reinterpret_cast<const uint8_t *>(kSalt), in TEST()
70 strlen(kSalt), 1048576 /* N */, 8 /* r */, in TEST()
/external/boringssl/src/crypto/evp/
Dpbkdf_test.cc128 static const uint8_t kSalt[] = {1, 2, 3, 4}; in TEST() local
129 const size_t salt_len = sizeof(kSalt); in TEST()
136 ASSERT_TRUE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
144 ASSERT_FALSE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
Dscrypt_test.cc64 static const char kSalt[] = "SodiumChloride"; in TEST() local
69 reinterpret_cast<const uint8_t *>(kSalt), in TEST()
70 strlen(kSalt), 1048576 /* N */, 8 /* r */, in TEST()
/external/cronet/third_party/abseil-cpp/absl/hash/internal/
Dlow_level_hash_test.cc27 static const uint64_t kSalt[5] = {0xa0761d6478bd642f, 0xe7037ed1a0b428dbl, variable
511 cases[i].seed, kSalt); in TEST()
526 cases[i].seed, kSalt), in TEST()
/external/ukey2/src/main/cpp/src/securegcm/
Dd2d_crypto_ops.cc42 const uint8_t D2DCryptoOps::kSalt[] = { member in securegcm::D2DCryptoOps
48 const size_t D2DCryptoOps::kSaltLength = sizeof(D2DCryptoOps::kSalt);
135 string(reinterpret_cast<const char *>(kSalt), kSaltLength), in DeriveNewKeyForPurpose()
Dd2d_connection_context_v1.cc155 ByteBuffer data_to_hash(D2DCryptoOps::kSalt, D2DCryptoOps::kSaltLength); in GetSessionUnique()
/external/angle/third_party/abseil-cpp/absl/hash/internal/
Dlow_level_hash_test.cc27 static const uint64_t kSalt[5] = {0xa0761d6478bd642f, 0xe7037ed1a0b428dbl, variable
511 cases[i].seed, kSalt); in TEST()
526 cases[i].seed, kSalt), in TEST()
/external/abseil-cpp/absl/hash/internal/
Dlow_level_hash_test.cc27 static const uint64_t kSalt[5] = {0xa0761d6478bd642f, 0xe7037ed1a0b428dbl, variable
559 cases[i].seed, kSalt); in TEST()
574 cases[i].seed, kSalt), in TEST()
/external/webrtc/third_party/abseil-cpp/absl/hash/internal/
Dlow_level_hash_test.cc27 static const uint64_t kSalt[5] = {0xa0761d6478bd642f, 0xe7037ed1a0b428dbl, variable
559 cases[i].seed, kSalt); in TEST()
574 cases[i].seed, kSalt), in TEST()
/external/tensorflow/third_party/absl/abseil-cpp/absl/hash/internal/
Dlow_level_hash_test.cc27 static const uint64_t kSalt[5] = {0xa0761d6478bd642f, 0xe7037ed1a0b428dbl, variable
559 cases[i].seed, kSalt); in TEST()
574 cases[i].seed, kSalt), in TEST()
/external/ukey2/src/main/cpp/include/securegcm/
Dd2d_crypto_ops.h52 static const uint8_t kSalt[]; variable
/external/rust/crates/quiche/deps/boringssl/src/tool/
Dspeed.cc874 static const uint8_t kSalt[] = "NaCl"; in SpeedScrypt() local
878 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt()
879 sizeof(kSalt) - 1, 1024, 8, 16, 0 /* max_mem */, in SpeedScrypt()
889 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt()
890 sizeof(kSalt) - 1, 16384, 8, 1, 0 /* max_mem */, in SpeedScrypt()
/external/boringssl/src/tool/
Dspeed.cc880 static const uint8_t kSalt[] = "NaCl"; in SpeedScrypt() local
884 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt()
885 sizeof(kSalt) - 1, 1024, 8, 16, 0 /* max_mem */, in SpeedScrypt()
895 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt()
896 sizeof(kSalt) - 1, 16384, 8, 1, 0 /* max_mem */, in SpeedScrypt()
/external/cronet/third_party/boringssl/src/tool/
Dspeed.cc880 static const uint8_t kSalt[] = "NaCl"; in SpeedScrypt() local
884 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt()
885 sizeof(kSalt) - 1, 1024, 8, 16, 0 /* max_mem */, in SpeedScrypt()
895 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt()
896 sizeof(kSalt) - 1, 16384, 8, 1, 0 /* max_mem */, in SpeedScrypt()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/
DPKCS12KeyStoreSpi.java1389 byte[] kSalt = new byte[SALT_SIZE]; in doStore()
1391 random.nextBytes(kSalt); in doStore()
1395 PKCS12PBEParams kParams = new PKCS12PBEParams(kSalt, MIN_ITERATIONS); in doStore()
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/keystore/pkcs12/
DPKCS12KeyStoreSpi.java1393 byte[] kSalt = new byte[SALT_SIZE]; in doStore()
1395 random.nextBytes(kSalt); in doStore()
1399 PKCS12PBEParams kParams = new PKCS12PBEParams(kSalt, MIN_ITERATIONS); in doStore()
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jcajce/provider/keystore/pkcs12/
DPKCS12KeyStoreSpi.java1393 byte[] kSalt = new byte[SALT_SIZE]; in doStore()
1395 random.nextBytes(kSalt); in doStore()
1399 PKCS12PBEParams kParams = new PKCS12PBEParams(kSalt, MIN_ITERATIONS); in doStore()