/external/rust/crates/grpcio-sys/grpc/third_party/abseil-cpp/absl/hash/internal/ |
D | wyhash_test.cc | 24 static const uint64_t kSalt[5] = {0xa0761d6478bd642f, 0xe7037ed1a0b428dbl, variable 34 absl::hash_internal::Wyhash(s.c_str(), s.length(), kCurrentSeed, kSalt), in TEST() 41 absl::hash_internal::Wyhash(s.c_str(), s.length(), kCurrentSeed, kSalt), in TEST() 48 absl::hash_internal::Wyhash(s.c_str(), s.length(), kCurrentSeed, kSalt), in TEST() 57 kCurrentSeed, kSalt), in TEST() 60 kSalt), in TEST() 67 absl::hash_internal::Wyhash(s.c_str(), s.length(), kCurrentSeed, kSalt), in TEST() 80 absl::hash_internal::Wyhash(s.c_str(), s.length(), kCurrentSeed, kSalt), in TEST() 481 expected_result.seed, kSalt), in TEST()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/evp/ |
D | pbkdf_test.cc | 128 static const uint8_t kSalt[] = {1, 2, 3, 4}; in TEST() local 129 const size_t salt_len = sizeof(kSalt); in TEST() 136 ASSERT_TRUE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST() 144 ASSERT_FALSE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
|
D | scrypt_test.cc | 64 static const char kSalt[] = "SodiumChloride"; in TEST() local 69 reinterpret_cast<const uint8_t *>(kSalt), in TEST() 70 strlen(kSalt), 1048576 /* N */, 8 /* r */, in TEST()
|
/external/cronet/third_party/boringssl/src/crypto/evp/ |
D | pbkdf_test.cc | 128 static const uint8_t kSalt[] = {1, 2, 3, 4}; in TEST() local 129 const size_t salt_len = sizeof(kSalt); in TEST() 136 ASSERT_TRUE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST() 144 ASSERT_FALSE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
|
D | scrypt_test.cc | 64 static const char kSalt[] = "SodiumChloride"; in TEST() local 69 reinterpret_cast<const uint8_t *>(kSalt), in TEST() 70 strlen(kSalt), 1048576 /* N */, 8 /* r */, in TEST()
|
/external/boringssl/src/crypto/evp/ |
D | pbkdf_test.cc | 128 static const uint8_t kSalt[] = {1, 2, 3, 4}; in TEST() local 129 const size_t salt_len = sizeof(kSalt); in TEST() 136 ASSERT_TRUE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST() 144 ASSERT_FALSE(PKCS5_PBKDF2_HMAC(kPassword, password_len, kSalt, salt_len, in TEST()
|
D | scrypt_test.cc | 64 static const char kSalt[] = "SodiumChloride"; in TEST() local 69 reinterpret_cast<const uint8_t *>(kSalt), in TEST() 70 strlen(kSalt), 1048576 /* N */, 8 /* r */, in TEST()
|
/external/cronet/third_party/abseil-cpp/absl/hash/internal/ |
D | low_level_hash_test.cc | 27 static const uint64_t kSalt[5] = {0xa0761d6478bd642f, 0xe7037ed1a0b428dbl, variable 511 cases[i].seed, kSalt); in TEST() 526 cases[i].seed, kSalt), in TEST()
|
/external/ukey2/src/main/cpp/src/securegcm/ |
D | d2d_crypto_ops.cc | 42 const uint8_t D2DCryptoOps::kSalt[] = { member in securegcm::D2DCryptoOps 48 const size_t D2DCryptoOps::kSaltLength = sizeof(D2DCryptoOps::kSalt); 135 string(reinterpret_cast<const char *>(kSalt), kSaltLength), in DeriveNewKeyForPurpose()
|
D | d2d_connection_context_v1.cc | 155 ByteBuffer data_to_hash(D2DCryptoOps::kSalt, D2DCryptoOps::kSaltLength); in GetSessionUnique()
|
/external/angle/third_party/abseil-cpp/absl/hash/internal/ |
D | low_level_hash_test.cc | 27 static const uint64_t kSalt[5] = {0xa0761d6478bd642f, 0xe7037ed1a0b428dbl, variable 511 cases[i].seed, kSalt); in TEST() 526 cases[i].seed, kSalt), in TEST()
|
/external/abseil-cpp/absl/hash/internal/ |
D | low_level_hash_test.cc | 27 static const uint64_t kSalt[5] = {0xa0761d6478bd642f, 0xe7037ed1a0b428dbl, variable 559 cases[i].seed, kSalt); in TEST() 574 cases[i].seed, kSalt), in TEST()
|
/external/webrtc/third_party/abseil-cpp/absl/hash/internal/ |
D | low_level_hash_test.cc | 27 static const uint64_t kSalt[5] = {0xa0761d6478bd642f, 0xe7037ed1a0b428dbl, variable 559 cases[i].seed, kSalt); in TEST() 574 cases[i].seed, kSalt), in TEST()
|
/external/tensorflow/third_party/absl/abseil-cpp/absl/hash/internal/ |
D | low_level_hash_test.cc | 27 static const uint64_t kSalt[5] = {0xa0761d6478bd642f, 0xe7037ed1a0b428dbl, variable 559 cases[i].seed, kSalt); in TEST() 574 cases[i].seed, kSalt), in TEST()
|
/external/ukey2/src/main/cpp/include/securegcm/ |
D | d2d_crypto_ops.h | 52 static const uint8_t kSalt[]; variable
|
/external/rust/crates/quiche/deps/boringssl/src/tool/ |
D | speed.cc | 874 static const uint8_t kSalt[] = "NaCl"; in SpeedScrypt() local 878 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt() 879 sizeof(kSalt) - 1, 1024, 8, 16, 0 /* max_mem */, in SpeedScrypt() 889 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt() 890 sizeof(kSalt) - 1, 16384, 8, 1, 0 /* max_mem */, in SpeedScrypt()
|
/external/boringssl/src/tool/ |
D | speed.cc | 880 static const uint8_t kSalt[] = "NaCl"; in SpeedScrypt() local 884 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt() 885 sizeof(kSalt) - 1, 1024, 8, 16, 0 /* max_mem */, in SpeedScrypt() 895 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt() 896 sizeof(kSalt) - 1, 16384, 8, 1, 0 /* max_mem */, in SpeedScrypt()
|
/external/cronet/third_party/boringssl/src/tool/ |
D | speed.cc | 880 static const uint8_t kSalt[] = "NaCl"; in SpeedScrypt() local 884 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt() 885 sizeof(kSalt) - 1, 1024, 8, 16, 0 /* max_mem */, in SpeedScrypt() 895 return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, in SpeedScrypt() 896 sizeof(kSalt) - 1, 16384, 8, 1, 0 /* max_mem */, in SpeedScrypt()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
D | PKCS12KeyStoreSpi.java | 1389 byte[] kSalt = new byte[SALT_SIZE]; in doStore() 1391 random.nextBytes(kSalt); in doStore() 1395 PKCS12PBEParams kParams = new PKCS12PBEParams(kSalt, MIN_ITERATIONS); in doStore()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
D | PKCS12KeyStoreSpi.java | 1393 byte[] kSalt = new byte[SALT_SIZE]; in doStore() 1395 random.nextBytes(kSalt); in doStore() 1399 PKCS12PBEParams kParams = new PKCS12PBEParams(kSalt, MIN_ITERATIONS); in doStore()
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
D | PKCS12KeyStoreSpi.java | 1393 byte[] kSalt = new byte[SALT_SIZE]; in doStore() 1395 random.nextBytes(kSalt); in doStore() 1399 PKCS12PBEParams kParams = new PKCS12PBEParams(kSalt, MIN_ITERATIONS); in doStore()
|