/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKCS12KeyWithParameters.java | 14 private final byte[] salt; field in class:PKCS12KeyWithParameters 21 * @param salt salt for generation algorithm 24 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount) 28 this.salt = Arrays.clone(salt); 38 * @param salt salt for generation algorithm 42 public PKCS12KeyWithParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount) 46 this.salt = Arrays.clone(salt) [all...] |
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/ |
PKCS12KeyWithParameters.java | 16 private final byte[] salt; field in class:PKCS12KeyWithParameters 23 * @param salt salt for generation algorithm 26 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount) 30 this.salt = Arrays.clone(salt); 40 * @param salt salt for generation algorithm 44 public PKCS12KeyWithParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount) 48 this.salt = Arrays.clone(salt) [all...] |
/external/python/cpython3/Modules/clinic/ |
_cryptmodule.c.h | 6 "crypt($module, word, salt, /)\n" 9 "Hash a *word* with the given *salt* and return the hashed password.\n" 11 "*word* will usually be a user\'s password. *salt* (either a random 2 or 16\n" 20 crypt_crypt_impl(PyObject *module, const char *word, const char *salt); 27 const char *salt; local 30 &word, &salt)) { 33 return_value = crypt_crypt_impl(module, word, salt);
|
/external/openssh/openbsd-compat/ |
xcrypt.c | 67 * Pick an appropriate password encryption type and salt for the running 69 * salt. Usually this will be root unless the root account is locked out. 70 * If we don't find one we return a traditional DES-based salt. 78 static char salt[32]; local 80 if (salt[0] != '\0') 81 return salt; 82 strlcpy(salt, "xx", sizeof(salt)); 88 strlcpy(salt, passwd, MIN(typelen, sizeof(salt))); [all...] |
port-uw.c | 57 char *salt; local 67 /* Encrypt the candidate password using the proper salt. */ 68 salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx"; 76 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0) 77 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0)); 81 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/ |
cryptmodule.c | 17 char *word, *salt;
local 22 if (!PyArg_ParseTuple(args, "ss:crypt", &word, &salt)) {
26 salt. Return None in that case. XXX Maybe raise an exception? */
27 return Py_BuildValue("s", crypt(word, salt));
32 "crypt(word, salt) -> string\n\
33 word will usually be a user's password. salt is a 2-character string\n\
35 in salt must be either \".\", \"/\", or an alphanumeric character. Returns\n\
37 the same alphabet as the salt.");
|
/external/python/cpython2/Modules/ |
cryptmodule.c | 17 char *word, *salt; local 22 if (!PyArg_ParseTuple(args, "ss:crypt", &word, &salt)) { 26 salt. Return None in that case. XXX Maybe raise an exception? */ 27 return Py_BuildValue("s", crypt(word, salt)); 32 "crypt(word, salt) -> string\n\ 33 word will usually be a user's password. salt is a 2-character string\n\ 35 in salt must be either \".\", \"/\", or an alphanumeric character. Returns\n\ 37 the same alphabet as the salt.");
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
PBEParameter.java | 18 ASN1OctetString salt; field in class:PBEParameter 21 byte[] salt, 24 if (salt.length != 8) 26 throw new IllegalArgumentException("salt length must be 8"); 28 this.salt = new DEROctetString(salt); 35 salt = (ASN1OctetString)seq.getObjectAt(0); 61 return salt.getOctets(); 68 v.add(salt);
|
MacData.java | 22 byte[] salt; field in class:MacData 45 this.salt = Arrays.clone(ASN1OctetString.getInstance(seq.getObjectAt(1)).getOctets()); 59 byte[] salt, 63 this.salt = Arrays.clone(salt); 74 return Arrays.clone(salt); 98 v.add(new DEROctetString(salt));
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/pkcs/ |
PBEParameter.java | 22 ASN1OctetString salt; field in class:PBEParameter 25 byte[] salt, 28 if (salt.length != 8) 30 throw new IllegalArgumentException("salt length must be 8"); 32 this.salt = new DEROctetString(salt); 39 salt = (ASN1OctetString)seq.getObjectAt(0); 65 return salt.getOctets(); 72 v.add(salt);
|
MacData.java | 26 byte[] salt; field in class:MacData 49 this.salt = Arrays.clone(ASN1OctetString.getInstance(seq.getObjectAt(1)).getOctets()); 63 byte[] salt, 67 this.salt = Arrays.clone(salt); 78 return Arrays.clone(salt); 102 v.add(new DEROctetString(salt));
|
/external/tensorflow/tensorflow/contrib/distributions/python/kernel_tests/ |
seed_stream_test.py | 34 strm = seed_stream.SeedStream(seed=4, salt="salt") 39 strm1 = seed_stream.SeedStream(seed=4, salt="salt") 40 strm2 = seed_stream.SeedStream(seed=4, salt="salt") 41 strm3 = seed_stream.SeedStream(seed=4, salt="salt") 47 strm1 = seed_stream.SeedStream(seed=4, salt="salt") [all...] |
/external/python/cpython3/Modules/ |
_cryptmodule.c | 21 salt: str 24 Hash a *word* with the given *salt* and return the hashed password. 26 *word* will usually be a user's password. *salt* (either a random 2 or 16 34 crypt_crypt_impl(PyObject *module, const char *word, const char *salt) 41 crypt_result = crypt_r(word, salt, &data); 43 crypt_result = crypt(word, salt);
|
/device/generic/goldfish/gatekeeper/ |
SoftGateKeeper.h | 38 uint64_t salt; member in struct:gatekeeper::fast_hash_t 83 uint32_t password_length, salt_t salt) const { 85 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt), 86 sizeof(salt), N, r, p, signature, signature_length); 136 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) { 138 size_t digest_size = password.length + sizeof(salt); 140 memcpy(digest.get(), &salt, sizeof(salt)); 141 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length); 145 fast_hash.salt = salt 161 uint64_t salt; local [all...] |
/device/google/cuttlefish_common/guest/hals/gatekeeper/ |
SoftGateKeeper.h | 38 uint64_t salt; member in struct:gatekeeper::fast_hash_t 83 uint32_t password_length, salt_t salt) const { 85 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt), 86 sizeof(salt), N, r, p, signature, signature_length); 136 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) { 138 size_t digest_size = password.length + sizeof(salt); 140 memcpy(digest.get(), &salt, sizeof(salt)); 141 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length); 145 fast_hash.salt = salt 161 uint64_t salt; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
PBEParametersGenerator.java | 11 protected byte[] salt; field in class:PBEParametersGenerator 25 * @param salt the salt to be mixed with the password. 31 byte[] salt, 35 this.salt = salt; 50 * return the salt byte array. 52 * @return the salt byte array. 56 return salt;
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/crypto/ |
PBEParametersGenerator.java | 14 protected byte[] salt; field in class:PBEParametersGenerator 29 * @param salt the salt to be mixed with the password. 35 byte[] salt, 39 this.salt = salt; 54 * return the salt byte array. 56 * @return the salt byte array. 60 return salt;
|
/external/toybox/toys/other/ |
mkpasswd.c | 1 /* mkpasswd.c - encrypt the given passwd using salt 15 usage: mkpasswd [-P FD] [-m TYPE] [-S SALT] [PASSWORD] [SALT] 21 -S SALT 34 char salt[MAX_SALT_LEN] = {0,}; local 39 if (TT.S) error_exit("duplicate salt"); 43 if (-1 == (i = get_salt(salt, TT.m))) error_exit("bad -m"); 49 if (*s) error_exit("salt not in [./A-Za-z0-9]"); 51 snprintf(salt+i, sizeof(salt)-i, "%s", TT.S) [all...] |
/external/python/cpython3/Lib/test/ |
test_crypt.py | 21 salt = crypt.mksalt(method) 22 self.assertIn(len(salt) - method.salt_chars, {0, 1, 3, 4, 6, 7}) 24 self.assertIn(method.ident, salt[:len(salt)-method.salt_chars]) 48 salt = crypt.mksalt(method, rounds=rounds) 49 self.assertIn('$rounds=%d$' % rounds, salt) 50 self.assertEqual(len(salt) - method.salt_chars, 52 cr = crypt.crypt('mypassword', salt) 61 salt = crypt.mksalt(crypt.METHOD_BLOWFISH, rounds=1 << log_rounds) 62 self.assertIn('$%02d$' % log_rounds, salt) [all...] |
/external/tensorflow/tensorflow/contrib/distributions/python/ops/ |
seed_stream.py | 85 seed = SeedStream(seed, salt="random_beta") # (b) 106 - Supply the name of the function being implemented as a salt to the 116 # Why salt? 125 seed = SeedStream(seed, salt="") 130 seed = SeedStream(seed, salt="") 159 def __init__(self, seed, salt): 167 salt: Any Python object convertible to string, supplying 173 self._salt = salt 205 def salt(self): member in class:SeedStream
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/ |
PBKDF2KeySpec.java | 23 * @param salt salt to use in the generator, 28 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) 30 super(password, salt, iterationCount, keySize);
|
/external/python/cpython3/Lib/ |
crypt.py | 15 """Class representing a salt method per the Modular Crypt Format or the 23 """Generate a salt for the specified method. 60 def crypt(word, salt=None): 61 """Return a string representing the one-way hash of a password, with a salt 64 If ``salt`` is not specified or is ``None``, the strongest 65 available method will be selected and a salt generated. Otherwise, 66 ``salt`` may be one of the ``crypt.METHOD_*`` values, or a string as 70 if salt is None or isinstance(salt, _Method): 71 salt = mksalt(salt [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
OpenSSLPBEParametersGenerator.java | 37 * @param salt salt to use. 41 byte[] salt) 43 super.init(password, salt, 1); 47 * the derived key function, the ith hash of the password and the salt. 59 digest.update(salt, 0, salt.length); 83 * Generate a key parameter derived from the password, salt, and iteration 102 * the password, salt, and iteration count we are currently initialised 124 * salt, and iteration count we are currently initialised with [all...] |
/external/libbrillo/brillo/ |
cryptohome.cc | 40 static char g_system_salt_path[PATH_MAX] = "/home/.shadow/salt"; 42 static std::string* salt = nullptr; member in namespace:brillo::cryptohome::home 45 if (salt && !salt->empty()) 50 PLOG(ERROR) << "Could not get size of system salt: " << g_system_salt_path; 54 LOG(ERROR) << "System salt too large: " << file_size; 66 if (!salt) 67 salt = new std::string(); 68 salt->assign(buf.data(), file_size); 82 SHA1_Update(&ctx, salt->data(), salt->size()) [all...] |
/external/python/cpython3/Modules/_blake2/clinic/ |
blake2b_impl.c.h | 7 " key=b\'\', salt=b\'\', person=b\'\', fanout=1, depth=1, leaf_size=0,\n" 15 Py_buffer *key, Py_buffer *salt, Py_buffer *person, 24 static const char * const _keywords[] = {"", "digest_size", "key", "salt", "person", "fanout", "depth", "leaf_size", "node_offset", "node_depth", "inner_size", "last_node", NULL}; 29 Py_buffer salt = {NULL, NULL}; local 40 &data, &digest_size, &key, &salt, &person, &fanout, &depth, &leaf_size_obj, &node_offset_obj, &node_depth, &inner_size, &last_node)) { 43 return_value = py_blake2b_new_impl(type, data, digest_size, &key, &salt, &person, fanout, depth, leaf_size_obj, node_offset_obj, node_depth, inner_size, last_node); 50 /* Cleanup for salt */ 51 if (salt.obj) { 52 PyBuffer_Release(&salt);
|