HomeSort by relevance Sort by last modified time
    Searched refs:salt (Results 1 - 25 of 151) sorted by null

1 2 3 4 5 6 7

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
PKCS12KeyWithParameters.java 14 private final byte[] salt; field in class:PKCS12KeyWithParameters
21 * @param salt salt for generation algorithm
24 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount)
28 this.salt = Arrays.clone(salt);
38 * @param salt salt for generation algorithm
42 public PKCS12KeyWithParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount)
46 this.salt = Arrays.clone(salt)
    [all...]
  /external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/
PKCS12KeyWithParameters.java 16 private final byte[] salt; field in class:PKCS12KeyWithParameters
23 * @param salt salt for generation algorithm
26 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount)
30 this.salt = Arrays.clone(salt);
40 * @param salt salt for generation algorithm
44 public PKCS12KeyWithParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount)
48 this.salt = Arrays.clone(salt)
    [all...]
  /external/python/cpython3/Modules/clinic/
_cryptmodule.c.h 6 "crypt($module, word, salt, /)\n"
9 "Hash a *word* with the given *salt* and return the hashed password.\n"
11 "*word* will usually be a user\'s password. *salt* (either a random 2 or 16\n"
20 crypt_crypt_impl(PyObject *module, const char *word, const char *salt);
27 const char *salt; local
30 &word, &salt)) {
33 return_value = crypt_crypt_impl(module, word, salt);
  /external/openssh/openbsd-compat/
xcrypt.c 67 * Pick an appropriate password encryption type and salt for the running
69 * salt. Usually this will be root unless the root account is locked out.
70 * If we don't find one we return a traditional DES-based salt.
78 static char salt[32]; local
80 if (salt[0] != '\0')
81 return salt;
82 strlcpy(salt, "xx", sizeof(salt));
88 strlcpy(salt, passwd, MIN(typelen, sizeof(salt)));
    [all...]
port-uw.c 57 char *salt; local
67 /* Encrypt the candidate password using the proper salt. */
68 salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx";
76 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0)
77 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0));
81 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/
cryptmodule.c 17 char *word, *salt; local
22 if (!PyArg_ParseTuple(args, "ss:crypt", &word, &salt)) {
26 salt. Return None in that case. XXX Maybe raise an exception? */
27 return Py_BuildValue("s", crypt(word, salt));
32 "crypt(word, salt) -> string\n\
33 word will usually be a user's password. salt is a 2-character string\n\
35 in salt must be either \".\", \"/\", or an alphanumeric character. Returns\n\
37 the same alphabet as the salt.");
  /external/python/cpython2/Modules/
cryptmodule.c 17 char *word, *salt; local
22 if (!PyArg_ParseTuple(args, "ss:crypt", &word, &salt)) {
26 salt. Return None in that case. XXX Maybe raise an exception? */
27 return Py_BuildValue("s", crypt(word, salt));
32 "crypt(word, salt) -> string\n\
33 word will usually be a user's password. salt is a 2-character string\n\
35 in salt must be either \".\", \"/\", or an alphanumeric character. Returns\n\
37 the same alphabet as the salt.");
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
PBEParameter.java 18 ASN1OctetString salt; field in class:PBEParameter
21 byte[] salt,
24 if (salt.length != 8)
26 throw new IllegalArgumentException("salt length must be 8");
28 this.salt = new DEROctetString(salt);
35 salt = (ASN1OctetString)seq.getObjectAt(0);
61 return salt.getOctets();
68 v.add(salt);
MacData.java 22 byte[] salt; field in class:MacData
45 this.salt = Arrays.clone(ASN1OctetString.getInstance(seq.getObjectAt(1)).getOctets());
59 byte[] salt,
63 this.salt = Arrays.clone(salt);
74 return Arrays.clone(salt);
98 v.add(new DEROctetString(salt));
  /external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/pkcs/
PBEParameter.java 22 ASN1OctetString salt; field in class:PBEParameter
25 byte[] salt,
28 if (salt.length != 8)
30 throw new IllegalArgumentException("salt length must be 8");
32 this.salt = new DEROctetString(salt);
39 salt = (ASN1OctetString)seq.getObjectAt(0);
65 return salt.getOctets();
72 v.add(salt);
MacData.java 26 byte[] salt; field in class:MacData
49 this.salt = Arrays.clone(ASN1OctetString.getInstance(seq.getObjectAt(1)).getOctets());
63 byte[] salt,
67 this.salt = Arrays.clone(salt);
78 return Arrays.clone(salt);
102 v.add(new DEROctetString(salt));
  /external/tensorflow/tensorflow/contrib/distributions/python/kernel_tests/
seed_stream_test.py 34 strm = seed_stream.SeedStream(seed=4, salt="salt")
39 strm1 = seed_stream.SeedStream(seed=4, salt="salt")
40 strm2 = seed_stream.SeedStream(seed=4, salt="salt")
41 strm3 = seed_stream.SeedStream(seed=4, salt="salt")
47 strm1 = seed_stream.SeedStream(seed=4, salt="salt")
    [all...]
  /external/python/cpython3/Modules/
_cryptmodule.c 21 salt: str
24 Hash a *word* with the given *salt* and return the hashed password.
26 *word* will usually be a user's password. *salt* (either a random 2 or 16
34 crypt_crypt_impl(PyObject *module, const char *word, const char *salt)
41 crypt_result = crypt_r(word, salt, &data);
43 crypt_result = crypt(word, salt);
  /device/generic/goldfish/gatekeeper/
SoftGateKeeper.h 38 uint64_t salt; member in struct:gatekeeper::fast_hash_t
83 uint32_t password_length, salt_t salt) const {
85 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt),
86 sizeof(salt), N, r, p, signature, signature_length);
136 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) {
138 size_t digest_size = password.length + sizeof(salt);
140 memcpy(digest.get(), &salt, sizeof(salt));
141 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length);
145 fast_hash.salt = salt
161 uint64_t salt; local
    [all...]
  /device/google/cuttlefish_common/guest/hals/gatekeeper/
SoftGateKeeper.h 38 uint64_t salt; member in struct:gatekeeper::fast_hash_t
83 uint32_t password_length, salt_t salt) const {
85 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt),
86 sizeof(salt), N, r, p, signature, signature_length);
136 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) {
138 size_t digest_size = password.length + sizeof(salt);
140 memcpy(digest.get(), &salt, sizeof(salt));
141 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length);
145 fast_hash.salt = salt
161 uint64_t salt; local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
PBEParametersGenerator.java 11 protected byte[] salt; field in class:PBEParametersGenerator
25 * @param salt the salt to be mixed with the password.
31 byte[] salt,
35 this.salt = salt;
50 * return the salt byte array.
52 * @return the salt byte array.
56 return salt;
  /external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/crypto/
PBEParametersGenerator.java 14 protected byte[] salt; field in class:PBEParametersGenerator
29 * @param salt the salt to be mixed with the password.
35 byte[] salt,
39 this.salt = salt;
54 * return the salt byte array.
56 * @return the salt byte array.
60 return salt;
  /external/toybox/toys/other/
mkpasswd.c 1 /* mkpasswd.c - encrypt the given passwd using salt
15 usage: mkpasswd [-P FD] [-m TYPE] [-S SALT] [PASSWORD] [SALT]
21 -S SALT
34 char salt[MAX_SALT_LEN] = {0,}; local
39 if (TT.S) error_exit("duplicate salt");
43 if (-1 == (i = get_salt(salt, TT.m))) error_exit("bad -m");
49 if (*s) error_exit("salt not in [./A-Za-z0-9]");
51 snprintf(salt+i, sizeof(salt)-i, "%s", TT.S)
    [all...]
  /external/python/cpython3/Lib/test/
test_crypt.py 21 salt = crypt.mksalt(method)
22 self.assertIn(len(salt) - method.salt_chars, {0, 1, 3, 4, 6, 7})
24 self.assertIn(method.ident, salt[:len(salt)-method.salt_chars])
48 salt = crypt.mksalt(method, rounds=rounds)
49 self.assertIn('$rounds=%d$' % rounds, salt)
50 self.assertEqual(len(salt) - method.salt_chars,
52 cr = crypt.crypt('mypassword', salt)
61 salt = crypt.mksalt(crypt.METHOD_BLOWFISH, rounds=1 << log_rounds)
62 self.assertIn('$%02d$' % log_rounds, salt)
    [all...]
  /external/tensorflow/tensorflow/contrib/distributions/python/ops/
seed_stream.py 85 seed = SeedStream(seed, salt="random_beta") # (b)
106 - Supply the name of the function being implemented as a salt to the
116 # Why salt?
125 seed = SeedStream(seed, salt="")
130 seed = SeedStream(seed, salt="")
159 def __init__(self, seed, salt):
167 salt: Any Python object convertible to string, supplying
173 self._salt = salt
205 def salt(self): member in class:SeedStream
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/
PBKDF2KeySpec.java 23 * @param salt salt to use in the generator,
28 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf)
30 super(password, salt, iterationCount, keySize);
  /external/python/cpython3/Lib/
crypt.py 15 """Class representing a salt method per the Modular Crypt Format or the
23 """Generate a salt for the specified method.
60 def crypt(word, salt=None):
61 """Return a string representing the one-way hash of a password, with a salt
64 If ``salt`` is not specified or is ``None``, the strongest
65 available method will be selected and a salt generated. Otherwise,
66 ``salt`` may be one of the ``crypt.METHOD_*`` values, or a string as
70 if salt is None or isinstance(salt, _Method):
71 salt = mksalt(salt
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
OpenSSLPBEParametersGenerator.java 37 * @param salt salt to use.
41 byte[] salt)
43 super.init(password, salt, 1);
47 * the derived key function, the ith hash of the password and the salt.
59 digest.update(salt, 0, salt.length);
83 * Generate a key parameter derived from the password, salt, and iteration
102 * the password, salt, and iteration count we are currently initialised
124 * salt, and iteration count we are currently initialised with
    [all...]
  /external/libbrillo/brillo/
cryptohome.cc 40 static char g_system_salt_path[PATH_MAX] = "/home/.shadow/salt";
42 static std::string* salt = nullptr; member in namespace:brillo::cryptohome::home
45 if (salt && !salt->empty())
50 PLOG(ERROR) << "Could not get size of system salt: " << g_system_salt_path;
54 LOG(ERROR) << "System salt too large: " << file_size;
66 if (!salt)
67 salt = new std::string();
68 salt->assign(buf.data(), file_size);
82 SHA1_Update(&ctx, salt->data(), salt->size())
    [all...]
  /external/python/cpython3/Modules/_blake2/clinic/
blake2b_impl.c.h 7 " key=b\'\', salt=b\'\', person=b\'\', fanout=1, depth=1, leaf_size=0,\n"
15 Py_buffer *key, Py_buffer *salt, Py_buffer *person,
24 static const char * const _keywords[] = {"", "digest_size", "key", "salt", "person", "fanout", "depth", "leaf_size", "node_offset", "node_depth", "inner_size", "last_node", NULL};
29 Py_buffer salt = {NULL, NULL}; local
40 &data, &digest_size, &key, &salt, &person, &fanout, &depth, &leaf_size_obj, &node_offset_obj, &node_depth, &inner_size, &last_node)) {
43 return_value = py_blake2b_new_impl(type, data, digest_size, &key, &salt, &person, fanout, depth, leaf_size_obj, node_offset_obj, node_depth, inner_size, last_node);
50 /* Cleanup for salt */
51 if (salt.obj) {
52 PyBuffer_Release(&salt);

Completed in 587 milliseconds

1 2 3 4 5 6 7