/dalvik/libcore/security/src/main/java/org/bouncycastle/asn1/pkcs/ |
PKCS12PBEParams.java | 21 byte[] salt, 24 this.iv = new DEROctetString(salt);
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/generators/ |
PKCS5S1ParametersGenerator.java | 35 * the derived key function, the ith hash of the password and the salt. 42 digest.update(salt, 0, salt.length); 55 * Generate a key parameter derived from the password, salt, and iteration 80 * the password, salt, and iteration count we are currently initialised 108 * salt, and iteration count we are currently initialised with.
|
PKCS12ParametersGenerator.java | 91 if ((salt != null) && (salt.length != 0)) 93 S = new byte[v * ((salt.length + v - 1) / v)]; 97 S[i] = salt[i % salt.length]; 166 * Generate a key parameter derived from the password, salt, and iteration 184 * the password, salt, and iteration count we are currently initialised 207 * salt, and iteration count we are currently initialised with.
|
PKCS5S2ParametersGenerator.java | 95 F(password, salt, iterationCount, iBuf, out, (i - 1) * hLen); 102 * Generate a key parameter derived from the password, salt, and iteration 120 * the password, salt, and iteration count we are currently initialised 141 * salt, and iteration count we are currently initialised with.
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 75 const unsigned char *salt, 81 const unsigned char *salt, unsigned long salt_len,
|
/external/openssl/apps/ |
enc.c | 114 unsigned char salt[PKCS5_SALT_LEN]; local 189 else if (strcmp(*argv,"-salt") == 0) 480 * line, so we get no salt in that case. Is this a bug? 484 /* Salt handling: if encrypting generate a salt and 485 * write to output BIO. If decrypting read salt from 493 if(!set_hex(hsalt,salt,sizeof salt)) { 495 "invalid hex salt value\n"); 498 } else if (RAND_pseudo_bytes(salt, sizeof salt) < 0 [all...] |
passwd.c | 49 * -salt string - salt 66 char *salt = NULL, *passwd = NULL, **passwds = NULL; local 105 else if (strcmp(argv[i], "-salt") == 0) 107 if ((argv[i+1] != NULL) && (salt == NULL)) 110 salt = argv[++i]; 180 BIO_printf(bio_err, "-salt string use provided salt\n"); 245 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out, 274 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out [all...] |
/external/grub/stage2/ |
md5.c | 205 CRYPTED must have a salt. */ 210 char *salt = crypted + 3; /* skip $1$ header */ local 224 saltlen = strstr (salt, "$") - salt; 228 char *end = strstr (salt, "$"); 229 if (end && end - salt < 8) 230 saltlen = end - salt; 234 salt[saltlen] = '$'; 239 md5_update (salt, saltlen); 268 md5_update (salt, saltlen) [all...] |
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/signers/ |
ISO9796d2PSSSigner.java | 22 * Note: the usual length for the salt is the length of the hash 55 * @param saltLength length of salt in bytes. 101 * @param saltLength length of salt in bytes. 120 * salt is passed in which is the wrong length. 280 byte[] salt; 284 salt = standardSalt; 288 salt = new byte[saltLength]; 289 random.nextBytes(salt); 292 digest.update(salt, 0, salt.length) [all...] |
PSSSigner.java | 17 * Note: the usual value for the salt length is the number of 32 private byte[] salt; field in class:PSSSigner 42 * @param sLen the length of the salt to use (in bytes). 62 this.salt = new byte[sLen]; 154 random.nextBytes(salt); 156 System.arraycopy(salt, 0, mDash, mDash.length - sLen, sLen); 166 System.arraycopy(salt, 0, block, block.length - sLen - hLen - 1, sLen);
|
/external/openssl/crypto/evp/ |
evp_key.c | 111 const unsigned char *salt, const unsigned char *data, int datal, 134 if (salt != NULL) 135 EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN);
|
/external/openssl/crypto/pkcs12/ |
p12_add.c | 105 int passlen, unsigned char *salt, int saltlen, int iter, 118 PKCS8_encrypt(pbe_nid, NULL, pass, passlen, salt, saltlen, iter, 162 unsigned char *salt, int saltlen, int iter, 176 if (!(pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen))) {
|
pkcs12.h | 101 ASN1_OCTET_STRING *salt; member in struct:__anon3970 185 unsigned char *salt, int saltlen, int iter, 188 int passlen, unsigned char *salt, 194 unsigned char *salt, int saltlen, int iter, 220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 223 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 231 unsigned char *salt, int saltlen, int iter, 233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
|
p12_key.c | 83 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 97 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen, 106 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, 133 fprintf(stderr, "Salt (length %d):\n", saltlen); 134 h__dump(salt, saltlen); 154 for (i = 0; i < Slen; i++) *p++ = salt[i % saltlen];
|
p12_asn.c | 76 ASN1_SIMPLE(PKCS12_MAC_DATA, salt, ASN1_OCTET_STRING),
|
/external/openssl/include/openssl/ |
pkcs12.h | 101 ASN1_OCTET_STRING *salt; member in struct:__anon4014 185 unsigned char *salt, int saltlen, int iter, 188 int passlen, unsigned char *salt, 194 unsigned char *salt, int saltlen, int iter, 220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, 223 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 231 unsigned char *salt, int saltlen, int iter, 233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
|
des.h | 207 char *DES_fcrypt(const char *buf,const char *salt, char *ret); 208 char *DES_crypt(const char *buf,const char *salt);
|
/external/openssl/crypto/des/ |
des_old.c | 190 char *_ossl_old_des_fcrypt(const char *buf,const char *salt, char *ret) 192 return DES_fcrypt(buf, salt, ret); 194 char *_ossl_old_des_crypt(const char *buf,const char *salt) 196 return DES_crypt(buf, salt); 198 char *_ossl_old_crypt(const char *buf,const char *salt) 200 return DES_crypt(buf, salt);
|
des.h | 207 char *DES_fcrypt(const char *buf,const char *salt, char *ret); 208 char *DES_crypt(const char *buf,const char *salt);
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/openssl/ |
PEMWriter.java | 219 byte[] salt = new byte[8]; 221 random.nextBytes(salt); 225 pGen.init(PBEParametersGenerator.PKCS5PasswordToBytes(password), salt); local 273 c.init(Cipher.ENCRYPT_MODE, secretKey, new IvParameterSpec(salt)); 288 this.writeHexEncoded(salt);
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/jce/provider/ |
BrokenPBE.java | 117 if ((salt != null) && (salt.length != 0)) 119 S = new byte[v * ((salt.length + v - 1) / v)]; 123 S[i] = salt[i % salt.length]; 192 * Generate a key parameter derived from the password, salt, and iteration 210 * the password, salt, and iteration count we are currently initialised 233 * salt, and iteration count we are currently initialised with.
|
/external/wpa_supplicant/ |
radius.c | 788 /* key: 16-bit salt followed by encrypted key info */ 807 /* b(1) = MD5(Secret + Request-Authenticator + Salt) 816 elen[2] = 2; /* Salt */ 848 static void encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, 858 saltbuf[0] = salt >> 8; 859 saltbuf[1] = salt; 873 /* b(1) = MD5(Secret + Request-Authenticator + Salt) 981 u16 salt; local 996 salt = os_random() | 0x8000; 997 *pos++ = salt >> 8 [all...] |
/frameworks/base/core/java/com/android/internal/widget/ |
LockPatternUtils.java | 473 long salt = getLong(LOCK_PASSWORD_SALT_KEY, 0); local 474 if (salt == 0) { 476 salt = SecureRandom.getInstance("SHA1PRNG").nextLong(); 477 setLong(LOCK_PASSWORD_SALT_KEY, salt); 478 Log.v(TAG, "Initialized lock password salt"); 484 return Long.toHexString(salt);
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 793 /* key: 16-bit salt followed by encrypted key info */ 812 /* b(1) = MD5(Secret + Request-Authenticator + Salt) 821 elen[2] = 2; /* Salt */ 853 static void encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, 863 WPA_PUT_BE16(saltbuf, salt); 877 /* b(1) = MD5(Secret + Request-Authenticator + Salt) 985 u16 salt; local 1000 salt = os_random() | 0x8000; 1001 WPA_PUT_BE16(pos, salt); 1003 encrypt_ms_key(send_key, send_key_len, salt, req_authenticator, secret [all...] |
/external/ppp/pppd/ |
srp-entry.c | 187 t_tob64(saltbuf, (char *)pwval.pebuf.salt.data, 188 pwval.pebuf.salt.len));
|