HomeSort by relevance Sort by last modified time
    Searched refs:salt (Results 26 - 50 of 67) sorted by null

12 3

  /dalvik/libcore/security/src/main/java/org/bouncycastle/asn1/pkcs/
PKCS12PBEParams.java 21 byte[] salt,
24 this.iv = new DEROctetString(salt);
  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/generators/
PKCS5S1ParametersGenerator.java 35 * the derived key function, the ith hash of the password and the salt.
42 digest.update(salt, 0, salt.length);
55 * Generate a key parameter derived from the password, salt, and iteration
80 * the password, salt, and iteration count we are currently initialised
108 * salt, and iteration count we are currently initialised with.
PKCS12ParametersGenerator.java 91 if ((salt != null) && (salt.length != 0))
93 S = new byte[v * ((salt.length + v - 1) / v)];
97 S[i] = salt[i % salt.length];
166 * Generate a key parameter derived from the password, salt, and iteration
184 * the password, salt, and iteration count we are currently initialised
207 * salt, and iteration count we are currently initialised with.
PKCS5S2ParametersGenerator.java 95 F(password, salt, iterationCount, iBuf, out, (i - 1) * hLen);
102 * Generate a key parameter derived from the password, salt, and iteration
120 * the password, salt, and iteration count we are currently initialised
141 * salt, and iteration count we are currently initialised with.
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_pkcs.h 75 const unsigned char *salt,
81 const unsigned char *salt, unsigned long salt_len,
  /external/openssl/apps/
enc.c 114 unsigned char salt[PKCS5_SALT_LEN]; local
189 else if (strcmp(*argv,"-salt") == 0)
480 * line, so we get no salt in that case. Is this a bug?
484 /* Salt handling: if encrypting generate a salt and
485 * write to output BIO. If decrypting read salt from
493 if(!set_hex(hsalt,salt,sizeof salt)) {
495 "invalid hex salt value\n");
498 } else if (RAND_pseudo_bytes(salt, sizeof salt) < 0
    [all...]
passwd.c 49 * -salt string - salt
66 char *salt = NULL, *passwd = NULL, **passwds = NULL; local
105 else if (strcmp(argv[i], "-salt") == 0)
107 if ((argv[i+1] != NULL) && (salt == NULL))
110 salt = argv[++i];
180 BIO_printf(bio_err, "-salt string use provided salt\n");
245 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out,
274 if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out
    [all...]
  /external/grub/stage2/
md5.c 205 CRYPTED must have a salt. */
210 char *salt = crypted + 3; /* skip $1$ header */ local
224 saltlen = strstr (salt, "$") - salt;
228 char *end = strstr (salt, "$");
229 if (end && end - salt < 8)
230 saltlen = end - salt;
234 salt[saltlen] = '$';
239 md5_update (salt, saltlen);
268 md5_update (salt, saltlen)
    [all...]
  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/signers/
ISO9796d2PSSSigner.java 22 * Note: the usual length for the salt is the length of the hash
55 * @param saltLength length of salt in bytes.
101 * @param saltLength length of salt in bytes.
120 * salt is passed in which is the wrong length.
280 byte[] salt;
284 salt = standardSalt;
288 salt = new byte[saltLength];
289 random.nextBytes(salt);
292 digest.update(salt, 0, salt.length)
    [all...]
PSSSigner.java 17 * Note: the usual value for the salt length is the number of
32 private byte[] salt; field in class:PSSSigner
42 * @param sLen the length of the salt to use (in bytes).
62 this.salt = new byte[sLen];
154 random.nextBytes(salt);
156 System.arraycopy(salt, 0, mDash, mDash.length - sLen, sLen);
166 System.arraycopy(salt, 0, block, block.length - sLen - hLen - 1, sLen);
  /external/openssl/crypto/evp/
evp_key.c 111 const unsigned char *salt, const unsigned char *data, int datal,
134 if (salt != NULL)
135 EVP_DigestUpdate(&c,salt,PKCS5_SALT_LEN);
  /external/openssl/crypto/pkcs12/
p12_add.c 105 int passlen, unsigned char *salt, int saltlen, int iter,
118 PKCS8_encrypt(pbe_nid, NULL, pass, passlen, salt, saltlen, iter,
162 unsigned char *salt, int saltlen, int iter,
176 if (!(pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen))) {
pkcs12.h 101 ASN1_OCTET_STRING *salt; member in struct:__anon3970
185 unsigned char *salt, int saltlen, int iter,
188 int passlen, unsigned char *salt,
194 unsigned char *salt, int saltlen, int iter,
220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
223 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type);
231 unsigned char *salt, int saltlen, int iter,
233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
p12_key.c 83 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
97 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen,
106 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt,
133 fprintf(stderr, "Salt (length %d):\n", saltlen);
134 h__dump(salt, saltlen);
154 for (i = 0; i < Slen; i++) *p++ = salt[i % saltlen];
p12_asn.c 76 ASN1_SIMPLE(PKCS12_MAC_DATA, salt, ASN1_OCTET_STRING),
  /external/openssl/include/openssl/
pkcs12.h 101 ASN1_OCTET_STRING *salt; member in struct:__anon4014
185 unsigned char *salt, int saltlen, int iter,
188 int passlen, unsigned char *salt,
194 unsigned char *salt, int saltlen, int iter,
220 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
223 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type);
231 unsigned char *salt, int saltlen, int iter,
233 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt,
des.h 207 char *DES_fcrypt(const char *buf,const char *salt, char *ret);
208 char *DES_crypt(const char *buf,const char *salt);
  /external/openssl/crypto/des/
des_old.c 190 char *_ossl_old_des_fcrypt(const char *buf,const char *salt, char *ret)
192 return DES_fcrypt(buf, salt, ret);
194 char *_ossl_old_des_crypt(const char *buf,const char *salt)
196 return DES_crypt(buf, salt);
198 char *_ossl_old_crypt(const char *buf,const char *salt)
200 return DES_crypt(buf, salt);
des.h 207 char *DES_fcrypt(const char *buf,const char *salt, char *ret);
208 char *DES_crypt(const char *buf,const char *salt);
  /dalvik/libcore/security/src/main/java/org/bouncycastle/openssl/
PEMWriter.java 219 byte[] salt = new byte[8];
221 random.nextBytes(salt);
225 pGen.init(PBEParametersGenerator.PKCS5PasswordToBytes(password), salt); local
273 c.init(Cipher.ENCRYPT_MODE, secretKey, new IvParameterSpec(salt));
288 this.writeHexEncoded(salt);
  /dalvik/libcore/security/src/main/java/org/bouncycastle/jce/provider/
BrokenPBE.java 117 if ((salt != null) && (salt.length != 0))
119 S = new byte[v * ((salt.length + v - 1) / v)];
123 S[i] = salt[i % salt.length];
192 * Generate a key parameter derived from the password, salt, and iteration
210 * the password, salt, and iteration count we are currently initialised
233 * salt, and iteration count we are currently initialised with.
  /external/wpa_supplicant/
radius.c 788 /* key: 16-bit salt followed by encrypted key info */
807 /* b(1) = MD5(Secret + Request-Authenticator + Salt)
816 elen[2] = 2; /* Salt */
848 static void encrypt_ms_key(const u8 *key, size_t key_len, u16 salt,
858 saltbuf[0] = salt >> 8;
859 saltbuf[1] = salt;
873 /* b(1) = MD5(Secret + Request-Authenticator + Salt)
981 u16 salt; local
996 salt = os_random() | 0x8000;
997 *pos++ = salt >> 8
    [all...]
  /frameworks/base/core/java/com/android/internal/widget/
LockPatternUtils.java 473 long salt = getLong(LOCK_PASSWORD_SALT_KEY, 0); local
474 if (salt == 0) {
476 salt = SecureRandom.getInstance("SHA1PRNG").nextLong();
477 setLong(LOCK_PASSWORD_SALT_KEY, salt);
478 Log.v(TAG, "Initialized lock password salt");
484 return Long.toHexString(salt);
  /external/wpa_supplicant_6/wpa_supplicant/src/radius/
radius.c 793 /* key: 16-bit salt followed by encrypted key info */
812 /* b(1) = MD5(Secret + Request-Authenticator + Salt)
821 elen[2] = 2; /* Salt */
853 static void encrypt_ms_key(const u8 *key, size_t key_len, u16 salt,
863 WPA_PUT_BE16(saltbuf, salt);
877 /* b(1) = MD5(Secret + Request-Authenticator + Salt)
985 u16 salt; local
1000 salt = os_random() | 0x8000;
1001 WPA_PUT_BE16(pos, salt);
1003 encrypt_ms_key(send_key, send_key_len, salt, req_authenticator, secret
    [all...]
  /external/ppp/pppd/
srp-entry.c 187 t_tob64(saltbuf, (char *)pwval.pebuf.salt.data,
188 pwval.pebuf.salt.len));

Completed in 272 milliseconds

12 3