| /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/params/ |
| ParametersWithSalt.java | 25 int saltLen) 27 this.salt = new byte[saltLen]; 30 System.arraycopy(salt, saltOff, this.salt, 0, saltLen);
|
| /dalvik/libcore/security/src/main/java/java/security/spec/ |
| PSSParameterSpec.java | 52 private final int saltLen; 58 * @param saltLen 61 * if {@code saltLen} is negative. 63 public PSSParameterSpec(int saltLen) { 64 if (saltLen < 0) { 67 this.saltLen = saltLen; 85 * @param saltLen 90 * if {@code saltLen} or {@code trailerField} is negative. 93 AlgorithmParameterSpec mgfSpec, int saltLen, int trailerField) [all...] |
| /external/dropbear/libtomcrypt/src/pk/pkcs1/ |
| pkcs_1_pss_encode.c | 24 @param saltlen The length of the salt desired (octets) 34 unsigned long saltlen, prng_state *prng, 60 if ((saltlen > modulus_len) || (modulus_len < hLen + saltlen + 2)) { 87 if (saltlen > 0) { 88 if (prng_descriptor[prng_idx].read(salt, saltlen, prng) != saltlen) { 105 if ((err = hash_descriptor[hash_idx].process(&md, salt, saltlen)) != CRYPT_OK) { 112 /* generate DB = PS || 0x01 || salt, PS == modulus_len - saltlen - hLen - 2 zero bytes */ 114 XMEMSET(DB + x, 0, modulus_len - saltlen - hLen - 2) [all...] |
| pkcs_1_pss_decode.c | 26 @param saltlen The length of the salt used (octets) 34 unsigned long saltlen, int hash_idx, 57 if ((saltlen > modulus_len) || 58 (modulus_len < hLen + saltlen + 2) || (siglen != modulus_len)) { 117 /* DB = PS || 0x01 || salt, PS == modulus_len - saltlen - hLen - 2 zero bytes */ 120 for (x = 0; x < modulus_len - saltlen - hLen - 2; x++) { 144 if ((err = hash_descriptor[hash_idx].process(&md, DB+x, saltlen)) != CRYPT_OK) {
|
| /external/dropbear/libtomcrypt/testprof/ |
| pkcs_1_test.c | 9 unsigned long x, y, l1, l2, l3, i1, i2, lparamlen, saltlen, modlen; local 33 /* pick a random saltlen 0..16 */ 34 saltlen = abs(rand()) % 17; 63 DO(pkcs_1_pss_encode(buf[0], l3, saltlen, &yarrow_prng, prng_idx, hash_idx, modlen, buf[1], &l1)); 64 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res1)); 67 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res2)); 71 pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res3); 73 fprintf(stderr, "PSS failed: %d, %d, %d, %lu, %lu\n", res1, res2, res3, l3, saltlen);
|
| /external/openssl/crypto/pkcs12/ |
| p12_mutl.c | 73 int saltlen, iter; local 82 saltlen = p12->mac->salt->length; 90 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 125 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 131 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 148 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, 162 if (!saltlen) saltlen = PKCS12_SALT_LEN; 163 p12->mac->salt->length = saltlen; 164 if (!(p12->mac->salt->data = OPENSSL_malloc (saltlen))) { [all...] |
| p12_key.c | 84 int saltlen, int id, int iter, int n, unsigned char *out, 97 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen, 107 int saltlen, int id, int iter, int n, unsigned char *out, 133 fprintf(stderr, "Salt (length %d):\n", saltlen); 134 h__dump(salt, saltlen); 141 Slen = v * ((saltlen+v-1)/v); 154 for (i = 0; i < Slen; i++) *p++ = salt[i % saltlen];
|
| p12_p8e.c | 65 unsigned char *salt, int saltlen, int iter, 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
|
| p12_crpt.c | 91 int saltlen, iter, ret; local 112 saltlen = pbe->salt->length; 113 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 119 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
| pkcs12.h | 185 unsigned char *salt, int saltlen, int iter, 189 int saltlen, int iter, 194 unsigned char *salt, int saltlen, int iter, 221 int saltlen, int id, int iter, int n, 223 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 231 unsigned char *salt, int saltlen, int iter, 234 int saltlen, const EVP_MD *md_type);
|
| p12_add.c | 105 int passlen, unsigned char *salt, int saltlen, int iter, 118 PKCS8_encrypt(pbe_nid, NULL, pass, passlen, salt, saltlen, iter, 162 unsigned char *salt, int saltlen, int iter, 176 if (!(pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen))) {
|
| /external/openssl/crypto/asn1/ |
| p5_pbe.c | 77 int saltlen) 93 if (!saltlen) saltlen = PKCS5_SALT_LEN; 94 if (!(pbe->salt->data = OPENSSL_malloc (saltlen))) { 98 pbe->salt->length = saltlen; 99 if (salt) memcpy (pbe->salt->data, salt, saltlen); 100 else if (RAND_pseudo_bytes (pbe->salt->data, saltlen) < 0)
|
| p5_pbev2.c | 88 unsigned char *salt, int saltlen) 135 if (!saltlen) saltlen = PKCS5_SALT_LEN; 136 if (!(osalt->data = OPENSSL_malloc (saltlen))) goto merr; 137 osalt->length = saltlen; 138 if (salt) memcpy (osalt->data, salt, saltlen); 139 else if (RAND_pseudo_bytes (osalt->data, saltlen) < 0) goto merr;
|
| /external/grub/stage2/ |
| md5.c | 212 int saltlen; local 224 saltlen = strstr (salt, "$") - salt; 230 saltlen = end - salt; 232 saltlen = 8; 234 salt[saltlen] = '$'; 239 md5_update (salt, saltlen); 247 md5_update (crypted, 3 + saltlen); /* include the $1$ header */ 268 md5_update (salt, saltlen); 280 p = salt + saltlen + 1;
|
| /external/dropbear/libtomcrypt/src/pk/rsa/ |
| rsa_sign_hash.c | 30 @param saltlen The length of the salt desired (octets) 38 int hash_idx, unsigned long saltlen, 77 if ((err = pkcs_1_pss_encode(in, inlen, saltlen, prng, prng_idx,
|
| rsa_verify_hash.c | 28 @param saltlen The length of the salt used during signature 36 int hash_idx, unsigned long saltlen, 95 err = pkcs_1_pss_decode(hash, hashlen, tmpbuf, x, saltlen, hash_idx, modulus_bitlen, stat);
|
| /external/dropbear/libtomcrypt/src/headers/ |
| tomcrypt_pkcs.h | 58 unsigned long saltlen, prng_state *prng, 65 unsigned long saltlen, int hash_idx,
|
| tomcrypt_pk.h | 76 int hash_idx, unsigned long saltlen, 82 int hash_idx, unsigned long saltlen,
|
| /external/openssl/include/openssl/ |
| pkcs12.h | 185 unsigned char *salt, int saltlen, int iter, 189 int saltlen, int iter, 194 unsigned char *salt, int saltlen, int iter, 221 int saltlen, int id, int iter, int n, 223 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 231 unsigned char *salt, int saltlen, int iter, 234 int saltlen, const EVP_MD *md_type);
|
| x509.h | [all...] |
| /external/openssl/crypto/evp/ |
| p5_crpt2.c | 80 const unsigned char *salt, int saltlen, int iter, 104 HMAC_Update(&hctx, salt, saltlen); 122 h__dump (salt, saltlen); 153 int saltlen, iter, plen; local 242 saltlen = kdf->salt->value.octet_string->length; 244 PKCS5_PBKDF2_HMAC_SHA1(pass, passlen, salt, saltlen, iter, keylen, key);
|
| p5_crpt.c | 112 int saltlen, iter; local 132 saltlen = pbe->salt->length; 140 EVP_DigestUpdate(&ctx, salt, saltlen);
|
| /external/openssl/apps/ |
| dgst.c | 176 int saltlen; local 178 saltlen=atoi(*(++argv)); 179 if (saltlen == -1) 181 else if (saltlen == -2) 183 else if (saltlen < -2 || saltlen >= 0xFFFE) 185 BIO_printf(bio_err, "Invalid PSS salt length %d\n", saltlen); 189 sig_flags = saltlen;
|
| /dalvik/libcore/security/src/test/java/tests/security/spec/ |
| PSSParameterSpecTest.java | 63 * if <code>saltLen</code> less than 0 152 * if <code>saltLen<code> less than 0
|
| /external/openssl/crypto/x509/ |
| x509.h | [all...] |