/libcore/luni/src/main/java/javax/crypto/spec/ |
PBEParameterSpec.java | 32 private final byte[] salt; field in class:PBEParameterSpec 36 * Creates a new <code>PBEParameterSpec</code> with the specified salt and 39 * @param salt 40 * the salt. 44 * if salt is null. 46 public PBEParameterSpec(byte[] salt, int iterationCount) { 47 if (salt == null) { 48 throw new NullPointerException("salt == null"); 50 this.salt = new byte[salt.length] [all...] |
PBEKeySpec.java | 33 private final byte[] salt; field in class:PBEKeySpec 50 salt = null; 56 * Creates a new <code>PBEKeySpec</code> with the specified password, salt, 61 * @param salt 62 * the salt. 68 * if the salt is null. 70 * if the salt is empty, iteration count is zero or negative or 73 public PBEKeySpec(char[] password, byte[] salt, int iterationCount, 75 if (salt == null) { 76 throw new NullPointerException("salt == null") [all...] |
/external/smack/src/org/xbill/DNS/ |
NSEC3PARAMRecord.java | 12 * algorithm, salt, iterations) used for a valid, complete NSEC3 chain present 28 private byte salt[]; field in class:NSEC3PARAMRecord 45 * @param salt The salt to use (may be null). 48 int flags, int iterations, byte [] salt) 55 if (salt != null) { 56 if (salt.length > 255) 57 throw new IllegalArgumentException("Invalid salt " + 59 if (salt.length > 0) { 60 this.salt = new byte[salt.length] [all...] |
NSEC3Record.java | 51 private byte [] salt; field in class:NSEC3Record 73 * @param salt The salt to use (may be null). 78 int flags, int iterations, byte [] salt, byte [] next, 86 if (salt != null) { 87 if (salt.length > 255) 88 throw new IllegalArgumentException("Invalid salt"); 89 if (salt.length > 0) { 90 this.salt = new byte[salt.length] [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
PBEParameter.java | 18 ASN1OctetString salt; field in class:PBEParameter 21 byte[] salt, 24 if (salt.length != 8) 26 throw new IllegalArgumentException("salt length must be 8"); 28 this.salt = new DEROctetString(salt); 35 salt = (ASN1OctetString)seq.getObjectAt(0); 61 return salt.getOctets(); 68 v.add(salt);
|
MacData.java | 21 byte[] salt; field in class:MacData 44 this.salt = ((ASN1OctetString)seq.getObjectAt(1)).getOctets(); 58 byte[] salt, 62 this.salt = salt; 73 return salt; 97 v.add(new DEROctetString(salt));
|
PBKDF2Params.java | 39 byte[] salt, 42 this.octStr = new DEROctetString(salt); 47 byte[] salt, 51 this(salt, iterationCount);
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
PBEParameterSpecTest.java | 38 * PBEParameterSpec(byte[] salt, int iterationCount) method testing. 43 byte[] salt = {1, 2, 3, 4, 5}; 49 + "in the case of null salt."); 53 PBEParameterSpec pbeps = new PBEParameterSpec(salt, iterationCount); 54 salt[0] ++; 55 assertFalse("The change of salt specified in the constructor " 57 salt[0] == pbeps.getSalt()[0]); 61 * getSalt() method testing. Tests that returned salt is equal 62 * to the salt specified in the constructor and that the change of 66 byte[] salt = new byte[] {1, 2, 3, 4, 5} [all...] |
PBEKeySpecTest.java | 60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int 67 byte[] salt = new byte[] {1, 2, 3, 4, 5}; 72 PBEKeySpec pbeks = new PBEKeySpec(null, salt, 85 + "in the case of null salt."); 94 + "in the case of empty salt."); 99 new PBEKeySpec(password, salt, -1, keyLength); 106 new PBEKeySpec(password, salt, iterationCount, -1); 113 new PBEKeySpec(password, salt, 0, keyLength); 120 new PBEKeySpec(password, salt, iterationCount, 0); 126 PBEKeySpec pbeks = new PBEKeySpec(password, salt, [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
PBEParameterSpecTest.java | 38 * PBEParameterSpec(byte[] salt, int iterationCount) method testing. 43 byte[] salt = {1, 2, 3, 4, 5}; 49 + "in the case of null salt."); 53 PBEParameterSpec pbeps = new PBEParameterSpec(salt, iterationCount); 54 salt[0] ++; 55 assertFalse("The change of salt specified in the constructor " 57 salt[0] == pbeps.getSalt()[0]); 61 * getSalt() method testing. Tests that returned salt is equal 62 * to the salt specified in the constructor and that the change of 66 byte[] salt = new byte[] {1, 2, 3, 4, 5} [all...] |
PBEKeySpecTest.java | 60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int 67 byte[] salt = new byte[] {1, 2, 3, 4, 5}; 72 PBEKeySpec pbeks = new PBEKeySpec(null, salt, 85 + "in the case of null salt."); 94 + "in the case of empty salt."); 99 new PBEKeySpec(password, salt, -1, keyLength); 106 new PBEKeySpec(password, salt, iterationCount, -1); 113 new PBEKeySpec(password, salt, 0, keyLength); 120 new PBEKeySpec(password, salt, iterationCount, 0); 126 PBEKeySpec pbeks = new PBEKeySpec(password, salt, [all...] |
/frameworks/base/libs/androidfw/tests/ |
ObbFile_test.cpp | 70 unsigned char salt[SALT_SIZE] = {0x01, 0x10, 0x55, 0xAA, 0xFF, 0x00, 0x5A, 0xA5}; local 71 EXPECT_TRUE(mObbFile->setSalt(salt, SALT_SIZE)) 72 << "Salt should be successfully set"; 91 EXPECT_EQ(sizeof(salt), saltLen) 92 << "salt sizes were not the same"; 94 for (int i = 0; i < sizeof(salt); i++) { 95 EXPECT_EQ(salt[i], newSalt[i]) 96 << "salt character " << i << " should be equal"; 98 EXPECT_TRUE(memcmp(newSalt, salt, sizeof(salt)) == 0 [all...] |
/frameworks/base/tools/obbtool/ |
pbkdf2gen.cpp | 29 * Will print out the salt and key in hex. 50 unsigned char salt[SALT_LEN]; local 52 if (read(fd, &salt, SALT_LEN) != SALT_LEN) { 53 fprintf(stderr, "Could not read salt from /dev/urandom: %s\n", strerror(errno)); 61 if (PKCS5_PBKDF2_HMAC_SHA1(argv[1], strlen(argv[1]), salt, SALT_LEN, 67 printf("salt="); 69 printf("%02x", salt[i]);
|
Main.cpp | 44 {"salt", required_argument, NULL, 's'}, 57 memset(&salt, 0, sizeof(salt)); 64 unsigned char salt[SALT_LEN]; member in class:PackageInfo 82 " -s <8 byte hex salt> sets the crypto key salt (if encrypted)\n" 103 obb->setSalt(info->salt, SALT_LEN); 142 printf(" Salt: "); 145 const unsigned char* salt = obb->getSalt(&saltLen); local 146 if (salt != NULL) [all...] |
/external/openssh/ |
auth2-jpake.c | 63 * anyway because they will mismatch on fake salt. 120 /* Returns 1 if 'c' is a valid crypt(3) salt character, 0 otherwise */ 134 * Derive fake salt as H(username || first_private_host_key) 185 /* ASCII an integer [0, 64) for inclusion in a password/salt */ 194 /* Generate ASCII salt bytes for user */ 216 * a stable fake salt under it for use by a non-existent account. 220 fake_salt_and_scheme(Authctxt *authctxt, char **salt, char **scheme) 240 xasprintf(salt, "$1$%s$", makesalt(8, authctxt->user)); 243 *salt = xstrdup(makesalt(2, authctxt->user)); 248 xasprintf(salt, "_%c%c%c%c%s" 377 char *salt, *hash_scheme; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
OpenSSLPBEParametersGenerator.java | 37 * @param salt salt to use. 41 byte[] salt) 43 super.init(password, salt, 1); 47 * the derived key function, the ith hash of the password and the salt. 59 digest.update(salt, 0, salt.length); 83 * Generate a key parameter derived from the password, salt, and iteration 102 * the password, salt, and iteration count we are currently initialised 124 * salt, and iteration count we are currently initialised with [all...] |
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_pss_encode.c | 24 @param saltlen The length of the salt desired (octets) 39 unsigned char *DB, *mask, *salt, *hash; local 64 /* allocate ram for DB/mask/salt/hash of size modulus_len */ 67 salt = XMALLOC(modulus_len); 69 if (DB == NULL || mask == NULL || salt == NULL || hash == NULL) { 76 if (salt != NULL) { 77 XFREE(salt); 86 /* generate random salt */ 88 if (prng_descriptor[prng_idx].read(salt, saltlen, prng) != saltlen) { 94 /* M = (eight) 0x00 || msghash || salt, hash = H(M) * [all...] |
pkcs_1_pss_decode.c | 26 @param saltlen The length of the salt used (octets) 37 unsigned char *DB, *mask, *salt, *hash; local 62 /* allocate ram for DB/mask/salt/hash of size modulus_len */ 65 salt = XMALLOC(modulus_len); 67 if (DB == NULL || mask == NULL || salt == NULL || hash == NULL) { 74 if (salt != NULL) { 75 XFREE(salt); 117 /* DB = PS || 0x01 || salt, PS == modulus_len - saltlen - hLen - 2 zero bytes */ 133 /* M = (eight) 0x00 || msghash || salt, mask = H(M) */ 161 zeromem(salt, modulus_len); [all...] |
/external/openssl/crypto/des/ |
fcrypt.c | 27 /* Added more values to handle illegal salt values the way normal 61 char *DES_crypt(const char *buf, const char *salt) 66 return(DES_fcrypt(buf,salt,buff)); 72 /* Copy at most 2 chars of salt */ 73 if ((e_salt[0] = salt[0]) != '\0') 74 e_salt[1] = salt[1]; 99 char *DES_fcrypt(const char *buf, const char *salt, char *ret) 119 x=ret[0]=((salt[0] == '\0')?'A':salt[0]); 121 x=ret[1]=((salt[1] == '\0')?'A':salt[1]) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
PBEParametersGenerator.java | 11 protected byte[] salt; field in class:PBEParametersGenerator 25 * @param salt the salt to be mixed with the password. 31 byte[] salt, 35 this.salt = salt; 50 * return the salt byte array. 52 * @return the salt byte array. 56 return salt;
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
SecretKeyFactoryTest.java | 35 private static final byte[] SALT = {0, 1, 2, 3, 4, 5, 6, 7}; 73 KeySpec ks = new PBEKeySpec(null, SALT, ITERATIONS); 79 KeySpec ks = new PBEKeySpec(new char[0], SALT, ITERATIONS); 85 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS); 92 KeySpec ks = new PBEKeySpec(null, SALT, ITERATIONS, KEY_LENGTH); 99 KeySpec ks = new PBEKeySpec(new char[0], SALT, ITERATIONS, KEY_LENGTH); 105 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS, KEY_LENGTH); 110 test_PBKDF2(PASSWORD, SALT, ITERATIONS, KEY_LENGTH, 126 byte[] salt = new byte[] { 136 test_PBKDF2(password, salt, iterations, keyLength, expected) [all...] |
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_1.c | 22 @param salt The salt (or nonce) which is 8 octets long 30 const unsigned char *salt, 40 LTC_ARGCHK(salt != NULL); 62 /* hash initial password + salt */ 69 if ((err = hash_descriptor[hash_idx].process(md, salt, 8)) != CRYPT_OK) {
|
/frameworks/base/core/jni/ |
android_content_res_ObbScanner.cpp | 36 jfieldID salt; member in struct:android::__anon19672 66 const unsigned char* salt = obb->getSalt(&saltLen); local 69 env->SetByteArrayRegion(saltArray, 0, saltLen, (jbyte*)salt); 70 env->SetObjectField(obbInfo, gObbInfoClassInfo.salt, saltArray); 102 GET_FIELD_ID(gObbInfoClassInfo.salt, clazz, 103 "salt", "[B");
|
/external/openssh/openbsd-compat/ |
xcrypt.c | 61 xcrypt(const char *password, const char *salt) 66 if (is_md5_salt(salt)) 67 crypted = md5_crypt(password, salt); 69 crypted = crypt(password, salt); 72 crypted = bigcrypt(password, salt); 74 crypted = crypt(password, salt); 76 crypted = bigcrypt(password, salt); 78 crypted = crypt(password, salt);
|
/external/openssl/crypto/pkcs12/ |
p12_mutl.c | 72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local 82 salt = p12->mac->salt->data; 83 saltlen = p12->mac->salt->length; 94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, 171 p12->mac->salt->length = saltlen; 172 if (!(p12->mac->salt->data = OPENSSL_malloc (saltlen))) [all...] |