HomeSort by relevance Sort by last modified time
    Searched full:salt (Results 51 - 75 of 402) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/openssh/
md5crypt.c 45 is_md5_salt(const char *salt)
47 return (strncmp(salt, magic, strlen(magic)) == 0);
51 md5_crypt(const char *pw, const char *salt)
60 /* Refine the Salt first */
61 sp = salt;
73 /* get the length of the true salt */
76 /* Stash the salt */
88 /* Then the raw salt */
91 /* Then just as many characters of the MD5(pw, salt, pw) */
  /frameworks/base/core/java/android/content/res/
ObbInfo.java 52 * The salt for the encryption algorithm.
56 public byte[] salt; field in class:ObbInfo
85 dest.writeByteArray(salt);
104 salt = source.createByteArray();
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
PKCS12PBEParams.java 21 byte[] salt,
24 this.iv = new DEROctetString(salt);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
PKCS12ParametersGenerator.java 91 if ((salt != null) && (salt.length != 0))
93 S = new byte[v * ((salt.length + v - 1) / v)];
97 S[i] = salt[i % salt.length];
165 * Generate a key parameter derived from the password, salt, and iteration
183 * the password, salt, and iteration count we are currently initialised
206 * salt, and iteration count we are currently initialised with.
PKCS5S2ParametersGenerator.java 100 F(salt, iterationCount, iBuf, outBytes, outPos);
108 * Generate a key parameter derived from the password, salt, and iteration
126 * the password, salt, and iteration count we are currently initialised
147 * salt, and iteration count we are currently initialised with.
  /external/chromium/crypto/
symmetric_key_unittest.cc 71 const char* salt; member in struct:PBKDF2TestVector
84 // The OS X crypto libraries have minimum salt and iteration requirements
86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) {
95 test_data.password, test_data.salt,
113 "salt",
121 "salt",
129 "salt",
139 "salt",
  /external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/identity/
SettingsSecureBasedIdentificationGenerator.java 31 public String getUniqueId(@Nullable String salt) {
38 new HashUtil.Params(androidId).withSalt(salt));
  /external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/util/
HashUtil.java 32 public Params withSalt(String salt) {
33 mSalt = salt;
  /external/chromium_org/crypto/
symmetric_key_unittest.cc 71 const char* salt; member in struct:PBKDF2TestVector
84 // The OS X crypto libraries have minimum salt and iteration requirements
86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) {
95 test_data.password, test_data.salt,
113 "salt",
121 "salt",
129 "salt",
139 "salt",
  /external/chromium_org/third_party/openssl/openssl/crypto/asn1/
p5_pbe.c 68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
78 const unsigned char *salt, int saltlen)
99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
104 sstr = ASN1_STRING_data(pbe->salt);
105 if (salt)
106 memcpy(sstr, salt, saltlen);
133 const unsigned char *salt, int saltlen)
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
p5_pbev2.c 75 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY),
90 unsigned char *salt, int saltlen,
158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen);
195 unsigned char *salt, int saltlen)
197 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1);
200 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen,
212 kdf->salt->value.octet_string = osalt;
213 kdf->salt->type = V_ASN1_OCTET_STRING;
222 if (salt)
223 memcpy (osalt->data, salt, saltlen)
    [all...]
  /external/openssl/crypto/asn1/
p5_pbe.c 68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
78 const unsigned char *salt, int saltlen)
99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
104 sstr = ASN1_STRING_data(pbe->salt);
105 if (salt)
106 memcpy(sstr, salt, saltlen);
133 const unsigned char *salt, int saltlen)
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
p5_pbev2.c 75 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY),
90 unsigned char *salt, int saltlen,
158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen);
195 unsigned char *salt, int saltlen)
197 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1);
200 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen,
212 kdf->salt->value.octet_string = osalt;
213 kdf->salt->type = V_ASN1_OCTET_STRING;
222 if (salt)
223 memcpy (osalt->data, salt, saltlen)
    [all...]
  /external/wpa_supplicant_8/src/tls/
pkcs5.c 23 u8 salt[8]; member in struct:pkcs5_params
77 * salt OCTET STRING SIZE(8),
92 /* salt OCTET STRING SIZE(8) */
98 "(salt) - found class %d tag 0x%x size %d",
103 os_memcpy(params->salt, hdr.payload, hdr.length);
105 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt",
106 params->salt, params->salt_len);
152 addr[1] = params->salt;
  /libcore/luni/src/main/java/java/security/spec/
PSSParameterSpec.java 35 * <li>salt length: {@code 20}</li>
49 // Salt length in bits
53 * Creates a new {@code PSSParameterSpec} with the specified salt length
57 * the salt length (in bits).
75 * salt length, and trailer field value.
84 * the salt length (in bits).
113 * Returns the length of the salt (in bits).
115 * @return the length of the salt (in bits).
  /libcore/luni/src/main/java/javax/crypto/interfaces/
PBEKey.java 40 * Returns a copy of the salt data or null if not specified.
42 * @return a copy of the salt data or null if not specified.
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
p5_crpt2.c 81 const unsigned char *salt, int saltlen, int iter,
115 || !HMAC_Update(&hctx, salt, saltlen)
138 fprintf(stderr, "Salt:\n");
139 h__dump (salt, saltlen);
148 const unsigned char *salt, int saltlen, int iter,
151 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(),
159 unsigned char salt[] = {0x12, 0x34, 0x56, 0x78}; local
160 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out);
234 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; local
295 if(kdf->salt->type != V_ASN1_OCTET_STRING)
    [all...]
  /external/openssl/crypto/evp/
p5_crpt2.c 81 const unsigned char *salt, int saltlen, int iter,
115 || !HMAC_Update(&hctx, salt, saltlen)
138 fprintf(stderr, "Salt:\n");
139 h__dump (salt, saltlen);
148 const unsigned char *salt, int saltlen, int iter,
151 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(),
159 unsigned char salt[] = {0x12, 0x34, 0x56, 0x78}; local
160 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out);
234 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; local
295 if(kdf->salt->type != V_ASN1_OCTET_STRING)
    [all...]
  /external/chromium/chrome/common/
visitedlink_common.h 15 // number of bytes in the salt
42 // a salt value for the links on one computer so that an attacker can not
90 uint8 salt[LINK_SALT_LENGTH]; member in struct:VisitedLinkCommon::SharedHeader
104 // pass the salt as a parameter. See the non-static version above if you
105 // want to use the current class' salt.
108 const uint8 salt[LINK_SALT_LENGTH]);
128 // salt used for each URL when computing the fingerprint
  /external/chromium_org/components/visitedlink/common/
visitedlink_common.h 16 // number of bytes in the salt
43 // a salt value for the links on one computer so that an attacker can not
91 uint8 salt[LINK_SALT_LENGTH]; member in struct:visitedlink::VisitedLinkCommon::SharedHeader
105 // pass the salt as a parameter. See the non-static version above if you
106 // want to use the current class' salt.
109 const uint8 salt[LINK_SALT_LENGTH]);
129 // salt used for each URL when computing the fingerprint
  /external/chromium_org/third_party/tlslite/tlslite/
mathtls.py 76 def makeX(salt, username, password):
79 if len(salt)>=256:
80 raise ValueError("salt too long")
81 return stringToNumber(sha.sha(salt + sha.sha(username + ":" + password)\
88 salt = bytesToString(getRandomBytes(16))
89 x = makeX(salt, username, password)
91 return N, g, salt, verifier
  /external/chromium/chrome/browser/autofill/
autofill_ie_toolbar_import_win.cc 37 const wchar_t* const kSaltValue = L"salt";
53 bool IsEmptySalt(std::wstring const& salt) {
54 // Empty salt in IE Toolbar is \x1\x2...\x14
55 if (salt.length() != 20)
57 for (size_t i = 0; i < salt.length(); ++i) {
58 if (salt[i] != i + 1)
231 string16 salt; local
235 salt = ReadAndDecryptValue(&cc_key, kSaltValue);
239 if (password_hash.empty() && IsEmptySalt(salt)) {
  /frameworks/base/include/androidfw/
ObbFile.h 84 bool setSalt(const unsigned char* salt, size_t length) {
89 memcpy(mSalt, salt, sizeof(mSalt));
130 /* The encryption salt. */
  /external/chromium/chrome/browser/password_manager/
encryptor_mac.mm 19 // Salt for Symmetric key derivation.
54 std::string salt(kSalt);
56 // Create an encryption key from our password and salt.
60 salt,
  /external/chromium_org/components/webdata/encryptor/
encryptor_mac.mm 21 // Salt for Symmetric key derivation.
56 std::string salt(kSalt);
58 // Create an encryption key from our password and salt.
62 salt,

Completed in 1218 milliseconds

1 23 4 5 6 7 8 91011>>