/external/openssh/ |
md5crypt.c | 45 is_md5_salt(const char *salt) 47 return (strncmp(salt, magic, strlen(magic)) == 0); 51 md5_crypt(const char *pw, const char *salt) 60 /* Refine the Salt first */ 61 sp = salt; 73 /* get the length of the true salt */ 76 /* Stash the salt */ 88 /* Then the raw salt */ 91 /* Then just as many characters of the MD5(pw, salt, pw) */
|
/frameworks/base/core/java/android/content/res/ |
ObbInfo.java | 52 * The salt for the encryption algorithm. 56 public byte[] salt; field in class:ObbInfo 85 dest.writeByteArray(salt); 104 salt = source.createByteArray();
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
PKCS12PBEParams.java | 21 byte[] salt, 24 this.iv = new DEROctetString(salt);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
PKCS12ParametersGenerator.java | 91 if ((salt != null) && (salt.length != 0)) 93 S = new byte[v * ((salt.length + v - 1) / v)]; 97 S[i] = salt[i % salt.length]; 165 * Generate a key parameter derived from the password, salt, and iteration 183 * the password, salt, and iteration count we are currently initialised 206 * salt, and iteration count we are currently initialised with.
|
PKCS5S2ParametersGenerator.java | 100 F(salt, iterationCount, iBuf, outBytes, outPos); 108 * Generate a key parameter derived from the password, salt, and iteration 126 * the password, salt, and iteration count we are currently initialised 147 * salt, and iteration count we are currently initialised with.
|
/external/chromium/crypto/ |
symmetric_key_unittest.cc | 71 const char* salt; member in struct:PBKDF2TestVector 84 // The OS X crypto libraries have minimum salt and iteration requirements 86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) { 95 test_data.password, test_data.salt, 113 "salt", 121 "salt", 129 "salt", 139 "salt",
|
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/identity/ |
SettingsSecureBasedIdentificationGenerator.java | 31 public String getUniqueId(@Nullable String salt) { 38 new HashUtil.Params(androidId).withSalt(salt));
|
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/util/ |
HashUtil.java | 32 public Params withSalt(String salt) { 33 mSalt = salt;
|
/external/chromium_org/crypto/ |
symmetric_key_unittest.cc | 71 const char* salt; member in struct:PBKDF2TestVector 84 // The OS X crypto libraries have minimum salt and iteration requirements 86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) { 95 test_data.password, test_data.salt, 113 "salt", 121 "salt", 129 "salt", 139 "salt",
|
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
p5_pbe.c | 68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING), 78 const unsigned char *salt, int saltlen) 99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) 104 sstr = ASN1_STRING_data(pbe->salt); 105 if (salt) 106 memcpy(sstr, salt, saltlen); 133 const unsigned char *salt, int saltlen) 143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
p5_pbev2.c | 75 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY), 90 unsigned char *salt, int saltlen, 158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 195 unsigned char *salt, int saltlen) 197 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1); 200 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, 212 kdf->salt->value.octet_string = osalt; 213 kdf->salt->type = V_ASN1_OCTET_STRING; 222 if (salt) 223 memcpy (osalt->data, salt, saltlen) [all...] |
/external/openssl/crypto/asn1/ |
p5_pbe.c | 68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING), 78 const unsigned char *salt, int saltlen) 99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) 104 sstr = ASN1_STRING_data(pbe->salt); 105 if (salt) 106 memcpy(sstr, salt, saltlen); 133 const unsigned char *salt, int saltlen) 143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
p5_pbev2.c | 75 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY), 90 unsigned char *salt, int saltlen, 158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 195 unsigned char *salt, int saltlen) 197 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1); 200 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, 212 kdf->salt->value.octet_string = osalt; 213 kdf->salt->type = V_ASN1_OCTET_STRING; 222 if (salt) 223 memcpy (osalt->data, salt, saltlen) [all...] |
/external/wpa_supplicant_8/src/tls/ |
pkcs5.c | 23 u8 salt[8]; member in struct:pkcs5_params 77 * salt OCTET STRING SIZE(8), 92 /* salt OCTET STRING SIZE(8) */ 98 "(salt) - found class %d tag 0x%x size %d", 103 os_memcpy(params->salt, hdr.payload, hdr.length); 105 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", 106 params->salt, params->salt_len); 152 addr[1] = params->salt;
|
/libcore/luni/src/main/java/java/security/spec/ |
PSSParameterSpec.java | 35 * <li>salt length: {@code 20}</li> 49 // Salt length in bits 53 * Creates a new {@code PSSParameterSpec} with the specified salt length 57 * the salt length (in bits). 75 * salt length, and trailer field value. 84 * the salt length (in bits). 113 * Returns the length of the salt (in bits). 115 * @return the length of the salt (in bits).
|
/libcore/luni/src/main/java/javax/crypto/interfaces/ |
PBEKey.java | 40 * Returns a copy of the salt data or null if not specified. 42 * @return a copy of the salt data or null if not specified.
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
p5_crpt2.c | 81 const unsigned char *salt, int saltlen, int iter, 115 || !HMAC_Update(&hctx, salt, saltlen) 138 fprintf(stderr, "Salt:\n"); 139 h__dump (salt, saltlen); 148 const unsigned char *salt, int saltlen, int iter, 151 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), 159 unsigned char salt[] = {0x12, 0x34, 0x56, 0x78}; local 160 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out); 234 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; local 295 if(kdf->salt->type != V_ASN1_OCTET_STRING) [all...] |
/external/openssl/crypto/evp/ |
p5_crpt2.c | 81 const unsigned char *salt, int saltlen, int iter, 115 || !HMAC_Update(&hctx, salt, saltlen) 138 fprintf(stderr, "Salt:\n"); 139 h__dump (salt, saltlen); 148 const unsigned char *salt, int saltlen, int iter, 151 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), 159 unsigned char salt[] = {0x12, 0x34, 0x56, 0x78}; local 160 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out); 234 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; local 295 if(kdf->salt->type != V_ASN1_OCTET_STRING) [all...] |
/external/chromium/chrome/common/ |
visitedlink_common.h | 15 // number of bytes in the salt 42 // a salt value for the links on one computer so that an attacker can not 90 uint8 salt[LINK_SALT_LENGTH]; member in struct:VisitedLinkCommon::SharedHeader 104 // pass the salt as a parameter. See the non-static version above if you 105 // want to use the current class' salt. 108 const uint8 salt[LINK_SALT_LENGTH]); 128 // salt used for each URL when computing the fingerprint
|
/external/chromium_org/components/visitedlink/common/ |
visitedlink_common.h | 16 // number of bytes in the salt 43 // a salt value for the links on one computer so that an attacker can not 91 uint8 salt[LINK_SALT_LENGTH]; member in struct:visitedlink::VisitedLinkCommon::SharedHeader 105 // pass the salt as a parameter. See the non-static version above if you 106 // want to use the current class' salt. 109 const uint8 salt[LINK_SALT_LENGTH]); 129 // salt used for each URL when computing the fingerprint
|
/external/chromium_org/third_party/tlslite/tlslite/ |
mathtls.py | 76 def makeX(salt, username, password): 79 if len(salt)>=256: 80 raise ValueError("salt too long") 81 return stringToNumber(sha.sha(salt + sha.sha(username + ":" + password)\ 88 salt = bytesToString(getRandomBytes(16)) 89 x = makeX(salt, username, password) 91 return N, g, salt, verifier
|
/external/chromium/chrome/browser/autofill/ |
autofill_ie_toolbar_import_win.cc | 37 const wchar_t* const kSaltValue = L"salt"; 53 bool IsEmptySalt(std::wstring const& salt) { 54 // Empty salt in IE Toolbar is \x1\x2...\x14 55 if (salt.length() != 20) 57 for (size_t i = 0; i < salt.length(); ++i) { 58 if (salt[i] != i + 1) 231 string16 salt; local 235 salt = ReadAndDecryptValue(&cc_key, kSaltValue); 239 if (password_hash.empty() && IsEmptySalt(salt)) {
|
/frameworks/base/include/androidfw/ |
ObbFile.h | 84 bool setSalt(const unsigned char* salt, size_t length) { 89 memcpy(mSalt, salt, sizeof(mSalt)); 130 /* The encryption salt. */
|
/external/chromium/chrome/browser/password_manager/ |
encryptor_mac.mm | 19 // Salt for Symmetric key derivation. 54 std::string salt(kSalt); 56 // Create an encryption key from our password and salt. 60 salt,
|
/external/chromium_org/components/webdata/encryptor/ |
encryptor_mac.mm | 21 // Salt for Symmetric key derivation. 56 std::string salt(kSalt); 58 // Create an encryption key from our password and salt. 62 salt,
|