HomeSort by relevance Sort by last modified time
    Searched full:saltlen (Results 1 - 25 of 60) sorted by null

1 2 3

  /libcore/luni/src/main/java/java/security/spec/
PSSParameterSpec.java 50 private final int saltLen;
56 * @param saltLen
59 * if {@code saltLen} is negative.
61 public PSSParameterSpec(int saltLen) {
62 if (saltLen < 0) {
63 throw new IllegalArgumentException("saltLen < 0");
65 this.saltLen = saltLen;
83 * @param saltLen
88 * if {@code saltLen} or {@code trailerField} is negative
    [all...]
  /external/dropbear/libtomcrypt/src/pk/pkcs1/
pkcs_1_pss_encode.c 24 @param saltlen The length of the salt desired (octets)
34 unsigned long saltlen, prng_state *prng,
60 if ((saltlen > modulus_len) || (modulus_len < hLen + saltlen + 2)) {
87 if (saltlen > 0) {
88 if (prng_descriptor[prng_idx].read(salt, saltlen, prng) != saltlen) {
105 if ((err = hash_descriptor[hash_idx].process(&md, salt, saltlen)) != CRYPT_OK) {
112 /* generate DB = PS || 0x01 || salt, PS == modulus_len - saltlen - hLen - 2 zero bytes */
114 XMEMSET(DB + x, 0, modulus_len - saltlen - hLen - 2)
    [all...]
pkcs_1_pss_decode.c 26 @param saltlen The length of the salt used (octets)
34 unsigned long saltlen, int hash_idx,
57 if ((saltlen > modulus_len) ||
58 (modulus_len < hLen + saltlen + 2) || (siglen != modulus_len)) {
117 /* DB = PS || 0x01 || salt, PS == modulus_len - saltlen - hLen - 2 zero bytes */
120 for (x = 0; x < modulus_len - saltlen - hLen - 2; x++) {
144 if ((err = hash_descriptor[hash_idx].process(&md, DB+x, saltlen)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/testprof/
pkcs_1_test.c 9 unsigned long x, y, l1, l2, l3, i1, i2, lparamlen, saltlen, modlen; local
33 /* pick a random saltlen 0..16 */
34 saltlen = abs(rand()) % 17;
63 DO(pkcs_1_pss_encode(buf[0], l3, saltlen, &yarrow_prng, prng_idx, hash_idx, modlen, buf[1], &l1));
64 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res1));
67 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res2));
71 pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res3);
73 fprintf(stderr, "PSS failed: %d, %d, %d, %lu, %lu\n", res1, res2, res3, l3, saltlen);
  /frameworks/base/core/jni/
android_content_res_ObbScanner.cpp 65 size_t saltLen;
66 const unsigned char* salt = obb->getSalt(&saltLen);
67 if (saltLen > 0) {
68 jbyteArray saltArray = env->NewByteArray(saltLen);
69 env->SetByteArrayRegion(saltArray, 0, saltLen, (jbyte*)salt);
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
p12_mutl.c 73 int saltlen, iter; local
83 saltlen = p12->mac->salt->length;
94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type)
139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) ==
156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen,
170 if (!saltlen) saltlen = PKCS12_SALT_LEN;
171 p12->mac->salt->length = saltlen;
172 if (!(p12->mac->salt->data = OPENSSL_malloc (saltlen))) {
    [all...]
p12_key.c 78 int saltlen, int id, int iter, int n, unsigned char *out,
92 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen,
104 int saltlen, int id, int iter, int n, unsigned char *out,
131 fprintf(stderr, "Salt (length %d):\n", saltlen);
132 h__dump(salt, saltlen);
141 Slen = v * ((saltlen+v-1)/v);
152 for (i = 0; i < Slen; i++) *p++ = salt[i % saltlen];
p12_p8e.c 65 unsigned char *salt, int saltlen, int iter,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
  /external/openssl/crypto/pkcs12/
p12_mutl.c 73 int saltlen, iter; local
83 saltlen = p12->mac->salt->length;
94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type)
139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) ==
156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen,
170 if (!saltlen) saltlen = PKCS12_SALT_LEN;
171 p12->mac->salt->length = saltlen;
172 if (!(p12->mac->salt->data = OPENSSL_malloc (saltlen))) {
    [all...]
p12_key.c 78 int saltlen, int id, int iter, int n, unsigned char *out,
92 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen,
104 int saltlen, int id, int iter, int n, unsigned char *out,
131 fprintf(stderr, "Salt (length %d):\n", saltlen);
132 h__dump(salt, saltlen);
141 Slen = v * ((saltlen+v-1)/v);
152 for (i = 0; i < Slen; i++) *p++ = salt[i % saltlen];
p12_p8e.c 65 unsigned char *salt, int saltlen, int iter,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
  /external/chromium_org/third_party/openssl/openssl/crypto/asn1/
p5_pbev2.c 90 unsigned char *salt, int saltlen,
158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen);
195 unsigned char *salt, int saltlen)
197 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1);
200 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen,
215 if (!saltlen)
216 saltlen = PKCS5_SALT_LEN;
217 if (!(osalt->data = OPENSSL_malloc (saltlen)))
220 osalt->length = saltlen;
223 memcpy (osalt->data, salt, saltlen);
    [all...]
p5_pbe.c 78 const unsigned char *salt, int saltlen)
97 if (!saltlen)
98 saltlen = PKCS5_SALT_LEN;
99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
106 memcpy(sstr, salt, saltlen);
107 else if (RAND_pseudo_bytes(sstr, saltlen) < 0)
133 const unsigned char *salt, int saltlen)
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
  /external/openssl/crypto/asn1/
p5_pbev2.c 90 unsigned char *salt, int saltlen,
158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen);
195 unsigned char *salt, int saltlen)
197 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1);
200 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen,
215 if (!saltlen)
216 saltlen = PKCS5_SALT_LEN;
217 if (!(osalt->data = OPENSSL_malloc (saltlen)))
220 osalt->length = saltlen;
223 memcpy (osalt->data, salt, saltlen);
    [all...]
p5_pbe.c 78 const unsigned char *salt, int saltlen)
97 if (!saltlen)
98 saltlen = PKCS5_SALT_LEN;
99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
106 memcpy(sstr, salt, saltlen);
107 else if (RAND_pseudo_bytes(sstr, saltlen) < 0)
133 const unsigned char *salt, int saltlen)
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
  /frameworks/base/libs/androidfw/tests/
ObbFile_test.cpp 88 size_t saltLen;
89 const unsigned char* newSalt = mObbFile->getSalt(&saltLen);
91 EXPECT_EQ(sizeof(salt), saltLen)
  /external/scrypt/patches/
use_openssl_pbkdf2.patch 22 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B);
24 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
62 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B);
64 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
  /external/scrypt/lib/crypto/
crypto_scrypt.h 35 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen):
36 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
  /external/chromium_org/third_party/openssl/openssl/crypto/rsa/
rsa_ameth.c 465 int saltlen; local
521 saltlen = ASN1_INTEGER_get(pss->saltLength);
526 if (saltlen < 0)
533 saltlen = 20;
552 if (EVP_PKEY_CTX_set_rsa_pss_saltlen(pkctx, saltlen) <= 0)
584 int saltlen, rv = 0; local
588 if (!EVP_PKEY_CTX_get_rsa_pss_saltlen(pkctx, &saltlen))
590 if (saltlen == -1)
591 saltlen = EVP_MD_size(sigmd);
592 else if (saltlen == -2
    [all...]
  /external/openssl/crypto/rsa/
rsa_ameth.c 465 int saltlen; local
521 saltlen = ASN1_INTEGER_get(pss->saltLength);
526 if (saltlen < 0)
533 saltlen = 20;
552 if (EVP_PKEY_CTX_set_rsa_pss_saltlen(pkctx, saltlen) <= 0)
584 int saltlen, rv = 0; local
588 if (!EVP_PKEY_CTX_get_rsa_pss_saltlen(pkctx, &saltlen))
590 if (saltlen == -1)
591 saltlen = EVP_MD_size(sigmd);
592 else if (saltlen == -2
    [all...]
  /external/grub/stage2/
md5.c 212 int saltlen; local
224 saltlen = strstr (salt, "$") - salt;
230 saltlen = end - salt;
232 saltlen = 8;
234 salt[saltlen] = '$';
239 md5_update (salt, saltlen);
247 md5_update (crypted, 3 + saltlen); /* include the $1$ header */
268 md5_update (salt, saltlen);
280 p = salt + saltlen + 1;
  /external/dropbear/libtomcrypt/src/pk/rsa/
rsa_sign_hash.c 30 @param saltlen The length of the salt desired (octets)
38 int hash_idx, unsigned long saltlen,
77 if ((err = pkcs_1_pss_encode(in, inlen, saltlen, prng, prng_idx,
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
p5_crpt2.c 81 const unsigned char *salt, int saltlen, int iter,
115 || !HMAC_Update(&hctx, salt, saltlen)
139 h__dump (salt, saltlen);
148 const unsigned char *salt, int saltlen, int iter,
151 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(),
236 int saltlen, iter, plen; local
303 saltlen = kdf->salt->value.octet_string->length;
305 if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd,
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_pkcs.h 58 unsigned long saltlen, prng_state *prng,
65 unsigned long saltlen, int hash_idx,
  /external/openssl/crypto/evp/
p5_crpt2.c 81 const unsigned char *salt, int saltlen, int iter,
115 || !HMAC_Update(&hctx, salt, saltlen)
139 h__dump (salt, saltlen);
148 const unsigned char *salt, int saltlen, int iter,
151 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(),
236 int saltlen, iter, plen; local
303 saltlen = kdf->salt->value.octet_string->length;
305 if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd,

Completed in 306 milliseconds

1 2 3