/libcore/luni/src/main/java/java/security/spec/ |
PSSParameterSpec.java | 50 private final int saltLen; 56 * @param saltLen 59 * if {@code saltLen} is negative. 61 public PSSParameterSpec(int saltLen) { 62 if (saltLen < 0) { 63 throw new IllegalArgumentException("saltLen < 0"); 65 this.saltLen = saltLen; 83 * @param saltLen 88 * if {@code saltLen} or {@code trailerField} is negative [all...] |
/frameworks/base/core/jni/ |
android_content_res_ObbScanner.cpp | 65 size_t saltLen; 66 const unsigned char* salt = obb->getSalt(&saltLen); 67 if (saltLen > 0) { 68 jbyteArray saltArray = env->NewByteArray(saltLen); 69 env->SetByteArrayRegion(saltArray, 0, saltLen, (jbyte*)salt);
|
/external/openssl/crypto/pkcs12/ |
p12_mutl.c | 73 int saltlen, iter; local 83 saltlen = p12->mac->salt->length; 94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, 170 if (!saltlen) saltlen = PKCS12_SALT_LEN; 171 p12->mac->salt->length = saltlen; 172 if (!(p12->mac->salt->data = OPENSSL_malloc (saltlen))) { [all...] |
p12_key.c | 78 int saltlen, int id, int iter, int n, unsigned char *out, 92 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen, 104 int saltlen, int id, int iter, int n, unsigned char *out, 131 fprintf(stderr, "Salt (length %d):\n", saltlen); 132 h__dump(salt, saltlen); 141 Slen = v * ((saltlen+v-1)/v); 152 for (i = 0; i < Slen; i++) *p++ = salt[i % saltlen];
|
p12_p8e.c | 65 unsigned char *salt, int saltlen, int iter, 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
|
p12_crpt.c | 73 int saltlen, iter, ret; local 94 saltlen = pbe->salt->length; 95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
pkcs12.h | 183 unsigned char *salt, int saltlen, int iter, 187 int saltlen, int iter, 192 unsigned char *salt, int saltlen, int iter, 219 int saltlen, int id, int iter, int n, 221 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 229 unsigned char *salt, int saltlen, int iter, 232 int saltlen, const EVP_MD *md_type);
|
p12_add.c | 105 int passlen, unsigned char *salt, int saltlen, int iter, 125 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, 169 unsigned char *salt, int saltlen, int iter, 188 pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen); 190 pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
|
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
p5_pbev2.c | 114 unsigned char *salt, int saltlen, 180 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 217 unsigned char *salt, int saltlen) 219 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1); 222 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, 237 if (!saltlen) 238 saltlen = PKCS5_SALT_LEN; 239 if (!(osalt->data = OPENSSL_malloc (saltlen))) 242 osalt->length = saltlen; 245 memcpy (osalt->data, salt, saltlen); [all...] |
p5_pbe.c | 78 const unsigned char *salt, int saltlen) 97 if (!saltlen) 98 saltlen = PKCS5_SALT_LEN; 99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) 106 memcpy(sstr, salt, saltlen); 107 else if (RAND_pseudo_bytes(sstr, saltlen) < 0) 133 const unsigned char *salt, int saltlen) 143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/external/openssl/crypto/asn1/ |
p5_pbev2.c | 90 unsigned char *salt, int saltlen, 158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 195 unsigned char *salt, int saltlen) 197 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1); 200 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, 215 if (!saltlen) 216 saltlen = PKCS5_SALT_LEN; 217 if (!(osalt->data = OPENSSL_malloc (saltlen))) 220 osalt->length = saltlen; 223 memcpy (osalt->data, salt, saltlen); [all...] |
p5_pbe.c | 78 const unsigned char *salt, int saltlen) 97 if (!saltlen) 98 saltlen = PKCS5_SALT_LEN; 99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) 106 memcpy(sstr, salt, saltlen); 107 else if (RAND_pseudo_bytes(sstr, saltlen) < 0) 133 const unsigned char *salt, int saltlen) 143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/frameworks/base/libs/androidfw/tests/ |
ObbFile_test.cpp | 86 size_t saltLen; 87 const unsigned char* newSalt = mObbFile->getSalt(&saltLen); 89 EXPECT_EQ(sizeof(salt), saltLen)
|
/external/scrypt/patches/ |
use_openssl_pbkdf2.patch | 22 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); 24 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r); 62 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); 64 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
|
/external/scrypt/lib/crypto/ |
crypto_scrypt.h | 35 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen): 36 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r,
|
crypto_scrypt-neon.c | 184 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen): 185 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r, 194 const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p, 267 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); 269 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
|
crypto_scrypt-ref.c | 211 * crypto_scrypt(passwd, passwdlen, salt, saltlen, N, r, p, buf, buflen): 212 * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r, 221 const uint8_t * salt, size_t saltlen, uint64_t N, uint32_t r, uint32_t p, 263 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); 265 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
|
/external/openssl/crypto/rsa/ |
rsa_ameth.c | 465 int saltlen; local 521 saltlen = ASN1_INTEGER_get(pss->saltLength); 526 if (saltlen < 0) 533 saltlen = 20; 552 if (EVP_PKEY_CTX_set_rsa_pss_saltlen(pkctx, saltlen) <= 0) 584 int saltlen, rv = 0; local 588 if (!EVP_PKEY_CTX_get_rsa_pss_saltlen(pkctx, &saltlen)) 590 if (saltlen == -1) 591 saltlen = EVP_MD_size(sigmd); 592 else if (saltlen == -2 [all...] |
rsa_pmeth.c | 91 int saltlen; member in struct:__anon12046 109 rctx->saltlen = -2; 215 rctx->saltlen, 264 rctx->saltlen)) 364 rctx->saltlen, 390 rctx->tbuf, rctx->saltlen); 515 *(int *)p2 = rctx->saltlen; 520 rctx->saltlen = p1; 631 int saltlen; local 632 saltlen = atoi(value) [all...] |
/external/openssl/crypto/evp/ |
p5_crpt2.c | 81 const unsigned char *salt, int saltlen, int iter, 124 if (!HMAC_Update(&hctx, salt, saltlen) 161 h__dump (salt, saltlen); 170 const unsigned char *salt, int saltlen, int iter, 173 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), 258 int saltlen, iter, plen; local 325 saltlen = kdf->salt->value.octet_string->length; 327 if(!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd,
|
p5_crpt.c | 81 int saltlen, iter; local 104 saltlen = pbe->salt->length; 113 if (!EVP_DigestUpdate(&ctx, salt, saltlen))
|
/external/openssl/include/openssl/ |
pkcs12.h | 183 unsigned char *salt, int saltlen, int iter, 187 int saltlen, int iter, 192 unsigned char *salt, int saltlen, int iter, 219 int saltlen, int id, int iter, int n, 221 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type); 229 unsigned char *salt, int saltlen, int iter, 232 int saltlen, const EVP_MD *md_type);
|
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
p_rsa_asn1.c | 533 int saltlen, rv = 0; local 537 !EVP_PKEY_CTX_get_rsa_pss_saltlen(pkctx, &saltlen)) { 541 if (saltlen == -1) { 542 saltlen = EVP_MD_size(sigmd); 543 } else if (saltlen == -2) { 544 saltlen = EVP_PKEY_size(pk) - EVP_MD_size(sigmd) - 2; 546 saltlen--; 557 if (saltlen != 20) { 560 !ASN1_INTEGER_set(pss->saltLength, saltlen)) { 592 int saltlen; local [all...] |
p_rsa.c | 81 int saltlen; member in struct:__anon16256 100 rctx->saltlen = -2; 209 rctx->mgf1md, rctx->saltlen) || 242 rctx->tbuf, rctx->saltlen)) { 390 *(int *)p2 = rctx->saltlen; 395 rctx->saltlen = p1;
|
/external/openssl/crypto/pem/ |
pvkfmt.c | 708 const unsigned char *salt, unsigned int saltlen, 715 || !EVP_DigestUpdate(&mctx, salt, saltlen) 726 unsigned int saltlen, unsigned int keylen, 735 if (saltlen) 755 if (!derive_pvk_key(keybuf, p, saltlen, 758 p += saltlen; 804 if (enctmp && saltlen) 816 unsigned int saltlen, keylen; local 824 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen)) 826 buflen = (int) keylen + saltlen; [all...] |