HomeSort by relevance Sort by last modified time
    Searched full:salt (Results 26 - 50 of 262) sorted by null

12 3 4 5 6 7 8 91011

  /frameworks/base/tools/obbtool/
Main.cpp 44 {"salt", required_argument, NULL, 's'},
57 memset(&salt, 0, sizeof(salt));
64 unsigned char salt[SALT_LEN]; member in class:PackageInfo
82 " -s <8 byte hex salt> sets the crypto key salt (if encrypted)\n"
103 obb->setSalt(info->salt, SALT_LEN);
142 printf(" Salt: ");
145 const unsigned char* salt = obb->getSalt(&saltLen); local
146 if (salt != NULL)
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
PKCS5S1ParametersGenerator.java 35 * the derived key function, the ith hash of the password and the salt.
42 digest.update(salt, 0, salt.length);
55 * Generate a key parameter derived from the password, salt, and iteration
80 * the password, salt, and iteration count we are currently initialised
108 * salt, and iteration count we are currently initialised with.
PKCS12ParametersGenerator.java 91 if ((salt != null) && (salt.length != 0))
93 S = new byte[v * ((salt.length + v - 1) / v)];
97 S[i] = salt[i % salt.length];
165 * Generate a key parameter derived from the password, salt, and iteration
183 * the password, salt, and iteration count we are currently initialised
206 * salt, and iteration count we are currently initialised with.
PKCS5S2ParametersGenerator.java 100 F(salt, iterationCount, iBuf, outBytes, outPos);
108 * Generate a key parameter derived from the password, salt, and iteration
126 * the password, salt, and iteration count we are currently initialised
147 * salt, and iteration count we are currently initialised with.
  /external/openssh/openbsd-compat/
port-uw.c 57 char *salt; local
67 /* Encrypt the candidate password using the proper salt. */
68 salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx";
76 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0)
77 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0));
81 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/
BcKeyStoreSpi.java 142 byte[] salt = new byte[KEY_SALT_SIZE];
145 random.nextBytes(salt);
153 dOut.writeInt(salt.length);
154 dOut.write(salt);
157 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount);
229 byte[] salt = new byte[dIn.readInt()];
231 dIn.readFully(salt);
235 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount);
248 salt = new byte[dIn.readInt()];
250 dIn.readFully(salt);
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/
CipherPBEThread.java 39 byte[] salt = new byte[8];
49 sr.nextBytes(salt);
50 PBEParameterSpec parSpec = new PBEParameterSpec(salt, getKeyLength());
  /external/openssh/
md5crypt.c 45 is_md5_salt(const char *salt)
47 return (strncmp(salt, magic, strlen(magic)) == 0);
51 md5_crypt(const char *pw, const char *salt)
60 /* Refine the Salt first */
61 sp = salt;
73 /* get the length of the true salt */
76 /* Stash the salt */
88 /* Then the raw salt */
91 /* Then just as many characters of the MD5(pw, salt, pw) */
  /frameworks/base/core/java/android/content/res/
ObbInfo.java 52 * The salt for the encryption algorithm.
56 public byte[] salt; field in class:ObbInfo
85 dest.writeByteArray(salt);
104 salt = source.createByteArray();
  /external/boringssl/src/crypto/pkcs8/
p5_pbe.c 70 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
80 const unsigned char *salt, int saltlen)
101 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
106 sstr = ASN1_STRING_data(pbe->salt);
107 if (salt)
108 memcpy(sstr, salt, saltlen);
135 const unsigned char *salt, int saltlen)
145 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
p5_pbev2.c 79 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY),
115 unsigned char *salt, int saltlen,
181 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen);
218 unsigned char *salt, int saltlen)
220 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1);
223 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen,
235 kdf->salt->value.octet_string = osalt;
236 kdf->salt->type = V_ASN1_OCTET_STRING;
245 if (salt)
246 memcpy (osalt->data, salt, saltlen)
    [all...]
  /external/boringssl/src/include/openssl/
hkdf.h 26 * with |salt| and |info| using |digest|, and outputs |out_len| bytes to
34 const uint8_t *salt, size_t salt_len,
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
PKCS12PBEParams.java 21 byte[] salt,
24 this.iv = new DEROctetString(salt);
  /external/wpa_supplicant_8/src/tls/
pkcs5.c 23 u8 salt[8]; member in struct:pkcs5_params
77 * salt OCTET STRING SIZE(8),
92 /* salt OCTET STRING SIZE(8) */
98 "(salt) - found class %d tag 0x%x size %d",
103 os_memcpy(params->salt, hdr.payload, hdr.length);
105 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt",
106 params->salt, params->salt_len);
152 addr[1] = params->salt;
  /libcore/luni/src/main/java/java/security/spec/
PSSParameterSpec.java 35 * <li>salt length: {@code 20}</li>
49 // Salt length in bits
53 * Creates a new {@code PSSParameterSpec} with the specified salt length
57 * the salt length (in bits).
75 * salt length, and trailer field value.
84 * the salt length (in bits).
113 * Returns the length of the salt (in bits).
115 * @return the length of the salt (in bits).
  /libcore/luni/src/main/java/javax/crypto/interfaces/
PBEKey.java 40 * Returns a copy of the salt data or null if not specified.
42 * @return a copy of the salt data or null if not specified.
  /external/llvm/lib/Support/
RandomNumberGenerator.cpp 33 RandomNumberGenerator::RandomNumberGenerator(StringRef Salt) {
40 // Data: Seed-low, Seed-high, Salt
45 Data.reserve(2 + Salt.size());
49 std::copy(Salt.begin(), Salt.end(), Data.end());
  /system/gatekeeper/
gatekeeper.cpp 88 salt_t salt; local
89 GetRandom(&salt, sizeof(salt));
93 salt, user_id, flags, HANDLE_VERSION, request.provided_password.buffer.get(),
167 bool GateKeeper::CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt,
176 password_handle->salt = salt;
195 password_key, password_key_length, to_sign, sizeof(to_sign), salt);
203 if (!CreatePasswordHandle(&provided_handle, expected_handle->salt, expected_handle->user_id,
  /external/boringssl/src/crypto/hkdf/
hkdf.c 27 const uint8_t *salt, size_t salt_len,
37 /* If salt is not given, HashLength zeros are used. However, HMAC does that
50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) {
  /frameworks/base/include/androidfw/
ObbFile.h 84 bool setSalt(const unsigned char* salt, size_t length) {
89 memcpy(mSalt, salt, sizeof(mSalt));
130 /* The encryption salt. */
  /system/keymaster/
hkdf_test.cpp 71 const string salt = hex2str(test.salt_hex); local
78 reinterpret_cast<const uint8_t*>(salt.data()), salt.size(),
  /external/scrypt/patches/
use_openssl_pbkdf2.patch 22 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B);
24 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
62 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B);
64 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
  /external/vboot_reference/scripts/image_signing/sample-test-configs/
ensure_no_nonrelease_files.config 17 # any cryptohome-related weaknesses e.g. everyone using the same salt.
  /system/gatekeeper/include/gatekeeper/
password_handle.h 40 salt_t salt; member in struct:gatekeeper::password_handle_t
  /external/boringssl/src/crypto/evp/
pbkdf_test.cc 35 const void *salt, size_t salt_len, unsigned iterations,
46 (const uint8_t *)salt, salt_len, iterations, digest,
73 if (!TestPBKDF2(NULL, 0, "salt", 4, 1, EVP_sha1(), sizeof(kKey), kKey) ||
74 !TestPBKDF2("", 0, "salt", 4, 1, EVP_sha1(), sizeof(kKey), kKey)) {
81 // Tests deriving a key using an empty salt. Note that the expectation was
110 if (!TestPBKDF2("password", 8, "salt", 4, 1, EVP_sha1(), sizeof(kKey1),
112 !TestPBKDF2("password", 8, "salt", 4, 2, EVP_sha1(), sizeof(kKey2),
141 if (!TestPBKDF2("password", 8, "salt", 4, 2, EVP_sha256(), sizeof(kKey1),

Completed in 399 milliseconds

12 3 4 5 6 7 8 91011