/frameworks/base/tools/obbtool/ |
Main.cpp | 44 {"salt", required_argument, NULL, 's'}, 57 memset(&salt, 0, sizeof(salt)); 64 unsigned char salt[SALT_LEN]; member in class:PackageInfo 82 " -s <8 byte hex salt> sets the crypto key salt (if encrypted)\n" 103 obb->setSalt(info->salt, SALT_LEN); 142 printf(" Salt: "); 145 const unsigned char* salt = obb->getSalt(&saltLen); local 146 if (salt != NULL) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
PKCS5S1ParametersGenerator.java | 35 * the derived key function, the ith hash of the password and the salt. 42 digest.update(salt, 0, salt.length); 55 * Generate a key parameter derived from the password, salt, and iteration 80 * the password, salt, and iteration count we are currently initialised 108 * salt, and iteration count we are currently initialised with.
|
PKCS12ParametersGenerator.java | 91 if ((salt != null) && (salt.length != 0)) 93 S = new byte[v * ((salt.length + v - 1) / v)]; 97 S[i] = salt[i % salt.length]; 165 * Generate a key parameter derived from the password, salt, and iteration 183 * the password, salt, and iteration count we are currently initialised 206 * salt, and iteration count we are currently initialised with.
|
PKCS5S2ParametersGenerator.java | 100 F(salt, iterationCount, iBuf, outBytes, outPos); 108 * Generate a key parameter derived from the password, salt, and iteration 126 * the password, salt, and iteration count we are currently initialised 147 * salt, and iteration count we are currently initialised with.
|
/external/openssh/openbsd-compat/ |
port-uw.c | 57 char *salt; local 67 /* Encrypt the candidate password using the proper salt. */ 68 salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx"; 76 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0) 77 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0)); 81 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/ |
BcKeyStoreSpi.java | 142 byte[] salt = new byte[KEY_SALT_SIZE]; 145 random.nextBytes(salt); 153 dOut.writeInt(salt.length); 154 dOut.write(salt); 157 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); 229 byte[] salt = new byte[dIn.readInt()]; 231 dIn.readFully(salt); 235 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); 248 salt = new byte[dIn.readInt()]; 250 dIn.readFully(salt); [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherPBEThread.java | 39 byte[] salt = new byte[8]; 49 sr.nextBytes(salt); 50 PBEParameterSpec parSpec = new PBEParameterSpec(salt, getKeyLength());
|
/external/openssh/ |
md5crypt.c | 45 is_md5_salt(const char *salt) 47 return (strncmp(salt, magic, strlen(magic)) == 0); 51 md5_crypt(const char *pw, const char *salt) 60 /* Refine the Salt first */ 61 sp = salt; 73 /* get the length of the true salt */ 76 /* Stash the salt */ 88 /* Then the raw salt */ 91 /* Then just as many characters of the MD5(pw, salt, pw) */
|
/frameworks/base/core/java/android/content/res/ |
ObbInfo.java | 52 * The salt for the encryption algorithm. 56 public byte[] salt; field in class:ObbInfo 85 dest.writeByteArray(salt); 104 salt = source.createByteArray();
|
/external/boringssl/src/crypto/pkcs8/ |
p5_pbe.c | 70 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING), 80 const unsigned char *salt, int saltlen) 101 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) 106 sstr = ASN1_STRING_data(pbe->salt); 107 if (salt) 108 memcpy(sstr, salt, saltlen); 135 const unsigned char *salt, int saltlen) 145 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
p5_pbev2.c | 79 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY), 115 unsigned char *salt, int saltlen, 181 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); 218 unsigned char *salt, int saltlen) 220 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1); 223 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, 235 kdf->salt->value.octet_string = osalt; 236 kdf->salt->type = V_ASN1_OCTET_STRING; 245 if (salt) 246 memcpy (osalt->data, salt, saltlen) [all...] |
/external/boringssl/src/include/openssl/ |
hkdf.h | 26 * with |salt| and |info| using |digest|, and outputs |out_len| bytes to 34 const uint8_t *salt, size_t salt_len,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
PKCS12PBEParams.java | 21 byte[] salt, 24 this.iv = new DEROctetString(salt);
|
/external/wpa_supplicant_8/src/tls/ |
pkcs5.c | 23 u8 salt[8]; member in struct:pkcs5_params 77 * salt OCTET STRING SIZE(8), 92 /* salt OCTET STRING SIZE(8) */ 98 "(salt) - found class %d tag 0x%x size %d", 103 os_memcpy(params->salt, hdr.payload, hdr.length); 105 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", 106 params->salt, params->salt_len); 152 addr[1] = params->salt;
|
/libcore/luni/src/main/java/java/security/spec/ |
PSSParameterSpec.java | 35 * <li>salt length: {@code 20}</li> 49 // Salt length in bits 53 * Creates a new {@code PSSParameterSpec} with the specified salt length 57 * the salt length (in bits). 75 * salt length, and trailer field value. 84 * the salt length (in bits). 113 * Returns the length of the salt (in bits). 115 * @return the length of the salt (in bits).
|
/libcore/luni/src/main/java/javax/crypto/interfaces/ |
PBEKey.java | 40 * Returns a copy of the salt data or null if not specified. 42 * @return a copy of the salt data or null if not specified.
|
/external/llvm/lib/Support/ |
RandomNumberGenerator.cpp | 33 RandomNumberGenerator::RandomNumberGenerator(StringRef Salt) { 40 // Data: Seed-low, Seed-high, Salt 45 Data.reserve(2 + Salt.size()); 49 std::copy(Salt.begin(), Salt.end(), Data.end());
|
/system/gatekeeper/ |
gatekeeper.cpp | 88 salt_t salt; local 89 GetRandom(&salt, sizeof(salt)); 93 salt, user_id, flags, HANDLE_VERSION, request.provided_password.buffer.get(), 167 bool GateKeeper::CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt, 176 password_handle->salt = salt; 195 password_key, password_key_length, to_sign, sizeof(to_sign), salt); 203 if (!CreatePasswordHandle(&provided_handle, expected_handle->salt, expected_handle->user_id,
|
/external/boringssl/src/crypto/hkdf/ |
hkdf.c | 27 const uint8_t *salt, size_t salt_len, 37 /* If salt is not given, HashLength zeros are used. However, HMAC does that 50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) {
|
/frameworks/base/include/androidfw/ |
ObbFile.h | 84 bool setSalt(const unsigned char* salt, size_t length) { 89 memcpy(mSalt, salt, sizeof(mSalt)); 130 /* The encryption salt. */
|
/system/keymaster/ |
hkdf_test.cpp | 71 const string salt = hex2str(test.salt_hex); local 78 reinterpret_cast<const uint8_t*>(salt.data()), salt.size(),
|
/external/scrypt/patches/ |
use_openssl_pbkdf2.patch | 22 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); 24 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r); 62 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); 64 PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, p * 128 * r);
|
/external/vboot_reference/scripts/image_signing/sample-test-configs/ |
ensure_no_nonrelease_files.config | 17 # any cryptohome-related weaknesses e.g. everyone using the same salt.
|
/system/gatekeeper/include/gatekeeper/ |
password_handle.h | 40 salt_t salt; member in struct:gatekeeper::password_handle_t
|
/external/boringssl/src/crypto/evp/ |
pbkdf_test.cc | 35 const void *salt, size_t salt_len, unsigned iterations, 46 (const uint8_t *)salt, salt_len, iterations, digest, 73 if (!TestPBKDF2(NULL, 0, "salt", 4, 1, EVP_sha1(), sizeof(kKey), kKey) || 74 !TestPBKDF2("", 0, "salt", 4, 1, EVP_sha1(), sizeof(kKey), kKey)) { 81 // Tests deriving a key using an empty salt. Note that the expectation was 110 if (!TestPBKDF2("password", 8, "salt", 4, 1, EVP_sha1(), sizeof(kKey1), 112 !TestPBKDF2("password", 8, "salt", 4, 2, EVP_sha1(), sizeof(kKey2), 141 if (!TestPBKDF2("password", 8, "salt", 4, 2, EVP_sha256(), sizeof(kKey1),
|