HomeSort by relevance Sort by last modified time
    Searched full:salt (Results 1 - 25 of 401) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
PKCS12KeyWithParameters.java 14 private final byte[] salt; field in class:PKCS12KeyWithParameters
21 * @param salt salt for generation algorithm
24 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount)
28 this.salt = Arrays.clone(salt);
38 * @param salt salt for generation algorithm
42 public PKCS12KeyWithParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount)
46 this.salt = Arrays.clone(salt)
    [all...]
  /external/toybox/toys/other/
mkpasswd.c 1 /* mkpasswd.c - encrypt the given passwd using salt
14 usage: mkpasswd [-P FD] [-m TYPE] [-S SALT] [PASSWORD] [SALT]
20 -S SALT
29 char *salt;
34 char salt[MAX_SALT_LEN] = {0,}; local
39 if (TT.salt) error_exit("duplicate salt");
40 TT.salt = toys.optargs[1];
43 if (-1 == (i = get_salt(salt, TT.method))) error_exit("bad -m")
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
PBEParameter.java 18 ASN1OctetString salt; field in class:PBEParameter
21 byte[] salt,
24 if (salt.length != 8)
26 throw new IllegalArgumentException("salt length must be 8");
28 this.salt = new DEROctetString(salt);
35 salt = (ASN1OctetString)seq.getObjectAt(0);
61 return salt.getOctets();
68 v.add(salt);
PBKDF2Params.java 21 * salt CHOICE {
63 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf.
65 * @param salt input salt.
69 byte[] salt,
72 this(salt, iterationCount, 0);
76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf.
78 * @param salt input salt.
83 byte[] salt,
    [all...]
MacData.java 21 byte[] salt; field in class:MacData
44 this.salt = ((ASN1OctetString)seq.getObjectAt(1)).getOctets();
58 byte[] salt,
62 this.salt = salt;
73 return salt;
97 v.add(new DEROctetString(salt));
  /external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/rdtypes/ANY/
NSEC3PARAM.py 31 @ivar salt: the salt
32 @type salt: string"""
34 __slots__ = ['algorithm', 'flags', 'iterations', 'salt']
36 def __init__(self, rdclass, rdtype, algorithm, flags, iterations, salt):
41 self.salt = salt
44 if self.salt == '':
45 salt = '-'
47 salt = self.salt.encode('hex-codec'
    [all...]
NSEC3.py 45 @ivar salt: the salt
46 @type salt: string
52 __slots__ = ['algorithm', 'flags', 'iterations', 'salt', 'next', 'windows']
54 def __init__(self, rdclass, rdtype, algorithm, flags, iterations, salt,
60 self.salt = salt
66 if self.salt == '':
67 salt = '-'
69 salt = self.salt.encode('hex-codec'
    [all...]
  /system/keymaster/
kdf_test.cpp 34 uint8_t salt[128]; local
35 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA1, key, 128, salt, 128));
36 ASSERT_TRUE(kdf.Init(KM_DIGEST_SHA_2_256, key, 128, salt, 128));
38 ASSERT_FALSE(kdf.Init(KM_DIGEST_MD5, key, 128, salt, 128));
39 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 0, salt, 128));
40 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, nullptr, 128, salt, 128));
41 ASSERT_FALSE(kdf.Init(KM_DIGEST_SHA1, key, 0, salt, 128));
hkdf.h 35 bool Init(Buffer& secret, Buffer& salt) {
36 return Init(secret.peek_read(), secret.available_read(), salt.peek_read(),
37 salt.available_read());
40 bool Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len) {
41 return Kdf::Init(KM_DIGEST_SHA_2_256, secret, secret_len, salt, salt_len);
  /system/extras/verity/
build_verity_tree.cpp 23 const unsigned char *salt; member in struct:sparse_hash_ctx
55 const unsigned char *salt, size_t salt_len,
65 ret &= EVP_DigestUpdate(mdctx, salt, salt_len);
79 const unsigned char *salt, size_t salt_size,
85 hash_block(md, in + i, block_size, salt, salt_size, out, &s);
101 ctx->salt, ctx->salt_size, ctx->block_size);
116 " -a,--salt-str=<string> set salt to <string>\n"
117 " -A,--salt-hex=<hex digits> set salt to <hex digits>\n
129 unsigned char *salt = NULL; local
    [all...]
build_verity_metadata.py 40 def build_verity_table(block_device, data_blocks, root_hash, salt):
49 salt)
53 salt, block_device, signer_path, signing_key):
55 verity_table = build_verity_table(block_device, data_blocks, root_hash, salt)
71 salt = sys.argv[4] variable
76 salt, block_device, signer_path, signing_key)
  /libcore/ojluni/src/main/java/javax/crypto/spec/
PBEKeySpec.java 66 private byte[] salt = null; field in class:PBEKeySpec
89 * Constructor that takes a password, salt, iteration count, and
94 * <p> Note: the <code>password</code> and <code>salt</code>
99 * @param salt the salt.
102 * @exception NullPointerException if <code>salt</code> is null.
103 * @exception IllegalArgumentException if <code>salt</code> is empty,
107 public PBEKeySpec(char[] password, byte[] salt, int iterationCount,
114 if (salt == null) {
115 throw new NullPointerException("the salt parameter "
    [all...]
PBEParameterSpec.java 43 private byte[] salt; field in class:PBEParameterSpec
50 * @param salt the salt. The contents of <code>salt</code> are copied
53 * @exception NullPointerException if <code>salt</code> is null.
55 public PBEParameterSpec(byte[] salt, int iterationCount) {
56 this.salt = (byte[])salt.clone();
61 * Returns the salt.
63 * @return the salt. Returns a new arra
    [all...]
  /external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
PBEParameterSpecTest.java 38 * PBEParameterSpec(byte[] salt, int iterationCount) method testing.
43 byte[] salt = { 1, 2, 3, 4, 5 };
49 + "in the case of null salt.");
53 PBEParameterSpec pbeps = new PBEParameterSpec(salt, iterationCount);
54 salt[0]++;
55 assertFalse("The change of salt specified in the constructor "
57 salt[0] == pbeps.getSalt()[0]);
61 * getSalt() method testing. Tests that returned salt is equal
62 * to the salt specified in the constructor and that the change of
66 byte[] salt = new byte[] { 1, 2, 3, 4, 5 }
    [all...]
PBEKeySpecTest.java 60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int
67 byte[] salt = new byte[] { 1, 2, 3, 4, 5 };
72 PBEKeySpec pbeks = new PBEKeySpec(null, salt,
85 + "in the case of null salt.");
94 + "in the case of empty salt.");
99 new PBEKeySpec(password, salt, -1, keyLength);
106 new PBEKeySpec(password, salt, iterationCount, -1);
113 new PBEKeySpec(password, salt, 0, keyLength);
120 new PBEKeySpec(password, salt, iterationCount, 0);
126 PBEKeySpec pbeks = new PBEKeySpec(password, salt,
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/
PBKDF2KeySpec.java 19 * @param salt salt to use in the generator,
24 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf)
26 super(password, salt, iterationCount, keySize);
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
PBEParameterSpecTest.java 38 * PBEParameterSpec(byte[] salt, int iterationCount) method testing.
43 byte[] salt = {1, 2, 3, 4, 5};
49 + "in the case of null salt.");
53 PBEParameterSpec pbeps = new PBEParameterSpec(salt, iterationCount);
54 salt[0] ++;
55 assertFalse("The change of salt specified in the constructor "
57 salt[0] == pbeps.getSalt()[0]);
61 * getSalt() method testing. Tests that returned salt is equal
62 * to the salt specified in the constructor and that the change of
66 byte[] salt = new byte[] {1, 2, 3, 4, 5}
    [all...]
PBEKeySpecTest.java 60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int
67 byte[] salt = new byte[] {1, 2, 3, 4, 5};
72 PBEKeySpec pbeks = new PBEKeySpec(null, salt,
85 + "in the case of null salt.");
94 + "in the case of empty salt.");
99 new PBEKeySpec(password, salt, -1, keyLength);
106 new PBEKeySpec(password, salt, iterationCount, -1);
113 new PBEKeySpec(password, salt, 0, keyLength);
120 new PBEKeySpec(password, salt, iterationCount, 0);
126 PBEKeySpec pbeks = new PBEKeySpec(password, salt,
    [all...]
  /frameworks/base/libs/androidfw/tests/
ObbFile_test.cpp 68 unsigned char salt[SALT_SIZE] = {0x01, 0x10, 0x55, 0xAA, 0xFF, 0x00, 0x5A, 0xA5}; local
69 EXPECT_TRUE(mObbFile->setSalt(salt, SALT_SIZE))
70 << "Salt should be successfully set";
89 EXPECT_EQ(sizeof(salt), saltLen)
90 << "salt sizes were not the same";
92 for (size_t i = 0; i < sizeof(salt); i++) {
93 EXPECT_EQ(salt[i], newSalt[i])
94 << "salt character " << i << " should be equal";
96 EXPECT_TRUE(memcmp(newSalt, salt, sizeof(salt)) == 0
    [all...]
  /frameworks/base/tools/obbtool/
pbkdf2gen.cpp 30 * Will print out the salt and key in hex.
51 unsigned char salt[SALT_LEN]; local
53 if (read(fd, &salt, SALT_LEN) != SALT_LEN) {
54 fprintf(stderr, "Could not read salt from /dev/urandom: %s\n", strerror(errno));
62 if (PKCS5_PBKDF2_HMAC_SHA1(argv[1], strlen(argv[1]), salt, SALT_LEN,
68 printf("salt=");
70 printf("%02x", salt[i]);
  /external/libbrillo/brillo/
cryptohome.cc 29 static char g_system_salt_path[PATH_MAX] = "/home/.shadow/salt";
31 static std::string* salt = nullptr; member in namespace:brillo::cryptohome::home
34 if (salt && !salt->empty())
39 PLOG(ERROR) << "Could not get size of system salt: " << g_system_salt_path;
43 LOG(ERROR) << "System salt too large: " << file_size;
55 if (!salt)
56 salt = new std::string();
57 salt->assign(buf.data(), file_size);
71 SHA1_Update(&ctx, salt->data(), salt->size())
    [all...]
  /libcore/luni/src/test/java/libcore/javax/crypto/
SecretKeyFactoryTest.java 36 private static final byte[] SALT = {0, 1, 2, 3, 4, 5, 6, 7};
74 KeySpec ks = new PBEKeySpec(null, SALT, ITERATIONS);
80 KeySpec ks = new PBEKeySpec(new char[0], SALT, ITERATIONS);
86 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS);
93 KeySpec ks = new PBEKeySpec(null, SALT, ITERATIONS, KEY_LENGTH);
100 KeySpec ks = new PBEKeySpec(new char[0], SALT, ITERATIONS, KEY_LENGTH);
106 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS, KEY_LENGTH);
117 test_PBKDF2_UTF8(PASSWORD, SALT, ITERATIONS, KEY_LENGTH, expected);
118 test_PBKDF2_8BIT(PASSWORD, SALT, ITERATIONS, KEY_LENGTH, expected);
128 byte[] salt = new byte[]
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/lib-dynload/
crypt.so 
  /system/core/gatekeeperd/
SoftGateKeeper.h 38 uint64_t salt; member in struct:gatekeeper::fast_hash_t
83 uint32_t password_length, salt_t salt) const {
85 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt),
86 sizeof(salt), N, r, p, signature, signature_length);
136 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) {
138 size_t digest_size = password.length + sizeof(salt);
140 memcpy(digest.get(), &salt, sizeof(salt));
141 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length);
145 fast_hash.salt = salt
161 uint64_t salt; local
    [all...]
  /external/avahi/avahi-compat-howl/
Makefile.am 32 avahi_compat_howl_saltdir=$(avahi_compat_howldir)/salt
54 include/salt/socket.h \
55 include/salt/address.h \
56 include/salt/platform.h \
57 include/salt/signal.h \
58 include/salt/interface.h \
59 include/salt/salt.h \
60 include/salt/time.h \
61 include/salt/debug.
    [all...]

Completed in 2041 milliseconds

1 2 3 4 5 6 7 8 91011>>