/frameworks/base/core/java/android/security/ |
H A D | Scrypt.java | 26 native byte[] nativeScrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen); argument 29 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { argument 30 return nativeScrypt(password, salt, n, r, p, outLen);
|
/frameworks/base/core/java/android/security/keystore/recovery/ |
H A D | KeyDerivationParams.java | 78 * salt + key_material_len + key_material, where salt_len and key_material_len are 4-byte, and 79 * denote the number of bytes for salt and key_material, respectively. 81 public static @NonNull KeyDerivationParams createSha256Params(@NonNull byte[] salt) { argument 82 return new KeyDerivationParams(ALGORITHM_SHA256, salt); 95 @NonNull byte[] salt, int memoryDifficulty) { 96 return new KeyDerivationParams(ALGORITHM_SCRYPT, salt, memoryDifficulty); 102 private KeyDerivationParams(@KeyDerivationAlgorithm int algorithm, @NonNull byte[] salt) { argument 103 this(algorithm, salt, /*memoryDifficulty=*/ -1); 109 private KeyDerivationParams(@KeyDerivationAlgorithm int algorithm, @NonNull byte[] salt, argument 112 mSalt = Preconditions.checkNotNull(salt); 94 createScryptParams( @onNull byte[] salt, int memoryDifficulty) argument [all...] |
/frameworks/base/libs/androidfw/tests/ |
H A D | ObbFile_test.cpp | 68 unsigned char salt[SALT_SIZE] = {0x01, 0x10, 0x55, 0xAA, 0xFF, 0x00, 0x5A, 0xA5}; local 69 EXPECT_TRUE(mObbFile->setSalt(salt, SALT_SIZE)) 89 EXPECT_EQ(sizeof(salt), saltLen) 90 << "salt sizes were not the same"; 92 for (size_t i = 0; i < sizeof(salt); i++) { 93 EXPECT_EQ(salt[i], newSalt[i]) 94 << "salt character " << i << " should be equal"; 96 EXPECT_TRUE(memcmp(newSalt, salt, sizeof(salt)) == 0)
|
/frameworks/base/core/jni/ |
H A D | android_security_Scrypt.cpp | 34 static jbyteArray android_security_Scrypt_nativeScrypt(JNIEnv* env, jobject, jbyteArray password, jbyteArray salt, jint N, jint r, jint p, jint outLen) { argument 35 if (!password || !salt) { 40 int saltLen = env->GetArrayLength(salt); 44 jbyte* saltPtr = (jbyte*)env->GetByteArrayElements(salt, NULL); 51 env->ReleaseByteArrayElements(salt, saltPtr, JNI_ABORT);
|
H A D | android_content_res_ObbScanner.cpp | 38 jfieldID salt; member in struct:android::__anon830 68 const unsigned char* salt = obb->getSalt(&saltLen); local 71 env->SetByteArrayRegion(saltArray, 0, saltLen, (jbyte*)salt); 72 env->SetObjectField(obbInfo, gObbInfoClassInfo.salt, saltArray); 93 gObbInfoClassInfo.salt = GetFieldIDOrDie(env, clazz, "salt", "[B");
|
/frameworks/base/services/backup/java/com/android/server/backup/utils/ |
H A D | PasswordUtils.java | 47 * @param salt - salt. 51 public static SecretKey buildPasswordKey(String algorithm, String pw, byte[] salt, int rounds) { argument 52 return buildCharArrayKey(algorithm, pw.toCharArray(), salt, rounds); 61 * @param salt - salt. 65 public static String buildPasswordHash(String algorithm, String pw, byte[] salt, int rounds) { argument 66 SecretKey key = buildPasswordKey(algorithm, pw, salt, rounds); 107 * @param salt - salt 111 makeKeyChecksum(String algorithm, byte[] pwBytes, byte[] salt, int rounds) argument 122 buildCharArrayKey(String algorithm, char[] pwArray, byte[] salt, int rounds) argument [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
H A D | MockScrypt.java | 31 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { argument 35 password.length + salt.length + Integer.BYTES * 6); 39 byteBuffer.putInt(salt.length); 40 byteBuffer.put(salt);
|
H A D | KeySyncTaskTest.java | 178 byte[] salt = randomBytes(16); 181 KeySyncTask.hashCredentialsBySaltedSha256(salt, credentials), 182 KeySyncTask.hashCredentialsBySaltedSha256(salt, credentials)); 187 byte[] salt = randomBytes(16); 191 KeySyncTask.hashCredentialsBySaltedSha256(salt, "password1234"), 192 KeySyncTask.hashCredentialsBySaltedSha256(salt, "password12345")));
|
/frameworks/base/tools/obbtool/ |
H A D | pbkdf2gen.cpp | 30 * Will print out the salt and key in hex. 51 unsigned char salt[SALT_LEN]; local 53 if (read(fd, &salt, SALT_LEN) != SALT_LEN) { 54 fprintf(stderr, "Could not read salt from /dev/urandom: %s\n", strerror(errno)); 62 if (PKCS5_PBKDF2_HMAC_SHA1(argv[1], strlen(argv[1]), salt, SALT_LEN, 68 printf("salt="); 70 printf("%02x", salt[i]);
|
H A D | Main.cpp | 44 {"salt", required_argument, NULL, 's'}, 57 memset(&salt, 0, sizeof(salt)); 64 unsigned char salt[SALT_LEN]; member in class:PackageInfo 82 " -s <8 byte hex salt> sets the crypto key salt (if encrypted)\n" 103 obb->setSalt(info->salt, SALT_LEN); 145 const unsigned char* salt = obb->getSalt(&saltLen); local 146 if (salt != NULL) { 148 printf("%02x", salt[ [all...] |
H A D | mkobb.sh | 262 echo "salt for use with obbtool is:" 263 echo "${salt}"
|
/frameworks/base/services/core/jni/ |
H A D | com_android_server_locksettings_SyntheticPasswordManager.cpp | 51 static jbyteArray android_server_SyntheticPasswordManager_nativeScrypt(JNIEnv* env, jobject, jbyteArray password, jbyteArray salt, jint N, jint r, jint p, jint outLen) { argument 52 if (!password || !salt) { 57 int saltLen = env->GetArrayLength(salt); 61 jbyte* saltPtr = (jbyte*)env->GetByteArrayElements(salt, NULL); 68 env->ReleaseByteArrayElements(salt, saltPtr, JNI_ABORT);
|
/frameworks/base/services/backup/java/com/android/server/backup/ |
H A D | BackupPasswordManager.java | 36 * persisted) salt. Validation is performed by running the challenge text through the same 37 * PBKDF2 cycle with the persisted salt, and checking the hashes match. 134 byte[] salt = randomSalt(); 136 PBKDF_CURRENT, newPassword, salt, PasswordUtils.PBKDF2_HASH_ROUNDS); 138 getPasswordHashFileCodec().serialize(new BackupPasswordHash(newPwHash, salt)); 140 mPasswordSalt = salt; 175 * Sets the password hash, salt, and version in the object from what has been persisted to the 189 mPasswordSalt = hash.salt; 249 * Container class for a PBKDF hash and the salt used to create the hash. 253 public byte[] salt; field in class:BackupPasswordManager.BackupPasswordHash 255 BackupPasswordHash(String hash, byte[] salt) argument [all...] |
/frameworks/base/core/java/android/content/res/ |
H A D | ObbInfo.java | 52 * The salt for the encryption algorithm. 56 public byte[] salt; field in class:ObbInfo 85 dest.writeByteArray(salt); 104 salt = source.createByteArray();
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
H A D | KeySyncTask.java | 253 byte[] salt = generateSalt(); 256 localLskfHash = hashCredentialsByScrypt(salt, mCredential); 258 localLskfHash = hashCredentialsBySaltedSha256(salt, mCredential); 338 salt, /*memoryDifficulty=*/ SCRYPT_PARAM_N); 340 keyDerivationParams = KeyDerivationParams.createSha256Params(salt); 459 * Generates a salt to include with the lock screen hash. 461 * @return The salt. 464 byte[] salt = new byte[SALT_LENGTH_BYTES]; 465 new SecureRandom().nextBytes(salt); 466 return salt; 492 hashCredentialsBySaltedSha256(byte[] salt, String credentials) argument 511 hashCredentialsByScrypt(byte[] salt, String credentials) argument [all...] |
H A D | SecureBox.java | 301 private static SecretKey hkdfDeriveKey(byte[] secret, byte[] salt, byte[] info) argument 305 mac.init(new SecretKeySpec(salt, MAC_ALG));
|
/frameworks/base/core/java/android/util/apk/ |
H A D | ApkVerityBuilder.java | 183 private BufferedDigester(byte[] salt, ByteBuffer output) throws NoSuchAlgorithmException { argument 184 mSalt = salt; 256 SignatureInfo signatureInfo, byte[] salt, ByteBuffer output) 258 BufferedDigester digester = new BufferedDigester(salt, output); 301 byte[] salt, int[] levelOffset, ByteBuffer output) 304 generateApkVerityDigestAtLeafLevel(apk, signatureInfo, salt, slice(output, 313 BufferedDigester digester = new BufferedDigester(salt, outputBuffer); 321 BufferedDigester digester = new BufferedDigester(salt, ByteBuffer.wrap(rootHash)); 328 byte[] salt) { 329 if (salt 255 generateApkVerityDigestAtLeafLevel(RandomAccessFile apk, SignatureInfo signatureInfo, byte[] salt, ByteBuffer output) argument 300 generateApkVerityTree(RandomAccessFile apk, SignatureInfo signatureInfo, byte[] salt, int[] levelOffset, ByteBuffer output) argument 327 generateFsverityHeader(ByteBuffer buffer, long fileSize, int depth, byte[] salt) argument [all...] |
/frameworks/base/libs/androidfw/include/androidfw/ |
H A D | ObbFile.h | 84 bool setSalt(const unsigned char* salt, size_t length) { argument 89 memcpy(mSalt, salt, sizeof(mSalt)); 127 /* The encryption salt. */
|
/frameworks/base/services/tests/servicestests/src/com/android/server/backup/ |
H A D | BackupPasswordManagerTest.java | 193 private void writeV1HashToFile(String password, byte[] salt) throws Exception { argument 195 V1_HASH_ALGORITHM, password, salt, PasswordUtils.PBKDF2_HASH_ROUNDS); 196 writeHashAndSaltToFile(hash, salt); 199 private void writeHashAndSaltToFile(String hash, byte[] salt) throws Exception { argument 207 dos.writeInt(salt.length); 208 dos.write(salt);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
H A D | MockSyntheticPasswordManager.java | 96 protected byte[] scrypt(String password, byte[] salt, int N, int r, int p, int outLen) { argument 98 PBEKeySpec spec = new PBEKeySpec(password.toCharArray(), salt, 10, outLen * 8);
|
H A D | SyntheticPasswordTests.java | 490 data.salt = PAYLOAD; 499 assertArrayEquals(PAYLOAD, deserialized.salt); 511 0, 0, 0, 5, /* salt.length */ 512 1, 2, -1, -2, 55, /* salt */ 522 assertArrayEquals(PAYLOAD, deserialized.salt);
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/serialization/ |
H A D | KeyChainSnapshotDeserializer.java | 275 byte[] salt = null; 294 salt = readBlobTag(parser, TAG_SALT); 306 if (salt == null) { 307 throw new KeyChainSnapshotParserException("salt was not set in keyDerivationParams"); 314 keyDerivationParams = KeyDerivationParams.createSha256Params(salt); 319 salt, memoryDifficulty);
|
/frameworks/base/services/core/java/com/android/server/locksettings/ |
H A D | SyntheticPasswordManager.java | 208 byte[] salt; field in class:SyntheticPasswordManager.PasswordData 219 result.salt = secureRandom(PASSWORD_SALT_LENGTH); 233 result.salt = new byte[saltLen]; 234 buffer.get(result.salt); 248 + Integer.BYTES + salt.length + Integer.BYTES + 254 buffer.putInt(salt.length); 255 buffer.put(salt); 1131 return scrypt(password, data.salt, 1 << data.scryptN, 1 << data.scryptR, 1 << data.scryptP, 1151 protected byte[] scrypt(String password, byte[] salt, int N, int r, int p, int outLen) { argument 1152 return nativeScrypt(password.getBytes(), salt, 1156 nativeScrypt(byte[] password, byte[] salt, int N, int r, int p, int outLen) argument [all...] |
/frameworks/base/core/java/com/android/internal/widget/ |
H A D | LockPatternUtils.java | 1126 long salt = getLong(LOCK_PASSWORD_SALT_KEY, 0, userId); 1127 if (salt == 0) { 1129 salt = SecureRandom.getInstance("SHA1PRNG").nextLong(); 1130 setLong(LOCK_PASSWORD_SALT_KEY, salt, userId); 1131 Log.v(TAG, "Initialized lock password salt for user: " + userId); 1137 return Long.toHexString(salt);
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | StorageManagerService.java | 3301 KeySpec ks = new PBEKeySpec(mKey.toCharArray(), obbInfo.salt,
|