Searched refs:salt (Results 1 - 25 of 26) sorted by relevance

12

/frameworks/base/core/java/android/security/
H A DScrypt.java26 native byte[] nativeScrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen); argument
29 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { argument
30 return nativeScrypt(password, salt, n, r, p, outLen);
/frameworks/base/core/java/android/security/keystore/recovery/
H A DKeyDerivationParams.java78 * salt + key_material_len + key_material, where salt_len and key_material_len are 4-byte, and
79 * denote the number of bytes for salt and key_material, respectively.
81 public static @NonNull KeyDerivationParams createSha256Params(@NonNull byte[] salt) { argument
82 return new KeyDerivationParams(ALGORITHM_SHA256, salt);
95 @NonNull byte[] salt, int memoryDifficulty) {
96 return new KeyDerivationParams(ALGORITHM_SCRYPT, salt, memoryDifficulty);
102 private KeyDerivationParams(@KeyDerivationAlgorithm int algorithm, @NonNull byte[] salt) { argument
103 this(algorithm, salt, /*memoryDifficulty=*/ -1);
109 private KeyDerivationParams(@KeyDerivationAlgorithm int algorithm, @NonNull byte[] salt, argument
112 mSalt = Preconditions.checkNotNull(salt);
94 createScryptParams( @onNull byte[] salt, int memoryDifficulty) argument
[all...]
/frameworks/base/libs/androidfw/tests/
H A DObbFile_test.cpp68 unsigned char salt[SALT_SIZE] = {0x01, 0x10, 0x55, 0xAA, 0xFF, 0x00, 0x5A, 0xA5}; local
69 EXPECT_TRUE(mObbFile->setSalt(salt, SALT_SIZE))
89 EXPECT_EQ(sizeof(salt), saltLen)
90 << "salt sizes were not the same";
92 for (size_t i = 0; i < sizeof(salt); i++) {
93 EXPECT_EQ(salt[i], newSalt[i])
94 << "salt character " << i << " should be equal";
96 EXPECT_TRUE(memcmp(newSalt, salt, sizeof(salt)) == 0)
/frameworks/base/core/jni/
H A Dandroid_security_Scrypt.cpp34 static jbyteArray android_security_Scrypt_nativeScrypt(JNIEnv* env, jobject, jbyteArray password, jbyteArray salt, jint N, jint r, jint p, jint outLen) { argument
35 if (!password || !salt) {
40 int saltLen = env->GetArrayLength(salt);
44 jbyte* saltPtr = (jbyte*)env->GetByteArrayElements(salt, NULL);
51 env->ReleaseByteArrayElements(salt, saltPtr, JNI_ABORT);
H A Dandroid_content_res_ObbScanner.cpp38 jfieldID salt; member in struct:android::__anon830
68 const unsigned char* salt = obb->getSalt(&saltLen); local
71 env->SetByteArrayRegion(saltArray, 0, saltLen, (jbyte*)salt);
72 env->SetObjectField(obbInfo, gObbInfoClassInfo.salt, saltArray);
93 gObbInfoClassInfo.salt = GetFieldIDOrDie(env, clazz, "salt", "[B");
/frameworks/base/services/backup/java/com/android/server/backup/utils/
H A DPasswordUtils.java47 * @param salt - salt.
51 public static SecretKey buildPasswordKey(String algorithm, String pw, byte[] salt, int rounds) { argument
52 return buildCharArrayKey(algorithm, pw.toCharArray(), salt, rounds);
61 * @param salt - salt.
65 public static String buildPasswordHash(String algorithm, String pw, byte[] salt, int rounds) { argument
66 SecretKey key = buildPasswordKey(algorithm, pw, salt, rounds);
107 * @param salt - salt
111 makeKeyChecksum(String algorithm, byte[] pwBytes, byte[] salt, int rounds) argument
122 buildCharArrayKey(String algorithm, char[] pwArray, byte[] salt, int rounds) argument
[all...]
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
H A DMockScrypt.java31 public byte[] scrypt(byte[] password, byte[] salt, int n, int r, int p, int outLen) { argument
35 password.length + salt.length + Integer.BYTES * 6);
39 byteBuffer.putInt(salt.length);
40 byteBuffer.put(salt);
H A DKeySyncTaskTest.java178 byte[] salt = randomBytes(16);
181 KeySyncTask.hashCredentialsBySaltedSha256(salt, credentials),
182 KeySyncTask.hashCredentialsBySaltedSha256(salt, credentials));
187 byte[] salt = randomBytes(16);
191 KeySyncTask.hashCredentialsBySaltedSha256(salt, "password1234"),
192 KeySyncTask.hashCredentialsBySaltedSha256(salt, "password12345")));
/frameworks/base/tools/obbtool/
H A Dpbkdf2gen.cpp30 * Will print out the salt and key in hex.
51 unsigned char salt[SALT_LEN]; local
53 if (read(fd, &salt, SALT_LEN) != SALT_LEN) {
54 fprintf(stderr, "Could not read salt from /dev/urandom: %s\n", strerror(errno));
62 if (PKCS5_PBKDF2_HMAC_SHA1(argv[1], strlen(argv[1]), salt, SALT_LEN,
68 printf("salt=");
70 printf("%02x", salt[i]);
H A DMain.cpp44 {"salt", required_argument, NULL, 's'},
57 memset(&salt, 0, sizeof(salt));
64 unsigned char salt[SALT_LEN]; member in class:PackageInfo
82 " -s <8 byte hex salt> sets the crypto key salt (if encrypted)\n"
103 obb->setSalt(info->salt, SALT_LEN);
145 const unsigned char* salt = obb->getSalt(&saltLen); local
146 if (salt != NULL) {
148 printf("%02x", salt[
[all...]
H A Dmkobb.sh262 echo "salt for use with obbtool is:"
263 echo "${salt}"
/frameworks/base/services/core/jni/
H A Dcom_android_server_locksettings_SyntheticPasswordManager.cpp51 static jbyteArray android_server_SyntheticPasswordManager_nativeScrypt(JNIEnv* env, jobject, jbyteArray password, jbyteArray salt, jint N, jint r, jint p, jint outLen) { argument
52 if (!password || !salt) {
57 int saltLen = env->GetArrayLength(salt);
61 jbyte* saltPtr = (jbyte*)env->GetByteArrayElements(salt, NULL);
68 env->ReleaseByteArrayElements(salt, saltPtr, JNI_ABORT);
/frameworks/base/services/backup/java/com/android/server/backup/
H A DBackupPasswordManager.java36 * persisted) salt. Validation is performed by running the challenge text through the same
37 * PBKDF2 cycle with the persisted salt, and checking the hashes match.
134 byte[] salt = randomSalt();
136 PBKDF_CURRENT, newPassword, salt, PasswordUtils.PBKDF2_HASH_ROUNDS);
138 getPasswordHashFileCodec().serialize(new BackupPasswordHash(newPwHash, salt));
140 mPasswordSalt = salt;
175 * Sets the password hash, salt, and version in the object from what has been persisted to the
189 mPasswordSalt = hash.salt;
249 * Container class for a PBKDF hash and the salt used to create the hash.
253 public byte[] salt; field in class:BackupPasswordManager.BackupPasswordHash
255 BackupPasswordHash(String hash, byte[] salt) argument
[all...]
/frameworks/base/core/java/android/content/res/
H A DObbInfo.java52 * The salt for the encryption algorithm.
56 public byte[] salt; field in class:ObbInfo
85 dest.writeByteArray(salt);
104 salt = source.createByteArray();
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/
H A DKeySyncTask.java253 byte[] salt = generateSalt();
256 localLskfHash = hashCredentialsByScrypt(salt, mCredential);
258 localLskfHash = hashCredentialsBySaltedSha256(salt, mCredential);
338 salt, /*memoryDifficulty=*/ SCRYPT_PARAM_N);
340 keyDerivationParams = KeyDerivationParams.createSha256Params(salt);
459 * Generates a salt to include with the lock screen hash.
461 * @return The salt.
464 byte[] salt = new byte[SALT_LENGTH_BYTES];
465 new SecureRandom().nextBytes(salt);
466 return salt;
492 hashCredentialsBySaltedSha256(byte[] salt, String credentials) argument
511 hashCredentialsByScrypt(byte[] salt, String credentials) argument
[all...]
H A DSecureBox.java301 private static SecretKey hkdfDeriveKey(byte[] secret, byte[] salt, byte[] info) argument
305 mac.init(new SecretKeySpec(salt, MAC_ALG));
/frameworks/base/core/java/android/util/apk/
H A DApkVerityBuilder.java183 private BufferedDigester(byte[] salt, ByteBuffer output) throws NoSuchAlgorithmException { argument
184 mSalt = salt;
256 SignatureInfo signatureInfo, byte[] salt, ByteBuffer output)
258 BufferedDigester digester = new BufferedDigester(salt, output);
301 byte[] salt, int[] levelOffset, ByteBuffer output)
304 generateApkVerityDigestAtLeafLevel(apk, signatureInfo, salt, slice(output,
313 BufferedDigester digester = new BufferedDigester(salt, outputBuffer);
321 BufferedDigester digester = new BufferedDigester(salt, ByteBuffer.wrap(rootHash));
328 byte[] salt) {
329 if (salt
255 generateApkVerityDigestAtLeafLevel(RandomAccessFile apk, SignatureInfo signatureInfo, byte[] salt, ByteBuffer output) argument
300 generateApkVerityTree(RandomAccessFile apk, SignatureInfo signatureInfo, byte[] salt, int[] levelOffset, ByteBuffer output) argument
327 generateFsverityHeader(ByteBuffer buffer, long fileSize, int depth, byte[] salt) argument
[all...]
/frameworks/base/libs/androidfw/include/androidfw/
H A DObbFile.h84 bool setSalt(const unsigned char* salt, size_t length) { argument
89 memcpy(mSalt, salt, sizeof(mSalt));
127 /* The encryption salt. */
/frameworks/base/services/tests/servicestests/src/com/android/server/backup/
H A DBackupPasswordManagerTest.java193 private void writeV1HashToFile(String password, byte[] salt) throws Exception { argument
195 V1_HASH_ALGORITHM, password, salt, PasswordUtils.PBKDF2_HASH_ROUNDS);
196 writeHashAndSaltToFile(hash, salt);
199 private void writeHashAndSaltToFile(String hash, byte[] salt) throws Exception { argument
207 dos.writeInt(salt.length);
208 dos.write(salt);
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
H A DMockSyntheticPasswordManager.java96 protected byte[] scrypt(String password, byte[] salt, int N, int r, int p, int outLen) { argument
98 PBEKeySpec spec = new PBEKeySpec(password.toCharArray(), salt, 10, outLen * 8);
H A DSyntheticPasswordTests.java490 data.salt = PAYLOAD;
499 assertArrayEquals(PAYLOAD, deserialized.salt);
511 0, 0, 0, 5, /* salt.length */
512 1, 2, -1, -2, 55, /* salt */
522 assertArrayEquals(PAYLOAD, deserialized.salt);
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/serialization/
H A DKeyChainSnapshotDeserializer.java275 byte[] salt = null;
294 salt = readBlobTag(parser, TAG_SALT);
306 if (salt == null) {
307 throw new KeyChainSnapshotParserException("salt was not set in keyDerivationParams");
314 keyDerivationParams = KeyDerivationParams.createSha256Params(salt);
319 salt, memoryDifficulty);
/frameworks/base/services/core/java/com/android/server/locksettings/
H A DSyntheticPasswordManager.java208 byte[] salt; field in class:SyntheticPasswordManager.PasswordData
219 result.salt = secureRandom(PASSWORD_SALT_LENGTH);
233 result.salt = new byte[saltLen];
234 buffer.get(result.salt);
248 + Integer.BYTES + salt.length + Integer.BYTES +
254 buffer.putInt(salt.length);
255 buffer.put(salt);
1131 return scrypt(password, data.salt, 1 << data.scryptN, 1 << data.scryptR, 1 << data.scryptP,
1151 protected byte[] scrypt(String password, byte[] salt, int N, int r, int p, int outLen) { argument
1152 return nativeScrypt(password.getBytes(), salt,
1156 nativeScrypt(byte[] password, byte[] salt, int N, int r, int p, int outLen) argument
[all...]
/frameworks/base/core/java/com/android/internal/widget/
H A DLockPatternUtils.java1126 long salt = getLong(LOCK_PASSWORD_SALT_KEY, 0, userId);
1127 if (salt == 0) {
1129 salt = SecureRandom.getInstance("SHA1PRNG").nextLong();
1130 setLong(LOCK_PASSWORD_SALT_KEY, salt, userId);
1131 Log.v(TAG, "Initialized lock password salt for user: " + userId);
1137 return Long.toHexString(salt);
/frameworks/base/services/core/java/com/android/server/
H A DStorageManagerService.java3301 KeySpec ks = new PBEKeySpec(mKey.toCharArray(), obbInfo.salt,

Completed in 470 milliseconds

12