Searched defs:salt (Results 1 - 25 of 126) sorted by relevance

123456

/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/identity/
H A DUniqueIdentificationGenerator.java19 * @param salt the salt to use for the unique ID.
22 String getUniqueId(@Nullable String salt); argument
H A DSettingsSecureBasedIdentificationGenerator.java31 public String getUniqueId(@Nullable String salt) { argument
38 new HashUtil.Params(androidId).withSalt(salt));
H A DUuidBasedUniqueIdentificationGenerator.java31 public String getUniqueId(@Nullable String salt) { argument
/external/openssh/openbsd-compat/
H A Dxcrypt.c61 xcrypt(const char *password, const char *salt) argument
66 if (is_md5_salt(salt))
67 crypted = md5_crypt(password, salt);
69 crypted = crypt(password, salt);
72 crypted = bigcrypt(password, salt);
74 crypted = crypt(password, salt);
76 crypted = bigcrypt(password, salt);
78 crypted = crypt(password, salt);
H A Dport-uw.c56 char *salt; local
66 /* Encrypt the candidate password using the proper salt. */
67 salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx";
75 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0)
76 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0));
80 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
H A DMacData.java21 byte[] salt; field in class:MacData
44 this.salt = ((ASN1OctetString)seq.getObjectAt(1)).getOctets();
58 byte[] salt,
62 this.salt = salt;
73 return salt;
97 v.add(new DEROctetString(salt));
56 MacData( DigestInfo digInfo, byte[] salt, int iterationCount) argument
H A DPBEParameter.java18 ASN1OctetString salt; field in class:PBEParameter
21 byte[] salt,
24 if (salt.length != 8)
26 throw new IllegalArgumentException("salt length must be 8");
28 this.salt = new DEROctetString(salt);
35 salt = (ASN1OctetString)seq.getObjectAt(0);
61 return salt.getOctets();
68 v.add(salt);
20 PBEParameter( byte[] salt, int iterations) argument
H A DPBKDF2Params.java39 byte[] salt,
42 this.octStr = new DEROctetString(salt);
47 byte[] salt,
51 this(salt, iterationCount);
38 PBKDF2Params( byte[] salt, int iterationCount) argument
46 PBKDF2Params( byte[] salt, int iterationCount, int keyLength) argument
H A DPKCS12PBEParams.java21 byte[] salt,
24 this.iv = new DEROctetString(salt);
20 PKCS12PBEParams( byte[] salt, int iterations) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
H A DOpenSSLPBEParametersGenerator.java37 * @param salt salt to use.
41 byte[] salt)
43 super.init(password, salt, 1);
47 * the derived key function, the ith hash of the password and the salt.
59 digest.update(salt, 0, salt.length);
83 * Generate a key parameter derived from the password, salt, and iteration
102 * the password, salt, and iteration count we are currently initialised
124 * salt, an
39 init( byte[] password, byte[] salt) argument
[all...]
/external/chromium/chrome/common/
H A Dvisitedlink_common.cc79 const uint8 salt[LINK_SALT_LENGTH]) {
84 MD5Update(&ctx, salt, sizeof(salt));
76 ComputeURLFingerprint( const char* canonical_url, size_t url_len, const uint8 salt[LINK_SALT_LENGTH]) argument
/external/chromium/crypto/
H A Dsymmetric_key_openssl.cc45 const std::string& salt,
57 reinterpret_cast<const uint8*>(salt.data()),
58 salt.length(), iterations,
43 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
H A Dsymmetric_key_unittest.cc71 const char* salt; member in struct:PBKDF2TestVector
84 // The OS X crypto libraries have minimum salt and iteration requirements
86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) {
95 test_data.password, test_data.salt,
113 "salt",
121 "salt",
129 "salt",
139 "salt",
/external/chromium_org/chrome/android/javatests/src/org/chromium/chrome/browser/identity/
H A DUniqueIdentificationGeneratorFactoryTest.java55 public String getUniqueId(@Nullable String salt) { argument
/external/chromium_org/chrome/browser/media/
H A Dmedia_device_id_salt.cc18 std::string salt; local
19 base::Base64Encode(base::RandBytesAsString(16), &salt);
20 DCHECK(!salt.empty());
21 return salt;
/external/chromium_org/content/public/browser/
H A Dmedia_device_id.cc21 std::string salt = sc.Run(); local
23 hmac.Sign(raw_unique_id + salt, &digest[0], digest.size());
/external/chromium_org/crypto/
H A Dsymmetric_key_openssl.cc45 const std::string& salt,
60 reinterpret_cast<const uint8*>(salt.data()),
61 salt.length(), iterations,
43 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
H A Dsymmetric_key_unittest.cc71 const char* salt; member in struct:PBKDF2TestVector
84 // The OS X crypto libraries have minimum salt and iteration requirements
86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) {
95 test_data.password, test_data.salt,
113 "salt",
121 "salt",
129 "salt",
139 "salt",
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
H A Dp12_mutl.c72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local
82 salt = p12->mac->salt->data;
83 saltlen = p12->mac->salt->length;
94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type)
139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) ==
156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument
171 p12->mac->salt->length = saltlen;
172 if (!(p12->mac->salt
132 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
[all...]
H A Dp12_p8e.c65 unsigned char *salt, int saltlen, int iter,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
/external/dropbear/libtomcrypt/src/misc/pkcs5/
H A Dpkcs_5_1.c22 @param salt The salt (or nonce) which is 8 octets long
30 const unsigned char *salt,
40 LTC_ARGCHK(salt != NULL);
62 /* hash initial password + salt */
69 if ((err = hash_descriptor[hash_idx].process(md, salt, 8)) != CRYPT_OK) {
29 pkcs_5_alg1(const unsigned char *password, unsigned long password_len, const unsigned char *salt, int iteration_count, int hash_idx, unsigned char *out, unsigned long *outlen) argument
/external/openssl/crypto/pkcs12/
H A Dp12_mutl.c72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local
82 salt = p12->mac->salt->data;
83 saltlen = p12->mac->salt->length;
94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type)
139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) ==
156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument
171 p12->mac->salt->length = saltlen;
172 if (!(p12->mac->salt
132 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
[all...]
H A Dp12_p8e.c65 unsigned char *salt, int saltlen, int iter,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
/external/scrypt/tests/
H A Dscrypt_test.cpp33 const char *pw, *salt; member in struct:android::scrypt_test_setting_t
70 crypto_scrypt((const uint8_t*) s.pw, strlen(s.pw), (const uint8_t*) s.salt,
71 strlen(s.salt), s.Nfactor, s.rfactor, s.pfactor, output, sizeof(output)))
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
H A DPBEParametersGenerator.java11 protected byte[] salt; field in class:PBEParametersGenerator
25 * @param salt the salt to be mixed with the password.
31 byte[] salt,
35 this.salt = salt;
50 * return the salt byte array.
52 * @return the salt byte array.
56 return salt;
29 init( byte[] password, byte[] salt, int iterationCount) argument

Completed in 282 milliseconds

123456