Searched refs:salt (Results 1 - 25 of 184) sorted by relevance

12345678

/external/smack/src/org/xbill/DNS/
H A DNSEC3PARAMRecord.java12 * algorithm, salt, iterations) used for a valid, complete NSEC3 chain present
28 private byte salt[]; field in class:NSEC3PARAMRecord
45 * @param salt The salt to use (may be null).
48 int flags, int iterations, byte [] salt)
55 if (salt != null) {
56 if (salt.length > 255)
57 throw new IllegalArgumentException("Invalid salt " +
59 if (salt.length > 0) {
60 this.salt
47 NSEC3PARAMRecord(Name name, int dclass, long ttl, int hashAlg, int flags, int iterations, byte [] salt) argument
[all...]
H A DNSEC3Record.java51 private byte [] salt; field in class:NSEC3Record
73 * @param salt The salt to use (may be null).
78 int flags, int iterations, byte [] salt, byte [] next,
86 if (salt != null) {
87 if (salt.length > 255)
88 throw new IllegalArgumentException("Invalid salt");
89 if (salt.length > 0) {
90 this.salt = new byte[salt
77 NSEC3Record(Name name, int dclass, long ttl, int hashAlg, int flags, int iterations, byte [] salt, byte [] next, int [] types) argument
227 hashName(Name name, int hashAlg, int iterations, byte [] salt) argument
[all...]
/external/chromium_org/third_party/tlslite/tlslite/
H A DVerifierDB.py29 (N, g, salt, verifier) = valueStr.split(" ")
32 salt = base64ToString(salt)
34 return (N, g, salt, verifier)
55 N, g, salt, verifier = value
58 salt = stringToBase64(salt)
60 valueStr = " ".join( (N, g, salt, verifier) )
64 (N, g, salt, verifier) = value
65 x = mathtls.makeX(salt, usernam
[all...]
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
H A DPBEParameterSpecTest.java38 * PBEParameterSpec(byte[] salt, int iterationCount) method testing.
43 byte[] salt = {1, 2, 3, 4, 5};
49 + "in the case of null salt.");
53 PBEParameterSpec pbeps = new PBEParameterSpec(salt, iterationCount);
54 salt[0] ++;
55 assertFalse("The change of salt specified in the constructor "
57 salt[0] == pbeps.getSalt()[0]);
61 * getSalt() method testing. Tests that returned salt is equal
62 * to the salt specified in the constructor and that the change of
66 byte[] salt
[all...]
H A DPBEKeySpecTest.java60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int
67 byte[] salt = new byte[] {1, 2, 3, 4, 5};
72 PBEKeySpec pbeks = new PBEKeySpec(null, salt,
85 + "in the case of null salt.");
94 + "in the case of empty salt.");
99 new PBEKeySpec(password, salt, -1, keyLength);
106 new PBEKeySpec(password, salt, iterationCount, -1);
113 new PBEKeySpec(password, salt, 0, keyLength);
120 new PBEKeySpec(password, salt, iterationCount, 0);
126 PBEKeySpec pbeks = new PBEKeySpec(password, salt,
[all...]
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/identity/
H A DUniqueIdentificationGenerator.java19 * @param salt the salt to use for the unique ID.
22 String getUniqueId(@Nullable String salt); argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
H A DPBEParameter.java18 ASN1OctetString salt; field in class:PBEParameter
21 byte[] salt,
24 if (salt.length != 8)
26 throw new IllegalArgumentException("salt length must be 8");
28 this.salt = new DEROctetString(salt);
35 salt = (ASN1OctetString)seq.getObjectAt(0);
61 return salt.getOctets();
68 v.add(salt);
20 PBEParameter( byte[] salt, int iterations) argument
H A DMacData.java21 byte[] salt; field in class:MacData
44 this.salt = ((ASN1OctetString)seq.getObjectAt(1)).getOctets();
58 byte[] salt,
62 this.salt = salt;
73 return salt;
97 v.add(new DEROctetString(salt));
56 MacData( DigestInfo digInfo, byte[] salt, int iterationCount) argument
/external/openssh/openbsd-compat/
H A Dxcrypt.c61 xcrypt(const char *password, const char *salt) argument
66 if (is_md5_salt(salt))
67 crypted = md5_crypt(password, salt);
69 crypted = crypt(password, salt);
72 crypted = bigcrypt(password, salt);
74 crypted = crypt(password, salt);
76 crypted = bigcrypt(password, salt);
78 crypted = crypt(password, salt);
H A Dport-uw.c56 char *salt; local
66 /* Encrypt the candidate password using the proper salt. */
67 salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx";
75 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0)
76 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0));
80 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
/external/chromium_org/chrome/android/javatests/src/org/chromium/chrome/browser/identity/
H A DSettingsSecureBasedIdentificationGeneratorTest.java22 String salt = "mySalt";
23 String expected = HashUtil.getMd5Hash(new HashUtil.Params(androidId).withSalt(salt));
24 runTest(androidId, salt, expected);
39 String salt = "mySalt";
41 runTest(androidId, salt, expected);
48 String salt = null;
50 runTest(androidId, salt, expected);
53 private void runTest(String androidId, String salt, String expectedUniqueId) { argument
58 String result = generator.getUniqueId(salt);
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/
H A Dp5_pbe.c68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
78 const unsigned char *salt, int saltlen)
99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
104 sstr = ASN1_STRING_data(pbe->salt);
105 if (salt)
106 memcpy(sstr, salt, saltlen);
133 const unsigned char *salt, int saltlen)
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
/external/openssl/crypto/asn1/
H A Dp5_pbe.c68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
78 const unsigned char *salt, int saltlen)
99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
104 sstr = ASN1_STRING_data(pbe->salt);
105 if (salt)
106 memcpy(sstr, salt, saltlen);
133 const unsigned char *salt, int saltlen)
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
H A Dp12_crpt.c74 unsigned char *salt; local
93 salt = pbe->salt->data;
94 saltlen = pbe->salt->length;
95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
H A Dp12_mutl.c72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local
82 salt = p12->mac->salt->data;
83 saltlen = p12->mac->salt->length;
94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type)
139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) ==
156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument
171 p12->mac->salt->length = saltlen;
172 if (!(p12->mac->salt
132 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
[all...]
H A Dp12_p8e.c65 unsigned char *salt, int saltlen, int iter,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
/external/openssl/crypto/pkcs12/
H A Dp12_crpt.c74 unsigned char *salt; local
93 salt = pbe->salt->data;
94 saltlen = pbe->salt->length;
95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
H A Dp12_mutl.c72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local
82 salt = p12->mac->salt->data;
83 saltlen = p12->mac->salt->length;
94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type)
139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) ==
156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument
171 p12->mac->salt->length = saltlen;
172 if (!(p12->mac->salt
132 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
[all...]
H A Dp12_p8e.c65 unsigned char *salt, int saltlen, int iter,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
H A DPBEParametersGenerator.java11 protected byte[] salt; field in class:PBEParametersGenerator
25 * @param salt the salt to be mixed with the password.
31 byte[] salt,
35 this.salt = salt;
50 * return the salt byte array.
52 * @return the salt byte array.
56 return salt;
29 init( byte[] password, byte[] salt, int iterationCount) argument
/external/chromium_org/crypto/
H A Dhkdf_unittest.cc65 std::string salt(test.salt_hex);
66 if (!salt.empty()) {
67 ASSERT_TRUE(base::HexStringToBytes(salt, &data));
68 salt.assign(reinterpret_cast<char*>(&data[0]), data.size());
85 HKDF hkdf(key, salt, info, expected.size(), 0);
/external/openssh/
H A Dauth2-jpake.c63 * anyway because they will mismatch on fake salt.
120 /* Returns 1 if 'c' is a valid crypt(3) salt character, 0 otherwise */
134 * Derive fake salt as H(username || first_private_host_key)
185 /* ASCII an integer [0, 64) for inclusion in a password/salt */
194 /* Generate ASCII salt bytes for user */
216 * a stable fake salt under it for use by a non-existent account.
220 fake_salt_and_scheme(Authctxt *authctxt, char **salt, char **scheme) argument
240 xasprintf(salt, "$1$%s$", makesalt(8, authctxt->user));
243 *salt = xstrdup(makesalt(2, authctxt->user));
248 xasprintf(salt, "
272 auth2_jpake_get_pwdata(Authctxt *authctxt, BIGNUM **s, char **hash_scheme, char **salt) argument
377 char *salt, *hash_scheme; local
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
H A DOpenSSLPBEParametersGenerator.java37 * @param salt salt to use.
41 byte[] salt)
43 super.init(password, salt, 1);
47 * the derived key function, the ith hash of the password and the salt.
59 digest.update(salt, 0, salt.length);
83 * Generate a key parameter derived from the password, salt, and iteration
102 * the password, salt, and iteration count we are currently initialised
124 * salt, an
39 init( byte[] password, byte[] salt) argument
[all...]
/external/chromium_org/base/ios/
H A Ddevice_util.h55 // Returns an identifier for the device, using the given |salt|. A global
56 // identifier is generated the first time this method is called, and the salt
58 // |salt| is NULL, a default value is used. Unless you are using this value for
60 std::string GetDeviceIdentifier(const char* salt);
/external/chromium_org/chrome/browser/media/
H A Dmedia_device_id_salt.cc18 std::string salt; local
19 base::Base64Encode(base::RandBytesAsString(16), &salt);
20 DCHECK(!salt.empty());
21 return salt;

Completed in 795 milliseconds

12345678