/external/smack/src/org/xbill/DNS/ |
H A D | NSEC3PARAMRecord.java | 12 * algorithm, salt, iterations) used for a valid, complete NSEC3 chain present 28 private byte salt[]; field in class:NSEC3PARAMRecord 45 * @param salt The salt to use (may be null). 48 int flags, int iterations, byte [] salt) 55 if (salt != null) { 56 if (salt.length > 255) 57 throw new IllegalArgumentException("Invalid salt " + 59 if (salt.length > 0) { 60 this.salt 47 NSEC3PARAMRecord(Name name, int dclass, long ttl, int hashAlg, int flags, int iterations, byte [] salt) argument [all...] |
H A D | NSEC3Record.java | 51 private byte [] salt; field in class:NSEC3Record 73 * @param salt The salt to use (may be null). 78 int flags, int iterations, byte [] salt, byte [] next, 86 if (salt != null) { 87 if (salt.length > 255) 88 throw new IllegalArgumentException("Invalid salt"); 89 if (salt.length > 0) { 90 this.salt = new byte[salt 77 NSEC3Record(Name name, int dclass, long ttl, int hashAlg, int flags, int iterations, byte [] salt, byte [] next, int [] types) argument 227 hashName(Name name, int hashAlg, int iterations, byte [] salt) argument [all...] |
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
H A D | PBEParameterSpecTest.java | 38 * PBEParameterSpec(byte[] salt, int iterationCount) method testing. 43 byte[] salt = { 1, 2, 3, 4, 5 }; 49 + "in the case of null salt."); 53 PBEParameterSpec pbeps = new PBEParameterSpec(salt, iterationCount); 54 salt[0]++; 55 assertFalse("The change of salt specified in the constructor " 57 salt[0] == pbeps.getSalt()[0]); 61 * getSalt() method testing. Tests that returned salt is equal 62 * to the salt specified in the constructor and that the change of 66 byte[] salt [all...] |
H A D | PBEKeySpecTest.java | 60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int 67 byte[] salt = new byte[] { 1, 2, 3, 4, 5 }; 72 PBEKeySpec pbeks = new PBEKeySpec(null, salt, 85 + "in the case of null salt."); 94 + "in the case of empty salt."); 99 new PBEKeySpec(password, salt, -1, keyLength); 106 new PBEKeySpec(password, salt, iterationCount, -1); 113 new PBEKeySpec(password, salt, 0, keyLength); 120 new PBEKeySpec(password, salt, iterationCount, 0); 126 PBEKeySpec pbeks = new PBEKeySpec(password, salt, [all...] |
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/identity/ |
H A D | UniqueIdentificationGenerator.java | 19 * @param salt the salt to use for the unique ID. 22 String getUniqueId(@Nullable String salt); argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
H A D | PBEParameter.java | 18 ASN1OctetString salt; field in class:PBEParameter 21 byte[] salt, 24 if (salt.length != 8) 26 throw new IllegalArgumentException("salt length must be 8"); 28 this.salt = new DEROctetString(salt); 35 salt = (ASN1OctetString)seq.getObjectAt(0); 61 return salt.getOctets(); 68 v.add(salt); 20 PBEParameter( byte[] salt, int iterations) argument
|
H A D | MacData.java | 21 byte[] salt; field in class:MacData 44 this.salt = ((ASN1OctetString)seq.getObjectAt(1)).getOctets(); 58 byte[] salt, 62 this.salt = salt; 73 return salt; 97 v.add(new DEROctetString(salt)); 56 MacData( DigestInfo digInfo, byte[] salt, int iterationCount) argument
|
H A D | PBKDF2Params.java | 20 * salt CHOICE { 62 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf. 64 * @param salt input salt. 68 byte[] salt, 71 this.octStr = new DEROctetString(salt); 76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf. 78 * @param salt input salt. 83 byte[] salt, 67 PBKDF2Params( byte[] salt, int iterationCount) argument 82 PBKDF2Params( byte[] salt, int iterationCount, int keyLength) argument 100 PBKDF2Params( byte[] salt, int iterationCount, int keyLength, AlgorithmIdentifier prf) argument 119 PBKDF2Params( byte[] salt, int iterationCount, AlgorithmIdentifier prf) argument [all...] |
/external/chromium_org/third_party/tlslite/tlslite/ |
H A D | verifierdb.py | 32 (N, g, salt, verifier) = valueStr.split(" ") 35 salt = a2b_base64(salt) 37 return (N, g, salt, verifier) 58 N, g, salt, verifier = value 61 salt = b2a_base64(salt) 63 valueStr = " ".join( (N, g, salt, verifier) ) 67 (N, g, salt, verifier) = value 68 x = mathtls.makeX(salt, usernam [all...] |
/external/chromium_org/chrome/android/javatests/src/org/chromium/chrome/browser/identity/ |
H A D | SettingsSecureBasedIdentificationGeneratorTest.java | 22 String salt = "mySalt"; 23 String expected = HashUtil.getMd5Hash(new HashUtil.Params(androidId).withSalt(salt)); 24 runTest(androidId, salt, expected); 39 String salt = "mySalt"; 41 runTest(androidId, salt, expected); 48 String salt = null; 50 runTest(androidId, salt, expected); 53 private void runTest(String androidId, String salt, String expectedUniqueId) { argument 58 String result = generator.getUniqueId(salt);
|
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
H A D | p5_pbe.c | 68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING), 78 const unsigned char *salt, int saltlen) 99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) 104 sstr = ASN1_STRING_data(pbe->salt); 105 if (salt) 106 memcpy(sstr, salt, saltlen); 133 const unsigned char *salt, int saltlen) 143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/external/openssl/crypto/asn1/ |
H A D | p5_pbe.c | 68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING), 78 const unsigned char *salt, int saltlen) 99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) 104 sstr = ASN1_STRING_data(pbe->salt); 105 if (salt) 106 memcpy(sstr, salt, saltlen); 133 const unsigned char *salt, int saltlen) 143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/ |
H A D | PBKDF2KeySpec.java | 12 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) argument 14 super(password, salt, iterationCount, keySize);
|
/external/chromium_org/base/ios/ |
H A D | device_util.h | 68 // Returns an identifier for the device, using the given |salt|. A global 69 // identifier is generated the first time this method is called, and the salt 71 // |salt| is NULL, a default value is used. Unless you are using this value for 73 std::string GetDeviceIdentifier(const char* salt); 75 // Returns a hashed version of |in_string| using |salt| (which must not be 76 // zero-length). Different salt values should result in differently hashed 79 const std::string& salt);
|
/external/chromium_org/chromeos/login/auth/ |
H A D | key.cc | 39 Key::Key(KeyType key_type, const std::string& salt, const std::string& secret) argument 40 : key_type_(key_type), salt_(salt), secret_(secret) { 71 void Key::Transform(KeyType target_key_type, const std::string& salt) { argument 79 // TODO(stevenjb/nkostylev): Handle empty salt gracefully. 80 CHECK(!salt.empty()); 82 crypto::SHA256HashString(salt + secret_, &hash, sizeof(hash)); 95 salt, 104 base::Base64Encode(crypto::SHA256HashString(salt + secret_), &secret_); 115 salt_ = salt;
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_crpt.c | 74 unsigned char *salt; local 93 salt = pbe->salt->data; 94 saltlen = pbe->salt->length; 95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
H A D | p12_mutl.c | 72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local 82 salt = p12->mac->salt->data; 83 saltlen = p12->mac->salt->length; 94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) 139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == 156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument 171 p12->mac->salt->length = saltlen; 172 if (!(p12->mac->salt 132 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument [all...] |
H A D | p12_p8e.c | 65 unsigned char *salt, int saltlen, int iter, 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); 63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
H A D | PBEParametersGenerator.java | 11 protected byte[] salt; field in class:PBEParametersGenerator 25 * @param salt the salt to be mixed with the password. 31 byte[] salt, 35 this.salt = salt; 50 * return the salt byte array. 52 * @return the salt byte array. 56 return salt; 29 init( byte[] password, byte[] salt, int iterationCount) argument
|
/external/chromium_org/crypto/ |
H A D | hkdf_unittest.cc | 65 std::string salt(test.salt_hex); 66 if (!salt.empty()) { 67 ASSERT_TRUE(base::HexStringToBytes(salt, &data)); 68 salt.assign(reinterpret_cast<char*>(&data[0]), data.size()); 85 HKDF hkdf(key, salt, info, expected.size(), 0, 0);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
H A D | OpenSSLPBEParametersGenerator.java | 37 * @param salt salt to use. 41 byte[] salt) 43 super.init(password, salt, 1); 47 * the derived key function, the ith hash of the password and the salt. 59 digest.update(salt, 0, salt.length); 83 * Generate a key parameter derived from the password, salt, and iteration 102 * the password, salt, and iteration count we are currently initialised 124 * salt, an 39 init( byte[] password, byte[] salt) argument [all...] |
/external/chromium_org/chrome/browser/media/ |
H A D | media_device_id_salt.cc | 18 std::string salt; local 19 base::Base64Encode(base::RandBytesAsString(16), &salt); 20 DCHECK(!salt.empty()); 21 return salt;
|
/external/chromium_org/chrome/browser/chromeos/settings/ |
H A D | token_encryptor.cc | 29 // TODO(davidroche): should this use the system salt for both the password 30 // and the salt value, or should this use a separate salt value? 44 LOG(WARNING) << "System salt key is not available for encrypt."; 59 LOG(WARNING) << "System salt key is not available for decrypt."; 69 const std::string& salt) { 71 crypto::SymmetricKey::AES, passphrase, salt, 1000, 256); 76 const std::string& salt, 83 std::string nonce = salt.substr(0, kNonceSize); 98 const std::string& salt, 67 PassphraseToKey( const std::string& passphrase, const std::string& salt) argument 74 EncryptTokenWithKey( crypto::SymmetricKey* key, const std::string& salt, const std::string& token) argument 96 DecryptTokenWithKey( crypto::SymmetricKey* key, const std::string& salt, const std::string& encrypted_token_hex) argument [all...] |
/external/openssl/crypto/des/ |
H A D | fcrypt.c | 27 /* Added more values to handle illegal salt values the way normal 61 char *DES_crypt(const char *buf, const char *salt) argument 66 return(DES_fcrypt(buf,salt,buff)); 72 /* Copy at most 2 chars of salt */ 73 if ((e_salt[0] = salt[0]) != '\0') 74 e_salt[1] = salt[1]; 99 char *DES_fcrypt(const char *buf, const char *salt, char *ret) argument 119 x=ret[0]=((salt[0] == '\0')?'A':salt[0]); 121 x=ret[1]=((salt[ [all...] |
/external/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 81 const unsigned char *salt, int saltlen, int iter, 124 if (!HMAC_Update(&hctx, salt, saltlen) 161 h__dump (salt, saltlen); 170 const unsigned char *salt, int saltlen, int iter, 173 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), 181 unsigned char salt[] = {0x12, 0x34, 0x56, 0x78}; local 182 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out); 256 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; local 317 if(kdf->salt->type != V_ASN1_OCTET_STRING) { 324 salt 80 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument 169 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument [all...] |