Searched refs:salt (Results 1 - 25 of 142) sorted by relevance

123456

/external/smack/src/org/xbill/DNS/
H A DNSEC3PARAMRecord.java12 * algorithm, salt, iterations) used for a valid, complete NSEC3 chain present
28 private byte salt[]; field in class:NSEC3PARAMRecord
45 * @param salt The salt to use (may be null).
48 int flags, int iterations, byte [] salt)
55 if (salt != null) {
56 if (salt.length > 255)
57 throw new IllegalArgumentException("Invalid salt " +
59 if (salt.length > 0) {
60 this.salt
47 NSEC3PARAMRecord(Name name, int dclass, long ttl, int hashAlg, int flags, int iterations, byte [] salt) argument
[all...]
H A DNSEC3Record.java51 private byte [] salt; field in class:NSEC3Record
73 * @param salt The salt to use (may be null).
78 int flags, int iterations, byte [] salt, byte [] next,
86 if (salt != null) {
87 if (salt.length > 255)
88 throw new IllegalArgumentException("Invalid salt");
89 if (salt.length > 0) {
90 this.salt = new byte[salt
77 NSEC3Record(Name name, int dclass, long ttl, int hashAlg, int flags, int iterations, byte [] salt, byte [] next, int [] types) argument
227 hashName(Name name, int hashAlg, int iterations, byte [] salt) argument
[all...]
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
H A DPBEParameterSpecTest.java38 * PBEParameterSpec(byte[] salt, int iterationCount) method testing.
43 byte[] salt = { 1, 2, 3, 4, 5 };
49 + "in the case of null salt.");
53 PBEParameterSpec pbeps = new PBEParameterSpec(salt, iterationCount);
54 salt[0]++;
55 assertFalse("The change of salt specified in the constructor "
57 salt[0] == pbeps.getSalt()[0]);
61 * getSalt() method testing. Tests that returned salt is equal
62 * to the salt specified in the constructor and that the change of
66 byte[] salt
[all...]
H A DPBEKeySpecTest.java60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int
67 byte[] salt = new byte[] { 1, 2, 3, 4, 5 };
72 PBEKeySpec pbeks = new PBEKeySpec(null, salt,
85 + "in the case of null salt.");
94 + "in the case of empty salt.");
99 new PBEKeySpec(password, salt, -1, keyLength);
106 new PBEKeySpec(password, salt, iterationCount, -1);
113 new PBEKeySpec(password, salt, 0, keyLength);
120 new PBEKeySpec(password, salt, iterationCount, 0);
126 PBEKeySpec pbeks = new PBEKeySpec(password, salt,
[all...]
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/identity/
H A DUniqueIdentificationGenerator.java19 * @param salt the salt to use for the unique ID.
22 String getUniqueId(@Nullable String salt); argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
H A DPBEParameter.java18 ASN1OctetString salt; field in class:PBEParameter
21 byte[] salt,
24 if (salt.length != 8)
26 throw new IllegalArgumentException("salt length must be 8");
28 this.salt = new DEROctetString(salt);
35 salt = (ASN1OctetString)seq.getObjectAt(0);
61 return salt.getOctets();
68 v.add(salt);
20 PBEParameter( byte[] salt, int iterations) argument
H A DMacData.java21 byte[] salt; field in class:MacData
44 this.salt = ((ASN1OctetString)seq.getObjectAt(1)).getOctets();
58 byte[] salt,
62 this.salt = salt;
73 return salt;
97 v.add(new DEROctetString(salt));
56 MacData( DigestInfo digInfo, byte[] salt, int iterationCount) argument
H A DPBKDF2Params.java20 * salt CHOICE {
62 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf.
64 * @param salt input salt.
68 byte[] salt,
71 this.octStr = new DEROctetString(salt);
76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf.
78 * @param salt input salt.
83 byte[] salt,
67 PBKDF2Params( byte[] salt, int iterationCount) argument
82 PBKDF2Params( byte[] salt, int iterationCount, int keyLength) argument
100 PBKDF2Params( byte[] salt, int iterationCount, int keyLength, AlgorithmIdentifier prf) argument
119 PBKDF2Params( byte[] salt, int iterationCount, AlgorithmIdentifier prf) argument
[all...]
/external/chromium_org/third_party/tlslite/tlslite/
H A Dverifierdb.py32 (N, g, salt, verifier) = valueStr.split(" ")
35 salt = a2b_base64(salt)
37 return (N, g, salt, verifier)
58 N, g, salt, verifier = value
61 salt = b2a_base64(salt)
63 valueStr = " ".join( (N, g, salt, verifier) )
67 (N, g, salt, verifier) = value
68 x = mathtls.makeX(salt, usernam
[all...]
/external/chromium_org/chrome/android/javatests/src/org/chromium/chrome/browser/identity/
H A DSettingsSecureBasedIdentificationGeneratorTest.java22 String salt = "mySalt";
23 String expected = HashUtil.getMd5Hash(new HashUtil.Params(androidId).withSalt(salt));
24 runTest(androidId, salt, expected);
39 String salt = "mySalt";
41 runTest(androidId, salt, expected);
48 String salt = null;
50 runTest(androidId, salt, expected);
53 private void runTest(String androidId, String salt, String expectedUniqueId) { argument
58 String result = generator.getUniqueId(salt);
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/
H A Dp5_pbe.c68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
78 const unsigned char *salt, int saltlen)
99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
104 sstr = ASN1_STRING_data(pbe->salt);
105 if (salt)
106 memcpy(sstr, salt, saltlen);
133 const unsigned char *salt, int saltlen)
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
/external/openssl/crypto/asn1/
H A Dp5_pbe.c68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
78 const unsigned char *salt, int saltlen)
99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
104 sstr = ASN1_STRING_data(pbe->salt);
105 if (salt)
106 memcpy(sstr, salt, saltlen);
133 const unsigned char *salt, int saltlen)
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/
H A DPBKDF2KeySpec.java12 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) argument
14 super(password, salt, iterationCount, keySize);
/external/chromium_org/base/ios/
H A Ddevice_util.h68 // Returns an identifier for the device, using the given |salt|. A global
69 // identifier is generated the first time this method is called, and the salt
71 // |salt| is NULL, a default value is used. Unless you are using this value for
73 std::string GetDeviceIdentifier(const char* salt);
75 // Returns a hashed version of |in_string| using |salt| (which must not be
76 // zero-length). Different salt values should result in differently hashed
79 const std::string& salt);
/external/chromium_org/chromeos/login/auth/
H A Dkey.cc39 Key::Key(KeyType key_type, const std::string& salt, const std::string& secret) argument
40 : key_type_(key_type), salt_(salt), secret_(secret) {
71 void Key::Transform(KeyType target_key_type, const std::string& salt) { argument
79 // TODO(stevenjb/nkostylev): Handle empty salt gracefully.
80 CHECK(!salt.empty());
82 crypto::SHA256HashString(salt + secret_, &hash, sizeof(hash));
95 salt,
104 base::Base64Encode(crypto::SHA256HashString(salt + secret_), &secret_);
115 salt_ = salt;
/external/openssl/crypto/pkcs12/
H A Dp12_crpt.c74 unsigned char *salt; local
93 salt = pbe->salt->data;
94 saltlen = pbe->salt->length;
95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
H A Dp12_mutl.c72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local
82 salt = p12->mac->salt->data;
83 saltlen = p12->mac->salt->length;
94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type)
139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) ==
156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, argument
171 p12->mac->salt->length = saltlen;
172 if (!(p12->mac->salt
132 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
[all...]
H A Dp12_p8e.c65 unsigned char *salt, int saltlen, int iter,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
77 else pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
H A DPBEParametersGenerator.java11 protected byte[] salt; field in class:PBEParametersGenerator
25 * @param salt the salt to be mixed with the password.
31 byte[] salt,
35 this.salt = salt;
50 * return the salt byte array.
52 * @return the salt byte array.
56 return salt;
29 init( byte[] password, byte[] salt, int iterationCount) argument
/external/chromium_org/crypto/
H A Dhkdf_unittest.cc65 std::string salt(test.salt_hex);
66 if (!salt.empty()) {
67 ASSERT_TRUE(base::HexStringToBytes(salt, &data));
68 salt.assign(reinterpret_cast<char*>(&data[0]), data.size());
85 HKDF hkdf(key, salt, info, expected.size(), 0, 0);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
H A DOpenSSLPBEParametersGenerator.java37 * @param salt salt to use.
41 byte[] salt)
43 super.init(password, salt, 1);
47 * the derived key function, the ith hash of the password and the salt.
59 digest.update(salt, 0, salt.length);
83 * Generate a key parameter derived from the password, salt, and iteration
102 * the password, salt, and iteration count we are currently initialised
124 * salt, an
39 init( byte[] password, byte[] salt) argument
[all...]
/external/chromium_org/chrome/browser/media/
H A Dmedia_device_id_salt.cc18 std::string salt; local
19 base::Base64Encode(base::RandBytesAsString(16), &salt);
20 DCHECK(!salt.empty());
21 return salt;
/external/chromium_org/chrome/browser/chromeos/settings/
H A Dtoken_encryptor.cc29 // TODO(davidroche): should this use the system salt for both the password
30 // and the salt value, or should this use a separate salt value?
44 LOG(WARNING) << "System salt key is not available for encrypt.";
59 LOG(WARNING) << "System salt key is not available for decrypt.";
69 const std::string& salt) {
71 crypto::SymmetricKey::AES, passphrase, salt, 1000, 256);
76 const std::string& salt,
83 std::string nonce = salt.substr(0, kNonceSize);
98 const std::string& salt,
67 PassphraseToKey( const std::string& passphrase, const std::string& salt) argument
74 EncryptTokenWithKey( crypto::SymmetricKey* key, const std::string& salt, const std::string& token) argument
96 DecryptTokenWithKey( crypto::SymmetricKey* key, const std::string& salt, const std::string& encrypted_token_hex) argument
[all...]
/external/openssl/crypto/des/
H A Dfcrypt.c27 /* Added more values to handle illegal salt values the way normal
61 char *DES_crypt(const char *buf, const char *salt) argument
66 return(DES_fcrypt(buf,salt,buff));
72 /* Copy at most 2 chars of salt */
73 if ((e_salt[0] = salt[0]) != '\0')
74 e_salt[1] = salt[1];
99 char *DES_fcrypt(const char *buf, const char *salt, char *ret) argument
119 x=ret[0]=((salt[0] == '\0')?'A':salt[0]);
121 x=ret[1]=((salt[
[all...]
/external/openssl/crypto/evp/
H A Dp5_crpt2.c81 const unsigned char *salt, int saltlen, int iter,
124 if (!HMAC_Update(&hctx, salt, saltlen)
161 h__dump (salt, saltlen);
170 const unsigned char *salt, int saltlen, int iter,
173 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(),
181 unsigned char salt[] = {0x12, 0x34, 0x56, 0x78}; local
182 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out);
256 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; local
317 if(kdf->salt->type != V_ASN1_OCTET_STRING) {
324 salt
80 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
169 PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, int keylen, unsigned char *out) argument
[all...]

Completed in 4666 milliseconds

123456