Searched refs:salt (Results 1 - 15 of 15) sorted by relevance

/system/extras/verity/
H A Dbuild_verity_metadata.py40 def build_verity_table(block_device, data_blocks, root_hash, salt):
49 salt)
53 salt, block_device, signer_path, signing_key):
55 verity_table = build_verity_table(block_device, data_blocks, root_hash, salt)
71 salt = sys.argv[4] variable
76 salt, block_device, signer_path, signing_key)
H A Dbuild_verity_tree.cpp21 const unsigned char *salt; member in struct:sparse_hash_ctx
53 const unsigned char *salt, size_t salt_len,
63 ret &= EVP_DigestUpdate(mdctx, salt, salt_len);
77 const unsigned char *salt, size_t salt_size,
83 hash_block(md, in + i, block_size, salt, salt_size, out, &s);
99 ctx->salt, ctx->salt_size, ctx->block_size);
114 " -a,--salt-str=<string> set salt to <string>\n"
115 " -A,--salt-hex=<hex digits> set salt t
51 hash_block(const EVP_MD *md, const unsigned char *block, size_t len, const unsigned char *salt, size_t salt_len, unsigned char *out, size_t *out_size) argument
74 hash_blocks(const EVP_MD *md, const unsigned char *in, size_t in_size, unsigned char *out, size_t *out_size, const unsigned char *salt, size_t salt_size, size_t block_size) argument
127 unsigned char *salt = NULL; local
[all...]
H A DVerityVerifier.java44 private byte[] salt; field in class:VerityVerifier
251 salt = DatatypeConverter.parseHexBinary(fields[9]);
306 * Hashes a block of data using a salt and checks of the results are expected
312 digest.update(salt);
/system/core/gatekeeperd/
H A DSoftGateKeeper.h36 uint64_t salt; member in struct:gatekeeper::fast_hash_t
81 uint32_t password_length, salt_t salt) const {
83 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt),
84 sizeof(salt), N, r, p, signature, signature_length);
134 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) { argument
136 size_t digest_size = password.length + sizeof(salt);
138 memcpy(digest.get(), &salt, sizeof(salt));
139 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length);
143 fast_hash.salt
158 uint64_t salt; local
[all...]
/system/gatekeeper/include/gatekeeper/
H A Dpassword_handle.h40 salt_t salt; member in struct:gatekeeper::password_handle_t
H A Dgatekeeper.h91 uint32_t password_length, salt_t salt) const = 0;
185 bool CreatePasswordHandle(SizedBuffer *password_handle, salt_t salt,
/system/keymaster/
H A Dhkdf.cpp31 Rfc5869HmacSha256Kdf::Rfc5869HmacSha256Kdf(Buffer& secret, Buffer& salt, Buffer& info, argument
33 Rfc5869HmacSha256Kdf(secret.peek_read(), secret.available_read(), salt.peek_read(),
34 salt.available_read(), info.peek_read(), info.available_read(),
39 const uint8_t* salt, size_t salt_len,
46 if (salt) {
47 result = prk_hmac.Init(salt, salt_len);
50 // If salt is not given, HashLength zeros are used.
38 Rfc5869HmacSha256Kdf(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len, const uint8_t* info, size_t info_len, size_t key_bytes_to_generate, keymaster_error_t* error) argument
H A Dhkdf.h33 // |salt|: an (optional) public salt / non-secret random value. While
34 // optional, callers are strongly recommended to provide a salt. There is no
41 Rfc5869HmacSha256Kdf(Buffer& secret, Buffer& salt, Buffer& info, size_t key_bytes_to_generate,
44 Rfc5869HmacSha256Kdf(const uint8_t* secret, size_t secret_len, const uint8_t* salt,
H A Dhkdf_test.cpp71 const string salt = hex2str(test.salt_hex); local
78 reinterpret_cast<const uint8_t*>(salt.data()), salt.size(),
/system/gatekeeper/
H A Dgatekeeper.cpp88 salt_t salt; local
89 GetRandom(&salt, sizeof(salt));
93 salt, user_id, flags, HANDLE_VERSION, request.provided_password.buffer.get(),
167 bool GateKeeper::CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt, argument
176 password_handle->salt = salt;
195 password_key, password_key_length, to_sign, sizeof(to_sign), salt);
203 if (!CreatePasswordHandle(&provided_handle, expected_handle->salt, expected_handle->user_id,
/system/vold/
H A DExt4Crypt.cpp62 const char* salt = "salt"; member in namespace:__anon1671::tag
89 && props.Set<std::string>(tag::salt,
90 std::string((const char*) crypt_ftr.salt,
127 std::string salt = props.Get<std::string>(tag::salt); local
128 if (salt.size() != SALT_LEN) {
132 memcpy(crypt_ftr.salt, &salt[0], SALT_LEN);
H A Dcryptfs.h23 * The fields after salt are only valid in rev 1.1 and later stuctures.
105 unsigned char salt[SALT_LEN]; /* The salt used for this encryption */ member in struct:crypt_mnt_ftr
214 typedef int (*kdf_func)(const char *passwd, const unsigned char *salt,
H A Dcryptfs.c600 /* key or salt can be NULL, in which case just skip writing that value. Useful to
1250 static int pbkdf2(const char *passwd, const unsigned char *salt, argument
1257 salt, SALT_LEN,
1263 static int scrypt(const char *passwd, const unsigned char *salt, argument
1277 salt, SALT_LEN, N, r, p, ikey,
1283 static int scrypt_keymaster(const char *passwd, const unsigned char *salt, argument
1298 salt, SALT_LEN, N, r, p, ikey,
1312 rc = crypto_scrypt(signature, signature_size, salt, SALT_LEN,
1324 static int encrypt_master_key(const char *passwd, const unsigned char *salt, argument
1344 if (scrypt_keymaster(passwd, salt, ike
1407 decrypt_master_key_aux(const char *passwd, unsigned char *salt, unsigned char *encrypted_master_key, unsigned char *decrypted_master_key, kdf_func kdf, void *kdf_params, unsigned char** intermediate_key, size_t* intermediate_key_size) argument
1490 create_encrypted_random_key(char *passwd, unsigned char *master_key, unsigned char *salt, struct crypt_mnt_ftr *crypt_ftr) argument
[all...]
/system/security/keystore/
H A Dkeystore.cpp838 // we read the raw blob to just to get the salt to generate
845 // find salt at EOF if present, otherwise we have an old file
846 uint8_t* salt; local
848 salt = (uint8_t*) &rawBlob + length - SALT_SIZE;
850 salt = NULL;
853 generateKeyFromPassword(passwordKey, MASTER_KEY_SIZE_BYTES, pw, salt);
863 // if salt was missing, generate one and write a new master key file with the salt.
864 if (salt == NULL) {
930 uint8_t* salt) {
929 generateKeyFromPassword(uint8_t* key, ssize_t keySize, const android::String8& pw, uint8_t* salt) argument
941 PKCS5_PBKDF2_HMAC_SHA1(reinterpret_cast<const char*>(pw.string()), pw.length(), salt, local
[all...]
/system/bt/stack/smp/
H A Dsmp_keys.c1457 ** salt
1458 ** where salt is internal parameter of smp_calculate_f5_key(...).
1682 ** salt
1684 ** Internal: salt is 128 bit.
1699 salt: 6C88 8391 AAF5 A538 6037 0BDB 5A60 83BE
1701 BT_OCTET16 salt = { local
1711 p_prnt = salt;
1712 smp_debug_print_nbyte_little_endian (p_prnt, (const UINT8 *)"salt", BT_OCTET16_LEN);
1721 ARRAY_TO_STREAM(p, salt, BT_OCTET16_LEN);

Completed in 135 milliseconds