/system/extras/verity/ |
H A D | build_verity_metadata.py | 40 def build_verity_table(block_device, data_blocks, root_hash, salt): 49 salt) 53 salt, block_device, signer_path, signing_key): 55 verity_table = build_verity_table(block_device, data_blocks, root_hash, salt) 71 salt = sys.argv[4] variable 76 salt, block_device, signer_path, signing_key)
|
H A D | build_verity_tree.cpp | 21 const unsigned char *salt; member in struct:sparse_hash_ctx 53 const unsigned char *salt, size_t salt_len, 63 ret &= EVP_DigestUpdate(mdctx, salt, salt_len); 77 const unsigned char *salt, size_t salt_size, 83 hash_block(md, in + i, block_size, salt, salt_size, out, &s); 99 ctx->salt, ctx->salt_size, ctx->block_size); 114 " -a,--salt-str=<string> set salt to <string>\n" 115 " -A,--salt-hex=<hex digits> set salt t 51 hash_block(const EVP_MD *md, const unsigned char *block, size_t len, const unsigned char *salt, size_t salt_len, unsigned char *out, size_t *out_size) argument 74 hash_blocks(const EVP_MD *md, const unsigned char *in, size_t in_size, unsigned char *out, size_t *out_size, const unsigned char *salt, size_t salt_size, size_t block_size) argument 127 unsigned char *salt = NULL; local [all...] |
H A D | VerityVerifier.java | 44 private byte[] salt; field in class:VerityVerifier 251 salt = DatatypeConverter.parseHexBinary(fields[9]); 306 * Hashes a block of data using a salt and checks of the results are expected 312 digest.update(salt);
|
/system/core/gatekeeperd/ |
H A D | SoftGateKeeper.h | 36 uint64_t salt; member in struct:gatekeeper::fast_hash_t 81 uint32_t password_length, salt_t salt) const { 83 crypto_scrypt(password, password_length, reinterpret_cast<uint8_t *>(&salt), 84 sizeof(salt), N, r, p, signature, signature_length); 134 fast_hash_t ComputeFastHash(const SizedBuffer &password, uint64_t salt) { argument 136 size_t digest_size = password.length + sizeof(salt); 138 memcpy(digest.get(), &salt, sizeof(salt)); 139 memcpy(digest.get() + sizeof(salt), password.buffer.get(), password.length); 143 fast_hash.salt 158 uint64_t salt; local [all...] |
/system/gatekeeper/include/gatekeeper/ |
H A D | password_handle.h | 40 salt_t salt; member in struct:gatekeeper::password_handle_t
|
H A D | gatekeeper.h | 91 uint32_t password_length, salt_t salt) const = 0; 185 bool CreatePasswordHandle(SizedBuffer *password_handle, salt_t salt,
|
/system/keymaster/ |
H A D | hkdf.cpp | 31 Rfc5869HmacSha256Kdf::Rfc5869HmacSha256Kdf(Buffer& secret, Buffer& salt, Buffer& info, argument 33 Rfc5869HmacSha256Kdf(secret.peek_read(), secret.available_read(), salt.peek_read(), 34 salt.available_read(), info.peek_read(), info.available_read(), 39 const uint8_t* salt, size_t salt_len, 46 if (salt) { 47 result = prk_hmac.Init(salt, salt_len); 50 // If salt is not given, HashLength zeros are used. 38 Rfc5869HmacSha256Kdf(const uint8_t* secret, size_t secret_len, const uint8_t* salt, size_t salt_len, const uint8_t* info, size_t info_len, size_t key_bytes_to_generate, keymaster_error_t* error) argument
|
H A D | hkdf.h | 33 // |salt|: an (optional) public salt / non-secret random value. While 34 // optional, callers are strongly recommended to provide a salt. There is no 41 Rfc5869HmacSha256Kdf(Buffer& secret, Buffer& salt, Buffer& info, size_t key_bytes_to_generate, 44 Rfc5869HmacSha256Kdf(const uint8_t* secret, size_t secret_len, const uint8_t* salt,
|
H A D | hkdf_test.cpp | 71 const string salt = hex2str(test.salt_hex); local 78 reinterpret_cast<const uint8_t*>(salt.data()), salt.size(),
|
/system/gatekeeper/ |
H A D | gatekeeper.cpp | 88 salt_t salt; local 89 GetRandom(&salt, sizeof(salt)); 93 salt, user_id, flags, HANDLE_VERSION, request.provided_password.buffer.get(), 167 bool GateKeeper::CreatePasswordHandle(SizedBuffer *password_handle_buffer, salt_t salt, argument 176 password_handle->salt = salt; 195 password_key, password_key_length, to_sign, sizeof(to_sign), salt); 203 if (!CreatePasswordHandle(&provided_handle, expected_handle->salt, expected_handle->user_id,
|
/system/vold/ |
H A D | Ext4Crypt.cpp | 62 const char* salt = "salt"; member in namespace:__anon1671::tag 89 && props.Set<std::string>(tag::salt, 90 std::string((const char*) crypt_ftr.salt, 127 std::string salt = props.Get<std::string>(tag::salt); local 128 if (salt.size() != SALT_LEN) { 132 memcpy(crypt_ftr.salt, &salt[0], SALT_LEN);
|
H A D | cryptfs.h | 23 * The fields after salt are only valid in rev 1.1 and later stuctures. 105 unsigned char salt[SALT_LEN]; /* The salt used for this encryption */ member in struct:crypt_mnt_ftr 214 typedef int (*kdf_func)(const char *passwd, const unsigned char *salt,
|
H A D | cryptfs.c | 600 /* key or salt can be NULL, in which case just skip writing that value. Useful to 1250 static int pbkdf2(const char *passwd, const unsigned char *salt, argument 1257 salt, SALT_LEN, 1263 static int scrypt(const char *passwd, const unsigned char *salt, argument 1277 salt, SALT_LEN, N, r, p, ikey, 1283 static int scrypt_keymaster(const char *passwd, const unsigned char *salt, argument 1298 salt, SALT_LEN, N, r, p, ikey, 1312 rc = crypto_scrypt(signature, signature_size, salt, SALT_LEN, 1324 static int encrypt_master_key(const char *passwd, const unsigned char *salt, argument 1344 if (scrypt_keymaster(passwd, salt, ike 1407 decrypt_master_key_aux(const char *passwd, unsigned char *salt, unsigned char *encrypted_master_key, unsigned char *decrypted_master_key, kdf_func kdf, void *kdf_params, unsigned char** intermediate_key, size_t* intermediate_key_size) argument 1490 create_encrypted_random_key(char *passwd, unsigned char *master_key, unsigned char *salt, struct crypt_mnt_ftr *crypt_ftr) argument [all...] |
/system/security/keystore/ |
H A D | keystore.cpp | 838 // we read the raw blob to just to get the salt to generate 845 // find salt at EOF if present, otherwise we have an old file 846 uint8_t* salt; local 848 salt = (uint8_t*) &rawBlob + length - SALT_SIZE; 850 salt = NULL; 853 generateKeyFromPassword(passwordKey, MASTER_KEY_SIZE_BYTES, pw, salt); 863 // if salt was missing, generate one and write a new master key file with the salt. 864 if (salt == NULL) { 930 uint8_t* salt) { 929 generateKeyFromPassword(uint8_t* key, ssize_t keySize, const android::String8& pw, uint8_t* salt) argument 941 PKCS5_PBKDF2_HMAC_SHA1(reinterpret_cast<const char*>(pw.string()), pw.length(), salt, local [all...] |
/system/bt/stack/smp/ |
H A D | smp_keys.c | 1457 ** salt 1458 ** where salt is internal parameter of smp_calculate_f5_key(...). 1682 ** salt 1684 ** Internal: salt is 128 bit. 1699 salt: 6C88 8391 AAF5 A538 6037 0BDB 5A60 83BE 1701 BT_OCTET16 salt = { local 1711 p_prnt = salt; 1712 smp_debug_print_nbyte_little_endian (p_prnt, (const UINT8 *)"salt", BT_OCTET16_LEN); 1721 ARRAY_TO_STREAM(p, salt, BT_OCTET16_LEN);
|