/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
H A D | PKCS12KeyWithParameters.java | 14 private final byte[] salt; field in class:PKCS12KeyWithParameters 21 * @param salt salt for generation algorithm 24 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount) argument 28 this.salt = Arrays.clone(salt); 38 * @param salt salt for generation algorithm 42 public PKCS12KeyWithParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount) argument 46 this.salt [all...] |
/external/avahi/avahi-compat-howl/include/ |
H A D | howl.h | 32 #include <salt/salt.h> 33 #include <salt/time.h> 34 #include <salt/debug.h>
|
/external/toybox/toys/other/ |
H A D | mkpasswd.c | 1 /* mkpasswd.c - encrypt the given passwd using salt 29 char *salt; 34 char salt[MAX_SALT_LEN] = {0,}; local 39 if (TT.salt) error_exit("duplicate salt"); 40 TT.salt = toys.optargs[1]; 43 if (-1 == (i = get_salt(salt, TT.method))) error_exit("bad -m"); 44 if (TT.salt) { 45 char *s = TT.salt; 49 if (*s) error_exit("salt no [all...] |
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/rdtypes/ANY/ |
H A D | NSEC3PARAM.py | 31 @ivar salt: the salt 32 @type salt: string""" 34 __slots__ = ['algorithm', 'flags', 'iterations', 'salt'] 36 def __init__(self, rdclass, rdtype, algorithm, flags, iterations, salt): 41 self.salt = salt 44 if self.salt == '': 45 salt = '-' 47 salt [all...] |
H A D | NSEC3.py | 45 @ivar salt: the salt 46 @type salt: string 52 __slots__ = ['algorithm', 'flags', 'iterations', 'salt', 'next', 'windows'] 54 def __init__(self, rdclass, rdtype, algorithm, flags, iterations, salt, 60 self.salt = salt 66 if self.salt == '': 67 salt = '-' 69 salt [all...] |
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
H A D | PBEParameterSpecTest.java | 38 * PBEParameterSpec(byte[] salt, int iterationCount) method testing. 43 byte[] salt = { 1, 2, 3, 4, 5 }; 49 + "in the case of null salt."); 53 PBEParameterSpec pbeps = new PBEParameterSpec(salt, iterationCount); 54 salt[0]++; 55 assertFalse("The change of salt specified in the constructor " 57 salt[0] == pbeps.getSalt()[0]); 61 * getSalt() method testing. Tests that returned salt is equal 62 * to the salt specified in the constructor and that the change of 66 byte[] salt [all...] |
H A D | PBEKeySpecTest.java | 60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int 67 byte[] salt = new byte[] { 1, 2, 3, 4, 5 }; 72 PBEKeySpec pbeks = new PBEKeySpec(null, salt, 85 + "in the case of null salt."); 94 + "in the case of empty salt."); 99 new PBEKeySpec(password, salt, -1, keyLength); 106 new PBEKeySpec(password, salt, iterationCount, -1); 113 new PBEKeySpec(password, salt, 0, keyLength); 120 new PBEKeySpec(password, salt, iterationCount, 0); 126 PBEKeySpec pbeks = new PBEKeySpec(password, salt, [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
H A D | PBEParameter.java | 18 ASN1OctetString salt; field in class:PBEParameter 21 byte[] salt, 24 if (salt.length != 8) 26 throw new IllegalArgumentException("salt length must be 8"); 28 this.salt = new DEROctetString(salt); 35 salt = (ASN1OctetString)seq.getObjectAt(0); 61 return salt.getOctets(); 68 v.add(salt); 20 PBEParameter( byte[] salt, int iterations) argument
|
H A D | MacData.java | 21 byte[] salt; field in class:MacData 44 this.salt = ((ASN1OctetString)seq.getObjectAt(1)).getOctets(); 58 byte[] salt, 62 this.salt = salt; 73 return salt; 97 v.add(new DEROctetString(salt)); 56 MacData( DigestInfo digInfo, byte[] salt, int iterationCount) argument
|
H A D | PBKDF2Params.java | 21 * salt CHOICE { 63 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf. 65 * @param salt input salt. 69 byte[] salt, 72 this(salt, iterationCount, 0); 76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf. 78 * @param salt input salt. 83 byte[] salt, 68 PBKDF2Params( byte[] salt, int iterationCount) argument 82 PBKDF2Params( byte[] salt, int iterationCount, int keyLength) argument 98 PBKDF2Params( byte[] salt, int iterationCount, int keyLength, AlgorithmIdentifier prf) argument 126 PBKDF2Params( byte[] salt, int iterationCount, AlgorithmIdentifier prf) argument [all...] |
/external/boringssl/src/crypto/pkcs8/ |
H A D | p5_pbe.c | 70 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING), 80 const unsigned char *salt, int saltlen) 101 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen)) 106 sstr = ASN1_STRING_data(pbe->salt); 107 if (salt) 108 memcpy(sstr, salt, saltlen); 135 const unsigned char *salt, int saltlen) 145 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/ |
H A D | PBKDF2KeySpec.java | 19 * @param salt salt to use in the generator, 24 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) argument 26 super(password, salt, iterationCount, keySize);
|
/external/openssh/openbsd-compat/ |
H A D | xcrypt.c | 66 xcrypt(const char *password, const char *salt) argument 71 if (is_md5_salt(salt)) 72 crypted = md5_crypt(password, salt); 74 crypted = crypt(password, salt); 77 crypted = bigcrypt(password, salt); 79 crypted = crypt(password, salt); 81 crypted = bigcrypt(password, salt); 83 crypted = crypt(password, salt);
|
H A D | port-uw.c | 57 char *salt; local 67 /* Encrypt the candidate password using the proper salt. */ 68 salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx"; 76 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0) 77 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0)); 81 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
H A D | PBEParametersGenerator.java | 11 protected byte[] salt; field in class:PBEParametersGenerator 25 * @param salt the salt to be mixed with the password. 31 byte[] salt, 35 this.salt = salt; 50 * return the salt byte array. 52 * @return the salt byte array. 56 return salt; 29 init( byte[] password, byte[] salt, int iterationCount) argument
|
/external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/ |
H A D | security.py | 105 to set the method to plain to enforce plaintext passwords. If a salt 106 is used, hmac is used internally to salt the password. 113 Length of the salt to be created. 119 method$salt$hash 123 salt = method != 'plain' and generate_random_string(length) or '' 124 hashval = hash_password(password, method, salt, pepper) 128 return '%s$%s$%s' % (hashval, method, salt) 151 hashval, method, salt = pwhash.split('$', 2) 152 return hash_password(password, method, salt, pepper) == hashval 155 def hash_password(password, method, salt [all...] |
/external/avahi/avahi-compat-howl/include/salt/ |
H A D | signal.h | 32 #include <salt/platform.h>
|
H A D | salt.h | 32 #include <salt/platform.h> 33 #include <salt/time.h> 61 sw_salt salt, 71 sw_salt salt, 80 sw_salt salt, 88 sw_salt salt,
|
/external/boringssl/include/openssl/ |
H A D | hkdf.h | 26 * with |salt| and |info| using |digest|, and outputs |out_len| bytes to 34 const uint8_t *salt, size_t salt_len,
|
/external/boringssl/src/include/openssl/ |
H A D | hkdf.h | 26 * with |salt| and |info| using |digest|, and outputs |out_len| bytes to 34 const uint8_t *salt, size_t salt_len,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
H A D | OpenSSLPBEParametersGenerator.java | 37 * @param salt salt to use. 41 byte[] salt) 43 super.init(password, salt, 1); 47 * the derived key function, the ith hash of the password and the salt. 59 digest.update(salt, 0, salt.length); 83 * Generate a key parameter derived from the password, salt, and iteration 102 * the password, salt, and iteration count we are currently initialised 124 * salt, an 39 init( byte[] password, byte[] salt) argument [all...] |
/external/avahi/avahi-compat-howl/include/corby/ |
H A D | orb.h | 32 #include <salt/salt.h> 33 #include <salt/address.h> 34 #include <salt/socket.h> 80 sw_salt salt, 94 sw_salt salt, 103 sw_salt salt,
|
H A D | corby.h | 32 #include <salt/platform.h>
|
/external/libbrillo/brillo/ |
H A D | cryptohome.cc | 29 static char g_system_salt_path[PATH_MAX] = "/home/.shadow/salt"; 31 static std::string* salt = nullptr; member in namespace:brillo::cryptohome::home 34 if (salt && !salt->empty()) 39 PLOG(ERROR) << "Could not get size of system salt: " << g_system_salt_path; 43 LOG(ERROR) << "System salt too large: " << file_size; 55 if (!salt) 56 salt = new std::string(); 57 salt->assign(buf.data(), file_size); 71 SHA1_Update(&ctx, salt [all...] |
/external/boringssl/src/crypto/evp/ |
H A D | pbkdf.c | 64 const uint8_t *salt, size_t salt_len, unsigned iterations, 96 if (!HMAC_Update(&hctx, salt, salt_len) || 146 const uint8_t *salt, size_t salt_len, 149 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations, 63 PKCS5_PBKDF2_HMAC(const char *password, size_t password_len, const uint8_t *salt, size_t salt_len, unsigned iterations, const EVP_MD *digest, size_t key_len, uint8_t *out_key) argument 145 PKCS5_PBKDF2_HMAC_SHA1(const char *password, size_t password_len, const uint8_t *salt, size_t salt_len, unsigned iterations, size_t key_len, uint8_t *out_key) argument
|