Searched refs:salt (Results 1 - 25 of 115) sorted by relevance

12345

/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
H A DPKCS12KeyWithParameters.java14 private final byte[] salt; field in class:PKCS12KeyWithParameters
21 * @param salt salt for generation algorithm
24 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount) argument
28 this.salt = Arrays.clone(salt);
38 * @param salt salt for generation algorithm
42 public PKCS12KeyWithParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount) argument
46 this.salt
[all...]
/external/avahi/avahi-compat-howl/include/
H A Dhowl.h32 #include <salt/salt.h>
33 #include <salt/time.h>
34 #include <salt/debug.h>
/external/toybox/toys/other/
H A Dmkpasswd.c1 /* mkpasswd.c - encrypt the given passwd using salt
29 char *salt;
34 char salt[MAX_SALT_LEN] = {0,}; local
39 if (TT.salt) error_exit("duplicate salt");
40 TT.salt = toys.optargs[1];
43 if (-1 == (i = get_salt(salt, TT.method))) error_exit("bad -m");
44 if (TT.salt) {
45 char *s = TT.salt;
49 if (*s) error_exit("salt no
[all...]
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/rdtypes/ANY/
H A DNSEC3PARAM.py31 @ivar salt: the salt
32 @type salt: string"""
34 __slots__ = ['algorithm', 'flags', 'iterations', 'salt']
36 def __init__(self, rdclass, rdtype, algorithm, flags, iterations, salt):
41 self.salt = salt
44 if self.salt == '':
45 salt = '-'
47 salt
[all...]
H A DNSEC3.py45 @ivar salt: the salt
46 @type salt: string
52 __slots__ = ['algorithm', 'flags', 'iterations', 'salt', 'next', 'windows']
54 def __init__(self, rdclass, rdtype, algorithm, flags, iterations, salt,
60 self.salt = salt
66 if self.salt == '':
67 salt = '-'
69 salt
[all...]
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
H A DPBEParameterSpecTest.java38 * PBEParameterSpec(byte[] salt, int iterationCount) method testing.
43 byte[] salt = { 1, 2, 3, 4, 5 };
49 + "in the case of null salt.");
53 PBEParameterSpec pbeps = new PBEParameterSpec(salt, iterationCount);
54 salt[0]++;
55 assertFalse("The change of salt specified in the constructor "
57 salt[0] == pbeps.getSalt()[0]);
61 * getSalt() method testing. Tests that returned salt is equal
62 * to the salt specified in the constructor and that the change of
66 byte[] salt
[all...]
H A DPBEKeySpecTest.java60 * PBEKeySpec(char[] password, byte[] salt, int iterationCount, int
67 byte[] salt = new byte[] { 1, 2, 3, 4, 5 };
72 PBEKeySpec pbeks = new PBEKeySpec(null, salt,
85 + "in the case of null salt.");
94 + "in the case of empty salt.");
99 new PBEKeySpec(password, salt, -1, keyLength);
106 new PBEKeySpec(password, salt, iterationCount, -1);
113 new PBEKeySpec(password, salt, 0, keyLength);
120 new PBEKeySpec(password, salt, iterationCount, 0);
126 PBEKeySpec pbeks = new PBEKeySpec(password, salt,
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
H A DPBEParameter.java18 ASN1OctetString salt; field in class:PBEParameter
21 byte[] salt,
24 if (salt.length != 8)
26 throw new IllegalArgumentException("salt length must be 8");
28 this.salt = new DEROctetString(salt);
35 salt = (ASN1OctetString)seq.getObjectAt(0);
61 return salt.getOctets();
68 v.add(salt);
20 PBEParameter( byte[] salt, int iterations) argument
H A DMacData.java21 byte[] salt; field in class:MacData
44 this.salt = ((ASN1OctetString)seq.getObjectAt(1)).getOctets();
58 byte[] salt,
62 this.salt = salt;
73 return salt;
97 v.add(new DEROctetString(salt));
56 MacData( DigestInfo digInfo, byte[] salt, int iterationCount) argument
H A DPBKDF2Params.java21 * salt CHOICE {
63 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf.
65 * @param salt input salt.
69 byte[] salt,
72 this(salt, iterationCount, 0);
76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf.
78 * @param salt input salt.
83 byte[] salt,
68 PBKDF2Params( byte[] salt, int iterationCount) argument
82 PBKDF2Params( byte[] salt, int iterationCount, int keyLength) argument
98 PBKDF2Params( byte[] salt, int iterationCount, int keyLength, AlgorithmIdentifier prf) argument
126 PBKDF2Params( byte[] salt, int iterationCount, AlgorithmIdentifier prf) argument
[all...]
/external/boringssl/src/crypto/pkcs8/
H A Dp5_pbe.c70 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
80 const unsigned char *salt, int saltlen)
101 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
106 sstr = ASN1_STRING_data(pbe->salt);
107 if (salt)
108 memcpy(sstr, salt, saltlen);
135 const unsigned char *salt, int saltlen)
145 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/
H A DPBKDF2KeySpec.java19 * @param salt salt to use in the generator,
24 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) argument
26 super(password, salt, iterationCount, keySize);
/external/openssh/openbsd-compat/
H A Dxcrypt.c66 xcrypt(const char *password, const char *salt) argument
71 if (is_md5_salt(salt))
72 crypted = md5_crypt(password, salt);
74 crypted = crypt(password, salt);
77 crypted = bigcrypt(password, salt);
79 crypted = crypt(password, salt);
81 crypted = bigcrypt(password, salt);
83 crypted = crypt(password, salt);
H A Dport-uw.c57 char *salt; local
67 /* Encrypt the candidate password using the proper salt. */
68 salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx";
76 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0)
77 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0));
81 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
H A DPBEParametersGenerator.java11 protected byte[] salt; field in class:PBEParametersGenerator
25 * @param salt the salt to be mixed with the password.
31 byte[] salt,
35 this.salt = salt;
50 * return the salt byte array.
52 * @return the salt byte array.
56 return salt;
29 init( byte[] password, byte[] salt, int iterationCount) argument
/external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/
H A Dsecurity.py105 to set the method to plain to enforce plaintext passwords. If a salt
106 is used, hmac is used internally to salt the password.
113 Length of the salt to be created.
119 method$salt$hash
123 salt = method != 'plain' and generate_random_string(length) or ''
124 hashval = hash_password(password, method, salt, pepper)
128 return '%s$%s$%s' % (hashval, method, salt)
151 hashval, method, salt = pwhash.split('$', 2)
152 return hash_password(password, method, salt, pepper) == hashval
155 def hash_password(password, method, salt
[all...]
/external/avahi/avahi-compat-howl/include/salt/
H A Dsignal.h32 #include <salt/platform.h>
H A Dsalt.h32 #include <salt/platform.h>
33 #include <salt/time.h>
61 sw_salt salt,
71 sw_salt salt,
80 sw_salt salt,
88 sw_salt salt,
/external/boringssl/include/openssl/
H A Dhkdf.h26 * with |salt| and |info| using |digest|, and outputs |out_len| bytes to
34 const uint8_t *salt, size_t salt_len,
/external/boringssl/src/include/openssl/
H A Dhkdf.h26 * with |salt| and |info| using |digest|, and outputs |out_len| bytes to
34 const uint8_t *salt, size_t salt_len,
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
H A DOpenSSLPBEParametersGenerator.java37 * @param salt salt to use.
41 byte[] salt)
43 super.init(password, salt, 1);
47 * the derived key function, the ith hash of the password and the salt.
59 digest.update(salt, 0, salt.length);
83 * Generate a key parameter derived from the password, salt, and iteration
102 * the password, salt, and iteration count we are currently initialised
124 * salt, an
39 init( byte[] password, byte[] salt) argument
[all...]
/external/avahi/avahi-compat-howl/include/corby/
H A Dorb.h32 #include <salt/salt.h>
33 #include <salt/address.h>
34 #include <salt/socket.h>
80 sw_salt salt,
94 sw_salt salt,
103 sw_salt salt,
H A Dcorby.h32 #include <salt/platform.h>
/external/libbrillo/brillo/
H A Dcryptohome.cc29 static char g_system_salt_path[PATH_MAX] = "/home/.shadow/salt";
31 static std::string* salt = nullptr; member in namespace:brillo::cryptohome::home
34 if (salt && !salt->empty())
39 PLOG(ERROR) << "Could not get size of system salt: " << g_system_salt_path;
43 LOG(ERROR) << "System salt too large: " << file_size;
55 if (!salt)
56 salt = new std::string();
57 salt->assign(buf.data(), file_size);
71 SHA1_Update(&ctx, salt
[all...]
/external/boringssl/src/crypto/evp/
H A Dpbkdf.c64 const uint8_t *salt, size_t salt_len, unsigned iterations,
96 if (!HMAC_Update(&hctx, salt, salt_len) ||
146 const uint8_t *salt, size_t salt_len,
149 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
63 PKCS5_PBKDF2_HMAC(const char *password, size_t password_len, const uint8_t *salt, size_t salt_len, unsigned iterations, const EVP_MD *digest, size_t key_len, uint8_t *out_key) argument
145 PKCS5_PBKDF2_HMAC_SHA1(const char *password, size_t password_len, const uint8_t *salt, size_t salt_len, unsigned iterations, size_t key_len, uint8_t *out_key) argument

Completed in 407 milliseconds

12345