Searched refs:salt (Results 1 - 25 of 104) sorted by relevance

12345

/external/syslinux/com32/cmenu/libmenu/
H A Ddes.h6 extern char *crypt(const char *key, const char *salt);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/
H A DPKCS12KeyWithParameters.java14 private final byte[] salt; field in class:PKCS12KeyWithParameters
21 * @param salt salt for generation algorithm
24 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount) argument
28 this.salt = Arrays.clone(salt);
38 * @param salt salt for generation algorithm
42 public PKCS12KeyWithParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount) argument
46 this.salt
[all...]
/external/syslinux/utils/
H A Dmd5pass27 ($pass, $salt) = @ARGV;
29 unless (defined($salt)) {
30 $salt = MIME::Base64::encode(random_bytes(6), '');
31 $salt =~ tr/\+/./; # . not +
34 print unix_md5_crypt($pass, $salt), "\n";
H A Dsha1pass27 ($pass, $salt) = @ARGV;
29 unless (defined($salt)) {
30 $salt = MIME::Base64::encode(random_bytes(6), '');
32 $pass = Digest::SHA1::sha1_base64($salt, $pass);
34 print '$4$', $salt, '$', $pass, "\$\n";
/external/toybox/toys/other/
H A Dmkpasswd.c1 /* mkpasswd.c - encrypt the given passwd using salt
30 char *salt;
35 char salt[MAX_SALT_LEN] = {0,}; local
40 if (TT.salt) error_exit("duplicate salt");
41 TT.salt = toys.optargs[1];
44 if (-1 == (i = get_salt(salt, TT.method))) error_exit("bad -m");
45 if (TT.salt) {
46 char *s = TT.salt;
50 if (*s) error_exit("salt no
[all...]
/external/openssh/openbsd-compat/
H A Dxcrypt.c67 * Pick an appropriate password encryption type and salt for the running
69 * salt. Usually this will be root unless the root account is locked out.
70 * If we don't find one we return a traditional DES-based salt.
78 static char salt[32]; local
80 if (salt[0] != '\0')
81 return salt;
82 strlcpy(salt, "xx", sizeof(salt));
88 strlcpy(salt, passwd, MIN(typelen, sizeof(salt)));
99 xcrypt(const char *password, const char *salt) argument
[all...]
H A Dport-uw.c57 char *salt; local
67 /* Encrypt the candidate password using the proper salt. */
68 salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx";
76 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0)
77 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0));
81 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
/external/python/cpython2/Modules/
H A Dcryptmodule.c17 char *word, *salt; local
22 if (!PyArg_ParseTuple(args, "ss:crypt", &word, &salt)) {
26 salt. Return None in that case. XXX Maybe raise an exception? */
27 return Py_BuildValue("s", crypt(word, salt));
32 "crypt(word, salt) -> string\n\
33 word will usually be a user's password. salt is a 2-character string\n\
35 in salt must be either \".\", \"/\", or an alphanumeric character. Returns\n\
37 the same alphabet as the salt.");
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
H A DPBEParameter.java18 ASN1OctetString salt; field in class:PBEParameter
21 byte[] salt,
24 if (salt.length != 8)
26 throw new IllegalArgumentException("salt length must be 8");
28 this.salt = new DEROctetString(salt);
35 salt = (ASN1OctetString)seq.getObjectAt(0);
61 return salt.getOctets();
68 v.add(salt);
20 PBEParameter( byte[] salt, int iterations) argument
H A DMacData.java22 byte[] salt; field in class:MacData
45 this.salt = Arrays.clone(((ASN1OctetString)seq.getObjectAt(1)).getOctets());
59 byte[] salt,
63 this.salt = Arrays.clone(salt);
74 return Arrays.clone(salt);
98 v.add(new DEROctetString(salt));
57 MacData( DigestInfo digInfo, byte[] salt, int iterationCount) argument
H A DPBKDF2Params.java21 * salt CHOICE {
63 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf.
65 * @param salt input salt.
69 byte[] salt,
72 this(salt, iterationCount, 0);
76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf.
78 * @param salt input salt.
83 byte[] salt,
68 PBKDF2Params( byte[] salt, int iterationCount) argument
82 PBKDF2Params( byte[] salt, int iterationCount, int keyLength) argument
98 PBKDF2Params( byte[] salt, int iterationCount, int keyLength, AlgorithmIdentifier prf) argument
126 PBKDF2Params( byte[] salt, int iterationCount, AlgorithmIdentifier prf) argument
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
H A DPBEParametersGenerator.java11 protected byte[] salt; field in class:PBEParametersGenerator
25 * @param salt the salt to be mixed with the password.
31 byte[] salt,
35 this.salt = salt;
50 * return the salt byte array.
52 * @return the salt byte array.
56 return salt;
29 init( byte[] password, byte[] salt, int iterationCount) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/
H A DPBKDF2KeySpec.java23 * @param salt salt to use in the generator,
28 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) argument
30 super(password, salt, iterationCount, keySize);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
H A DOpenSSLPBEParametersGenerator.java39 * @param salt salt to use.
43 byte[] salt)
45 super.init(password, salt, 1);
49 * the derived key function, the ith hash of the password and the salt.
61 digest.update(salt, 0, salt.length);
85 * Generate a key parameter derived from the password, salt, and iteration
104 * the password, salt, and iteration count we are currently initialised
126 * salt, an
41 init( byte[] password, byte[] salt) argument
[all...]
/external/libbrillo/brillo/
H A Dcryptohome.cc29 static char g_system_salt_path[PATH_MAX] = "/home/.shadow/salt";
31 static std::string* salt = nullptr; member in namespace:brillo::cryptohome::home
34 if (salt && !salt->empty())
39 PLOG(ERROR) << "Could not get size of system salt: " << g_system_salt_path;
43 LOG(ERROR) << "System salt too large: " << file_size;
55 if (!salt)
56 salt = new std::string();
57 salt->assign(buf.data(), file_size);
71 SHA1_Update(&ctx, salt
[all...]
/external/e2fsprogs/misc/
H A De4crypt.c180 struct salt { struct
181 unsigned char *salt; member in struct:salt
187 struct salt *salt_list;
192 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) argument
195 struct salt *p;
199 !memcmp(p->salt, salt, salt_len))
204 static void add_salt(unsigned char *salt, size_t salt_len) argument
206 if (find_by_salt(salt, salt_le
350 struct salt *salt; local
405 pbkdf2_sha512(const char *passphrase, struct salt *salt, unsigned int count, unsigned char derived_key[EXT4_MAX_KEY_SIZE]) argument
542 generate_key_ref_str(struct salt *salt) argument
558 insert_key_into_keyring(const char *keyring, struct salt *salt) argument
645 struct salt *salt; local
[all...]
/external/f2fs-tools/tools/
H A Df2fscrypt.c222 struct salt { struct
223 unsigned char *salt; member in struct:salt
229 struct salt *salt_list;
234 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) argument
237 struct salt *p;
241 !memcmp(p->salt, salt, salt_len))
246 static void add_salt(unsigned char *salt, size_t salt_len) argument
248 if (find_by_salt(salt, salt_le
390 struct salt *salt; local
445 pbkdf2_sha512(const char *passphrase, struct salt *salt, unsigned int count, unsigned char derived_key[F2FS_MAX_KEY_SIZE]) argument
582 generate_key_ref_str(struct salt *salt) argument
598 insert_key_into_keyring(const char *keyring, struct salt *salt) argument
685 struct salt *salt; local
[all...]
/external/boringssl/include/openssl/
H A Dhkdf.h29 * |secret| with |salt| and |info| using |digest|, and outputs |out_len| bytes
37 const uint8_t *salt, size_t salt_len,
41 * keying material |secret| and salt |salt| using |digest|, and outputs
46 size_t secret_len, const uint8_t *salt,
/external/boringssl/src/include/openssl/
H A Dhkdf.h29 * |secret| with |salt| and |info| using |digest|, and outputs |out_len| bytes
37 const uint8_t *salt, size_t salt_len,
41 * keying material |secret| and salt |salt| using |digest|, and outputs
46 size_t secret_len, const uint8_t *salt,
/external/boringssl/src/crypto/evp/
H A Dpbkdf.c66 const uint8_t *salt, size_t salt_len, unsigned iterations,
94 !HMAC_Update(&hctx, salt, salt_len) ||
141 const uint8_t *salt, size_t salt_len,
144 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations,
65 PKCS5_PBKDF2_HMAC(const char *password, size_t password_len, const uint8_t *salt, size_t salt_len, unsigned iterations, const EVP_MD *digest, size_t key_len, uint8_t *out_key) argument
140 PKCS5_PBKDF2_HMAC_SHA1(const char *password, size_t password_len, const uint8_t *salt, size_t salt_len, unsigned iterations, size_t key_len, uint8_t *out_key) argument
H A Dscrypt_test.cc42 std::vector<uint8_t> password, salt, key;
45 ASSERT_TRUE(t->GetBytes(&salt, "Salt"));
56 password.size(), salt.data(), salt.size(), N, r,
/external/syslinux/gpxe/src/include/gpxe/
H A Dsha1.h21 const void *salt, size_t salt_len,
/external/tpm2/
H A DStartAuthSession.c36 OBJECT *tpmKey; // TPM key for decrypt salt
38 TPM2B_DATA salt; local
58 // Decrypting salt requires accessing the private portion of a key.
71 &in->encryptedSalt, &salt);
81 salt.t.size = 0;
106 in->bind, &salt, &out->sessionHandle);
/external/boringssl/src/crypto/pkcs8/
H A Dpkcs8.c99 int pkcs12_key_gen(const char *pass, size_t pass_len, const uint8_t *salt, argument
130 /* 2. Concatenate copies of the salt together to create a string S of length
131 * v(ceiling(s/v)) bits (the final copy of the salt may be truncated to
132 * create S). Note that if the salt is the empty string, then so is S.
160 I[i] = salt[i % salt_len];
232 const uint8_t *salt, size_t salt_len,
239 if (!pkcs12_key_gen(pass, pass_len, salt, salt_len, PKCS12_KEY_ID, iterations,
241 !pkcs12_key_gen(pass, pass_len, salt, salt_len, PKCS12_IV_ID, iterations,
256 CBS pbe_param, salt; local
259 !CBS_get_asn1(&pbe_param, &salt, CBS_ASN1_OCTETSTRIN
229 pkcs12_pbe_cipher_init(const struct pbe_suite *suite, EVP_CIPHER_CTX *ctx, unsigned iterations, const char *pass, size_t pass_len, const uint8_t *salt, size_t salt_len, int is_encrypt) argument
326 pkcs12_pbe_encrypt_init(CBB *out, EVP_CIPHER_CTX *ctx, int alg, unsigned iterations, const char *pass, size_t pass_len, const uint8_t *salt, size_t salt_len) argument
439 PKCS8_marshal_encrypted_private_key(CBB *out, int pbe_nid, const EVP_CIPHER *cipher, const char *pass, size_t pass_len, const uint8_t *salt, size_t salt_len, int iterations, const EVP_PKEY *pkey) argument
[all...]
/external/boringssl/src/crypto/cipher_extra/
H A Dderive_key.c68 const uint8_t *salt, const uint8_t *data, size_t data_len,
99 if (salt != NULL) {
100 if (!EVP_DigestUpdate(&c, salt, PKCS5_SALT_LEN)) {
67 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const uint8_t *salt, const uint8_t *data, size_t data_len, unsigned count, uint8_t *key, uint8_t *iv) argument

Completed in 811 milliseconds

12345