/external/syslinux/com32/cmenu/libmenu/ |
H A D | des.h | 6 extern char *crypt(const char *key, const char *salt);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
H A D | PKCS12KeyWithParameters.java | 14 private final byte[] salt; field in class:PKCS12KeyWithParameters 21 * @param salt salt for generation algorithm 24 public PKCS12KeyWithParameters(char[] password, byte[] salt, int iterationCount) argument 28 this.salt = Arrays.clone(salt); 38 * @param salt salt for generation algorithm 42 public PKCS12KeyWithParameters(char[] password, boolean useWrongZeroLengthConversion, byte[] salt, int iterationCount) argument 46 this.salt [all...] |
/external/syslinux/utils/ |
H A D | md5pass | 27 ($pass, $salt) = @ARGV; 29 unless (defined($salt)) { 30 $salt = MIME::Base64::encode(random_bytes(6), ''); 31 $salt =~ tr/\+/./; # . not + 34 print unix_md5_crypt($pass, $salt), "\n";
|
H A D | sha1pass | 27 ($pass, $salt) = @ARGV; 29 unless (defined($salt)) { 30 $salt = MIME::Base64::encode(random_bytes(6), ''); 32 $pass = Digest::SHA1::sha1_base64($salt, $pass); 34 print '$4$', $salt, '$', $pass, "\$\n";
|
/external/toybox/toys/other/ |
H A D | mkpasswd.c | 1 /* mkpasswd.c - encrypt the given passwd using salt 30 char *salt; 35 char salt[MAX_SALT_LEN] = {0,}; local 40 if (TT.salt) error_exit("duplicate salt"); 41 TT.salt = toys.optargs[1]; 44 if (-1 == (i = get_salt(salt, TT.method))) error_exit("bad -m"); 45 if (TT.salt) { 46 char *s = TT.salt; 50 if (*s) error_exit("salt no [all...] |
/external/openssh/openbsd-compat/ |
H A D | xcrypt.c | 67 * Pick an appropriate password encryption type and salt for the running 69 * salt. Usually this will be root unless the root account is locked out. 70 * If we don't find one we return a traditional DES-based salt. 78 static char salt[32]; local 80 if (salt[0] != '\0') 81 return salt; 82 strlcpy(salt, "xx", sizeof(salt)); 88 strlcpy(salt, passwd, MIN(typelen, sizeof(salt))); 99 xcrypt(const char *password, const char *salt) argument [all...] |
H A D | port-uw.c | 57 char *salt; local 67 /* Encrypt the candidate password using the proper salt. */ 68 salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx"; 76 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0) 77 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0)); 81 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
|
/external/python/cpython2/Modules/ |
H A D | cryptmodule.c | 17 char *word, *salt; local 22 if (!PyArg_ParseTuple(args, "ss:crypt", &word, &salt)) { 26 salt. Return None in that case. XXX Maybe raise an exception? */ 27 return Py_BuildValue("s", crypt(word, salt)); 32 "crypt(word, salt) -> string\n\ 33 word will usually be a user's password. salt is a 2-character string\n\ 35 in salt must be either \".\", \"/\", or an alphanumeric character. Returns\n\ 37 the same alphabet as the salt.");
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
H A D | PBEParameter.java | 18 ASN1OctetString salt; field in class:PBEParameter 21 byte[] salt, 24 if (salt.length != 8) 26 throw new IllegalArgumentException("salt length must be 8"); 28 this.salt = new DEROctetString(salt); 35 salt = (ASN1OctetString)seq.getObjectAt(0); 61 return salt.getOctets(); 68 v.add(salt); 20 PBEParameter( byte[] salt, int iterations) argument
|
H A D | MacData.java | 22 byte[] salt; field in class:MacData 45 this.salt = Arrays.clone(((ASN1OctetString)seq.getObjectAt(1)).getOctets()); 59 byte[] salt, 63 this.salt = Arrays.clone(salt); 74 return Arrays.clone(salt); 98 v.add(new DEROctetString(salt)); 57 MacData( DigestInfo digInfo, byte[] salt, int iterationCount) argument
|
H A D | PBKDF2Params.java | 21 * salt CHOICE { 63 * Create a PBKDF2Params with the specified salt, iteration count, and algid-hmacWithSHA1 for the prf. 65 * @param salt input salt. 69 byte[] salt, 72 this(salt, iterationCount, 0); 76 * Create a PBKDF2Params with the specified salt, iteration count, keyLength, and algid-hmacWithSHA1 for the prf. 78 * @param salt input salt. 83 byte[] salt, 68 PBKDF2Params( byte[] salt, int iterationCount) argument 82 PBKDF2Params( byte[] salt, int iterationCount, int keyLength) argument 98 PBKDF2Params( byte[] salt, int iterationCount, int keyLength, AlgorithmIdentifier prf) argument 126 PBKDF2Params( byte[] salt, int iterationCount, AlgorithmIdentifier prf) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
H A D | PBEParametersGenerator.java | 11 protected byte[] salt; field in class:PBEParametersGenerator 25 * @param salt the salt to be mixed with the password. 31 byte[] salt, 35 this.salt = salt; 50 * return the salt byte array. 52 * @return the salt byte array. 56 return salt; 29 init( byte[] password, byte[] salt, int iterationCount) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/ |
H A D | PBKDF2KeySpec.java | 23 * @param salt salt to use in the generator, 28 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) argument 30 super(password, salt, iterationCount, keySize);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
H A D | OpenSSLPBEParametersGenerator.java | 39 * @param salt salt to use. 43 byte[] salt) 45 super.init(password, salt, 1); 49 * the derived key function, the ith hash of the password and the salt. 61 digest.update(salt, 0, salt.length); 85 * Generate a key parameter derived from the password, salt, and iteration 104 * the password, salt, and iteration count we are currently initialised 126 * salt, an 41 init( byte[] password, byte[] salt) argument [all...] |
/external/libbrillo/brillo/ |
H A D | cryptohome.cc | 29 static char g_system_salt_path[PATH_MAX] = "/home/.shadow/salt"; 31 static std::string* salt = nullptr; member in namespace:brillo::cryptohome::home 34 if (salt && !salt->empty()) 39 PLOG(ERROR) << "Could not get size of system salt: " << g_system_salt_path; 43 LOG(ERROR) << "System salt too large: " << file_size; 55 if (!salt) 56 salt = new std::string(); 57 salt->assign(buf.data(), file_size); 71 SHA1_Update(&ctx, salt [all...] |
/external/e2fsprogs/misc/ |
H A D | e4crypt.c | 180 struct salt { struct 181 unsigned char *salt; member in struct:salt 187 struct salt *salt_list; 192 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) argument 195 struct salt *p; 199 !memcmp(p->salt, salt, salt_len)) 204 static void add_salt(unsigned char *salt, size_t salt_len) argument 206 if (find_by_salt(salt, salt_le 350 struct salt *salt; local 405 pbkdf2_sha512(const char *passphrase, struct salt *salt, unsigned int count, unsigned char derived_key[EXT4_MAX_KEY_SIZE]) argument 542 generate_key_ref_str(struct salt *salt) argument 558 insert_key_into_keyring(const char *keyring, struct salt *salt) argument 645 struct salt *salt; local [all...] |
/external/f2fs-tools/tools/ |
H A D | f2fscrypt.c | 222 struct salt { struct 223 unsigned char *salt; member in struct:salt 229 struct salt *salt_list; 234 static struct salt *find_by_salt(unsigned char *salt, size_t salt_len) argument 237 struct salt *p; 241 !memcmp(p->salt, salt, salt_len)) 246 static void add_salt(unsigned char *salt, size_t salt_len) argument 248 if (find_by_salt(salt, salt_le 390 struct salt *salt; local 445 pbkdf2_sha512(const char *passphrase, struct salt *salt, unsigned int count, unsigned char derived_key[F2FS_MAX_KEY_SIZE]) argument 582 generate_key_ref_str(struct salt *salt) argument 598 insert_key_into_keyring(const char *keyring, struct salt *salt) argument 685 struct salt *salt; local [all...] |
/external/boringssl/include/openssl/ |
H A D | hkdf.h | 29 * |secret| with |salt| and |info| using |digest|, and outputs |out_len| bytes 37 const uint8_t *salt, size_t salt_len, 41 * keying material |secret| and salt |salt| using |digest|, and outputs 46 size_t secret_len, const uint8_t *salt,
|
/external/boringssl/src/include/openssl/ |
H A D | hkdf.h | 29 * |secret| with |salt| and |info| using |digest|, and outputs |out_len| bytes 37 const uint8_t *salt, size_t salt_len, 41 * keying material |secret| and salt |salt| using |digest|, and outputs 46 size_t secret_len, const uint8_t *salt,
|
/external/boringssl/src/crypto/evp/ |
H A D | pbkdf.c | 66 const uint8_t *salt, size_t salt_len, unsigned iterations, 94 !HMAC_Update(&hctx, salt, salt_len) || 141 const uint8_t *salt, size_t salt_len, 144 return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations, 65 PKCS5_PBKDF2_HMAC(const char *password, size_t password_len, const uint8_t *salt, size_t salt_len, unsigned iterations, const EVP_MD *digest, size_t key_len, uint8_t *out_key) argument 140 PKCS5_PBKDF2_HMAC_SHA1(const char *password, size_t password_len, const uint8_t *salt, size_t salt_len, unsigned iterations, size_t key_len, uint8_t *out_key) argument
|
H A D | scrypt_test.cc | 42 std::vector<uint8_t> password, salt, key; 45 ASSERT_TRUE(t->GetBytes(&salt, "Salt")); 56 password.size(), salt.data(), salt.size(), N, r,
|
/external/syslinux/gpxe/src/include/gpxe/ |
H A D | sha1.h | 21 const void *salt, size_t salt_len,
|
/external/tpm2/ |
H A D | StartAuthSession.c | 36 OBJECT *tpmKey; // TPM key for decrypt salt 38 TPM2B_DATA salt; local 58 // Decrypting salt requires accessing the private portion of a key. 71 &in->encryptedSalt, &salt); 81 salt.t.size = 0; 106 in->bind, &salt, &out->sessionHandle);
|
/external/boringssl/src/crypto/pkcs8/ |
H A D | pkcs8.c | 99 int pkcs12_key_gen(const char *pass, size_t pass_len, const uint8_t *salt, argument 130 /* 2. Concatenate copies of the salt together to create a string S of length 131 * v(ceiling(s/v)) bits (the final copy of the salt may be truncated to 132 * create S). Note that if the salt is the empty string, then so is S. 160 I[i] = salt[i % salt_len]; 232 const uint8_t *salt, size_t salt_len, 239 if (!pkcs12_key_gen(pass, pass_len, salt, salt_len, PKCS12_KEY_ID, iterations, 241 !pkcs12_key_gen(pass, pass_len, salt, salt_len, PKCS12_IV_ID, iterations, 256 CBS pbe_param, salt; local 259 !CBS_get_asn1(&pbe_param, &salt, CBS_ASN1_OCTETSTRIN 229 pkcs12_pbe_cipher_init(const struct pbe_suite *suite, EVP_CIPHER_CTX *ctx, unsigned iterations, const char *pass, size_t pass_len, const uint8_t *salt, size_t salt_len, int is_encrypt) argument 326 pkcs12_pbe_encrypt_init(CBB *out, EVP_CIPHER_CTX *ctx, int alg, unsigned iterations, const char *pass, size_t pass_len, const uint8_t *salt, size_t salt_len) argument 439 PKCS8_marshal_encrypted_private_key(CBB *out, int pbe_nid, const EVP_CIPHER *cipher, const char *pass, size_t pass_len, const uint8_t *salt, size_t salt_len, int iterations, const EVP_PKEY *pkey) argument [all...] |
/external/boringssl/src/crypto/cipher_extra/ |
H A D | derive_key.c | 68 const uint8_t *salt, const uint8_t *data, size_t data_len, 99 if (salt != NULL) { 100 if (!EVP_DigestUpdate(&c, salt, PKCS5_SALT_LEN)) { 67 EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, const uint8_t *salt, const uint8_t *data, size_t data_len, unsigned count, uint8_t *key, uint8_t *iv) argument
|