Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 168) sorted by relevance

1234567

/external/smack/src/org/xbill/DNS/
DNSEC3PARAMRecord.java28 private byte salt[]; field in NSEC3PARAMRecord
48 int flags, int iterations, byte [] salt) in NSEC3PARAMRecord() argument
55 if (salt != null) { in NSEC3PARAMRecord()
56 if (salt.length > 255) in NSEC3PARAMRecord()
59 if (salt.length > 0) { in NSEC3PARAMRecord()
60 this.salt = new byte[salt.length]; in NSEC3PARAMRecord()
61 System.arraycopy(salt, 0, this.salt, 0, salt.length); in NSEC3PARAMRecord()
74 salt = in.readByteArray(salt_length); in rrFromWire()
76 salt = null; in rrFromWire()
85 if (salt != null) { in rrToWire()
[all …]
DNSEC3Record.java51 private byte [] salt; field in NSEC3Record
78 int flags, int iterations, byte [] salt, byte [] next, in NSEC3Record() argument
86 if (salt != null) { in NSEC3Record()
87 if (salt.length > 255) in NSEC3Record()
89 if (salt.length > 0) { in NSEC3Record()
90 this.salt = new byte[salt.length]; in NSEC3Record()
91 System.arraycopy(salt, 0, this.salt, 0, salt.length); in NSEC3Record()
111 salt = in.readByteArray(salt_length); in rrFromWire()
113 salt = null; in rrFromWire()
126 if (salt != null) { in rrToWire()
[all …]
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
DPBEKeySpecTest.java67 byte[] salt = new byte[] { 1, 2, 3, 4, 5 }; in testPBEKeySpec2()
72 PBEKeySpec pbeks = new PBEKeySpec(null, salt, in testPBEKeySpec2()
99 new PBEKeySpec(password, salt, -1, keyLength); in testPBEKeySpec2()
106 new PBEKeySpec(password, salt, iterationCount, -1); in testPBEKeySpec2()
113 new PBEKeySpec(password, salt, 0, keyLength); in testPBEKeySpec2()
120 new PBEKeySpec(password, salt, iterationCount, 0); in testPBEKeySpec2()
126 PBEKeySpec pbeks = new PBEKeySpec(password, salt, in testPBEKeySpec2()
132 salt[0]++; in testPBEKeySpec2()
135 salt[0] == pbeks.getSalt()[0]); in testPBEKeySpec2()
146 byte[] salt = new byte[] { 1, 2, 3, 4, 5 }; in testPBEKeySpec3()
[all …]
DPBEParameterSpecTest.java43 byte[] salt = { 1, 2, 3, 4, 5 }; in testPBEParameterSpec()
53 PBEParameterSpec pbeps = new PBEParameterSpec(salt, iterationCount); in testPBEParameterSpec()
54 salt[0]++; in testPBEParameterSpec()
57 salt[0] == pbeps.getSalt()[0]); in testPBEParameterSpec()
66 byte[] salt = new byte[] { 1, 2, 3, 4, 5 }; in testGetSalt()
68 PBEParameterSpec pbeps = new PBEParameterSpec(salt, iterationCount); in testGetSalt()
70 if (!Arrays.equals(salt, result)) { in testGetSalt()
85 byte[] salt = new byte[] { 1, 2, 3, 4, 5 }; in testGetIterationCount()
87 PBEParameterSpec pbeps = new PBEParameterSpec(salt, iterationCount); in testGetIterationCount()
/external/openssl/crypto/des/
Dfcrypt.c61 char *DES_crypt(const char *buf, const char *salt) in DES_crypt() argument
66 return(DES_fcrypt(buf,salt,buff)); in DES_crypt()
73 if ((e_salt[0] = salt[0]) != '\0') in DES_crypt()
74 e_salt[1] = salt[1]; in DES_crypt()
99 char *DES_fcrypt(const char *buf, const char *salt, char *ret) in DES_fcrypt() argument
119 x=ret[0]=((salt[0] == '\0')?'A':salt[0]); in DES_fcrypt()
121 x=ret[1]=((salt[1] == '\0')?'A':salt[1]); in DES_fcrypt()
124 x=ret[0]=((salt[0] == '\0')?os_toascii['A']:salt[0]); in DES_fcrypt()
126 x=ret[1]=((salt[1] == '\0')?os_toascii['A']:salt[1]); in DES_fcrypt()
/external/openssl/crypto/pkcs12/
Dp12_mutl.c72 unsigned char key[EVP_MAX_MD_SIZE], *salt; in PKCS12_gen_mac() local
82 salt = p12->mac->salt->data; in PKCS12_gen_mac()
83 saltlen = p12->mac->salt->length; in PKCS12_gen_mac()
94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, in PKCS12_gen_mac()
133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) in PKCS12_set_mac() argument
139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) == in PKCS12_set_mac()
156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, in PKCS12_setup_mac() argument
171 p12->mac->salt->length = saltlen; in PKCS12_setup_mac()
172 if (!(p12->mac->salt->data = OPENSSL_malloc (saltlen))) { in PKCS12_setup_mac()
176 if (!salt) { in PKCS12_setup_mac()
[all …]
Dp12_crpt.c74 unsigned char *salt; in PKCS12_PBE_keyivgen() local
93 salt = pbe->salt->data; in PKCS12_PBE_keyivgen()
94 saltlen = pbe->salt->length; in PKCS12_PBE_keyivgen()
95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, in PKCS12_PBE_keyivgen()
101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID, in PKCS12_PBE_keyivgen()
/external/chromium_org/third_party/tlslite/tlslite/
Dverifierdb.py32 (N, g, salt, verifier) = valueStr.split(" ")
35 salt = a2b_base64(salt)
37 return (N, g, salt, verifier)
58 N, g, salt, verifier = value
61 salt = b2a_base64(salt)
63 valueStr = " ".join( (N, g, salt, verifier) )
67 (N, g, salt, verifier) = value
68 x = mathtls.makeX(salt, username, param)
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
DPBEParameter.java18 ASN1OctetString salt; field in PBEParameter
21 byte[] salt, in PBEParameter() argument
24 if (salt.length != 8) in PBEParameter()
28 this.salt = new DEROctetString(salt); in PBEParameter()
35 salt = (ASN1OctetString)seq.getObjectAt(0); in PBEParameter()
61 return salt.getOctets(); in getSalt()
68 v.add(salt); in toASN1Primitive()
DMacData.java21 byte[] salt; field in MacData
44 this.salt = ((ASN1OctetString)seq.getObjectAt(1)).getOctets(); in MacData()
58 byte[] salt, in MacData() argument
62 this.salt = salt; in MacData()
73 return salt; in getSalt()
97 v.add(new DEROctetString(salt)); in toASN1Primitive()
DPBKDF2Params.java68 byte[] salt, in PBKDF2Params() argument
71 this.octStr = new DEROctetString(salt); in PBKDF2Params()
83 byte[] salt, in PBKDF2Params() argument
87 this(salt, iterationCount); in PBKDF2Params()
101 byte[] salt, in PBKDF2Params() argument
106 this(salt, iterationCount); in PBKDF2Params()
120 byte[] salt, in PBKDF2Params() argument
124 this(salt, iterationCount); in PBKDF2Params()
/external/chromium_org/chrome/android/javatests/src/org/chromium/chrome/browser/identity/
DSettingsSecureBasedIdentificationGeneratorTest.java22 String salt = "mySalt"; in testAndroidIdSuccessWithSalt() local
23 String expected = HashUtil.getMd5Hash(new HashUtil.Params(androidId).withSalt(salt)); in testAndroidIdSuccessWithSalt()
24 runTest(androidId, salt, expected); in testAndroidIdSuccessWithSalt()
39 String salt = "mySalt"; in testAndroidIdFailureWithSalt() local
41 runTest(androidId, salt, expected); in testAndroidIdFailureWithSalt()
48 String salt = null; in testAndroidIdFailureWithoutSalt() local
50 runTest(androidId, salt, expected); in testAndroidIdFailureWithoutSalt()
53 private void runTest(String androidId, String salt, String expectedUniqueId) { in runTest() argument
58 String result = generator.getUniqueId(salt); in runTest()
/external/openssl/crypto/asn1/
Dp5_pbe.c68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
78 const unsigned char *salt, int saltlen)
99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
104 sstr = ASN1_STRING_data(pbe->salt);
105 if (salt)
106 memcpy(sstr, salt, saltlen);
133 const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen)) in PKCS5_pbe_set()
Dp5_pbev2.c75 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY),
90 unsigned char *salt, int saltlen,
158 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen);
195 unsigned char *salt, int saltlen) in PKCS5_pbe2_set() argument
197 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1); in PKCS5_pbe2_set()
200 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, in PKCS5_pbkdf2_set() argument
212 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set()
213 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set()
222 if (salt) in PKCS5_pbkdf2_set()
223 memcpy (osalt->data, salt, saltlen); in PKCS5_pbkdf2_set()
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/
Dp5_pbe.c68 ASN1_SIMPLE(PBEPARAM, salt, ASN1_OCTET_STRING),
78 const unsigned char *salt, int saltlen)
99 if (!ASN1_STRING_set(pbe->salt, NULL, saltlen))
104 sstr = ASN1_STRING_data(pbe->salt);
105 if (salt)
106 memcpy(sstr, salt, saltlen);
133 const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen)) in PKCS5_pbe_set()
Dp5_pbev2.c78 ASN1_SIMPLE(PBKDF2PARAM, salt, ASN1_ANY),
114 unsigned char *salt, int saltlen, in PKCS5_pbe2_set_iv() argument
180 pbe2->keyfunc = PKCS5_pbkdf2_set(iter, salt, saltlen, prf_nid, keylen); in PKCS5_pbe2_set_iv()
217 unsigned char *salt, int saltlen) in PKCS5_pbe2_set() argument
219 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1); in PKCS5_pbe2_set()
222 X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, in PKCS5_pbkdf2_set() argument
234 kdf->salt->value.octet_string = osalt; in PKCS5_pbkdf2_set()
235 kdf->salt->type = V_ASN1_OCTET_STRING; in PKCS5_pbkdf2_set()
244 if (salt) in PKCS5_pbkdf2_set()
245 memcpy (osalt->data, salt, saltlen); in PKCS5_pbkdf2_set()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/
DBcKeyStoreSpi.java136 byte[] salt = new byte[KEY_SALT_SIZE]; in StoreEntry()
139 random.nextBytes(salt); in StoreEntry()
147 dOut.writeInt(salt.length); in StoreEntry()
148 dOut.write(salt); in StoreEntry()
151 … cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); in StoreEntry()
223 byte[] salt = new byte[dIn.readInt()]; in getObject()
225 dIn.readFully(salt); in getObject()
229 …ipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); in getObject()
242 salt = new byte[dIn.readInt()]; in getObject()
244 dIn.readFully(salt); in getObject()
[all …]
/external/chromium_org/chromeos/login/auth/
Dkey.cc39 Key::Key(KeyType key_type, const std::string& salt, const std::string& secret) in Key() argument
40 : key_type_(key_type), salt_(salt), secret_(secret) { in Key()
71 void Key::Transform(KeyType target_key_type, const std::string& salt) { in Transform() argument
80 CHECK(!salt.empty()); in Transform()
82 crypto::SHA256HashString(salt + secret_, &hash, sizeof(hash)); in Transform()
95 salt, in Transform()
104 base::Base64Encode(crypto::SHA256HashString(salt + secret_), &secret_); in Transform()
115 salt_ = salt; in Transform()
/external/openssl/crypto/evp/
Dp5_crpt2.c81 const unsigned char *salt, int saltlen, int iter, in PKCS5_PBKDF2_HMAC() argument
124 if (!HMAC_Update(&hctx, salt, saltlen) in PKCS5_PBKDF2_HMAC()
161 h__dump (salt, saltlen); in PKCS5_PBKDF2_HMAC()
170 const unsigned char *salt, int saltlen, int iter, in PKCS5_PBKDF2_HMAC_SHA1() argument
173 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), in PKCS5_PBKDF2_HMAC_SHA1()
181 unsigned char salt[] = {0x12, 0x34, 0x56, 0x78}; in main() local
182 PKCS5_PBKDF2_HMAC_SHA1("password", -1, salt, 4, 5, 4, out); in main()
256 unsigned char *salt, key[EVP_MAX_KEY_LENGTH]; in PKCS5_v2_PBKDF2_keyivgen() local
317 if(kdf->salt->type != V_ASN1_OCTET_STRING) { in PKCS5_v2_PBKDF2_keyivgen()
324 salt = kdf->salt->value.octet_string->data; in PKCS5_v2_PBKDF2_keyivgen()
[all …]
/external/chromium_org/chrome/browser/renderer_host/pepper/
Ddevice_id_fetcher.cc114 std::string salt = profile->GetPrefs()->GetString(prefs::kDRMSalt); in CheckPrefsOnUIThread() local
115 if (salt.empty()) { in CheckPrefsOnUIThread()
119 salt = base::HexEncode(salt_bytes, arraysize(salt_bytes)); in CheckPrefsOnUIThread()
120 profile->GetPrefs()->SetString(prefs::kDRMSalt, salt); in CheckPrefsOnUIThread()
131 salt)); in CheckPrefsOnUIThread()
135 base::Bind(&DeviceIDFetcher::ComputeOnUIThread, this, salt)); in CheckPrefsOnUIThread()
139 void DeviceIDFetcher::ComputeOnUIThread(const std::string& salt, in ComputeOnUIThread() argument
152 if (!base::HexStringToBytes(salt, &salt_bytes)) in ComputeOnUIThread()
182 const std::string& salt) { in LegacyComputeOnBlockingPool() argument
199 base::Bind(&DeviceIDFetcher::ComputeOnUIThread, this, salt))); in LegacyComputeOnBlockingPool()
/external/chromium_org/base/ios/
Ddevice_util_unittest.mm104 std::string salt("salt");
105 // Same string and same salt should result in the same salted string.
106 EXPECT_EQ(ios::device_util::GetSaltedString(string1, salt),
107 ios::device_util::GetSaltedString(string2, salt));
113 std::string salt("salt");
114 // Different string and same salt should result in different salted strings.
115 EXPECT_NE(ios::device_util::GetSaltedString(string1, salt),
116 ios::device_util::GetSaltedString(string2, salt));
121 std::string salt1("salt");
123 // Same string with different salt should result in different salted strings.
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
DPBEParametersGenerator.java11 protected byte[] salt; field in PBEParametersGenerator
31 byte[] salt, in init() argument
35 this.salt = salt; in init()
56 return salt; in getSalt()
/external/chromium_org/crypto/
Dhkdf_unittest.cc65 std::string salt(test.salt_hex); in TEST() local
66 if (!salt.empty()) { in TEST()
67 ASSERT_TRUE(base::HexStringToBytes(salt, &data)); in TEST()
68 salt.assign(reinterpret_cast<char*>(&data[0]), data.size()); in TEST()
85 HKDF hkdf(key, salt, info, expected.size(), 0, 0); in TEST()
/external/chromium_org/chrome/browser/chromeos/settings/
Dtoken_encryptor.cc69 const std::string& salt) { in PassphraseToKey() argument
71 crypto::SymmetricKey::AES, passphrase, salt, 1000, 256); in PassphraseToKey()
76 const std::string& salt, in EncryptTokenWithKey() argument
83 std::string nonce = salt.substr(0, kNonceSize); in EncryptTokenWithKey()
98 const std::string& salt, in DecryptTokenWithKey() argument
115 std::string nonce = salt.substr(0, kNonceSize); in DecryptTokenWithKey()
/external/openssl/crypto/rsa/
Drsa_pss.c201 unsigned char *H, *salt = NULL, *p; in RSA_padding_add_PKCS1_PSS_mgf1() local
242 salt = OPENSSL_malloc(sLen); in RSA_padding_add_PKCS1_PSS_mgf1()
243 if (!salt) in RSA_padding_add_PKCS1_PSS_mgf1()
248 if (RAND_bytes(salt, sLen) <= 0) in RSA_padding_add_PKCS1_PSS_mgf1()
258 if (sLen && !EVP_DigestUpdate(&ctx, salt, sLen)) in RSA_padding_add_PKCS1_PSS_mgf1()
279 *p++ ^= salt[i]; in RSA_padding_add_PKCS1_PSS_mgf1()
291 if (salt) in RSA_padding_add_PKCS1_PSS_mgf1()
292 OPENSSL_free(salt); in RSA_padding_add_PKCS1_PSS_mgf1()

1234567