/frameworks/base/libs/androidfw/tests/ |
D | ObbFile_test.cpp | 68 unsigned char salt[SALT_SIZE] = {0x01, 0x10, 0x55, 0xAA, 0xFF, 0x00, 0x5A, 0xA5}; in TEST_F() local 69 EXPECT_TRUE(mObbFile->setSalt(salt, SALT_SIZE)) in TEST_F() 89 EXPECT_EQ(sizeof(salt), saltLen) in TEST_F() 92 for (size_t i = 0; i < sizeof(salt); i++) { in TEST_F() 93 EXPECT_EQ(salt[i], newSalt[i]) in TEST_F() 96 EXPECT_TRUE(memcmp(newSalt, salt, sizeof(salt)) == 0) in TEST_F()
|
/frameworks/base/tools/obbtool/ |
D | Main.cpp | 57 memset(&salt, 0, sizeof(salt)); in PackageInfo() 64 unsigned char salt[SALT_LEN]; member in PackageInfo 103 obb->setSalt(info->salt, SALT_LEN); in doAdd() 145 const unsigned char* salt = obb->getSalt(&saltLen); in doInfo() local 146 if (salt != NULL) { in doInfo() 148 printf("%02x", salt[i]); in doInfo() 234 package_info.salt[i] = b; in main()
|
D | pbkdf2gen.cpp | 50 unsigned char salt[SALT_LEN]; in main() local 52 if (read(fd, &salt, SALT_LEN) != SALT_LEN) { in main() 61 if (PKCS5_PBKDF2_HMAC_SHA1(argv[1], strlen(argv[1]), salt, SALT_LEN, in main() 69 printf("%02x", salt[i]); in main()
|
D | mkobb.sh | 263 echo "${salt}"
|
/frameworks/base/core/jni/ |
D | android_content_res_ObbScanner.cpp | 36 jfieldID salt; member 66 const unsigned char* salt = obb->getSalt(&saltLen); in android_content_res_ObbScanner_getObbInfo() local 69 env->SetByteArrayRegion(saltArray, 0, saltLen, (jbyte*)salt); in android_content_res_ObbScanner_getObbInfo() 70 env->SetObjectField(obbInfo, gObbInfoClassInfo.salt, saltArray); in android_content_res_ObbScanner_getObbInfo() 102 GET_FIELD_ID(gObbInfoClassInfo.salt, clazz, in register_android_content_res_ObbScanner()
|
/frameworks/base/core/java/android/content/res/ |
D | ObbInfo.java | 56 public byte[] salt; field in ObbInfo 85 dest.writeByteArray(salt); in writeToParcel() 104 salt = source.createByteArray(); in ObbInfo()
|
/frameworks/base/include/androidfw/ |
D | ObbFile.h | 84 bool setSalt(const unsigned char* salt, size_t length) { in setSalt() argument 89 memcpy(mSalt, salt, sizeof(mSalt)); in setSalt()
|
/frameworks/base/services/core/java/com/android/server/pm/ |
D | UserManagerService.java | 154 long salt; field in UserManagerService.RestrictionsPinState 780 if (pinState.salt != 0) { in writeUserLocked() 781 serializer.attribute(null, ATTR_SALT, Long.toString(pinState.salt)); in writeUserLocked() 910 long salt = 0L; in readUserLocked() local 948 salt = readLongAttribute(parser, ATTR_SALT, 0L); in readUserLocked() 995 if (salt != 0L) { in readUserLocked() 1001 pinState.salt = salt; in readUserLocked() 1487 pinState.salt = 0; in setRestrictionsChallenge() 1491 pinState.salt = SecureRandom.getInstance("SHA1PRNG").nextLong(); in setRestrictionsChallenge() 1493 pinState.salt = (long) (Math.random() * Long.MAX_VALUE); in setRestrictionsChallenge() [all …]
|
/frameworks/base/core/java/com/android/internal/widget/ |
D | LockPatternUtils.java | 1061 long salt = getLong(LOCK_PASSWORD_SALT_KEY, 0, userId); in getSalt() local 1062 if (salt == 0) { in getSalt() 1064 salt = SecureRandom.getInstance("SHA1PRNG").nextLong(); in getSalt() 1065 setLong(LOCK_PASSWORD_SALT_KEY, salt, userId); in getSalt() 1072 return Long.toHexString(salt); in getSalt()
|
/frameworks/base/services/backup/java/com/android/server/backup/ |
D | BackupManagerService.java | 1018 byte[] salt = new byte[saltLen]; in BackupManagerService() 1019 in.readFully(salt); in BackupManagerService() 1021 mPasswordSalt = salt; in BackupManagerService() 1384 private SecretKey buildPasswordKey(String algorithm, String pw, byte[] salt, int rounds) { in buildPasswordKey() argument 1385 return buildCharArrayKey(algorithm, pw.toCharArray(), salt, rounds); in buildPasswordKey() 1388 private SecretKey buildCharArrayKey(String algorithm, char[] pwArray, byte[] salt, int rounds) { in buildCharArrayKey() argument 1391 KeySpec ks = new PBEKeySpec(pwArray, salt, rounds, PBKDF2_KEY_SIZE); in buildCharArrayKey() 1401 private String buildPasswordHash(String algorithm, String pw, byte[] salt, int rounds) { in buildPasswordHash() argument 1402 SecretKey key = buildPasswordKey(algorithm, pw, salt, rounds); in buildPasswordHash() 1430 private byte[] makeKeyChecksum(String algorithm, byte[] pwBytes, byte[] salt, int rounds) { in makeKeyChecksum() argument [all …]
|
/frameworks/base/docs/html/google/play/licensing/ |
D | adding-licensing.jd | 412 <li>A salt — an array of random bytes to use for each (un)obfuscation. </li> 419 static final array to hold the salt bytes and initialize it to 20 randomly 449 <p>Finally, construct an instance of AESObfuscator, passing the salt,
|
/frameworks/base/docs/html/distribute/essentials/ |
D | optimizing-your-app.jd | 460 Be careful, though, to take feature requests with a grain of salt. Requests
|
/frameworks/base/docs/html/google/play/ |
D | expansion-files.jd | 586 Obfuscator}</a>. The salt ensures that your obfuscated {@link android.content.SharedPreferences} 600 // You should also modify this salt
|
/frameworks/base/services/core/java/com/android/server/ |
D | MountService.java | 2881 KeySpec ks = new PBEKeySpec(mKey.toCharArray(), obbInfo.salt, in handleExecute()
|