Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 14 of 14) sorted by relevance

/frameworks/base/libs/androidfw/tests/
DObbFile_test.cpp68 unsigned char salt[SALT_SIZE] = {0x01, 0x10, 0x55, 0xAA, 0xFF, 0x00, 0x5A, 0xA5}; in TEST_F() local
69 EXPECT_TRUE(mObbFile->setSalt(salt, SALT_SIZE)) in TEST_F()
89 EXPECT_EQ(sizeof(salt), saltLen) in TEST_F()
92 for (size_t i = 0; i < sizeof(salt); i++) { in TEST_F()
93 EXPECT_EQ(salt[i], newSalt[i]) in TEST_F()
96 EXPECT_TRUE(memcmp(newSalt, salt, sizeof(salt)) == 0) in TEST_F()
/frameworks/base/tools/obbtool/
DMain.cpp57 memset(&salt, 0, sizeof(salt)); in PackageInfo()
64 unsigned char salt[SALT_LEN]; member in PackageInfo
103 obb->setSalt(info->salt, SALT_LEN); in doAdd()
145 const unsigned char* salt = obb->getSalt(&saltLen); in doInfo() local
146 if (salt != NULL) { in doInfo()
148 printf("%02x", salt[i]); in doInfo()
234 package_info.salt[i] = b; in main()
Dpbkdf2gen.cpp50 unsigned char salt[SALT_LEN]; in main() local
52 if (read(fd, &salt, SALT_LEN) != SALT_LEN) { in main()
61 if (PKCS5_PBKDF2_HMAC_SHA1(argv[1], strlen(argv[1]), salt, SALT_LEN, in main()
69 printf("%02x", salt[i]); in main()
Dmkobb.sh263 echo "${salt}"
/frameworks/base/core/jni/
Dandroid_content_res_ObbScanner.cpp36 jfieldID salt; member
66 const unsigned char* salt = obb->getSalt(&saltLen); in android_content_res_ObbScanner_getObbInfo() local
69 env->SetByteArrayRegion(saltArray, 0, saltLen, (jbyte*)salt); in android_content_res_ObbScanner_getObbInfo()
70 env->SetObjectField(obbInfo, gObbInfoClassInfo.salt, saltArray); in android_content_res_ObbScanner_getObbInfo()
102 GET_FIELD_ID(gObbInfoClassInfo.salt, clazz, in register_android_content_res_ObbScanner()
/frameworks/base/core/java/android/content/res/
DObbInfo.java56 public byte[] salt; field in ObbInfo
85 dest.writeByteArray(salt); in writeToParcel()
104 salt = source.createByteArray(); in ObbInfo()
/frameworks/base/include/androidfw/
DObbFile.h84 bool setSalt(const unsigned char* salt, size_t length) { in setSalt() argument
89 memcpy(mSalt, salt, sizeof(mSalt)); in setSalt()
/frameworks/base/services/core/java/com/android/server/pm/
DUserManagerService.java154 long salt; field in UserManagerService.RestrictionsPinState
780 if (pinState.salt != 0) { in writeUserLocked()
781 serializer.attribute(null, ATTR_SALT, Long.toString(pinState.salt)); in writeUserLocked()
910 long salt = 0L; in readUserLocked() local
948 salt = readLongAttribute(parser, ATTR_SALT, 0L); in readUserLocked()
995 if (salt != 0L) { in readUserLocked()
1001 pinState.salt = salt; in readUserLocked()
1487 pinState.salt = 0; in setRestrictionsChallenge()
1491 pinState.salt = SecureRandom.getInstance("SHA1PRNG").nextLong(); in setRestrictionsChallenge()
1493 pinState.salt = (long) (Math.random() * Long.MAX_VALUE); in setRestrictionsChallenge()
[all …]
/frameworks/base/core/java/com/android/internal/widget/
DLockPatternUtils.java1061 long salt = getLong(LOCK_PASSWORD_SALT_KEY, 0, userId); in getSalt() local
1062 if (salt == 0) { in getSalt()
1064 salt = SecureRandom.getInstance("SHA1PRNG").nextLong(); in getSalt()
1065 setLong(LOCK_PASSWORD_SALT_KEY, salt, userId); in getSalt()
1072 return Long.toHexString(salt); in getSalt()
/frameworks/base/services/backup/java/com/android/server/backup/
DBackupManagerService.java1018 byte[] salt = new byte[saltLen]; in BackupManagerService()
1019 in.readFully(salt); in BackupManagerService()
1021 mPasswordSalt = salt; in BackupManagerService()
1384 private SecretKey buildPasswordKey(String algorithm, String pw, byte[] salt, int rounds) { in buildPasswordKey() argument
1385 return buildCharArrayKey(algorithm, pw.toCharArray(), salt, rounds); in buildPasswordKey()
1388 private SecretKey buildCharArrayKey(String algorithm, char[] pwArray, byte[] salt, int rounds) { in buildCharArrayKey() argument
1391 KeySpec ks = new PBEKeySpec(pwArray, salt, rounds, PBKDF2_KEY_SIZE); in buildCharArrayKey()
1401 private String buildPasswordHash(String algorithm, String pw, byte[] salt, int rounds) { in buildPasswordHash() argument
1402 SecretKey key = buildPasswordKey(algorithm, pw, salt, rounds); in buildPasswordHash()
1430 private byte[] makeKeyChecksum(String algorithm, byte[] pwBytes, byte[] salt, int rounds) { in makeKeyChecksum() argument
[all …]
/frameworks/base/docs/html/google/play/licensing/
Dadding-licensing.jd412 <li>A salt &mdash; an array of random bytes to use for each (un)obfuscation. </li>
419 static final array to hold the salt bytes and initialize it to 20 randomly
449 <p>Finally, construct an instance of AESObfuscator, passing the salt,
/frameworks/base/docs/html/distribute/essentials/
Doptimizing-your-app.jd460 Be careful, though, to take feature requests with a grain of salt. Requests
/frameworks/base/docs/html/google/play/
Dexpansion-files.jd586 Obfuscator}</a>. The salt ensures that your obfuscated {@link android.content.SharedPreferences}
600 // You should also modify this salt
/frameworks/base/services/core/java/com/android/server/
DMountService.java2881 KeySpec ks = new PBEKeySpec(mKey.toCharArray(), obbInfo.salt, in handleExecute()