/frameworks/base/libs/androidfw/tests/ |
D | ObbFile_test.cpp | 68 unsigned char salt[SALT_SIZE] = {0x01, 0x10, 0x55, 0xAA, 0xFF, 0x00, 0x5A, 0xA5}; in TEST_F() local 69 EXPECT_TRUE(mObbFile->setSalt(salt, SALT_SIZE)) in TEST_F() 89 EXPECT_EQ(sizeof(salt), saltLen) in TEST_F() 92 for (size_t i = 0; i < sizeof(salt); i++) { in TEST_F() 93 EXPECT_EQ(salt[i], newSalt[i]) in TEST_F() 96 EXPECT_TRUE(memcmp(newSalt, salt, sizeof(salt)) == 0) in TEST_F()
|
/frameworks/base/tools/obbtool/ |
D | Main.cpp | 57 memset(&salt, 0, sizeof(salt)); in PackageInfo() 64 unsigned char salt[SALT_LEN]; member in PackageInfo 103 obb->setSalt(info->salt, SALT_LEN); in doAdd() 145 const unsigned char* salt = obb->getSalt(&saltLen); in doInfo() local 146 if (salt != NULL) { in doInfo() 148 printf("%02x", salt[i]); in doInfo() 234 package_info.salt[i] = b; in main()
|
D | pbkdf2gen.cpp | 51 unsigned char salt[SALT_LEN]; in main() local 53 if (read(fd, &salt, SALT_LEN) != SALT_LEN) { in main() 62 if (PKCS5_PBKDF2_HMAC_SHA1(argv[1], strlen(argv[1]), salt, SALT_LEN, in main() 70 printf("%02x", salt[i]); in main()
|
D | mkobb.sh | 263 echo "${salt}"
|
/frameworks/base/services/core/jni/ |
D | com_android_server_SyntheticPasswordManager.cpp | 51 …anager_nativeScrypt(JNIEnv* env, jobject, jbyteArray password, jbyteArray salt, jint N, jint r, ji… in android_server_SyntheticPasswordManager_nativeScrypt() argument 52 if (!password || !salt) { in android_server_SyntheticPasswordManager_nativeScrypt() 57 int saltLen = env->GetArrayLength(salt); in android_server_SyntheticPasswordManager_nativeScrypt() 61 jbyte* saltPtr = (jbyte*)env->GetByteArrayElements(salt, NULL); in android_server_SyntheticPasswordManager_nativeScrypt() 68 env->ReleaseByteArrayElements(salt, saltPtr, JNI_ABORT); in android_server_SyntheticPasswordManager_nativeScrypt()
|
/frameworks/base/core/jni/ |
D | android_content_res_ObbScanner.cpp | 38 jfieldID salt; member 68 const unsigned char* salt = obb->getSalt(&saltLen); in android_content_res_ObbScanner_getObbInfo() local 71 env->SetByteArrayRegion(saltArray, 0, saltLen, (jbyte*)salt); in android_content_res_ObbScanner_getObbInfo() 72 env->SetObjectField(obbInfo, gObbInfoClassInfo.salt, saltArray); in android_content_res_ObbScanner_getObbInfo() 93 gObbInfoClassInfo.salt = GetFieldIDOrDie(env, clazz, "salt", "[B"); in register_android_content_res_ObbScanner()
|
/frameworks/base/core/java/android/content/res/ |
D | ObbInfo.java | 56 public byte[] salt; field in ObbInfo 85 dest.writeByteArray(salt); in writeToParcel() 104 salt = source.createByteArray(); in ObbInfo()
|
/frameworks/base/services/core/java/com/android/server/ |
D | SyntheticPasswordManager.java | 165 byte[] salt; field in SyntheticPasswordManager.PasswordData 174 result.salt = secureRandom(PASSWORD_SALT_LENGTH); in create() 188 result.salt = new byte[saltLen]; in fromBytes() 189 buffer.get(result.salt); in fromBytes() 198 + Integer.BYTES + salt.length + Integer.BYTES + passwordHandle.length); in toBytes() 203 buffer.putInt(salt.length); in toBytes() 204 buffer.put(salt); in toBytes() 675 return scrypt(password, data.salt, 1 << data.scryptN, 1 << data.scryptR, 1 << data.scryptP, in computePasswordToken() 687 protected byte[] scrypt(String password, byte[] salt, int N, int r, int p, int outLen) { in scrypt() argument 688 return nativeScrypt(password.getBytes(), salt, N, r, p, outLen); in scrypt() [all …]
|
D | StorageManagerService.java | 3699 KeySpec ks = new PBEKeySpec(mKey.toCharArray(), obbInfo.salt, in handleExecute()
|
/frameworks/base/libs/androidfw/include/androidfw/ |
D | ObbFile.h | 84 bool setSalt(const unsigned char* salt, size_t length) { in setSalt() argument 89 memcpy(mSalt, salt, sizeof(mSalt)); in setSalt()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
D | MockSyntheticPasswordManager.java | 91 protected byte[] scrypt(String password, byte[] salt, int N, int r, int p, int outLen) { in scrypt() argument 93 PBEKeySpec spec = new PBEKeySpec(password.toCharArray(), salt, 10, outLen * 8); in scrypt()
|
/frameworks/base/core/java/com/android/internal/widget/ |
D | LockPatternUtils.java | 1004 long salt = getLong(LOCK_PASSWORD_SALT_KEY, 0, userId); in getSalt() local 1005 if (salt == 0) { in getSalt() 1007 salt = SecureRandom.getInstance("SHA1PRNG").nextLong(); in getSalt() 1008 setLong(LOCK_PASSWORD_SALT_KEY, salt, userId); in getSalt() 1015 return Long.toHexString(salt); in getSalt()
|
/frameworks/base/services/backup/java/com/android/server/backup/ |
D | BackupManagerService.java | 1264 byte[] salt = new byte[saltLen]; in BackupManagerService() 1265 in.readFully(salt); in BackupManagerService() 1267 mPasswordSalt = salt; in BackupManagerService() 1673 private SecretKey buildPasswordKey(String algorithm, String pw, byte[] salt, int rounds) { in buildPasswordKey() argument 1674 return buildCharArrayKey(algorithm, pw.toCharArray(), salt, rounds); in buildPasswordKey() 1677 private SecretKey buildCharArrayKey(String algorithm, char[] pwArray, byte[] salt, int rounds) { in buildCharArrayKey() argument 1680 KeySpec ks = new PBEKeySpec(pwArray, salt, rounds, PBKDF2_KEY_SIZE); in buildCharArrayKey() 1690 private String buildPasswordHash(String algorithm, String pw, byte[] salt, int rounds) { in buildPasswordHash() argument 1691 SecretKey key = buildPasswordKey(algorithm, pw, salt, rounds); in buildPasswordHash() 1719 private byte[] makeKeyChecksum(String algorithm, byte[] pwBytes, byte[] salt, int rounds) { in makeKeyChecksum() argument [all …]
|
/frameworks/data-binding/prebuilds/1.0-rc0/ |
D | databinding-studio-bundle.jar | META-INF/
META-INF/MANIFEST.MF
android/
android/databinding/
android/ ... |