HomeSort by relevance Sort by last modified time
    Searched defs:nonce (Results 1 - 25 of 63) sorted by null

1 2 3

  /external/boringssl/src/crypto/rand_extra/
deterministic.c 39 uint8_t nonce[12]; local
40 OPENSSL_memset(nonce, 0, sizeof(nonce));
41 OPENSSL_memcpy(nonce, &g_num_calls, sizeof(g_num_calls));
44 CRYPTO_chacha_20(out, out, requested, kZeroKey, nonce, 0);
  /external/nos/test/system-test-harness/tools/
avb_tools.h 28 uint64_t nonce; member in struct:avb_tools::ResetMessage
39 uint32_t *selector, uint64_t *nonce,
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/
GCMParameters.java 18 aes-nonce OCTET STRING, -- recommended size is 12 octets
25 private byte[] nonce; field in class:GCMParameters
59 this.nonce = ASN1OctetString.getInstance(seq.getObjectAt(0)).getOctets();
72 byte[] nonce,
75 this.nonce = Arrays.clone(nonce);
81 return Arrays.clone(nonce);
93 v.add(new DEROctetString(nonce));
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/
AEADParameters.java 10 private byte[] nonce; field in class:AEADParameters
19 * @param nonce nonce to be used
21 public AEADParameters(KeyParameter key, int macSize, byte[] nonce)
23 this(key, macSize, nonce, null);
31 * @param nonce nonce to be used
34 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText)
37 this.nonce = Arrays.clone(nonce);
    [all...]
  /external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/cms/
GCMParameters.java 19 aes-nonce OCTET STRING, -- recommended size is 12 octets
27 private byte[] nonce; field in class:GCMParameters
61 this.nonce = ASN1OctetString.getInstance(seq.getObjectAt(0)).getOctets();
74 byte[] nonce,
77 this.nonce = Arrays.clone(nonce);
83 return Arrays.clone(nonce);
95 v.add(new DEROctetString(nonce));
  /external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/crypto/params/
AEADParameters.java 14 private byte[] nonce; field in class:AEADParameters
23 * @param nonce nonce to be used
25 public AEADParameters(KeyParameter key, int macSize, byte[] nonce)
27 this(key, macSize, nonce, null);
35 * @param nonce nonce to be used
38 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText)
41 this.nonce = Arrays.clone(nonce);
    [all...]
  /external/nos/host/android/hals/oemlock/test/
test.cpp 53 hidl_vec<uint8_t> makeSignature(uint64_t version, uint64_t nonce,
63 const uint64_t nonce_le = htole64(nonce);
93 && argToken.nonce() == msgToken.nonce()
99 constexpr uint64_t nonce = 3486438654; local
109 unlock->set_nonce(nonce);
117 ASSERT_THAT(hal.setOemUnlockAllowedByCarrier(true, makeSignature(version, nonce, token)),
318 constexpr uint64_t nonce = 0x24680ace13579bdf; local
324 const auto signature = makeSignature(version, nonce, token);
329 EXPECT_THAT(unlock.nonce(), Eq(nonce))
    [all...]
  /external/boringssl/src/fipstools/
cavp_ctr_drbg_test.cc 47 std::vector<uint8_t> entropy, nonce, personalization_str, ai1, ai2; local
50 !t->GetBytes(&nonce, "Nonce") ||
55 nonce.size() != 0 ||
test_fips.c 98 uint8_t nonce[EVP_AEAD_MAX_NONCE_LENGTH]; local
99 OPENSSL_memset(nonce, 0, sizeof(nonce));
110 if (!EVP_AEAD_CTX_seal(&aead_ctx, output, &out_len, sizeof(output), nonce,
122 if (!EVP_AEAD_CTX_open(&aead_ctx, output, &out_len, sizeof(output), nonce,
  /external/nos/host/android/hals/oemlock/
OemLock.cpp 140 * 2. 64-bit nonce
165 // Get the nonce
166 uint64_t nonce; local
167 memcpy(&nonce, &(*it), sizeof(uint64_t));
169 unlock->set_nonce(letoh64(nonce));
  /external/boringssl/src/crypto/fipsmodule/modes/
ccm.c 64 } nonce, cmac; member in struct:ccm128_state
86 const uint8_t *nonce, size_t nonce_len,
101 state->nonce.c[0] = (uint8_t)((L - 1) | ((M - 2) / 2) << 3);
103 state->nonce.c[0] |= 0x40; // Set AAD Flag
105 OPENSSL_memcpy(&state->nonce.c[1], nonce, nonce_len);
107 state->nonce.c[15 - i] = (uint8_t)(plaintext_len >> (8 * i));
110 (*block)(state->nonce.c, state->cmac.c, key);
168 state->nonce.c[0] &= 7;
177 state->nonce.c[15 - i] = 0
    [all...]
  /external/grpc-grpc-java/alts/src/test/java/io/grpc/alts/internal/
AesGcmHkdfAeadCrypterTest.java 36 final byte[] nonce; field in class:AesGcmHkdfAeadCrypterTest.TestVector
44 nonce = builder.nonce;
58 byte[] nonce; field in class:AesGcmHkdfAeadCrypterTest.TestVectorBuilder
66 && nonce == null
85 TestVectorBuilder withNonce(String nonce) {
86 this.nonce = BaseEncoding.base16().lowerCase().decode(nonce);
119 testVector.nonce);
144 testVector.nonce);
    [all...]
  /external/openssh/
mac.c 183 u_char nonce[8]; local
199 POKE_U64(nonce, seqno);
201 umac_final(mac->umac_ctx, u.m, nonce);
204 put_u64(nonce, seqno);
206 umac128_final(mac->umac_ctx, u.m, nonce);
  /cts/tests/tests/jni/src/android/jni/cts/
JniStaticTest.java 24 * Basic static method tests. The "nonce" class being tested by this
184 StaticNonce nonce = StaticNonce.returnInstance(); local
185 assertSame(StaticNonce.class, nonce.getClass());
  /external/ImageMagick/MagickCore/
cipher.c 531 unsigned char *nonce)
538 nonce[i]++;
539 if (nonce[i] != 0)
604 *nonce;
612 Generate decipher key and nonce.
630 nonce=SplitStringInfo(key,GetStringInfoLength(key)/2);
631 if (nonce == (StringInfo *) NULL)
641 UpdateSignature(signature_info,nonce);
643 SetStringInfoLength(nonce,sizeof(extent));
644 SetStringInfoDatum(nonce,(const unsigned char *) &extent)
595 *nonce; local
808 *nonce; local
    [all...]
random.c 87 *nonce,
181 *nonce;
186 random_info->nonce=AcquireStringInfo(2*GetSignatureDigestsize(
188 ResetStringInfo(random_info->nonce);
200 Seed random nonce.
202 nonce=GenerateEntropicChaos(random_info);
203 if (nonce == (StringInfo *) NULL)
206 UpdateSignature(random_info->signature_info,nonce);
208 SetStringInfoLength(nonce,(GetSignatureDigestsize(
210 SetStringInfo(nonce,GetSignatureDigest(random_info->signature_info))
85 *nonce, member in struct:_RandomInfo
175 *nonce; local
    [all...]
  /external/apache-http/src/org/apache/http/impl/auth/
DigestScheme.java 103 //TODO: supply a real nonce-count, currently a server will interprete a repeated request as a replay
104 private static final String NC = "00000001"; //nonce-count is always 1
136 if (getParameter("nonce") == null) {
137 throw new MalformedChallengeException("missing nonce in challange");
269 String nonce = getParameter("nonce"); local
278 if (nonce == null) {
279 throw new IllegalStateException("Nonce may not be null");
314 // ":" unq(nonce-value)
320 StringBuilder tmp3 = new StringBuilder(tmp2.length() + nonce.length() + cnonce.length() + 2)
400 String nonce = getParameter("nonce"); local
    [all...]
  /external/boringssl/src/crypto/cipher_extra/
aead_test.cc 112 // NONCE: 978105dfce667bf4
121 std::vector<uint8_t> key, nonce, in, ad, ct, tag;
123 ASSERT_TRUE(t->GetBytes(&nonce, "NONCE"));
146 nonce.data(), nonce.size(), in.data(),
168 nonce.data(), nonce.size(), out.data(),
190 ctx.get(), out2.data(), &out2_len, out2.size(), nonce.data(),
191 nonce.size(), out.data(), out.size(), ad.data(), ad.size())
418 uint8_t nonce[EVP_AEAD_MAX_NONCE_LENGTH]; local
544 alignas(64) uint8_t nonce[EVP_AEAD_MAX_NONCE_LENGTH + 1]; local
    [all...]
e_chacha20poly1305.c 54 uint8_t nonce[12]; member in struct:open_data::__anon15420
65 uint8_t nonce[12]; member in struct:seal_data::__anon15422
158 const uint8_t nonce[12], const uint8_t *ad, size_t ad_len,
164 CRYPTO_chacha_20(poly1305_key, poly1305_key, sizeof(poly1305_key), key, nonce,
188 size_t *out_tag_len, size_t max_out_tag_len, const uint8_t *nonce,
231 CRYPTO_chacha_20(block, block, sizeof(block), key, nonce,
245 OPENSSL_memcpy(data.in.nonce, nonce, 12);
250 CRYPTO_chacha_20(out, in, in_len, key, nonce, 1);
251 calc_tag(data.out.tag, key, nonce, ad, ad_len, out, in_len, out_tag
    [all...]
  /external/boringssl/src/crypto/fipsmodule/self_check/
self_check.c 421 uint8_t nonce[EVP_AEAD_MAX_NONCE_LENGTH]; local
422 OPENSSL_memset(nonce, 0, sizeof(nonce));
430 if (!EVP_AEAD_CTX_seal(&aead_ctx, output, &out_len, sizeof(output), nonce,
440 if (!EVP_AEAD_CTX_open(&aead_ctx, output, &out_len, sizeof(output), nonce,
  /external/f2fs-tools/fsck/
xattr.h 46 u8 nonce[FS_KEY_DERIVATION_NONCE_SIZE]; member in struct:fscrypt_context
  /external/libcups/cups/
auth.c 118 nonce[HTTP_MAX_VALUE]; /* nonce="xyz" string */ local
262 httpGetSubField(http, HTTP_FIELD_WWW_AUTHENTICATE, "nonce", nonce);
265 httpMD5Final(nonce, method, resource, encode);
267 "username=\"%s\", realm=\"%s\", nonce=\"%s\", uri=\"%s\", "
268 "response=\"%s\"", cupsUser(), realm, nonce, resource, encode);
  /external/nos/test/system-test-harness/src/
avb_tests.cc 38 int ProductionResetTest(uint32_t selector, uint64_t nonce,
55 const uint64_t NONCE = 0x4141414141414141ULL;
152 int AvbTest::ProductionResetTest(uint32_t selector, uint64_t nonce,
158 request.set_nonce(nonce);
356 token->set_nonce(NONCE);
368 // The nonce is covered by the signature, so changing it should trip the
370 token->set_nonce(NONCE + 1);
712 uint64_t nonce; local
719 code = GetResetChallenge(client.get(), &selector, &nonce, data, &len);
722 EXPECT_NE(0ULL, nonce);
845 uint64_t nonce; local
    [all...]
  /external/u-boot/drivers/mmc/
rpmb.c 68 unsigned char nonce[RPMB_SZ_NONCE]; member in struct:s_rpmb
  /external/webrtc/webrtc/p2p/base/
turnport.h 122 const std::string& nonce() const { return nonce_; } function in class:cricket::TurnPort
196 void set_nonce(const std::string& nonce) { nonce_ = nonce; }

Completed in 911 milliseconds

1 2 3