/external/boringssl/src/crypto/rand_extra/ |
deterministic.c | 39 uint8_t nonce[12]; local 40 OPENSSL_memset(nonce, 0, sizeof(nonce)); 41 OPENSSL_memcpy(nonce, &g_num_calls, sizeof(g_num_calls)); 44 CRYPTO_chacha_20(out, out, requested, kZeroKey, nonce, 0);
|
/external/nos/test/system-test-harness/tools/ |
avb_tools.h | 28 uint64_t nonce; member in struct:avb_tools::ResetMessage 39 uint32_t *selector, uint64_t *nonce,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
GCMParameters.java | 18 aes-nonce OCTET STRING, -- recommended size is 12 octets 25 private byte[] nonce; field in class:GCMParameters 59 this.nonce = ASN1OctetString.getInstance(seq.getObjectAt(0)).getOctets(); 72 byte[] nonce, 75 this.nonce = Arrays.clone(nonce); 81 return Arrays.clone(nonce); 93 v.add(new DEROctetString(nonce));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/ |
AEADParameters.java | 10 private byte[] nonce; field in class:AEADParameters 19 * @param nonce nonce to be used 21 public AEADParameters(KeyParameter key, int macSize, byte[] nonce) 23 this(key, macSize, nonce, null); 31 * @param nonce nonce to be used 34 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText) 37 this.nonce = Arrays.clone(nonce); [all...] |
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/cms/ |
GCMParameters.java | 19 aes-nonce OCTET STRING, -- recommended size is 12 octets 27 private byte[] nonce; field in class:GCMParameters 61 this.nonce = ASN1OctetString.getInstance(seq.getObjectAt(0)).getOctets(); 74 byte[] nonce, 77 this.nonce = Arrays.clone(nonce); 83 return Arrays.clone(nonce); 95 v.add(new DEROctetString(nonce));
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/crypto/params/ |
AEADParameters.java | 14 private byte[] nonce; field in class:AEADParameters 23 * @param nonce nonce to be used 25 public AEADParameters(KeyParameter key, int macSize, byte[] nonce) 27 this(key, macSize, nonce, null); 35 * @param nonce nonce to be used 38 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText) 41 this.nonce = Arrays.clone(nonce); [all...] |
/external/nos/host/android/hals/oemlock/test/ |
test.cpp | 53 hidl_vec<uint8_t> makeSignature(uint64_t version, uint64_t nonce, 63 const uint64_t nonce_le = htole64(nonce); 93 && argToken.nonce() == msgToken.nonce() 99 constexpr uint64_t nonce = 3486438654; local 109 unlock->set_nonce(nonce); 117 ASSERT_THAT(hal.setOemUnlockAllowedByCarrier(true, makeSignature(version, nonce, token)), 318 constexpr uint64_t nonce = 0x24680ace13579bdf; local 324 const auto signature = makeSignature(version, nonce, token); 329 EXPECT_THAT(unlock.nonce(), Eq(nonce)) [all...] |
/external/boringssl/src/fipstools/ |
cavp_ctr_drbg_test.cc | 47 std::vector<uint8_t> entropy, nonce, personalization_str, ai1, ai2; local 50 !t->GetBytes(&nonce, "Nonce") || 55 nonce.size() != 0 ||
|
test_fips.c | 98 uint8_t nonce[EVP_AEAD_MAX_NONCE_LENGTH]; local 99 OPENSSL_memset(nonce, 0, sizeof(nonce)); 110 if (!EVP_AEAD_CTX_seal(&aead_ctx, output, &out_len, sizeof(output), nonce, 122 if (!EVP_AEAD_CTX_open(&aead_ctx, output, &out_len, sizeof(output), nonce,
|
/external/nos/host/android/hals/oemlock/ |
OemLock.cpp | 140 * 2. 64-bit nonce 165 // Get the nonce 166 uint64_t nonce; local 167 memcpy(&nonce, &(*it), sizeof(uint64_t)); 169 unlock->set_nonce(letoh64(nonce));
|
/external/boringssl/src/crypto/fipsmodule/modes/ |
ccm.c | 64 } nonce, cmac; member in struct:ccm128_state 86 const uint8_t *nonce, size_t nonce_len, 101 state->nonce.c[0] = (uint8_t)((L - 1) | ((M - 2) / 2) << 3); 103 state->nonce.c[0] |= 0x40; // Set AAD Flag 105 OPENSSL_memcpy(&state->nonce.c[1], nonce, nonce_len); 107 state->nonce.c[15 - i] = (uint8_t)(plaintext_len >> (8 * i)); 110 (*block)(state->nonce.c, state->cmac.c, key); 168 state->nonce.c[0] &= 7; 177 state->nonce.c[15 - i] = 0 [all...] |
/external/grpc-grpc-java/alts/src/test/java/io/grpc/alts/internal/ |
AesGcmHkdfAeadCrypterTest.java | 36 final byte[] nonce; field in class:AesGcmHkdfAeadCrypterTest.TestVector 44 nonce = builder.nonce; 58 byte[] nonce; field in class:AesGcmHkdfAeadCrypterTest.TestVectorBuilder 66 && nonce == null 85 TestVectorBuilder withNonce(String nonce) { 86 this.nonce = BaseEncoding.base16().lowerCase().decode(nonce); 119 testVector.nonce); 144 testVector.nonce); [all...] |
/external/openssh/ |
mac.c | 183 u_char nonce[8]; local 199 POKE_U64(nonce, seqno); 201 umac_final(mac->umac_ctx, u.m, nonce); 204 put_u64(nonce, seqno); 206 umac128_final(mac->umac_ctx, u.m, nonce);
|
/cts/tests/tests/jni/src/android/jni/cts/ |
JniStaticTest.java | 24 * Basic static method tests. The "nonce" class being tested by this 184 StaticNonce nonce = StaticNonce.returnInstance(); local 185 assertSame(StaticNonce.class, nonce.getClass());
|
/external/ImageMagick/MagickCore/ |
cipher.c | 531 unsigned char *nonce) 538 nonce[i]++; 539 if (nonce[i] != 0) 604 *nonce; 612 Generate decipher key and nonce. 630 nonce=SplitStringInfo(key,GetStringInfoLength(key)/2); 631 if (nonce == (StringInfo *) NULL) 641 UpdateSignature(signature_info,nonce); 643 SetStringInfoLength(nonce,sizeof(extent)); 644 SetStringInfoDatum(nonce,(const unsigned char *) &extent) 595 *nonce; local 808 *nonce; local [all...] |
random.c | 87 *nonce, 181 *nonce; 186 random_info->nonce=AcquireStringInfo(2*GetSignatureDigestsize( 188 ResetStringInfo(random_info->nonce); 200 Seed random nonce. 202 nonce=GenerateEntropicChaos(random_info); 203 if (nonce == (StringInfo *) NULL) 206 UpdateSignature(random_info->signature_info,nonce); 208 SetStringInfoLength(nonce,(GetSignatureDigestsize( 210 SetStringInfo(nonce,GetSignatureDigest(random_info->signature_info)) 85 *nonce, member in struct:_RandomInfo 175 *nonce; local [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 103 //TODO: supply a real nonce-count, currently a server will interprete a repeated request as a replay 104 private static final String NC = "00000001"; //nonce-count is always 1 136 if (getParameter("nonce") == null) { 137 throw new MalformedChallengeException("missing nonce in challange"); 269 String nonce = getParameter("nonce"); local 278 if (nonce == null) { 279 throw new IllegalStateException("Nonce may not be null"); 314 // ":" unq(nonce-value) 320 StringBuilder tmp3 = new StringBuilder(tmp2.length() + nonce.length() + cnonce.length() + 2) 400 String nonce = getParameter("nonce"); local [all...] |
/external/boringssl/src/crypto/cipher_extra/ |
aead_test.cc | 112 // NONCE: 978105dfce667bf4 121 std::vector<uint8_t> key, nonce, in, ad, ct, tag; 123 ASSERT_TRUE(t->GetBytes(&nonce, "NONCE")); 146 nonce.data(), nonce.size(), in.data(), 168 nonce.data(), nonce.size(), out.data(), 190 ctx.get(), out2.data(), &out2_len, out2.size(), nonce.data(), 191 nonce.size(), out.data(), out.size(), ad.data(), ad.size()) 418 uint8_t nonce[EVP_AEAD_MAX_NONCE_LENGTH]; local 544 alignas(64) uint8_t nonce[EVP_AEAD_MAX_NONCE_LENGTH + 1]; local [all...] |
e_chacha20poly1305.c | 54 uint8_t nonce[12]; member in struct:open_data::__anon15420 65 uint8_t nonce[12]; member in struct:seal_data::__anon15422 158 const uint8_t nonce[12], const uint8_t *ad, size_t ad_len, 164 CRYPTO_chacha_20(poly1305_key, poly1305_key, sizeof(poly1305_key), key, nonce, 188 size_t *out_tag_len, size_t max_out_tag_len, const uint8_t *nonce, 231 CRYPTO_chacha_20(block, block, sizeof(block), key, nonce, 245 OPENSSL_memcpy(data.in.nonce, nonce, 12); 250 CRYPTO_chacha_20(out, in, in_len, key, nonce, 1); 251 calc_tag(data.out.tag, key, nonce, ad, ad_len, out, in_len, out_tag [all...] |
/external/boringssl/src/crypto/fipsmodule/self_check/ |
self_check.c | 421 uint8_t nonce[EVP_AEAD_MAX_NONCE_LENGTH]; local 422 OPENSSL_memset(nonce, 0, sizeof(nonce)); 430 if (!EVP_AEAD_CTX_seal(&aead_ctx, output, &out_len, sizeof(output), nonce, 440 if (!EVP_AEAD_CTX_open(&aead_ctx, output, &out_len, sizeof(output), nonce,
|
/external/f2fs-tools/fsck/ |
xattr.h | 46 u8 nonce[FS_KEY_DERIVATION_NONCE_SIZE]; member in struct:fscrypt_context
|
/external/libcups/cups/ |
auth.c | 118 nonce[HTTP_MAX_VALUE]; /* nonce="xyz" string */ local 262 httpGetSubField(http, HTTP_FIELD_WWW_AUTHENTICATE, "nonce", nonce); 265 httpMD5Final(nonce, method, resource, encode); 267 "username=\"%s\", realm=\"%s\", nonce=\"%s\", uri=\"%s\", " 268 "response=\"%s\"", cupsUser(), realm, nonce, resource, encode);
|
/external/nos/test/system-test-harness/src/ |
avb_tests.cc | 38 int ProductionResetTest(uint32_t selector, uint64_t nonce, 55 const uint64_t NONCE = 0x4141414141414141ULL; 152 int AvbTest::ProductionResetTest(uint32_t selector, uint64_t nonce, 158 request.set_nonce(nonce); 356 token->set_nonce(NONCE); 368 // The nonce is covered by the signature, so changing it should trip the 370 token->set_nonce(NONCE + 1); 712 uint64_t nonce; local 719 code = GetResetChallenge(client.get(), &selector, &nonce, data, &len); 722 EXPECT_NE(0ULL, nonce); 845 uint64_t nonce; local [all...] |
/external/u-boot/drivers/mmc/ |
rpmb.c | 68 unsigned char nonce[RPMB_SZ_NONCE]; member in struct:s_rpmb
|
/external/webrtc/webrtc/p2p/base/ |
turnport.h | 122 const std::string& nonce() const { return nonce_; } function in class:cricket::TurnPort 196 void set_nonce(const std::string& nonce) { nonce_ = nonce; }
|