HomeSort by relevance Sort by last modified time
    Searched full:nonces (Results 1 - 10 of 10) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_ikev2_common.c 29 u8 *nonces; local
37 nonces = os_malloc(nlen);
38 if (nonces == NULL)
40 os_memcpy(nonces, i_nonce, i_nonce_len);
41 os_memcpy(nonces + i_nonce_len, r_nonce, r_nonce_len);
43 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
45 os_free(nonces);
48 os_free(nonces);
  /frameworks/base/docs/html/guide/market/billing/
billing_best_practices.jd 67 <h4>Use secure random nonces</h4>
68 <p>Nonces must not be predictable or reused. Always use a cryptographically secure random number generator (like {@link java.security.SecureRandom}) when you generate nonces. This can help reduce replay attacks.</p>
69 <p>Also, if you are performing nonce verification on a server, make sure that you generate the nonces on the server.</p>
billing_integrate.jd     [all...]
billing_overview.jd 251 <p>In-app billing also uses nonces (a random number used once) to help verify the integrity of the purchase information that's returned from Android Market. Your application must generate a nonce and send it with a <code>GET_PURCHASE_INFORMATION</code> request and a <code>RESTORE_TRANSACTIONS</code> request. When Android Market receives the request, it adds the nonce to the JSON string that contains the transaction information. The JSON string is then signed and returned to your application. When your application receives the JSON string, you need to verify the nonce as well as the signature of the JSON string.</p>
  /external/openssl/crypto/ocsp/
ocsp_ext.c 366 * 1: nonces present and equal.
367 * 2: nonces both absent.
369 * 0: nonces both present and not equal.
373 * If responder doesn't handle nonces return != 0 may be
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
wpa_common.c 72 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
ikev2.c 465 /* Zeros are removed incorrectly from the beginning of the nonces */
1139 /* Zeros are removed incorrectly from the beginning of the nonces in
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_upnp.c 692 * nonces. The ER (UPnP control point) will ignore this, but at
    [all...]
  /external/wpa_supplicant/
wpa.c 859 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces
    [all...]
  /external/dropbear/libtomcrypt/
crypt.tex     [all...]

Completed in 496 milliseconds