/external/bouncycastle/src/main/java/org/bouncycastle/crypto/params/ |
AEADParameters.java | 9 private byte[] nonce; field in class:AEADParameters 18 * @param nonce nonce to be used 21 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText) 24 this.nonce = nonce; 46 return nonce;
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/tsp/ |
TimeStampReq.java | 43 * nonce INTEGER OPTIONAL, 57 private final BigInteger nonce; field in class:TimeStampReq 66 String reqPolicy, BigInteger nonce, Boolean certReq, 71 this.nonce = nonce; 77 String reqPolicy, BigInteger nonce, Boolean certReq, 79 this (version, messageImprint, reqPolicy, nonce, certReq, extensions); 93 res.append(nonce); 135 * @return Returns the nonce. 138 return nonce; [all...] |
TSTInfo.java | 53 * nonce INTEGER OPTIONAL, 80 private final BigInteger nonce; field in class:TSTInfo 88 Boolean ordering, BigInteger nonce, GeneralName tsa, 97 this.nonce = nonce; 123 res.append(nonce); 161 * @return Returns the nonce. 164 return nonce; 254 ASN1Integer.getInstance(), // nonce 268 BigInteger nonce = (values[7] == null) ? null : new BigInteger [all...] |
/frameworks/base/libs/storage/ |
IObbActionListener.cpp | 33 virtual void onObbResult(const String16& filename, const int32_t nonce, const int32_t state) { } 47 int32_t nonce = data.readInt32(); local 49 onObbResult(filename, nonce, state);
|
/frameworks/base/core/java/android/os/storage/ |
IObbActionListener.java | 72 int nonce; local 73 nonce = data.readInt(); 76 this.onObbResult(filename, nonce, status); 106 public void onObbResult(String filename, int nonce, int status) 113 _data.writeInt(nonce); 131 * @param nonce identifier that is meaningful to the receiver 134 public void onObbResult(String filename, int nonce, int status) throws RemoteException;
|
StorageManager.java | 76 * Next available nonce 105 public void onObbResult(String filename, int nonce, int status) throws RemoteException { 108 delegate = mListeners.get(nonce); 110 mListeners.remove(nonce); 123 mListeners.put(delegate.nonce, delegate); 126 return delegate.nonce; 141 private final int nonce; field in class:StorageManager.ObbListenerDelegate 144 nonce = getNextNonce(); 438 final int nonce = mObbActionListener.addListener(listener); local 439 mMountService.mountObb(filename, key, mObbActionListener, nonce); 478 final int nonce = mObbActionListener.addListener(listener); local [all...] |
/frameworks/base/native/android/ |
storage_manager.cpp | 44 virtual void onObbResult(const android::String16& filename, const int32_t nonce, 51 : nonce(_nonce) 56 int32_t nonce; member in class:ObbCallback 105 void fireCallback(const char* filename, const int32_t nonce, const int32_t state) { 112 if (cb->nonce == nonce) { 132 mMountService->mountObb(filename16, key16, mObbActionListener, cb->nonce); 138 mMountService->unmountObb(filename16, force, mObbActionListener, cb->nonce); 157 void ObbActionListener::onObbResult(const android::String16& filename, const int32_t nonce, const int32_t state) { 158 mStorageManager->fireCallback(String8(filename).string(), nonce, state) [all...] |
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_encrypt_authenticate_memory.c | 25 @param nonce The session nonce [use once] 26 @param noncelen The length of the nonce 38 const unsigned char *nonce, unsigned long noncelen, 55 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) {
|
eax_decrypt_verify_memory.c | 25 @param nonce The nonce data (use once) for the session 26 @param noncelen The length of the nonce data. 39 const unsigned char *nonce, unsigned long noncelen, 73 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) {
|
eax_init.c | 26 @param nonce The use-once nonce for the session 27 @param noncelen The length of the nonce (octets) 34 const unsigned char *nonce, unsigned long noncelen, 45 LTC_ARGCHK(nonce != NULL); 69 /* N = OMAC_0K(nonce) */ 79 /* omac the nonce */ 80 if ((err = omac_process(omac, nonce, noncelen)) != CRYPT_OK) {
|
/frameworks/base/include/storage/ |
IObbActionListener.h | 32 virtual void onObbResult(const String16& filename, const int32_t nonce, const int32_t state) = 0;
|
IMountService.h | 64 const sp<IObbActionListener>& token, const int32_t nonce) = 0; 66 const sp<IObbActionListener>& token, const int32_t nonce) = 0;
|
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
ocb_decrypt_verify_memory.c | 25 @param nonce The session nonce (length of the block size of the block cipher) 36 const unsigned char *nonce, 46 LTC_ARGCHK(nonce != NULL); 58 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) {
|
ocb_encrypt_authenticate_memory.c | 25 @param nonce The session nonce (length of the block ciphers block size) 35 const unsigned char *nonce, 44 LTC_ARGCHK(nonce != NULL); 56 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) {
|
/external/wpa_supplicant/ |
aes_wrap.h | 31 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, 33 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, 36 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len,
|
eap_psk.c | 183 u8 *resp, *buf, *rpchannel, nonce[16], *decrypted; local 249 os_memset(nonce, 0, 12); 250 os_memcpy(nonce + 12, pchannel, 4); 260 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", 261 nonce, sizeof(nonce)); 273 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), 314 /* nonce++ */ 315 inc_byte_array(nonce, sizeof(nonce)) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
aes_wrap.h | 33 int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, 36 const u8 *nonce, size_t nonce_len, 40 const u8 *nonce, size_t nonce_len,
|
/frameworks/base/obex/javax/obex/ |
ClientSession.java | 84 if (header.nonce != null) { 86 System.arraycopy(header.nonce, 0, mChallengeDigest, 0, 16); 150 if (head.nonce != null) { 152 System.arraycopy(head.nonce, 0, mChallengeDigest, 0, 16); 194 if (header.nonce != null) { 196 System.arraycopy(header.nonce, 0, mChallengeDigest, 0, 16); 259 if (head.nonce != null) { 261 System.arraycopy(head.nonce, 0, mChallengeDigest, 0, 16); 296 if (headset.nonce != null) { 298 System.arraycopy(headset.nonce, 0, mChallengeDigest, 0, 16) [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/ |
CCMBlockCipher.java | 27 private byte[] nonce; field in class:CCMBlockCipher 71 nonce = param.getNonce(); 80 nonce = param.getIV(); 175 iv[0] = (byte)(((15 - nonce.length) - 1) & 0x7); 177 System.arraycopy(nonce, 0, iv, 1, nonce.length); 273 b0[0] |= ((15 - nonce.length) - 1) & 0x7; 275 System.arraycopy(nonce, 0, b0, 1, nonce.length);
|
GCMBlockCipher.java | 32 private byte[] nonce; field in class:GCMBlockCipher 90 nonce = param.getNonce(); 106 nonce = param.getIV(); 119 if (nonce == null || nonce.length < 1) 134 // (but must be 16 if nonce length not 12) (BLOCK_SIZE?) 143 if (nonce.length == 12) 146 System.arraycopy(nonce, 0, J0, 0, nonce.length); 151 this.J0 = gHASH(nonce); [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 98 //TODO: supply a real nonce-count, currently a server will interprete a repeated request as a replay 99 private static final String NC = "00000001"; //nonce-count is always 1 131 if (getParameter("nonce") == null) { 132 throw new MalformedChallengeException("missing nonce in challange"); 264 String nonce = getParameter("nonce"); local 273 if (nonce == null) { 274 throw new IllegalStateException("Nonce may not be null"); 309 // ":" unq(nonce-value) 315 StringBuilder tmp3 = new StringBuilder(tmp2.length() + nonce.length() + cnonce.length() + 2) 395 String nonce = getParameter("nonce"); local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 188 u8 *buf, *rpchannel, nonce[16], *decrypted; local 262 os_memset(nonce, 0, 12); 263 os_memcpy(nonce + 12, pchannel, 4); 273 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", 274 nonce, sizeof(nonce)); 287 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), 331 /* nonce++ */ 332 inc_byte_array(nonce, sizeof(nonce)) [all...] |
/external/nist-sip/java/javax/sip/header/ |
AuthorizationHeader.java | 16 void setNonce(String nonce) throws ParseException;
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_ie.h | 31 const u8 *nonce; member in struct:wpa_eapol_ie_parse
|
/frameworks/base/core/java/android/net/http/ |
RequestHandle.java | 239 String nonce, 245 username, password, realm, nonce, QOP, algorithm, opaque); 298 String nonce, 313 String digest = computeDigest(A1, A2, nonce, QOP, nc, cnonce); 318 response += "nonce=" + doubleQuote(nonce) + ", "; 352 String A1, String A2, String nonce, String QOP, String nc, String cnonce) { 358 return KD(H(A1), nonce + ":" + H(A2)); 361 return KD(H(A1), nonce + ":" + nc + ":" + cnonce + ":" + QOP + ":" + H(A2));
|