/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_tlv_common.h | 82 u8 nonce[32]; member in struct:eap_tlv_crypto_binding_tlv
|
ikev2_common.h | 19 * Nonce length must be at least 16 octets. It must also be at least half the 300 const u8 *nonce, size_t nonce_len, 318 const u8 *nonce; member in struct:ikev2_payloads
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 188 u8 *buf, *rpchannel, nonce[16], *decrypted; local 262 os_memset(nonce, 0, 12); 263 os_memcpy(nonce + 12, pchannel, 4); 273 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", 274 nonce, sizeof(nonce)); 287 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), 331 /* nonce++ */ 332 inc_byte_array(nonce, sizeof(nonce)) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 101 u8 *buf, *pchannel, nonce[16]; local 138 os_memset(nonce, 0, sizeof(nonce)); 140 os_memcpy(pchannel, nonce + 12, 4); 145 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), 339 u8 *decrypted, nonce[16]; local 367 wpa_printf(MSG_DEBUG, "EAP-PSK: Nonce did not increase"); 371 os_memset(nonce, 0, 12); 372 os_memcpy(nonce + 12, pos, 4) [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_tlv_common.h | 76 u8 nonce[32]; member in struct:eap_tlv_crypto_binding_tlv
|
ikev2_common.h | 13 * Nonce length must be at least 16 octets. It must also be at least half the 294 const u8 *nonce, size_t nonce_len, 312 const u8 *nonce; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 183 u8 *buf, *rpchannel, nonce[16], *decrypted; local 257 os_memset(nonce, 0, 12); 258 os_memcpy(nonce + 12, pchannel, 4); 268 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", 269 nonce, sizeof(nonce)); 282 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), 326 /* nonce++ */ 327 inc_byte_array(nonce, sizeof(nonce)) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 96 u8 *buf, *pchannel, nonce[16]; local 135 os_memset(nonce, 0, sizeof(nonce)); 137 os_memcpy(pchannel, nonce + 12, 4); 142 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), 336 u8 *decrypted, nonce[16]; local 364 wpa_printf(MSG_DEBUG, "EAP-PSK: Nonce did not increase"); 368 os_memset(nonce, 0, 12); 369 os_memcpy(nonce + 12, pos, 4) [all...] |
/frameworks/base/obex/javax/obex/ |
HeaderSet.java | 214 /*package*/ byte[] nonce; field in class:HeaderSet 602 nonce = new byte[16]; 604 nonce[i] = (byte)mRandom.nextInt(); 607 mAuthChall = ObexHelper.computeAuthenticationChallenge(nonce, realm, access, userID);
|
/external/srtp/srtp/ |
srtp.c | 330 v128_t nonce; local 332 /* set eigth octet of nonce to <label>, set the rest of it to zero */ 333 v128_set_to_zero(&nonce); 334 nonce.v8[7] = label; 336 aes_icm_set_iv(&kdf->c, &nonce); 740 * if we're using rindael counter mode, set nonce and seq [all...] |
/frameworks/base/core/java/android/os/storage/ |
StorageManager.java | 77 * Next available nonce 107 public void onObbResult(String filename, int nonce, int status) { 110 delegate = mListeners.get(nonce); 112 mListeners.remove(nonce); 125 mListeners.put(delegate.nonce, delegate); 128 return delegate.nonce; 143 private final int nonce; field in class:StorageManager.ObbListenerDelegate 146 nonce = getNextNonce(); 440 final int nonce = mObbActionListener.addListener(listener); local 441 mMountService.mountObb(filename, key, mObbActionListener, nonce); 480 final int nonce = mObbActionListener.addListener(listener); local [all...] |
IMountService.java | 492 public void mountObb(String filename, String key, IObbActionListener token, int nonce) 501 _data.writeInt(nonce); 518 int nonce) throws RemoteException { 526 _data.writeInt(nonce); 1051 int nonce; local 1065 int nonce; local [all...] |
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/ |
OAuth.php | 470 * util function: current nonce 639 $nonce = $request instanceof OAuthRequest variable 644 $this->check_nonce($consumer, $token, $nonce, $timestamp); 680 * check that the nonce is not repeated 682 private function check_nonce($consumer, $token, $nonce, $timestamp) { 683 if( ! $nonce ) 685 'Missing nonce parameter. The parameter is required' 688 // verify that the nonce is uniqueish 692 $nonce, 696 throw new OAuthException("Nonce already used: $nonce") [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
httpcommon.cc | 690 " nonce=\"dcd98b7102dd2f0e8b11d0f600bfb0c093\"," 704 " nonce=\"Nny4QuC5PwiSDixJ\"," 812 std::string realm, nonce, qop, opaque; local 814 HttpHasAttribute(args, "nonce", &nonce); 832 middle = nonce + ":" + ncount + ":" + cnonce + ":" + qop; 834 middle = nonce; 850 ss << ", nonce=" << quote(nonce);
|
/external/ipsec-tools/src/racoon/ |
handler.h | 153 vchar_t *nonce; /* nonce value */ member in struct:ph1handle 154 vchar_t *nonce_p; /* partner's nonce value */ 300 vchar_t *nonce; /* nonce value in phase 2 */ member in struct:ph2handle 301 vchar_t *nonce_p; /* partner's nonce value in phase 2 */
|
/external/openssh/ |
key.c | 1865 u_char *ca_blob, *sig_blob, nonce[32]; local [all...] |
umac.c | 213 * xor the appropriate bytes depending on the last bits of nonce. 219 UINT8 nonce[AES_BLOCK_LEN]; /* The AES input making above cache */ member in struct:__anon9900 231 memset(pc->nonce, 0, sizeof(pc->nonce)); 232 aes_encryption(pc->nonce, pc->cache, pc->prf_key); 235 static void pdf_gen_xor(pdf_ctx *pc, UINT8 nonce[8], UINT8 buf[8]) 252 int ndx = nonce[7] & LOW_BIT_MASK; 254 *(UINT32 *)tmp_nonce_lo = ((UINT32 *)nonce)[1]; 257 if ( (((UINT32 *)tmp_nonce_lo)[0] != ((UINT32 *)pc->nonce)[1]) || 258 (((UINT32 *)nonce)[0] != ((UINT32 *)pc->nonce)[0]) [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.h | 52 u8 nonce[16]; member in struct:ft_r0kh_r1kh_pull_frame 66 u8 nonce[16]; /* copied from pull */ member in struct:ft_r0kh_r1kh_resp_frame
|
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 52 u8 Anonce[WPA_NONCE_LEN]; /* Responder Nonce in TDLS */ 53 u8 Snonce[WPA_NONCE_LEN]; /* Initiator Nonce in TDLS */ 91 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */ 92 u8 rnonce[WPA_NONCE_LEN]; /* Responder Nonce */ 357 const u8 *nonce[2]; local 367 nonce[0] = peer->inonce; 368 nonce[1] = peer->rnonce; 370 nonce[0] = peer->rnonce; 371 nonce[1] = peer->inonce; 373 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN) [all...] |
/frameworks/base/core/java/android/database/sqlite/ |
SQLiteConnectionPool.java | 597 final int nonce; local 640 nonce = waiter.mNonce; 649 if (waiter.mNonce == nonce) { [all...] |
/bionic/libc/kernel/common/linux/ |
usb_ch9.h | 375 __u8 nonce[16]; member in struct:usb_handshake
|
/development/ndk/platforms/android-3/include/linux/ |
usb_ch9.h | 355 __u8 nonce[16]; member in struct:usb_handshake
|
/external/kernel-headers/original/linux/ |
usb_ch9.h | 512 __u8 nonce[16]; member in struct:usb_handshake
|
/external/openssl/include/openssl/ |
ts.h | 120 nonce INTEGER OPTIONAL, 130 ASN1_INTEGER *nonce; /* OPTIONAL */ member in struct:TS_req_st 162 nonce INTEGER OPTIONAL, 178 ASN1_INTEGER *nonce; member in struct:TS_tst_info_st 387 int TS_REQ_set_nonce(TS_REQ *a, const ASN1_INTEGER *nonce); 448 int TS_TST_INFO_set_nonce(TS_TST_INFO *a, const ASN1_INTEGER *nonce); 629 /* Verify the nonce value. */ 674 ASN1_INTEGER *nonce; member in struct:TS_verify_ctx 705 * nonce, nonce_len = nonce from the request or NULL if absent (in this cas [all...] |
/external/ping6/ |
ping6.c | 161 /* FQDN case, 64 bits of nonce + 32 bits ttl */ 234 u_int8_t nonce[8]; /* nonce field for node information */ variable 740 memset(nonce, 0, sizeof(nonce)); 741 for (i = 0; i < sizeof(nonce); i += sizeof(u_int32_t)) 742 *((u_int32_t *)&nonce[i]) = arc4random(); [all...] |