HomeSort by relevance Sort by last modified time
    Searched defs:nonce (Results 26 - 50 of 83) sorted by null

12 3 4

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_tlv_common.h 82 u8 nonce[32]; member in struct:eap_tlv_crypto_binding_tlv
ikev2_common.h 19 * Nonce length must be at least 16 octets. It must also be at least half the
300 const u8 *nonce, size_t nonce_len,
318 const u8 *nonce; member in struct:ikev2_payloads
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_psk.c 188 u8 *buf, *rpchannel, nonce[16], *decrypted; local
262 os_memset(nonce, 0, 12);
263 os_memcpy(nonce + 12, pchannel, 4);
273 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce",
274 nonce, sizeof(nonce));
287 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
331 /* nonce++ */
332 inc_byte_array(nonce, sizeof(nonce))
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 101 u8 *buf, *pchannel, nonce[16]; local
138 os_memset(nonce, 0, sizeof(nonce));
140 os_memcpy(pchannel, nonce + 12, 4);
145 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
339 u8 *decrypted, nonce[16]; local
367 wpa_printf(MSG_DEBUG, "EAP-PSK: Nonce did not increase");
371 os_memset(nonce, 0, 12);
372 os_memcpy(nonce + 12, pos, 4)
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_tlv_common.h 76 u8 nonce[32]; member in struct:eap_tlv_crypto_binding_tlv
ikev2_common.h 13 * Nonce length must be at least 16 octets. It must also be at least half the
294 const u8 *nonce, size_t nonce_len,
312 const u8 *nonce; member in struct:ikev2_payloads
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 183 u8 *buf, *rpchannel, nonce[16], *decrypted; local
257 os_memset(nonce, 0, 12);
258 os_memcpy(nonce + 12, pchannel, 4);
268 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce",
269 nonce, sizeof(nonce));
282 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
326 /* nonce++ */
327 inc_byte_array(nonce, sizeof(nonce))
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 96 u8 *buf, *pchannel, nonce[16]; local
135 os_memset(nonce, 0, sizeof(nonce));
137 os_memcpy(pchannel, nonce + 12, 4);
142 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
336 u8 *decrypted, nonce[16]; local
364 wpa_printf(MSG_DEBUG, "EAP-PSK: Nonce did not increase");
368 os_memset(nonce, 0, 12);
369 os_memcpy(nonce + 12, pos, 4)
    [all...]
  /frameworks/base/obex/javax/obex/
HeaderSet.java 214 /*package*/ byte[] nonce; field in class:HeaderSet
602 nonce = new byte[16];
604 nonce[i] = (byte)mRandom.nextInt();
607 mAuthChall = ObexHelper.computeAuthenticationChallenge(nonce, realm, access, userID);
  /external/srtp/srtp/
srtp.c 330 v128_t nonce; local
332 /* set eigth octet of nonce to <label>, set the rest of it to zero */
333 v128_set_to_zero(&nonce);
334 nonce.v8[7] = label;
336 aes_icm_set_iv(&kdf->c, &nonce);
740 * if we're using rindael counter mode, set nonce and seq
    [all...]
  /frameworks/base/core/java/android/os/storage/
StorageManager.java 77 * Next available nonce
107 public void onObbResult(String filename, int nonce, int status) {
110 delegate = mListeners.get(nonce);
112 mListeners.remove(nonce);
125 mListeners.put(delegate.nonce, delegate);
128 return delegate.nonce;
143 private final int nonce; field in class:StorageManager.ObbListenerDelegate
146 nonce = getNextNonce();
440 final int nonce = mObbActionListener.addListener(listener); local
441 mMountService.mountObb(filename, key, mObbActionListener, nonce);
480 final int nonce = mObbActionListener.addListener(listener); local
    [all...]
IMountService.java 492 public void mountObb(String filename, String key, IObbActionListener token, int nonce)
501 _data.writeInt(nonce);
518 int nonce) throws RemoteException {
526 _data.writeInt(nonce);
1051 int nonce; local
1065 int nonce; local
    [all...]
  /external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/
OAuth.php 470 * util function: current nonce
639 $nonce = $request instanceof OAuthRequest variable
644 $this->check_nonce($consumer, $token, $nonce, $timestamp);
680 * check that the nonce is not repeated
682 private function check_nonce($consumer, $token, $nonce, $timestamp) {
683 if( ! $nonce )
685 'Missing nonce parameter. The parameter is required'
688 // verify that the nonce is uniqueish
692 $nonce,
696 throw new OAuthException("Nonce already used: $nonce")
    [all...]
  /external/chromium/third_party/libjingle/source/talk/base/
httpcommon.cc 690 " nonce=\"dcd98b7102dd2f0e8b11d0f600bfb0c093\","
704 " nonce=\"Nny4QuC5PwiSDixJ\","
812 std::string realm, nonce, qop, opaque; local
814 HttpHasAttribute(args, "nonce", &nonce);
832 middle = nonce + ":" + ncount + ":" + cnonce + ":" + qop;
834 middle = nonce;
850 ss << ", nonce=" << quote(nonce);
  /external/ipsec-tools/src/racoon/
handler.h 153 vchar_t *nonce; /* nonce value */ member in struct:ph1handle
154 vchar_t *nonce_p; /* partner's nonce value */
300 vchar_t *nonce; /* nonce value in phase 2 */ member in struct:ph2handle
301 vchar_t *nonce_p; /* partner's nonce value in phase 2 */
  /external/openssh/
key.c 1865 u_char *ca_blob, *sig_blob, nonce[32]; local
    [all...]
umac.c 213 * xor the appropriate bytes depending on the last bits of nonce.
219 UINT8 nonce[AES_BLOCK_LEN]; /* The AES input making above cache */ member in struct:__anon9900
231 memset(pc->nonce, 0, sizeof(pc->nonce));
232 aes_encryption(pc->nonce, pc->cache, pc->prf_key);
235 static void pdf_gen_xor(pdf_ctx *pc, UINT8 nonce[8], UINT8 buf[8])
252 int ndx = nonce[7] & LOW_BIT_MASK;
254 *(UINT32 *)tmp_nonce_lo = ((UINT32 *)nonce)[1];
257 if ( (((UINT32 *)tmp_nonce_lo)[0] != ((UINT32 *)pc->nonce)[1]) ||
258 (((UINT32 *)nonce)[0] != ((UINT32 *)pc->nonce)[0])
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth.h 52 u8 nonce[16]; member in struct:ft_r0kh_r1kh_pull_frame
66 u8 nonce[16]; /* copied from pull */ member in struct:ft_r0kh_r1kh_resp_frame
  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 52 u8 Anonce[WPA_NONCE_LEN]; /* Responder Nonce in TDLS */
53 u8 Snonce[WPA_NONCE_LEN]; /* Initiator Nonce in TDLS */
91 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */
92 u8 rnonce[WPA_NONCE_LEN]; /* Responder Nonce */
357 const u8 *nonce[2]; local
367 nonce[0] = peer->inonce;
368 nonce[1] = peer->rnonce;
370 nonce[0] = peer->rnonce;
371 nonce[1] = peer->inonce;
373 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN)
    [all...]
  /frameworks/base/core/java/android/database/sqlite/
SQLiteConnectionPool.java 597 final int nonce; local
640 nonce = waiter.mNonce;
649 if (waiter.mNonce == nonce) {
    [all...]
  /bionic/libc/kernel/common/linux/
usb_ch9.h 375 __u8 nonce[16]; member in struct:usb_handshake
  /development/ndk/platforms/android-3/include/linux/
usb_ch9.h 355 __u8 nonce[16]; member in struct:usb_handshake
  /external/kernel-headers/original/linux/
usb_ch9.h 512 __u8 nonce[16]; member in struct:usb_handshake
  /external/openssl/include/openssl/
ts.h 120 nonce INTEGER OPTIONAL,
130 ASN1_INTEGER *nonce; /* OPTIONAL */ member in struct:TS_req_st
162 nonce INTEGER OPTIONAL,
178 ASN1_INTEGER *nonce; member in struct:TS_tst_info_st
387 int TS_REQ_set_nonce(TS_REQ *a, const ASN1_INTEGER *nonce);
448 int TS_TST_INFO_set_nonce(TS_TST_INFO *a, const ASN1_INTEGER *nonce);
629 /* Verify the nonce value. */
674 ASN1_INTEGER *nonce; member in struct:TS_verify_ctx
705 * nonce, nonce_len = nonce from the request or NULL if absent (in this cas
    [all...]
  /external/ping6/
ping6.c 161 /* FQDN case, 64 bits of nonce + 32 bits ttl */
234 u_int8_t nonce[8]; /* nonce field for node information */ variable
740 memset(nonce, 0, sizeof(nonce));
741 for (i = 0; i < sizeof(nonce); i += sizeof(u_int32_t))
742 *((u_int32_t *)&nonce[i]) = arc4random();
    [all...]

Completed in 1075 milliseconds

12 3 4