/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/ |
AEADParameters.java | 9 private byte[] nonce; field in class:AEADParameters 18 * @param nonce nonce to be used 20 public AEADParameters(KeyParameter key, int macSize, byte[] nonce) 22 this(key, macSize, nonce, null); 30 * @param nonce nonce to be used 33 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText) 36 this.nonce = nonce; [all...] |
/external/chromium/net/http/ |
http_auth_handler_digest_unittest.cc | 21 "Digest realm=\"Oblivion\", nonce=\"nonce-value\""; 101 "Digest nonce=\"xyz\", realm=\"Thunder Bluff\"", 113 "Digest nonce=\"xyz\", realm=ThunderBluff", 126 "Digest nonce=\"xyz\"", 138 "Digest realm=\"\", nonce=\"xyz\"", 149 { // At a minimum, a nonce must be provided. 161 { // The nonce does not need to be quoted, even though RFC2617 163 "Digest nonce=xyz, realm=\"Thunder Bluff\"", 175 "Digest nonce=\"xyz\", realm=\"Thunder Bluff\", foo=\"bar\"" [all...] |
http_auth_handler_digest.h | 24 // Unit tests can override the default client nonce behavior with fixed 25 // nonce generation to get reproducible results. 31 // Generates a client nonce. 38 // characters to generate a client nonce. 48 // construction time as the client nonce. 51 explicit FixedNonceGenerator(const std::string& nonce); 118 // |nonce_count| indicates how many times the server-specified nonce has 120 // |nonce_generator| is used to create a client nonce, and is not owned by 134 // Generates a random string, to be used for client-nonce.
|
/external/openssl/crypto/modes/ |
ccm128.c | 66 memset(ctx->nonce.c,0,sizeof(ctx->nonce.c)); 67 ctx->nonce.c[0] = ((u8)(L-1)&7) | (u8)(((M-2)/2)&7)<<3; 75 /* Then you setup per-message nonce and pass the length of the message */ 77 const unsigned char *nonce,size_t nlen,size_t mlen) 79 unsigned int L = ctx->nonce.c[0]&7; /* the L parameter */ 81 if (nlen<(14-L)) return -1; /* nonce is too short */ 84 ctx->nonce.c[8] = (u8)(mlen>>(56%(sizeof(mlen)*8))); 85 ctx->nonce.c[9] = (u8)(mlen>>(48%(sizeof(mlen)*8))); 86 ctx->nonce.c[10] = (u8)(mlen>>(40%(sizeof(mlen)*8))) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
aes-ctr.c | 19 * @nonce: Nonce for counter mode (16 bytes) 24 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, 36 os_memcpy(counter, nonce, AES_BLOCK_SIZE);
|
aes-eax.c | 19 * @nonce: Nonce for counter mode 20 * @nonce_len: Nonce length in bytes 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, 53 os_memcpy(buf + 16, nonce, nonce_len); 83 * @nonce: Nonce for counter mode 84 * @nonce_len: Nonce length in bytes 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, 117 os_memcpy(buf + 16, nonce, nonce_len) [all...] |
aes-ccm.c | 28 static void aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, 36 /* B_0: Flags | Nonce N | l(m) */ 40 os_memcpy(&b[1], nonce, 15 - L); 84 static void aes_ccm_encr_start(size_t L, const u8 *nonce, u8 *a) 86 /* A_i = Flags | Nonce N | Counter i */ 88 os_memcpy(&a[1], nonce, 15 - L); 148 int aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); 167 aes_ccm_encr_start(L, nonce, a); 178 int aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, [all...] |
aes_wrap.h | 29 int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, 32 const u8 *nonce, size_t nonce_len, 36 const u8 *nonce, size_t nonce_len, 56 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, 59 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/tsp/ |
TimeStampReq.java | 43 * nonce INTEGER OPTIONAL, 57 private final BigInteger nonce; field in class:TimeStampReq 66 String reqPolicy, BigInteger nonce, Boolean certReq, 71 this.nonce = nonce; 77 String reqPolicy, BigInteger nonce, Boolean certReq, 79 this (version, messageImprint, reqPolicy, nonce, certReq, extensions); 93 res.append(nonce); 135 * @return Returns the nonce. 138 return nonce; [all...] |
TSTInfo.java | 53 * nonce INTEGER OPTIONAL, 80 private final BigInteger nonce; field in class:TSTInfo 88 Boolean ordering, BigInteger nonce, GeneralName tsa, 97 this.nonce = nonce; 123 res.append(nonce); 161 * @return Returns the nonce. 164 return nonce; 254 ASN1Integer.getInstance(), // nonce 268 BigInteger nonce = (values[7] == null) ? null : new BigInteger [all...] |
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_init.c | 26 @param nonce The use-once nonce for the session 27 @param noncelen The length of the nonce (octets) 34 const unsigned char *nonce, unsigned long noncelen, 45 LTC_ARGCHK(nonce != NULL); 69 /* N = OMAC_0K(nonce) */ 79 /* omac the nonce */ 80 if ((err = omac_process(omac, nonce, noncelen)) != CRYPT_OK) {
|
eax_decrypt_verify_memory.c | 25 @param nonce The nonce data (use once) for the session 26 @param noncelen The length of the nonce data. 39 const unsigned char *nonce, unsigned long noncelen, 73 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) {
|
eax_encrypt_authenticate_memory.c | 25 @param nonce The session nonce [use once] 26 @param noncelen The length of the nonce 38 const unsigned char *nonce, unsigned long noncelen, 55 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) {
|
eax_test.c | 36 nonce[MAXBLOCKSIZE], 49 /* nonce */ 62 /* test with nonce */ 68 /* nonce */ 82 /* test with header [no nonce] */ 88 /* nonce */ 102 /* test with header + nonce + plaintext */ 108 /* nonce */ 129 /* test with header + nonce + plaintext [not even sizes!] */ 135 /* nonce */ [all...] |
/libcore/luni/src/test/java/libcore/java/lang/ |
ArrayStoreExceptionTest.java | 37 Object[] array = new Nonce[10][]; 44 + "libcore.java.lang.ArrayStoreExceptionTest$Nonce[][]", 51 Object o = new Nonce[1]; 56 assertEquals("libcore.java.lang.ArrayStoreExceptionTest$Nonce[] cannot be stored " 136 Nonce src = new Nonce(); 141 assertEquals("source of type libcore.java.lang.ArrayStoreExceptionTest$Nonce " 151 private static class Nonce {
|
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
ocb_decrypt_verify_memory.c | 25 @param nonce The session nonce (length of the block size of the block cipher) 36 const unsigned char *nonce, 46 LTC_ARGCHK(nonce != NULL); 58 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) {
|
ocb_encrypt_authenticate_memory.c | 25 @param nonce The session nonce (length of the block ciphers block size) 35 const unsigned char *nonce, 44 LTC_ARGCHK(nonce != NULL); 56 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) {
|
/external/srtp/crypto/test/ |
stat_driver.c | 46 v128_t nonce; local 74 err_check(cipher_set_iv(c, &nonce)); 84 v128_set_to_zero(&nonce); 88 nonce.v32[3] = i; 89 err_check(cipher_set_iv(c, &nonce));
|
/frameworks/base/core/java/android/os/storage/ |
IObbActionListener.java | 72 int nonce; local 73 nonce = data.readInt(); 76 this.onObbResult(filename, nonce, status); 106 public void onObbResult(String filename, int nonce, int status) 113 _data.writeInt(nonce); 132 * @param nonce identifier that is meaningful to the receiver 135 public void onObbResult(String filename, int nonce, int status) throws RemoteException;
|
/frameworks/base/native/android/ |
storage_manager.cpp | 44 virtual void onObbResult(const android::String16& filename, const int32_t nonce, 51 : nonce(_nonce) 56 int32_t nonce; member in class:ObbCallback 105 void fireCallback(const char* filename, const int32_t nonce, const int32_t state) { 112 if (cb->nonce == nonce) { 141 mMountService->mountObb(rawPath16, canonicalPath16, key16, mObbActionListener, cb->nonce); 147 mMountService->unmountObb(filename16, force, mObbActionListener, cb->nonce); 166 void ObbActionListener::onObbResult(const android::String16& filename, const int32_t nonce, const int32_t state) { 167 mStorageManager->fireCallback(String8(filename).string(), nonce, state) [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/tsp/ |
TimeStampReqTest.java | 43 BigInteger nonce = BigInteger.valueOf(1234567890L); local 51 nonce, Boolean.FALSE, exts); 62 assertEquals("Decoded nonce is incorrect", nonce, decoded.getNonce());
|
/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 98 //TODO: supply a real nonce-count, currently a server will interprete a repeated request as a replay 99 private static final String NC = "00000001"; //nonce-count is always 1 131 if (getParameter("nonce") == null) { 132 throw new MalformedChallengeException("missing nonce in challange"); 264 String nonce = getParameter("nonce"); local 273 if (nonce == null) { 274 throw new IllegalStateException("Nonce may not be null"); 309 // ":" unq(nonce-value) 315 StringBuilder tmp3 = new StringBuilder(tmp2.length() + nonce.length() + cnonce.length() + 2) 395 String nonce = getParameter("nonce"); local [all...] |
/external/wpa_supplicant_8/src/ap/ |
peerkey_auth.c | 129 * EAPOL-Key(S=1, M=1, A=1, I=0, K=0, SM=1, KeyRSC=0, Nonce=INonce, 156 * EAPOL-Key(S=1, M=1, A=0, I=1, K=0, SM=1, KeyRSC=0, Nonce=PNonce, 173 /* Initiator Nonce */ 174 pos = wpa_add_kde(pos, RSN_KEY_DATA_NONCE, kde->nonce, WPA_NONCE_LEN, 209 * EAPOL-Key(S=1, M=1, A=0, I=0, K=0, SM=1, KeyRSC=0, Nonce=INonce, 236 kde->nonce, WPA_NONCE_LEN); 249 NULL, kde->nonce, buf, pos - buf, 0, 1, 0); 270 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) { 272 "Nonce KDE in SMK M3"); 277 * Peer Nonce = key->key_nonce; Initiator Nonce = kde.nonce * [all...] |
/external/nist-sip/java/gov/nist/javax/sip/header/ |
AuthenticationHeader.java | 78 public static final String NONCE = ParameterNames.NONCE; 112 || name.equalsIgnoreCase(ParameterNames.NONCE) 217 * Sets the Nonce of the WWWAuthenicateHeader to the <var>nonce</var> 220 * @param nonce - 221 * the new nonce String of this WWWAuthenicateHeader. 224 * while parsing the nonce value. 227 public void setNonce(String nonce) throws ParseException { 228 if (nonce == null [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
CCMBlockCipher.java | 27 private byte[] nonce; field in class:CCMBlockCipher 72 nonce = param.getNonce(); 81 nonce = param.getIV(); 190 iv[0] = (byte)(((15 - nonce.length) - 1) & 0x7); 192 System.arraycopy(nonce, 0, iv, 1, nonce.length); 288 b0[0] |= ((15 - nonce.length) - 1) & 0x7; 290 System.arraycopy(nonce, 0, b0, 1, nonce.length);
|