/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/ |
AEADParameters.java | 9 private byte[] nonce; field in class:AEADParameters 18 * @param nonce nonce to be used 20 public AEADParameters(KeyParameter key, int macSize, byte[] nonce) 22 this(key, macSize, nonce, null); 30 * @param nonce nonce to be used 33 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText) 36 this.nonce = nonce; [all...] |
/external/chromium_org/net/quic/crypto/ |
strike_register_test.cc | 23 void SetNonce(uint8 nonce[32], unsigned time, const uint8 orbit[8]) { 24 nonce[0] = time >> 24; 25 nonce[1] = time >> 16; 26 nonce[2] = time >> 8; 27 nonce[3] = time; 28 memcpy(nonce + 4, orbit, 8); 29 memset(nonce + 12, 0, 20); 37 uint8 nonce[32]; local 38 SetNonce(nonce, 999, kOrbit); 39 ASSERT_FALSE(set.Insert(nonce, 1000)) 50 uint8 nonce[32]; local 61 uint8 nonce[32]; local 73 uint8 nonce[32]; local 83 uint8 nonce[32]; local 93 uint8 nonce[32]; local 103 uint8 nonce[6][32]; local 125 uint8 nonce[32]; local 176 string nonce; local 278 uint8 nonce[32]; local [all...] |
crypto_utils.cc | 26 string* nonce) { 28 nonce->reserve(kNonceSize); 29 nonce->resize(kNonceSize); 31 // The time in the nonce must be encoded in big-endian because the 33 (*nonce)[0] = static_cast<char>(gmt_unix_time >> 24); 34 (*nonce)[1] = static_cast<char>(gmt_unix_time >> 16); 35 (*nonce)[2] = static_cast<char>(gmt_unix_time >> 8); 36 (*nonce)[3] = static_cast<char>(gmt_unix_time); 40 memcpy(&(*nonce)[bytes_written], orbit.data(), orbit.size()); 43 random_generator->RandBytes(&(*nonce)[bytes_written] 92 StringPiece nonce = client_nonce; local [all...] |
aes_128_gcm_12_decrypter_openssl.cc | 43 // Set the IV (nonce) length. 62 bool Aes128Gcm12Decrypter::Decrypt(StringPiece nonce, 68 nonce.size() != kNoncePrefixSize + sizeof(QuicPacketSequenceNumber)) { 73 // Set the IV (nonce). 76 reinterpret_cast<const uint8*>(nonce.data())) == 0) { 130 uint8 nonce[kNoncePrefixSize + sizeof(sequence_number)]; local 131 COMPILE_ASSERT(sizeof(nonce) == kAESNonceSize, bad_sequence_number_size); 132 memcpy(nonce, nonce_prefix_, kNoncePrefixSize); 133 memcpy(nonce + kNoncePrefixSize, &sequence_number, sizeof(sequence_number)); 134 if (!Decrypt(StringPiece(reinterpret_cast<char*>(nonce), sizeof(nonce)) [all...] |
aes_128_gcm_12_encrypter_openssl.cc | 44 // Set the IV (nonce) length. 63 bool Aes128Gcm12Encrypter::Encrypt(StringPiece nonce, 67 if (nonce.size() != kNoncePrefixSize + sizeof(QuicPacketSequenceNumber)) { 71 // Set the IV (nonce). 74 reinterpret_cast<const unsigned char*>(nonce.data())) == 0) { 127 uint8 nonce[kNoncePrefixSize + sizeof(sequence_number)]; local 128 COMPILE_ASSERT(sizeof(nonce) == kAESNonceSize, bad_sequence_number_size); 129 memcpy(nonce, nonce_prefix_, kNoncePrefixSize); 130 memcpy(nonce + kNoncePrefixSize, &sequence_number, sizeof(sequence_number)); 131 if (!Encrypt(StringPiece(reinterpret_cast<char*>(nonce), sizeof(nonce)) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/modes/ |
ccm128.c | 66 memset(ctx->nonce.c,0,sizeof(ctx->nonce.c)); 67 ctx->nonce.c[0] = ((u8)(L-1)&7) | (u8)(((M-2)/2)&7)<<3; 75 /* Then you setup per-message nonce and pass the length of the message */ 77 const unsigned char *nonce,size_t nlen,size_t mlen) 79 unsigned int L = ctx->nonce.c[0]&7; /* the L parameter */ 81 if (nlen<(14-L)) return -1; /* nonce is too short */ 84 ctx->nonce.c[8] = (u8)(mlen>>(56%(sizeof(mlen)*8))); 85 ctx->nonce.c[9] = (u8)(mlen>>(48%(sizeof(mlen)*8))); 86 ctx->nonce.c[10] = (u8)(mlen>>(40%(sizeof(mlen)*8))) [all...] |
/external/openssl/crypto/modes/ |
ccm128.c | 66 memset(ctx->nonce.c,0,sizeof(ctx->nonce.c)); 67 ctx->nonce.c[0] = ((u8)(L-1)&7) | (u8)(((M-2)/2)&7)<<3; 75 /* Then you setup per-message nonce and pass the length of the message */ 77 const unsigned char *nonce,size_t nlen,size_t mlen) 79 unsigned int L = ctx->nonce.c[0]&7; /* the L parameter */ 81 if (nlen<(14-L)) return -1; /* nonce is too short */ 84 ctx->nonce.c[8] = (u8)(mlen>>(56%(sizeof(mlen)*8))); 85 ctx->nonce.c[9] = (u8)(mlen>>(48%(sizeof(mlen)*8))); 86 ctx->nonce.c[10] = (u8)(mlen>>(40%(sizeof(mlen)*8))) [all...] |
/libcore/luni/src/main/java/org/apache/harmony/security/x509/tsp/ |
TimeStampReq.java | 43 * nonce INTEGER OPTIONAL, 57 private final BigInteger nonce; field in class:TimeStampReq 66 String reqPolicy, BigInteger nonce, Boolean certReq, 71 this.nonce = nonce; 77 String reqPolicy, BigInteger nonce, Boolean certReq, 79 this (version, messageImprint, reqPolicy, nonce, certReq, extensions); 93 res.append(nonce); 135 * @return Returns the nonce. 138 return nonce; [all...] |
TSTInfo.java | 53 * nonce INTEGER OPTIONAL, 80 private final BigInteger nonce; field in class:TSTInfo 88 Boolean ordering, BigInteger nonce, GeneralName tsa, 97 this.nonce = nonce; 123 res.append(nonce); 161 * @return Returns the nonce. 164 return nonce; 254 ASN1Integer.getInstance(), // nonce 268 BigInteger nonce = (values[7] == null) ? null : new BigInteger [all...] |
/frameworks/base/libs/storage/ |
IObbActionListener.cpp | 33 virtual void onObbResult(const String16& filename, const int32_t nonce, const int32_t state) { } 47 int32_t nonce = data.readInt32(); local 49 onObbResult(filename, nonce, state);
|
/frameworks/base/core/java/android/os/storage/ |
IObbActionListener.java | 72 int nonce; local 73 nonce = data.readInt(); 76 this.onObbResult(filename, nonce, status); 106 public void onObbResult(String filename, int nonce, int status) 113 _data.writeInt(nonce); 132 * @param nonce identifier that is meaningful to the receiver 135 public void onObbResult(String filename, int nonce, int status) throws RemoteException;
|
/external/srtp/crypto/test/ |
stat_driver.c | 46 v128_t nonce; local 74 err_check(cipher_set_iv(c, &nonce)); 84 v128_set_to_zero(&nonce); 88 nonce.v32[3] = i; 89 err_check(cipher_set_iv(c, &nonce));
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_encrypt_authenticate_memory.c | 25 @param nonce The session nonce [use once] 26 @param noncelen The length of the nonce 38 const unsigned char *nonce, unsigned long noncelen, 55 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) {
|
/external/openssh/ |
umac.h | 68 int umac_final(struct umac_ctx *ctx, u_char tag[], u_char nonce[8]); 79 u_char nonce[8]);
|
/external/wpa_supplicant_8/src/crypto/ |
aes-ctr.c | 19 * @nonce: Nonce for counter mode (16 bytes) 24 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, 36 os_memcpy(counter, nonce, AES_BLOCK_SIZE);
|
aes_wrap.h | 29 int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, 32 const u8 *nonce, size_t nonce_len, 36 const u8 *nonce, size_t nonce_len, 56 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, 59 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
|
aes-ccm.c | 28 static void aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, 36 /* B_0: Flags | Nonce N | l(m) */ 40 os_memcpy(&b[1], nonce, 15 - L); 84 static void aes_ccm_encr_start(size_t L, const u8 *nonce, u8 *a) 86 /* A_i = Flags | Nonce N | Counter i */ 88 os_memcpy(&a[1], nonce, 15 - L); 148 int aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); 167 aes_ccm_encr_start(L, nonce, a); 178 int aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, [all...] |
/frameworks/base/include/storage/ |
IObbActionListener.h | 32 virtual void onObbResult(const String16& filename, const int32_t nonce, const int32_t state) = 0;
|
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
ocb_decrypt_verify_memory.c | 25 @param nonce The session nonce (length of the block size of the block cipher) 36 const unsigned char *nonce, 46 LTC_ARGCHK(nonce != NULL); 58 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) {
|
ocb_encrypt_authenticate_memory.c | 25 @param nonce The session nonce (length of the block ciphers block size) 35 const unsigned char *nonce, 44 LTC_ARGCHK(nonce != NULL); 56 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) {
|
/external/chromium_org/third_party/sqlite/src/tool/ |
restore_jrnl.tcl | 73 # Calc checksum nonce from journal page data. 80 set nonce [hexio_get_int [hexio_read $jrnl_name [expr $jrnl_pg_offset+4+$db_pgsz] 4]] 83 set nonce [expr $nonce-$byte] 85 return $nonce 94 global nonce 96 set chksum $nonce 116 set nonce [calc_nonce $jrnl_pgno] 120 puts [ format {nonce: %08x chksum: %08x} \
121 $nonce $chksum] [all...] |
/frameworks/base/native/android/ |
storage_manager.cpp | 44 virtual void onObbResult(const android::String16& filename, const int32_t nonce, 51 : nonce(_nonce) 56 int32_t nonce; member in class:ObbCallback 105 void fireCallback(const char* filename, const int32_t nonce, const int32_t state) { 112 if (cb->nonce == nonce) { 141 mMountService->mountObb(rawPath16, canonicalPath16, key16, mObbActionListener, cb->nonce); 147 mMountService->unmountObb(filename16, force, mObbActionListener, cb->nonce); 166 void ObbActionListener::onObbResult(const android::String16& filename, const int32_t nonce, const int32_t state) { 167 mStorageManager->fireCallback(String8(filename).string(), nonce, state) [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/tsp/ |
TimeStampReqTest.java | 43 BigInteger nonce = BigInteger.valueOf(1234567890L); local 51 nonce, Boolean.FALSE, exts); 62 assertEquals("Decoded nonce is incorrect", nonce, decoded.getNonce());
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
CCMBlockCipher.java | 27 private byte[] nonce; field in class:CCMBlockCipher 72 nonce = param.getNonce(); 81 nonce = param.getIV(); 91 if (nonce == null || nonce.length < 7 || nonce.length > 13) 93 throw new IllegalArgumentException("nonce must have length from 7 to 13 octets"); 191 int n = nonce.length; 204 System.arraycopy(nonce, 0, iv, 1, nonce.length) [all...] |
/frameworks/base/obex/javax/obex/ |
ClientSession.java | 84 if (header.nonce != null) { 86 System.arraycopy(header.nonce, 0, mChallengeDigest, 0, 16); 150 if (head.nonce != null) { 152 System.arraycopy(head.nonce, 0, mChallengeDigest, 0, 16); 194 if (header.nonce != null) { 196 System.arraycopy(header.nonce, 0, mChallengeDigest, 0, 16); 259 if (head.nonce != null) { 261 System.arraycopy(head.nonce, 0, mChallengeDigest, 0, 16); 296 if (headset.nonce != null) { 298 System.arraycopy(headset.nonce, 0, mChallengeDigest, 0, 16) [all...] |