HomeSort by relevance Sort by last modified time
    Searched refs:nonce (Results 176 - 200 of 231) sorted by null

1 2 3 4 5 6 78 910

  /frameworks/base/services/java/com/android/server/
MountService.java 246 IObbActionListener token, int nonce) {
256 this.nonce = nonce;
270 final int nonce; field in class:MountService.ObbState
    [all...]
  /external/chromium/net/tools/testserver/
testserver.py 937 """Returns a nonce that's stable per request path for the server's lifetime.
940 nonce a single time (hence the name n-once). However, for the purposes of
941 unittesting, we don't care about the security of the nonce.
944 force_reset: Iff set, the nonce will be changed. Useful for testing the
963 nonce = self.GetNonce(force_reset=stale)
979 if pairs['nonce'] != nonce:
980 raise Exception('wrong nonce')
990 response = _new_md5(':'.join([hash_a1, nonce, pairs['nc'],
993 response = _new_md5(':'.join([hash_a1, nonce, hash_a2])).hexdigest(
    [all...]
  /external/ipsec-tools/src/racoon/
isakmp_ident.c 374 /* generate NONCE value */
375 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
376 if (iph1->nonce == NULL)
1275 /* generate NONCE value */
1276 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
1277 if (iph1->nonce == NULL)
1285 /* create HDR;KE;NONCE payload */
    [all...]
oakley.c 492 + iph2->nonce->l
517 bp = (side == INITIATOR ? iph2->nonce : iph2->nonce_p);
521 bp = (side == INITIATOR ? iph2->nonce_p : iph2->nonce);
1021 len = iph1->nonce->l + iph1->nonce_p->l;
1030 bp = (sw == GENERATE ? iph1->nonce_p : iph1->nonce);
1034 bp = (sw == GENERATE ? iph1->nonce : iph1->nonce_p);
1151 len = iph1->nonce->l + iph1->nonce_p->l;
1160 bp = (sw == GENERATE ? iph1->nonce_p : iph1->nonce);
1164 bp = (sw == GENERATE ? iph1->nonce : iph1->nonce_p);
    [all...]
handler.c 339 VPTRINIT(iph1->nonce);
636 VPTRINIT(iph2->nonce);
  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 54 u8 Anonce[WPA_NONCE_LEN]; /* Responder Nonce in TDLS */
55 u8 Snonce[WPA_NONCE_LEN]; /* Initiator Nonce in TDLS */
96 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */
97 u8 rnonce[WPA_NONCE_LEN]; /* Responder Nonce */
371 const u8 *nonce[2]; local
381 nonce[0] = peer->inonce;
382 nonce[1] = peer->rnonce;
384 nonce[0] = peer->rnonce;
385 nonce[1] = peer->inonce;
387 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN)
    [all...]
wpa_i.h 306 int ver, const u8 *nonce,
peerkey.c 133 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */
163 /* Initiator Nonce */
287 * @pnonce: Peer Nonce
289 * @inonce: Initiator Nonce
447 if (os_memcmp(kde->nonce, peerkey->inonce, WPA_NONCE_LEN) != 0) {
477 wpa_printf(MSG_INFO, "RSN: Key Nonce in SMK M5 does "
491 os_memcpy(peerkey->pnonce, kde->nonce, WPA_NONCE_LEN);
534 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN ||
537 wpa_printf(MSG_INFO, "RSN: No MAC Address, Nonce, SMK, or "
1035 * EAPOL-Key(S=1, M=1, A=0, I=0, K=0, SM=1, KeyRSC=0, Nonce=INonce
    [all...]
wpa_ie.c 311 ie->nonce = pos + 2 + RSN_SELECTOR_LEN;
313 wpa_hexdump(MSG_DEBUG, "WPA: Nonce in EAPOL-Key",
  /bionic/libc/kernel/common/linux/usb/
ch9.h 470 __u8 nonce[16]; member in struct:usb_handshake
  /external/srtp/srtp/
srtp.c 330 v128_t nonce; local
332 /* set eigth octet of nonce to <label>, set the rest of it to zero */
333 v128_set_to_zero(&nonce);
334 nonce.v8[7] = label;
336 aes_icm_set_iv(&kdf->c, &nonce);
740 * if we're using rindael counter mode, set nonce and seq
    [all...]
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/usb/
ch9.h 530 __u8 nonce[16]; member in struct:usb_handshake
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/usb/
ch9.h 530 __u8 nonce[16]; member in struct:usb_handshake
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/usb/
ch9.h 530 __u8 nonce[16]; member in struct:usb_handshake
  /external/chromium_org/net/quic/crypto/
crypto_handshake.cc 819 StringPiece nonce; local
820 if (rej.GetStringPiece(kServerNonceTag, &nonce)) {
821 out_params->server_nonce = nonce.as_string();
  /frameworks/base/obex/javax/obex/
ObexHelper.java     [all...]
  /external/kernel-headers/original/linux/usb/
ch9.h 867 __u8 nonce[16]; member in struct:usb_handshake
  /external/wpa_supplicant_8/wpa_supplicant/examples/
wps-nfc.py 192 message.nonce = random.randint(0, 0xffff)
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/
Phone.java     [all...]
PhoneProxy.java     [all...]
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/sip/
SipCommandInterface.java 540 public void requestIsimAuthentication(String nonce, Message response) {
  /external/bluetooth/bluedroid/stack/include/
obx_api.h 62 #define OBX_SESSION_INFO_SIZE 32 /* OBX_SESSION_ID_SIZE + 4(local nonce) + 4 (connection id) + 4 (timeout) + 2(mtu) + 1(state) + 1(srm) */
63 #define OBX_SESSION_INFO_NONCE_IDX 16 /* The index to the (local nonce) in session info */
176 UINT8 *p_sess_info; /* The session ID and the local nonce for a reliable session, a reference to the location in OBEX control block or NULL */
454 UINT32 nonce; /* This is converted to UINT8[16] internally before adding to the OBEX header. This value is copied to the server control block and is increased after each use. 0, if only legacy OBEX (unreliable) session is desired. */ member in struct:__anon3850
456 UINT8 max_suspend; /* Max number of suspended session. must be less than OBX_MAX_SUSPEND_SESSIONS. ignored, if nonce is 0 */
    [all...]
  /external/chromium_org/net/tools/testserver/
testserver.py     [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth.c 805 wpa_hexdump(MSG_DEBUG, "WPA: Received Key Nonce", key->key_nonce,
    [all...]
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
stun_unittest.cc 414 0x00, 0x15, 0x00, 0x1c, // NONCE attribute header
418 0x4f, 0x4c, 0x33, 0x34, // } Nonce value
726 const StunByteStringAttribute* nonce = local
728 ASSERT_TRUE(nonce != NULL);
729 EXPECT_EQ(kRfc5769SampleMsgWithAuthNonce, nonce->GetString());
    [all...]

Completed in 1921 milliseconds

1 2 3 4 5 6 78 910