HomeSort by relevance Sort by last modified time
    Searched refs:nonce (Results 26 - 50 of 231) sorted by null

12 3 4 5 6 7 8 910

  /external/chromium_org/net/quic/crypto/
crypto_utils.h 32 // Generates the connection nonce. The nonce is formed as:
39 std::string* nonce);
null_decrypter.h 24 virtual bool Decrypt(base::StringPiece nonce,
quic_decrypter.h 26 // Sets the fixed initial bytes of the nonce. Returns true on success,
29 // NOTE: The nonce prefix is the client_write_iv or server_write_iv
31 // be appended to form the nonce.
37 // Nonce format
39 // The security of the nonce format requires that QUIC never reuse a
44 // |ciphertext| into |output|, using |nonce|. |nonce| must be 8 bytes longer
45 // than the nonce prefix length returned by GetNoncePrefixSize() (of the
49 virtual bool Decrypt(base::StringPiece nonce,
58 // to form the nonce
    [all...]
aes_128_gcm_12_decrypter_nss.cc 287 bool Aes128Gcm12Decrypter::Decrypt(StringPiece nonce,
293 nonce.size() != kNoncePrefixSize + sizeof(QuicPacketSequenceNumber)) {
324 reinterpret_cast<CK_BYTE*>(const_cast<char*>(nonce.data()));
325 gcm_params.ulIvLen = nonce.size();
365 uint8 nonce[kNoncePrefixSize + sizeof(sequence_number)]; local
366 COMPILE_ASSERT(sizeof(nonce) == kAESNonceSize, bad_sequence_number_size);
367 memcpy(nonce, nonce_prefix_, kNoncePrefixSize);
368 memcpy(nonce + kNoncePrefixSize, &sequence_number, sizeof(sequence_number));
369 if (!Decrypt(StringPiece(reinterpret_cast<char*>(nonce), sizeof(nonce)),
    [all...]
aes_128_gcm_12_encrypter_nss.cc 286 bool Aes128Gcm12Encrypter::Encrypt(StringPiece nonce,
290 if (nonce.size() != kNoncePrefixSize + sizeof(QuicPacketSequenceNumber)) {
317 reinterpret_cast<CK_BYTE*>(const_cast<char*>(nonce.data()));
318 gcm_params.ulIvLen = nonce.size();
359 uint8 nonce[kNoncePrefixSize + sizeof(sequence_number)]; local
360 COMPILE_ASSERT(sizeof(nonce) == kAESNonceSize, bad_sequence_number_size);
361 memcpy(nonce, nonce_prefix_, kNoncePrefixSize);
362 memcpy(nonce + kNoncePrefixSize, &sequence_number, sizeof(sequence_number));
363 if (!Encrypt(StringPiece(reinterpret_cast<char*>(nonce), sizeof(nonce)),
    [all...]
aes_128_gcm_12_decrypter.h 28 // of the nonce is four bytes.
45 virtual bool Decrypt(base::StringPiece nonce,
59 // The nonce prefix.
aes_128_gcm_12_encrypter.h 28 // of the nonce is four bytes.
45 virtual bool Encrypt(base::StringPiece nonce,
62 // The nonce prefix.
null_encrypter.h 24 virtual bool Encrypt(base::StringPiece nonce,
quic_encrypter.h 26 // Sets the fixed initial bytes of the nonce. Returns true on success,
29 // NOTE: The nonce prefix is the client_write_iv or server_write_iv
31 // be appended to form the nonce.
37 // Nonce format
39 // The security of the nonce format requires that QUIC never reuse a
44 // both |associated_data| and |plaintext| to |output|, using |nonce| as the
45 // nonce. |nonce| must be |8+GetNoncePrefixSize()| bytes long and |output|
48 virtual bool Encrypt(base::StringPiece nonce,
56 // |nonce_prefix| value provided in SetNoncePrefix() to form the nonce
    [all...]
  /external/wpa_supplicant_8/src/crypto/
aes-eax.c 19 * @nonce: Nonce for counter mode
20 * @nonce_len: Nonce length in bytes
28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len,
53 os_memcpy(buf + 16, nonce, nonce_len);
83 * @nonce: Nonce for counter mode
84 * @nonce_len: Nonce length in bytes
92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len,
117 os_memcpy(buf + 16, nonce, nonce_len)
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/html/
HTMLScriptElement.idl 30 [Reflect, EnabledAtRuntime=experimentalContentSecurityPolicyFeatures] attribute DOMString nonce;
  /external/dropbear/libtomcrypt/src/encauth/eax/
eax_decrypt_verify_memory.c 25 @param nonce The nonce data (use once) for the session
26 @param noncelen The length of the nonce data.
39 const unsigned char *nonce, unsigned long noncelen,
73 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) {
eax_init.c 26 @param nonce The use-once nonce for the session
27 @param noncelen The length of the nonce (octets)
34 const unsigned char *nonce, unsigned long noncelen,
45 LTC_ARGCHK(nonce != NULL);
69 /* N = OMAC_0K(nonce) */
79 /* omac the nonce */
80 if ((err = omac_process(omac, nonce, noncelen)) != CRYPT_OK) {
  /external/apache-http/src/org/apache/http/impl/auth/
DigestScheme.java 98 //TODO: supply a real nonce-count, currently a server will interprete a repeated request as a replay
99 private static final String NC = "00000001"; //nonce-count is always 1
131 if (getParameter("nonce") == null) {
132 throw new MalformedChallengeException("missing nonce in challange");
264 String nonce = getParameter("nonce"); local
273 if (nonce == null) {
274 throw new IllegalStateException("Nonce may not be null");
309 // ":" unq(nonce-value)
315 StringBuilder tmp3 = new StringBuilder(tmp2.length() + nonce.length() + cnonce.length() + 2)
395 String nonce = getParameter("nonce"); local
    [all...]
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/tsp/
TSTInfoTest.java 49 BigInteger nonce = BigInteger.valueOf(1234567890L); local
61 genTime, accuracy, Boolean.FALSE, nonce, tsa, exts);
80 assertEquals("Decoded nonce is incorrect", nonce, decoded.getNonce());
  /external/nist-sip/java/javax/sip/header/
AuthorizationHeader.java 16 void setNonce(String nonce) throws ParseException;
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.h 25 const u8 *nonce; member in struct:wpa_eapol_ie_parse
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/
GCMBlockCipher.java 34 private byte[] nonce; field in class:GCMBlockCipher
96 nonce = param.getNonce();
112 nonce = param.getIV();
125 if (nonce == null || nonce.length < 1)
131 // (but must be 16 if nonce length not 12) (BLOCK_SIZE?)
150 if (nonce.length == 12)
152 System.arraycopy(nonce, 0, J0, 0, nonce.length);
157 gHASH(J0, nonce, nonce.length)
    [all...]
  /frameworks/base/core/java/android/os/storage/
StorageManager.java 86 * Next available nonce
116 public void onObbResult(String filename, int nonce, int status) {
119 delegate = mListeners.get(nonce);
121 mListeners.remove(nonce);
134 mListeners.put(delegate.nonce, delegate);
137 return delegate.nonce;
152 private final int nonce; field in class:StorageManager.ObbListenerDelegate
155 nonce = getNextNonce();
465 final int nonce = mObbActionListener.addListener(listener); local
466 mMountService.mountObb(rawPath, canonicalPath, key, mObbActionListener, nonce);
502 final int nonce = mObbActionListener.addListener(listener); local
    [all...]
  /frameworks/base/core/java/android/net/http/
RequestHandle.java 240 String nonce,
246 username, password, realm, nonce, QOP, algorithm, opaque);
299 String nonce,
314 String digest = computeDigest(A1, A2, nonce, QOP, nc, cnonce);
319 response += "nonce=" + doubleQuote(nonce) + ", ";
353 String A1, String A2, String nonce, String QOP, String nc, String cnonce) {
359 return KD(H(A1), nonce + ":" + H(A2));
362 return KD(H(A1), nonce + ":" + nc + ":" + cnonce + ":" + QOP + ":" + H(A2));
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_mac.h 112 const unsigned char *nonce, unsigned long noncelen,
122 const unsigned char *nonce, unsigned long noncelen,
130 const unsigned char *nonce, unsigned long noncelen,
156 const unsigned char *key, unsigned long keylen, const unsigned char *nonce);
173 const unsigned char *nonce,
180 const unsigned char *nonce,
204 const unsigned char *nonce, unsigned long noncelen,
  /external/chromium_org/third_party/openssl/openssl/crypto/x509v3/
v3_ocsp.c 71 static int i2r_ocsp_crlid(const X509V3_EXT_METHOD *method, void *nonce,
73 static int i2r_ocsp_acutoff(const X509V3_EXT_METHOD *method, void *nonce,
82 static int i2r_ocsp_nonce(const X509V3_EXT_METHOD *method, void *nonce,
202 /* OCSP nonce. This is needs special treatment because it doesn't have
245 static int i2r_ocsp_nonce(const X509V3_EXT_METHOD *method, void *nonce,
249 if(i2a_ASN1_STRING(out, nonce, V_ASN1_OCTET_STRING) <= 0) return 0;
  /external/dropbear/libtomcrypt/src/encauth/ccm/
ccm_memory.c 26 @param nonce The session nonce [use once]
27 @param noncelen The length of the nonce
41 const unsigned char *nonce, unsigned long noncelen,
56 LTC_ARGCHK(nonce != NULL);
95 nonce, noncelen,
114 /* increase L to match the nonce len */
141 /* form B_0 == flags | Nonce N | l(m) */
147 /* nonce */
149 PAD[x++] = nonce[y]
    [all...]
  /external/openssl/crypto/x509v3/
v3_ocsp.c 71 static int i2r_ocsp_crlid(const X509V3_EXT_METHOD *method, void *nonce,
73 static int i2r_ocsp_acutoff(const X509V3_EXT_METHOD *method, void *nonce,
82 static int i2r_ocsp_nonce(const X509V3_EXT_METHOD *method, void *nonce,
202 /* OCSP nonce. This is needs special treatment because it doesn't have
245 static int i2r_ocsp_nonce(const X509V3_EXT_METHOD *method, void *nonce,
249 if(i2a_ASN1_STRING(out, nonce, V_ASN1_OCTET_STRING) <= 0) return 0;
  /external/chromium_org/remoting/host/
token_validator_factory_impl.cc 28 // Length in bytes of the cryptographic nonce used to salt the token scope.
109 std::string nonce; local
110 bool success = base::Base64Encode(nonce_bytes, &nonce);
112 return "client:" + remote_jid + " host:" + local_jid + " nonce:" + nonce;

Completed in 597 milliseconds

12 3 4 5 6 7 8 910