/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
GCMParameters.java | 18 aes-nonce OCTET STRING, -- recommended size is 12 octets 25 private byte[] nonce; field in class:GCMParameters 59 this.nonce = ASN1OctetString.getInstance(seq.getObjectAt(0)).getOctets(); 72 byte[] nonce, 75 this.nonce = Arrays.clone(nonce); 81 return Arrays.clone(nonce); 93 v.add(new DEROctetString(nonce));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/ |
AEADParameters.java | 9 private byte[] nonce; field in class:AEADParameters 18 * @param nonce nonce to be used 20 public AEADParameters(KeyParameter key, int macSize, byte[] nonce) 22 this(key, macSize, nonce, null); 30 * @param nonce nonce to be used 33 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText) 36 this.nonce = nonce; [all...] |
/external/chromium_org/chrome/browser/chromeos/settings/ |
token_encryptor.cc | 83 std::string nonce = salt.substr(0, kNonceSize); local 85 CHECK(encryptor.SetCounter(nonce)); 115 std::string nonce = salt.substr(0, kNonceSize); local 117 CHECK(encryptor.SetCounter(nonce));
|
/external/chromium_org/components/rappor/ |
byte_vector_utils_unittest.cc | 82 const char nonce[] = "659ba96c601dc69fc902940805ec0ca8"; local 89 std::string entropy_input = HexToString(entropy) + HexToString(nonce);
|
/external/chromium_org/net/quic/crypto/ |
aead_base_decrypter_openssl.cc | 79 bool AeadBaseDecrypter::Decrypt(StringPiece nonce, 85 nonce.size() != nonce_prefix_size_ + sizeof(QuicPacketSequenceNumber)) { 91 reinterpret_cast<const uint8_t*>(nonce.data()), nonce.size(), 114 uint8 nonce[sizeof(nonce_prefix_) + sizeof(sequence_number)]; local 116 DCHECK_LE(nonce_size, sizeof(nonce)); 117 memcpy(nonce, nonce_prefix_, nonce_prefix_size_); 118 memcpy(nonce + nonce_prefix_size_, &sequence_number, sizeof(sequence_number)); 119 if (!Decrypt(StringPiece(reinterpret_cast<char*>(nonce), nonce_size),
|
crypto_secret_boxer.cc | 22 // kBoxNonceSize contains the number of bytes of nonce that we use in each box. 56 // Generate nonce. 77 char nonce[kBoxNonceSize]; local 78 memcpy(nonce, ciphertext.data(), kBoxNonceSize); 90 if (!decrypter->Decrypt(StringPiece(nonce, kBoxNonceSize), StringPiece(),
|
aead_base_decrypter_nss.cc | 50 bool AeadBaseDecrypter::Decrypt(StringPiece nonce, 56 nonce.size() != nonce_prefix_size_ + sizeof(QuicPacketSequenceNumber)) { 95 FillAeadParams(nonce, associated_data, auth_tag_size_, &aead_params); 128 uint8 nonce[sizeof(nonce_prefix_) + sizeof(sequence_number)]; local 130 DCHECK_LE(nonce_size, sizeof(nonce)); 131 memcpy(nonce, nonce_prefix_, nonce_prefix_size_); 132 memcpy(nonce + nonce_prefix_size_, &sequence_number, sizeof(sequence_number)); 133 if (!Decrypt(StringPiece(reinterpret_cast<char*>(nonce), nonce_size),
|
aead_base_encrypter_openssl.cc | 76 bool AeadBaseEncrypter::Encrypt(StringPiece nonce, 80 if (nonce.size() != nonce_prefix_size_ + sizeof(QuicPacketSequenceNumber)) { 90 reinterpret_cast<const uint8_t*>(nonce.data()), 91 nonce.size(), 112 uint8 nonce[sizeof(nonce_prefix_) + sizeof(sequence_number)]; local 114 DCHECK_LE(nonce_size, sizeof(nonce)); 115 memcpy(nonce, nonce_prefix_, nonce_prefix_size_); 116 memcpy(nonce + nonce_prefix_size_, &sequence_number, sizeof(sequence_number)); 117 if (!Encrypt(StringPiece(reinterpret_cast<char*>(nonce), nonce_size),
|
crypto_utils.cc | 27 string* nonce) { 29 nonce->reserve(kNonceSize); 30 nonce->resize(kNonceSize); 32 // The time in the nonce must be encoded in big-endian because the 34 (*nonce)[0] = static_cast<char>(gmt_unix_time >> 24); 35 (*nonce)[1] = static_cast<char>(gmt_unix_time >> 16); 36 (*nonce)[2] = static_cast<char>(gmt_unix_time >> 8); 37 (*nonce)[3] = static_cast<char>(gmt_unix_time); 41 memcpy(&(*nonce)[bytes_written], orbit.data(), orbit.size()); 44 random_generator->RandBytes(&(*nonce)[bytes_written] 96 StringPiece nonce = client_nonce; local [all...] |
aead_base_encrypter_nss.cc | 50 bool AeadBaseEncrypter::Encrypt(StringPiece nonce, 54 if (nonce.size() != nonce_prefix_size_ + sizeof(QuicPacketSequenceNumber)) { 89 FillAeadParams(nonce, associated_data, auth_tag_size_, &aead_params); 122 uint8 nonce[sizeof(nonce_prefix_) + sizeof(sequence_number)]; local 124 DCHECK_LE(nonce_size, sizeof(nonce)); 125 memcpy(nonce, nonce_prefix_, nonce_prefix_size_); 126 memcpy(nonce + nonce_prefix_size_, &sequence_number, sizeof(sequence_number)); 127 if (!Encrypt(StringPiece(reinterpret_cast<char*>(nonce), nonce_size),
|
strike_register_test.cc | 28 void SetNonce(uint8 nonce[32], unsigned time, const uint8 orbit[8]) { 29 nonce[0] = time >> 24; 30 nonce[1] = time >> 16; 31 nonce[2] = time >> 8; 32 nonce[3] = time; 33 memcpy(nonce + 4, orbit, 8); 34 memset(nonce + 12, 0, 20); 42 uint8 nonce[32]; local 43 SetNonce(nonce, 999, kOrbit); 44 EXPECT_EQ(net::NONCE_INVALID_TIME_FAILURE, set.Insert(nonce, 1000)) 62 uint8 nonce[32]; local 79 uint8 nonce[32]; local 91 uint8 nonce[32]; local 101 uint8 nonce[32]; local 111 uint8 nonce[32]; local 127 uint8 nonce[6][32]; local 176 uint8 nonce[32]; local 235 pair<uint32, string> nonce = make_pair( local 310 uint8 nonce[32]; local 380 uint8 nonce[32]; local [all...] |
/external/chromium_org/net/quic/test_tools/ |
delayed_verify_strike_register_client.h | 17 // Test helper that allows delaying execution of nonce verification 28 virtual void VerifyNonceIsValidAndUnique(base::StringPiece nonce, 46 : nonce(in_nonce.as_string()), 51 std::string nonce; member in struct:net::test::DelayedVerifyStrikeRegisterClient::VerifyArgs
|
/external/chromium_org/remoting/host/ |
token_validator_factory_impl.cc | 30 // Length in bytes of the cryptographic nonce used to salt the token scope. 103 std::string nonce; local 104 base::Base64Encode(nonce_bytes, &nonce); 105 return "client:" + remote_jid + " host:" + local_jid + " nonce:" + nonce;
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/test/ |
stat_driver.c | 83 v128_t nonce; local 111 err_check(cipher_set_iv(c, &nonce)); 121 v128_set_to_zero(&nonce); 125 nonce.v32[3] = i; 126 err_check(cipher_set_iv(c, &nonce)); 145 err_check(cipher_set_iv(c, &nonce)); 155 v128_set_to_zero(&nonce); 159 nonce.v32[3] = i; 160 err_check(cipher_set_iv(c, &nonce));
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/tsp/ |
TimeStampReqTest.java | 43 BigInteger nonce = BigInteger.valueOf(1234567890L); local 51 nonce, Boolean.FALSE, exts); 62 assertEquals("Decoded nonce is incorrect", nonce, decoded.getNonce());
|
TSTInfoTest.java | 49 BigInteger nonce = BigInteger.valueOf(1234567890L); local 61 genTime, accuracy, Boolean.FALSE, nonce, tsa, exts); 80 assertEquals("Decoded nonce is incorrect", nonce, decoded.getNonce());
|
TimeStampRespTest.java | 64 BigInteger nonce = BigInteger.valueOf(1234567890L); local 77 genTime, accuracy, Boolean.FALSE, nonce, tsa, exts);
|
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/ |
polochallengeresponsetest.cc | 26 PoloChallengeResponseTest() : nonce(4) { } 76 nonce[0] = 0x1; 77 nonce[1] = 0x2; 78 nonce[2] = 0x3; 79 nonce[3] = 0x4; 98 Nonce nonce; member in class:polo::pairing::PoloChallengeResponseTest 103 const Alpha* alpha = response->GetAlpha(nonce); 112 const Gamma* gamma = response->GetGamma(nonce); 121 const Gamma* gamma = response->GetGamma(nonce); [all...] |
/external/chromium_org/chromeos/dbus/ |
shill_manager_client.h | 113 std::string nonce; member in struct:chromeos::ShillManagerClient::VerificationProperties
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/cipher/ |
cipher.c | 395 v128_t nonce; local 405 v128_set_to_zero(&nonce); 407 for(i=0; i < num_trials; i++, nonce.v32[3] = i) { 408 cipher_set_iv(c, &nonce);
|
aes_icm.c | 64 * | nonce | pakcet index | ctr |---+ 86 * nonce can be distinct across many uses of the same key, or 275 v128_t *nonce = (v128_t *) iv; local 278 "setting iv: %s", v128_hex_string(nonce)); 280 v128_xor(&c->counter, &c->offset, nonce);
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
polochallengeresponse.cc | 32 Alpha* PoloChallengeResponse::GetAlpha(const Nonce& nonce) const { 54 // modulus and exponent are concatenated along with the random nonce then a 64 + nonce.size(); 81 memcpy(pos, &nonce[0], nonce.size()); 96 Gamma* PoloChallengeResponse::GetGamma(const Nonce& nonce) const { 97 const Alpha* alpha = GetAlpha(nonce); 102 Gamma* gamma = new Gamma(nonce.size() * 2) 118 Nonce* nonce = new Nonce(gamma.size() \/ 2); local 125 const Nonce* nonce = ExtractNonce(gamma); local [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/modes/ |
gcm_test.c | 63 const char *nonce; member in struct:test_case 233 /* This nonce results in 0xfff in counter LSB. */ 317 *nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL; local 327 !decode_hex(&nonce, &nonce_len, test->nonce, test_num, "nonce") || 357 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len); 373 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len); 402 if (nonce) { 403 OPENSSL_free(nonce); [all...] |
internal.h | 182 } nonce, cmac; member in struct:ccm128_context
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
turnport.h | 119 const std::string& nonce() const { return nonce_; } function in class:cricket::TurnPort 176 void set_nonce(const std::string& nonce) { nonce_ = nonce; }
|