HomeSort by relevance Sort by last modified time
    Searched defs:nonce (Results 1 - 25 of 55) sorted by null

1 2 3

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/
GCMParameters.java 18 aes-nonce OCTET STRING, -- recommended size is 12 octets
25 private byte[] nonce; field in class:GCMParameters
59 this.nonce = ASN1OctetString.getInstance(seq.getObjectAt(0)).getOctets();
72 byte[] nonce,
75 this.nonce = Arrays.clone(nonce);
81 return Arrays.clone(nonce);
93 v.add(new DEROctetString(nonce));
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/
AEADParameters.java 9 private byte[] nonce; field in class:AEADParameters
18 * @param nonce nonce to be used
20 public AEADParameters(KeyParameter key, int macSize, byte[] nonce)
22 this(key, macSize, nonce, null);
30 * @param nonce nonce to be used
33 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText)
36 this.nonce = nonce;
    [all...]
  /external/chromium_org/chrome/browser/chromeos/settings/
token_encryptor.cc 83 std::string nonce = salt.substr(0, kNonceSize); local
85 CHECK(encryptor.SetCounter(nonce));
115 std::string nonce = salt.substr(0, kNonceSize); local
117 CHECK(encryptor.SetCounter(nonce));
  /external/chromium_org/components/rappor/
byte_vector_utils_unittest.cc 82 const char nonce[] = "659ba96c601dc69fc902940805ec0ca8"; local
89 std::string entropy_input = HexToString(entropy) + HexToString(nonce);
  /external/chromium_org/net/quic/crypto/
aead_base_decrypter_openssl.cc 79 bool AeadBaseDecrypter::Decrypt(StringPiece nonce,
85 nonce.size() != nonce_prefix_size_ + sizeof(QuicPacketSequenceNumber)) {
91 reinterpret_cast<const uint8_t*>(nonce.data()), nonce.size(),
114 uint8 nonce[sizeof(nonce_prefix_) + sizeof(sequence_number)]; local
116 DCHECK_LE(nonce_size, sizeof(nonce));
117 memcpy(nonce, nonce_prefix_, nonce_prefix_size_);
118 memcpy(nonce + nonce_prefix_size_, &sequence_number, sizeof(sequence_number));
119 if (!Decrypt(StringPiece(reinterpret_cast<char*>(nonce), nonce_size),
crypto_secret_boxer.cc 22 // kBoxNonceSize contains the number of bytes of nonce that we use in each box.
56 // Generate nonce.
77 char nonce[kBoxNonceSize]; local
78 memcpy(nonce, ciphertext.data(), kBoxNonceSize);
90 if (!decrypter->Decrypt(StringPiece(nonce, kBoxNonceSize), StringPiece(),
aead_base_decrypter_nss.cc 50 bool AeadBaseDecrypter::Decrypt(StringPiece nonce,
56 nonce.size() != nonce_prefix_size_ + sizeof(QuicPacketSequenceNumber)) {
95 FillAeadParams(nonce, associated_data, auth_tag_size_, &aead_params);
128 uint8 nonce[sizeof(nonce_prefix_) + sizeof(sequence_number)]; local
130 DCHECK_LE(nonce_size, sizeof(nonce));
131 memcpy(nonce, nonce_prefix_, nonce_prefix_size_);
132 memcpy(nonce + nonce_prefix_size_, &sequence_number, sizeof(sequence_number));
133 if (!Decrypt(StringPiece(reinterpret_cast<char*>(nonce), nonce_size),
aead_base_encrypter_openssl.cc 76 bool AeadBaseEncrypter::Encrypt(StringPiece nonce,
80 if (nonce.size() != nonce_prefix_size_ + sizeof(QuicPacketSequenceNumber)) {
90 reinterpret_cast<const uint8_t*>(nonce.data()),
91 nonce.size(),
112 uint8 nonce[sizeof(nonce_prefix_) + sizeof(sequence_number)]; local
114 DCHECK_LE(nonce_size, sizeof(nonce));
115 memcpy(nonce, nonce_prefix_, nonce_prefix_size_);
116 memcpy(nonce + nonce_prefix_size_, &sequence_number, sizeof(sequence_number));
117 if (!Encrypt(StringPiece(reinterpret_cast<char*>(nonce), nonce_size),
crypto_utils.cc 27 string* nonce) {
29 nonce->reserve(kNonceSize);
30 nonce->resize(kNonceSize);
32 // The time in the nonce must be encoded in big-endian because the
34 (*nonce)[0] = static_cast<char>(gmt_unix_time >> 24);
35 (*nonce)[1] = static_cast<char>(gmt_unix_time >> 16);
36 (*nonce)[2] = static_cast<char>(gmt_unix_time >> 8);
37 (*nonce)[3] = static_cast<char>(gmt_unix_time);
41 memcpy(&(*nonce)[bytes_written], orbit.data(), orbit.size());
44 random_generator->RandBytes(&(*nonce)[bytes_written]
96 StringPiece nonce = client_nonce; local
    [all...]
aead_base_encrypter_nss.cc 50 bool AeadBaseEncrypter::Encrypt(StringPiece nonce,
54 if (nonce.size() != nonce_prefix_size_ + sizeof(QuicPacketSequenceNumber)) {
89 FillAeadParams(nonce, associated_data, auth_tag_size_, &aead_params);
122 uint8 nonce[sizeof(nonce_prefix_) + sizeof(sequence_number)]; local
124 DCHECK_LE(nonce_size, sizeof(nonce));
125 memcpy(nonce, nonce_prefix_, nonce_prefix_size_);
126 memcpy(nonce + nonce_prefix_size_, &sequence_number, sizeof(sequence_number));
127 if (!Encrypt(StringPiece(reinterpret_cast<char*>(nonce), nonce_size),
strike_register_test.cc 28 void SetNonce(uint8 nonce[32], unsigned time, const uint8 orbit[8]) {
29 nonce[0] = time >> 24;
30 nonce[1] = time >> 16;
31 nonce[2] = time >> 8;
32 nonce[3] = time;
33 memcpy(nonce + 4, orbit, 8);
34 memset(nonce + 12, 0, 20);
42 uint8 nonce[32]; local
43 SetNonce(nonce, 999, kOrbit);
44 EXPECT_EQ(net::NONCE_INVALID_TIME_FAILURE, set.Insert(nonce, 1000))
62 uint8 nonce[32]; local
79 uint8 nonce[32]; local
91 uint8 nonce[32]; local
101 uint8 nonce[32]; local
111 uint8 nonce[32]; local
127 uint8 nonce[6][32]; local
176 uint8 nonce[32]; local
235 pair<uint32, string> nonce = make_pair( local
310 uint8 nonce[32]; local
380 uint8 nonce[32]; local
    [all...]
  /external/chromium_org/net/quic/test_tools/
delayed_verify_strike_register_client.h 17 // Test helper that allows delaying execution of nonce verification
28 virtual void VerifyNonceIsValidAndUnique(base::StringPiece nonce,
46 : nonce(in_nonce.as_string()),
51 std::string nonce; member in struct:net::test::DelayedVerifyStrikeRegisterClient::VerifyArgs
  /external/chromium_org/remoting/host/
token_validator_factory_impl.cc 30 // Length in bytes of the cryptographic nonce used to salt the token scope.
103 std::string nonce; local
104 base::Base64Encode(nonce_bytes, &nonce);
105 return "client:" + remote_jid + " host:" + local_jid + " nonce:" + nonce;
  /external/chromium_org/third_party/libsrtp/srtp/crypto/test/
stat_driver.c 83 v128_t nonce; local
111 err_check(cipher_set_iv(c, &nonce));
121 v128_set_to_zero(&nonce);
125 nonce.v32[3] = i;
126 err_check(cipher_set_iv(c, &nonce));
145 err_check(cipher_set_iv(c, &nonce));
155 v128_set_to_zero(&nonce);
159 nonce.v32[3] = i;
160 err_check(cipher_set_iv(c, &nonce));
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/tsp/
TimeStampReqTest.java 43 BigInteger nonce = BigInteger.valueOf(1234567890L); local
51 nonce, Boolean.FALSE, exts);
62 assertEquals("Decoded nonce is incorrect", nonce, decoded.getNonce());
TSTInfoTest.java 49 BigInteger nonce = BigInteger.valueOf(1234567890L); local
61 genTime, accuracy, Boolean.FALSE, nonce, tsa, exts);
80 assertEquals("Decoded nonce is incorrect", nonce, decoded.getNonce());
TimeStampRespTest.java 64 BigInteger nonce = BigInteger.valueOf(1234567890L); local
77 genTime, accuracy, Boolean.FALSE, nonce, tsa, exts);
  /external/google-tv-pairing-protocol/cpp/tests/polo/pairing/
polochallengeresponsetest.cc 26 PoloChallengeResponseTest() : nonce(4) { }
76 nonce[0] = 0x1;
77 nonce[1] = 0x2;
78 nonce[2] = 0x3;
79 nonce[3] = 0x4;
98 Nonce nonce; member in class:polo::pairing::PoloChallengeResponseTest
103 const Alpha* alpha = response->GetAlpha(nonce);
112 const Gamma* gamma = response->GetGamma(nonce);
121 const Gamma* gamma = response->GetGamma(nonce);
    [all...]
  /external/chromium_org/chromeos/dbus/
shill_manager_client.h 113 std::string nonce; member in struct:chromeos::ShillManagerClient::VerificationProperties
  /external/chromium_org/third_party/libsrtp/srtp/crypto/cipher/
cipher.c 395 v128_t nonce; local
405 v128_set_to_zero(&nonce);
407 for(i=0; i < num_trials; i++, nonce.v32[3] = i) {
408 cipher_set_iv(c, &nonce);
aes_icm.c 64 * | nonce | pakcet index | ctr |---+
86 * nonce can be distinct across many uses of the same key, or
275 v128_t *nonce = (v128_t *) iv; local
278 "setting iv: %s", v128_hex_string(nonce));
280 v128_xor(&c->counter, &c->offset, nonce);
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/
polochallengeresponse.cc 32 Alpha* PoloChallengeResponse::GetAlpha(const Nonce& nonce) const {
54 // modulus and exponent are concatenated along with the random nonce then a
64 + nonce.size();
81 memcpy(pos, &nonce[0], nonce.size());
96 Gamma* PoloChallengeResponse::GetGamma(const Nonce& nonce) const {
97 const Alpha* alpha = GetAlpha(nonce);
102 Gamma* gamma = new Gamma(nonce.size() * 2)
118 Nonce* nonce = new Nonce(gamma.size() \/ 2); local
125 const Nonce* nonce = ExtractNonce(gamma); local
    [all...]
  /external/chromium_org/third_party/boringssl/src/crypto/modes/
gcm_test.c 63 const char *nonce; member in struct:test_case
233 /* This nonce results in 0xfff in counter LSB. */
317 *nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL; local
327 !decode_hex(&nonce, &nonce_len, test->nonce, test_num, "nonce") ||
357 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len);
373 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len);
402 if (nonce) {
403 OPENSSL_free(nonce);
    [all...]
internal.h 182 } nonce, cmac; member in struct:ccm128_context
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
turnport.h 119 const std::string& nonce() const { return nonce_; } function in class:cricket::TurnPort
176 void set_nonce(const std::string& nonce) { nonce_ = nonce; }

Completed in 801 milliseconds

1 2 3