/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
pairingsession.h | 160 // Gets the nonce value. 161 const Nonce* nonce() const { return nonce_; } function in class:polo::pairing::PairingSession 193 Nonce* nonce_;
|
/cts/tests/tests/jni/src/android/jni/cts/ |
JniStaticTest.java | 21 * Basic static method tests. The "nonce" class being tested by this 142 StaticNonce nonce = StaticNonce.returnInstance(); local 143 assertSame(StaticNonce.class, nonce.getClass());
|
/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 103 //TODO: supply a real nonce-count, currently a server will interprete a repeated request as a replay 104 private static final String NC = "00000001"; //nonce-count is always 1 136 if (getParameter("nonce") == null) { 137 throw new MalformedChallengeException("missing nonce in challange"); 269 String nonce = getParameter("nonce"); local 278 if (nonce == null) { 279 throw new IllegalStateException("Nonce may not be null"); 314 // ":" unq(nonce-value) 320 StringBuilder tmp3 = new StringBuilder(tmp2.length() + nonce.length() + cnonce.length() + 2) 400 String nonce = getParameter("nonce"); local [all...] |
/external/chromium_org/third_party/WebKit/Source/core/frame/csp/ |
CSPSourceList.cpp | 74 bool CSPSourceList::allowNonce(const String& nonce) const 76 return !nonce.isNull() && m_nonces.contains(nonce); 165 String nonce; local 166 if (!parseNonce(begin, end, nonce)) 169 if (!nonce.isNull()) { 170 addSourceNonce(nonce); 258 // nonce-source = "'nonce-" nonce-value "' [all...] |
/external/chromium_org/third_party/libsrtp/srtp/crypto/test/ |
cipher_driver.c | 459 v128_t nonce; local 471 v128_set_to_zero(&nonce); 473 for(i=0; i < num_trials; i++, nonce.v32[3] = i) { 479 cipher_set_iv(cipher_array[cipher_index], &nonce);
|
/external/openssl/crypto/modes/ |
modes_lcl.h | 123 union { u64 u[2]; u8 c[16]; } nonce, cmac; member in struct:ccm128_context
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
CCMBlockCipher.java | 27 private byte[] nonce; field in class:CCMBlockCipher 73 nonce = param.getNonce(); 82 nonce = param.getIV(); 98 if (nonce == null || nonce.length < 7 || nonce.length > 13) 100 throw new IllegalArgumentException("nonce must have length from 7 to 13 octets"); 243 int n = nonce.length; 256 System.arraycopy(nonce, 0, iv, 1, nonce.length) [all...] |
GCMBlockCipher.java | 34 private byte[] nonce; field in class:GCMBlockCipher 96 nonce = param.getNonce(); 112 nonce = param.getIV(); 125 if (nonce == null || nonce.length < 1) 131 // (but must be 16 if nonce length not 12) (BLOCK_SIZE?) 150 if (nonce.length == 12) 152 System.arraycopy(nonce, 0, J0, 0, nonce.length); 157 gHASH(J0, nonce, nonce.length) [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/chacha/ |
chacha_vec.c | 146 const uint8_t nonce[8], 155 __attribute__ ((aligned (16))) unsigned key[8], nonce[4]; local 164 nonce[0] = REVW_BE(((unsigned *)nonce)[0]); 165 nonce[1] = REVW_BE(((unsigned *)nonce)[1]); 166 nonce[2] = REVW_BE(((unsigned *)nonce)[2]); 167 nonce[3] = REVW_BE(((unsigned *)nonce)[3]) [all...] |
/external/chromium_org/chrome/browser/resources/cryptotoken/ |
gnubby.js | 477 * 2. Sending a nonce to device, flushing read queue until match. 531 self.dev.queueCommand(cid, cmd, nonce); 536 f.length >= nonce.length + 7 && 537 UTIL_equalArrays(f.subarray(7, nonce.length + 7), nonce)); 557 if (rc || !opt_frame || opt_frame.length < nonce.length + MIN_LENGTH) { 568 var offs = HEADER_LENGTH + nonce.length; 618 var nonce; variable 623 nonce = UTIL_getRandom(8);
|
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/ |
OAuth.php | 470 * util function: current nonce 639 $nonce = $request instanceof OAuthRequest variable 644 $this->check_nonce($consumer, $token, $nonce, $timestamp); 680 * check that the nonce is not repeated 682 private function check_nonce($consumer, $token, $nonce, $timestamp) { 683 if( ! $nonce ) 685 'Missing nonce parameter. The parameter is required' 688 // verify that the nonce is uniqueish 692 $nonce, 696 throw new OAuthException("Nonce already used: $nonce") [all...] |
/external/chromium_org/net/quic/crypto/ |
crypto_server_test.cc | 262 string nonce; local 266 &nonce); 267 return nonce; 490 // This test corrupts client nonce and source address token. 512 // This test corrupts client nonce, server nonce and source address token.
|
quic_crypto_client_config.cc | 655 StringPiece nonce; local 656 if (rej.GetStringPiece(kServerNonceTag, &nonce)) { 657 out_params->server_nonce = nonce.as_string();
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
t1_enc.c | 721 unsigned char ad[13], *seq, *in, *out, nonce[16]; local 750 if (aead->fixed_nonce_len + aead->variable_nonce_len > sizeof(nonce) || 754 memcpy(nonce, aead->fixed_nonce, aead->fixed_nonce_len); 765 * variable part of the nonce. */ 768 memcpy(nonce + nonce_used, ad, aead->variable_nonce_len); 773 * variable nonce. Thus we can copy the sequence number 789 nonce, nonce_used, 809 memcpy(nonce + nonce_used, 831 nonce, nonce_used, [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
stun_unittest.cc | 380 0x00, 0x15, 0x00, 0x1c, // NONCE attribute header 384 0x4f, 0x4c, 0x33, 0x34, // } Nonce value 683 const StunByteStringAttribute* nonce = local 685 ASSERT_TRUE(nonce != NULL); 686 EXPECT_EQ(kRfc5769SampleMsgWithAuthNonce, nonce->GetString()); [all...] |
turnserver.cc | 89 void set_last_nonce(const std::string& nonce) { last_nonce_ = nonce; } 401 // Fail if there is M-I but no username, nonce, or realm. 408 // Fail if bad nonce. 423 // Fail if one-time-use nonce feature is enabled. 485 // Generate a nonce of the form hex(now + HMAC-MD5(nonce_key_, now)) 488 std::string nonce = rtc::hex_encode(input.c_str(), input.size()); local 489 nonce += rtc::ComputeHmac(rtc::DIGEST_MD5, nonce_key_, input); 490 ASSERT(nonce.size() == kNonceSize); 491 return nonce; [all...] |
/external/chromium_org/third_party/libsrtp/srtp/srtp/ |
srtp.c | 384 v128_t nonce; local 387 /* set eigth octet of nonce to <label>, set the rest of it to zero */ 388 v128_set_to_zero(&nonce); 389 nonce.v8[7] = label; 391 status = cipher_set_iv(kdf->cipher, &nonce); 884 * if we're using rindael counter mode, set nonce and seq [all...] |
/external/chromium_org/third_party/webrtc/base/ |
httpcommon.cc | 680 " nonce=\"dcd98b7102dd2f0e8b11d0f600bfb0c093\"," 694 " nonce=\"Nny4QuC5PwiSDixJ\"," 802 std::string realm, nonce, qop, opaque; local 804 HttpHasAttribute(args, "nonce", &nonce); 822 middle = nonce + ":" + ncount + ":" + cnonce + ":" + qop; 824 middle = nonce; 840 ss << ", nonce=" << quote(nonce);
|
/external/ipsec-tools/src/racoon/ |
handler.h | 153 vchar_t *nonce; /* nonce value */ member in struct:ph1handle 154 vchar_t *nonce_p; /* partner's nonce value */ 300 vchar_t *nonce; /* nonce value in phase 2 */ member in struct:ph2handle 301 vchar_t *nonce_p; /* partner's nonce value in phase 2 */
|
/development/ndk/platforms/android-3/include/linux/ |
usb_ch9.h | 355 __u8 nonce[16]; member in struct:usb_handshake
|
/external/openssl/include/openssl/ |
ts.h | 120 nonce INTEGER OPTIONAL, 130 ASN1_INTEGER *nonce; /* OPTIONAL */ member in struct:TS_req_st 162 nonce INTEGER OPTIONAL, 178 ASN1_INTEGER *nonce; member in struct:TS_tst_info_st 387 int TS_REQ_set_nonce(TS_REQ *a, const ASN1_INTEGER *nonce); 448 int TS_TST_INFO_set_nonce(TS_TST_INFO *a, const ASN1_INTEGER *nonce); 629 /* Verify the nonce value. */ 674 ASN1_INTEGER *nonce; member in struct:TS_verify_ctx 705 * nonce, nonce_len = nonce from the request or NULL if absent (in this cas [all...] |
/bionic/libc/kernel/uapi/linux/usb/ |
ch9.h | 484 __u8 nonce[16]; member in struct:usb_handshake
|
/development/ndk/platforms/android-L/include/linux/usb/ |
ch9.h | 484 __u8 nonce[16]; member in struct:usb_handshake
|
/external/bluetooth/bluedroid/stack/include/ |
obx_api.h | 62 #define OBX_SESSION_INFO_SIZE 32 /* OBX_SESSION_ID_SIZE + 4(local nonce) + 4 (connection id) + 4 (timeout) + 2(mtu) + 1(state) + 1(srm) */ 63 #define OBX_SESSION_INFO_NONCE_IDX 16 /* The index to the (local nonce) in session info */ 176 UINT8 *p_sess_info; /* The session ID and the local nonce for a reliable session, a reference to the location in OBEX control block or NULL */ 454 UINT32 nonce; /* This is converted to UINT8[16] internally before adding to the OBEX header. This value is copied to the server control block and is increased after each use. 0, if only legacy OBEX (unreliable) session is desired. */ member in struct:__anon6223 456 UINT8 max_suspend; /* Max number of suspended session. must be less than OBX_MAX_SUSPEND_SESSIONS. ignored, if nonce is 0 */ [all...] |
/external/kernel-headers/original/uapi/linux/usb/ |
ch9.h | 890 __u8 nonce[16]; member in struct:usb_handshake
|