/frameworks/base/native/android/ |
storage_manager.cpp | 44 virtual void onObbResult(const android::String16& filename, const int32_t nonce, 51 : nonce(_nonce) 56 int32_t nonce; member in class:ObbCallback 105 void fireCallback(const char* filename, const int32_t nonce, const int32_t state) { 112 if (cb->nonce == nonce) { 141 mMountService->mountObb(rawPath16, canonicalPath16, key16, mObbActionListener, cb->nonce); 147 mMountService->unmountObb(filename16, force, mObbActionListener, cb->nonce); 166 void ObbActionListener::onObbResult(const android::String16& filename, const int32_t nonce, const int32_t state) { 167 mStorageManager->fireCallback(String8(filename).string(), nonce, state) [all...] |
/libcore/luni/src/main/java/org/apache/harmony/security/x509/tsp/ |
TSTInfo.java | 53 * nonce INTEGER OPTIONAL, 80 private final BigInteger nonce; field in class:TSTInfo 88 Boolean ordering, BigInteger nonce, GeneralName tsa, 97 this.nonce = nonce; 123 res.append(nonce); 161 * @return Returns the nonce. 164 return nonce; 254 ASN1Integer.getInstance(), // nonce 268 BigInteger nonce = (values[7] == null) ? null : new BigInteger [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/tsp/ |
TimeStampReqTest.java | 43 BigInteger nonce = BigInteger.valueOf(1234567890L); local 51 nonce, Boolean.FALSE, exts); 62 assertEquals("Decoded nonce is incorrect", nonce, decoded.getNonce());
|
TSTInfoTest.java | 49 BigInteger nonce = BigInteger.valueOf(1234567890L); local 61 genTime, accuracy, Boolean.FALSE, nonce, tsa, exts); 80 assertEquals("Decoded nonce is incorrect", nonce, decoded.getNonce());
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
CCMBlockCipher.java | 28 private byte[] nonce; field in class:CCMBlockCipher 74 nonce = param.getNonce(); 83 nonce = param.getIV(); 99 if (nonce == null || nonce.length < 7 || nonce.length > 13) 101 throw new IllegalArgumentException("nonce must have length from 7 to 13 octets"); 248 int n = nonce.length; 261 System.arraycopy(nonce, 0, iv, 1, nonce.length) [all...] |
GCMBlockCipher.java | 36 private byte[] nonce; field in class:GCMBlockCipher 102 nonce = param.getNonce(); 118 nonce = param.getIV(); 131 if (nonce == null || nonce.length < 1) 136 // TODO Restrict macSize to 16 if nonce length not 12? 158 if (nonce.length == 12) 160 System.arraycopy(nonce, 0, J0, 0, nonce.length); 165 gHASH(J0, nonce, nonce.length) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
aes-eax.c | 19 * @nonce: Nonce for counter mode 20 * @nonce_len: Nonce length in bytes 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, 53 os_memcpy(buf + 16, nonce, nonce_len); 83 * @nonce: Nonce for counter mode 84 * @nonce_len: Nonce length in bytes 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, 117 os_memcpy(buf + 16, nonce, nonce_len) [all...] |
aes_wrap.h | 36 int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, 39 const u8 *nonce, size_t nonce_len, 43 const u8 *nonce, size_t nonce_len, 63 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, 66 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
|
/external/boringssl/src/crypto/cipher/ |
internal.h | 89 size_t max_out_len, const uint8_t *nonce, size_t nonce_len, 94 size_t max_out_len, const uint8_t *nonce, size_t nonce_len,
|
aead.c | 98 size_t max_out_len, const uint8_t *nonce, 113 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in, 127 size_t max_out_len, const uint8_t *nonce, 135 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in,
|
e_chacha20poly1305.c | 94 const uint8_t *nonce, size_t nonce_len, 132 c20_ctx->key, nonce, 0); 136 CRYPTO_chacha_20(out, in, in_len, c20_ctx->key, nonce, 1); 148 const uint8_t *nonce, size_t nonce_len, 190 c20_ctx->key, nonce, 0); 202 CRYPTO_chacha_20(out, in, plaintext_len, c20_ctx->key, nonce, 1); 209 CHACHA20_NONCE_LEN, /* nonce len */
|
/external/boringssl/src/crypto/chacha/ |
chacha_generic.c | 57 const uint8_t key[32], const uint8_t nonce[8], 88 const uint8_t key[32], const uint8_t nonce[8], 96 CRYPTO_chacha_20_neon(out, in, in_len, key, nonce, counter); 118 input[14] = U8TO32_LITTLE(nonce + 0); 119 input[15] = U8TO32_LITTLE(nonce + 4);
|
/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 103 //TODO: supply a real nonce-count, currently a server will interprete a repeated request as a replay 104 private static final String NC = "00000001"; //nonce-count is always 1 136 if (getParameter("nonce") == null) { 137 throw new MalformedChallengeException("missing nonce in challange"); 269 String nonce = getParameter("nonce"); local 278 if (nonce == null) { 279 throw new IllegalStateException("Nonce may not be null"); 314 // ":" unq(nonce-value) 320 StringBuilder tmp3 = new StringBuilder(tmp2.length() + nonce.length() + cnonce.length() + 2) 400 String nonce = getParameter("nonce"); local [all...] |
/external/boringssl/src/crypto/modes/ |
gcm_test.c | 64 const char *nonce; member in struct:test_case 234 /* This nonce results in 0xfff in counter LSB. */ 316 *nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL; local 326 !decode_hex(&nonce, &nonce_len, test->nonce, test_num, "nonce") || 359 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len); 375 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len); 398 OPENSSL_free(nonce);
|
/frameworks/base/obex/javax/obex/ |
ClientSession.java | 112 if (header.nonce != null) { 114 System.arraycopy(header.nonce, 0, mChallengeDigest, 0, 16); 180 if (head.nonce != null) { 182 System.arraycopy(head.nonce, 0, mChallengeDigest, 0, 16); 235 if (header.nonce != null) { 237 System.arraycopy(header.nonce, 0, mChallengeDigest, 0, 16); 300 if (head.nonce != null) { 302 System.arraycopy(head.nonce, 0, mChallengeDigest, 0, 16); 346 if (headset.nonce != null) { 348 System.arraycopy(headset.nonce, 0, mChallengeDigest, 0, 16) [all...] |
/external/nist-sip/java/javax/sip/header/ |
AuthorizationHeader.java | 16 void setNonce(String nonce) throws ParseException;
|
/external/apache-http/android/src/android/net/http/ |
RequestHandle.java | 239 String nonce, 245 username, password, realm, nonce, QOP, algorithm, opaque); 303 String nonce, 326 String digest = computeDigest(A1, A2, nonce, QOP, nc, cnonce); 331 response += "nonce=" + doubleQuote(nonce) + ", "; 365 String A1, String A2, String nonce, String QOP, String nc, String cnonce) { 371 return KD(H(A1), nonce + ":" + H(A2)); 374 return KD(H(A1), nonce + ":" + nc + ":" + cnonce + ":" + QOP + ":" + H(A2));
|
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/ |
pairingsessiontest.cc | 203 Nonce nonce(5, 0x2); 208 .WillOnce(Return(new Nonce(nonce))); 209 EXPECT_CALL(challenge_, GetAlpha(nonce)) 233 Nonce nonce(5, 0x2); 238 .WillOnce(Return(new Nonce(nonce))); 239 EXPECT_CALL(challenge_, GetAlpha(nonce)) [all...] |
/external/tcpdump/ |
mptcp.h | 74 u_int8_t nonce[4]; member in struct:mp_join::__anon18899::__anon18900 78 u_int8_t nonce[4]; member in struct:mp_join::__anon18899::__anon18901
|
print-babel.c | 347 u_short nonce, interval; local 353 nonce = EXTRACT_16BITS(message + 4); 355 printf("%04x %s", nonce, format_interval(interval)); 361 u_short nonce; local 367 nonce = EXTRACT_16BITS(message + 2); 368 printf("%04x", nonce);
|
/system/keymaster/ |
ocb_utils.cpp | 121 const KeymasterKeyBlob& plaintext, const Buffer& nonce, 125 if (nonce.available_read() != OCB_NONCE_LENGTH) 140 int ae_err = ae_encrypt(ctx.get(), nonce.peek_read(), plaintext.key_material, 157 const KeymasterKeyBlob& ciphertext, const Buffer& nonce, 161 if (nonce.available_read() != OCB_NONCE_LENGTH || tag.available_read() != OCB_TAG_LENGTH) 176 int ae_err = ae_decrypt(ctx.get(), nonce.peek_read(), ciphertext.key_material,
|
/external/openssh/ |
mac.c | 180 u_char nonce[8]; local 196 POKE_U64(nonce, seqno); 198 umac_final(mac->umac_ctx, u.m, nonce); 201 put_u64(nonce, seqno); 203 umac128_final(mac->umac_ctx, u.m, nonce);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local 259 os_memset(nonce, 0, 12); 260 os_memcpy(nonce + 12, pchannel, 4); 270 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", 271 nonce, sizeof(nonce)); 284 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), 328 /* nonce++ */ 329 inc_byte_array(nonce, sizeof(nonce)) [all...] |
/cts/tests/tests/jni/src/android/jni/cts/ |
JniStaticTest.java | 21 * Basic static method tests. The "nonce" class being tested by this 156 StaticNonce nonce = StaticNonce.returnInstance(); local 157 assertSame(StaticNonce.class, nonce.getClass());
|
/external/boringssl/src/include/openssl/ |
aead.h | 29 * message has a unique, per-message nonce and, optionally, additional data 55 * When sealing messages, a nonce must be given. The length of the nonce is 57 * nonce must be unique for all messages with the same key*. This is critically 58 * important - nonce reuse may completely undermine the security of the AEAD. 61 * randomly. The nonce must be passed into the "open" operation by the receiver 107 * If the nonce is empty then the default nonce will be used, otherwise it must 119 * authentication. The nonce is 12 bytes; the bottom 32-bits are used as the 178 /* EVP_AEAD_nonce_length returns the length, in bytes, of the per-message nonce [all...] |