HomeSort by relevance Sort by last modified time
    Searched refs:nonce (Results 26 - 50 of 236) sorted by null

12 3 4 5 6 7 8 910

  /frameworks/base/native/android/
storage_manager.cpp 44 virtual void onObbResult(const android::String16& filename, const int32_t nonce,
51 : nonce(_nonce)
56 int32_t nonce; member in class:ObbCallback
105 void fireCallback(const char* filename, const int32_t nonce, const int32_t state) {
112 if (cb->nonce == nonce) {
141 mMountService->mountObb(rawPath16, canonicalPath16, key16, mObbActionListener, cb->nonce);
147 mMountService->unmountObb(filename16, force, mObbActionListener, cb->nonce);
166 void ObbActionListener::onObbResult(const android::String16& filename, const int32_t nonce, const int32_t state) {
167 mStorageManager->fireCallback(String8(filename).string(), nonce, state)
    [all...]
  /libcore/luni/src/main/java/org/apache/harmony/security/x509/tsp/
TSTInfo.java 53 * nonce INTEGER OPTIONAL,
80 private final BigInteger nonce; field in class:TSTInfo
88 Boolean ordering, BigInteger nonce, GeneralName tsa,
97 this.nonce = nonce;
123 res.append(nonce);
161 * @return Returns the nonce.
164 return nonce;
254 ASN1Integer.getInstance(), // nonce
268 BigInteger nonce = (values[7] == null) ? null : new BigInteger
    [all...]
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/tsp/
TimeStampReqTest.java 43 BigInteger nonce = BigInteger.valueOf(1234567890L); local
51 nonce, Boolean.FALSE, exts);
62 assertEquals("Decoded nonce is incorrect", nonce, decoded.getNonce());
TSTInfoTest.java 49 BigInteger nonce = BigInteger.valueOf(1234567890L); local
61 genTime, accuracy, Boolean.FALSE, nonce, tsa, exts);
80 assertEquals("Decoded nonce is incorrect", nonce, decoded.getNonce());
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/
CCMBlockCipher.java 28 private byte[] nonce; field in class:CCMBlockCipher
74 nonce = param.getNonce();
83 nonce = param.getIV();
99 if (nonce == null || nonce.length < 7 || nonce.length > 13)
101 throw new IllegalArgumentException("nonce must have length from 7 to 13 octets");
248 int n = nonce.length;
261 System.arraycopy(nonce, 0, iv, 1, nonce.length)
    [all...]
GCMBlockCipher.java 36 private byte[] nonce; field in class:GCMBlockCipher
102 nonce = param.getNonce();
118 nonce = param.getIV();
131 if (nonce == null || nonce.length < 1)
136 // TODO Restrict macSize to 16 if nonce length not 12?
158 if (nonce.length == 12)
160 System.arraycopy(nonce, 0, J0, 0, nonce.length);
165 gHASH(J0, nonce, nonce.length)
    [all...]
  /external/wpa_supplicant_8/src/crypto/
aes-eax.c 19 * @nonce: Nonce for counter mode
20 * @nonce_len: Nonce length in bytes
28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len,
53 os_memcpy(buf + 16, nonce, nonce_len);
83 * @nonce: Nonce for counter mode
84 * @nonce_len: Nonce length in bytes
92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len,
117 os_memcpy(buf + 16, nonce, nonce_len)
    [all...]
aes_wrap.h 36 int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce,
39 const u8 *nonce, size_t nonce_len,
43 const u8 *nonce, size_t nonce_len,
63 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce,
66 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
  /external/boringssl/src/crypto/cipher/
internal.h 89 size_t max_out_len, const uint8_t *nonce, size_t nonce_len,
94 size_t max_out_len, const uint8_t *nonce, size_t nonce_len,
aead.c 98 size_t max_out_len, const uint8_t *nonce,
113 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in,
127 size_t max_out_len, const uint8_t *nonce,
135 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in,
e_chacha20poly1305.c 94 const uint8_t *nonce, size_t nonce_len,
132 c20_ctx->key, nonce, 0);
136 CRYPTO_chacha_20(out, in, in_len, c20_ctx->key, nonce, 1);
148 const uint8_t *nonce, size_t nonce_len,
190 c20_ctx->key, nonce, 0);
202 CRYPTO_chacha_20(out, in, plaintext_len, c20_ctx->key, nonce, 1);
209 CHACHA20_NONCE_LEN, /* nonce len */
  /external/boringssl/src/crypto/chacha/
chacha_generic.c 57 const uint8_t key[32], const uint8_t nonce[8],
88 const uint8_t key[32], const uint8_t nonce[8],
96 CRYPTO_chacha_20_neon(out, in, in_len, key, nonce, counter);
118 input[14] = U8TO32_LITTLE(nonce + 0);
119 input[15] = U8TO32_LITTLE(nonce + 4);
  /external/apache-http/src/org/apache/http/impl/auth/
DigestScheme.java 103 //TODO: supply a real nonce-count, currently a server will interprete a repeated request as a replay
104 private static final String NC = "00000001"; //nonce-count is always 1
136 if (getParameter("nonce") == null) {
137 throw new MalformedChallengeException("missing nonce in challange");
269 String nonce = getParameter("nonce"); local
278 if (nonce == null) {
279 throw new IllegalStateException("Nonce may not be null");
314 // ":" unq(nonce-value)
320 StringBuilder tmp3 = new StringBuilder(tmp2.length() + nonce.length() + cnonce.length() + 2)
400 String nonce = getParameter("nonce"); local
    [all...]
  /external/boringssl/src/crypto/modes/
gcm_test.c 64 const char *nonce; member in struct:test_case
234 /* This nonce results in 0xfff in counter LSB. */
316 *nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL; local
326 !decode_hex(&nonce, &nonce_len, test->nonce, test_num, "nonce") ||
359 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len);
375 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len);
398 OPENSSL_free(nonce);
  /frameworks/base/obex/javax/obex/
ClientSession.java 112 if (header.nonce != null) {
114 System.arraycopy(header.nonce, 0, mChallengeDigest, 0, 16);
180 if (head.nonce != null) {
182 System.arraycopy(head.nonce, 0, mChallengeDigest, 0, 16);
235 if (header.nonce != null) {
237 System.arraycopy(header.nonce, 0, mChallengeDigest, 0, 16);
300 if (head.nonce != null) {
302 System.arraycopy(head.nonce, 0, mChallengeDigest, 0, 16);
346 if (headset.nonce != null) {
348 System.arraycopy(headset.nonce, 0, mChallengeDigest, 0, 16)
    [all...]
  /external/nist-sip/java/javax/sip/header/
AuthorizationHeader.java 16 void setNonce(String nonce) throws ParseException;
  /external/apache-http/android/src/android/net/http/
RequestHandle.java 239 String nonce,
245 username, password, realm, nonce, QOP, algorithm, opaque);
303 String nonce,
326 String digest = computeDigest(A1, A2, nonce, QOP, nc, cnonce);
331 response += "nonce=" + doubleQuote(nonce) + ", ";
365 String A1, String A2, String nonce, String QOP, String nc, String cnonce) {
371 return KD(H(A1), nonce + ":" + H(A2));
374 return KD(H(A1), nonce + ":" + nc + ":" + cnonce + ":" + QOP + ":" + H(A2));
  /external/google-tv-pairing-protocol/cpp/tests/polo/pairing/
pairingsessiontest.cc 203 Nonce nonce(5, 0x2);
208 .WillOnce(Return(new Nonce(nonce)));
209 EXPECT_CALL(challenge_, GetAlpha(nonce))
233 Nonce nonce(5, 0x2);
238 .WillOnce(Return(new Nonce(nonce)));
239 EXPECT_CALL(challenge_, GetAlpha(nonce))
    [all...]
  /external/tcpdump/
mptcp.h 74 u_int8_t nonce[4]; member in struct:mp_join::__anon18899::__anon18900
78 u_int8_t nonce[4]; member in struct:mp_join::__anon18899::__anon18901
print-babel.c 347 u_short nonce, interval; local
353 nonce = EXTRACT_16BITS(message + 4);
355 printf("%04x %s", nonce, format_interval(interval));
361 u_short nonce; local
367 nonce = EXTRACT_16BITS(message + 2);
368 printf("%04x", nonce);
  /system/keymaster/
ocb_utils.cpp 121 const KeymasterKeyBlob& plaintext, const Buffer& nonce,
125 if (nonce.available_read() != OCB_NONCE_LENGTH)
140 int ae_err = ae_encrypt(ctx.get(), nonce.peek_read(), plaintext.key_material,
157 const KeymasterKeyBlob& ciphertext, const Buffer& nonce,
161 if (nonce.available_read() != OCB_NONCE_LENGTH || tag.available_read() != OCB_TAG_LENGTH)
176 int ae_err = ae_decrypt(ctx.get(), nonce.peek_read(), ciphertext.key_material,
  /external/openssh/
mac.c 180 u_char nonce[8]; local
196 POKE_U64(nonce, seqno);
198 umac_final(mac->umac_ctx, u.m, nonce);
201 put_u64(nonce, seqno);
203 umac128_final(mac->umac_ctx, u.m, nonce);
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local
259 os_memset(nonce, 0, 12);
260 os_memcpy(nonce + 12, pchannel, 4);
270 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce",
271 nonce, sizeof(nonce));
284 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
328 /* nonce++ */
329 inc_byte_array(nonce, sizeof(nonce))
    [all...]
  /cts/tests/tests/jni/src/android/jni/cts/
JniStaticTest.java 21 * Basic static method tests. The "nonce" class being tested by this
156 StaticNonce nonce = StaticNonce.returnInstance(); local
157 assertSame(StaticNonce.class, nonce.getClass());
  /external/boringssl/src/include/openssl/
aead.h 29 * message has a unique, per-message nonce and, optionally, additional data
55 * When sealing messages, a nonce must be given. The length of the nonce is
57 * nonce must be unique for all messages with the same key*. This is critically
58 * important - nonce reuse may completely undermine the security of the AEAD.
61 * randomly. The nonce must be passed into the "open" operation by the receiver
107 * If the nonce is empty then the default nonce will be used, otherwise it must
119 * authentication. The nonce is 12 bytes; the bottom 32-bits are used as the
178 /* EVP_AEAD_nonce_length returns the length, in bytes, of the per-message nonce
    [all...]

Completed in 480 milliseconds

12 3 4 5 6 7 8 910