/frameworks/base/include/storage/ |
IMountService.h | 67 const int32_t nonce) = 0; 69 const sp<IObbActionListener>& token, const int32_t nonce) = 0;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 94 u8 *buf, *pchannel, nonce[16]; local 133 os_memset(nonce, 0, sizeof(nonce)); 135 os_memcpy(pchannel, nonce + 12, 4); 140 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), 334 u8 *decrypted, nonce[16]; local 362 wpa_printf(MSG_DEBUG, "EAP-PSK: Nonce did not increase"); 366 os_memset(nonce, 0, 12); 367 os_memcpy(nonce + 12, pos, 4) [all...] |
/system/keymaster/ |
ocb.c | 747 static block gen_offset_from_nonce(ae_ctx* ctx, const void* nonce) { 759 /* Replace cached nonce Top if needed */ 771 tmp.u32[1] = ((uint32_t*)nonce)[0]; 772 tmp.u32[2] = ((uint32_t*)nonce)[1]; 773 tmp.u32[3] = ((uint32_t*)nonce)[2]; 774 idx = (unsigned)(tmp.u8[15] & 0x3f); /* Get low 6 bits of nonce */ 775 tmp.u8[15] = tmp.u8[15] & 0xc0; /* Zero low 6 bits of nonce */ [all...] |
android_keymaster_test_utils.cpp | 530 keymaster_padding_t padding, const string& nonce) { 535 begin_params.push_back(TAG_NONCE, nonce.data(), nonce.size()); 541 keymaster_padding_t padding, const string& nonce) { 546 begin_params.push_back(TAG_NONCE, nonce.data(), nonce.size()); 553 keymaster_padding_t padding, const string& nonce) { 558 begin_params.push_back(TAG_NONCE, nonce.data(), nonce.size()); 593 void Keymaster1Test::CheckAesCtrTestVector(const string& key, const string& nonce, [all...] |
android_keymaster_test_utils.h | 255 keymaster_padding_t padding, const std::string& nonce); 257 keymaster_padding_t padding, const std::string& nonce); 260 const std::string& nonce); 263 const std::string& nonce); 267 void CheckAesOcbTestVector(const std::string& key, const std::string& nonce, 270 void CheckAesCtrTestVector(const std::string& key, const std::string& nonce,
|
/external/srtp/crypto/cipher/ |
cipher.c | 381 v128_t nonce; local 391 v128_set_to_zero(&nonce); 393 for(i=0; i < num_trials; i++, nonce.v32[3] = i) { 394 cipher_set_iv(c, &nonce);
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.h | 25 const u8 *nonce; member in struct:wpa_eapol_ie_parse
|
peerkey_auth.c | 129 * EAPOL-Key(S=1, M=1, A=1, I=0, K=0, SM=1, KeyRSC=0, Nonce=INonce, 156 * EAPOL-Key(S=1, M=1, A=0, I=1, K=0, SM=1, KeyRSC=0, Nonce=PNonce, 173 /* Initiator Nonce */ 174 pos = wpa_add_kde(pos, RSN_KEY_DATA_NONCE, kde->nonce, WPA_NONCE_LEN, 209 * EAPOL-Key(S=1, M=1, A=0, I=0, K=0, SM=1, KeyRSC=0, Nonce=INonce, 236 kde->nonce, WPA_NONCE_LEN); 249 NULL, kde->nonce, buf, pos - buf, 0, 1, 0); 270 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) { 272 "Nonce KDE in SMK M3"); 277 * Peer Nonce = key->key_nonce; Initiator Nonce = kde.nonce * [all...] |
wpa_auth_ft.c | 336 if (random_get_bytes(f.nonce, FT_R0KH_R1KH_PULL_NONCE_LEN)) { 338 "nonce"); 341 os_memcpy(sm->ft_pending_pull_nonce, f.nonce, 350 f.nonce, frame.nonce) < 0) [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_tlv_common.h | 76 u8 nonce[32]; member in struct:eap_tlv_crypto_binding_tlv
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ie.h | 27 const u8 *nonce; member in struct:wpa_eapol_ie_parse
|
/external/openssh/ |
umac.c | 216 * xor the appropriate bytes depending on the last bits of nonce. 222 UINT8 nonce[AES_BLOCK_LEN]; /* The AES input making above cache */ member in struct:__anon17348 234 memset(pc->nonce, 0, sizeof(pc->nonce)); 235 aes_encryption(pc->nonce, pc->cache, pc->prf_key); 238 static void pdf_gen_xor(pdf_ctx *pc, const UINT8 nonce[8], UINT8 buf[8]) 257 int ndx = nonce[7] & LOW_BIT_MASK; 259 *(UINT32 *)t.tmp_nonce_lo = ((const UINT32 *)nonce)[1]; 262 if ( (((UINT32 *)t.tmp_nonce_lo)[0] != ((UINT32 *)pc->nonce)[1]) || 263 (((const UINT32 *)nonce)[0] != ((UINT32 *)pc->nonce)[0]) [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/tsp/ |
TimeStampRespTest.java | 64 BigInteger nonce = BigInteger.valueOf(1234567890L); local 77 genTime, accuracy, Boolean.FALSE, nonce, tsa, exts);
|
/frameworks/base/telephony/java/com/android/internal/telephony/ |
IPhoneSubInfo.aidl | 189 String getIsimChallengeResponse(String nonce);
|