HomeSort by relevance Sort by last modified time
    Searched full:nonce (Results 101 - 125 of 537) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/curl/tests/data/
test1002 23 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
45 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
96 Authorization: Digest username="auser", realm="testrealm", nonce="1053604144", uri="/1002.upload1", response="198aa9b6acb4b0c71d02a197a5e41f54"
106 Authorization: Digest username="auser", realm="testrealm", nonce="1053604144", uri="/1002.upload2", response="d711f0d2042786d930de635ba0d1a1d0"
test1412 21 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
56 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
106 Authorization: Digest username="testuser", realm="gimme all yer s3cr3ts", nonce="11223344", uri="/1412", response="0390dbe89e31adca0413d11f91f30e7f"
112 Authorization: Digest username="testuser", realm="gimme all yer s3cr3ts", nonce="11223344", uri="/14120001", response="0085df91870374c8bf4e94415e7fbf8e"
test551 16 # as a bonus, ww use an excessive nonce length
20 Proxy-Authenticate: Digest realm="something fun to read", nonce="AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
41 Proxy-Authenticate: Digest realm="something fun to read", nonce="AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
91 Proxy-Authorization: Digest username="s1lly", realm="something fun to read", nonce="AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA", uri="/path/551", response="3325240726fbdaf1e61f3a0dd40b930c"
test1001 24 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
46 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
97 Authorization: Digest username="auser", realm="testrealm", nonce="1053604144", uri="/1001", response="6af4d89c952f4dd4cc215a6878dc499d"
test1030 18 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
42 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
98 Authorization: Digest username="testuser", realm="gimme all yer s3cr3ts", nonce="11223344", uri="/1030", response="01cb59db1ddaac246b072d5f5f0716d9"
test154 21 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
45 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
97 Authorization: Digest username="testuser", realm="gimme all yer s3cr3ts", nonce="11223344", uri="/154", response="b71551e12d1c456e47d8388ecb2edeca"
  /external/nist-sip/java/javax/sip/header/
AuthorizationHeader.java 16 void setNonce(String nonce) throws ParseException;
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.h 25 const u8 *nonce; member in struct:wpa_eapol_ie_parse
  /external/tcpdump/tests/
ahcp-vv.out 2 Hopcount 1, Original Hopcount 1, Nonce 0x7ce31135, Source Id 6a:a3:c4:ff:fe:f4:84:1e, Destination Id ff:ff:ff:ff:ff:ff:ff:ff
11 Hopcount 1, Original Hopcount 1, Nonce 0x9dccbd40, Source Id 08:4b:37:1e:f3:6e:1e:dc, Destination Id 6a:a3:c4:ff:fe:f4:84:1e
21 Hopcount 1, Original Hopcount 1, Nonce 0x7de31135, Source Id 6a:a3:c4:ff:fe:f4:84:1e, Destination Id 08:4b:37:1e:f3:6e:1e:dc
30 Hopcount 1, Original Hopcount 1, Nonce 0x9eccbd40, Source Id 08:4b:37:1e:f3:6e:1e:dc, Destination Id 6a:a3:c4:ff:fe:f4:84:1e
40 Hopcount 1, Original Hopcount 1, Nonce 0x7ee31135, Source Id 6a:a3:c4:ff:fe:f4:84:1e, Destination Id ff:ff:ff:ff:ff:ff:ff:ff
49 Hopcount 1, Original Hopcount 1, Nonce 0x9fccbd40, Source Id 08:4b:37:1e:f3:6e:1e:dc, Destination Id 6a:a3:c4:ff:fe:f4:84:1e
59 Hopcount 1, Original Hopcount 1, Nonce 0x7fe31135, Source Id 6a:a3:c4:ff:fe:f4:84:1e, Destination Id 08:4b:37:1e:f3:6e:1e:dc
68 Hopcount 1, Original Hopcount 1, Nonce 0xa0ccbd40, Source Id 08:4b:37:1e:f3:6e:1e:dc, Destination Id 6a:a3:c4:ff:fe:f4:84:1e
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.h 17 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */
18 u8 pnonce[WPA_NONCE_LEN]; /* Peer Nonce */
  /packages/services/Telephony/src/com/android/phone/common/mail/store/imap/
DigestMd5Utils.java 42 private static final String DIGEST_NONCE = "nonce";
62 public String nonce; field in class:DigestMd5Utils.Data
77 nonce = challenge.get(DIGEST_NONCE);
115 .appendQuoted(DIGEST_NONCE, nonce)
154 { nonce-value, ":" nc-value, ":",
165 a1.append(":").append(data.nonce).append(":").append(data.cnonce);
175 data.nonce + ":" + data.nc + ":" + data.cnonce + ":" + data.qop + ":" + toHex(
219 throw new MessagingException("nonce missing from server DIGEST-MD5 challenge");
  /packages/services/Telephony/tests/src/com/android/phone/common/mail/store/imap/
DigestMd5UtilsTest.java 29 data.nonce = "OA6MG9tEQGm2hh";
44 data.nonce = "OA6MG9tEQGm2hh";
  /system/connectivity/shill/
mock_crypto_util_proxy.cc 49 const std::string& nonce,
57 nonce, signed_data,
  /external/boringssl/src/crypto/chacha/
chacha_generic.c 57 const uint8_t key[32], const uint8_t nonce[12],
88 const uint8_t key[32], const uint8_t nonce[12],
96 CRYPTO_chacha_20_neon(out, in, in_len, key, nonce, counter);
117 input[13] = U8TO32_LITTLE(nonce + 0);
118 input[14] = U8TO32_LITTLE(nonce + 4);
119 input[15] = U8TO32_LITTLE(nonce + 8);
  /system/keymaster/
ocb_utils.cpp 121 const KeymasterKeyBlob& plaintext, const Buffer& nonce,
125 if (nonce.available_read() != OCB_NONCE_LENGTH)
140 int ae_err = ae_encrypt(ctx.get(), nonce.peek_read(), plaintext.key_material,
157 const KeymasterKeyBlob& ciphertext, const Buffer& nonce,
161 if (nonce.available_read() != OCB_NONCE_LENGTH || tag.available_read() != OCB_TAG_LENGTH)
176 int ae_err = ae_decrypt(ctx.get(), nonce.peek_read(), ciphertext.key_material,
  /external/boringssl/src/include/openssl/
aead.h 29 * message has a unique, per-message nonce and, optionally, additional data
55 * When sealing messages, a nonce must be given. The length of the nonce is
57 * nonce must be unique for all messages with the same key*. This is critically
58 * important - nonce reuse may completely undermine the security of the AEAD.
61 * randomly. The nonce must be passed into the "open" operation by the receiver
113 * If the nonce is empty then the default nonce will be used, otherwise it must
125 * authentication. The nonce is 12 bytes; the bottom 32-bits are used as the
187 /* EVP_AEAD_nonce_length returns the length, in bytes, of the per-message nonce
    [all...]
  /libcore/ojluni/src/main/java/sun/net/www/protocol/http/
DigestAuthentication.java 64 private String nonce; field in class:DigestAuthentication.Parameters
71 // Force the HA1 value to be recalculated because the nonce has changed
89 nonce = null;
143 synchronized String getNonce () { return nonce;}
146 if (!s.equals(nonce)) {
147 nonce=s;
259 String newNonce = p.findValue ("nonce");
276 params.setNonce (p.findValue("nonce"));
293 if (params.nonce == null || authMethod == null || pw == null || realm == null) {
335 String nonce = params.getNonce () local
393 String nonce = params.getNonce (); local
    [all...]
  /external/curl/lib/
curl_sasl.c 501 * nonce [in/out] - The buffer where the nonce will be stored.
502 * nlen [in] - The length of the nonce buffer.
513 char *nonce, size_t nlen,
534 /* Retrieve nonce string from the challenge */
535 if(!sasl_digest_get_key_value((char *)chlg, "nonce=\"", nonce, nlen, '\"')) {
597 char nonce[64]; local
610 result = sasl_decode_digest_md5_message(chlg64, nonce, sizeof(nonce),
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local
259 os_memset(nonce, 0, 12);
260 os_memcpy(nonce + 12, pchannel, 4);
270 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce",
271 nonce, sizeof(nonce));
284 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce),
328 /* nonce++ */
329 inc_byte_array(nonce, sizeof(nonce))
    [all...]
  /frameworks/base/docs/html/training/safetynet/
index.jd 168 single use token in the form of a number used once, or <em>nonce</em>, as part of your request. A
169 nonce is a random token generated in a cryptographically secure manner.
173 You can obtain a nonce by generating one within your app each time you make a compatibility check
174 request. As a more secure option, you can obtain a nonce from your own server, using a secure
179 A nonce used with a SafetyNet request should be at least 16 bytes in length. After you make a
180 check request, the response from the SafetyNet service includes your nonce, so you can verify it
181 against the one you sent. As the name indicates, you should only use a nonce value once, for a
182 single check request. Use a different nonce for any subsequent check requests. For tips on using
192 After you have established a connection to Google Play services and created a nonce, you are
199 byte[] nonce = getRequestNonce(); // Should be at least 16 bytes in length
    [all...]
  /external/apache-http/android/src/android/net/http/
RequestHandle.java 239 String nonce,
245 username, password, realm, nonce, QOP, algorithm, opaque);
303 String nonce,
326 String digest = computeDigest(A1, A2, nonce, QOP, nc, cnonce);
331 response += "nonce=" + doubleQuote(nonce) + ", ";
365 String A1, String A2, String nonce, String QOP, String nc, String cnonce) {
371 return KD(H(A1), nonce + ":" + H(A2));
374 return KD(H(A1), nonce + ":" + nc + ":" + cnonce + ":" + QOP + ":" + H(A2));
  /libcore/ojluni/src/main/java/sun/security/timestamp/
TimestampToken.java 55 * nonce INTEGER OPTIONAL,
81 private BigInteger nonce; field in class:TimestampToken
115 return nonce;
156 if (d.tag == DerValue.tag_Integer) { // must be the nonce
157 nonce = d.getBigInteger();
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/
GCMBlockCipher.java 41 private byte[] nonce; field in class:GCMBlockCipher
107 nonce = param.getNonce();
123 nonce = param.getIV();
136 if (nonce == null || nonce.length < 1)
141 // TODO Restrict macSize to 16 if nonce length not 12?
163 if (nonce.length == 12)
165 System.arraycopy(nonce, 0, J0, 0, nonce.length);
170 gHASH(J0, nonce, nonce.length)
    [all...]
  /external/nist-sip/java/gov/nist/javax/sip/header/
Credentials.java 50 private static String NONCE = ParameterNames.NONCE;
112 else if (nameValue.getName().compareToIgnoreCase(NONCE) == 0)
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 94 u8 *buf, *pchannel, nonce[16]; local
133 os_memset(nonce, 0, sizeof(nonce));
135 os_memcpy(pchannel, nonce + 12, 4);
140 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce),
334 u8 *decrypted, nonce[16]; local
362 wpa_printf(MSG_DEBUG, "EAP-PSK: Nonce did not increase");
366 os_memset(nonce, 0, 12);
367 os_memcpy(nonce + 12, pos, 4)
    [all...]

Completed in 1017 milliseconds

1 2 3 45 6 7 8 91011>>