/external/curl/tests/data/ |
test1002 | 23 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
45 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
96 Authorization: Digest username="auser", realm="testrealm", nonce="1053604144", uri="/1002.upload1", response="198aa9b6acb4b0c71d02a197a5e41f54"
106 Authorization: Digest username="auser", realm="testrealm", nonce="1053604144", uri="/1002.upload2", response="d711f0d2042786d930de635ba0d1a1d0"
|
test1412 | 21 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
56 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
106 Authorization: Digest username="testuser", realm="gimme all yer s3cr3ts", nonce="11223344", uri="/1412", response="0390dbe89e31adca0413d11f91f30e7f"
112 Authorization: Digest username="testuser", realm="gimme all yer s3cr3ts", nonce="11223344", uri="/14120001", response="0085df91870374c8bf4e94415e7fbf8e"
|
test551 | 16 # as a bonus, ww use an excessive nonce length 20 Proxy-Authenticate: Digest realm="something fun to read", nonce="AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
41 Proxy-Authenticate: Digest realm="something fun to read", nonce="AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
91 Proxy-Authorization: Digest username="s1lly", realm="something fun to read", nonce="AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA", uri="/path/551", response="3325240726fbdaf1e61f3a0dd40b930c"
|
test1001 | 24 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
46 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
97 Authorization: Digest username="auser", realm="testrealm", nonce="1053604144", uri="/1001", response="6af4d89c952f4dd4cc215a6878dc499d"
|
test1030 | 18 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
42 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
98 Authorization: Digest username="testuser", realm="gimme all yer s3cr3ts", nonce="11223344", uri="/1030", response="01cb59db1ddaac246b072d5f5f0716d9"
|
test154 | 21 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
45 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
97 Authorization: Digest username="testuser", realm="gimme all yer s3cr3ts", nonce="11223344", uri="/154", response="b71551e12d1c456e47d8388ecb2edeca"
|
/external/nist-sip/java/javax/sip/header/ |
AuthorizationHeader.java | 16 void setNonce(String nonce) throws ParseException;
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.h | 25 const u8 *nonce; member in struct:wpa_eapol_ie_parse
|
/external/tcpdump/tests/ |
ahcp-vv.out | 2 Hopcount 1, Original Hopcount 1, Nonce 0x7ce31135, Source Id 6a:a3:c4:ff:fe:f4:84:1e, Destination Id ff:ff:ff:ff:ff:ff:ff:ff 11 Hopcount 1, Original Hopcount 1, Nonce 0x9dccbd40, Source Id 08:4b:37:1e:f3:6e:1e:dc, Destination Id 6a:a3:c4:ff:fe:f4:84:1e 21 Hopcount 1, Original Hopcount 1, Nonce 0x7de31135, Source Id 6a:a3:c4:ff:fe:f4:84:1e, Destination Id 08:4b:37:1e:f3:6e:1e:dc 30 Hopcount 1, Original Hopcount 1, Nonce 0x9eccbd40, Source Id 08:4b:37:1e:f3:6e:1e:dc, Destination Id 6a:a3:c4:ff:fe:f4:84:1e 40 Hopcount 1, Original Hopcount 1, Nonce 0x7ee31135, Source Id 6a:a3:c4:ff:fe:f4:84:1e, Destination Id ff:ff:ff:ff:ff:ff:ff:ff 49 Hopcount 1, Original Hopcount 1, Nonce 0x9fccbd40, Source Id 08:4b:37:1e:f3:6e:1e:dc, Destination Id 6a:a3:c4:ff:fe:f4:84:1e 59 Hopcount 1, Original Hopcount 1, Nonce 0x7fe31135, Source Id 6a:a3:c4:ff:fe:f4:84:1e, Destination Id 08:4b:37:1e:f3:6e:1e:dc 68 Hopcount 1, Original Hopcount 1, Nonce 0xa0ccbd40, Source Id 08:4b:37:1e:f3:6e:1e:dc, Destination Id 6a:a3:c4:ff:fe:f4:84:1e
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 17 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */ 18 u8 pnonce[WPA_NONCE_LEN]; /* Peer Nonce */
|
/packages/services/Telephony/src/com/android/phone/common/mail/store/imap/ |
DigestMd5Utils.java | 42 private static final String DIGEST_NONCE = "nonce"; 62 public String nonce; field in class:DigestMd5Utils.Data 77 nonce = challenge.get(DIGEST_NONCE); 115 .appendQuoted(DIGEST_NONCE, nonce) 154 { nonce-value, ":" nc-value, ":", 165 a1.append(":").append(data.nonce).append(":").append(data.cnonce); 175 data.nonce + ":" + data.nc + ":" + data.cnonce + ":" + data.qop + ":" + toHex( 219 throw new MessagingException("nonce missing from server DIGEST-MD5 challenge");
|
/packages/services/Telephony/tests/src/com/android/phone/common/mail/store/imap/ |
DigestMd5UtilsTest.java | 29 data.nonce = "OA6MG9tEQGm2hh"; 44 data.nonce = "OA6MG9tEQGm2hh";
|
/system/connectivity/shill/ |
mock_crypto_util_proxy.cc | 49 const std::string& nonce, 57 nonce, signed_data,
|
/external/boringssl/src/crypto/chacha/ |
chacha_generic.c | 57 const uint8_t key[32], const uint8_t nonce[12], 88 const uint8_t key[32], const uint8_t nonce[12], 96 CRYPTO_chacha_20_neon(out, in, in_len, key, nonce, counter); 117 input[13] = U8TO32_LITTLE(nonce + 0); 118 input[14] = U8TO32_LITTLE(nonce + 4); 119 input[15] = U8TO32_LITTLE(nonce + 8);
|
/system/keymaster/ |
ocb_utils.cpp | 121 const KeymasterKeyBlob& plaintext, const Buffer& nonce, 125 if (nonce.available_read() != OCB_NONCE_LENGTH) 140 int ae_err = ae_encrypt(ctx.get(), nonce.peek_read(), plaintext.key_material, 157 const KeymasterKeyBlob& ciphertext, const Buffer& nonce, 161 if (nonce.available_read() != OCB_NONCE_LENGTH || tag.available_read() != OCB_TAG_LENGTH) 176 int ae_err = ae_decrypt(ctx.get(), nonce.peek_read(), ciphertext.key_material,
|
/external/boringssl/src/include/openssl/ |
aead.h | 29 * message has a unique, per-message nonce and, optionally, additional data 55 * When sealing messages, a nonce must be given. The length of the nonce is 57 * nonce must be unique for all messages with the same key*. This is critically 58 * important - nonce reuse may completely undermine the security of the AEAD. 61 * randomly. The nonce must be passed into the "open" operation by the receiver 113 * If the nonce is empty then the default nonce will be used, otherwise it must 125 * authentication. The nonce is 12 bytes; the bottom 32-bits are used as the 187 /* EVP_AEAD_nonce_length returns the length, in bytes, of the per-message nonce [all...] |
/libcore/ojluni/src/main/java/sun/net/www/protocol/http/ |
DigestAuthentication.java | 64 private String nonce; field in class:DigestAuthentication.Parameters 71 // Force the HA1 value to be recalculated because the nonce has changed 89 nonce = null; 143 synchronized String getNonce () { return nonce;} 146 if (!s.equals(nonce)) { 147 nonce=s; 259 String newNonce = p.findValue ("nonce"); 276 params.setNonce (p.findValue("nonce")); 293 if (params.nonce == null || authMethod == null || pw == null || realm == null) { 335 String nonce = params.getNonce () local 393 String nonce = params.getNonce (); local [all...] |
/external/curl/lib/ |
curl_sasl.c | 501 * nonce [in/out] - The buffer where the nonce will be stored. 502 * nlen [in] - The length of the nonce buffer. 513 char *nonce, size_t nlen, 534 /* Retrieve nonce string from the challenge */ 535 if(!sasl_digest_get_key_value((char *)chlg, "nonce=\"", nonce, nlen, '\"')) { 597 char nonce[64]; local 610 result = sasl_decode_digest_md5_message(chlg64, nonce, sizeof(nonce), [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 185 u8 *buf, *rpchannel, nonce[16], *decrypted; local 259 os_memset(nonce, 0, 12); 260 os_memcpy(nonce + 12, pchannel, 4); 270 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", 271 nonce, sizeof(nonce)); 284 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), 328 /* nonce++ */ 329 inc_byte_array(nonce, sizeof(nonce)) [all...] |
/frameworks/base/docs/html/training/safetynet/ |
index.jd | 168 single use token in the form of a number used once, or <em>nonce</em>, as part of your request. A 169 nonce is a random token generated in a cryptographically secure manner. 173 You can obtain a nonce by generating one within your app each time you make a compatibility check 174 request. As a more secure option, you can obtain a nonce from your own server, using a secure 179 A nonce used with a SafetyNet request should be at least 16 bytes in length. After you make a 180 check request, the response from the SafetyNet service includes your nonce, so you can verify it 181 against the one you sent. As the name indicates, you should only use a nonce value once, for a 182 single check request. Use a different nonce for any subsequent check requests. For tips on using 192 After you have established a connection to Google Play services and created a nonce, you are 199 byte[] nonce = getRequestNonce(); // Should be at least 16 bytes in length [all...] |
/external/apache-http/android/src/android/net/http/ |
RequestHandle.java | 239 String nonce, 245 username, password, realm, nonce, QOP, algorithm, opaque); 303 String nonce, 326 String digest = computeDigest(A1, A2, nonce, QOP, nc, cnonce); 331 response += "nonce=" + doubleQuote(nonce) + ", "; 365 String A1, String A2, String nonce, String QOP, String nc, String cnonce) { 371 return KD(H(A1), nonce + ":" + H(A2)); 374 return KD(H(A1), nonce + ":" + nc + ":" + cnonce + ":" + QOP + ":" + H(A2));
|
/libcore/ojluni/src/main/java/sun/security/timestamp/ |
TimestampToken.java | 55 * nonce INTEGER OPTIONAL, 81 private BigInteger nonce; field in class:TimestampToken 115 return nonce; 156 if (d.tag == DerValue.tag_Integer) { // must be the nonce 157 nonce = d.getBigInteger();
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
GCMBlockCipher.java | 41 private byte[] nonce; field in class:GCMBlockCipher 107 nonce = param.getNonce(); 123 nonce = param.getIV(); 136 if (nonce == null || nonce.length < 1) 141 // TODO Restrict macSize to 16 if nonce length not 12? 163 if (nonce.length == 12) 165 System.arraycopy(nonce, 0, J0, 0, nonce.length); 170 gHASH(J0, nonce, nonce.length) [all...] |
/external/nist-sip/java/gov/nist/javax/sip/header/ |
Credentials.java | 50 private static String NONCE = ParameterNames.NONCE; 112 else if (nameValue.getName().compareToIgnoreCase(NONCE) == 0)
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 94 u8 *buf, *pchannel, nonce[16]; local 133 os_memset(nonce, 0, sizeof(nonce)); 135 os_memcpy(pchannel, nonce + 12, 4); 140 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), 334 u8 *decrypted, nonce[16]; local 362 wpa_printf(MSG_DEBUG, "EAP-PSK: Nonce did not increase"); 366 os_memset(nonce, 0, 12); 367 os_memcpy(nonce + 12, pos, 4) [all...] |