/frameworks/base/obex/javax/obex/ |
ClientSession.java | 112 if (header.nonce != null) { 114 System.arraycopy(header.nonce, 0, mChallengeDigest, 0, 16); 180 if (head.nonce != null) { 182 System.arraycopy(head.nonce, 0, mChallengeDigest, 0, 16); 235 if (header.nonce != null) { 237 System.arraycopy(header.nonce, 0, mChallengeDigest, 0, 16); 300 if (head.nonce != null) { 302 System.arraycopy(head.nonce, 0, mChallengeDigest, 0, 16); 346 if (headset.nonce != null) { 348 System.arraycopy(headset.nonce, 0, mChallengeDigest, 0, 16) [all...] |
/system/keymaster/ |
ae.h | 94 int ae_encrypt(ae_ctx* ctx, const void* nonce, const void* pt, int pt_len, const void* ad, 102 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce. 112 * If nonce!=NULL then a message is being initiated. If final!=0 113 * then a message is being finalized. If final==0 or nonce==NULL 114 * then the incremental interface is being used. If nonce!=NULL and 124 int ae_decrypt(ae_ctx* ctx, const void* nonce, const void* ct, int ct_len, const void* ad, 132 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce. 143 * If nonce!=NULL then "ct" points to the start of a ciphertext. If final!= [all...] |
ocb.c | 747 static block gen_offset_from_nonce(ae_ctx* ctx, const void* nonce) { 759 /* Replace cached nonce Top if needed */ 771 tmp.u32[1] = ((uint32_t*)nonce)[0]; 772 tmp.u32[2] = ((uint32_t*)nonce)[1]; 773 tmp.u32[3] = ((uint32_t*)nonce)[2]; 774 idx = (unsigned)(tmp.u8[15] & 0x3f); /* Get low 6 bits of nonce */ 775 tmp.u8[15] = tmp.u8[15] & 0xc0; /* Zero low 6 bits of nonce */ [all...] |
/external/boringssl/src/crypto/cipher/ |
e_ssl3.c | 128 const uint8_t *nonce, size_t nonce_len, 213 const uint8_t *nonce, size_t nonce_len, 365 0, /* nonce len */ 379 0, /* nonce len */ 393 0, /* nonce len */ 407 0, /* nonce len */ 421 0, /* nonce len */ 435 0, /* nonce len */
|
aead.c | 101 size_t max_out_len, const uint8_t *nonce, 116 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in, 130 size_t max_out_len, const uint8_t *nonce, 138 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in,
|
e_aes.c | [all...] |
/external/curl/tests/data/ |
test579 | 20 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
41 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
|
/external/dbus/dbus/ |
dbus-server-socket.c | 30 #include "dbus-nonce.h" 57 DBusNonceFile *noncefile; /**< Nonce file used to authenticate clients */ 384 * @param use_nonce whether to use a nonce for low-level authentication (nonce-tcp transport) or not (tcp transport) 440 if (!_dbus_string_append (&address, use_nonce ? "nonce-tcp:host=" : "tcp:host=") || 512 * addresses (well, currently only tcp and nonce-tcp). 533 if (strcmp (method, "tcp") == 0 || strcmp (method, "nonce-tcp") == 0) 546 family, error, strcmp (method, "nonce-tcp") == 0 ? TRUE : FALSE);
|
dbus-server-socket.h | 28 #include <dbus/dbus-nonce.h>
|
/external/llvm/lib/Transforms/IPO/ |
BarrierNoopPass.cpp | 12 // This pass is a nonce pass intended to allow manipulation of the implicitly 26 /// \brief A nonce module pass used to place a barrier in a pass manager.
|
/frameworks/base/docs/html-intl/intl/zh-cn/google/play/billing/ |
billing_best_practices.jd | 15 <li><a href="#nonce">???????</a></li> 63 <h3 id="nonce">???????</h3>
|
/system/connectivity/shill/ |
mock_crypto_util_proxy.h | 43 const std::string& nonce, 57 const std::string& nonce,
|
/external/autotest/client/cros/scripts/ |
destination | 15 common_args = ['<certificate>', '<public_key>', '<nonce>',
|
/external/boringssl/src/ssl/test/runner/poly1305/ |
poly1305.go | 15 used with a fixed key in order to generate one-time keys from an nonce.
|
/external/conscrypt/src/main/java/org/conscrypt/ |
GCMParameters.java | 28 /** Actually the nonce value for the GCM operation. */
|
/external/dbus/test/ |
loopback.c | 198 g_test_add ("/connect/nonce-tcp", Fixture, "nonce-tcp:host=127.0.0.1", setup, 200 g_test_add ("/message/nonce-tcp", Fixture, "nonce-tcp:host=127.0.0.1", setup,
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
pairingsession.h | 160 // Gets the nonce value. 161 const Nonce* nonce() const { return nonce_; } function in class:polo::pairing::PairingSession 193 Nonce* nonce_;
|
/external/wpa_supplicant_8/hs20/server/www/ |
spp.php | 27 $needed = array('nonce'=>1, 'nc'=>1, 'cnonce'=>1, 'qop'=>1, 'username'=>1, 72 $resp = md5($A1 . ':' . $data['nonce'] . ':' . $data['nc'] . ':' . 87 '",qop="auth",nonce="'.uniqid().'",opaque="'.md5($realm).'"'); 109 '",qop="auth",nonce="'.uniqid().'",opaque="'.md5($realm).'"');
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ie.h | 27 const u8 *nonce; member in struct:wpa_eapol_ie_parse
|
/frameworks/base/include/storage/ |
IObbActionListener.h | 32 virtual void onObbResult(const String16& filename, const int32_t nonce, const int32_t state) = 0;
|
/external/boringssl/src/crypto/cipher/test/ |
make_legacy_aead_tests.go | 116 nonce []byte 185 var nonce []byte 213 nonce = iv 266 nonce: nonce, 280 fmt.Printf("NONCE: %s\n", hex.EncodeToString(t.nonce))
|
/system/tpm/trunks/ |
hmac_authorization_delegate.cc | 69 auth.nonce = caller_nonce_; 129 if (auth_response.nonce.size < kNonceMinSize || 130 auth_response.nonce.size > kNonceMaxSize) { 134 tpm_nonce_ = auth_response.nonce; 322 "Error regnerating a cryptographically random nonce.";
|
/external/ImageMagick/MagickCore/ |
cipher.c | 532 unsigned char *nonce) 539 nonce[i]++; 540 if (nonce[i] != 0) 605 *nonce; 613 Generate decipher key and nonce. 631 nonce=SplitStringInfo(key,GetStringInfoLength(key)/2); 632 if (nonce == (StringInfo *) NULL) 642 UpdateSignature(signature_info,nonce); 644 SetStringInfoLength(nonce,sizeof(extent)); 645 SetStringInfoDatum(nonce,(const unsigned char *) &extent) 596 *nonce; local 809 *nonce; local [all...] |
random.c | 86 *nonce, 180 *nonce; 187 random_info->nonce=AcquireStringInfo(2*GetSignatureDigestsize( 189 ResetStringInfo(random_info->nonce); 201 Seed random nonce. 203 nonce=GenerateEntropicChaos(random_info); 204 if (nonce == (StringInfo *) NULL) 207 UpdateSignature(random_info->signature_info,nonce); 209 SetStringInfoLength(nonce,(GetSignatureDigestsize( 211 SetStringInfo(nonce,GetSignatureDigest(random_info->signature_info)) 84 *nonce, member in struct:_RandomInfo 174 *nonce; local [all...] |
/external/tcpdump/ |
print-mptcp.c | 86 uint8_t nonce[4]; member in struct:mp_join::__anon24465::__anon24466 90 uint8_t nonce[4]; member in struct:mp_join::__anon24465::__anon24467 215 ND_PRINT((ndo, " token 0x%x" " nonce 0x%x", 217 EXTRACT_32BITS(mpj->u.syn.nonce))); 220 ND_PRINT((ndo, " hmac 0x%" PRIx64 " nonce 0x%x", 222 EXTRACT_32BITS(mpj->u.synack.nonce)));
|