HomeSort by relevance Sort by last modified time
    Searched full:nonce (Results 126 - 150 of 537) sorted by null

1 2 3 4 56 7 8 91011>>

  /frameworks/base/obex/javax/obex/
ClientSession.java 112 if (header.nonce != null) {
114 System.arraycopy(header.nonce, 0, mChallengeDigest, 0, 16);
180 if (head.nonce != null) {
182 System.arraycopy(head.nonce, 0, mChallengeDigest, 0, 16);
235 if (header.nonce != null) {
237 System.arraycopy(header.nonce, 0, mChallengeDigest, 0, 16);
300 if (head.nonce != null) {
302 System.arraycopy(head.nonce, 0, mChallengeDigest, 0, 16);
346 if (headset.nonce != null) {
348 System.arraycopy(headset.nonce, 0, mChallengeDigest, 0, 16)
    [all...]
  /system/keymaster/
ae.h 94 int ae_encrypt(ae_ctx* ctx, const void* nonce, const void* pt, int pt_len, const void* ad,
102 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce.
112 * If nonce!=NULL then a message is being initiated. If final!=0
113 * then a message is being finalized. If final==0 or nonce==NULL
114 * then the incremental interface is being used. If nonce!=NULL and
124 int ae_decrypt(ae_ctx* ctx, const void* nonce, const void* ct, int ct_len, const void* ad,
132 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce.
143 * If nonce!=NULL then "ct" points to the start of a ciphertext. If final!=
    [all...]
ocb.c 747 static block gen_offset_from_nonce(ae_ctx* ctx, const void* nonce) {
759 /* Replace cached nonce Top if needed */
771 tmp.u32[1] = ((uint32_t*)nonce)[0];
772 tmp.u32[2] = ((uint32_t*)nonce)[1];
773 tmp.u32[3] = ((uint32_t*)nonce)[2];
774 idx = (unsigned)(tmp.u8[15] & 0x3f); /* Get low 6 bits of nonce */
775 tmp.u8[15] = tmp.u8[15] & 0xc0; /* Zero low 6 bits of nonce */
    [all...]
  /external/boringssl/src/crypto/cipher/
e_ssl3.c 128 const uint8_t *nonce, size_t nonce_len,
213 const uint8_t *nonce, size_t nonce_len,
365 0, /* nonce len */
379 0, /* nonce len */
393 0, /* nonce len */
407 0, /* nonce len */
421 0, /* nonce len */
435 0, /* nonce len */
aead.c 101 size_t max_out_len, const uint8_t *nonce,
116 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in,
130 size_t max_out_len, const uint8_t *nonce,
138 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in,
e_aes.c     [all...]
  /external/curl/tests/data/
test579 20 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
41 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
  /external/dbus/dbus/
dbus-server-socket.c 30 #include "dbus-nonce.h"
57 DBusNonceFile *noncefile; /**< Nonce file used to authenticate clients */
384 * @param use_nonce whether to use a nonce for low-level authentication (nonce-tcp transport) or not (tcp transport)
440 if (!_dbus_string_append (&address, use_nonce ? "nonce-tcp:host=" : "tcp:host=") ||
512 * addresses (well, currently only tcp and nonce-tcp).
533 if (strcmp (method, "tcp") == 0 || strcmp (method, "nonce-tcp") == 0)
546 family, error, strcmp (method, "nonce-tcp") == 0 ? TRUE : FALSE);
dbus-server-socket.h 28 #include <dbus/dbus-nonce.h>
  /external/llvm/lib/Transforms/IPO/
BarrierNoopPass.cpp 12 // This pass is a nonce pass intended to allow manipulation of the implicitly
26 /// \brief A nonce module pass used to place a barrier in a pass manager.
  /frameworks/base/docs/html-intl/intl/zh-cn/google/play/billing/
billing_best_practices.jd 15 <li><a href="#nonce">???????</a></li>
63 <h3 id="nonce">???????</h3>
  /system/connectivity/shill/
mock_crypto_util_proxy.h 43 const std::string& nonce,
57 const std::string& nonce,
  /external/autotest/client/cros/scripts/
destination 15 common_args = ['<certificate>', '<public_key>', '<nonce>',
  /external/boringssl/src/ssl/test/runner/poly1305/
poly1305.go 15 used with a fixed key in order to generate one-time keys from an nonce.
  /external/conscrypt/src/main/java/org/conscrypt/
GCMParameters.java 28 /** Actually the nonce value for the GCM operation. */
  /external/dbus/test/
loopback.c 198 g_test_add ("/connect/nonce-tcp", Fixture, "nonce-tcp:host=127.0.0.1", setup,
200 g_test_add ("/message/nonce-tcp", Fixture, "nonce-tcp:host=127.0.0.1", setup,
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/
pairingsession.h 160 // Gets the nonce value.
161 const Nonce* nonce() const { return nonce_; } function in class:polo::pairing::PairingSession
193 Nonce* nonce_;
  /external/wpa_supplicant_8/hs20/server/www/
spp.php 27 $needed = array('nonce'=>1, 'nc'=>1, 'cnonce'=>1, 'qop'=>1, 'username'=>1,
72 $resp = md5($A1 . ':' . $data['nonce'] . ':' . $data['nc'] . ':' .
87 '",qop="auth",nonce="'.uniqid().'",opaque="'.md5($realm).'"');
109 '",qop="auth",nonce="'.uniqid().'",opaque="'.md5($realm).'"');
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ie.h 27 const u8 *nonce; member in struct:wpa_eapol_ie_parse
  /frameworks/base/include/storage/
IObbActionListener.h 32 virtual void onObbResult(const String16& filename, const int32_t nonce, const int32_t state) = 0;
  /external/boringssl/src/crypto/cipher/test/
make_legacy_aead_tests.go 116 nonce []byte
185 var nonce []byte
213 nonce = iv
266 nonce: nonce,
280 fmt.Printf("NONCE: %s\n", hex.EncodeToString(t.nonce))
  /system/tpm/trunks/
hmac_authorization_delegate.cc 69 auth.nonce = caller_nonce_;
129 if (auth_response.nonce.size < kNonceMinSize ||
130 auth_response.nonce.size > kNonceMaxSize) {
134 tpm_nonce_ = auth_response.nonce;
322 "Error regnerating a cryptographically random nonce.";
  /external/ImageMagick/MagickCore/
cipher.c 532 unsigned char *nonce)
539 nonce[i]++;
540 if (nonce[i] != 0)
605 *nonce;
613 Generate decipher key and nonce.
631 nonce=SplitStringInfo(key,GetStringInfoLength(key)/2);
632 if (nonce == (StringInfo *) NULL)
642 UpdateSignature(signature_info,nonce);
644 SetStringInfoLength(nonce,sizeof(extent));
645 SetStringInfoDatum(nonce,(const unsigned char *) &extent)
596 *nonce; local
809 *nonce; local
    [all...]
random.c 86 *nonce,
180 *nonce;
187 random_info->nonce=AcquireStringInfo(2*GetSignatureDigestsize(
189 ResetStringInfo(random_info->nonce);
201 Seed random nonce.
203 nonce=GenerateEntropicChaos(random_info);
204 if (nonce == (StringInfo *) NULL)
207 UpdateSignature(random_info->signature_info,nonce);
209 SetStringInfoLength(nonce,(GetSignatureDigestsize(
211 SetStringInfo(nonce,GetSignatureDigest(random_info->signature_info))
84 *nonce, member in struct:_RandomInfo
174 *nonce; local
    [all...]
  /external/tcpdump/
print-mptcp.c 86 uint8_t nonce[4]; member in struct:mp_join::__anon24465::__anon24466
90 uint8_t nonce[4]; member in struct:mp_join::__anon24465::__anon24467
215 ND_PRINT((ndo, " token 0x%x" " nonce 0x%x",
217 EXTRACT_32BITS(mpj->u.syn.nonce)));
220 ND_PRINT((ndo, " hmac 0x%" PRIx64 " nonce 0x%x",
222 EXTRACT_32BITS(mpj->u.synack.nonce)));

Completed in 3159 milliseconds

1 2 3 4 56 7 8 91011>>