/external/tcpdump/tests/ |
ikev2fourv.out | 18 (nonce: len=32 nonce=(6128ebd023a864e94a7ffb74bf7cce2fd4367322b8b073f942282bd52ebfe3e6) ) 42 (nonce: len=32 nonce=(6128ebd023a864e94a7ffb74bf7cce2fd4367322b8b073f942282bd52ebfe3e6) ) 54 (nonce: len=32 nonce=(b31c379f272ce2984bd17ca38c8729e1edbc081a14fb0f67cff81721dfeec1f9) )
|
ikev2fourv4.out | 18 (nonce: len=32 nonce=(6128ebd023a864e94a7ffb74bf7cce2fd4367322b8b073f942282bd52ebfe3e6) ) 42 (nonce: len=32 nonce=(6128ebd023a864e94a7ffb74bf7cce2fd4367322b8b073f942282bd52ebfe3e6) ) 54 (nonce: len=32 nonce=(b31c379f272ce2984bd17ca38c8729e1edbc081a14fb0f67cff81721dfeec1f9) )
|
babel1v.out | 33 Hopcount 1, Original Hopcount 1, Nonce 0xde3e5127, Source Id 02:18:f3:ff:fe:a9:91:4e, Destination Id ff:ff:ff:ff:ff:ff:ff:ff 36 Hopcount 2, Original Hopcount 2, Nonce 0xdf3e5127, Source Id 02:18:f3:ff:fe:a9:91:4e, Destination Id ff:ff:ff:ff:ff:ff:ff:ff 39 Hopcount 1, Original Hopcount 1, Nonce 0xc9b83d0d, Source Id 79:40:14:7f:b6:6d:c3:29, Destination Id 02:18:f3:ff:fe:a9:91:4e 42 Hopcount 1, Original Hopcount 1, Nonce 0xe03e5127, Source Id 02:18:f3:ff:fe:a9:91:4e, Destination Id 79:40:14:7f:b6:6d:c3:29 45 Hopcount 1, Original Hopcount 2, Nonce 0xdf3e5127, Source Id 02:18:f3:ff:fe:a9:91:4e, Destination Id ff:ff:ff:ff:ff:ff:ff:ff 52 Hopcount 2, Original Hopcount 2, Nonce 0xcab83d0d, Source Id 79:40:14:7f:b6:6d:c3:29, Destination Id 02:18:f3:ff:fe:a9:91:4e 55 Hopcount 1, Original Hopcount 1, Nonce 0xe13e5127, Source Id 02:18:f3:ff:fe:a9:91:4e, Destination Id 79:40:14:7f:b6:6d:c3:29 65 Hopcount 1, Original Hopcount 1, Nonce 0xcbb83d0d, Source Id 79:40:14:7f:b6:6d:c3:29, Destination Id 02:18:f3:ff:fe:a9:91:4e
|
ikev2pI2.out | 35 (nonce[C]: len=16 nonce=(b5ce8419095c6e2b6b62d3055305b3c4) )
|
isakmp5-v.out | 18 (nonce: n len=20) 28 (nonce: n len=20)
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
cipher_suites.go | 134 // fixedNonceAEAD wraps an AEAD and prefixes a fixed portion of the nonce to 137 // sealNonce and openNonce are buffers where the larger nonce will be 147 func (f *fixedNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte { 148 copy(f.sealNonce[len(f.sealNonce)-8:], nonce) 152 func (f *fixedNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) { 153 copy(f.openNonce[len(f.openNonce)-8:], nonce)
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
cipher_suites.go | 134 // fixedNonceAEAD wraps an AEAD and prefixes a fixed portion of the nonce to 137 // sealNonce and openNonce are buffers where the larger nonce will be 147 func (f *fixedNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte { 148 copy(f.sealNonce[len(f.sealNonce)-8:], nonce) 152 func (f *fixedNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) { 153 copy(f.openNonce[len(f.openNonce)-8:], nonce)
|
/external/tpm2/ |
StartAuthSession.c | 22 // TPM_RC_SIZE nonce less than 16 octets or greater than the size of the digest 42 // Check input nonce size. IT should be at least 16 bytes but not larger
|
/frameworks/base/include/storage/ |
IMountService.h | 67 const int32_t nonce) = 0; 69 const sp<IObbActionListener>& token, const int32_t nonce) = 0;
|
/external/curl/tests/data/ |
test1072 | 23 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
|
test169 | 46 WWW-Authenticate: Digest realm="r e a l m", nonce="abcdef"
62 WWW-Authenticate: Digest realm="r e a l m", nonce="abcdef"
122 Authorization: Digest username="digest", realm="r e a l m", nonce="abcdef", uri="/169", response="95d48591985a03c4b49cb962aa7bd3e6"
|
test258 | 22 Proxy-Authenticate: Digest realm="many secrets", nonce="911" 39 Proxy-Authenticate: Digest realm="many secrets", nonce="911" 110 Proxy-Authorization: Digest username="uuuser", realm="many secrets", nonce="911", uri="/we/want/258", response="2501654ca391f0b5c8c12a1da77e34cd"
|
test259 | 20 Proxy-Authenticate: Digest realm="many secrets", nonce="911" 36 Proxy-Authenticate: Digest realm="many secrets", nonce="911" 107 Proxy-Authorization: Digest username="uuuser", realm="many secrets", nonce="911", uri="/we/want/259", response="b479994d13e60f3aa192a67c5892ddc5"
|
/external/srtp/ |
TODO | 55 into 'nonce' datatype.
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_tlv_common.h | 76 u8 nonce[32]; member in struct:eap_tlv_crypto_binding_tlv
|
/external/curl/lib/ |
http_digest.c | 39 WWW-Authenticate: Digest realm="testrealm", nonce="1053604598" 40 Proxy-Authenticate: Digest realm="testrealm", nonce="1053604598" 123 have_chlg = digest->nonce ? TRUE : FALSE;
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
pairingsession.cc | 105 LOG(ERROR) << "Failed to extract nonce"; 159 nonce_ = new Nonce(random, random + bytes_needed); 263 LOG(ERROR) << "Nonce not set";
|
/external/jetty/src/java/org/eclipse/jetty/client/security/ |
DigestAuthentication.java | 53 buffer.append(", ").append("nonce").append('=').append('"').append(String.valueOf(details.get("nonce"))).append('"'); 96 md.update(String.valueOf(details.get("nonce")).getBytes(StringUtil.__ISO_8859_1));
|
/external/okhttp/okhttp-ws/src/main/java/com/squareup/okhttp/ws/ |
WebSocketCall.java | 65 byte[] nonce = new byte[16]; 66 random.nextBytes(nonce); 67 key = ByteString.of(nonce).base64();
|
/external/webrtc/webrtc/p2p/base/ |
turnserver.cc | 312 // Fail if there is M-I but no username, nonce, or realm. 319 // Fail if bad nonce. 334 // Fail if one-time-use nonce feature is enabled. 396 // Generate a nonce of the form hex(now + HMAC-MD5(nonce_key_, now)) 399 std::string nonce = rtc::hex_encode(input.c_str(), input.size()); local 400 nonce += rtc::ComputeHmac(rtc::DIGEST_MD5, nonce_key_, input); 401 ASSERT(nonce.size() == kNonceSize); 402 return nonce; 405 bool TurnServer::ValidateNonce(const std::string& nonce) const { 407 if (nonce.size() != kNonceSize) [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
OCSPRequest.java | 85 private byte[] nonce; field in class:OCSPRequest 122 nonce = ext.getValue(); 154 return nonce;
|
/system/connectivity/shill/dbus_bindings/ |
org.chromium.flimflam.Manager.dbus-xml | 109 <arg name="nonce" type="s" direction="in"/> 120 <arg name="nonce" type="s" direction="in"/> 132 <arg name="nonce" type="s" direction="in"/>
|
/system/keymaster/ |
android_keymaster_test_utils.cpp | 574 keymaster_padding_t padding, const string& nonce) { 579 begin_params.push_back(TAG_NONCE, nonce.data(), nonce.size()); 585 keymaster_padding_t padding, const string& nonce) { 590 begin_params.push_back(TAG_NONCE, nonce.data(), nonce.size()); 597 keymaster_padding_t padding, const string& nonce) { 602 begin_params.push_back(TAG_NONCE, nonce.data(), nonce.size()); 637 void Keymaster2Test::CheckAesCtrTestVector(const string& key, const string& nonce, [all...] |
/system/tpm/trunks/ |
hmac_authorization_delegate.h | 139 // This method regenerates the caller nonce. The new nonce is the same 140 // length as the previous nonce. The buffer is filled with random data using
|
/external/autotest/client/site_tests/network_DestinationVerification/ |
network_DestinationVerification.py | 39 "nonce":"+6KSGuRu833m1+TP", 65 "nonce": "pTwRhdsB5cb3Ev8o", 92 "nonce": "E1oqNODwWVIfSjUs", 225 # ssid,udn,bssid,key,nonce 231 sign_bundle['nonce']) 341 logging.info('Checking bad nonce in unsigned_data.') 343 test_data['sign']['nonce'] = 'does not match'
|