HomeSort by relevance Sort by last modified time
    Searched full:nonce (Results 151 - 175 of 537) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/tcpdump/tests/
ikev2fourv.out 18 (nonce: len=32 nonce=(6128ebd023a864e94a7ffb74bf7cce2fd4367322b8b073f942282bd52ebfe3e6) )
42 (nonce: len=32 nonce=(6128ebd023a864e94a7ffb74bf7cce2fd4367322b8b073f942282bd52ebfe3e6) )
54 (nonce: len=32 nonce=(b31c379f272ce2984bd17ca38c8729e1edbc081a14fb0f67cff81721dfeec1f9) )
ikev2fourv4.out 18 (nonce: len=32 nonce=(6128ebd023a864e94a7ffb74bf7cce2fd4367322b8b073f942282bd52ebfe3e6) )
42 (nonce: len=32 nonce=(6128ebd023a864e94a7ffb74bf7cce2fd4367322b8b073f942282bd52ebfe3e6) )
54 (nonce: len=32 nonce=(b31c379f272ce2984bd17ca38c8729e1edbc081a14fb0f67cff81721dfeec1f9) )
babel1v.out 33 Hopcount 1, Original Hopcount 1, Nonce 0xde3e5127, Source Id 02:18:f3:ff:fe:a9:91:4e, Destination Id ff:ff:ff:ff:ff:ff:ff:ff
36 Hopcount 2, Original Hopcount 2, Nonce 0xdf3e5127, Source Id 02:18:f3:ff:fe:a9:91:4e, Destination Id ff:ff:ff:ff:ff:ff:ff:ff
39 Hopcount 1, Original Hopcount 1, Nonce 0xc9b83d0d, Source Id 79:40:14:7f:b6:6d:c3:29, Destination Id 02:18:f3:ff:fe:a9:91:4e
42 Hopcount 1, Original Hopcount 1, Nonce 0xe03e5127, Source Id 02:18:f3:ff:fe:a9:91:4e, Destination Id 79:40:14:7f:b6:6d:c3:29
45 Hopcount 1, Original Hopcount 2, Nonce 0xdf3e5127, Source Id 02:18:f3:ff:fe:a9:91:4e, Destination Id ff:ff:ff:ff:ff:ff:ff:ff
52 Hopcount 2, Original Hopcount 2, Nonce 0xcab83d0d, Source Id 79:40:14:7f:b6:6d:c3:29, Destination Id 02:18:f3:ff:fe:a9:91:4e
55 Hopcount 1, Original Hopcount 1, Nonce 0xe13e5127, Source Id 02:18:f3:ff:fe:a9:91:4e, Destination Id 79:40:14:7f:b6:6d:c3:29
65 Hopcount 1, Original Hopcount 1, Nonce 0xcbb83d0d, Source Id 79:40:14:7f:b6:6d:c3:29, Destination Id 02:18:f3:ff:fe:a9:91:4e
ikev2pI2.out 35 (nonce[C]: len=16 nonce=(b5ce8419095c6e2b6b62d3055305b3c4) )
isakmp5-v.out 18 (nonce: n len=20)
28 (nonce: n len=20)
  /prebuilts/go/darwin-x86/src/crypto/tls/
cipher_suites.go 134 // fixedNonceAEAD wraps an AEAD and prefixes a fixed portion of the nonce to
137 // sealNonce and openNonce are buffers where the larger nonce will be
147 func (f *fixedNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte {
148 copy(f.sealNonce[len(f.sealNonce)-8:], nonce)
152 func (f *fixedNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) {
153 copy(f.openNonce[len(f.openNonce)-8:], nonce)
  /prebuilts/go/linux-x86/src/crypto/tls/
cipher_suites.go 134 // fixedNonceAEAD wraps an AEAD and prefixes a fixed portion of the nonce to
137 // sealNonce and openNonce are buffers where the larger nonce will be
147 func (f *fixedNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte {
148 copy(f.sealNonce[len(f.sealNonce)-8:], nonce)
152 func (f *fixedNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) {
153 copy(f.openNonce[len(f.openNonce)-8:], nonce)
  /external/tpm2/
StartAuthSession.c 22 // TPM_RC_SIZE nonce less than 16 octets or greater than the size of the digest
42 // Check input nonce size. IT should be at least 16 bytes but not larger
  /frameworks/base/include/storage/
IMountService.h 67 const int32_t nonce) = 0;
69 const sp<IObbActionListener>& token, const int32_t nonce) = 0;
  /external/curl/tests/data/
test1072 23 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
test169 46 WWW-Authenticate: Digest realm="r e a l m", nonce="abcdef"
62 WWW-Authenticate: Digest realm="r e a l m", nonce="abcdef"
122 Authorization: Digest username="digest", realm="r e a l m", nonce="abcdef", uri="/169", response="95d48591985a03c4b49cb962aa7bd3e6"
test258 22 Proxy-Authenticate: Digest realm="many secrets", nonce="911"
39 Proxy-Authenticate: Digest realm="many secrets", nonce="911"
110 Proxy-Authorization: Digest username="uuuser", realm="many secrets", nonce="911", uri="/we/want/258", response="2501654ca391f0b5c8c12a1da77e34cd"
test259 20 Proxy-Authenticate: Digest realm="many secrets", nonce="911"
36 Proxy-Authenticate: Digest realm="many secrets", nonce="911"
107 Proxy-Authorization: Digest username="uuuser", realm="many secrets", nonce="911", uri="/we/want/259", response="b479994d13e60f3aa192a67c5892ddc5"
  /external/srtp/
TODO 55 into 'nonce' datatype.
  /external/wpa_supplicant_8/src/eap_common/
eap_tlv_common.h 76 u8 nonce[32]; member in struct:eap_tlv_crypto_binding_tlv
  /external/curl/lib/
http_digest.c 39 WWW-Authenticate: Digest realm="testrealm", nonce="1053604598"
40 Proxy-Authenticate: Digest realm="testrealm", nonce="1053604598"
123 have_chlg = digest->nonce ? TRUE : FALSE;
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/
pairingsession.cc 105 LOG(ERROR) << "Failed to extract nonce";
159 nonce_ = new Nonce(random, random + bytes_needed);
263 LOG(ERROR) << "Nonce not set";
  /external/jetty/src/java/org/eclipse/jetty/client/security/
DigestAuthentication.java 53 buffer.append(", ").append("nonce").append('=').append('"').append(String.valueOf(details.get("nonce"))).append('"');
96 md.update(String.valueOf(details.get("nonce")).getBytes(StringUtil.__ISO_8859_1));
  /external/okhttp/okhttp-ws/src/main/java/com/squareup/okhttp/ws/
WebSocketCall.java 65 byte[] nonce = new byte[16];
66 random.nextBytes(nonce);
67 key = ByteString.of(nonce).base64();
  /external/webrtc/webrtc/p2p/base/
turnserver.cc 312 // Fail if there is M-I but no username, nonce, or realm.
319 // Fail if bad nonce.
334 // Fail if one-time-use nonce feature is enabled.
396 // Generate a nonce of the form hex(now + HMAC-MD5(nonce_key_, now))
399 std::string nonce = rtc::hex_encode(input.c_str(), input.size()); local
400 nonce += rtc::ComputeHmac(rtc::DIGEST_MD5, nonce_key_, input);
401 ASSERT(nonce.size() == kNonceSize);
402 return nonce;
405 bool TurnServer::ValidateNonce(const std::string& nonce) const {
407 if (nonce.size() != kNonceSize)
    [all...]
  /libcore/ojluni/src/main/java/sun/security/provider/certpath/
OCSPRequest.java 85 private byte[] nonce; field in class:OCSPRequest
122 nonce = ext.getValue();
154 return nonce;
  /system/connectivity/shill/dbus_bindings/
org.chromium.flimflam.Manager.dbus-xml 109 <arg name="nonce" type="s" direction="in"/>
120 <arg name="nonce" type="s" direction="in"/>
132 <arg name="nonce" type="s" direction="in"/>
  /system/keymaster/
android_keymaster_test_utils.cpp 574 keymaster_padding_t padding, const string& nonce) {
579 begin_params.push_back(TAG_NONCE, nonce.data(), nonce.size());
585 keymaster_padding_t padding, const string& nonce) {
590 begin_params.push_back(TAG_NONCE, nonce.data(), nonce.size());
597 keymaster_padding_t padding, const string& nonce) {
602 begin_params.push_back(TAG_NONCE, nonce.data(), nonce.size());
637 void Keymaster2Test::CheckAesCtrTestVector(const string& key, const string& nonce,
    [all...]
  /system/tpm/trunks/
hmac_authorization_delegate.h 139 // This method regenerates the caller nonce. The new nonce is the same
140 // length as the previous nonce. The buffer is filled with random data using
  /external/autotest/client/site_tests/network_DestinationVerification/
network_DestinationVerification.py 39 "nonce":"+6KSGuRu833m1+TP",
65 "nonce": "pTwRhdsB5cb3Ev8o",
92 "nonce": "E1oqNODwWVIfSjUs",
225 # ssid,udn,bssid,key,nonce
231 sign_bundle['nonce'])
341 logging.info('Checking bad nonce in unsigned_data.')
343 test_data['sign']['nonce'] = 'does not match'

Completed in 614 milliseconds

1 2 3 4 5 67 8 91011>>