HomeSort by relevance Sort by last modified time
    Searched full:nonce (Results 176 - 200 of 537) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/ipsec-tools/src/racoon/
isakmp_quick.c 179 /* generate NONCE value */
180 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size);
181 if (iph2->nonce == NULL)
232 /* create SA;NONCE payload, and KE if need, and IDii, IDir. */
234 + sizeof(*gen) + iph2->nonce->l;
254 /* add NONCE payload */
261 p = set_isakmp_payload(p, iph2->nonce, np);
380 tlen = iph2->nonce->l
388 p = hbuf->v + iph2->nonce->l; /* retain the space for Ni_b */
485 memcpy(hbuf->v, iph2->nonce->v, iph2->nonce->l)
    [all...]
isakmp_agg.c 176 /* generate NONCE value */
177 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
178 if (iph1->nonce == NULL)
241 /* create isakmp NONCE payload */
242 plist = isakmp_plist_append(plist, iph1->nonce, ISAKMP_NPTYPE_NONCE);
982 /* generate NONCE value */
983 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size);
984 if (iph1->nonce == NULL)
1083 /* create isakmp NONCE payload */
1085 iph1->nonce, ISAKMP_NPTYPE_NONCE)
    [all...]
handler.h 153 vchar_t *nonce; /* nonce value */ member in struct:ph1handle
154 vchar_t *nonce_p; /* partner's nonce value */
300 vchar_t *nonce; /* nonce value in phase 2 */ member in struct:ph2handle
301 vchar_t *nonce_p; /* partner's nonce value in phase 2 */
  /system/vold/
KeyStorage.cpp 148 LOG(ERROR) << "GCM encryption but no nonce generated";
152 std::string nonce(reinterpret_cast<const char*>(nonceBlob.data), nonceBlob.data_length);
153 if (!checkSize("nonce", nonce.size(), GCM_NONCE_BYTES)) return false;
160 *ciphertext = nonce + body + mac;
167 auto nonce = ciphertext.substr(0, GCM_NONCE_BYTES); local
169 auto params = addStringParam(beginParams(auth, appId), keymaster::TAG_NONCE, nonce).build();
  /external/tcpdump/
print-babel.c 391 u_short nonce, interval; local
397 nonce = EXTRACT_16BITS(message + 4);
399 ND_PRINT((ndo, "%04x %s", nonce, format_interval(interval)));
405 u_short nonce; local
411 nonce = EXTRACT_16BITS(message + 2);
412 ND_PRINT((ndo, "%04x", nonce));
  /system/connectivity/shill/dbus/
chromeos_manager_dbus_adaptor.cc 421 const string& nonce,
430 manager_->VerifyDestination(certificate, public_key, nonce,
449 const string& nonce,
460 manager_->VerifyAndEncryptCredentials(certificate, public_key, nonce,
481 const string& nonce,
492 manager_->VerifyAndEncryptData(certificate, public_key, nonce,
chromeos_manager_dbus_adaptor.h 135 const std::string& nonce,
143 const std::string& nonce,
152 const std::string& nonce,
  /system/keymaster/
android_keymaster_test_utils.h 267 keymaster_padding_t padding, const std::string& nonce);
269 keymaster_padding_t padding, const std::string& nonce);
272 const std::string& nonce);
275 const std::string& nonce);
279 void CheckAesOcbTestVector(const std::string& key, const std::string& nonce,
282 void CheckAesCtrTestVector(const std::string& key, const std::string& nonce,
  /cts/tests/tests/jni/src/android/jni/cts/
JniStaticTest.java 22 * Basic static method tests. The "nonce" class being tested by this
168 StaticNonce nonce = StaticNonce.returnInstance(); local
169 assertSame(StaticNonce.class, nonce.getClass());
  /external/nist-sip/java/gov/nist/javax/sip/header/
AuthenticationInfo.java 110 /** Returns the Nonce Count value of this AuthenticationInfoHeader.
163 /** Sets the Nonce Count of the AuthenticationInfoHeader to the <var>nonceCount</var>
217 || name.equalsIgnoreCase(ParameterNames.NONCE)
  /external/wpa_supplicant_8/hs20/server/www/
est.php 14 $needed = array('nonce'=>1, 'nc'=>1, 'cnonce'=>1, 'qop'=>1, 'username'=>1,
67 $resp = md5($A1 . ':' . $data['nonce'] . ':' . $data['nc'] . ':' .
99 '",qop="auth",nonce="'.uniqid().'",opaque="'.md5($realm).'"');
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.h 13 * Nonce length must be at least 16 octets. It must also be at least half the
290 const u8 *nonce, size_t nonce_len,
308 const u8 *nonce; member in struct:ikev2_payloads
  /frameworks/base/docs/html/google/play/billing/
billing_best_practices.jd 15 <li><a href="#nonce">Use Secure Random Nonces</a></li>
85 <h3 id="nonce">Use secure random nonces</h3>
89 <p>Also, if you are performing nonce verification on a server, make sure that you generate the
  /system/tpm/attestation/common/
attestation_ca.proto 142 optional bytes nonce = 2;
157 // A 256-bit random value generated by the client. Mixing in this nonce
159 optional bytes nonce = 2;
  /developers/build/prebuilts/gradle/AsymmetricFingerprintDialog/Application/src/main/java/com/example/android/asymmetricfingerprintdialog/server/
StoreBackendImpl.java 42 // It verifies the equality of the transaction including the client nonce
Transaction.java 37 * that the same nonce can't be reused to prevent replay attacks.
  /developers/samples/android/security/AsymmetricFingerprintDialog/Application/src/main/java/com/example/android/asymmetricfingerprintdialog/server/
StoreBackendImpl.java 42 // It verifies the equality of the transaction including the client nonce
Transaction.java 37 * that the same nonce can't be reused to prevent replay attacks.
  /development/samples/browseable/AsymmetricFingerprintDialog/src/com.example.android.asymmetricfingerprintdialog/server/
StoreBackendImpl.java 42 // It verifies the equality of the transaction including the client nonce
Transaction.java 37 * that the same nonce can't be reused to prevent replay attacks.
  /external/apache-http/android/src/android/net/http/
HttpAuthHeader.java 33 private final static String NONCE_TOKEN = "nonce";
52 * rejected because the nonce value was stale. If stale is TRUE
190 * the client was rejected because the nonce value was stale.
204 * @return The nonce value or null if there is none.
  /external/curl/lib/
curl_ntlm_msgs.c 289 memcpy(ntlm->nonce, &type2[24], 8);
303 fprintf(stderr, "\n nonce=");
304 ntlm_print_hex(stderr, (char *)ntlm->nonce, 8);
556 &ntlm->nonce[0], lmresp);
590 /* Fill tmp with challenge(nonce?) + entropy */
591 memcpy(tmp, &ntlm->nonce[0], 8);
621 Curl_ntlm_core_lm_resp(ntbuffer, &ntlm->nonce[0], ntresp);
628 Curl_ntlm_core_lm_resp(lmbuffer, &ntlm->nonce[0], lmresp);
631 * Curl_ntlm_core_lm_resp(ntbuffer, &ntlm->nonce[0], lmresp);
  /external/libweave/third_party/libuweave/src/
macaroon_caveat.h 51 bool uw_macaroon_caveat_create_nonce_(const uint8_t* nonce,
  /external/srtp/crypto/cipher/
cipher.c 381 v128_t nonce; local
391 v128_set_to_zero(&nonce);
393 for(i=0; i < num_trials; i++, nonce.v32[3] = i) {
394 cipher_set_iv(c, &nonce);
  /external/srtp/crypto/test/
cipher_driver.c 423 v128_t nonce; local
434 v128_set_to_zero(&nonce);
436 for(i=0; i < num_trials; i++, nonce.v32[3] = i) {
442 cipher_set_iv(cipher_array[cipher_index], &nonce);

Completed in 991 milliseconds

1 2 3 4 5 6 78 91011>>