/external/ipsec-tools/src/racoon/ |
isakmp_quick.c | 179 /* generate NONCE value */ 180 iph2->nonce = eay_set_random(iph2->ph1->rmconf->nonce_size); 181 if (iph2->nonce == NULL) 232 /* create SA;NONCE payload, and KE if need, and IDii, IDir. */ 234 + sizeof(*gen) + iph2->nonce->l; 254 /* add NONCE payload */ 261 p = set_isakmp_payload(p, iph2->nonce, np); 380 tlen = iph2->nonce->l 388 p = hbuf->v + iph2->nonce->l; /* retain the space for Ni_b */ 485 memcpy(hbuf->v, iph2->nonce->v, iph2->nonce->l) [all...] |
isakmp_agg.c | 176 /* generate NONCE value */ 177 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size); 178 if (iph1->nonce == NULL) 241 /* create isakmp NONCE payload */ 242 plist = isakmp_plist_append(plist, iph1->nonce, ISAKMP_NPTYPE_NONCE); 982 /* generate NONCE value */ 983 iph1->nonce = eay_set_random(iph1->rmconf->nonce_size); 984 if (iph1->nonce == NULL) 1083 /* create isakmp NONCE payload */ 1085 iph1->nonce, ISAKMP_NPTYPE_NONCE) [all...] |
handler.h | 153 vchar_t *nonce; /* nonce value */ member in struct:ph1handle 154 vchar_t *nonce_p; /* partner's nonce value */ 300 vchar_t *nonce; /* nonce value in phase 2 */ member in struct:ph2handle 301 vchar_t *nonce_p; /* partner's nonce value in phase 2 */
|
/system/vold/ |
KeyStorage.cpp | 148 LOG(ERROR) << "GCM encryption but no nonce generated"; 152 std::string nonce(reinterpret_cast<const char*>(nonceBlob.data), nonceBlob.data_length); 153 if (!checkSize("nonce", nonce.size(), GCM_NONCE_BYTES)) return false; 160 *ciphertext = nonce + body + mac; 167 auto nonce = ciphertext.substr(0, GCM_NONCE_BYTES); local 169 auto params = addStringParam(beginParams(auth, appId), keymaster::TAG_NONCE, nonce).build();
|
/external/tcpdump/ |
print-babel.c | 391 u_short nonce, interval; local 397 nonce = EXTRACT_16BITS(message + 4); 399 ND_PRINT((ndo, "%04x %s", nonce, format_interval(interval))); 405 u_short nonce; local 411 nonce = EXTRACT_16BITS(message + 2); 412 ND_PRINT((ndo, "%04x", nonce));
|
/system/connectivity/shill/dbus/ |
chromeos_manager_dbus_adaptor.cc | 421 const string& nonce, 430 manager_->VerifyDestination(certificate, public_key, nonce, 449 const string& nonce, 460 manager_->VerifyAndEncryptCredentials(certificate, public_key, nonce, 481 const string& nonce, 492 manager_->VerifyAndEncryptData(certificate, public_key, nonce,
|
chromeos_manager_dbus_adaptor.h | 135 const std::string& nonce, 143 const std::string& nonce, 152 const std::string& nonce,
|
/system/keymaster/ |
android_keymaster_test_utils.h | 267 keymaster_padding_t padding, const std::string& nonce); 269 keymaster_padding_t padding, const std::string& nonce); 272 const std::string& nonce); 275 const std::string& nonce); 279 void CheckAesOcbTestVector(const std::string& key, const std::string& nonce, 282 void CheckAesCtrTestVector(const std::string& key, const std::string& nonce,
|
/cts/tests/tests/jni/src/android/jni/cts/ |
JniStaticTest.java | 22 * Basic static method tests. The "nonce" class being tested by this 168 StaticNonce nonce = StaticNonce.returnInstance(); local 169 assertSame(StaticNonce.class, nonce.getClass());
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
AuthenticationInfo.java | 110 /** Returns the Nonce Count value of this AuthenticationInfoHeader. 163 /** Sets the Nonce Count of the AuthenticationInfoHeader to the <var>nonceCount</var> 217 || name.equalsIgnoreCase(ParameterNames.NONCE)
|
/external/wpa_supplicant_8/hs20/server/www/ |
est.php | 14 $needed = array('nonce'=>1, 'nc'=>1, 'cnonce'=>1, 'qop'=>1, 'username'=>1, 67 $resp = md5($A1 . ':' . $data['nonce'] . ':' . $data['nc'] . ':' . 99 '",qop="auth",nonce="'.uniqid().'",opaque="'.md5($realm).'"');
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 13 * Nonce length must be at least 16 octets. It must also be at least half the 290 const u8 *nonce, size_t nonce_len, 308 const u8 *nonce; member in struct:ikev2_payloads
|
/frameworks/base/docs/html/google/play/billing/ |
billing_best_practices.jd | 15 <li><a href="#nonce">Use Secure Random Nonces</a></li> 85 <h3 id="nonce">Use secure random nonces</h3> 89 <p>Also, if you are performing nonce verification on a server, make sure that you generate the
|
/system/tpm/attestation/common/ |
attestation_ca.proto | 142 optional bytes nonce = 2; 157 // A 256-bit random value generated by the client. Mixing in this nonce 159 optional bytes nonce = 2;
|
/developers/build/prebuilts/gradle/AsymmetricFingerprintDialog/Application/src/main/java/com/example/android/asymmetricfingerprintdialog/server/ |
StoreBackendImpl.java | 42 // It verifies the equality of the transaction including the client nonce
|
Transaction.java | 37 * that the same nonce can't be reused to prevent replay attacks.
|
/developers/samples/android/security/AsymmetricFingerprintDialog/Application/src/main/java/com/example/android/asymmetricfingerprintdialog/server/ |
StoreBackendImpl.java | 42 // It verifies the equality of the transaction including the client nonce
|
Transaction.java | 37 * that the same nonce can't be reused to prevent replay attacks.
|
/development/samples/browseable/AsymmetricFingerprintDialog/src/com.example.android.asymmetricfingerprintdialog/server/ |
StoreBackendImpl.java | 42 // It verifies the equality of the transaction including the client nonce
|
Transaction.java | 37 * that the same nonce can't be reused to prevent replay attacks.
|
/external/apache-http/android/src/android/net/http/ |
HttpAuthHeader.java | 33 private final static String NONCE_TOKEN = "nonce"; 52 * rejected because the nonce value was stale. If stale is TRUE 190 * the client was rejected because the nonce value was stale. 204 * @return The nonce value or null if there is none.
|
/external/curl/lib/ |
curl_ntlm_msgs.c | 289 memcpy(ntlm->nonce, &type2[24], 8); 303 fprintf(stderr, "\n nonce="); 304 ntlm_print_hex(stderr, (char *)ntlm->nonce, 8); 556 &ntlm->nonce[0], lmresp); 590 /* Fill tmp with challenge(nonce?) + entropy */ 591 memcpy(tmp, &ntlm->nonce[0], 8); 621 Curl_ntlm_core_lm_resp(ntbuffer, &ntlm->nonce[0], ntresp); 628 Curl_ntlm_core_lm_resp(lmbuffer, &ntlm->nonce[0], lmresp); 631 * Curl_ntlm_core_lm_resp(ntbuffer, &ntlm->nonce[0], lmresp);
|
/external/libweave/third_party/libuweave/src/ |
macaroon_caveat.h | 51 bool uw_macaroon_caveat_create_nonce_(const uint8_t* nonce,
|
/external/srtp/crypto/cipher/ |
cipher.c | 381 v128_t nonce; local 391 v128_set_to_zero(&nonce); 393 for(i=0; i < num_trials; i++, nonce.v32[3] = i) { 394 cipher_set_iv(c, &nonce);
|
/external/srtp/crypto/test/ |
cipher_driver.c | 423 v128_t nonce; local 434 v128_set_to_zero(&nonce); 436 for(i=0; i < num_trials; i++, nonce.v32[3] = i) { 442 cipher_set_iv(cipher_array[cipher_index], &nonce);
|