/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_urllib2_localnet.py | 93 nonce = hashlib.md5(str(self._request_num)).hexdigest() 94 self._nonces.append(nonce) 95 return nonce 126 response_str = "%(HA1)s:%(nonce)s:%(nc)s:" \ 138 'nonce="%s", ' % \ 169 if not auth_dict.get("nonce") in self._nonces: 172 self._nonces.remove(auth_dict["nonce"])
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_urllib2_localnet.py | 93 nonce = hashlib.md5(str(self._request_num)).hexdigest() 94 self._nonces.append(nonce) 95 return nonce 126 response_str = "%(HA1)s:%(nonce)s:%(nc)s:" \ 138 'nonce="%s", ' % \ 169 if not auth_dict.get("nonce") in self._nonces: 172 self._nonces.remove(auth_dict["nonce"])
|
/external/webrtc/webrtc/base/ |
httpcommon.cc | 688 " nonce=\"dcd98b7102dd2f0e8b11d0f600bfb0c093\"," 702 " nonce=\"Nny4QuC5PwiSDixJ\"," 810 std::string realm, nonce, qop, opaque; local 812 HttpHasAttribute(args, "nonce", &nonce); 830 middle = nonce + ":" + ncount + ":" + cnonce + ":" + qop; 832 middle = nonce; 848 ss << ", nonce=" << quote(nonce);
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
conn.go | 262 nonce := payload[:8] 272 payload, err = c.Open(payload[:0], nonce, payload, additionalData[:]) 377 nonce := b.data[recordHeaderLen : recordHeaderLen+explicitIVLen] 387 c.Seal(payload[:0], nonce, payload, additionalData[:]) 713 // explicit nonce so that the nonce can be 714 // random. However, the nonce is only 8 bytes 716 // nonce. Therefore we use the sequence number 717 // as the nonce.
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
conn.go | 262 nonce := payload[:8] 272 payload, err = c.Open(payload[:0], nonce, payload, additionalData[:]) 377 nonce := b.data[recordHeaderLen : recordHeaderLen+explicitIVLen] 387 c.Seal(payload[:0], nonce, payload, additionalData[:]) 713 // explicit nonce so that the nonce can be 714 // random. However, the nonce is only 8 bytes 716 // nonce. Therefore we use the sequence number 717 // as the nonce.
|
/developers/build/prebuilts/gradle/AsymmetricFingerprintDialog/Application/src/main/java/com/example/android/asymmetricfingerprintdialog/ |
FingerprintAuthenticationDialogFragment.java | 288 // Include a client nonce in the transaction so that the nonce is also signed by the private 289 // key and the backend can verify that the same nonce can't be used to prevent replay
|
/developers/samples/android/security/AsymmetricFingerprintDialog/Application/src/main/java/com/example/android/asymmetricfingerprintdialog/ |
FingerprintAuthenticationDialogFragment.java | 288 // Include a client nonce in the transaction so that the nonce is also signed by the private 289 // key and the backend can verify that the same nonce can't be used to prevent replay
|
/development/samples/browseable/AsymmetricFingerprintDialog/src/com.example.android.asymmetricfingerprintdialog/ |
FingerprintAuthenticationDialogFragment.java | 288 // Include a client nonce in the transaction so that the nonce is also signed by the private 289 // key and the backend can verify that the same nonce can't be used to prevent replay
|
/external/tcpdump/tests/ |
ikev2four.out | 18 (nonce: len=32 data=(6128ebd023a864e94a7f...ba041b5de59955900d818ac54e18b236739d9e8b)) 42 (nonce: len=32 data=(6128ebd023a864e94a7f...ba041b5de59955900d818ac54e18b236739d9e8b)) 54 (nonce: len=32 data=(b31c379f272ce2984bd1...905954a783be2c37e2ccc4fdd270a532dbe6f428))
|
/external/webrtc/webrtc/p2p/base/ |
turnport.h | 122 const std::string& nonce() const { return nonce_; } function in class:cricket::TurnPort 196 void set_nonce(const std::string& nonce) { nonce_ = nonce; }
|
/system/keymaster/ |
key_blob_test.cpp | 132 serialized_blob_.writable_data()[1 /* version */ + 4 /* nonce len */ + 12 /* nonce */ + 3]++; 141 // Find the nonce, then modify it.
|
/external/boringssl/src/crypto/modes/ |
internal.h | 186 } nonce, cmac; member in struct:ccm128_context 245 /* CRYPTO_gcm128_setiv sets the IV (nonce) for |ctx|. The |key| must be the 271 * a CTR function that only handles the bottom 32 bits of the nonce, like 281 * a CTR function that only handles the bottom 32 bits of the nonce, like
|
/external/boringssl/src/tool/ |
speed.cc | 186 std::unique_ptr<uint8_t[]> nonce(new uint8_t[nonce_len]); 187 memset(nonce.get(), 0, nonce_len); 208 out, &ctx, &nonce, &ad]() -> bool { 212 &ctx, out, &out_len, chunk_len + overhead_len, nonce.get(),
|
/external/dbus/dbus/ |
Android.mk | 32 dbus-nonce.c \
|
/external/oauth/core/src/main/java/net/oauth/ |
SimpleOAuthValidator.java | 85 /** This implementation doesn't check the nonce value. */
|
/external/tpm2/ |
PolicySecret.c | 18 // TPM_RC_NONCE nonceTPM does not match the nonce associated with policySession
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
DefaultHttpClientTest.java | 127 + "nonce=\"dcd98b7102dd2f0e8b11d0f600bfb0c093\", "
|
/frameworks/base/libs/storage/ |
IMountService.cpp | 446 const sp<IObbActionListener>& token, int32_t nonce) 454 data.writeInt32(nonce); 467 const sp<IObbActionListener>& token, const int32_t nonce) 474 data.writeInt32(nonce);
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
IsimUiccRecords.java | 439 public String getIsimChallengeResponse(String nonce){ 440 if (DBG) log("getIsimChallengeResponse-nonce:"+nonce); 443 mCi.requestIsimAuthentication(nonce,obtainMessage(EVENT_AKA_AUTHENTICATE_DONE));
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast.c | 601 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 602 _bind->nonce, sizeof(_bind->nonce)); 632 os_memcpy(rbind->nonce, _bind->nonce, sizeof(_bind->nonce)); 633 inc_byte_array(rbind->nonce, sizeof(rbind->nonce)); 640 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 641 rbind->nonce, sizeof(rbind->nonce)) [all...] |
/external/boringssl/src/crypto/cipher/ |
internal.h | 89 size_t max_out_len, const uint8_t *nonce, size_t nonce_len, 94 size_t max_out_len, const uint8_t *nonce, size_t nonce_len,
|
/external/libmicrohttpd/src/microhttpd/ |
internal.h | 169 * Maximum length of a nonce in digest authentication. 32(MD5 Hex) + 179 * nonce-nc map. 185 * Nonce counter, a value that increases for each subsequent 186 * request for the same nonce. 191 * Nonce value: 193 char nonce[MAX_NONCE_LENGTH]; member in struct:MHD_NonceNc 1242 * An array that contains the map nonce-nc. 1257 * Size of the nonce-nc array. [all...] |
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
MessageDigestAlgorithm.java | 33 * request) that the client has sent with the nonce value in this request. 110 * request) that the client has sent with the nonce value in this request.
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
ProxyAuthenticateParser.java | 74 "domain=\"sip:ss2.wcom.com\", nonce=\"ea9c8e88df84f1cec4341ae6cbe5a359\","+ 78 "qop=\"auth\" , nonce-value=\"oli\"\n"
|
ProxyAuthorizationParser.java | 76 "domain=\"sip:ss2.wcom.com\",nonce=\"ea9c8e88df84f1cec4341ae6cbe5a359\","+ 80 "qop=\"auth\" , nonce-value=\"oli\"\n"
|