/external/ImageMagick/www/api/ |
version.php | 186 unsigned int GetMagickSignature(const StringInfo *nonce) 196 <dt>nonce</dt>
|
/external/dbus/dbus/ |
Makefile.am | 169 dbus-nonce.h \ 170 dbus-nonce.c \
|
/external/ipsec-tools/src/racoon/ |
oakley.c | 496 + iph2->nonce->l 521 bp = (side == INITIATOR ? iph2->nonce : iph2->nonce_p); 525 bp = (side == INITIATOR ? iph2->nonce_p : iph2->nonce); 1025 len = iph1->nonce->l + iph1->nonce_p->l; 1034 bp = (sw == GENERATE ? iph1->nonce_p : iph1->nonce); 1038 bp = (sw == GENERATE ? iph1->nonce : iph1->nonce_p); 1155 len = iph1->nonce->l + iph1->nonce_p->l; 1164 bp = (sw == GENERATE ? iph1->nonce_p : iph1->nonce); 1168 bp = (sw == GENERATE ? iph1->nonce : iph1->nonce_p); [all...] |
remoteconf.h | 86 int nonce_size; /* the number of bytes of nonce */
|
/external/libweave/third_party/libuweave/src/ |
macaroon_caveat.c | 160 bool uw_macaroon_caveat_create_nonce_(const uint8_t* nonce, 165 return create_caveat_bstr_value_(kUwMacaroonCaveatTypeNonce, nonce,
|
/external/tcpdump/ |
print-ahcp.c | 392 /* Nonce */ 394 ND_PRINT((ndo, ", Nonce 0x%08x", EXTRACT_32BITS(cp)));
|
print-mobility.c | 98 #define IP6MOPT_NONCEID 0x4 /* Nonce Indices */ 250 ND_PRINT((ndo, " nonce id=0x%x", EXTRACT_16BITS(&mh->ip6m_data16[0])));
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_build.c | 276 wpa_printf(MSG_DEBUG, "WPS: * Enrollee Nonce"); 286 wpa_printf(MSG_DEBUG, "WPS: * Registrar Nonce");
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/decoder/ |
FwdLockFile.c | 218 * @param[in] pNonce A reference to the nonce. 249 // The first 16 bytes of the encrypted session key is used as the nonce.
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
PhoneSubInfoController.java | 364 public String getIsimChallengeResponse(String nonce) throws RemoteException { 370 return isim.getIsimChallengeResponse(nonce);
|
/system/connectivity/shill/ |
crypto_util_proxy.cc | 79 const string& nonce, 93 nonce.c_str()));
|
/external/boringssl/src/ssl/test/runner/ |
conn.go | 370 nonce := seq 376 nonce = payload[:8] 387 payload, err = c.Open(payload[:0], nonce, payload, additionalData[:]) 507 nonce := hc.outSeq[:] 509 nonce = b.data[recordHeaderLen : recordHeaderLen+explicitIVLen] 520 c.Seal(payload[:0], nonce, payload, additionalData[:]) 916 // explicit nonce so that the nonce can be 917 // random. However, the nonce is only 8 bytes 919 // nonce. Therefore we use the sequence numbe [all...] |
/prebuilts/gdb/darwin-x86/lib/python2.7/ |
urllib2.py | [all...] |
/prebuilts/gdb/linux-x86/lib/python2.7/ |
urllib2.py | [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
urllib2.py | [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
urllib2.py | [all...] |
/cts/tests/tests/jni/src/android/jni/cts/ |
JniInstanceTest.java | 21 * Basic native instance method tests. The "nonce" class being tested
|
/development/ndk/platforms/android-3/include/linux/ |
usb_ch9.h | 355 __u8 nonce[16]; member in struct:usb_handshake
|
/external/srtp/crypto/include/ |
cipher.h | 111 * a cipher_set_nonce_seq_func_t function sets both the nonce
|
err.h | 87 err_status_nonce_bad = 18, /**< nonce check failed */
|
/external/tpm2/ |
PolicySigned.c | 20 // TPM_RC_NONCE nonceTPM is not the nonce associated with the policySession
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_i.h | 223 const u8 *key_rsc, const u8 *nonce,
|
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_key.c | 183 * SAK = KDF(Key, Label, KS-nonce | MI-value list | KN, SAKLength)
|
/frameworks/base/obex/javax/obex/ |
HeaderSet.java | 238 /*package*/ byte[] nonce; field in class:HeaderSet 681 nonce = new byte[16]; 686 nonce[i] = (byte)mRandom.nextInt(); 689 mAuthChall = ObexHelper.computeAuthenticationChallenge(nonce, realm, access, userID);
|
ServerSession.java | 375 if (reply.nonce != null) { 377 System.arraycopy(reply.nonce, 0, mChallengeDigest, 0, 16); 619 if (reply.nonce != null) { 621 System.arraycopy(reply.nonce, 0, mChallengeDigest, 0, 16);
|