/system/keymaster/ |
ocb_utils.h | 37 const KeymasterKeyBlob& plaintext, const Buffer& nonce, 43 const KeymasterKeyBlob& ciphertext, const Buffer& nonce,
|
/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 103 //TODO: supply a real nonce-count, currently a server will interprete a repeated request as a replay 104 private static final String NC = "00000001"; //nonce-count is always 1 136 if (getParameter("nonce") == null) { 137 throw new MalformedChallengeException("missing nonce in challange"); 269 String nonce = getParameter("nonce"); local 278 if (nonce == null) { 279 throw new IllegalStateException("Nonce may not be null"); 314 // ":" unq(nonce-value) 320 StringBuilder tmp3 = new StringBuilder(tmp2.length() + nonce.length() + cnonce.length() + 2) 400 String nonce = getParameter("nonce"); local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
CCMBlockCipher.java | 28 private byte[] nonce; field in class:CCMBlockCipher 74 nonce = param.getNonce(); 83 nonce = param.getIV(); 99 if (nonce == null || nonce.length < 7 || nonce.length > 13) 101 throw new IllegalArgumentException("nonce must have length from 7 to 13 octets"); 248 int n = nonce.length; 261 System.arraycopy(nonce, 0, iv, 1, nonce.length) [all...] |
/external/wpa_supplicant_8/src/ap/ |
peerkey_auth.c | 129 * EAPOL-Key(S=1, M=1, A=1, I=0, K=0, SM=1, KeyRSC=0, Nonce=INonce, 156 * EAPOL-Key(S=1, M=1, A=0, I=1, K=0, SM=1, KeyRSC=0, Nonce=PNonce, 173 /* Initiator Nonce */ 174 pos = wpa_add_kde(pos, RSN_KEY_DATA_NONCE, kde->nonce, WPA_NONCE_LEN, 209 * EAPOL-Key(S=1, M=1, A=0, I=0, K=0, SM=1, KeyRSC=0, Nonce=INonce, 236 kde->nonce, WPA_NONCE_LEN); 249 NULL, kde->nonce, buf, pos - buf, 0, 1, 0); 270 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) { 272 "Nonce KDE in SMK M3"); 277 * Peer Nonce = key->key_nonce; Initiator Nonce = kde.nonce * [all...] |
/frameworks/base/packages/Osu/src/com/android/hotspot2/utils/ |
HTTPRequest.java | 101 String nonceText = itemMap.remove("nonce"); 103 throw new IOException("realm and/or nonce missing: '" + authRequestLine + "'"); 118 * response = KD ( H(A1), unq(nonce-value) ":" nc-value ":" unq(cnonce-value) ":" 142 .append("nonce=\"").append(nonceText).append("\", ") 262 // nonce="MTQzMTg1MTIxMzUyNzo0OGFhNGU5ZTg4Y2M4YmFhYzM2MzAwZDg5MGNiYTJlNw==" 266 // nonce="MTQzMTg1MTIxMzUyNzo0OGFhNGU5ZTg4Y2M4YmFhYzM2MzAwZDg5MGNiYTJlNw==" 273 String nonce = "MTQzMTg1MTIxMzUyNzo0OGFhNGU5ZTg4Y2M4YmFhYzM2MzAwZDg5MGNiYTJlNw=="; local 277 /*new String(Base64.getDecoder().decode(nonce), StandardCharsets.ISO_8859_1)*/ 278 nonce, 284 String nonce, String cnonce, String nc, String qop, String expect [all...] |
/external/boringssl/src/ssl/test/runner/ |
cipher_suites.go | 214 // fixedNonceAEAD wraps an AEAD and prefixes a fixed portion of the nonce to 217 // sealNonce and openNonce are buffers where the larger nonce will be 227 func (f *fixedNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte { 228 copy(f.sealNonce[len(f.sealNonce)-8:], nonce) 232 func (f *fixedNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) { 233 copy(f.openNonce[len(f.openNonce)-8:], nonce) 268 // xorNonceAEAD wraps an AEAD and XORs a fixed portion of the nonce, left-padded 271 // sealNonce and openNonce are buffers where the larger nonce will be 281 func (x *xorNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte { 282 xorSlice(x.sealNonce[len(x.sealNonce)-len(nonce):], nonce [all...] |
/external/nist-sip/java/gov/nist/javax/sip/header/ |
AuthenticationHeader.java | 78 public static final String NONCE = ParameterNames.NONCE; 112 || name.equalsIgnoreCase(ParameterNames.NONCE) 217 * Sets the Nonce of the WWWAuthenicateHeader to the <var>nonce</var> 220 * @param nonce - 221 * the new nonce String of this WWWAuthenicateHeader. 224 * while parsing the nonce value. 227 public void setNonce(String nonce) throws ParseException { 228 if (nonce == null [all...] |
/external/curl/tests/data/ |
test153 | 16 WWW-Authenticate: Digest realm="testrealm", nonce="1053604145"
41 WWW-Authenticate: Digest realm="testrealm", algorithm=MD5, nonce="999999", stale=true, qop="auth"
90 Authorization: Digest username="testuser", realm="testrealm", nonce="1053604145", uri="/1530001", response="f4f83139396995bac665f24a1f1055c7"
96 Authorization: Digest username="testuser", realm="testrealm", nonce="1053604145", uri="/1530002", response="f84511b014fdd0ba6494f42871079c32"
102 Authorization: Digest username="testuser", realm="testrealm", nonce="999999", uri="/1530002", cnonce="MTA4MzIy", nc="00000001", qop="auth", response="25291c357671604a16c0242f56721c07", algorithm="MD5"
110 WWW-Authenticate: Digest realm="testrealm", nonce="1053604145"
122 WWW-Authenticate: Digest realm="testrealm", algorithm=MD5, nonce="999999", stale=true, qop="auth"
|
test1071 | 22 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
47 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
104 Authorization: Digest username="testuser", realm="gimme all yer s3cr3ts", nonce="11223344", uri="/1071", response="df4cef6b52a30e65d472dd848d2055a1"
|
test1095 | 14 WWW-Authenticate: Digest realm="test \"this\" realm!!", nonce="1053604145"
35 WWW-Authenticate: Digest realm="test \"this\" realm!!", nonce="1053604145"
78 Authorization: Digest username="testuser", realm="test \"this\" realm!!", nonce="1053604145", uri="/1095", response="a1c7931ece9e8617bae2715045e4f49f"
|
test167 | 16 WWW-Authenticate: Digest realm="weirdorealm", nonce="12345"
30 WWW-Authenticate: Digest realm="weirdorealm", nonce="12345"
73 Authorization: Digest username="digest", realm="weirdorealm", nonce="12345", uri="/167", response="13c7c02a252cbe1c46d8669898a3be26"
|
test206 | 24 Proxy-Authenticate: Digest realm="weirdorealm", nonce="12345"
51 Proxy-Authenticate: Digest realm="weirdorealm", nonce="12345"
97 Proxy-Authorization: Digest username="silly", realm="weirdorealm", nonce="12345", uri="test.remote.haxx.se.206:8990", response="003e36decb4dbf6366b3ecb9b87c24ec"
|
test245 | 15 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
32 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
79 Authorization: Digest username="auser", realm="testrealm", nonce="1053604144", uri="/245", response="379a439b1737ba257c1d2f103914b18b"
|
test246 | 20 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
42 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
89 Authorization: Digest username="auser", realm="testrealm", nonce="1053604144", uri="/246", response="761e6fc9a760c39d587092e8d840e740"
|
test565 | 20 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
41 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
90 Authorization: Digest username="foo", realm="testrealm", nonce="1053604144", uri="/565", response="877424f750af047634dbd94f9933217b"
|
test64 | 14 WWW-Authenticate: Digest realm="testrealm", nonce="1053604145"
35 WWW-Authenticate: Digest realm="testrealm", nonce="1053604145"
78 Authorization: Digest username="testuser", realm="testrealm", nonce="1053604145", uri="/64", response="c55f7f30d83d774a3d2dcacf725abaca"
|
test65 | 14 WWW-Authenticate: Digest realm="testrealm", nonce="2053604145"
35 WWW-Authenticate: Digest realm="testrealm", nonce="2053604145"
78 Authorization: Digest username="testuser", realm="testrealm", nonce="2053604145", uri="/65", response="66d68d3251f1839576ba7c766cf9205b"
|
test70 | 15 WWW-Authenticate: Digest realm="testrealm", nonce="1053604199"
37 WWW-Authenticate: Digest realm="testrealm", nonce="1053604199"
82 Authorization: Digest username="testuser", realm="testrealm", nonce="1053604199", uri="/70", response="2c9a6f00af0d86497b177b90e90c688a"
|
test72 | 15 WWW-Authenticate: Digest realm="testrealm", nonce="1053604199"
37 WWW-Authenticate: Digest realm="testrealm", nonce="1053604199"
81 Authorization: Digest username="testuser", realm="testrealm", nonce="1053604199", uri="/72", response="9fcd1330377365a09bbcb33b2cbb25bd"
|
test88 | 18 WWW-Authenticate: Digest realm="testrealm", nonce="1053604145"
39 WWW-Authenticate: Digest realm="testrealm", nonce="1053604145"
89 Authorization: Digest username="testuser", realm="testrealm", nonce="1053604145", uri="/88", response="78a49fa53d0c228778297687d4168e71"
|
/external/boringssl/src/crypto/modes/ |
gcm_test.c | 64 const char *nonce; member in struct:test_case 234 /* This nonce results in 0xfff in counter LSB. */ 305 *nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL; local 315 !decode_hex(&nonce, &nonce_len, test->nonce, test_num, "nonce") || 348 CRYPTO_gcm128_setiv(&ctx, &aes_key, nonce, nonce_len); 364 CRYPTO_gcm128_setiv(&ctx, &aes_key, nonce, nonce_len); 387 OPENSSL_free(nonce);
|
/frameworks/base/libs/storage/ |
IObbActionListener.cpp | 33 virtual void onObbResult(const String16& /* filename */, const int32_t /* nonce */, 48 int32_t nonce = data.readInt32(); local 50 onObbResult(filename, nonce, state);
|
/system/tpm/trunks/ |
password_authorization_delegate.cc | 41 auth.nonce.size = 0; 70 if (auth_response.nonce.size != 0) { 71 LOG(ERROR) << __func__ << ": received a non zero length nonce.";
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/tsp/ |
TSTInfoTest.java | 49 BigInteger nonce = BigInteger.valueOf(1234567890L); local 61 genTime, accuracy, Boolean.FALSE, nonce, tsa, exts); 80 assertEquals("Decoded nonce is incorrect", nonce, decoded.getNonce());
|
/external/boringssl/src/crypto/cipher/ |
e_tls.c | 105 const uint8_t *nonce, size_t nonce_len, 160 !EVP_EncryptInit_ex(&tls_ctx->cipher_ctx, NULL, NULL, NULL, nonce)) { 206 const uint8_t *nonce, size_t nonce_len, 248 !EVP_DecryptInit_ex(&tls_ctx->cipher_ctx, NULL, NULL, NULL, nonce)) { 467 0, /* nonce len */ 481 0, /* nonce len */ 495 16, /* nonce len (IV) */ 509 0, /* nonce len */ 523 16, /* nonce len (IV) */ 537 16, /* nonce len (IV) * [all...] |