HomeSort by relevance Sort by last modified time
    Searched full:nonce (Results 76 - 100 of 537) sorted by null

1 2 34 5 6 7 8 91011>>

  /system/keymaster/
ocb_utils.h 37 const KeymasterKeyBlob& plaintext, const Buffer& nonce,
43 const KeymasterKeyBlob& ciphertext, const Buffer& nonce,
  /external/apache-http/src/org/apache/http/impl/auth/
DigestScheme.java 103 //TODO: supply a real nonce-count, currently a server will interprete a repeated request as a replay
104 private static final String NC = "00000001"; //nonce-count is always 1
136 if (getParameter("nonce") == null) {
137 throw new MalformedChallengeException("missing nonce in challange");
269 String nonce = getParameter("nonce"); local
278 if (nonce == null) {
279 throw new IllegalStateException("Nonce may not be null");
314 // ":" unq(nonce-value)
320 StringBuilder tmp3 = new StringBuilder(tmp2.length() + nonce.length() + cnonce.length() + 2)
400 String nonce = getParameter("nonce"); local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/
CCMBlockCipher.java 28 private byte[] nonce; field in class:CCMBlockCipher
74 nonce = param.getNonce();
83 nonce = param.getIV();
99 if (nonce == null || nonce.length < 7 || nonce.length > 13)
101 throw new IllegalArgumentException("nonce must have length from 7 to 13 octets");
248 int n = nonce.length;
261 System.arraycopy(nonce, 0, iv, 1, nonce.length)
    [all...]
  /external/wpa_supplicant_8/src/ap/
peerkey_auth.c 129 * EAPOL-Key(S=1, M=1, A=1, I=0, K=0, SM=1, KeyRSC=0, Nonce=INonce,
156 * EAPOL-Key(S=1, M=1, A=0, I=1, K=0, SM=1, KeyRSC=0, Nonce=PNonce,
173 /* Initiator Nonce */
174 pos = wpa_add_kde(pos, RSN_KEY_DATA_NONCE, kde->nonce, WPA_NONCE_LEN,
209 * EAPOL-Key(S=1, M=1, A=0, I=0, K=0, SM=1, KeyRSC=0, Nonce=INonce,
236 kde->nonce, WPA_NONCE_LEN);
249 NULL, kde->nonce, buf, pos - buf, 0, 1, 0);
270 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) {
272 "Nonce KDE in SMK M3");
277 * Peer Nonce = key->key_nonce; Initiator Nonce = kde.nonce *
    [all...]
  /frameworks/base/packages/Osu/src/com/android/hotspot2/utils/
HTTPRequest.java 101 String nonceText = itemMap.remove("nonce");
103 throw new IOException("realm and/or nonce missing: '" + authRequestLine + "'");
118 * response = KD ( H(A1), unq(nonce-value) ":" nc-value ":" unq(cnonce-value) ":"
142 .append("nonce=\"").append(nonceText).append("\", ")
262 // nonce="MTQzMTg1MTIxMzUyNzo0OGFhNGU5ZTg4Y2M4YmFhYzM2MzAwZDg5MGNiYTJlNw=="
266 // nonce="MTQzMTg1MTIxMzUyNzo0OGFhNGU5ZTg4Y2M4YmFhYzM2MzAwZDg5MGNiYTJlNw=="
273 String nonce = "MTQzMTg1MTIxMzUyNzo0OGFhNGU5ZTg4Y2M4YmFhYzM2MzAwZDg5MGNiYTJlNw=="; local
277 /*new String(Base64.getDecoder().decode(nonce), StandardCharsets.ISO_8859_1)*/
278 nonce,
284 String nonce, String cnonce, String nc, String qop, String expect
    [all...]
  /external/boringssl/src/ssl/test/runner/
cipher_suites.go 214 // fixedNonceAEAD wraps an AEAD and prefixes a fixed portion of the nonce to
217 // sealNonce and openNonce are buffers where the larger nonce will be
227 func (f *fixedNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte {
228 copy(f.sealNonce[len(f.sealNonce)-8:], nonce)
232 func (f *fixedNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) {
233 copy(f.openNonce[len(f.openNonce)-8:], nonce)
268 // xorNonceAEAD wraps an AEAD and XORs a fixed portion of the nonce, left-padded
271 // sealNonce and openNonce are buffers where the larger nonce will be
281 func (x *xorNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte {
282 xorSlice(x.sealNonce[len(x.sealNonce)-len(nonce):], nonce
    [all...]
  /external/nist-sip/java/gov/nist/javax/sip/header/
AuthenticationHeader.java 78 public static final String NONCE = ParameterNames.NONCE;
112 || name.equalsIgnoreCase(ParameterNames.NONCE)
217 * Sets the Nonce of the WWWAuthenicateHeader to the <var>nonce</var>
220 * @param nonce -
221 * the new nonce String of this WWWAuthenicateHeader.
224 * while parsing the nonce value.
227 public void setNonce(String nonce) throws ParseException {
228 if (nonce == null
    [all...]
  /external/curl/tests/data/
test153 16 WWW-Authenticate: Digest realm="testrealm", nonce="1053604145"
41 WWW-Authenticate: Digest realm="testrealm", algorithm=MD5, nonce="999999", stale=true, qop="auth"
90 Authorization: Digest username="testuser", realm="testrealm", nonce="1053604145", uri="/1530001", response="f4f83139396995bac665f24a1f1055c7"
96 Authorization: Digest username="testuser", realm="testrealm", nonce="1053604145", uri="/1530002", response="f84511b014fdd0ba6494f42871079c32"
102 Authorization: Digest username="testuser", realm="testrealm", nonce="999999", uri="/1530002", cnonce="MTA4MzIy", nc="00000001", qop="auth", response="25291c357671604a16c0242f56721c07", algorithm="MD5"
110 WWW-Authenticate: Digest realm="testrealm", nonce="1053604145"
122 WWW-Authenticate: Digest realm="testrealm", algorithm=MD5, nonce="999999", stale=true, qop="auth"
test1071 22 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
47 WWW-Authenticate: Digest realm="gimme all yer s3cr3ts", nonce="11223344"
104 Authorization: Digest username="testuser", realm="gimme all yer s3cr3ts", nonce="11223344", uri="/1071", response="df4cef6b52a30e65d472dd848d2055a1"
test1095 14 WWW-Authenticate: Digest realm="test \"this\" realm!!", nonce="1053604145"
35 WWW-Authenticate: Digest realm="test \"this\" realm!!", nonce="1053604145"
78 Authorization: Digest username="testuser", realm="test \"this\" realm!!", nonce="1053604145", uri="/1095", response="a1c7931ece9e8617bae2715045e4f49f"
test167 16 WWW-Authenticate: Digest realm="weirdorealm", nonce="12345"
30 WWW-Authenticate: Digest realm="weirdorealm", nonce="12345"
73 Authorization: Digest username="digest", realm="weirdorealm", nonce="12345", uri="/167", response="13c7c02a252cbe1c46d8669898a3be26"
test206 24 Proxy-Authenticate: Digest realm="weirdorealm", nonce="12345"
51 Proxy-Authenticate: Digest realm="weirdorealm", nonce="12345"
97 Proxy-Authorization: Digest username="silly", realm="weirdorealm", nonce="12345", uri="test.remote.haxx.se.206:8990", response="003e36decb4dbf6366b3ecb9b87c24ec"
test245 15 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
32 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
79 Authorization: Digest username="auser", realm="testrealm", nonce="1053604144", uri="/245", response="379a439b1737ba257c1d2f103914b18b"
test246 20 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
42 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
89 Authorization: Digest username="auser", realm="testrealm", nonce="1053604144", uri="/246", response="761e6fc9a760c39d587092e8d840e740"
test565 20 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
41 WWW-Authenticate: Digest realm="testrealm", nonce="1053604144"
90 Authorization: Digest username="foo", realm="testrealm", nonce="1053604144", uri="/565", response="877424f750af047634dbd94f9933217b"
test64 14 WWW-Authenticate: Digest realm="testrealm", nonce="1053604145"
35 WWW-Authenticate: Digest realm="testrealm", nonce="1053604145"
78 Authorization: Digest username="testuser", realm="testrealm", nonce="1053604145", uri="/64", response="c55f7f30d83d774a3d2dcacf725abaca"
test65 14 WWW-Authenticate: Digest realm="testrealm", nonce="2053604145"
35 WWW-Authenticate: Digest realm="testrealm", nonce="2053604145"
78 Authorization: Digest username="testuser", realm="testrealm", nonce="2053604145", uri="/65", response="66d68d3251f1839576ba7c766cf9205b"
test70 15 WWW-Authenticate: Digest realm="testrealm", nonce="1053604199"
37 WWW-Authenticate: Digest realm="testrealm", nonce="1053604199"
82 Authorization: Digest username="testuser", realm="testrealm", nonce="1053604199", uri="/70", response="2c9a6f00af0d86497b177b90e90c688a"
test72 15 WWW-Authenticate: Digest realm="testrealm", nonce="1053604199"
37 WWW-Authenticate: Digest realm="testrealm", nonce="1053604199"
81 Authorization: Digest username="testuser", realm="testrealm", nonce="1053604199", uri="/72", response="9fcd1330377365a09bbcb33b2cbb25bd"
test88 18 WWW-Authenticate: Digest realm="testrealm", nonce="1053604145"
39 WWW-Authenticate: Digest realm="testrealm", nonce="1053604145"
89 Authorization: Digest username="testuser", realm="testrealm", nonce="1053604145", uri="/88", response="78a49fa53d0c228778297687d4168e71"
  /external/boringssl/src/crypto/modes/
gcm_test.c 64 const char *nonce; member in struct:test_case
234 /* This nonce results in 0xfff in counter LSB. */
305 *nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL; local
315 !decode_hex(&nonce, &nonce_len, test->nonce, test_num, "nonce") ||
348 CRYPTO_gcm128_setiv(&ctx, &aes_key, nonce, nonce_len);
364 CRYPTO_gcm128_setiv(&ctx, &aes_key, nonce, nonce_len);
387 OPENSSL_free(nonce);
  /frameworks/base/libs/storage/
IObbActionListener.cpp 33 virtual void onObbResult(const String16& /* filename */, const int32_t /* nonce */,
48 int32_t nonce = data.readInt32(); local
50 onObbResult(filename, nonce, state);
  /system/tpm/trunks/
password_authorization_delegate.cc 41 auth.nonce.size = 0;
70 if (auth_response.nonce.size != 0) {
71 LOG(ERROR) << __func__ << ": received a non zero length nonce.";
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/tsp/
TSTInfoTest.java 49 BigInteger nonce = BigInteger.valueOf(1234567890L); local
61 genTime, accuracy, Boolean.FALSE, nonce, tsa, exts);
80 assertEquals("Decoded nonce is incorrect", nonce, decoded.getNonce());
  /external/boringssl/src/crypto/cipher/
e_tls.c 105 const uint8_t *nonce, size_t nonce_len,
160 !EVP_EncryptInit_ex(&tls_ctx->cipher_ctx, NULL, NULL, NULL, nonce)) {
206 const uint8_t *nonce, size_t nonce_len,
248 !EVP_DecryptInit_ex(&tls_ctx->cipher_ctx, NULL, NULL, NULL, nonce)) {
467 0, /* nonce len */
481 0, /* nonce len */
495 16, /* nonce len (IV) */
509 0, /* nonce len */
523 16, /* nonce len (IV) */
537 16, /* nonce len (IV) *
    [all...]

Completed in 703 milliseconds

1 2 34 5 6 7 8 91011>>