/external/boringssl/src/crypto/rand_extra/ |
deterministic.c | 39 uint8_t nonce[12]; local 40 OPENSSL_memset(nonce, 0, sizeof(nonce)); 41 OPENSSL_memcpy(nonce, &g_num_calls, sizeof(g_num_calls)); 44 CRYPTO_chacha_20(out, out, requested, kZeroKey, nonce, 0);
|
/external/nos/test/system-test-harness/tools/ |
avb_tools.h | 28 uint64_t nonce; member in struct:avb_tools::ResetMessage 39 uint32_t *selector, uint64_t *nonce,
|
/frameworks/base/libs/storage/ |
IObbActionListener.cpp | 33 virtual void onObbResult(const String16& /* filename */, const int32_t /* nonce */, 48 int32_t nonce = data.readInt32(); local 50 onObbResult(filename, nonce, state);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
GCMParameters.java | 18 aes-nonce OCTET STRING, -- recommended size is 12 octets 25 private byte[] nonce; field in class:GCMParameters 59 this.nonce = ASN1OctetString.getInstance(seq.getObjectAt(0)).getOctets(); 72 byte[] nonce, 75 this.nonce = Arrays.clone(nonce); 81 return Arrays.clone(nonce); 93 v.add(new DEROctetString(nonce));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/ |
AEADParameters.java | 9 private byte[] nonce; field in class:AEADParameters 18 * @param nonce nonce to be used 20 public AEADParameters(KeyParameter key, int macSize, byte[] nonce) 22 this(key, macSize, nonce, null); 30 * @param nonce nonce to be used 33 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText) 36 this.nonce = nonce; [all...] |
/external/nos/host/android/hals/oemlock/test/ |
test.cpp | 53 hidl_vec<uint8_t> makeSignature(uint64_t version, uint64_t nonce, 63 const uint64_t nonce_le = htole64(nonce); 93 && argToken.nonce() == msgToken.nonce() 99 constexpr uint64_t nonce = 3486438654; local 109 unlock->set_nonce(nonce); 117 ASSERT_THAT(hal.setOemUnlockAllowedByCarrier(true, makeSignature(version, nonce, token)), 318 constexpr uint64_t nonce = 0x24680ace13579bdf; local 324 const auto signature = makeSignature(version, nonce, token); 329 EXPECT_THAT(unlock.nonce(), Eq(nonce)) [all...] |
/system/tpm/trunks/ |
session_manager_test.cc | 109 TPM2B_NONCE nonce; local 110 nonce.size = 20; 113 .WillOnce(DoAll(SetArgPointee<8>(nonce), Return(TPM_RC_SUCCESS))); 158 TPM2B_NONCE nonce; local 159 nonce.size = 0; 162 .WillOnce(DoAll(SetArgPointee<8>(nonce), Return(TPM_RC_SUCCESS)));
|
hmac_authorization_delegate_test.cc | 38 TPM2B_NONCE nonce; local 39 nonce.size = kAesKeySize; 40 memset(nonce.buffer, 0, nonce.size); 42 EXPECT_TRUE(delegate.InitSession(dummy_handle, nonce, nonce, std::string(), 48 EXPECT_TRUE(delegate.InitSession(dummy_handle, nonce, nonce, dummy_salt, 70 TPM2B_NONCE nonce; local 71 nonce.size = kAesKeySize [all...] |
/external/boringssl/src/fipstools/ |
cavp_ctr_drbg_test.cc | 47 std::vector<uint8_t> entropy, nonce, personalization_str, ai1, ai2; local 50 !t->GetBytes(&nonce, "Nonce") || 55 nonce.size() != 0 ||
|
test_fips.c | 98 uint8_t nonce[EVP_AEAD_MAX_NONCE_LENGTH]; local 99 OPENSSL_memset(nonce, 0, sizeof(nonce)); 110 if (!EVP_AEAD_CTX_seal(&aead_ctx, output, &out_len, sizeof(output), nonce, 122 if (!EVP_AEAD_CTX_open(&aead_ctx, output, &out_len, sizeof(output), nonce,
|
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/ |
polochallengeresponsetest.cc | 26 PoloChallengeResponseTest() : nonce(4) { } 76 nonce[0] = 0x1; 77 nonce[1] = 0x2; 78 nonce[2] = 0x3; 79 nonce[3] = 0x4; 98 Nonce nonce; member in class:polo::pairing::PoloChallengeResponseTest 103 const Alpha* alpha = response->GetAlpha(nonce); 112 const Gamma* gamma = response->GetGamma(nonce); 121 const Gamma* gamma = response->GetGamma(nonce); [all...] |
/external/nos/host/android/hals/oemlock/ |
OemLock.cpp | 140 * 2. 64-bit nonce 165 // Get the nonce 166 uint64_t nonce; local 167 memcpy(&nonce, &(*it), sizeof(uint64_t)); 169 unlock->set_nonce(letoh64(nonce));
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
polochallengeresponse.cc | 32 Alpha* PoloChallengeResponse::GetAlpha(const Nonce& nonce) const { 54 // modulus and exponent are concatenated along with the random nonce then a 64 + nonce.size(); 81 memcpy(pos, &nonce[0], nonce.size()); 96 Gamma* PoloChallengeResponse::GetGamma(const Nonce& nonce) const { 97 const Alpha* alpha = GetAlpha(nonce); 102 Gamma* gamma = new Gamma(nonce.size() * 2) 118 Nonce* nonce = new Nonce(gamma.size() \/ 2); local 125 const Nonce* nonce = ExtractNonce(gamma); local [all...] |
pairingsession.h | 160 // Gets the nonce value. 161 const Nonce* nonce() const { return nonce_; } function in class:polo::pairing::PairingSession 193 Nonce* nonce_;
|
/libcore/ojluni/src/main/java/sun/security/timestamp/ |
TimestampToken.java | 55 * nonce INTEGER OPTIONAL, 81 private BigInteger nonce; field in class:TimestampToken 115 return nonce; 160 if (d.tag == DerValue.tag_Integer) { // must be the nonce 161 nonce = d.getBigInteger();
|
/external/boringssl/src/crypto/cipher_extra/ |
e_chacha20poly1305.c | 44 uint8_t nonce[12]; member in struct:open_data::__anon14285 55 uint8_t nonce[12]; member in struct:seal_data::__anon14287 156 const uint8_t nonce[12], const uint8_t *ad, size_t ad_len, 163 c20_ctx->key, nonce, 0); 186 size_t *out_tag_len, size_t max_out_tag_len, const uint8_t *nonce, 231 CRYPTO_chacha_20(block, block, sizeof(block), c20_ctx->key, nonce, 245 OPENSSL_memcpy(data.in.nonce, nonce, 12); 250 CRYPTO_chacha_20(out, in, in_len, c20_ctx->key, nonce, 1); 251 calc_tag(data.out.tag, c20_ctx, nonce, ad, ad_len, out, in_len, out_tag [all...] |
/frameworks/base/native/android/ |
storage_manager.cpp | 44 virtual void onObbResult(const android::String16& filename, const int32_t nonce, 51 : nonce(_nonce) 56 int32_t nonce; member in class:ObbCallback 105 void fireCallback(const char* filename, const int32_t nonce, const int32_t state) { 112 if (cb->nonce == nonce) { 141 mMountService->mountObb(rawPath16, canonicalPath16, key16, mObbActionListener, cb->nonce); 147 mMountService->unmountObb(filename16, force, mObbActionListener, cb->nonce); 166 void ObbActionListener::onObbResult(const android::String16& filename, const int32_t nonce, const int32_t state) { 167 mStorageManager->fireCallback(String8(filename).string(), nonce, state) [all...] |
/libcore/ojluni/src/main/java/sun/security/provider/certpath/ |
OCSPRequest.java | 85 private byte[] nonce; field in class:OCSPRequest 122 nonce = ext.getValue(); 154 return nonce;
|
/system/iot/attestation/atap/libatap/ |
atap_commands.c | 32 uint8_t nonce[ATAP_NONCE_LEN]; local 37 /* deriving nonce uses same HKDF as deriving session key */ 43 nonce, 49 ops, nonce, ATAP_NONCE_LEN, *signature, signature_len);
|
/system/keymaster/key_blob_utils/ |
software_keyblobs.cpp | 248 Buffer nonce, tag; local 251 hw_enforced, sw_enforced, &nonce, &tag); 255 if (nonce.available_read() != OCB_NONCE_LENGTH || tag.available_read() != OCB_TAG_LENGTH) 259 nonce, tag, key_material);
|
/cts/hostsidetests/appsecurity/src/android/appsecurity/cts/ |
ExternalStorageHostTest.java | 345 final long nonce = System.nanoTime(); local 346 return getDevice().executeShellCommand("ls -la " + path + " && echo " + nonce) 347 .contains(Long.toString(nonce));
|
/cts/tests/tests/jni/src/android/jni/cts/ |
JniStaticTest.java | 22 * Basic static method tests. The "nonce" class being tested by this 182 StaticNonce nonce = StaticNonce.returnInstance(); local 183 assertSame(StaticNonce.class, nonce.getClass());
|
/external/ImageMagick/MagickCore/ |
cipher.c | 532 unsigned char *nonce) 539 nonce[i]++; 540 if (nonce[i] != 0) 605 *nonce; 613 Generate decipher key and nonce. 631 nonce=SplitStringInfo(key,GetStringInfoLength(key)/2); 632 if (nonce == (StringInfo *) NULL) 642 UpdateSignature(signature_info,nonce); 644 SetStringInfoLength(nonce,sizeof(extent)); 645 SetStringInfoDatum(nonce,(const unsigned char *) &extent) 596 *nonce; local 809 *nonce; local [all...] |
random.c | 86 *nonce, 180 *nonce; 187 random_info->nonce=AcquireStringInfo(2*GetSignatureDigestsize( 189 ResetStringInfo(random_info->nonce); 201 Seed random nonce. 203 nonce=GenerateEntropicChaos(random_info); 204 if (nonce == (StringInfo *) NULL) 207 UpdateSignature(random_info->signature_info,nonce); 209 SetStringInfoLength(nonce,(GetSignatureDigestsize( 211 SetStringInfo(nonce,GetSignatureDigest(random_info->signature_info)) 84 *nonce, member in struct:_RandomInfo 174 *nonce; local [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 103 //TODO: supply a real nonce-count, currently a server will interprete a repeated request as a replay 104 private static final String NC = "00000001"; //nonce-count is always 1 136 if (getParameter("nonce") == null) { 137 throw new MalformedChallengeException("missing nonce in challange"); 269 String nonce = getParameter("nonce"); local 278 if (nonce == null) { 279 throw new IllegalStateException("Nonce may not be null"); 314 // ":" unq(nonce-value) 320 StringBuilder tmp3 = new StringBuilder(tmp2.length() + nonce.length() + cnonce.length() + 2) 400 String nonce = getParameter("nonce"); local [all...] |