/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/ |
H A D | AEADParameters.java | 9 private byte[] nonce; field in class:AEADParameters 18 * @param nonce nonce to be used 21 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText) argument 24 this.nonce = nonce; 46 return nonce;
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
H A D | eax_encrypt_authenticate_memory.c | 25 @param nonce The session nonce [use once] 26 @param noncelen The length of the nonce 38 const unsigned char *nonce, unsigned long noncelen, 55 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) { 36 eax_encrypt_authenticate_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce, unsigned long noncelen, const unsigned char *header, unsigned long headerlen, const unsigned char *pt, unsigned long ptlen, unsigned char *ct, unsigned char *tag, unsigned long *taglen) argument
|
H A D | eax_init.c | 26 @param nonce The use-once nonce for the session 27 @param noncelen The length of the nonce (octets) 34 const unsigned char *nonce, unsigned long noncelen, 45 LTC_ARGCHK(nonce != NULL); 69 /* N = OMAC_0K(nonce) */ 79 /* omac the nonce */ 80 if ((err = omac_process(omac, nonce, noncelen)) != CRYPT_OK) { 32 eax_init(eax_state *eax, int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce, unsigned long noncelen, const unsigned char *header, unsigned long headerlen) argument
|
H A D | eax_decrypt_verify_memory.c | 25 @param nonce The nonce data (use once) for the session 26 @param noncelen The length of the nonce data. 39 const unsigned char *nonce, unsigned long noncelen, 73 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) { 37 eax_decrypt_verify_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce, unsigned long noncelen, const unsigned char *header, unsigned long headerlen, const unsigned char *ct, unsigned long ctlen, unsigned char *pt, unsigned char *tag, unsigned long taglen, int *stat) argument
|
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
H A D | ocb_decrypt_verify_memory.c | 25 @param nonce The session nonce (length of the block size of the block cipher) 36 const unsigned char *nonce, 46 LTC_ARGCHK(nonce != NULL); 58 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) { 34 ocb_decrypt_verify_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce, const unsigned char *ct, unsigned long ctlen, unsigned char *pt, const unsigned char *tag, unsigned long taglen, int *stat) argument
|
H A D | ocb_encrypt_authenticate_memory.c | 25 @param nonce The session nonce (length of the block ciphers block size) 35 const unsigned char *nonce, 44 LTC_ARGCHK(nonce != NULL); 56 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) { 33 ocb_encrypt_authenticate_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce, const unsigned char *pt, unsigned long ptlen, unsigned char *ct, unsigned char *tag, unsigned long *taglen) argument
|
H A D | ocb_init.c | 44 @param nonce The session nonce (length of the block size of the cipher) 48 const unsigned char *key, unsigned long keylen, const unsigned char *nonce) 54 LTC_ARGCHK(nonce != NULL); 85 ocb->R[x] = ocb->L[x] ^ nonce[x]; 47 ocb_init(ocb_state *ocb, int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce) argument
|
/external/srtp/crypto/test/ |
H A D | stat_driver.c | 46 v128_t nonce; local 74 err_check(cipher_set_iv(c, &nonce)); 84 v128_set_to_zero(&nonce); 88 nonce.v32[3] = i; 89 err_check(cipher_set_iv(c, &nonce));
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-ctr.c | 19 * @nonce: Nonce for counter mode (16 bytes) 24 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument 36 os_memcpy(counter, nonce, AES_BLOCK_SIZE);
|
H A D | aes-eax.c | 19 * @nonce: Nonce for counter mode 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 53 os_memcpy(buf + 16, nonce, nonce_len); 83 * @nonce: Nonce for counter mode 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 117 os_memcpy(buf + 16, nonce, nonce_len);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-ctr.c | 19 * @nonce: Nonce for counter mode (16 bytes) 24 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument 36 os_memcpy(counter, nonce, AES_BLOCK_SIZE);
|
H A D | aes-eax.c | 19 * @nonce: Nonce for counter mode 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 53 os_memcpy(buf + 16, nonce, nonce_len); 83 * @nonce: Nonce for counter mode 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 117 os_memcpy(buf + 16, nonce, nonce_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-ctr.c | 19 * @nonce: Nonce for counter mode (16 bytes) 24 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument 36 os_memcpy(counter, nonce, AES_BLOCK_SIZE);
|
H A D | aes-eax.c | 19 * @nonce: Nonce for counter mode 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 53 os_memcpy(buf + 16, nonce, nonce_len); 83 * @nonce: Nonce for counter mode 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 117 os_memcpy(buf + 16, nonce, nonce_len);
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
H A D | ccm_memory.c | 26 @param nonce The session nonce [use once] 27 @param noncelen The length of the nonce 41 const unsigned char *nonce, unsigned long noncelen, 56 LTC_ARGCHK(nonce != NULL); 95 nonce, noncelen, 114 /* increase L to match the nonce len */ 147 /* nonce */ 149 PAD[x++] = nonce[y]; 217 /* nonce */ 38 ccm_memory(int cipher, const unsigned char *key, unsigned long keylen, symmetric_key *uskey, const unsigned char *nonce, unsigned long noncelen, const unsigned char *header, unsigned long headerlen, unsigned char *pt, unsigned long ptlen, unsigned char *ct, unsigned char *tag, unsigned long *taglen, int direction) argument [all...] |
/external/srtp/crypto/cipher/ |
H A D | cipher.c | 381 v128_t nonce; local 391 v128_set_to_zero(&nonce); 393 for(i=0; i < num_trials; i++, nonce.v32[3] = i) { 394 cipher_set_iv(c, &nonce);
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ie.h | 31 const u8 *nonce; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.h | 25 const u8 *nonce; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.h | 25 const u8 *nonce; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.h | 25 const u8 *nonce; member in struct:wpa_eapol_ie_parse
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
H A D | CCMBlockCipher.java | 27 private byte[] nonce; field in class:CCMBlockCipher 71 nonce = param.getNonce(); 80 nonce = param.getIV(); 175 iv[0] = (byte)(((15 - nonce.length) - 1) & 0x7); 177 System.arraycopy(nonce, 0, iv, 1, nonce.length); 273 b0[0] |= ((15 - nonce.length) - 1) & 0x7; 275 System.arraycopy(nonce, 0, b0, 1, nonce.length);
|
/external/dbus/dbus/ |
H A D | dbus-nonce.c | 2 /* dbus-nonce.c Nonce handling functions used by nonce-tcp (internal to D-Bus implementation) 26 #include "dbus-nonce.h" 34 do_check_nonce (int fd, const DBusString *nonce, DBusError *error) argument 63 dbus_set_error (error, DBUS_ERROR_IO_ERROR, "Could not read nonce from socket (fd=%d)", fd ); 72 dbus_set_error (error, DBUS_ERROR_IO_ERROR, "Could not read nonce from socket (fd=%d)", fd ); 82 result = _dbus_string_equal_len (&buffer, nonce, 16); 93 * reads the nonce from the nonce file and stores it in a string 95 * @param fname the file to read the nonce fro 101 _dbus_read_nonce(const DBusString *fname, DBusString *nonce, DBusError* error) argument 137 DBusString nonce; local 159 DBusString nonce; local 195 DBusString nonce; local [all...] |
/external/openssh/ |
H A D | mac.c | 133 u_char b[4], nonce[8]; local 149 put_u64(nonce, seqno); 151 umac_final(mac->umac_ctx, m, nonce);
|
/external/openssl/crypto/modes/ |
H A D | ccm128.c | 66 memset(ctx->nonce.c,0,sizeof(ctx->nonce.c)); 67 ctx->nonce.c[0] = ((u8)(L-1)&7) | (u8)(((M-2)/2)&7)<<3; 75 /* Then you setup per-message nonce and pass the length of the message */ 77 const unsigned char *nonce,size_t nlen,size_t mlen) 79 unsigned int L = ctx->nonce.c[0]&7; /* the L parameter */ 81 if (nlen<(14-L)) return -1; /* nonce is too short */ 84 ctx->nonce.c[8] = (u8)(mlen>>(56%(sizeof(mlen)*8))); 85 ctx->nonce.c[9] = (u8)(mlen>>(48%(sizeof(mlen)*8))); 86 ctx->nonce 76 CRYPTO_ccm128_setiv(CCM128_CONTEXT *ctx, const unsigned char *nonce,size_t nlen,size_t mlen) argument [all...] |
/external/openssl/crypto/x509v3/ |
H A D | v3_ocsp.c | 71 static int i2r_ocsp_crlid(const X509V3_EXT_METHOD *method, void *nonce, 73 static int i2r_ocsp_acutoff(const X509V3_EXT_METHOD *method, void *nonce, 82 static int i2r_ocsp_nonce(const X509V3_EXT_METHOD *method, void *nonce, 202 /* OCSP nonce. This is needs special treatment because it doesn't have 245 static int i2r_ocsp_nonce(const X509V3_EXT_METHOD *method, void *nonce, argument 249 if(i2a_ASN1_STRING(out, nonce, V_ASN1_OCTET_STRING) <= 0) return 0;
|