Searched defs:nonce (Results 1 - 25 of 90) sorted by relevance

1234

/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/
H A DAEADParameters.java9 private byte[] nonce; field in class:AEADParameters
18 * @param nonce nonce to be used
21 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText) argument
24 this.nonce = nonce;
46 return nonce;
/external/dropbear/libtomcrypt/src/encauth/eax/
H A Deax_encrypt_authenticate_memory.c25 @param nonce The session nonce [use once]
26 @param noncelen The length of the nonce
38 const unsigned char *nonce, unsigned long noncelen,
55 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) {
36 eax_encrypt_authenticate_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce, unsigned long noncelen, const unsigned char *header, unsigned long headerlen, const unsigned char *pt, unsigned long ptlen, unsigned char *ct, unsigned char *tag, unsigned long *taglen) argument
H A Deax_init.c26 @param nonce The use-once nonce for the session
27 @param noncelen The length of the nonce (octets)
34 const unsigned char *nonce, unsigned long noncelen,
45 LTC_ARGCHK(nonce != NULL);
69 /* N = OMAC_0K(nonce) */
79 /* omac the nonce */
80 if ((err = omac_process(omac, nonce, noncelen)) != CRYPT_OK) {
32 eax_init(eax_state *eax, int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce, unsigned long noncelen, const unsigned char *header, unsigned long headerlen) argument
H A Deax_decrypt_verify_memory.c25 @param nonce The nonce data (use once) for the session
26 @param noncelen The length of the nonce data.
39 const unsigned char *nonce, unsigned long noncelen,
73 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) {
37 eax_decrypt_verify_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce, unsigned long noncelen, const unsigned char *header, unsigned long headerlen, const unsigned char *ct, unsigned long ctlen, unsigned char *pt, unsigned char *tag, unsigned long taglen, int *stat) argument
/external/dropbear/libtomcrypt/src/encauth/ocb/
H A Docb_decrypt_verify_memory.c25 @param nonce The session nonce (length of the block size of the block cipher)
36 const unsigned char *nonce,
46 LTC_ARGCHK(nonce != NULL);
58 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) {
34 ocb_decrypt_verify_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce, const unsigned char *ct, unsigned long ctlen, unsigned char *pt, const unsigned char *tag, unsigned long taglen, int *stat) argument
H A Docb_encrypt_authenticate_memory.c25 @param nonce The session nonce (length of the block ciphers block size)
35 const unsigned char *nonce,
44 LTC_ARGCHK(nonce != NULL);
56 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) {
33 ocb_encrypt_authenticate_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce, const unsigned char *pt, unsigned long ptlen, unsigned char *ct, unsigned char *tag, unsigned long *taglen) argument
H A Docb_init.c44 @param nonce The session nonce (length of the block size of the cipher)
48 const unsigned char *key, unsigned long keylen, const unsigned char *nonce)
54 LTC_ARGCHK(nonce != NULL);
85 ocb->R[x] = ocb->L[x] ^ nonce[x];
47 ocb_init(ocb_state *ocb, int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce) argument
/external/srtp/crypto/test/
H A Dstat_driver.c46 v128_t nonce; local
74 err_check(cipher_set_iv(c, &nonce));
84 v128_set_to_zero(&nonce);
88 nonce.v32[3] = i;
89 err_check(cipher_set_iv(c, &nonce));
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Daes-ctr.c19 * @nonce: Nonce for counter mode (16 bytes)
24 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument
36 os_memcpy(counter, nonce, AES_BLOCK_SIZE);
H A Daes-eax.c19 * @nonce: Nonce for counter mode
28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument
53 os_memcpy(buf + 16, nonce, nonce_len);
83 * @nonce: Nonce for counter mode
92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument
117 os_memcpy(buf + 16, nonce, nonce_len);
/external/wpa_supplicant_8/src/crypto/
H A Daes-ctr.c19 * @nonce: Nonce for counter mode (16 bytes)
24 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument
36 os_memcpy(counter, nonce, AES_BLOCK_SIZE);
H A Daes-eax.c19 * @nonce: Nonce for counter mode
28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument
53 os_memcpy(buf + 16, nonce, nonce_len);
83 * @nonce: Nonce for counter mode
92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument
117 os_memcpy(buf + 16, nonce, nonce_len);
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Daes-ctr.c19 * @nonce: Nonce for counter mode (16 bytes)
24 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument
36 os_memcpy(counter, nonce, AES_BLOCK_SIZE);
H A Daes-eax.c19 * @nonce: Nonce for counter mode
28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument
53 os_memcpy(buf + 16, nonce, nonce_len);
83 * @nonce: Nonce for counter mode
92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument
117 os_memcpy(buf + 16, nonce, nonce_len);
/external/dropbear/libtomcrypt/src/encauth/ccm/
H A Dccm_memory.c26 @param nonce The session nonce [use once]
27 @param noncelen The length of the nonce
41 const unsigned char *nonce, unsigned long noncelen,
56 LTC_ARGCHK(nonce != NULL);
95 nonce, noncelen,
114 /* increase L to match the nonce len */
147 /* nonce */
149 PAD[x++] = nonce[y];
217 /* nonce */
38 ccm_memory(int cipher, const unsigned char *key, unsigned long keylen, symmetric_key *uskey, const unsigned char *nonce, unsigned long noncelen, const unsigned char *header, unsigned long headerlen, unsigned char *pt, unsigned long ptlen, unsigned char *ct, unsigned char *tag, unsigned long *taglen, int direction) argument
[all...]
/external/srtp/crypto/cipher/
H A Dcipher.c381 v128_t nonce; local
391 v128_set_to_zero(&nonce);
393 for(i=0; i < num_trials; i++, nonce.v32[3] = i) {
394 cipher_set_iv(c, &nonce);
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
H A Dwpa_ie.h31 const u8 *nonce; member in struct:wpa_eapol_ie_parse
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth_ie.h25 const u8 *nonce; member in struct:wpa_eapol_ie_parse
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth_ie.h25 const u8 *nonce; member in struct:wpa_eapol_ie_parse
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth_ie.h25 const u8 *nonce; member in struct:wpa_eapol_ie_parse
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/
H A DCCMBlockCipher.java27 private byte[] nonce; field in class:CCMBlockCipher
71 nonce = param.getNonce();
80 nonce = param.getIV();
175 iv[0] = (byte)(((15 - nonce.length) - 1) & 0x7);
177 System.arraycopy(nonce, 0, iv, 1, nonce.length);
273 b0[0] |= ((15 - nonce.length) - 1) & 0x7;
275 System.arraycopy(nonce, 0, b0, 1, nonce.length);
/external/dbus/dbus/
H A Ddbus-nonce.c2 /* dbus-nonce.c Nonce handling functions used by nonce-tcp (internal to D-Bus implementation)
26 #include "dbus-nonce.h"
34 do_check_nonce (int fd, const DBusString *nonce, DBusError *error) argument
63 dbus_set_error (error, DBUS_ERROR_IO_ERROR, "Could not read nonce from socket (fd=%d)", fd );
72 dbus_set_error (error, DBUS_ERROR_IO_ERROR, "Could not read nonce from socket (fd=%d)", fd );
82 result = _dbus_string_equal_len (&buffer, nonce, 16);
93 * reads the nonce from the nonce file and stores it in a string
95 * @param fname the file to read the nonce fro
101 _dbus_read_nonce(const DBusString *fname, DBusString *nonce, DBusError* error) argument
137 DBusString nonce; local
159 DBusString nonce; local
195 DBusString nonce; local
[all...]
/external/openssh/
H A Dmac.c133 u_char b[4], nonce[8]; local
149 put_u64(nonce, seqno);
151 umac_final(mac->umac_ctx, m, nonce);
/external/openssl/crypto/modes/
H A Dccm128.c66 memset(ctx->nonce.c,0,sizeof(ctx->nonce.c));
67 ctx->nonce.c[0] = ((u8)(L-1)&7) | (u8)(((M-2)/2)&7)<<3;
75 /* Then you setup per-message nonce and pass the length of the message */
77 const unsigned char *nonce,size_t nlen,size_t mlen)
79 unsigned int L = ctx->nonce.c[0]&7; /* the L parameter */
81 if (nlen<(14-L)) return -1; /* nonce is too short */
84 ctx->nonce.c[8] = (u8)(mlen>>(56%(sizeof(mlen)*8)));
85 ctx->nonce.c[9] = (u8)(mlen>>(48%(sizeof(mlen)*8)));
86 ctx->nonce
76 CRYPTO_ccm128_setiv(CCM128_CONTEXT *ctx, const unsigned char *nonce,size_t nlen,size_t mlen) argument
[all...]
/external/openssl/crypto/x509v3/
H A Dv3_ocsp.c71 static int i2r_ocsp_crlid(const X509V3_EXT_METHOD *method, void *nonce,
73 static int i2r_ocsp_acutoff(const X509V3_EXT_METHOD *method, void *nonce,
82 static int i2r_ocsp_nonce(const X509V3_EXT_METHOD *method, void *nonce,
202 /* OCSP nonce. This is needs special treatment because it doesn't have
245 static int i2r_ocsp_nonce(const X509V3_EXT_METHOD *method, void *nonce, argument
249 if(i2a_ASN1_STRING(out, nonce, V_ASN1_OCTET_STRING) <= 0) return 0;

Completed in 158 milliseconds

1234