/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
H A D | GCMParameters.java | 18 aes-nonce OCTET STRING, -- recommended size is 12 octets 25 private byte[] nonce; field in class:GCMParameters 59 this.nonce = ASN1OctetString.getInstance(seq.getObjectAt(0)).getOctets(); 72 byte[] nonce, 75 this.nonce = Arrays.clone(nonce); 81 return Arrays.clone(nonce); 93 v.add(new DEROctetString(nonce)); 71 GCMParameters( byte[] nonce, int icvLen) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/ |
H A D | AEADParameters.java | 9 private byte[] nonce; field in class:AEADParameters 18 * @param nonce nonce to be used 20 public AEADParameters(KeyParameter key, int macSize, byte[] nonce) argument 22 this(key, macSize, nonce, null); 30 * @param nonce nonce to be used 33 public AEADParameters(KeyParameter key, int macSize, byte[] nonce, byte[] associatedText) argument 36 this.nonce = nonce; [all...] |
/external/chromium_org/components/rappor/ |
H A D | byte_vector_utils_unittest.cc | 82 const char nonce[] = "659ba96c601dc69fc902940805ec0ca8"; local 89 std::string entropy_input = HexToString(entropy) + HexToString(nonce);
|
/external/chromium_org/net/quic/crypto/ |
H A D | chacha20_poly1305_decrypter_nss.cc | 39 void ChaCha20Poly1305Decrypter::FillAeadParams(StringPiece nonce, argument 63 void ChaCha20Poly1305Decrypter::FillAeadParams(StringPiece nonce, 70 reinterpret_cast<CK_BYTE*>(const_cast<char*>(nonce.data())); 71 nss_aead_params->ulIvLen = nonce.size();
|
H A D | chacha20_poly1305_encrypter_nss.cc | 39 void ChaCha20Poly1305Encrypter::FillAeadParams(StringPiece nonce, argument 63 void ChaCha20Poly1305Encrypter::FillAeadParams(StringPiece nonce, 70 reinterpret_cast<CK_BYTE*>(const_cast<char*>(nonce.data())); 71 nss_aead_params->ulIvLen = nonce.size();
|
H A D | chacha20_poly1305_encrypter_test.cc | 43 // in an nonce and also to allocate the buffer needed for the ciphertext. 45 StringPiece nonce, 51 if (!encrypter->Encrypt(nonce, associated_data, plaintext, 44 EncryptWithNonce(ChaCha20Poly1305Encrypter* encrypter, StringPiece nonce, StringPiece associated_data, StringPiece plaintext) argument
|
H A D | local_strike_register_client.cc | 33 StringPiece nonce, 37 if (nonce.length() != kNonceSize) { 42 reinterpret_cast<const uint8*>(nonce.data()), 32 VerifyNonceIsValidAndUnique( StringPiece nonce, QuicWallTime now, ResultCallback* cb) argument
|
H A D | chacha20_poly1305_decrypter_test.cc | 72 // in an nonce and also to allocate the buffer needed for the plaintext. 74 StringPiece nonce, 80 if (!decrypter->Decrypt(nonce, associated_data, ciphertext, 73 DecryptWithNonce(ChaCha20Poly1305Decrypter* decrypter, StringPiece nonce, StringPiece associated_data, StringPiece ciphertext) argument
|
H A D | crypto_secret_boxer.cc | 22 // kBoxNonceSize contains the number of bytes of nonce that we use in each box. 56 // Generate nonce. 77 char nonce[kBoxNonceSize]; local 78 memcpy(nonce, ciphertext.data(), kBoxNonceSize); 90 if (!decrypter->Decrypt(StringPiece(nonce, kBoxNonceSize), StringPiece(),
|
H A D | aead_base_decrypter_openssl.cc | 79 bool AeadBaseDecrypter::Decrypt(StringPiece nonce, argument 85 nonce.size() != nonce_prefix_size_ + sizeof(QuicPacketSequenceNumber)) { 91 reinterpret_cast<const uint8_t*>(nonce.data()), nonce.size(), 114 uint8 nonce[sizeof(nonce_prefix_) + sizeof(sequence_number)]; local 116 DCHECK_LE(nonce_size, sizeof(nonce)); 117 memcpy(nonce, nonce_prefix_, nonce_prefix_size_); 118 memcpy(nonce + nonce_prefix_size_, &sequence_number, sizeof(sequence_number)); 119 if (!Decrypt(StringPiece(reinterpret_cast<char*>(nonce), nonce_size),
|
/external/chromium_org/net/quic/test_tools/ |
H A D | delayed_verify_strike_register_client.h | 17 // Test helper that allows delaying execution of nonce verification 28 virtual void VerifyNonceIsValidAndUnique(base::StringPiece nonce, 46 : nonce(in_nonce.as_string()), 51 std::string nonce; member in struct:net::test::DelayedVerifyStrikeRegisterClient::VerifyArgs
|
H A D | delayed_verify_strike_register_client.cc | 28 StringPiece nonce, 32 pending_verifications_.push_back(VerifyArgs(nonce, now, cb)); 34 LocalStrikeRegisterClient::VerifyNonceIsValidAndUnique(nonce, now, cb); 48 it->nonce, it->now, it->cb); 27 VerifyNonceIsValidAndUnique( StringPiece nonce, QuicWallTime now, ResultCallback* cb) argument
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/test/ |
H A D | stat_driver.c | 83 v128_t nonce; local 111 err_check(cipher_set_iv(c, &nonce)); 121 v128_set_to_zero(&nonce); 125 nonce.v32[3] = i; 126 err_check(cipher_set_iv(c, &nonce)); 145 err_check(cipher_set_iv(c, &nonce)); 155 v128_set_to_zero(&nonce); 159 nonce.v32[3] = i; 160 err_check(cipher_set_iv(c, &nonce));
|
/external/srtp/crypto/test/ |
H A D | stat_driver.c | 46 v128_t nonce; local 74 err_check(cipher_set_iv(c, &nonce)); 84 v128_set_to_zero(&nonce); 88 nonce.v32[3] = i; 89 err_check(cipher_set_iv(c, &nonce));
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-ctr.c | 19 * @nonce: Nonce for counter mode (16 bytes) 24 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument 36 os_memcpy(counter, nonce, AES_BLOCK_SIZE);
|
H A D | aes-eax.c | 19 * @nonce: Nonce for counter mode 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 53 os_memcpy(buf + 16, nonce, nonce_len); 83 * @nonce: Nonce for counter mode 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 117 os_memcpy(buf + 16, nonce, nonce_len);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-ctr.c | 19 * @nonce: Nonce for counter mode (16 bytes) 24 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument 36 os_memcpy(counter, nonce, AES_BLOCK_SIZE);
|
H A D | aes-eax.c | 19 * @nonce: Nonce for counter mode 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 53 os_memcpy(buf + 16, nonce, nonce_len); 83 * @nonce: Nonce for counter mode 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 117 os_memcpy(buf + 16, nonce, nonce_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-ctr.c | 19 * @nonce: Nonce for counter mode (16 bytes) 24 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, argument 36 os_memcpy(counter, nonce, AES_BLOCK_SIZE);
|
H A D | aes-eax.c | 19 * @nonce: Nonce for counter mode 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 53 os_memcpy(buf + 16, nonce, nonce_len); 83 * @nonce: Nonce for counter mode 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 117 os_memcpy(buf + 16, nonce, nonce_len);
|
/external/chromium_org/chrome/browser/chromeos/settings/ |
H A D | token_encryptor.cc | 83 std::string nonce = salt.substr(0, kNonceSize); local 85 CHECK(encryptor.SetCounter(nonce)); 115 std::string nonce = salt.substr(0, kNonceSize); local 117 CHECK(encryptor.SetCounter(nonce));
|
/external/chromium_org/remoting/host/ |
H A D | token_validator_factory_impl.cc | 30 // Length in bytes of the cryptographic nonce used to salt the token scope. 103 std::string nonce; local 104 base::Base64Encode(nonce_bytes, &nonce); 105 return "client:" + remote_jid + " host:" + local_jid + " nonce:" + nonce;
|
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/ |
H A D | polochallengeresponsetest.cc | 26 PoloChallengeResponseTest() : nonce(4) { } 76 nonce[0] = 0x1; 77 nonce[1] = 0x2; 78 nonce[2] = 0x3; 79 nonce[3] = 0x4; 98 Nonce nonce; member in class:polo::pairing::PoloChallengeResponseTest 103 const Alpha* alpha = response->GetAlpha(nonce); 112 const Gamma* gamma = response->GetGamma(nonce); 121 const Gamma* gamma = response->GetGamma(nonce);
|
/external/chromium_org/chromeos/dbus/ |
H A D | shill_manager_client.h | 113 std::string nonce; member in struct:chromeos::ShillManagerClient::VerificationProperties
|
/external/chromium_org/third_party/boringssl/src/crypto/chacha/ |
H A D | chacha_generic.c | 53 const uint8_t key[32], const uint8_t nonce[8], 84 const uint8_t key[32], const uint8_t nonce[8], 93 CRYPTO_chacha_20_neon(out, in, in_len, key, nonce, counter); 115 input[14] = U8TO32_LITTLE(nonce + 0); 116 input[15] = U8TO32_LITTLE(nonce + 4); 83 CRYPTO_chacha_20(uint8_t *out, const uint8_t *in, size_t in_len, const uint8_t key[32], const uint8_t nonce[8], size_t counter) argument
|