/packages/providers/MediaProvider/tests/src/com/android/providers/media/util/ |
D | LoggingTest.java | 55 final String nonce = String.valueOf(System.nanoTime()); in testSimple() local 56 Logging.logPersistent(nonce); in testSimple() 58 assertLoggedMessageContains(nonce); in testSimple() 63 final long nonce = System.nanoTime(); in testFormat() local 64 Logging.logPersistent("%d", nonce); in testFormat() 66 assertLoggedMessageContains(String.valueOf(nonce)); in testFormat() 69 private void assertLoggedMessageContains(String nonce) { in assertLoggedMessageContains() argument 74 assertTrue(os.toString().contains(nonce)); in assertLoggedMessageContains()
|
/packages/modules/adb/pairing_auth/ |
D | aes_128_gcm.cpp | 52 std::vector<uint8_t> nonce(EVP_AEAD_nonce_length(EVP_AEAD_CTX_aead(context_.get())), 0); in Encrypt() local 53 memcpy(nonce.data(), &enc_sequence_, sizeof(enc_sequence_)); in Encrypt() 55 if (!EVP_AEAD_CTX_seal(context_.get(), out, &written_sz, out_len, nonce.data(), nonce.size(), in Encrypt() 68 std::vector<uint8_t> nonce(EVP_AEAD_nonce_length(EVP_AEAD_CTX_aead(context_.get())), 0); in Decrypt() local 69 memcpy(nonce.data(), &dec_sequence_, sizeof(dec_sequence_)); in Decrypt() 71 if (!EVP_AEAD_CTX_open(context_.get(), out, &written_sz, out_len, nonce.data(), nonce.size(), in Decrypt()
|
/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/message/ |
D | IkeAuthPskPayload.java | 71 byte[] nonce, in IkeAuthPskPayload() argument 78 psk, ikeInitBytes, nonce, idPayloadBodyBytes, ikePrf, prfKeyBytes); in IkeAuthPskPayload() 84 byte[] nonce, in calculatePskSignature() argument 90 getSignedOctets(ikeInitBytes, nonce, idPayloadBodyBytes, ikePrf, prfKeyBytes); in calculatePskSignature() 115 byte[] nonce, in verifyInboundSignature() argument 122 psk, ikeInitBytes, nonce, idPayloadBodyBytes, ikePrf, prfKeyBytes); in verifyInboundSignature()
|
D | IkeAuthPayload.java | 100 byte[] nonce, in getSignedOctets() argument 108 ikeInitBytes.length + nonce.length + signedidPayloadBodyBytes.length); in getSignedOctets() 109 buffer.put(ikeInitBytes).put(nonce).put(signedidPayloadBodyBytes); in getSignedOctets()
|
D | IkeAuthDigitalSignPayload.java | 193 byte[] nonce, in IkeAuthDigitalSignPayload() argument 200 getSignedOctets(ikeInitBytes, nonce, idPayloadBodyBytes, ikePrf, prfKeyBytes); in IkeAuthDigitalSignPayload() 301 byte[] nonce, in verifyInboundSignature() argument 307 getSignedOctets(ikeInitBytes, nonce, idPayloadBodyBytes, ikePrf, prfKeyBytes); in verifyInboundSignature()
|
/packages/modules/Virtualization/libs/bssl/src/ |
D | aead.rs | 115 nonce: &[u8], in seal() 127 nonce.as_ptr(), in seal() 128 nonce.len(), in seal() 148 nonce: &[u8], in open() 161 nonce.as_ptr(), in open() 162 nonce.len(), in open()
|
/packages/modules/Connectivity/nearby/service/java/com/android/server/nearby/presence/ |
D | ExtendedAdvertisement.java | 174 byte[] nonce = getNonce(firstType, firstDeBytes); in fromBytes() 175 if (nonce == null) { in fromBytes() 201 byte[] plaintext = cryptor.decrypt(ciphertext, nonce, keySeed); in fromBytes() 229 nonce, identityHeaderArray, ciphertext); in fromBytes() 304 byte[] nonce; in toBytesInternal() 309 nonce = CryptorMicImp.generateAdvNonce(mSalt); in toBytesInternal() 314 nonce = CryptorMicImp.generateAdvNonce(mSalt, CIPHER_START_INDEX); in toBytesInternal() 334 byte[] ciphertext = getCiphertext(nonce, dataElementList); in toBytesInternal() 355 mLength + PRESENCE_UUID_BYTES.length + nonce.length - CryptorMicImp.MIC_LENGTH); in toBytesInternal() 360 micInputBuffer.put(nonce); in toBytesInternal() [all …]
|
/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/crypto/ |
D | IkeNormalModeCipher.java | 75 byte[] nonce = concatenateByteArray(salt, ivBytes); in doCipherAction() 77 nonce = concatenateByteArray(nonce, AES_CTR_INITIAL_COUNTER); in doCipherAction() 81 IvParameterSpec iv = new IvParameterSpec(nonce); in doCipherAction()
|
D | IkeCombinedModeCipher.java | 131 private AlgorithmParameterSpec getParamSpec(byte[] nonce) { in getParamSpec() argument 138 return new GCMParameterSpec(mChecksumLen * 8, nonce); in getParamSpec() 140 return new IvParameterSpec(nonce); in getParamSpec()
|
/packages/modules/Virtualization/microdroid_manager/src/ |
D | instance.rs | 126 let mut nonce = [0; AES_256_GCM_NONCE_LENGTH]; in read_microdroid_data() localVariable 127 self.file.read_exact(&mut nonce)?; in read_microdroid_data() 147 let plaintext = decrypt_aead(cipher, &key, Some(&nonce), &header, &data, &tag)?; in read_microdroid_data() 186 let nonce = rand::random::<[u8; AES_256_GCM_NONCE_LENGTH]>(); in write_microdroid_data() localVariable 188 self.file.write_all(nonce.as_ref())?; in write_microdroid_data() 194 let ciphertext = encrypt_aead(cipher, &key, Some(&nonce), &header, &data, &mut tag)?; in write_microdroid_data()
|
/packages/apps/Car/DebuggingRestrictionController/app/src/main/java/com/android/car/debuggingrestrictioncontroller/ui/token/ |
D | TokenViewModel.java | 52 final String nonce = Base64.encodeToString(nonceBytes, Base64.DEFAULT); in requestAccessToken() local 53 query.put(FIELD_NONCE, nonce); in requestAccessToken() 69 TokenValidator.parseAndVerify(task.getResult(), nonce); in requestAccessToken()
|
/packages/modules/Wifi/service/java/com/android/server/wifi/aware/ |
D | PairingConfigManager.java | 106 public String getPairedDeviceAlias(String packageName, byte[] nonce, byte[] tag, byte[] mac) { in getPairedDeviceAlias() argument 112 if (checkMatchAlias(alias, nonce, tag, mac)) { in getPairedDeviceAlias() 119 private boolean checkMatchAlias(String alias, byte[] nonce, byte[] tag, byte[] mac) { in checkMatchAlias() argument 130 hash.update(nonce); in checkMatchAlias()
|
D | WifiAwareNativeCallback.java | 341 int rangingMeasurementInMm, byte[] scid, int peerCipherType, byte[] nonce, byte[] tag, in eventMatch() argument 346 rangingMeasurementInMm, scid, peerCipherType, nonce, tag, pairingConfig, in eventMatch() 414 int ndpInstanceId, int requestType, boolean enableCache, byte[] nonce, byte[] tag) { in eventPairingRequest() argument 416 peerDiscMacAddr, ndpInstanceId, requestType, enableCache, nonce, tag); in eventPairingRequest()
|
/packages/apps/Dialer/java/com/android/voicemail/impl/mail/store/imap/ |
D | DigestMd5Utils.java | 62 public String nonce; field in DigestMd5Utils.Data 77 nonce = challenge.get(DIGEST_NONCE); in Data() 113 .appendQuoted(DIGEST_NONCE, nonce) in createResponse() 164 a1.append(":").append(data.nonce).append(":").append(data.cnonce); in getResponse() 175 data.nonce in getResponse()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/message/ |
D | IkeAuthPskPayloadTest.java | 132 byte[] nonce = Arrays.copyOf(NONCE, NONCE.length); in testVerifyReceivedSignatureFailure() 133 nonce[0]++; in testVerifyReceivedSignatureFailure() 137 PSK, IKE_INIT_REQUEST, nonce, ID_PAYLOAD_BODY, mIkeHmacSha1Prf, PRF_KEY); in testVerifyReceivedSignatureFailure()
|
/packages/apps/Car/DebuggingRestrictionController/app/src/main/java/com/android/car/debuggingrestrictioncontroller/auth/ |
D | TokenPayload.java | 26 private String nonce; field in TokenPayload 35 return nonce; in getNonce()
|
/packages/apps/Car/DebuggingRestrictionController/server/functions/ |
D | index.js | 16 nonce: data.nonce, property
|
/packages/modules/Bluetooth/tools/rootcanal/rust/test/SP/ |
D | BV-27-C.in | 85 nonce: [0; 16], 93 nonce: [0; 16],
|
D | BV-11-C.in | 83 nonce: [0; 16], 91 nonce: [0; 16],
|
D | BV-09-C.in | 83 nonce: [0; 16], 91 nonce: [0; 16],
|
D | BV-24-C.in | 110 nonce: [0; 16], 118 nonce: [0; 16],
|
D | BV-21-C.in | 85 nonce: [0; 16], 93 nonce: [0; 16],
|
D | BV-23-C.in | 98 nonce: [0; 16], 106 nonce: [0; 16],
|
D | BV-10-C.in | 101 nonce: [0; 16], 109 nonce: [0; 16],
|
/packages/modules/Virtualization/libs/bssl/tests/ |
D | aead_test.rs | 54 let nonce = &[]; in aes_256_gcm_fails_to_encrypt_with_invalid_nonce() localVariable 58 let err = aead_ctx.seal(MESSAGE, nonce, ad, &mut out).unwrap_err(); in aes_256_gcm_fails_to_encrypt_with_invalid_nonce()
|