/aosp12/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/message/ |
H A D | IkeAuthPskPayloadTest.java | 72 private static final byte[] NONCE = TestUtils.hexStringToByteArray(PSK_NONCE_RESP_HEX_STRING); field in IkeAuthPskPayloadTest 91 PSK, IKE_INIT_REQUEST, NONCE, ID_PAYLOAD_BODY, mIkeHmacSha1Prf, PRF_KEY); in testBuildOutboundIkeAuthPskPayload() 126 PSK, IKE_INIT_REQUEST, NONCE, ID_PAYLOAD_BODY, mIkeHmacSha1Prf, PRF_KEY); in testVerifyReceivedSignature() 132 byte[] nonce = Arrays.copyOf(NONCE, NONCE.length); in testVerifyReceivedSignatureFailure()
|
/aosp12/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/eap/ |
H A D | EapSimTest.java | 49 private static final byte[] NONCE = hexStringToByteArray("37f3ddd3954c4831a5ee08c574844398"); field in EapSimTest 248 System.arraycopy(NONCE, 0, dst, 0, NONCE.length); in verifyEapSimStart() 250 }).when(mMockSecureRandom).nextBytes(eq(new byte[NONCE.length])); in verifyEapSimStart()
|
/aosp12/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/1/android/hardware/security/keymint/ |
H A D | Tag.aidl | 94 NONCE = -1879047191, enumConstant
|
/aosp12/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/current/android/hardware/security/keymint/ |
H A D | Tag.aidl | 94 NONCE = -1879047191, enumConstant
|
/aosp12/packages/providers/MediaProvider/tests/transcode/src/com/android/providers/media/transcode/ |
H A D | TranscodeTest.java | 74 static final String NONCE = String.valueOf(System.nanoTime()); field in TranscodeTest 75 private static final String HEVC_FILE_NAME = "TranscodeTestHEVC_" + NONCE + ".mp4"; 76 private static final String SMALL_HEVC_FILE_NAME = "TranscodeTestHevcSmall_" + NONCE + ".mp4"; 77 private static final String LEGACY_FILE_NAME = "TranscodeTestLegacy_" + NONCE + ".mp4";
|
/aosp12/hardware/interfaces/security/keymint/aidl/android/hardware/security/keymint/ |
H A D | Tag.aidl | 912 NONCE = TagType.BYTES | 1001, enumConstant
|
/aosp12/packages/providers/MediaProvider/tests/src/com/android/providers/media/util/ |
H A D | FileUtilsTest.java | 105 private static final String NONCE = String.valueOf(System.nanoTime()); field in FileUtilsTest 107 private static final String TEST_DIRECTORY_NAME = "FileUtilsTestDirectory" + NONCE; 108 private static final String TEST_FILE_NAME = "FileUtilsTestFile" + NONCE;
|
/aosp12/frameworks/base/core/java/android/security/keymaster/ |
H A D | KeymasterDefs.java | 127 public static final int KM_TAG_NONCE = Tag.NONCE; // KM_BYTES | 1001;
|
/aosp12/hardware/interfaces/security/keymint/support/include/keymint_support/ |
H A D | keymint_tags.h | 105 DECLARE_TYPED_TAG(NONCE);
|
/aosp12/system/keymaster/ng/include/ |
H A D | keymaster_tags.h | 156 DECLARE_TYPED_TAG(NONCE);
|
/aosp12/hardware/interfaces/keymaster/3.0/vts/functional/ |
H A D | keymaster_tags.h | 139 DECLARE_TYPED_TAG(NONCE);
|
H A D | keymaster_hidl_hal_test.cpp | 126 case Tag::NONCE: in operator ==()
|
/aosp12/system/keymaster/include/keymaster/km_openssl/ |
H A D | attestation_record.h | 233 NONCE = -75008, enumerator
|
/aosp12/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
H A D | keymaster_tags.h | 141 DECLARE_TYPED_TAG(NONCE);
|
/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
H A D | RecoverableKeyStoreManagerTest.java | 138 private static final byte[] NONCE = getUtf8Bytes("nonce"); field in RecoverableKeyStoreManagerTest 1227 WrappedKey wrappedKey = new WrappedKey(NONCE, KEY_MATERIAL, keyMetadata, GENERATION_ID, in setRecoveryStatus()
|
/aosp12/system/security/keystore2/src/km_compat/ |
H A D | km_compat_type_conversion.h | 719 case KMV1::Tag::NONCE: in convertKeyParameterToLegacy() 1017 case V4_0::Tag::NONCE: in convertKeyParameterFromLegacy()
|
/aosp12/system/security/keystore2/src/ |
H A D | enforcements.rs | 591 && op_params.iter().any(|kp| kp.tag == Tag::NONCE) in authorize_create()
|
H A D | key_parameter.rs | 944 #[key_param(tag = NONCE, field = Blob)]
|
/aosp12/system/keymaster/km_openssl/ |
H A D | attestation_record.cpp | 861 eat_record.add(EatClaim::NONCE, blob_to_bstr(attestation_challenge)); in build_eat_record() 1536 case EatClaim::NONCE: in parse_eat_record()
|
/aosp12/hardware/interfaces/keymaster/3.0/ |
H A D | types.hal | 145 NONCE = TagType:BYTES | 1001, /** Nonce or Initialization Vector */
|
H A D | IKeymasterDevice.hal | 264 * inParams may contain a tag Tag::NONCE.
|
/aosp12/hardware/interfaces/keymaster/4.0/ |
H A D | IKeymasterDevice.hal | 948 * the key doesn't have this tag, but the caller provided Tag::NONCE to this method, 1037 * Tag::NONCE in outParams. CBC and CTR IVs are 16 bytes. GCM nonces are 12 bytes. If the key 1039 * Tag::NONCE in inParams. If a nonce is provided when Tag::CALLER_NONCE is not authorized, 1064 * contain a tag Tag::NONCE. If Tag::NONCE is provided for a key without
|
H A D | types.hal | 159 * any operation that provides Tag::NONCE to begin() with ErrorCode::CALLER_NONCE_PROHIBITED. 824 * Tag::NONCE is used to provide or return a nonce or Initialization Vector (IV) for AES-GCM, 836 NONCE = TagType:BYTES | 1001,
|