Searched refs:nonceInit (Results 1 – 4 of 4) sorted by relevance
/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/ |
D | SaRecord.java | 90 byte[] nonceInit, in SaRecord() argument 98 nonceInitiator = nonceInit; in SaRecord() 205 byte[] nonceInit = in makeFirstIkeSaRecord() 217 ikeSaRecordConfig.prf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in makeFirstIkeSaRecord() 219 return makeIkeSaRecord(sKeySeed, nonceInit, nonceResp, ikeSaRecordConfig); in makeFirstIkeSaRecord() 231 byte[] nonceInit = in makeRekeyedIkeSaRecord() 247 oldSaRecord.mSkD, nonceInit, nonceResp, sharedDhKey); in makeRekeyedIkeSaRecord() 249 return makeIkeSaRecord(sKeySeed, nonceInit, nonceResp, ikeSaRecordConfig); in makeRekeyedIkeSaRecord() 276 byte[] nonceInit, in makeIkeSaRecord() argument 282 nonceInit.length + nonceResp.length + 2 * IkePayload.SPI_LEN_IKE); in makeIkeSaRecord() [all …]
|
/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/crypto/ |
D | IkeMacPrf.java | 165 public byte[] generateSKeySeed(byte[] nonceInit, byte[] nonceResp, byte[] sharedDhKey) { in generateSKeySeed() argument 173 .put(Arrays.copyOfRange(nonceInit, 0, 8)) in generateSKeySeed() 176 keyBuffer = ByteBuffer.allocate(nonceInit.length + nonceResp.length); in generateSKeySeed() 177 keyBuffer.put(nonceInit).put(nonceResp); in generateSKeySeed() 193 byte[] skD, byte[] nonceInit, byte[] nonceResp, byte[] sharedDhKey) { in generateRekeyedSKeySeed() argument 195 ByteBuffer.allocate(sharedDhKey.length + nonceInit.length + nonceResp.length); in generateRekeyedSKeySeed() 196 dataToSign.put(sharedDhKey).put(nonceInit).put(nonceResp); in generateRekeyedSKeySeed()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/crypto/ |
D | IkeMacPrfTest.java | 215 byte[] nonceInit = TestUtils.hexStringToByteArray(IKE_NONCE_INIT_HEX_STRING); in testGenerateSKeySeedHmacSha1() 220 mIkeHmacSha1Prf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in testGenerateSKeySeedHmacSha1() 228 byte[] nonceInit = TestUtils.hexStringToByteArray(PRF_HMAC256_IKE_NONCE_INIT_HEX_STRING); in testGenerateSKeySeedHmacSha256() 234 mIkeHmacSha256Prf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in testGenerateSKeySeedHmacSha256() 243 byte[] nonceInit = TestUtils.hexStringToByteArray(IKE_NONCE_INIT_HEX_STRING); in testGenerateRekeyedSKeySeed() 249 mIkeHmacSha1Prf.generateRekeyedSKeySeed(old_skd, nonceInit, nonceResp, sharedDhKey); in testGenerateRekeyedSKeySeed() 384 byte[] nonceInit = TestUtils.hexStringToByteArray(PRF_AES128_IKE_NONCE_INIT_HEX_STRING); in testGenerateSKeySeedAes128XCbc() 390 mIkeAes128XCbcPrf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in testGenerateSKeySeedAes128XCbc() 411 byte[] nonceInit = hexStringToByteArray(nonceInitHex); in testGenerateRekeySKeySeedAes128XCbc()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/ |
D | SaRecordTest.java | 176 byte[] nonceInit = TestUtils.hexStringToByteArray(IKE_NONCE_INIT_HEX_STRING); in testMakeIkeSaRecord() 200 mSaRecordHelper.makeIkeSaRecord(sKeySeed, nonceInit, nonceResp, ikeSaRecordConfig); in testMakeIkeSaRecord() 233 byte[] nonceInit = TestUtils.hexStringToByteArray(IKE_NONCE_INIT_HEX_STRING); in testMakeChildSaRecord() 308 sharedKey, nonceInit, nonceResp, childSaRecordConfig); in testMakeChildSaRecord()
|