Searched refs:nonceResp (Results 1 – 5 of 5) sorted by relevance
/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/ |
D | SaRecord.java | 91 byte[] nonceResp, in SaRecord() argument 99 nonceResponder = nonceResp; in SaRecord() 209 byte[] nonceResp = in makeFirstIkeSaRecord() 217 ikeSaRecordConfig.prf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in makeFirstIkeSaRecord() 219 return makeIkeSaRecord(sKeySeed, nonceInit, nonceResp, ikeSaRecordConfig); in makeFirstIkeSaRecord() 235 byte[] nonceResp = in makeRekeyedIkeSaRecord() 247 oldSaRecord.mSkD, nonceInit, nonceResp, sharedDhKey); in makeRekeyedIkeSaRecord() 249 return makeIkeSaRecord(sKeySeed, nonceInit, nonceResp, ikeSaRecordConfig); in makeRekeyedIkeSaRecord() 277 byte[] nonceResp, in makeIkeSaRecord() argument 282 nonceInit.length + nonceResp.length + 2 * IkePayload.SPI_LEN_IKE); in makeIkeSaRecord() [all …]
|
/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/crypto/ |
D | IkeMacPrf.java | 165 public byte[] generateSKeySeed(byte[] nonceInit, byte[] nonceResp, byte[] sharedDhKey) { in generateSKeySeed() argument 174 .put(Arrays.copyOfRange(nonceResp, 0, 8)); in generateSKeySeed() 176 keyBuffer = ByteBuffer.allocate(nonceInit.length + nonceResp.length); in generateSKeySeed() 177 keyBuffer.put(nonceInit).put(nonceResp); in generateSKeySeed() 193 byte[] skD, byte[] nonceInit, byte[] nonceResp, byte[] sharedDhKey) { in generateRekeyedSKeySeed() argument 195 ByteBuffer.allocate(sharedDhKey.length + nonceInit.length + nonceResp.length); in generateRekeyedSKeySeed() 196 dataToSign.put(sharedDhKey).put(nonceInit).put(nonceResp); in generateRekeyedSKeySeed()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/crypto/ |
D | IkeMacPrfTest.java | 216 byte[] nonceResp = TestUtils.hexStringToByteArray(IKE_NONCE_RESP_HEX_STRING); in testGenerateSKeySeedHmacSha1() 220 mIkeHmacSha1Prf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in testGenerateSKeySeedHmacSha1() 229 byte[] nonceResp = TestUtils.hexStringToByteArray(PRF_HMAC256_IKE_NONCE_RESP_HEX_STRING); in testGenerateSKeySeedHmacSha256() 234 mIkeHmacSha256Prf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in testGenerateSKeySeedHmacSha256() 244 byte[] nonceResp = TestUtils.hexStringToByteArray(IKE_NONCE_RESP_HEX_STRING); in testGenerateRekeyedSKeySeed() 249 mIkeHmacSha1Prf.generateRekeyedSKeySeed(old_skd, nonceInit, nonceResp, sharedDhKey); in testGenerateRekeyedSKeySeed() 385 byte[] nonceResp = TestUtils.hexStringToByteArray(PRF_AES128_IKE_NONCE_RESP_HEX_STRING); in testGenerateSKeySeedAes128XCbc() 390 mIkeAes128XCbcPrf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in testGenerateSKeySeedAes128XCbc() 412 byte[] nonceResp = hexStringToByteArray(nonceRespHex); in testGenerateRekeySKeySeedAes128XCbc()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/ |
D | SaRecordTest.java | 177 byte[] nonceResp = TestUtils.hexStringToByteArray(IKE_NONCE_RESP_HEX_STRING); in testMakeIkeSaRecord() 200 mSaRecordHelper.makeIkeSaRecord(sKeySeed, nonceInit, nonceResp, ikeSaRecordConfig); in testMakeIkeSaRecord() 234 byte[] nonceResp = TestUtils.hexStringToByteArray(IKE_NONCE_RESP_HEX_STRING); in testMakeChildSaRecord() 308 sharedKey, nonceInit, nonceResp, childSaRecordConfig); in testMakeChildSaRecord()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/message/ |
D | IkeAuthPayloadTest.java | 124 byte[] nonceResp = TestUtils.hexStringToByteArray(PSK_NONCE_RESP_HEX_STRING); in testGetSignedOctets() 128 ikeInitRequest, nonceResp, idBytes, mIkeHmacSha1Prf, skpBytes); in testGetSignedOctets()
|