Searched refs:nonceInit (Results 1 – 4 of 4) sorted by relevance
/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/ |
D | SaRecord.java | 90 byte[] nonceInit, in SaRecord() argument 98 nonceInitiator = nonceInit; in SaRecord() 205 byte[] nonceInit = in makeFirstIkeSaRecord() 217 ikeSaRecordConfig.prf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in makeFirstIkeSaRecord() 219 return makeIkeSaRecord(sKeySeed, nonceInit, nonceResp, ikeSaRecordConfig); in makeFirstIkeSaRecord() 231 byte[] nonceInit = in makeRekeyedIkeSaRecord() 247 oldSaRecord.mSkD, nonceInit, nonceResp, sharedDhKey); in makeRekeyedIkeSaRecord() 249 return makeIkeSaRecord(sKeySeed, nonceInit, nonceResp, ikeSaRecordConfig); in makeRekeyedIkeSaRecord() 274 byte[] nonceInit, in makeIkeSaRecord() argument 280 nonceInit.length + nonceResp.length + 2 * IkePayload.SPI_LEN_IKE); in makeIkeSaRecord() [all …]
|
/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/crypto/ |
D | IkeMacPrf.java | 105 public byte[] generateSKeySeed(byte[] nonceInit, byte[] nonceResp, byte[] sharedDhKey) { in generateSKeySeed() argument 112 .put(Arrays.copyOfRange(nonceInit, 0, 8)) in generateSKeySeed() 115 keyBuffer = ByteBuffer.allocate(nonceInit.length + nonceResp.length); in generateSKeySeed() 116 keyBuffer.put(nonceInit).put(nonceResp); in generateSKeySeed() 132 byte[] skD, byte[] nonceInit, byte[] nonceResp, byte[] sharedDhKey) { in generateRekeyedSKeySeed() argument 134 ByteBuffer.allocate(sharedDhKey.length + nonceInit.length + nonceResp.length); in generateRekeyedSKeySeed() 135 dataToSign.put(sharedDhKey).put(nonceInit).put(nonceResp); in generateRekeyedSKeySeed()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/crypto/ |
D | IkeMacPrfTest.java | 187 byte[] nonceInit = TestUtils.hexStringToByteArray(IKE_NONCE_INIT_HEX_STRING); in testGenerateSKeySeedHmacSha1() 192 mIkeHmacSha1Prf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in testGenerateSKeySeedHmacSha1() 200 byte[] nonceInit = TestUtils.hexStringToByteArray(PRF_HMAC256_IKE_NONCE_INIT_HEX_STRING); in testGenerateSKeySeedHmacSha256() 206 mIkeHmacSha256Prf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in testGenerateSKeySeedHmacSha256() 215 byte[] nonceInit = TestUtils.hexStringToByteArray(IKE_NONCE_INIT_HEX_STRING); in testGenerateRekeyedSKeySeed() 221 mIkeHmacSha1Prf.generateRekeyedSKeySeed(old_skd, nonceInit, nonceResp, sharedDhKey); in testGenerateRekeyedSKeySeed() 316 byte[] nonceInit = TestUtils.hexStringToByteArray(PRF_AES128_IKE_NONCE_INIT_HEX_STRING); in testGenerateSKeySeedAes128XCbc() 322 mIkeAes128XCbcPrf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in testGenerateSKeySeedAes128XCbc() 343 byte[] nonceInit = hexStringToByteArray(nonceInitHex); in testGenerateRekeySKeySeedAes128XCbc()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/ |
D | SaRecordTest.java | 174 byte[] nonceInit = TestUtils.hexStringToByteArray(IKE_NONCE_INIT_HEX_STRING); in testMakeIkeSaRecord() 198 mSaRecordHelper.makeIkeSaRecord(sKeySeed, nonceInit, nonceResp, ikeSaRecordConfig); in testMakeIkeSaRecord() 231 byte[] nonceInit = TestUtils.hexStringToByteArray(IKE_NONCE_INIT_HEX_STRING); in testMakeChildSaRecord() 306 sharedKey, nonceInit, nonceResp, childSaRecordConfig); in testMakeChildSaRecord()
|