Searched refs:nonceResp (Results 1 – 5 of 5) sorted by relevance
/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/ |
D | SaRecord.java | 91 byte[] nonceResp, in SaRecord() argument 99 nonceResponder = nonceResp; in SaRecord() 209 byte[] nonceResp = in makeFirstIkeSaRecord() 217 ikeSaRecordConfig.prf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in makeFirstIkeSaRecord() 219 return makeIkeSaRecord(sKeySeed, nonceInit, nonceResp, ikeSaRecordConfig); in makeFirstIkeSaRecord() 235 byte[] nonceResp = in makeRekeyedIkeSaRecord() 247 oldSaRecord.mSkD, nonceInit, nonceResp, sharedDhKey); in makeRekeyedIkeSaRecord() 249 return makeIkeSaRecord(sKeySeed, nonceInit, nonceResp, ikeSaRecordConfig); in makeRekeyedIkeSaRecord() 275 byte[] nonceResp, in makeIkeSaRecord() argument 280 nonceInit.length + nonceResp.length + 2 * IkePayload.SPI_LEN_IKE); in makeIkeSaRecord() [all …]
|
/packages/modules/IPsec/src/java/com/android/internal/net/ipsec/ike/crypto/ |
D | IkeMacPrf.java | 105 public byte[] generateSKeySeed(byte[] nonceInit, byte[] nonceResp, byte[] sharedDhKey) { in generateSKeySeed() argument 113 .put(Arrays.copyOfRange(nonceResp, 0, 8)); in generateSKeySeed() 115 keyBuffer = ByteBuffer.allocate(nonceInit.length + nonceResp.length); in generateSKeySeed() 116 keyBuffer.put(nonceInit).put(nonceResp); in generateSKeySeed() 132 byte[] skD, byte[] nonceInit, byte[] nonceResp, byte[] sharedDhKey) { in generateRekeyedSKeySeed() argument 134 ByteBuffer.allocate(sharedDhKey.length + nonceInit.length + nonceResp.length); in generateRekeyedSKeySeed() 135 dataToSign.put(sharedDhKey).put(nonceInit).put(nonceResp); in generateRekeyedSKeySeed()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/crypto/ |
D | IkeMacPrfTest.java | 188 byte[] nonceResp = TestUtils.hexStringToByteArray(IKE_NONCE_RESP_HEX_STRING); in testGenerateSKeySeedHmacSha1() 192 mIkeHmacSha1Prf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in testGenerateSKeySeedHmacSha1() 201 byte[] nonceResp = TestUtils.hexStringToByteArray(PRF_HMAC256_IKE_NONCE_RESP_HEX_STRING); in testGenerateSKeySeedHmacSha256() 206 mIkeHmacSha256Prf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in testGenerateSKeySeedHmacSha256() 216 byte[] nonceResp = TestUtils.hexStringToByteArray(IKE_NONCE_RESP_HEX_STRING); in testGenerateRekeyedSKeySeed() 221 mIkeHmacSha1Prf.generateRekeyedSKeySeed(old_skd, nonceInit, nonceResp, sharedDhKey); in testGenerateRekeyedSKeySeed() 317 byte[] nonceResp = TestUtils.hexStringToByteArray(PRF_AES128_IKE_NONCE_RESP_HEX_STRING); in testGenerateSKeySeedAes128XCbc() 322 mIkeAes128XCbcPrf.generateSKeySeed(nonceInit, nonceResp, sharedDhKey); in testGenerateSKeySeedAes128XCbc() 344 byte[] nonceResp = hexStringToByteArray(nonceRespHex); in testGenerateRekeySKeySeedAes128XCbc()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/ |
D | SaRecordTest.java | 175 byte[] nonceResp = TestUtils.hexStringToByteArray(IKE_NONCE_RESP_HEX_STRING); in testMakeIkeSaRecord() 198 mSaRecordHelper.makeIkeSaRecord(sKeySeed, nonceInit, nonceResp, ikeSaRecordConfig); in testMakeIkeSaRecord() 232 byte[] nonceResp = TestUtils.hexStringToByteArray(IKE_NONCE_RESP_HEX_STRING); in testMakeChildSaRecord() 306 sharedKey, nonceInit, nonceResp, childSaRecordConfig); in testMakeChildSaRecord()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/message/ |
D | IkeAuthPayloadTest.java | 124 byte[] nonceResp = TestUtils.hexStringToByteArray(PSK_NONCE_RESP_HEX_STRING); in testGetSignedOctets() 128 ikeInitRequest, nonceResp, idBytes, mIkeHmacSha1Prf, skpBytes); in testGetSignedOctets()
|