/external/v8/tools/ |
H A D | mac-tick-processor | 6 $tools_path/linux-tick-processor --mac --nm=$tools_path/mac-nm $@
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/io/ |
H A D | MacOutputStream.java | 12 protected Mac mac; field in class:MacOutputStream 16 Mac mac) 19 this.mac = mac; 25 mac.update((byte)b); 35 mac.update(b, off, len); 41 return mac; 14 MacOutputStream( OutputStream stream, Mac mac) argument
|
H A D | MacInputStream.java | 12 protected Mac mac; field in class:MacInputStream 16 Mac mac) 19 this.mac = mac; 29 mac.update((byte)b); 43 mac.update(b, off, n); 50 return mac; 14 MacInputStream( InputStream stream, Mac mac) argument
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 68 unsigned char *mac, unsigned int *maclen) 82 salt = p12->mac->salt->data; 83 saltlen = p12->mac->salt->length; 84 if (!p12->mac->iter) iter = 1; 85 else iter = ASN1_INTEGER_get (p12->mac->iter); 87 EVP_get_digestbyobj (p12->mac->dinfo->algor->algorithm))) { 103 HMAC_Final(&hmac, mac, maclen); 108 /* Verify the mac */ 111 unsigned char mac[EVP_MAX_MD_SIZE]; local 113 if(p12->mac 67 PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *mac, unsigned int *maclen) argument 131 unsigned char mac[EVP_MAX_MD_SIZE]; local [all...] |
/external/webkit/WebCore/platform/network/mac/ |
H A D | AuthenticationMac.h | 40 NSURLAuthenticationChallenge *mac(const AuthenticationChallenge&); 41 NSURLProtectionSpace *mac(const ProtectionSpace&); 42 NSURLCredential *mac(const Credential&);
|
H A D | CredentialStorageMac.mm | 36 NSURLCredential *credential = [[NSURLCredentialStorage sharedCredentialStorage] defaultCredentialForProtectionSpace:mac(protectionSpace)];
|
/external/bluetooth/bluez/input/ |
H A D | sixpair.c | 92 int mac[6]; local 96 &mac[0],&mac[1],&mac[2],&mac[3],&mac[4],&mac[5]) != 6) { 102 msg[2] = mac[0]; 103 msg[3] = mac[1]; 104 msg[4] = mac[ 127 int mac[6]; local [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/ |
H A D | EAXBlockCipher.java | 41 private Mac mac; field in class:EAXBlockCipher 59 mac = new CMac(cipher); 62 associatedTextMac = new byte[mac.getMacSize()]; 63 nonceMac = new byte[mac.getMacSize()]; 105 macSize = mac.getMacSize() / 2; 115 mac.init(keyParam); 117 mac.update(tag, 0, blockSize); 118 mac.update(associatedText, 0, associatedText.length); 119 mac.doFinal(associatedTextMac, 0); 122 mac 292 verifyMac(byte[] mac, int off) argument [all...] |
/external/wpa_supplicant/ |
H A D | crypto_none.c | 21 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | md5.h | 21 const u8 *addr[], const size_t *len, u8 *mac); 23 u8 *mac);
|
H A D | sha256.h | 21 const u8 *addr[], const size_t *len, u8 *mac); 23 size_t data_len, u8 *mac);
|
H A D | eap_pax_common.c | 41 u8 mac[SHA1_MAC_LEN]; local 66 hmac_sha1_vector(key, key_len, 3, addr, len, mac); 67 os_memcpy(pos, mac, clen); 87 * @mac: Buffer for the MAC value (EAP_PAX_MAC_LEN = 16 bytes) 96 u8 *mac) 116 os_memcpy(mac, hash, EAP_PAX_MAC_LEN); 92 eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, const u8 *data1, size_t data1_len, const u8 *data2, size_t data2_len, const u8 *data3, size_t data3_len, u8 *mac) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | crypto_none.c | 21 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | md5.h | 21 const u8 *addr[], const size_t *len, u8 *mac); 23 u8 *mac);
|
H A D | sha256.h | 21 const u8 *addr[], const size_t *len, u8 *mac); 23 size_t data_len, u8 *mac);
|
/external/elfutils/libdw/ |
H A D | dwarf_getmacros.c | 95 Dwarf_Macro mac; local 96 mac.opcode = opcode; 97 mac.param1 = u128; 99 mac.param2.u = u128_2; 101 mac.param2.s = str; 103 if (callback (&mac, arg) != DWARF_CB_OK)
|
/external/dropbear/libtomcrypt/ |
H A D | Android.mk | 29 src/hashes/whirl/whirl.c src/mac/f9/f9_done.c src/mac/f9/f9_file.c src/mac/f9/f9_init.c \ 30 src/mac/f9/f9_memory.c src/mac/f9/f9_memory_multi.c src/mac/f9/f9_process.c src/mac/f9/f9_test.c \ 31 src/mac/hmac/hmac_done.c src/mac/hmac/hmac_file.c src/mac/hma [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/macs/ |
H A D | CBCBlockCipherMac.java | 16 private byte[] mac; field in class:CBCBlockCipherMac 99 mac = new byte[cipher.getBlockSize()]; 128 cipher.processBlock(buf, 0, mac, 0); 152 cipher.processBlock(buf, 0, mac, 0); 160 cipher.processBlock(in, inOff, mac, 0); 193 cipher.processBlock(buf, 0, mac, 0); 200 cipher.processBlock(buf, 0, mac, 0); 202 System.arraycopy(mac, 0, out, outOff, macSize); 210 * Reset the mac generator.
|
H A D | CMac.java | 35 private byte[] mac; field in class:CMac 92 mac = new byte[cipher.getBlockSize()]; 146 cipher.processBlock(buf, 0, mac, 0); 168 cipher.processBlock(buf, 0, mac, 0); 176 cipher.processBlock(in, inOff, mac, 0); 203 for (int i = 0; i < mac.length; i++) 208 cipher.processBlock(buf, 0, mac, 0); 210 System.arraycopy(mac, 0, out, outOff, macSize); 218 * Reset the mac generator.
|
/external/iptables/extensions/ |
H A D | libip6t_mac.c | 21 " --mac-source [!] XX:XX:XX:XX:XX:XX\n" 27 { "mac-source", 1, 0, '1' }, 32 parse_mac(const char *mac, struct ip6t_mac_info *info) argument 36 if (strlen(mac) != ETH_ALEN*3-1) 37 exit_error(PARAMETER_PROBLEM, "Bad mac address `%s'", mac); 43 number = strtol(mac + i*3, &end, 16); 45 if (end == mac + i*3 + 2 51 "Bad mac address `%s'", mac); 123 static struct ip6tables_match mac = { variable in typeref:struct:ip6tables_match [all...] |
H A D | libipt_mac.c | 21 " --mac-source [!] XX:XX:XX:XX:XX:XX\n" 27 { "mac-source", 1, 0, '1' }, 32 parse_mac(const char *mac, struct ipt_mac_info *info) argument 36 if (strlen(mac) != ETH_ALEN*3-1) 37 exit_error(PARAMETER_PROBLEM, "Bad mac address `%s'", mac); 43 number = strtol(mac + i*3, &end, 16); 45 if (end == mac + i*3 + 2 51 "Bad mac address `%s'", mac); 123 static struct iptables_match mac = { variable in typeref:struct:iptables_match [all...] |
H A D | libipt_CLUSTERIP.c | 32 " --clustermac <mac> Set clusterIP MAC address\n" 63 parse_mac(const char *mac, char *macbuf) argument 67 if (strlen(mac) != ETH_ALEN*3-1) 68 exit_error(PARAMETER_PROBLEM, "Bad mac address `%s'", mac); 74 number = strtol(mac + i*3, &end, 16); 76 if (end == mac + i*3 + 2 82 "Bad mac address `%s'", mac); 199 static char *mac2str(const u_int8_t mac[ETH_ALE argument [all...] |
/external/webkit/WebKitTools/Scripts/webkitpy/layout_tests/port/ |
H A D | __init__.py | 47 port_to_use = 'chromium-mac' 52 elif port_to_use.startswith('mac'): 53 import mac namespace 54 return mac.MacPort(port_name, options) 55 elif port_to_use.startswith('chromium-mac'):
|
/external/iptables/include/linux/netfilter_ipv4/ |
H A D | ipt_ULOG.h | 50 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
|
/external/kernel-headers/original/linux/netfilter_ipv4/ |
H A D | ipt_ULOG.h | 45 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
|