/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/io/ |
H A D | MacOutputStream.java | 11 protected Mac mac; field in class:MacOutputStream 14 Mac mac) 16 this.mac = mac; 22 mac.update((byte)b); 31 mac.update(b, off, len); 36 return mac.doFinal(); 13 MacOutputStream( Mac mac) argument
|
/external/chromium/net/base/ |
H A D | ssl_cipher_suite_names_unittest.cc | 13 const char *key_exchange, *cipher, *mac; local 14 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, 0xc001); 17 EXPECT_STREQ(mac, "SHA1"); 19 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, 0xff31); 22 EXPECT_STREQ(mac, "???");
|
H A D | platform_mime_util_mac.cc | 11 #include "base/mac/scoped_cftyperef.h" 21 base::mac::ScopedCFTypeRef<CFStringRef> ext_ref( 25 base::mac::ScopedCFTypeRef<CFStringRef> uti( 31 base::mac::ScopedCFTypeRef<CFStringRef> mime_ref( 42 base::mac::ScopedCFTypeRef<CFStringRef> mime_ref( 46 base::mac::ScopedCFTypeRef<CFStringRef> uti( 52 base::mac::ScopedCFTypeRef<CFStringRef> ext_ref(
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/ |
H A D | MacOutputStream.java | 11 protected Mac mac; field in class:MacOutputStream 14 Mac mac) 16 this.mac = mac; 22 mac.update((byte)b); 31 mac.update(b, off, len); 36 byte[] res = new byte[mac.getMacSize()]; 38 mac.doFinal(res, 0); 13 MacOutputStream( Mac mac) argument
|
H A D | MacInputStream.java | 12 protected Mac mac; field in class:MacInputStream 16 Mac mac) 19 this.mac = mac; 29 mac.update((byte)b); 43 mac.update(b, off, n); 50 return mac; 14 MacInputStream( InputStream stream, Mac mac) argument
|
/external/openssh/ |
H A D | mac.c | 1 /* $OpenBSD: mac.c,v 1.16 2011/08/02 01:22:11 djm Exp $ */ 42 #include "mac.h" 75 mac_setup_by_id(Mac *mac, int which) argument 78 mac->type = macs[which].type; 79 if (mac->type == SSH_EVP) { 80 mac->evp_md = (*macs[which].mdfunc)(); 81 if ((evp_len = EVP_MD_size(mac->evp_md)) <= 0) 82 fatal("mac %s len %d", mac->name, evp_len); 83 mac 94 mac_setup(Mac *mac, char *name) argument 111 mac_init(Mac *mac) argument 130 mac_compute(Mac *mac, u_int32_t seqno, u_char *data, int datalen) argument 160 mac_clear(Mac *mac) argument [all...] |
/external/chromium/base/mac/ |
H A D | os_crash_dumps.h | 9 namespace mac { namespace in namespace:base 17 } // namespace mac
|
/external/v8/tools/ |
H A D | mac-tick-processor | 6 $tools_path/linux-tick-processor --mac --nm=$tools_path/mac-nm $@
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/digest/ |
H A D | MAC.java | 15 Digest mac; field in class:MAC 48 mac = new HMAC(new SHA1(), key, 20); 52 mac = new HMAC(new SHA1(), key, 12); 56 mac = new HMAC(new MD5(), key, 16); 60 mac = new HMAC(new MD5(), key, 12); 65 size = mac.getDigestLength(); 70 mac.reset(); 71 mac.update((byte) (seq >> 24)); 72 mac.update((byte) (seq >> 16)); 73 mac [all...] |
/external/wpa_supplicant_8/hostapd/logwatch/ |
H A D | hostapd | 29 if (my ($iface,$mac,$layer,$details) = ($line =~ /(.*?): STA (.*?) (.*?): (.*?)$/i)) { 34 $hostapd{$iface}->{$mac}->{$layer}->{$details}++; 43 foreach my $mac (sort keys %{$hostapd{$iface}}) { 44 print " Client MAC Address $mac:\n"; 45 foreach my $layer (sort keys %{$hostapd{$iface}->{$mac}}) { 47 foreach my $details (sort keys %{$hostapd{$iface}->{$mac}->{$layer}}) { 49 my $count = $hostapd{$iface}->{$mac}->{$layer}->{$details};
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 68 unsigned char *mac, unsigned int *maclen) 82 salt = p12->mac->salt->data; 83 saltlen = p12->mac->salt->length; 84 if (!p12->mac->iter) iter = 1; 85 else iter = ASN1_INTEGER_get (p12->mac->iter); 87 EVP_get_digestbyobj (p12->mac->dinfo->algor->algorithm))) { 103 || !HMAC_Final(&hmac, mac, maclen)) 112 /* Verify the mac */ 115 unsigned char mac[EVP_MAX_MD_SIZE]; local 117 if(p12->mac 67 PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *mac, unsigned int *maclen) argument 135 unsigned char mac[EVP_MAX_MD_SIZE]; local [all...] |
/external/webkit/Source/WebCore/platform/network/mac/ |
H A D | AuthenticationMac.h | 42 NSURLAuthenticationChallenge *mac(const AuthenticationChallenge&); 43 NSURLProtectionSpace *mac(const ProtectionSpace&); 44 NSURLCredential *mac(const Credential&);
|
/external/chromium/chrome/browser/ui/cocoa/tab_contents/ |
H A D | favicon_util.h | 11 namespace mac { namespace 18 } // namespace mac
|
/external/chromium/chrome/common/ |
H A D | chrome_content_plugin_client.cc | 10 #include "base/mac/mac_util.h" 11 #include "base/mac/scoped_cftyperef.h" 22 base::mac::ScopedCFTypeRef<CFStringRef> cf_plugin_name( 24 base::mac::ScopedCFTypeRef<CFStringRef> app_name( 27 base::mac::ScopedCFTypeRef<CFStringRef> process_name( 30 base::mac::SetProcessName(process_name);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | md5.h | 15 const u8 *addr[], const size_t *len, u8 *mac); 17 u8 *mac);
|
H A D | crypto_none.c | 15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | md5.c | 23 * @mac: Buffer for the hash (16 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 74 if (md5_vector(1 + num_elem, _addr, _len, mac)) 86 _addr[1] = mac; 88 return md5_vector(2, _addr, _len, mac); 98 * @mac: Buffer for the hash (16 bytes) 102 u8 *mac) 104 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 101 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | md5.h | 15 const u8 *addr[], const size_t *len, u8 *mac); 17 u8 *mac);
|
H A D | crypto_none.c | 15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md5.h | 15 const u8 *addr[], const size_t *len, u8 *mac); 17 u8 *mac);
|
H A D | crypto_none.c | 15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | crypto_none.c | 21 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | md5.h | 21 const u8 *addr[], const size_t *len, u8 *mac); 23 u8 *mac);
|
H A D | sha256.h | 21 const u8 *addr[], const size_t *len, u8 *mac); 23 size_t data_len, u8 *mac);
|
/external/elfutils/libdw/ |
H A D | dwarf_getmacros.c | 136 Dwarf_Macro mac; local 137 mac.opcode = opcode; 138 mac.param1 = u128; 140 mac.param2.u = u128_2; 142 mac.param2.s = str; 144 if (callback (&mac, arg) != DWARF_CB_OK)
|