/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md5.c | 23 * @mac: Buffer for the hash (16 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 74 if (md5_vector(1 + num_elem, _addr, _len, mac)) 86 _addr[1] = mac; 88 return md5_vector(2, _addr, _len, mac); 98 * @mac: Buffer for the hash (16 bytes) 102 u8 *mac) 104 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 101 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | sha1.c | 23 * @mac: Buffer for the hash (20 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 73 if (sha1_vector(1 + num_elem, _addr, _len, mac)) 85 _addr[1] = mac; 87 return sha1_vector(2, _addr, _len, mac); 97 * @mac: Buffer for the hash (20 bytes) 101 u8 *mac) 103 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 100 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | sha256.c | 23 * @mac: Buffer for the hash (32 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 73 if (sha256_vector(1 + num_elem, _addr, _len, mac) < 0) 85 _addr[1] = mac; 87 return sha256_vector(2, _addr, _len, mac); 97 * @mac: Buffer for the hash (32 bytes) 101 size_t data_len, u8 *mac) 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | aes-omac1.c | 35 * @mac: Buffer for MAC (128 bits, i.e., 16 bytes) 43 const u8 *addr[], const size_t *len, u8 *mac) 97 aes_encrypt(ctx, pad, mac); 108 * @mac: Buffer for MAC (128 bits, i.e., 16 bytes) 115 int omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac) argument 117 return omac1_aes_128_vector(key, 1, &data, &data_len, mac); 42 omac1_aes_128_vector(const u8 *key, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | crypto_internal.c | 151 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument 159 if (mac == NULL || len == NULL) { 172 MD5Final(mac, &ctx->u.md5); 181 SHA1Final(mac, &ctx->u.sha1); 191 sha256_done(&ctx->u.sha256, mac); 202 MD5Final(mac, &ctx->u.md5); 211 MD5Update(&ctx->u.md5, mac, 16); 212 MD5Final(mac, &ctx->u.md5); 222 SHA1Final(mac, &ctx->u.sha1); 231 SHA1Update(&ctx->u.sha1, mac, 2 [all...] |
/external/chromium/base/mac/ |
H A D | mac_util.h | 15 #include "base/mac/foundation_util.h" 26 namespace mac { namespace in namespace:base 113 } // namespace mac 139 namespace mac { \ 150 namespace mac { \ 179 // e.g. LOG(INFO) << base::mac::NSToCFCast(@"foo");
|
H A D | scoped_cftyperef.h | 15 namespace mac { namespace in namespace:base 84 } // namespace mac
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-omac1.c | 35 * @mac: Buffer for MAC (128 bits, i.e., 16 bytes) 43 const u8 *addr[], const size_t *len, u8 *mac) 97 aes_encrypt(ctx, pad, mac); 108 * @mac: Buffer for MAC (128 bits, i.e., 16 bytes) 115 int omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac) argument 117 return omac1_aes_128_vector(key, 1, &data, &data_len, mac); 42 omac1_aes_128_vector(const u8 *key, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | crypto_internal.c | 151 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument 159 if (mac == NULL || len == NULL) { 172 MD5Final(mac, &ctx->u.md5); 181 SHA1Final(mac, &ctx->u.sha1); 191 sha256_done(&ctx->u.sha256, mac); 202 MD5Final(mac, &ctx->u.md5); 211 MD5Update(&ctx->u.md5, mac, 16); 212 MD5Final(mac, &ctx->u.md5); 222 SHA1Final(mac, &ctx->u.sha1); 231 SHA1Update(&ctx->u.sha1, mac, 2 [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-omac1.c | 35 * @mac: Buffer for MAC (128 bits, i.e., 16 bytes) 43 const u8 *addr[], const size_t *len, u8 *mac) 97 aes_encrypt(ctx, pad, mac); 108 * @mac: Buffer for MAC (128 bits, i.e., 16 bytes) 115 int omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac) argument 117 return omac1_aes_128_vector(key, 1, &data, &data_len, mac); 42 omac1_aes_128_vector(const u8 *key, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | crypto_internal.c | 151 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument 159 if (mac == NULL || len == NULL) { 172 MD5Final(mac, &ctx->u.md5); 181 SHA1Final(mac, &ctx->u.sha1); 191 sha256_done(&ctx->u.sha256, mac); 202 MD5Final(mac, &ctx->u.md5); 211 MD5Update(&ctx->u.md5, mac, 16); 212 MD5Final(mac, &ctx->u.md5); 222 SHA1Final(mac, &ctx->u.sha1); 231 SHA1Update(&ctx->u.sha1, mac, 2 [all...] |
/external/apache-harmony/crypto/src/test/impl/java/org/apache/harmony/crypto/tests/javax/crypto/ |
H A D | Mac_ImplTest.java | 84 protected void checkResult(Mac mac) throws InvalidKeyException, argument 86 assertEquals("Incorrect MacLength", mac.getMacLength(), 0); 91 mac.init(scs); 92 byte[] bb = mac.doFinal(); 94 mac.reset(); 95 bb = mac.doFinal(); 98 mac.init(null); 103 mac.init(null, null); 107 mac.init(scs, null); 108 mac [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
H A D | CBCBlockCipherMac.java | 16 private byte[] mac; field in class:CBCBlockCipherMac 99 mac = new byte[cipher.getBlockSize()]; 128 cipher.processBlock(buf, 0, mac, 0); 152 cipher.processBlock(buf, 0, mac, 0); 160 cipher.processBlock(in, inOff, mac, 0); 193 cipher.processBlock(buf, 0, mac, 0); 200 cipher.processBlock(buf, 0, mac, 0); 202 System.arraycopy(mac, 0, out, outOff, macSize); 210 * Reset the mac generator.
|
/external/chromium/net/base/ |
H A D | ssl_cipher_suite_names.cc | 14 // and mac. For all the ciphersuites in the IANA registry, we extract each of 21 // <3 bits> mac 332 const int mac = cs->encoded & 0x7; local 336 *mac_str = kMacNames[mac].name;
|
/external/doclava/res/assets/templates/assets/ |
H A D | doclava-developer-reference.js | 385 var mac = agent.indexOf("macintosh") != -1; variable 388 var control = mac ? e.metaKey && !e.ctrlKey : e.ctrlKey; // get ctrl key
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/digest/ |
H A D | MAC.java | 15 Digest mac; field in class:MAC 48 mac = new HMAC(new SHA1(), key, 20); 52 mac = new HMAC(new SHA1(), key, 12); 56 mac = new HMAC(new MD5(), key, 16); 60 mac = new HMAC(new MD5(), key, 12); 65 size = mac.getDigestLength(); 70 mac.reset(); 71 mac.update((byte) (seq >> 24)); 72 mac.update((byte) (seq >> 16)); 73 mac [all...] |
/external/iptables/include/linux/netfilter_ipv4/ |
H A D | ipt_ULOG.h | 45 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
|
/external/kernel-headers/original/linux/netfilter_ipv4/ |
H A D | ipt_ULOG.h | 45 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
|
/external/webkit/Source/ThirdParty/ANGLE/src/compiler/preprocessor/ |
H A D | symbols.h | 92 MacroSymbol mac; member in union:Symbol_Rec::__anon14468
|
/external/webkit/Tools/Scripts/webkitpy/layout_tests/port/ |
H A D | chromium_mac.py | 36 from webkitpy.layout_tests.port import mac namespace 50 'chromium-mac-leopard', 51 'chromium-mac', 53 'mac-leopard', 54 'mac-snowleopard', 55 'mac', 58 'chromium-mac', 60 'mac-snowleopard', 61 'mac', 64 'chromium-mac', [all...] |
/external/chromium/chrome/browser/ |
H A D | page_info_model.cc | 223 const char *key_exchange, *cipher, *mac; local 224 net::SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, cipher_suite); 229 ASCIIToUTF16(cipher), ASCIIToUTF16(mac), ASCIIToUTF16(key_exchange));
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
H A D | TransportConnection.java | 79 public void changeRecvCipher(BlockCipher bc, MAC mac) argument 82 recv_mac = mac; 83 recv_mac_buffer = (mac != null) ? new byte[mac.size()] : null; 84 recv_mac_buffer_cmp = (mac != null) ? new byte[mac.size()] : null; 90 public void changeSendCipher(BlockCipher bc, MAC mac) argument 100 send_mac = mac; 101 send_mac_buffer = (mac != null) ? new byte[mac [all...] |
/external/iptables/extensions/ |
H A D | libipt_CLUSTERIP.c | 47 " --clustermac <mac> Set clusterIP MAC address\n" 133 static const char *mac2str(const uint8_t mac[ETH_ALEN]) argument 137 mac[0], mac[1], mac[2], mac[3], mac[4], mac[5]);
|
/external/openssh/ |
H A D | mac.c | 1 /* $OpenBSD: mac.c,v 1.16 2011/08/02 01:22:11 djm Exp $ */ 42 #include "mac.h" 75 mac_setup_by_id(Mac *mac, int which) argument 78 mac->type = macs[which].type; 79 if (mac->type == SSH_EVP) { 80 mac->evp_md = (*macs[which].mdfunc)(); 81 if ((evp_len = EVP_MD_size(mac->evp_md)) <= 0) 82 fatal("mac %s len %d", mac->name, evp_len); 83 mac 94 mac_setup(Mac *mac, char *name) argument 111 mac_init(Mac *mac) argument 130 mac_compute(Mac *mac, u_int32_t seqno, u_char *data, int datalen) argument 160 mac_clear(Mac *mac) argument [all...] |
/external/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 172 unsigned char mac[MD5_DIGEST_LENGTH]; local 203 MD5_Final(mac,&key->md); 205 MD5_Update(&key->md,mac,MD5_DIGEST_LENGTH); 206 MD5_Final(mac,&key->md); 208 if (memcmp(out+plen,mac,MD5_DIGEST_LENGTH))
|