/external/openssl/crypto/pkcs12/ |
H A D | p12_npas.c | 87 /* Check the mac */ 111 unsigned char mac[EVP_MAX_MD_SIZE]; local 159 if(!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) goto saferr; 161 if(!ASN1_OCTET_STRING_set(macnew, mac, maclen)) goto saferr; 162 ASN1_OCTET_STRING_free(p12->mac->dinfo->digest); 163 p12->mac->dinfo->digest = macnew;
|
/external/openssl/ssl/ |
H A D | s2_pkt.c | 130 unsigned char mac[MAX_MAC_SIZE]; local 270 ssl2_mac(s,mac,0); 272 if ( (memcmp(mac,s->s2->mac_data, 531 /* set mac_size to mac size */
|
/external/ppp/pppd/plugins/rp-pppoe/ |
H A D | plugin.c | 133 unsigned int mac[ETH_ALEN]; local 136 &ses, &mac[0], &mac[1], &mac[2], 137 &mac[3], &mac[4], &mac[5]) != 7) { 142 conn->peerEth[i] = (unsigned char) mac[i];
|
/external/webkit/Tools/Scripts/webkitpy/layout_tests/port/ |
H A D | factory_unittest.py | 42 import mac namespace 97 self.assert_port("dryrun-mac", dryrun.DryRunPort) 100 self.assert_port("mac", mac.MacPort) 101 self.assert_platform_port("darwin", None, mac.MacPort) 102 self.assert_platform_port("darwin", self.webkit_options, mac.MacPort) 120 self.assert_port("google-chrome-mac", 133 self.assert_port("chromium-gpu-mac", chromium_gpu.ChromiumGpuMacPort) 139 self.assert_port("chromium-mac", chromium_mac.ChromiumMacPort)
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | md4.c | 38 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 46 MD4Final(mac, &ctx);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_pax_common.c | 41 u8 mac[SHA1_MAC_LEN]; local 66 hmac_sha1_vector(key, key_len, 3, addr, len, mac); 67 os_memcpy(pos, mac, clen); 87 * @mac: Buffer for the MAC value (EAP_PAX_MAC_LEN = 16 bytes) 96 u8 *mac) 116 os_memcpy(mac, hash, EAP_PAX_MAC_LEN); 92 eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, const u8 *data1, size_t data1_len, const u8 *data2, size_t data2_len, const u8 *data3, size_t data3_len, u8 *mac) argument
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_drv_ops.h | 181 const u8 *mac, int accepted, 186 return hapd->driver->set_radius_acl_auth(hapd->drv_priv, mac, accepted, 191 const u8 *mac) 196 return hapd->driver->set_radius_acl_expire(hapd->drv_priv, mac); 180 hostapd_drv_set_radius_acl_auth(struct hostapd_data *hapd, const u8 *mac, int accepted, u32 session_timeout) argument 190 hostapd_drv_set_radius_acl_expire(struct hostapd_data *hapd, const u8 *mac) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | md4-internal.c | 29 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 37 MD4Final(mac, &ctx);
|
H A D | md5-internal.c | 28 * @mac: Buffer for the hash 31 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 39 MD5Final(mac, &ctx);
|
H A D | sha1-internal.c | 27 * @mac: Buffer for the hash 30 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 38 SHA1Final(mac, &ctx);
|
H A D | sha256-internal.c | 22 * @mac: Buffer for the hash 26 u8 *mac) 35 if (sha256_done(&ctx, mac)) 25 sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pax_common.c | 35 u8 mac[SHA1_MAC_LEN]; local 60 hmac_sha1_vector(key, key_len, 3, addr, len, mac); 61 os_memcpy(pos, mac, clen); 81 * @mac: Buffer for the MAC value (EAP_PAX_MAC_LEN = 16 bytes) 90 u8 *mac) 110 os_memcpy(mac, hash, EAP_PAX_MAC_LEN); 86 eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, const u8 *data1, size_t data1_len, const u8 *data2, size_t data2_len, const u8 *data3, size_t data3_len, u8 *mac) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_drv_ops.h | 181 const u8 *mac, int accepted, 186 return hapd->driver->set_radius_acl_auth(hapd->drv_priv, mac, accepted, 191 const u8 *mac) 196 return hapd->driver->set_radius_acl_expire(hapd->drv_priv, mac); 180 hostapd_drv_set_radius_acl_auth(struct hostapd_data *hapd, const u8 *mac, int accepted, u32 session_timeout) argument 190 hostapd_drv_set_radius_acl_expire(struct hostapd_data *hapd, const u8 *mac) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | md4-internal.c | 29 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 37 MD4Final(mac, &ctx);
|
H A D | md5-internal.c | 28 * @mac: Buffer for the hash 31 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 39 MD5Final(mac, &ctx);
|
H A D | sha1-internal.c | 27 * @mac: Buffer for the hash 30 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 38 SHA1Final(mac, &ctx);
|
H A D | sha256-internal.c | 22 * @mac: Buffer for the hash 26 u8 *mac) 35 if (sha256_done(&ctx, mac)) 25 sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pax_common.c | 35 u8 mac[SHA1_MAC_LEN]; local 60 hmac_sha1_vector(key, key_len, 3, addr, len, mac); 61 os_memcpy(pos, mac, clen); 81 * @mac: Buffer for the MAC value (EAP_PAX_MAC_LEN = 16 bytes) 90 u8 *mac) 110 os_memcpy(mac, hash, EAP_PAX_MAC_LEN); 86 eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, const u8 *data1, size_t data1_len, const u8 *data2, size_t data2_len, const u8 *data3, size_t data3_len, u8 *mac) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_drv_ops.h | 181 const u8 *mac, int accepted, 186 return hapd->driver->set_radius_acl_auth(hapd->drv_priv, mac, accepted, 191 const u8 *mac) 196 return hapd->driver->set_radius_acl_expire(hapd->drv_priv, mac); 180 hostapd_drv_set_radius_acl_auth(struct hostapd_data *hapd, const u8 *mac, int accepted, u32 session_timeout) argument 190 hostapd_drv_set_radius_acl_expire(struct hostapd_data *hapd, const u8 *mac) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md4-internal.c | 29 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 37 MD4Final(mac, &ctx);
|
H A D | md5-internal.c | 28 * @mac: Buffer for the hash 31 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 39 MD5Final(mac, &ctx);
|
H A D | sha1-internal.c | 27 * @mac: Buffer for the hash 30 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 38 SHA1Final(mac, &ctx);
|
H A D | sha256-internal.c | 22 * @mac: Buffer for the hash 26 u8 *mac) 35 if (sha256_done(&ctx, mac)) 25 sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_pax_common.c | 35 u8 mac[SHA1_MAC_LEN]; local 60 hmac_sha1_vector(key, key_len, 3, addr, len, mac); 61 os_memcpy(pos, mac, clen); 81 * @mac: Buffer for the MAC value (EAP_PAX_MAC_LEN = 16 bytes) 90 u8 *mac) 110 os_memcpy(mac, hash, EAP_PAX_MAC_LEN); 86 eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, const u8 *data1, size_t data1_len, const u8 *data2, size_t data2_len, const u8 *data3, size_t data3_len, u8 *mac) argument
|
/external/chromium/chrome/browser/safe_browsing/ |
H A D | protocol_parser.cc | 212 // The redirect command is of the form: u:<url>,<mac> where <url> can 217 std::string mac; local 223 mac = redirect_url.substr(mac_pos + 1); 231 chunk_url.mac = mac; 255 const std::string& mac, 262 !safe_browsing_util::VerifyMAC(key, mac, data, length)) { 251 ParseChunk(const std::string& list_name, const char* data, int length, const std::string& key, const std::string& mac, bool* re_key, SBChunkList* chunks) argument
|