/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/ |
H A D | MacOutputStream.java | 11 protected Mac mac; field in class:MacOutputStream 14 Mac mac) 16 this.mac = mac; 22 mac.update((byte)b); 31 mac.update(b, off, len); 36 byte[] res = new byte[mac.getMacSize()]; 38 mac.doFinal(res, 0); 13 MacOutputStream( Mac mac) argument
|
H A D | MacInputStream.java | 12 protected Mac mac; field in class:MacInputStream 16 Mac mac) 19 this.mac = mac; 29 mac.update((byte)b); 43 mac.update(b, off, n); 50 return mac; 14 MacInputStream( InputStream stream, Mac mac) argument
|
/external/v8/tools/ |
H A D | mac-tick-processor | 6 $tools_path/linux-tick-processor --mac --nm=$tools_path/mac-nm $@
|
/external/kernel-headers/original/uapi/linux/netfilter_bridge/ |
H A D | ebt_arpreply.h | 7 unsigned char mac[ETH_ALEN]; member in struct:ebt_arpreply_info
|
H A D | ebt_nat.h | 8 unsigned char mac[ETH_ALEN]; member in struct:ebt_nat_info
|
/external/openssh/ |
H A D | mac.c | 1 /* $OpenBSD: mac.c,v 1.32 2015/01/15 18:32:54 naddy Exp $ */ 36 #include "mac.h" 114 mac_setup_by_alg(struct sshmac *mac, const struct macalg *macalg) argument 116 mac->type = macalg->type; 117 if (mac->type == SSH_DIGEST) { 118 if ((mac->hmac_ctx = ssh_hmac_start(macalg->alg)) == NULL) 120 mac->key_len = mac->mac_len = ssh_hmac_bytes(macalg->alg); 122 mac->mac_len = macalg->len / 8; 123 mac 133 mac_setup(struct sshmac *mac, char *name) argument 148 mac_init(struct sshmac *mac) argument 172 mac_compute(struct sshmac *mac, u_int32_t seqno, const u_char *data, int datalen, u_char *digest, size_t dlen) argument 217 mac_clear(struct sshmac *mac) argument [all...] |
/external/wpa_supplicant_8/hostapd/logwatch/ |
H A D | hostapd | 29 if (my ($iface,$mac,$layer,$details) = ($line =~ /(.*?): STA (.*?) (.*?): (.*?)$/i)) { 34 $hostapd{$iface}->{$mac}->{$layer}->{$details}++; 43 foreach my $mac (sort keys %{$hostapd{$iface}}) { 44 print " Client MAC Address $mac:\n"; 45 foreach my $layer (sort keys %{$hostapd{$iface}->{$mac}}) { 47 foreach my $details (sort keys %{$hostapd{$iface}->{$mac}->{$layer}}) { 49 my $count = $hostapd{$iface}->{$mac}->{$layer}->{$details};
|
/external/boringssl/src/crypto/cipher/test/ |
H A D | make_all_legacy_aead_tests.sh | 5 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 > aes_128_cbc_sha1_tls_tests.txt 6 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 -implicit-iv > aes_128_cbc_sha1_tls_implicit_iv_tests.txt 7 go run make_legacy_aead_tests.go -cipher aes128 -mac sha256 > aes_128_cbc_sha256_tls_tests.txt 9 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 > aes_256_cbc_sha1_tls_tests.txt 10 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 -implicit-iv > aes_256_cbc_sha1_tls_implicit_iv_tests.txt 11 go run make_legacy_aead_tests.go -cipher aes256 -mac sha256 > aes_256_cbc_sha256_tls_tests.txt 12 go run make_legacy_aead_tests.go -cipher aes256 -mac sha384 > aes_256_cbc_sha384_tls_tests.txt 14 go run make_legacy_aead_tests.go -cipher 3des -mac sha1 > des_ede3_cbc_sha1_tls_tests.txt 15 go run make_legacy_aead_tests.go -cipher 3des -mac sha1 -implicit-iv > des_ede3_cbc_sha1_tls_implicit_iv_tests.txt 17 go run make_legacy_aead_tests.go -cipher aes128 -mac sha [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | md5.h | 15 const u8 *addr[], const size_t *len, u8 *mac); 17 u8 *mac);
|
H A D | crypto_none.c | 15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | md5.c | 23 * @mac: Buffer for the hash (16 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 75 if (md5_vector(1 + num_elem, _addr, _len, mac)) 87 _addr[1] = mac; 89 res = md5_vector(2, _addr, _len, mac); 102 * @mac: Buffer for the hash (16 bytes) 106 u8 *mac) 108 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 105 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | sha1.c | 23 * @mac: Buffer for the hash (20 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 74 if (sha1_vector(1 + num_elem, _addr, _len, mac)) 86 _addr[1] = mac; 88 ret = sha1_vector(2, _addr, _len, mac); 100 * @mac: Buffer for the hash (20 bytes) 104 u8 *mac) 106 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 103 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | sha256.c | 23 * @mac: Buffer for the hash (32 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 73 if (sha256_vector(1 + num_elem, _addr, _len, mac) < 0) 85 _addr[1] = mac; 87 return sha256_vector(2, _addr, _len, mac); 97 * @mac: Buffer for the hash (32 bytes) 101 size_t data_len, u8 *mac) 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | sha384.c | 23 * @mac: Buffer for the hash (48 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 73 if (sha384_vector(1 + num_elem, _addr, _len, mac) < 0) 85 _addr[1] = mac; 87 return sha384_vector(2, _addr, _len, mac); 97 * @mac: Buffer for the hash (48 bytes) 101 size_t data_len, u8 *mac) 103 return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 100 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | md5.h | 15 const u8 *addr[], const size_t *len, u8 *mac); 17 u8 *mac);
|
H A D | crypto_none.c | 15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | md5.c | 23 * @mac: Buffer for the hash (16 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 75 if (md5_vector(1 + num_elem, _addr, _len, mac)) 87 _addr[1] = mac; 89 res = md5_vector(2, _addr, _len, mac); 102 * @mac: Buffer for the hash (16 bytes) 106 u8 *mac) 108 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 105 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | sha1.c | 23 * @mac: Buffer for the hash (20 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 74 if (sha1_vector(1 + num_elem, _addr, _len, mac)) 86 _addr[1] = mac; 88 ret = sha1_vector(2, _addr, _len, mac); 100 * @mac: Buffer for the hash (20 bytes) 104 u8 *mac) 106 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 103 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | sha256.c | 23 * @mac: Buffer for the hash (32 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 73 if (sha256_vector(1 + num_elem, _addr, _len, mac) < 0) 85 _addr[1] = mac; 87 return sha256_vector(2, _addr, _len, mac); 97 * @mac: Buffer for the hash (32 bytes) 101 size_t data_len, u8 *mac) 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | sha384.c | 23 * @mac: Buffer for the hash (48 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 73 if (sha384_vector(1 + num_elem, _addr, _len, mac) < 0) 85 _addr[1] = mac; 87 return sha384_vector(2, _addr, _len, mac); 97 * @mac: Buffer for the hash (48 bytes) 101 size_t data_len, u8 *mac) 103 return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 100 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md5.h | 15 const u8 *addr[], const size_t *len, u8 *mac); 17 u8 *mac);
|
H A D | crypto_none.c | 15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
/external/boringssl/src/crypto/poly1305/ |
H A D | poly1305_test.cc | 30 const std::vector<uint8_t> &mac) { 67 if (!t->ExpectBytesEqual(mac.data(), mac.size(), out, 16)) { 76 std::vector<uint8_t> key, in, mac; local 79 !t->GetBytes(&mac, "MAC")) { 82 if (key.size() != 32 || mac.size() != 16) { 94 if (!t->ExpectBytesEqual(out, 16, mac.data(), mac.size())) { 105 if (!t->ExpectBytesEqual(mac.data(), mac 27 TestSIMD(FileTest *t, unsigned excess, const std::vector<uint8_t> &key, const std::vector<uint8_t> &in, const std::vector<uint8_t> &mac) argument [all...] |
/external/libchrome/base/mac/ |
H A D | mach_port_util.h | 11 #include "base/mac/scoped_mach_port.h" 30 BASE_EXPORT base::mac::ScopedMachSendRight ReceiveMachPort( 43 base::mac::ScopedMachSendRight port_to_insert,
|
/external/mmc-utils/3rdparty/hmac_sha/ |
H A D | hmac_sha2.h | 100 void hmac_sha224_final(hmac_sha224_ctx *ctx, unsigned char *mac, 104 unsigned char *mac, unsigned mac_size); 111 void hmac_sha256_final(hmac_sha256_ctx *ctx, unsigned char *mac, 115 unsigned char *mac, unsigned mac_size); 122 void hmac_sha384_final(hmac_sha384_ctx *ctx, unsigned char *mac, 126 unsigned char *mac, unsigned mac_size); 133 void hmac_sha512_final(hmac_sha512_ctx *ctx, unsigned char *mac, 137 unsigned char *mac, unsigned mac_size);
|