Searched refs:mac (Results 1 - 25 of 380) sorted by relevance

1234567891011>>

/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/
H A DMacOutputStream.java11 protected Mac mac; field in class:MacOutputStream
14 Mac mac)
16 this.mac = mac;
22 mac.update((byte)b);
31 mac.update(b, off, len);
36 byte[] res = new byte[mac.getMacSize()];
38 mac.doFinal(res, 0);
13 MacOutputStream( Mac mac) argument
H A DMacInputStream.java12 protected Mac mac; field in class:MacInputStream
16 Mac mac)
19 this.mac = mac;
29 mac.update((byte)b);
43 mac.update(b, off, n);
50 return mac;
14 MacInputStream( InputStream stream, Mac mac) argument
/external/v8/tools/
H A Dmac-tick-processor6 $tools_path/linux-tick-processor --mac --nm=$tools_path/mac-nm $@
/external/kernel-headers/original/uapi/linux/netfilter_bridge/
H A Debt_arpreply.h8 unsigned char mac[ETH_ALEN]; member in struct:ebt_arpreply_info
H A Debt_nat.h9 unsigned char mac[ETH_ALEN]; member in struct:ebt_nat_info
/external/wpa_supplicant_8/hostapd/logwatch/
H A Dhostapd29 if (my ($iface,$mac,$layer,$details) = ($line =~ /(.*?): STA (.*?) (.*?): (.*?)$/i)) {
34 $hostapd{$iface}->{$mac}->{$layer}->{$details}++;
43 foreach my $mac (sort keys %{$hostapd{$iface}}) {
44 print " Client MAC Address $mac:\n";
45 foreach my $layer (sort keys %{$hostapd{$iface}->{$mac}}) {
47 foreach my $details (sort keys %{$hostapd{$iface}->{$mac}->{$layer}}) {
49 my $count = $hostapd{$iface}->{$mac}->{$layer}->{$details};
/external/boringssl/src/crypto/cipher_extra/test/
H A Dmake_all_legacy_aead_tests.sh5 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 > aes_128_cbc_sha1_tls_tests.txt
6 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 -implicit-iv > aes_128_cbc_sha1_tls_implicit_iv_tests.txt
7 go run make_legacy_aead_tests.go -cipher aes128 -mac sha256 > aes_128_cbc_sha256_tls_tests.txt
9 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 > aes_256_cbc_sha1_tls_tests.txt
10 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 -implicit-iv > aes_256_cbc_sha1_tls_implicit_iv_tests.txt
11 go run make_legacy_aead_tests.go -cipher aes256 -mac sha256 > aes_256_cbc_sha256_tls_tests.txt
12 go run make_legacy_aead_tests.go -cipher aes256 -mac sha384 > aes_256_cbc_sha384_tls_tests.txt
14 go run make_legacy_aead_tests.go -cipher 3des -mac sha1 > des_ede3_cbc_sha1_tls_tests.txt
15 go run make_legacy_aead_tests.go -cipher 3des -mac sha1 -implicit-iv > des_ede3_cbc_sha1_tls_implicit_iv_tests.txt
17 go run make_legacy_aead_tests.go -cipher aes128 -mac sha
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dmd5.h15 const u8 *addr[], const size_t *len, u8 *mac);
17 u8 *mac);
H A Dcrypto_none.c15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
H A Dmd5.c23 * @mac: Buffer for the hash (16 bytes)
27 const u8 *addr[], const size_t *len, u8 *mac)
75 if (md5_vector(1 + num_elem, _addr, _len, mac))
87 _addr[1] = mac;
89 res = md5_vector(2, _addr, _len, mac);
102 * @mac: Buffer for the hash (16 bytes)
106 u8 *mac)
108 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac);
26 hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
105 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
H A Dsha1.c23 * @mac: Buffer for the hash (20 bytes)
27 const u8 *addr[], const size_t *len, u8 *mac)
74 if (sha1_vector(1 + num_elem, _addr, _len, mac))
86 _addr[1] = mac;
88 ret = sha1_vector(2, _addr, _len, mac);
100 * @mac: Buffer for the hash (20 bytes)
104 u8 *mac)
106 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac);
26 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
103 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
H A Dsha256.c23 * @mac: Buffer for the hash (32 bytes)
27 const u8 *addr[], const size_t *len, u8 *mac)
73 if (sha256_vector(1 + num_elem, _addr, _len, mac) < 0)
85 _addr[1] = mac;
87 return sha256_vector(2, _addr, _len, mac);
97 * @mac: Buffer for the hash (32 bytes)
101 size_t data_len, u8 *mac)
103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac);
26 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
H A Dsha384.c23 * @mac: Buffer for the hash (48 bytes)
27 const u8 *addr[], const size_t *len, u8 *mac)
73 if (sha384_vector(1 + num_elem, _addr, _len, mac) < 0)
85 _addr[1] = mac;
87 return sha384_vector(2, _addr, _len, mac);
97 * @mac: Buffer for the hash (48 bytes)
101 size_t data_len, u8 *mac)
103 return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac);
26 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
100 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
/external/wpa_supplicant_8/src/crypto/
H A Dmd5.h15 const u8 *addr[], const size_t *len, u8 *mac);
17 u8 *mac);
H A Dcrypto_none.c15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
H A Dmd5.c23 * @mac: Buffer for the hash (16 bytes)
27 const u8 *addr[], const size_t *len, u8 *mac)
75 if (md5_vector(1 + num_elem, _addr, _len, mac))
87 _addr[1] = mac;
89 res = md5_vector(2, _addr, _len, mac);
102 * @mac: Buffer for the hash (16 bytes)
106 u8 *mac)
108 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac);
26 hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
105 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
H A Dsha1.c23 * @mac: Buffer for the hash (20 bytes)
27 const u8 *addr[], const size_t *len, u8 *mac)
74 if (sha1_vector(1 + num_elem, _addr, _len, mac))
86 _addr[1] = mac;
88 ret = sha1_vector(2, _addr, _len, mac);
100 * @mac: Buffer for the hash (20 bytes)
104 u8 *mac)
106 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac);
26 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
103 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
H A Dsha256.c23 * @mac: Buffer for the hash (32 bytes)
27 const u8 *addr[], const size_t *len, u8 *mac)
73 if (sha256_vector(1 + num_elem, _addr, _len, mac) < 0)
85 _addr[1] = mac;
87 return sha256_vector(2, _addr, _len, mac);
97 * @mac: Buffer for the hash (32 bytes)
101 size_t data_len, u8 *mac)
103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac);
26 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
H A Dsha384.c23 * @mac: Buffer for the hash (48 bytes)
27 const u8 *addr[], const size_t *len, u8 *mac)
73 if (sha384_vector(1 + num_elem, _addr, _len, mac) < 0)
85 _addr[1] = mac;
87 return sha384_vector(2, _addr, _len, mac);
97 * @mac: Buffer for the hash (48 bytes)
101 size_t data_len, u8 *mac)
103 return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac);
26 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
100 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dmd5.h15 const u8 *addr[], const size_t *len, u8 *mac);
17 u8 *mac);
H A Dcrypto_none.c15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
H A Dmd5.c23 * @mac: Buffer for the hash (16 bytes)
27 const u8 *addr[], const size_t *len, u8 *mac)
75 if (md5_vector(1 + num_elem, _addr, _len, mac))
87 _addr[1] = mac;
89 res = md5_vector(2, _addr, _len, mac);
102 * @mac: Buffer for the hash (16 bytes)
106 u8 *mac)
108 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac);
26 hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
105 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
H A Dsha1.c23 * @mac: Buffer for the hash (20 bytes)
27 const u8 *addr[], const size_t *len, u8 *mac)
74 if (sha1_vector(1 + num_elem, _addr, _len, mac))
86 _addr[1] = mac;
88 ret = sha1_vector(2, _addr, _len, mac);
100 * @mac: Buffer for the hash (20 bytes)
104 u8 *mac)
106 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac);
26 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
103 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
/external/boringssl/src/crypto/poly1305/
H A Dpoly1305_test.cc31 const std::vector<uint8_t> &mac) {
68 EXPECT_EQ(Bytes(out), Bytes(mac)) << "SIMD pattern " << excess << " failed.";
73 std::vector<uint8_t> key, in, mac;
76 ASSERT_TRUE(t->GetBytes(&mac, "MAC"));
78 ASSERT_EQ(16u, mac.size());
87 EXPECT_EQ(Bytes(out), Bytes(mac)) << "Single-shot Poly1305 failed.";
95 EXPECT_EQ(Bytes(out), Bytes(mac)) << "Streaming Poly1305 failed.";
99 TestSIMD(0, key, in, mac);
100 TestSIMD(16, key, in, mac);
101 TestSIMD(32, key, in, mac);
29 TestSIMD(unsigned excess, const std::vector<uint8_t> &key, const std::vector<uint8_t> &in, const std::vector<uint8_t> &mac) argument
[all...]
/external/mmc-utils/3rdparty/hmac_sha/
H A Dhmac_sha2.h100 void hmac_sha224_final(hmac_sha224_ctx *ctx, unsigned char *mac,
104 unsigned char *mac, unsigned mac_size);
111 void hmac_sha256_final(hmac_sha256_ctx *ctx, unsigned char *mac,
115 unsigned char *mac, unsigned mac_size);
122 void hmac_sha384_final(hmac_sha384_ctx *ctx, unsigned char *mac,
126 unsigned char *mac, unsigned mac_size);
133 void hmac_sha512_final(hmac_sha512_ctx *ctx, unsigned char *mac,
137 unsigned char *mac, unsigned mac_size);

Completed in 461 milliseconds

1234567891011>>