/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/ |
H A D | MacOutputStream.java | 11 protected Mac mac; field in class:MacOutputStream 14 Mac mac) 16 this.mac = mac; 22 mac.update((byte)b); 31 mac.update(b, off, len); 36 byte[] res = new byte[mac.getMacSize()]; 38 mac.doFinal(res, 0); 13 MacOutputStream( Mac mac) argument
|
H A D | MacInputStream.java | 12 protected Mac mac; field in class:MacInputStream 16 Mac mac) 19 this.mac = mac; 29 mac.update((byte)b); 43 mac.update(b, off, n); 50 return mac; 14 MacInputStream( InputStream stream, Mac mac) argument
|
/external/v8/tools/ |
H A D | mac-tick-processor | 6 $tools_path/linux-tick-processor --mac --nm=$tools_path/mac-nm $@
|
/external/kernel-headers/original/uapi/linux/netfilter_bridge/ |
H A D | ebt_arpreply.h | 8 unsigned char mac[ETH_ALEN]; member in struct:ebt_arpreply_info
|
H A D | ebt_nat.h | 9 unsigned char mac[ETH_ALEN]; member in struct:ebt_nat_info
|
/external/wpa_supplicant_8/hostapd/logwatch/ |
H A D | hostapd | 29 if (my ($iface,$mac,$layer,$details) = ($line =~ /(.*?): STA (.*?) (.*?): (.*?)$/i)) { 34 $hostapd{$iface}->{$mac}->{$layer}->{$details}++; 43 foreach my $mac (sort keys %{$hostapd{$iface}}) { 44 print " Client MAC Address $mac:\n"; 45 foreach my $layer (sort keys %{$hostapd{$iface}->{$mac}}) { 47 foreach my $details (sort keys %{$hostapd{$iface}->{$mac}->{$layer}}) { 49 my $count = $hostapd{$iface}->{$mac}->{$layer}->{$details};
|
/external/boringssl/src/crypto/cipher_extra/test/ |
H A D | make_all_legacy_aead_tests.sh | 5 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 > aes_128_cbc_sha1_tls_tests.txt 6 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 -implicit-iv > aes_128_cbc_sha1_tls_implicit_iv_tests.txt 7 go run make_legacy_aead_tests.go -cipher aes128 -mac sha256 > aes_128_cbc_sha256_tls_tests.txt 9 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 > aes_256_cbc_sha1_tls_tests.txt 10 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 -implicit-iv > aes_256_cbc_sha1_tls_implicit_iv_tests.txt 11 go run make_legacy_aead_tests.go -cipher aes256 -mac sha256 > aes_256_cbc_sha256_tls_tests.txt 12 go run make_legacy_aead_tests.go -cipher aes256 -mac sha384 > aes_256_cbc_sha384_tls_tests.txt 14 go run make_legacy_aead_tests.go -cipher 3des -mac sha1 > des_ede3_cbc_sha1_tls_tests.txt 15 go run make_legacy_aead_tests.go -cipher 3des -mac sha1 -implicit-iv > des_ede3_cbc_sha1_tls_implicit_iv_tests.txt 17 go run make_legacy_aead_tests.go -cipher aes128 -mac sha [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | md5.h | 15 const u8 *addr[], const size_t *len, u8 *mac); 17 u8 *mac);
|
H A D | crypto_none.c | 15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | md5.c | 23 * @mac: Buffer for the hash (16 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 75 if (md5_vector(1 + num_elem, _addr, _len, mac)) 87 _addr[1] = mac; 89 res = md5_vector(2, _addr, _len, mac); 102 * @mac: Buffer for the hash (16 bytes) 106 u8 *mac) 108 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 105 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | sha1.c | 23 * @mac: Buffer for the hash (20 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 74 if (sha1_vector(1 + num_elem, _addr, _len, mac)) 86 _addr[1] = mac; 88 ret = sha1_vector(2, _addr, _len, mac); 100 * @mac: Buffer for the hash (20 bytes) 104 u8 *mac) 106 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 103 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | sha256.c | 23 * @mac: Buffer for the hash (32 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 73 if (sha256_vector(1 + num_elem, _addr, _len, mac) < 0) 85 _addr[1] = mac; 87 return sha256_vector(2, _addr, _len, mac); 97 * @mac: Buffer for the hash (32 bytes) 101 size_t data_len, u8 *mac) 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | sha384.c | 23 * @mac: Buffer for the hash (48 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 73 if (sha384_vector(1 + num_elem, _addr, _len, mac) < 0) 85 _addr[1] = mac; 87 return sha384_vector(2, _addr, _len, mac); 97 * @mac: Buffer for the hash (48 bytes) 101 size_t data_len, u8 *mac) 103 return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 100 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | md5.h | 15 const u8 *addr[], const size_t *len, u8 *mac); 17 u8 *mac);
|
H A D | crypto_none.c | 15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | md5.c | 23 * @mac: Buffer for the hash (16 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 75 if (md5_vector(1 + num_elem, _addr, _len, mac)) 87 _addr[1] = mac; 89 res = md5_vector(2, _addr, _len, mac); 102 * @mac: Buffer for the hash (16 bytes) 106 u8 *mac) 108 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 105 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | sha1.c | 23 * @mac: Buffer for the hash (20 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 74 if (sha1_vector(1 + num_elem, _addr, _len, mac)) 86 _addr[1] = mac; 88 ret = sha1_vector(2, _addr, _len, mac); 100 * @mac: Buffer for the hash (20 bytes) 104 u8 *mac) 106 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 103 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | sha256.c | 23 * @mac: Buffer for the hash (32 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 73 if (sha256_vector(1 + num_elem, _addr, _len, mac) < 0) 85 _addr[1] = mac; 87 return sha256_vector(2, _addr, _len, mac); 97 * @mac: Buffer for the hash (32 bytes) 101 size_t data_len, u8 *mac) 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | sha384.c | 23 * @mac: Buffer for the hash (48 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 73 if (sha384_vector(1 + num_elem, _addr, _len, mac) < 0) 85 _addr[1] = mac; 87 return sha384_vector(2, _addr, _len, mac); 97 * @mac: Buffer for the hash (48 bytes) 101 size_t data_len, u8 *mac) 103 return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 100 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md5.h | 15 const u8 *addr[], const size_t *len, u8 *mac); 17 u8 *mac);
|
H A D | crypto_none.c | 15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | md5.c | 23 * @mac: Buffer for the hash (16 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 75 if (md5_vector(1 + num_elem, _addr, _len, mac)) 87 _addr[1] = mac; 89 res = md5_vector(2, _addr, _len, mac); 102 * @mac: Buffer for the hash (16 bytes) 106 u8 *mac) 108 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 105 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | sha1.c | 23 * @mac: Buffer for the hash (20 bytes) 27 const u8 *addr[], const size_t *len, u8 *mac) 74 if (sha1_vector(1 + num_elem, _addr, _len, mac)) 86 _addr[1] = mac; 88 ret = sha1_vector(2, _addr, _len, mac); 100 * @mac: Buffer for the hash (20 bytes) 104 u8 *mac) 106 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); 26 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 103 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
/external/boringssl/src/crypto/poly1305/ |
H A D | poly1305_test.cc | 31 const std::vector<uint8_t> &mac) { 68 EXPECT_EQ(Bytes(out), Bytes(mac)) << "SIMD pattern " << excess << " failed."; 73 std::vector<uint8_t> key, in, mac; 76 ASSERT_TRUE(t->GetBytes(&mac, "MAC")); 78 ASSERT_EQ(16u, mac.size()); 87 EXPECT_EQ(Bytes(out), Bytes(mac)) << "Single-shot Poly1305 failed."; 95 EXPECT_EQ(Bytes(out), Bytes(mac)) << "Streaming Poly1305 failed."; 99 TestSIMD(0, key, in, mac); 100 TestSIMD(16, key, in, mac); 101 TestSIMD(32, key, in, mac); 29 TestSIMD(unsigned excess, const std::vector<uint8_t> &key, const std::vector<uint8_t> &in, const std::vector<uint8_t> &mac) argument [all...] |
/external/mmc-utils/3rdparty/hmac_sha/ |
H A D | hmac_sha2.h | 100 void hmac_sha224_final(hmac_sha224_ctx *ctx, unsigned char *mac, 104 unsigned char *mac, unsigned mac_size); 111 void hmac_sha256_final(hmac_sha256_ctx *ctx, unsigned char *mac, 115 unsigned char *mac, unsigned mac_size); 122 void hmac_sha384_final(hmac_sha384_ctx *ctx, unsigned char *mac, 126 unsigned char *mac, unsigned mac_size); 133 void hmac_sha512_final(hmac_sha512_ctx *ctx, unsigned char *mac, 137 unsigned char *mac, unsigned mac_size);
|