/prebuilt/ndk/android-ndk-r4/platforms/android-8/arch-x86/usr/include/linux/ |
skbuff.h | 132 } mac; member in struct:sk_buff
|
/external/iptables/ |
Android.mk | 52 PF_EXT_SLIB+=hashlimit helper icmp iprange length limit mac multiport #2mark
|
/external/kernel-headers/original/linux/ |
if_vlan.h | 54 return (struct vlan_ethhdr *)skb->mac.raw; 190 * This allows the VLAN to have a different MAC than the underlying 249 /* Move the mac addresses to the beginning of the new header. */ 259 skb->mac.raw -= VLAN_HLEN;
|
/external/wpa_supplicant/ |
sha1.c | 30 * @mac: Buffer for the hash (20 bytes) 33 const u8 *addr[], const size_t *len, u8 *mac) 78 sha1_vector(1 + num_elem, _addr, _len, mac); 89 _addr[1] = mac; 91 sha1_vector(2, _addr, _len, mac); 101 * @mac: Buffer for the hash (20 bytes) 104 u8 *mac) 106 hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); 396 * @mac: Buffer for the hash 399 u8 *mac) [all...] |
eap_psk.c | 185 u8 mac[EAP_PSK_MAC_LEN]; local 232 omac1_aes_128(data->ak, buf, buflen, mac); 234 if (os_memcmp(mac, hdr3->mac_s, EAP_PSK_MAC_LEN) != 0) {
|
eap_pax.c | 261 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local 305 (u8 *) data->cid, data->cid_len, NULL, 0, mac); 306 if (os_memcmp(pos, mac, EAP_PAX_MAC_LEN) != 0) { 310 mac, EAP_PAX_MAC_LEN); 379 wpa_printf(MSG_INFO, "EAP-PAX: MAC ID changed during " 405 wpa_printf(MSG_INFO, "EAP-PAX: Unsupported MAC ID 0x%x",
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha1.c | 30 * @mac: Buffer for the hash (20 bytes) 33 const u8 *addr[], const size_t *len, u8 *mac) 78 sha1_vector(1 + num_elem, _addr, _len, mac); 89 _addr[1] = mac; 91 sha1_vector(2, _addr, _len, mac); 101 * @mac: Buffer for the hash (20 bytes) 104 u8 *mac) 106 hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); 401 * @mac: Buffer for the hash 404 u8 *mac) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_peap.c | 306 u8 *mac; local 329 mac = wpabuf_put(buf, 20); /* Compound_MAC */ 335 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac); 336 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC", mac, SHA1_MAC_LEN); 390 u8 buf[61], mac[SHA1_MAC_LEN]; local 428 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac); 430 if (os_memcmp(mac, pos, SHA1_MAC_LEN) != 0) { 433 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received MAC", 435 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Expected MAC", 436 mac, SHA1_MAC_LEN) [all...] |
eap_aka.c | 653 const u8 *mac, const u8 *extra, 657 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, 659 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); 816 if (!attr->mac || !attr->rand || !attr->autn) { 819 !attr->mac ? " AT_MAC" : "", 844 /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the 878 if (eap_aka_verify_mac(data, reqData, attr->mac, (u8 *) "", 0)) { 960 if (attr->mac == NULL) { 966 if (eap_aka_verify_mac(data, reqData, attr->mac, (u8 *) "", 0)) { 1044 if (eap_aka_verify_mac(data, reqData, attr->mac, (u8 *) "", 0)) [all...] |
eap_psk.c | 190 u8 mac[EAP_PSK_MAC_LEN]; local 238 if (omac1_aes_128(data->ak, buf, buflen, mac)) { 243 if (os_memcmp(mac, hdr3->mac_s, EAP_PSK_MAC_LEN) != 0) {
|
eap_pax.c | 244 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local 287 (u8 *) data->cid, data->cid_len, NULL, 0, mac); 288 if (os_memcmp(pos, mac, EAP_PAX_MAC_LEN) != 0) { 292 mac, EAP_PAX_MAC_LEN); 360 wpa_printf(MSG_INFO, "EAP-PAX: MAC ID changed during " 386 wpa_printf(MSG_INFO, "EAP-PAX: Unsupported MAC ID 0x%x",
|
/hardware/libhardware/include/hardware/ |
gps.h | 312 uint8_t mac[6]; member in struct:__anon9490 320 AGpsRefLocationMac mac; member in union:__anon9491::__anon9492
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_upnp.c | 810 * @from_mac_addr: Source (Enrollee) MAC address for the event 826 const u8 *mac = from_mac_addr; local 846 os_snprintf(mac_text, sizeof(mac_text), MACSTR, MAC2STR(mac)); 923 * @mac: Buffer for returning MAC address 924 * @mac_addr_text: Buffer for returning allocated MAC address text 928 char **ip_addr_text, u8 mac[ETH_ALEN], 963 os_memcpy(mac, req.ifr_addr.sa_data, 6); 965 if (eth_get(net_if, mac) < 0) { 966 wpa_printf(MSG_ERROR, "WPS UPnP: Failed to get MAC address") [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_aka.c | 706 /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the 762 if (attr->mac || attr->iv || attr->encr_data) { 790 const u8 *mac, const u8 *extra, 794 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, 796 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); 815 attr->kdf_count == 1 && attr->mac == NULL) { 844 if (attr->mac == NULL || 845 eap_aka_verify_mac(data, respData, attr->mac, NULL, 0)) { 962 if (attr->mac == NULL || 963 eap_aka_verify_mac(data, respData, attr->mac, data->nonce_s [all...] |
eap_pax.c | 235 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected MAC ID 0x%x, " 293 u8 mac[EAP_PAX_MAC_LEN], icvbuf[EAP_PAX_ICV_LEN]; local 402 (u8 *) data->cid, data->cid_len, mac); 403 if (os_memcmp(mac, pos, EAP_PAX_MAC_LEN) != 0) { 407 mac, EAP_PAX_MAC_LEN);
|
eap_psk.c | 223 u8 *pos, mac[EAP_PSK_MAC_LEN], *buf; local 315 if (omac1_aes_128(data->ak, buf, buflen, mac)) { 322 if (os_memcmp(mac, resp->mac_p, EAP_PSK_MAC_LEN) != 0) { 325 mac, EAP_PSK_MAC_LEN);
|
/external/chromium/net/third_party/nss/ssl/ |
ssl3prot.h | 89 SSL3Opaque MAC[MAX_MAC_LENGTH]; 94 SSL3Opaque MAC[MAX_MAC_LENGTH]; 344 unsigned char *mac; member in struct:__anon2607
|
/external/webkit/WebKitTools/Scripts/webkitpy/ |
changelogs_unittest.py | 79 * DumpRenderTree/mac/DumpRenderTreeWindow.mm:
|
/hardware/ti/wlan/wl1271/TWD/Ctrl/ |
CmdBldCmdIE.c | 51 #define MAC_TO_VENDOR_PREAMBLE(mac) ((mac[0] << 16) | (mac[1] << 8) | mac[2]) [all...] |
/system/wlan/ti/sta_dk_4_0_4_32/common/src/hal/hw_ctrl/ |
whalHwMboxCmd.c | 50 #define MAC_TO_VENDOR_PREAMBLE(mac) ((mac[0] << 16) | (mac[1] << 8) | mac[2]) [all...] |
/system/wlan/ti/wilink_6_1/TWD/Ctrl/ |
CmdBldCmdIE.c | 51 #define MAC_TO_VENDOR_PREAMBLE(mac) ((mac[0] << 16) | (mac[1] << 8) | mac[2]) [all...] |
/external/dnsmasq/src/ |
util.c | 453 char *print_mac(char *buff, unsigned char *mac, int len) 462 p += sprintf(p, "%.2x%s", mac[i], (i == len - 1) ? "" : ":");
|
/external/v8/tools/ |
tickprocessor-driver.js | 43 'mac': MacCppEntriesProvider
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JDKKeyStore.java | 844 // Finalise our mac calculation 845 byte[] mac = new byte[hMac.getMacSize()]; 846 hMac.doFinal(mac, 0); 849 // Read the original mac from the stream 853 if (!Arrays.constantTimeAreEqual(mac, oldMac)) 864 // Parse the original mac from the stream too 903 byte[] mac = new byte[hMac.getMacSize()]; 905 hMac.doFinal(mac, 0); 907 dOut.write(mac);
|
/external/openssl/ssl/ |
s3_pkt.c | 295 unsigned char *mac = NULL; local 410 /* We now have - encrypted [ MAC [ compressed [ plain ] ] ] 434 * the MAC computation anyway. */ 444 /* r->length is now the compressed data plus mac */ 466 /* check the MAC for rr->input (it's in mac_size bytes at the tail) */ 470 mac = &rr->data[rr->length]; 474 /* record (minus padding) is too short to contain a MAC */ 484 i=s->method->ssl3_enc->mac(s,md,0); 485 if (i < 0 || mac == NULL || memcmp(md, mac, (size_t)mac_size) != 0 [all...] |