HomeSort by relevance Sort by last modified time
    Searched refs:mac (Results 101 - 125 of 191) sorted by null

1 2 3 45 6 7 8

  /prebuilt/ndk/android-ndk-r4/platforms/android-8/arch-x86/usr/include/linux/
skbuff.h 132 } mac; member in struct:sk_buff
  /external/iptables/
Android.mk 52 PF_EXT_SLIB+=hashlimit helper icmp iprange length limit mac multiport #2mark
  /external/kernel-headers/original/linux/
if_vlan.h 54 return (struct vlan_ethhdr *)skb->mac.raw;
190 * This allows the VLAN to have a different MAC than the underlying
249 /* Move the mac addresses to the beginning of the new header. */
259 skb->mac.raw -= VLAN_HLEN;
  /external/wpa_supplicant/
sha1.c 30 * @mac: Buffer for the hash (20 bytes)
33 const u8 *addr[], const size_t *len, u8 *mac)
78 sha1_vector(1 + num_elem, _addr, _len, mac);
89 _addr[1] = mac;
91 sha1_vector(2, _addr, _len, mac);
101 * @mac: Buffer for the hash (20 bytes)
104 u8 *mac)
106 hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac);
396 * @mac: Buffer for the hash
399 u8 *mac)
    [all...]
eap_psk.c 185 u8 mac[EAP_PSK_MAC_LEN]; local
232 omac1_aes_128(data->ak, buf, buflen, mac);
234 if (os_memcmp(mac, hdr3->mac_s, EAP_PSK_MAC_LEN) != 0) {
eap_pax.c 261 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local
305 (u8 *) data->cid, data->cid_len, NULL, 0, mac);
306 if (os_memcmp(pos, mac, EAP_PAX_MAC_LEN) != 0) {
310 mac, EAP_PAX_MAC_LEN);
379 wpa_printf(MSG_INFO, "EAP-PAX: MAC ID changed during "
405 wpa_printf(MSG_INFO, "EAP-PAX: Unsupported MAC ID 0x%x",
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
sha1.c 30 * @mac: Buffer for the hash (20 bytes)
33 const u8 *addr[], const size_t *len, u8 *mac)
78 sha1_vector(1 + num_elem, _addr, _len, mac);
89 _addr[1] = mac;
91 sha1_vector(2, _addr, _len, mac);
101 * @mac: Buffer for the hash (20 bytes)
104 u8 *mac)
106 hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac);
401 * @mac: Buffer for the hash
404 u8 *mac)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_peap.c 306 u8 *mac; local
329 mac = wpabuf_put(buf, 20); /* Compound_MAC */
335 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac);
336 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC", mac, SHA1_MAC_LEN);
390 u8 buf[61], mac[SHA1_MAC_LEN]; local
428 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac);
430 if (os_memcmp(mac, pos, SHA1_MAC_LEN) != 0) {
433 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received MAC",
435 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Expected MAC",
436 mac, SHA1_MAC_LEN)
    [all...]
eap_aka.c 653 const u8 *mac, const u8 *extra,
657 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra,
659 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len);
816 if (!attr->mac || !attr->rand || !attr->autn) {
819 !attr->mac ? " AT_MAC" : "",
844 /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the
878 if (eap_aka_verify_mac(data, reqData, attr->mac, (u8 *) "", 0)) {
960 if (attr->mac == NULL) {
966 if (eap_aka_verify_mac(data, reqData, attr->mac, (u8 *) "", 0)) {
1044 if (eap_aka_verify_mac(data, reqData, attr->mac, (u8 *) "", 0))
    [all...]
eap_psk.c 190 u8 mac[EAP_PSK_MAC_LEN]; local
238 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
243 if (os_memcmp(mac, hdr3->mac_s, EAP_PSK_MAC_LEN) != 0) {
eap_pax.c 244 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local
287 (u8 *) data->cid, data->cid_len, NULL, 0, mac);
288 if (os_memcmp(pos, mac, EAP_PAX_MAC_LEN) != 0) {
292 mac, EAP_PAX_MAC_LEN);
360 wpa_printf(MSG_INFO, "EAP-PAX: MAC ID changed during "
386 wpa_printf(MSG_INFO, "EAP-PAX: Unsupported MAC ID 0x%x",
  /hardware/libhardware/include/hardware/
gps.h 312 uint8_t mac[6]; member in struct:__anon9490
320 AGpsRefLocationMac mac; member in union:__anon9491::__anon9492
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_upnp.c 810 * @from_mac_addr: Source (Enrollee) MAC address for the event
826 const u8 *mac = from_mac_addr; local
846 os_snprintf(mac_text, sizeof(mac_text), MACSTR, MAC2STR(mac));
923 * @mac: Buffer for returning MAC address
924 * @mac_addr_text: Buffer for returning allocated MAC address text
928 char **ip_addr_text, u8 mac[ETH_ALEN],
963 os_memcpy(mac, req.ifr_addr.sa_data, 6);
965 if (eth_get(net_if, mac) < 0) {
966 wpa_printf(MSG_ERROR, "WPS UPnP: Failed to get MAC address")
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_aka.c 706 /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the
762 if (attr->mac || attr->iv || attr->encr_data) {
790 const u8 *mac, const u8 *extra,
794 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra,
796 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len);
815 attr->kdf_count == 1 && attr->mac == NULL) {
844 if (attr->mac == NULL ||
845 eap_aka_verify_mac(data, respData, attr->mac, NULL, 0)) {
962 if (attr->mac == NULL ||
963 eap_aka_verify_mac(data, respData, attr->mac, data->nonce_s
    [all...]
eap_pax.c 235 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected MAC ID 0x%x, "
293 u8 mac[EAP_PAX_MAC_LEN], icvbuf[EAP_PAX_ICV_LEN]; local
402 (u8 *) data->cid, data->cid_len, mac);
403 if (os_memcmp(mac, pos, EAP_PAX_MAC_LEN) != 0) {
407 mac, EAP_PAX_MAC_LEN);
eap_psk.c 223 u8 *pos, mac[EAP_PSK_MAC_LEN], *buf; local
315 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
322 if (os_memcmp(mac, resp->mac_p, EAP_PSK_MAC_LEN) != 0) {
325 mac, EAP_PSK_MAC_LEN);
  /external/chromium/net/third_party/nss/ssl/
ssl3prot.h 89 SSL3Opaque MAC[MAX_MAC_LENGTH];
94 SSL3Opaque MAC[MAX_MAC_LENGTH];
344 unsigned char *mac; member in struct:__anon2607
  /external/webkit/WebKitTools/Scripts/webkitpy/
changelogs_unittest.py 79 * DumpRenderTree/mac/DumpRenderTreeWindow.mm:
  /hardware/ti/wlan/wl1271/TWD/Ctrl/
CmdBldCmdIE.c 51 #define MAC_TO_VENDOR_PREAMBLE(mac) ((mac[0] << 16) | (mac[1] << 8) | mac[2])
    [all...]
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/hal/hw_ctrl/
whalHwMboxCmd.c 50 #define MAC_TO_VENDOR_PREAMBLE(mac) ((mac[0] << 16) | (mac[1] << 8) | mac[2])
    [all...]
  /system/wlan/ti/wilink_6_1/TWD/Ctrl/
CmdBldCmdIE.c 51 #define MAC_TO_VENDOR_PREAMBLE(mac) ((mac[0] << 16) | (mac[1] << 8) | mac[2])
    [all...]
  /external/dnsmasq/src/
util.c 453 char *print_mac(char *buff, unsigned char *mac, int len)
462 p += sprintf(p, "%.2x%s", mac[i], (i == len - 1) ? "" : ":");
  /external/v8/tools/
tickprocessor-driver.js 43 'mac': MacCppEntriesProvider
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
JDKKeyStore.java 844 // Finalise our mac calculation
845 byte[] mac = new byte[hMac.getMacSize()];
846 hMac.doFinal(mac, 0);
849 // Read the original mac from the stream
853 if (!Arrays.constantTimeAreEqual(mac, oldMac))
864 // Parse the original mac from the stream too
903 byte[] mac = new byte[hMac.getMacSize()];
905 hMac.doFinal(mac, 0);
907 dOut.write(mac);
  /external/openssl/ssl/
s3_pkt.c 295 unsigned char *mac = NULL; local
410 /* We now have - encrypted [ MAC [ compressed [ plain ] ] ]
434 * the MAC computation anyway. */
444 /* r->length is now the compressed data plus mac */
466 /* check the MAC for rr->input (it's in mac_size bytes at the tail) */
470 mac = &rr->data[rr->length];
474 /* record (minus padding) is too short to contain a MAC */
484 i=s->method->ssl3_enc->mac(s,md,0);
485 if (i < 0 || mac == NULL || memcmp(md, mac, (size_t)mac_size) != 0
    [all...]

Completed in 646 milliseconds

1 2 3 45 6 7 8