/external/wpa_supplicant/ |
eap_aka.c | 435 if (!attr->mac || !attr->rand || !attr->autn) { 438 !attr->mac ? " AT_MAC" : "", 476 attr->mac, (u8 *) "", 0)) { 555 if (attr->mac == NULL) { 562 attr->mac, (u8 *) "", 0)) { 637 attr->mac, (u8 *) "", 0)) {
|
eap_sim.c | 491 if (!attr->mac || !attr->rand) { 494 !attr->mac ? " AT_MAC" : "", 554 attr->mac, data->nonce_mt, 634 if (attr->mac == NULL) { 640 if (eap_sim_verify_mac(data->k_aut, (u8 *) req, reqDataLen, attr->mac, 716 attr->mac, (u8 *) "", 0)) {
|
md4.c | 38 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 46 MD4Final(mac, &ctx);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sim.c | 583 if (!attr->mac || !attr->rand) { 586 !attr->mac ? " AT_MAC" : "", 645 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, 728 if (attr->mac == NULL) { 734 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, (u8 *) "", 0)) 804 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, (u8 *) "", 0))
|
/external/dnsmasq/src/ |
rfc2131.c | 127 struct dhcp_mac *mac; local 269 /* find mac to use for logging and hashing */ 273 for (mac = daemon->dhcp_macs; mac; mac = mac->next) 274 if (mac->hwaddr_len == mess->hlen && 275 (mac->hwaddr_type == mess->htype || mac->hwaddr_type == 0) && 276 memcmp_masked(mac->hwaddr, mess->chaddr, mess->hlen, mac->mask) 904 unsigned char *mac = extended_hwaddr(ltmp->hwaddr_type, ltmp->hwaddr_len, local [all...] |
/external/webkit/WebCore/platform/network/mac/ |
ResourceHandleMac.mm | 508 [challenge.sender() useCredential:mac(credential) forAuthenticationChallenge:mac(challenge)]; 542 [[d->m_currentMacChallenge sender] useCredential:mac(webCredential) forAuthenticationChallenge:d->m_currentMacChallenge]; 545 if (credential.persistence() == CredentialPersistenceForSession && (!d->m_needsSiteSpecificQuirks || ![[[mac(challenge) protectionSpace] host] isEqualToString:@"gallery.me.com"])) { 554 [[d->m_currentMacChallenge sender] useCredential:mac(webCredential) forAuthenticationChallenge:d->m_currentMacChallenge]; 557 [[d->m_currentMacChallenge sender] useCredential:mac(credential) forAuthenticationChallenge:d->m_currentMacChallenge]; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_peap.c | 398 u8 *mac; local 437 mac = wpabuf_put(buf, 20); /* Compound_MAC */ 444 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac); 446 mac, SHA1_MAC_LEN); 596 u8 buf[61], mac[SHA1_MAC_LEN]; local 626 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac); 628 if (os_memcmp(mac, pos, SHA1_MAC_LEN) != 0) { [all...] |
eap_sim.c | 516 if (attr->mac == NULL || 517 eap_sim_verify_mac(data->k_aut, respData, attr->mac, 568 if (attr->mac == NULL || 569 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
|
/system/wlan/ti/sta_dk_4_0_4_32/CUDK/CLI/ |
cu_cmd.c | 513 or 'mac' if success 516 U8* str2MACAddr(char *str, U8 *mac) 527 mac[i] = (U8) strtoul(p, &p, 16); 532 console_printf_terminal("%2x.", mac[i] ); 537 return mac; 540 static char * print_mac_2_str(OS_802_11_MAC_ADDRESS mac) 545 mac[0], mac[1], mac[2], mac[3], mac[4], mac[5]) [all...] |
/external/gtest/test/ |
gtest-filepath_test.cc | 490 #else // We are on Linux or Mac OS. 571 FilePath mac("mac"); 572 mac.Set(apple); // Implement Set() since overloading operator= is forbidden. 573 EXPECT_STREQ("apple", mac.c_str());
|
/external/openssl/ssl/ |
s2_pkt.c | 130 unsigned char mac[MAX_MAC_SIZE]; local 270 ssl2_mac(s,mac,0); 272 if ( (memcmp(mac,s->s2->mac_data, 531 /* set mac_size to mac size */ 601 /* mac_size is the number of MAC bytes
|
/external/protobuf/gtest/test/ |
gtest-filepath_test.cc | 545 FilePath mac("mac"); 546 mac.Set(apple); // Implement Set() since overloading operator= is forbidden. 547 EXPECT_STREQ("apple", mac.c_str());
|
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 250 sess.mac = 0; 287 sess.mac = digests[i].id; 378 cryp.mac = 0; 686 sess->mac = digest; 736 cryp.mac = (caddr_t) state->digest_res; 767 cryp.mac = (caddr_t)md; [all...] |
/external/webkit/WebKit/mac/Misc/ |
WebDownload.mm | 117 NSURLCredential *credential = mac(CredentialStorage::get(core([challenge protectionSpace])));
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
md4.c | 38 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 46 MD4Final(mac, &ctx);
|
/external/netcat/ |
stupidh | 187 mac
|
/hardware/broadcom/wlan/bcm4329/src/dhd/sys/ |
dhd_linux.c | 239 uint8 mac_addr[ETHER_ADDR_LEN]; /* assigned MAC address */ 316 /* Spawn a thread for system ioctls (set mac, set mcast) */ 1010 DHD_TRACE(("attempt to set MAC for %s in AP Mode blocked.\n", dhd->iflist[i]->net->name)); [all...] |
dhd.h | 124 struct ether_addr mac; /* MAC address obtained from dongle */ member in struct:dhd_pub
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JDKPKCS12KeyStore.java | 29 import javax.crypto.Mac; 699 if (bag.getMacData() != null) // check the mac code 718 throw new IOException("PKCS12 key store mac invalid - wrong password or corrupted file."); 726 throw new IOException("PKCS12 key store mac invalid - wrong password or corrupted file."); 738 throw new IOException("error constructing MAC: " + e.toString()); 1496 Mac mac = Mac.getInstance(oid.getId(), bcProvider); local [all...] |
/external/bison/build-aux/ |
config.sub | 1116 mac | mpw | mac-mpw) 1212 -mac*) 1213 os=`echo $os | sed -e 's|mac|macos|'`
|
/external/chromium/sdch/open-vcdiff/ |
config.sub | 1152 mac | mpw | mac-mpw) 1250 -mac*) 1251 os=`echo $os | sed -e 's|mac|macos|'`
|
/external/chromium/third_party/icu/source/ |
config.sub | 1184 mac | mpw | mac-mpw) 1282 -mac*) 1283 os=`echo $os | sed -e 's|mac|macos|'` [all...] |
/external/chromium/third_party/libevent/ |
config.sub | 1184 mac | mpw | mac-mpw) 1282 -mac*) 1283 os=`echo $os | sed -e 's|mac|macos|'` [all...] |
/external/clearsilver/ |
config.sub | 996 mac | mpw | mac-mpw) 1090 -mac*) 1091 os=`echo $os | sed -e 's|mac|macos|'`
|
/external/dbus/ |
config.sub | 1066 mac | mpw | mac-mpw) 1160 -mac*) 1161 os=`echo $os | sed -e 's|mac|macos|'`
|