/external/openssl/crypto/pkcs12/ |
p12_npas.c | 87 /* Check the mac */ 111 unsigned char mac[EVP_MAX_MD_SIZE]; local 159 if(!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) goto saferr; 161 if(!ASN1_OCTET_STRING_set(macnew, mac, maclen)) goto saferr; 162 ASN1_OCTET_STRING_free(p12->mac->dinfo->digest); 163 p12->mac->dinfo->digest = macnew;
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
MacTest.java | 40 import javax.crypto.Mac; 55 @TestTargetClass(Mac.class) 57 * Tests for Mac class constructors and methods 63 public static final String srvMac = "Mac"; 73 private static final String NotSupportedMsg = "There is no suitable provider for Mac"; 99 private Mac [] createMacs() { 105 Mac m [] = new Mac[3]; 106 m[0] = Mac.getInstance(defaultAlgorithm); 107 m[1] = Mac.getInstance(defaultAlgorithm, defaultProvider) 159 Mac mac; local 255 Mac mac; local 338 Mac mac; local 1105 Mac mac = new myMac(spi, defaultProvider, defaultAlgorithm); local 1138 Mac mac; local 1155 Mac mac; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.c | 171 const u8 *mac, const u8 *extra, size_t extra_len) 178 if (mac == NULL || wpabuf_len(req) < EAP_SIM_MAC_LEN || 179 mac < wpabuf_head_u8(req) || 180 mac > wpabuf_head_u8(req) + wpabuf_len(req) - EAP_SIM_MAC_LEN) 194 os_memset(tmp + (mac - wpabuf_head_u8(req)), 0, EAP_SIM_MAC_LEN); 195 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", 197 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", 199 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut", 202 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC", 979 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg [all...] |
eap_sim_common.h | 93 const u8 *mac, const u8 *extra, size_t extra_len); 94 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 105 const u8 *mac, const u8 *extra, 108 u8 *mac, const u8 *extra, size_t extra_len); 133 const u8 *mac, const u8 *extra, 190 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto.h | 35 * @mac: Buffer for the hash 37 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac); 44 * @mac: Buffer for the hash 46 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac); 53 * @mac: Buffer for the hash 56 u8 *mac); 78 * @mac: Buffer for the hash 81 u8 *mac);
|
sha256.c | 29 * @mac: Buffer for the hash (32 bytes) 32 const u8 *addr[], const size_t *len, u8 *mac) 77 sha256_vector(1 + num_elem, _addr, _len, mac); 88 _addr[1] = mac; 90 sha256_vector(2, _addr, _len, mac); 100 * @mac: Buffer for the hash (20 bytes) 103 size_t data_len, u8 *mac) 105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 179 * @mac: Buffer for the hash 182 u8 *mac) [all...] |
crypto_gnutls.c | 21 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 33 memcpy(mac, p, gcry_md_get_algo_dlen(GCRY_MD_MD4)); 60 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 72 memcpy(mac, p, gcry_md_get_algo_dlen(GCRY_MD_MD5)); 77 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 89 memcpy(mac, p, gcry_md_get_algo_dlen(GCRY_MD_SHA1));
|
crypto_openssl.c | 37 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 45 MD4_Final(mac, &ctx); 70 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 78 MD5_Final(mac, &ctx); 82 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 90 SHA1_Final(mac, &ctx);
|
crypto_cryptoapi.c | 115 const u8 *addr[], const size_t *len, u8 *mac) 143 if (!CryptGetHashParam(hash, HP_HASHVAL, mac, &hlen, 0)) { 155 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 157 cryptoapi_hash_vector(CALG_MD4, 16, num_elem, addr, len, mac); 227 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 229 cryptoapi_hash_vector(CALG_MD5, 16, num_elem, addr, len, mac); 233 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 235 cryptoapi_hash_vector(CALG_SHA, 20, num_elem, addr, len, mac); 477 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) 485 if (mac == NULL || len == NULL [all...] |
crypto_libtomcrypt.c | 32 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 40 md4_done(&md, mac); 66 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 74 md5_done(&md, mac); 78 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 86 sha1_done(&md, mac); 221 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) 229 if (mac == NULL || len == NULL) { 247 if (md5_done(&ctx->u.md, mac) != CRYPT_OK) 257 if (sha1_done(&ctx->u.md, mac) != CRYPT_OK [all...] |
/external/wpa_supplicant/ |
sha256.c | 29 * @mac: Buffer for the hash (32 bytes) 32 const u8 *addr[], const size_t *len, u8 *mac) 77 sha256_vector(1 + num_elem, _addr, _len, mac); 88 _addr[1] = mac; 90 sha256_vector(2, _addr, _len, mac); 100 * @mac: Buffer for the hash (20 bytes) 103 size_t data_len, u8 *mac) 105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 176 * @mac: Buffer for the hash 179 u8 *mac) [all...] |
crypto.c | 35 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 43 MD4_Final(mac, &ctx); 69 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 77 MD5_Final(mac, &ctx); 81 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 89 SHA1_Final(mac, &ctx);
|
eap_sim_common.c | 169 const u8 *mac, const u8 *extra, size_t extra_len) 176 if (mac == NULL || req_len < EAP_SIM_MAC_LEN || mac < req || 177 mac > req + req_len - EAP_SIM_MAC_LEN) 191 os_memset(tmp + (mac - req), 0, EAP_SIM_MAC_LEN); 192 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", tmp, req_len); 193 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", 195 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut", 198 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC", 604 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg [all...] |
eap_sim_common.h | 86 const u8 *mac, const u8 *extra, size_t extra_len); 87 void eap_sim_add_mac(const u8 *k_aut, u8 *msg, size_t msg_len, u8 *mac, 131 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
|
crypto_cryptoapi.c | 130 const u8 *addr[], const size_t *len, u8 *mac) 158 if (!CryptGetHashParam(hash, HP_HASHVAL, mac, &hlen, 0)) { 170 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 172 cryptoapi_hash_vector(CALG_MD4, 16, num_elem, addr, len, mac); 242 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 244 cryptoapi_hash_vector(CALG_MD5, 16, num_elem, addr, len, mac); 248 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 250 cryptoapi_hash_vector(CALG_SHA, 20, num_elem, addr, len, mac); 492 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) 500 if (mac == NULL || len == NULL [all...] |
crypto_libtomcrypt.c | 32 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 40 md4_done(&md, mac); 66 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 74 md5_done(&md, mac); 78 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 86 sha1_done(&md, mac); 221 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) 229 if (mac == NULL || len == NULL) { 247 if (md5_done(&ctx->u.md, mac) != CRYPT_OK) 257 if (sha1_done(&ctx->u.md, mac) != CRYPT_OK [all...] |
/hardware/ti/wlan/wl1271/utils/ |
tidef.h | 75 * \brief Length of Standart MAC address 215 * \brief Macro which returns True if MAC address is broadcast (equals "\xff\xff\xff\xff\xff\xff") \n 218 #define MAC_BROADCAST(mac) MAC_EQUAL (mac, "\xff\xff\xff\xff\xff\xff") 221 * \brief Macro which returns True if MAC address is Null (equals "\x0\x0\x0\x0\x0\x0") \n 224 #define MAC_NULL(mac) MAC_EQUAL (mac, "\x0\x0\x0\x0\x0\x0") 227 * \brief Macro which returns True if MAC address is Multicast\n 230 #define MAC_MULTICAST(mac) ((mac)[0] & 0x01 [all...] |
/system/wlan/ti/wilink_6_1/utils/ |
tidef.h | 80 * \brief Length of Standart MAC address 220 * \brief Macro which returns True if MAC address is broadcast (equals "\xff\xff\xff\xff\xff\xff") \n 223 #define MAC_BROADCAST(mac) MAC_EQUAL (mac, "\xff\xff\xff\xff\xff\xff") 226 * \brief Macro which returns True if MAC address is Null (equals "\x0\x0\x0\x0\x0\x0") \n 229 #define MAC_NULL(mac) MAC_EQUAL (mac, "\x0\x0\x0\x0\x0\x0") 232 * \brief Macro which returns True if MAC address is Multicast\n 235 #define MAC_MULTICAST(mac) ((mac)[0] & 0x01 [all...] |
/libcore/luni/src/main/java/javax/crypto/ |
Mac.java | 34 * (MAC) algorithms. 36 public class Mac implements Cloneable { 39 private static final Engine engine = new Engine("Mac"); 50 // Store Mac state (initialized or not initialized) 54 * Creates a new {@code Mac} instance. 61 * the name of the MAC algorithm. 63 protected Mac(MacSpi macSpi, Provider provider, String algorithm) { 71 * Returns the name of the MAC algorithm. 73 * @return the name of the MAC algorithm. 80 * Returns the provider of this {@code Mac} instance 421 Mac mac = new Mac(newSpiImpl, this.provider, this.algorithm); local [all...] |
/system/wlan/ti/sta_dk_4_0_4_32/common/src/hal/hl_data/ |
whalDefrag.c | 48 static int findAndInsertEndpointIndex (TI_HANDLE hWhalDefrag, UINT8* mac, UINT8* idx) 57 (os_memoryCompare (pWhalDefrag->hOs, pWhalDefrag->endpntMngr[i].srcMac, mac, MAC_ADDR_LEN) == 0)) 70 os_memoryCopy (pWhalDefrag->hOs, pWhalDefrag->endpntMngr[i].srcMac, mac, MAC_ADDR_LEN);
|
/external/webkit/WebKitTools/BuildSlaveSupport/ |
build-launcher-dmg | 89 my $nightlyRemoteDiskImagePath = "$nightlyRemotePath/builds/$buildTag/mac/" . basename($nightlyLauncherDiskImagePath); 92 system("ssh", $nightlyRemoteHost, $nightlyRemoteLatestPath, $buildTag, "mac", $nightlyRemoteDiskImagePath, $revision) == 0 or die "Failed linking disk image to latest";
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/ |
CCMBlockCipher.java | 9 import org.bouncycastle.crypto.Mac; 132 * Returns a byte array containing the mac calculated as part of the 135 * @return the last mac calculated. 139 byte[] mac = new byte[macSize]; 141 System.arraycopy(macBlock, 0, mac, 0, mac.length); 143 return mac; 248 throw new InvalidCipherTextException("mac check in CCM failed"); 257 Mac cMac = new CBCBlockCipherMac(cipher, macSize * 8);
|
/external/kernel-headers/original/linux/ |
if_tr.h | 50 return (struct trh_hdr *)skb->mac.raw;
|
/external/webkit/SunSpider/tests/sunspider-0.9/ |
string-validate-input.js | 15 (k%2)?email=name+"@mac.com":email=name+"(at)mac.com";
|
/external/webkit/SunSpider/tests/sunspider-0.9.1/ |
string-validate-input.js | 15 (k%2)?email=name+"@mac.com":email=name+"(at)mac.com";
|