HomeSort by relevance Sort by last modified time
    Searched refs:mac (Results 51 - 75 of 191) sorted by null

1 23 4 5 6 7 8

  /external/openssl/crypto/pkcs12/
p12_npas.c 87 /* Check the mac */
111 unsigned char mac[EVP_MAX_MD_SIZE]; local
159 if(!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) goto saferr;
161 if(!ASN1_OCTET_STRING_set(macnew, mac, maclen)) goto saferr;
162 ASN1_OCTET_STRING_free(p12->mac->dinfo->digest);
163 p12->mac->dinfo->digest = macnew;
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
MacTest.java 40 import javax.crypto.Mac;
55 @TestTargetClass(Mac.class)
57 * Tests for Mac class constructors and methods
63 public static final String srvMac = "Mac";
73 private static final String NotSupportedMsg = "There is no suitable provider for Mac";
99 private Mac [] createMacs() {
105 Mac m [] = new Mac[3];
106 m[0] = Mac.getInstance(defaultAlgorithm);
107 m[1] = Mac.getInstance(defaultAlgorithm, defaultProvider)
159 Mac mac; local
255 Mac mac; local
338 Mac mac; local
1105 Mac mac = new myMac(spi, defaultProvider, defaultAlgorithm); local
1138 Mac mac; local
1155 Mac mac; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.c 171 const u8 *mac, const u8 *extra, size_t extra_len)
178 if (mac == NULL || wpabuf_len(req) < EAP_SIM_MAC_LEN ||
179 mac < wpabuf_head_u8(req) ||
180 mac > wpabuf_head_u8(req) + wpabuf_len(req) - EAP_SIM_MAC_LEN)
194 os_memset(tmp + (mac - wpabuf_head_u8(req)), 0, EAP_SIM_MAC_LEN);
195 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg",
197 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data",
199 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut",
202 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC",
979 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg
    [all...]
eap_sim_common.h 93 const u8 *mac, const u8 *extra, size_t extra_len);
94 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
105 const u8 *mac, const u8 *extra,
108 u8 *mac, const u8 *extra, size_t extra_len);
133 const u8 *mac, const u8 *extra,
190 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto.h 35 * @mac: Buffer for the hash
37 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac);
44 * @mac: Buffer for the hash
46 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac);
53 * @mac: Buffer for the hash
56 u8 *mac);
78 * @mac: Buffer for the hash
81 u8 *mac);
sha256.c 29 * @mac: Buffer for the hash (32 bytes)
32 const u8 *addr[], const size_t *len, u8 *mac)
77 sha256_vector(1 + num_elem, _addr, _len, mac);
88 _addr[1] = mac;
90 sha256_vector(2, _addr, _len, mac);
100 * @mac: Buffer for the hash (20 bytes)
103 size_t data_len, u8 *mac)
105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac);
179 * @mac: Buffer for the hash
182 u8 *mac)
    [all...]
crypto_gnutls.c 21 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
33 memcpy(mac, p, gcry_md_get_algo_dlen(GCRY_MD_MD4));
60 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
72 memcpy(mac, p, gcry_md_get_algo_dlen(GCRY_MD_MD5));
77 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
89 memcpy(mac, p, gcry_md_get_algo_dlen(GCRY_MD_SHA1));
crypto_openssl.c 37 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
45 MD4_Final(mac, &ctx);
70 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
78 MD5_Final(mac, &ctx);
82 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
90 SHA1_Final(mac, &ctx);
crypto_cryptoapi.c 115 const u8 *addr[], const size_t *len, u8 *mac)
143 if (!CryptGetHashParam(hash, HP_HASHVAL, mac, &hlen, 0)) {
155 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
157 cryptoapi_hash_vector(CALG_MD4, 16, num_elem, addr, len, mac);
227 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
229 cryptoapi_hash_vector(CALG_MD5, 16, num_elem, addr, len, mac);
233 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
235 cryptoapi_hash_vector(CALG_SHA, 20, num_elem, addr, len, mac);
477 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len)
485 if (mac == NULL || len == NULL
    [all...]
crypto_libtomcrypt.c 32 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
40 md4_done(&md, mac);
66 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
74 md5_done(&md, mac);
78 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
86 sha1_done(&md, mac);
221 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len)
229 if (mac == NULL || len == NULL) {
247 if (md5_done(&ctx->u.md, mac) != CRYPT_OK)
257 if (sha1_done(&ctx->u.md, mac) != CRYPT_OK
    [all...]
  /external/wpa_supplicant/
sha256.c 29 * @mac: Buffer for the hash (32 bytes)
32 const u8 *addr[], const size_t *len, u8 *mac)
77 sha256_vector(1 + num_elem, _addr, _len, mac);
88 _addr[1] = mac;
90 sha256_vector(2, _addr, _len, mac);
100 * @mac: Buffer for the hash (20 bytes)
103 size_t data_len, u8 *mac)
105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac);
176 * @mac: Buffer for the hash
179 u8 *mac)
    [all...]
crypto.c 35 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
43 MD4_Final(mac, &ctx);
69 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
77 MD5_Final(mac, &ctx);
81 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
89 SHA1_Final(mac, &ctx);
eap_sim_common.c 169 const u8 *mac, const u8 *extra, size_t extra_len)
176 if (mac == NULL || req_len < EAP_SIM_MAC_LEN || mac < req ||
177 mac > req + req_len - EAP_SIM_MAC_LEN)
191 os_memset(tmp + (mac - req), 0, EAP_SIM_MAC_LEN);
192 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", tmp, req_len);
193 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data",
195 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut",
198 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC",
604 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg
    [all...]
eap_sim_common.h 86 const u8 *mac, const u8 *extra, size_t extra_len);
87 void eap_sim_add_mac(const u8 *k_aut, u8 *msg, size_t msg_len, u8 *mac,
131 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
crypto_cryptoapi.c 130 const u8 *addr[], const size_t *len, u8 *mac)
158 if (!CryptGetHashParam(hash, HP_HASHVAL, mac, &hlen, 0)) {
170 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
172 cryptoapi_hash_vector(CALG_MD4, 16, num_elem, addr, len, mac);
242 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
244 cryptoapi_hash_vector(CALG_MD5, 16, num_elem, addr, len, mac);
248 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
250 cryptoapi_hash_vector(CALG_SHA, 20, num_elem, addr, len, mac);
492 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len)
500 if (mac == NULL || len == NULL
    [all...]
crypto_libtomcrypt.c 32 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
40 md4_done(&md, mac);
66 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
74 md5_done(&md, mac);
78 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
86 sha1_done(&md, mac);
221 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len)
229 if (mac == NULL || len == NULL) {
247 if (md5_done(&ctx->u.md, mac) != CRYPT_OK)
257 if (sha1_done(&ctx->u.md, mac) != CRYPT_OK
    [all...]
  /hardware/ti/wlan/wl1271/utils/
tidef.h 75 * \brief Length of Standart MAC address
215 * \brief Macro which returns True if MAC address is broadcast (equals "\xff\xff\xff\xff\xff\xff") \n
218 #define MAC_BROADCAST(mac) MAC_EQUAL (mac, "\xff\xff\xff\xff\xff\xff")
221 * \brief Macro which returns True if MAC address is Null (equals "\x0\x0\x0\x0\x0\x0") \n
224 #define MAC_NULL(mac) MAC_EQUAL (mac, "\x0\x0\x0\x0\x0\x0")
227 * \brief Macro which returns True if MAC address is Multicast\n
230 #define MAC_MULTICAST(mac) ((mac)[0] & 0x01
    [all...]
  /system/wlan/ti/wilink_6_1/utils/
tidef.h 80 * \brief Length of Standart MAC address
220 * \brief Macro which returns True if MAC address is broadcast (equals "\xff\xff\xff\xff\xff\xff") \n
223 #define MAC_BROADCAST(mac) MAC_EQUAL (mac, "\xff\xff\xff\xff\xff\xff")
226 * \brief Macro which returns True if MAC address is Null (equals "\x0\x0\x0\x0\x0\x0") \n
229 #define MAC_NULL(mac) MAC_EQUAL (mac, "\x0\x0\x0\x0\x0\x0")
232 * \brief Macro which returns True if MAC address is Multicast\n
235 #define MAC_MULTICAST(mac) ((mac)[0] & 0x01
    [all...]
  /libcore/luni/src/main/java/javax/crypto/
Mac.java 34 * (MAC) algorithms.
36 public class Mac implements Cloneable {
39 private static final Engine engine = new Engine("Mac");
50 // Store Mac state (initialized or not initialized)
54 * Creates a new {@code Mac} instance.
61 * the name of the MAC algorithm.
63 protected Mac(MacSpi macSpi, Provider provider, String algorithm) {
71 * Returns the name of the MAC algorithm.
73 * @return the name of the MAC algorithm.
80 * Returns the provider of this {@code Mac} instance
421 Mac mac = new Mac(newSpiImpl, this.provider, this.algorithm); local
    [all...]
  /system/wlan/ti/sta_dk_4_0_4_32/common/src/hal/hl_data/
whalDefrag.c 48 static int findAndInsertEndpointIndex (TI_HANDLE hWhalDefrag, UINT8* mac, UINT8* idx)
57 (os_memoryCompare (pWhalDefrag->hOs, pWhalDefrag->endpntMngr[i].srcMac, mac, MAC_ADDR_LEN) == 0))
70 os_memoryCopy (pWhalDefrag->hOs, pWhalDefrag->endpntMngr[i].srcMac, mac, MAC_ADDR_LEN);
  /external/webkit/WebKitTools/BuildSlaveSupport/
build-launcher-dmg 89 my $nightlyRemoteDiskImagePath = "$nightlyRemotePath/builds/$buildTag/mac/" . basename($nightlyLauncherDiskImagePath);
92 system("ssh", $nightlyRemoteHost, $nightlyRemoteLatestPath, $buildTag, "mac", $nightlyRemoteDiskImagePath, $revision) == 0 or die "Failed linking disk image to latest";
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/
CCMBlockCipher.java 9 import org.bouncycastle.crypto.Mac;
132 * Returns a byte array containing the mac calculated as part of the
135 * @return the last mac calculated.
139 byte[] mac = new byte[macSize];
141 System.arraycopy(macBlock, 0, mac, 0, mac.length);
143 return mac;
248 throw new InvalidCipherTextException("mac check in CCM failed");
257 Mac cMac = new CBCBlockCipherMac(cipher, macSize * 8);
  /external/kernel-headers/original/linux/
if_tr.h 50 return (struct trh_hdr *)skb->mac.raw;
  /external/webkit/SunSpider/tests/sunspider-0.9/
string-validate-input.js 15 (k%2)?email=name+"@mac.com":email=name+"(at)mac.com";
  /external/webkit/SunSpider/tests/sunspider-0.9.1/
string-validate-input.js 15 (k%2)?email=name+"@mac.com":email=name+"(at)mac.com";

Completed in 581 milliseconds

1 23 4 5 6 7 8