/external/webkit/WebKitTools/Scripts/webkitpy/layout_tests/port/ |
__init__.py | 47 port_to_use = 'chromium-mac' 52 elif port_to_use.startswith('mac'): 53 import mac namespace 54 return mac.MacPort(port_name, options) 55 elif port_to_use.startswith('chromium-mac'):
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/io/ |
MacInputStream.java | 7 import org.bouncycastle.crypto.Mac; 12 protected Mac mac; field in class:MacInputStream 16 Mac mac) 19 this.mac = mac; 29 mac.update((byte)b); 43 mac.update(b, off, n); 48 public Mac getMac( [all...] |
MacOutputStream.java | 7 import org.bouncycastle.crypto.Mac; 12 protected Mac mac; field in class:MacOutputStream 16 Mac mac) 19 this.mac = mac; 25 mac.update((byte)b); 35 mac.update(b, off, len); 39 public Mac getMac( [all...] |
/external/elfutils/libdw/ |
dwarf_getmacros.c | 95 Dwarf_Macro mac; local 96 mac.opcode = opcode; 97 mac.param1 = u128; 99 mac.param2.u = u128_2; 101 mac.param2.s = str; 103 if (callback (&mac, arg) != DWARF_CB_OK)
|
/external/v8/tools/ |
tickprocessor-driver.js | 43 'mac': MacCppEntriesProvider
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/ |
EAXBlockCipher.java | 7 import org.bouncycastle.crypto.Mac; 41 private Mac mac; field in class:EAXBlockCipher 59 mac = new CMac(cipher); 62 associatedTextMac = new byte[mac.getMacSize()]; 63 nonceMac = new byte[mac.getMacSize()]; 105 macSize = mac.getMacSize() / 2; 115 mac.init(keyParam); 117 mac.update(tag, 0, blockSize); 118 mac.update(associatedText, 0, associatedText.length) [all...] |
/external/iptables/extensions/ |
libip6t_mac.c | 1 /* Shared library add-on to iptables to add MAC address support. */ 20 "MAC v%s options:\n" 21 " --mac-source [!] XX:XX:XX:XX:XX:XX\n" 22 " Match source MAC address\n" 27 { "mac-source", 1, 0, '1' }, 32 parse_mac(const char *mac, struct ip6t_mac_info *info) 36 if (strlen(mac) != ETH_ALEN*3-1) 37 exit_error(PARAMETER_PROBLEM, "Bad mac address `%s'", mac); 43 number = strtol(mac + i*3, &end, 16) 123 static struct ip6tables_match mac = { variable in typeref:struct:ip6tables_match [all...] |
libipt_mac.c | 1 /* Shared library add-on to iptables to add MAC address support. */ 20 "MAC v%s options:\n" 21 " --mac-source [!] XX:XX:XX:XX:XX:XX\n" 22 " Match source MAC address\n" 27 { "mac-source", 1, 0, '1' }, 32 parse_mac(const char *mac, struct ipt_mac_info *info) 36 if (strlen(mac) != ETH_ALEN*3-1) 37 exit_error(PARAMETER_PROBLEM, "Bad mac address `%s'", mac); 43 number = strtol(mac + i*3, &end, 16) 123 static struct iptables_match mac = { variable in typeref:struct:iptables_match [all...] |
/external/oauth/core/src/main/java/net/oauth/signature/ |
HMAC_SHA1.java | 23 import javax.crypto.Mac; 74 Mac mac = Mac.getInstance(MAC_NAME); local 75 mac.init(key); 77 return mac.doFinal(text);
|
/external/openssl/crypto/pkcs12/ |
p12_mutl.c | 66 /* Generate a MAC */ 68 unsigned char *mac, unsigned int *maclen) 82 salt = p12->mac->salt->data; 83 saltlen = p12->mac->salt->length; 84 if (!p12->mac->iter) iter = 1; 85 else iter = ASN1_INTEGER_get (p12->mac->iter); 87 EVP_get_digestbyobj (p12->mac->dinfo->algor->algorithm))) { 103 HMAC_Final(&hmac, mac, maclen); 108 /* Verify the mac */ 111 unsigned char mac[EVP_MAX_MD_SIZE] local 131 unsigned char mac[EVP_MAX_MD_SIZE]; local [all...] |
p12_npas.c | 87 /* Check the mac */ 111 unsigned char mac[EVP_MAX_MD_SIZE]; local 159 if(!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) goto saferr; 161 if(!ASN1_OCTET_STRING_set(macnew, mac, maclen)) goto saferr; 162 ASN1_OCTET_STRING_free(p12->mac->dinfo->digest); 163 p12->mac->dinfo->digest = macnew;
|
/external/wpa_supplicant/ |
eap_pax_common.c | 24 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 41 u8 mac[SHA1_MAC_LEN]; local 66 hmac_sha1_vector(key, key_len, 3, addr, len, mac); 67 os_memcpy(pos, mac, clen); 77 * eap_pax_mac - EAP-PAX MAC 78 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 87 * @mac: Buffer for the MAC value (EAP_PAX_MAC_LEN = 16 bytes) 90 * Wrapper function to calculate EAP-PAX MAC. 96 u8 *mac) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_pax_common.c | 24 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 41 u8 mac[SHA1_MAC_LEN]; local 66 hmac_sha1_vector(key, key_len, 3, addr, len, mac); 67 os_memcpy(pos, mac, clen); 77 * eap_pax_mac - EAP-PAX MAC 78 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 87 * @mac: Buffer for the MAC value (EAP_PAX_MAC_LEN = 16 bytes) 90 * Wrapper function to calculate EAP-PAX MAC. 96 u8 *mac) [all...] |
/cts/tests/tests/database/src/android/database/cts/ |
AbstractCursor_SelfContentObserverTest.java | 36 MockAbstractCursor mac = new MockAbstractCursor(); local 37 mac.getMockSelfContentObserver(); 47 MockAbstractCursor mac = new MockAbstractCursor(); local 48 MockAbstractCursor.MockSelfContentObserver msc = mac.getMockSelfContentObserver();
|
/external/chromium/net/third_party/nss/ssl/ |
sslgathr.c | 80 ** and checks and discards the MAC, then advances to GS_INIT. 243 ** Check the MAC. 250 unsigned char mac[SSL_MAX_MAC_BYTES]; local 285 /* Have read in all the MAC portion of record 287 ** Prepare MAC by resetting it and feeding it the shared secret 305 (*ss->sec.hash->end)(ss->sec.hashcx, mac, &macLen, macLen); 312 if (NSS_SecureMemcmp(mac, pBuf, macLen) != 0) { 313 /* MAC's didn't match... */ 314 SSL_DBG(("%d: SSL[%d]: mac check failed, seq=%d", 316 PRINT_BUF(1, (ss, "computed mac:", mac, macLen)) [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
MacTest.java | 40 import javax.crypto.Mac; 55 @TestTargetClass(Mac.class) 57 * Tests for Mac class constructors and methods 63 public static final String srvMac = "Mac"; 73 private static final String NotSupportedMsg = "There is no suitable provider for Mac"; 99 private Mac [] createMacs() { 105 Mac m [] = new Mac[3]; 106 m[0] = Mac.getInstance(defaultAlgorithm); 107 m[1] = Mac.getInstance(defaultAlgorithm, defaultProvider) 159 Mac mac; local 255 Mac mac; local 338 Mac mac; local 1105 Mac mac = new myMac(spi, defaultProvider, defaultAlgorithm); local 1138 Mac mac; local 1155 Mac mac; local [all...] |
/bionic/libc/kernel/common/linux/netfilter_ipv4/ |
ipt_ULOG.h | 44 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
|
/development/ndk/platforms/android-3/include/linux/netfilter_ipv4/ |
ipt_ULOG.h | 44 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
|
/external/iptables/include/linux/netfilter_ipv4/ |
ipt_ULOG.h | 50 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
|
/external/kernel-headers/original/linux/netfilter_ipv4/ |
ipt_ULOG.h | 45 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
|
/external/openssl/ssl/ |
s2_pkt.c | 130 unsigned char mac[MAX_MAC_SIZE]; local 270 ssl2_mac(s,mac,0); 272 if ( (memcmp(mac,s->s2->mac_data, 531 /* set mac_size to mac size */ 601 /* mac_size is the number of MAC bytes
|
/prebuilt/ndk/android-ndk-r4/platforms/android-3/arch-arm/usr/include/linux/netfilter_ipv4/ |
ipt_ULOG.h | 44 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
|
/prebuilt/ndk/android-ndk-r4/platforms/android-4/arch-arm/usr/include/linux/netfilter_ipv4/ |
ipt_ULOG.h | 44 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
|
/prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-arm/usr/include/linux/netfilter_ipv4/ |
ipt_ULOG.h | 44 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
|
/prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-x86/usr/include/linux/netfilter_ipv4/ |
ipt_ULOG.h | 44 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
|