/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_pax.c | 235 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected MAC ID 0x%x, " 293 u8 mac[EAP_PAX_MAC_LEN], icvbuf[EAP_PAX_ICV_LEN]; local 402 (u8 *) data->cid, data->cid_len, mac); 403 if (os_memcmp(mac, pos, EAP_PAX_MAC_LEN) != 0) { 407 mac, EAP_PAX_MAC_LEN);
|
eap_psk.c | 223 u8 *pos, mac[EAP_PSK_MAC_LEN], *buf; local 315 if (omac1_aes_128(data->ak, buf, buflen, mac)) { 322 if (os_memcmp(mac, resp->mac_p, EAP_PSK_MAC_LEN) != 0) { 325 mac, EAP_PSK_MAC_LEN);
|
eap_peap.c | 398 u8 *mac; local 437 mac = wpabuf_put(buf, 20); /* Compound_MAC */ 444 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac); 446 mac, SHA1_MAC_LEN); 596 u8 buf[61], mac[SHA1_MAC_LEN]; local 626 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac); 628 if (os_memcmp(mac, pos, SHA1_MAC_LEN) != 0) { [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_pax.c | 237 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local 280 (u8 *) data->cid, data->cid_len, NULL, 0, mac); 281 if (os_memcmp(pos, mac, EAP_PAX_MAC_LEN) != 0) { 285 mac, EAP_PAX_MAC_LEN); 353 wpa_printf(MSG_INFO, "EAP-PAX: MAC ID changed during " 379 wpa_printf(MSG_INFO, "EAP-PAX: Unsupported MAC ID 0x%x",
|
eap_sim.c | 596 if (!attr->mac || !attr->rand) { 599 !attr->mac ? " AT_MAC" : "", 658 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, 741 if (attr->mac == NULL) { 747 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, (u8 *) "", 0)) 817 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, (u8 *) "", 0))
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 230 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected MAC ID 0x%x, " 288 u8 mac[EAP_PAX_MAC_LEN], icvbuf[EAP_PAX_ICV_LEN]; local 397 (u8 *) data->cid, data->cid_len, mac); 398 if (os_memcmp(mac, pos, EAP_PAX_MAC_LEN) != 0) { 402 mac, EAP_PAX_MAC_LEN);
|
eap_server_psk.c | 220 u8 *pos, mac[EAP_PSK_MAC_LEN], *buf; local 312 if (omac1_aes_128(data->ak, buf, buflen, mac)) { 319 if (os_memcmp(mac, resp->mac_p, EAP_PSK_MAC_LEN) != 0) { 322 mac, EAP_PSK_MAC_LEN);
|
eap_server_peap.c | 399 u8 *mac; local 438 mac = wpabuf_put(buf, 20); /* Compound_MAC */ 445 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac); 447 mac, SHA1_MAC_LEN); 597 u8 buf[61], mac[SHA1_MAC_LEN]; local 627 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac); 629 if (os_memcmp(mac, pos, SHA1_MAC_LEN) != 0) { [all...] |
/frameworks/base/packages/DefaultContainerService/src/com/android/defcontainer/ |
DefaultContainerService.java | 63 import javax.crypto.Mac; 516 private Mac getMacInstance(ContainerEncryptionParams encryptionParams) throws IOException { 517 final Mac m; 522 m = Mac.getInstance(macAlgo); 565 final Mac mac = getMacInstance(encryptionParams); local 566 if (mac != null) { 576 * that into our MAC first. 588 mac.update(authenticatedData, 0, authenticatedLength); 613 mAuthenticatedStream = new MacAuthenticatedInputStream(inStream, mac); [all...] |
/hardware/ti/wlan/wl1271/TWD/Ctrl/ |
CmdBldCmdIE.c | 51 #define MAC_TO_VENDOR_PREAMBLE(mac) ((mac[0] << 16) | (mac[1] << 8) | mac[2]) [all...] |
/external/chromium/base/ |
shared_memory_unittest.cc | 6 #include "base/mac/scoped_nsautorelease_pool.h" 37 mac::ScopedNSAutoreleasePool pool; // noop if not OSX 340 mac::ScopedNSAutoreleasePool pool; // noop if not OSX
|
/external/chromium/net/base/ |
ssl_cipher_suite_names.cc | 14 // and mac. For all the ciphersuites in the IANA registry, we extract each of 21 // <3 bits> mac 332 const int mac = cs->encoded & 0x7; local 336 *mac_str = kMacNames[mac].name;
|
/external/dnsmasq/src/ |
util.c | 453 char *print_mac(char *buff, unsigned char *mac, int len) 462 p += sprintf(p, "%.2x%s", mac[i], (i == len - 1) ? "" : ":");
|
rfc2131.c | 127 struct dhcp_mac *mac; local 269 /* find mac to use for logging and hashing */ 273 for (mac = daemon->dhcp_macs; mac; mac = mac->next) 274 if (mac->hwaddr_len == mess->hlen && 275 (mac->hwaddr_type == mess->htype || mac->hwaddr_type == 0) && 276 memcmp_masked(mac->hwaddr, mess->chaddr, mess->hlen, mac->mask) 904 unsigned char *mac = extended_hwaddr(ltmp->hwaddr_type, ltmp->hwaddr_len, local [all...] |
/external/v8/tools/ |
tickprocessor-driver.js | 43 'mac': MacCppEntriesProvider
|
/ndk/sources/host-tools/sed-4.2.1/testsuite/ |
mac-mf.good | 1 ## config:mac-pre.in 81 WHAT = mac 107 # mac-mf.sed into xxx.c.o 147 # FIXME ? This won't work for srcdir != objdir. But on the Mac, there
|
mac-mf.inp | 1 ## config/mac-pre.in 81 WHAT = mac 107 # mac-mf.sed into xxx.c.o. 147 # FIXME: This won't work for srcdir != objdir. But on the Mac, there
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JDKKeyStore.java | 844 // Finalise our mac calculation 845 byte[] mac = new byte[hMac.getMacSize()]; 846 hMac.doFinal(mac, 0); 849 // Read the original mac from the stream 853 if (!Arrays.constantTimeAreEqual(mac, oldMac)) 864 // Parse the original mac from the stream too 903 byte[] mac = new byte[hMac.getMacSize()]; 905 hMac.doFinal(mac, 0); 907 dOut.write(mac);
|
/external/openssl/ssl/ |
s3_pkt.c | 297 unsigned char *mac = NULL; local 412 /* We now have - encrypted [ MAC [ compressed [ plain ] ] ] 436 * the MAC computation anyway. */ 446 /* r->length is now the compressed data plus mac */ 468 /* check the MAC for rr->input (it's in mac_size bytes at the tail) */ 472 mac = &rr->data[rr->length]; 476 /* record (minus padding) is too short to contain a MAC */ 486 i=s->method->ssl3_enc->mac(s,md,0); 487 if (i < 0 || mac == NULL || memcmp(md, mac, (size_t)mac_size) != 0 [all...] |
s2_pkt.c | 130 unsigned char mac[MAX_MAC_SIZE]; local 270 ssl2_mac(s,mac,0); 272 if ( (memcmp(mac,s->s2->mac_data, 531 /* set mac_size to mac size */ 601 /* mac_size is the number of MAC bytes
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sim.c | 583 if (!attr->mac || !attr->rand) { 586 !attr->mac ? " AT_MAC" : "", 645 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, 728 if (attr->mac == NULL) { 734 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, (u8 *) "", 0)) 804 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, (u8 *) "", 0))
|
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 259 sess.mac = 0; 296 sess.mac = digests[i].id; 387 cryp.mac = 0; 695 sess->mac = digest; 745 cryp.mac = (caddr_t) state->digest_res; 775 cryp.mac = (caddr_t)md; 840 sess->mac = digest; [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_upnp.c | 779 * @from_mac_addr: Source (Enrollee) MAC address for the event 795 const u8 *mac = from_mac_addr; local 815 os_snprintf(mac_text, sizeof(mac_text), MACSTR, MAC2STR(mac)); 893 * @mac: Buffer for returning MAC address 897 u8 mac[ETH_ALEN]) 930 os_memcpy(mac, req.ifr_addr.sa_data, 6); 932 if (eth_get(net_if, mac) < 0) { 933 wpa_printf(MSG_ERROR, "WPS UPnP: Failed to get MAC address"); 937 #error MAC address fetch not implemente [all...] |
/external/chromium/testing/gtest/test/ |
gtest-filepath_test.cc | 631 FilePath mac("mac"); 632 mac.Set(apple); // Implement Set() since overloading operator= is forbidden. 633 EXPECT_STREQ("apple", mac.c_str());
|
/external/gtest/test/ |
gtest-filepath_test.cc | 635 FilePath mac("mac"); 636 mac.Set(apple); // Implement Set() since overloading operator= is forbidden. 637 EXPECT_STREQ("apple", mac.c_str());
|