HomeSort by relevance Sort by last modified time
    Searched refs:mac (Results 226 - 250 of 339) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_pax.c 235 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected MAC ID 0x%x, "
293 u8 mac[EAP_PAX_MAC_LEN], icvbuf[EAP_PAX_ICV_LEN]; local
402 (u8 *) data->cid, data->cid_len, mac);
403 if (os_memcmp(mac, pos, EAP_PAX_MAC_LEN) != 0) {
407 mac, EAP_PAX_MAC_LEN);
eap_psk.c 223 u8 *pos, mac[EAP_PSK_MAC_LEN], *buf; local
315 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
322 if (os_memcmp(mac, resp->mac_p, EAP_PSK_MAC_LEN) != 0) {
325 mac, EAP_PSK_MAC_LEN);
eap_peap.c 398 u8 *mac; local
437 mac = wpabuf_put(buf, 20); /* Compound_MAC */
444 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac);
446 mac, SHA1_MAC_LEN);
596 u8 buf[61], mac[SHA1_MAC_LEN]; local
626 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac);
628 if (os_memcmp(mac, pos, SHA1_MAC_LEN) != 0) {
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_pax.c 237 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local
280 (u8 *) data->cid, data->cid_len, NULL, 0, mac);
281 if (os_memcmp(pos, mac, EAP_PAX_MAC_LEN) != 0) {
285 mac, EAP_PAX_MAC_LEN);
353 wpa_printf(MSG_INFO, "EAP-PAX: MAC ID changed during "
379 wpa_printf(MSG_INFO, "EAP-PAX: Unsupported MAC ID 0x%x",
eap_sim.c 596 if (!attr->mac || !attr->rand) {
599 !attr->mac ? " AT_MAC" : "",
658 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt,
741 if (attr->mac == NULL) {
747 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, (u8 *) "", 0))
817 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, (u8 *) "", 0))
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 230 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected MAC ID 0x%x, "
288 u8 mac[EAP_PAX_MAC_LEN], icvbuf[EAP_PAX_ICV_LEN]; local
397 (u8 *) data->cid, data->cid_len, mac);
398 if (os_memcmp(mac, pos, EAP_PAX_MAC_LEN) != 0) {
402 mac, EAP_PAX_MAC_LEN);
eap_server_psk.c 220 u8 *pos, mac[EAP_PSK_MAC_LEN], *buf; local
312 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
319 if (os_memcmp(mac, resp->mac_p, EAP_PSK_MAC_LEN) != 0) {
322 mac, EAP_PSK_MAC_LEN);
eap_server_peap.c 399 u8 *mac; local
438 mac = wpabuf_put(buf, 20); /* Compound_MAC */
445 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac);
447 mac, SHA1_MAC_LEN);
597 u8 buf[61], mac[SHA1_MAC_LEN]; local
627 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac);
629 if (os_memcmp(mac, pos, SHA1_MAC_LEN) != 0) {
    [all...]
  /frameworks/base/packages/DefaultContainerService/src/com/android/defcontainer/
DefaultContainerService.java 63 import javax.crypto.Mac;
516 private Mac getMacInstance(ContainerEncryptionParams encryptionParams) throws IOException {
517 final Mac m;
522 m = Mac.getInstance(macAlgo);
565 final Mac mac = getMacInstance(encryptionParams); local
566 if (mac != null) {
576 * that into our MAC first.
588 mac.update(authenticatedData, 0, authenticatedLength);
613 mAuthenticatedStream = new MacAuthenticatedInputStream(inStream, mac);
    [all...]
  /hardware/ti/wlan/wl1271/TWD/Ctrl/
CmdBldCmdIE.c 51 #define MAC_TO_VENDOR_PREAMBLE(mac) ((mac[0] << 16) | (mac[1] << 8) | mac[2])
    [all...]
  /external/chromium/base/
shared_memory_unittest.cc 6 #include "base/mac/scoped_nsautorelease_pool.h"
37 mac::ScopedNSAutoreleasePool pool; // noop if not OSX
340 mac::ScopedNSAutoreleasePool pool; // noop if not OSX
  /external/chromium/net/base/
ssl_cipher_suite_names.cc 14 // and mac. For all the ciphersuites in the IANA registry, we extract each of
21 // <3 bits> mac
332 const int mac = cs->encoded & 0x7; local
336 *mac_str = kMacNames[mac].name;
  /external/dnsmasq/src/
util.c 453 char *print_mac(char *buff, unsigned char *mac, int len)
462 p += sprintf(p, "%.2x%s", mac[i], (i == len - 1) ? "" : ":");
rfc2131.c 127 struct dhcp_mac *mac; local
269 /* find mac to use for logging and hashing */
273 for (mac = daemon->dhcp_macs; mac; mac = mac->next)
274 if (mac->hwaddr_len == mess->hlen &&
275 (mac->hwaddr_type == mess->htype || mac->hwaddr_type == 0) &&
276 memcmp_masked(mac->hwaddr, mess->chaddr, mess->hlen, mac->mask)
904 unsigned char *mac = extended_hwaddr(ltmp->hwaddr_type, ltmp->hwaddr_len, local
    [all...]
  /external/v8/tools/
tickprocessor-driver.js 43 'mac': MacCppEntriesProvider
  /ndk/sources/host-tools/sed-4.2.1/testsuite/
mac-mf.good 1 ## config:mac-pre.in
81 WHAT = mac
107 # mac-mf.sed into xxx.c.o
147 # FIXME ? This won't work for srcdir != objdir. But on the Mac, there
mac-mf.inp 1 ## config/mac-pre.in
81 WHAT = mac
107 # mac-mf.sed into xxx.c.o.
147 # FIXME: This won't work for srcdir != objdir. But on the Mac, there
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
JDKKeyStore.java 844 // Finalise our mac calculation
845 byte[] mac = new byte[hMac.getMacSize()];
846 hMac.doFinal(mac, 0);
849 // Read the original mac from the stream
853 if (!Arrays.constantTimeAreEqual(mac, oldMac))
864 // Parse the original mac from the stream too
903 byte[] mac = new byte[hMac.getMacSize()];
905 hMac.doFinal(mac, 0);
907 dOut.write(mac);
  /external/openssl/ssl/
s3_pkt.c 297 unsigned char *mac = NULL; local
412 /* We now have - encrypted [ MAC [ compressed [ plain ] ] ]
436 * the MAC computation anyway. */
446 /* r->length is now the compressed data plus mac */
468 /* check the MAC for rr->input (it's in mac_size bytes at the tail) */
472 mac = &rr->data[rr->length];
476 /* record (minus padding) is too short to contain a MAC */
486 i=s->method->ssl3_enc->mac(s,md,0);
487 if (i < 0 || mac == NULL || memcmp(md, mac, (size_t)mac_size) != 0
    [all...]
s2_pkt.c 130 unsigned char mac[MAX_MAC_SIZE]; local
270 ssl2_mac(s,mac,0);
272 if ( (memcmp(mac,s->s2->mac_data,
531 /* set mac_size to mac size */
601 /* mac_size is the number of MAC bytes
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sim.c 583 if (!attr->mac || !attr->rand) {
586 !attr->mac ? " AT_MAC" : "",
645 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt,
728 if (attr->mac == NULL) {
734 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, (u8 *) "", 0))
804 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, (u8 *) "", 0))
  /external/openssl/crypto/engine/
eng_cryptodev.c 259 sess.mac = 0;
296 sess.mac = digests[i].id;
387 cryp.mac = 0;
695 sess->mac = digest;
745 cryp.mac = (caddr_t) state->digest_res;
775 cryp.mac = (caddr_t)md;
840 sess->mac = digest;
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_upnp.c 779 * @from_mac_addr: Source (Enrollee) MAC address for the event
795 const u8 *mac = from_mac_addr; local
815 os_snprintf(mac_text, sizeof(mac_text), MACSTR, MAC2STR(mac));
893 * @mac: Buffer for returning MAC address
897 u8 mac[ETH_ALEN])
930 os_memcpy(mac, req.ifr_addr.sa_data, 6);
932 if (eth_get(net_if, mac) < 0) {
933 wpa_printf(MSG_ERROR, "WPS UPnP: Failed to get MAC address");
937 #error MAC address fetch not implemente
    [all...]
  /external/chromium/testing/gtest/test/
gtest-filepath_test.cc 631 FilePath mac("mac");
632 mac.Set(apple); // Implement Set() since overloading operator= is forbidden.
633 EXPECT_STREQ("apple", mac.c_str());
  /external/gtest/test/
gtest-filepath_test.cc 635 FilePath mac("mac");
636 mac.Set(apple); // Implement Set() since overloading operator= is forbidden.
637 EXPECT_STREQ("apple", mac.c_str());

Completed in 621 milliseconds

1 2 3 4 5 6 7 8 91011>>