HomeSort by relevance Sort by last modified time
    Searched defs:mac (Results 126 - 150 of 245) sorted by null

1 2 3 4 56 7 8 910

  /prebuilts/ndk/9/platforms/android-5/arch-arm/usr/include/linux/netfilter_ipv4/
ipt_ULOG.h 44 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
  /prebuilts/ndk/9/platforms/android-8/arch-arm/usr/include/linux/netfilter_ipv4/
ipt_ULOG.h 44 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
  /prebuilts/ndk/9/platforms/android-9/arch-arm/usr/include/linux/netfilter_ipv4/
ipt_ULOG.h 44 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
  /prebuilts/ndk/9/platforms/android-9/arch-mips/usr/include/linux/netfilter_ipv4/
ipt_ULOG.h 44 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
  /prebuilts/ndk/9/platforms/android-9/arch-x86/usr/include/linux/netfilter_ipv4/
ipt_ULOG.h 44 unsigned char mac[ULOG_MAC_LEN]; member in struct:ulog_packet_msg
  /build/tools/droiddoc/templates-pdk/assets/
android-developer-reference.js 401 * - Listen for Ctrl+F (Cmd on Mac) and expand all inherited members (to aid page search)
404 var mac = agent.indexOf("macintosh") != -1; variable
407 var control = mac ? e.metaKey && !e.ctrlKey : e.ctrlKey; // get ctrl key
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/
CBCBlockCipherMac.java 5 import org.bouncycastle.crypto.Mac;
10 * standard CBC Block Cipher MAC - if no padding is specified the default of
14 implements Mac
16 private byte[] mac; field in class:CBCBlockCipherMac
26 * create a standard MAC based on a CBC block cipher. This will produce an
29 * @param cipher the cipher to be used as the basis of the MAC generation.
38 * create a standard MAC based on a CBC block cipher. This will produce an
41 * @param cipher the cipher to be used as the basis of the MAC generation.
52 * create a standard MAC based on a block cipher with the size of the
53 * MAC been given in bits. This class uses CBC mode as the basis for th
    [all...]
  /external/chromium/chrome/browser/safe_browsing/
protocol_parser.cc 200 // Verify that the MAC of the remainer of this chunk is what we expect.
212 // The redirect command is of the form: u:<url>,<mac> where <url> can
216 // is the MAC (if the MAC was requested).
217 std::string mac; local
223 mac = redirect_url.substr(mac_pos + 1);
231 chunk_url.mac = mac;
255 const std::string& mac,
262 !safe_browsing_util::VerifyMAC(key, mac, data, length))
    [all...]
  /external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/layout_tests/port/
chromium_port_testcase.py 38 import mac namespace
91 class TestMacPort(mac.MacPort):
94 mac.MacPort.__init__(self, MockSystemHost(os_name='mac', os_version='leopard'), 'mac-leopard', options=options)
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
e_rc4_hmac_md5.c 172 unsigned char mac[MD5_DIGEST_LENGTH]; local
203 MD5_Final(mac,&key->md);
205 MD5_Update(&key->md,mac,MD5_DIGEST_LENGTH);
206 MD5_Final(mac,&key->md);
208 if (memcmp(out+plen,mac,MD5_DIGEST_LENGTH))
e_aes_cbc_hmac_sha1.c 247 unsigned char c[32+SHA_DIGEST_LENGTH]; } mac, *pmac; local
250 pmac = (void *)(((size_t)mac.c+31)&((size_t)0-32));
294 len -= SHA_DIGEST_LENGTH; /* amend mac */
309 mac.c[0] = 0;
310 mac.c[1] = (unsigned char)(bitlen>>16);
311 mac.c[2] = (unsigned char)(bitlen>>8);
312 mac.c[3] = (unsigned char)bitlen;
313 bitlen = mac.u[0];
  /external/chromium_org/tools/emacs/
trybot.el 11 ; M-x trybot-test-win or M-x trybot-test-mac
72 "Fix up Mac/Linux output."
90 ((eq type-hint 'mac) (trybot-fixup-maclin))
120 ((eq type-hint 'mac)
122 "build/sanitize-mac-build-log.sh"))))))
145 (defun trybot-test-mac ()
146 "Load the Mac test data and do the trybot parse on it."
148 (trybot-test 'mac "trybot-mac.txt"))
170 ((string-match "/mac/" url) 'mac
    [all...]
  /external/dnsmasq/src/
dbus.c 398 char *action_str, *addr, *mac = daemon->namebuff; local
410 print_mac(mac, p, i);
429 dbus_message_iter_append_basic(&args, DBUS_TYPE_STRING, &mac) &&
  /external/openssl/crypto/evp/
e_rc4_hmac_md5.c 172 unsigned char mac[MD5_DIGEST_LENGTH]; local
203 MD5_Final(mac,&key->md);
205 MD5_Update(&key->md,mac,MD5_DIGEST_LENGTH);
206 MD5_Final(mac,&key->md);
208 if (memcmp(out+plen,mac,MD5_DIGEST_LENGTH))
e_aes_cbc_hmac_sha1.c 247 unsigned char c[32+SHA_DIGEST_LENGTH]; } mac, *pmac; local
250 pmac = (void *)(((size_t)mac.c+31)&((size_t)0-32));
294 len -= SHA_DIGEST_LENGTH; /* amend mac */
309 mac.c[0] = 0;
310 mac.c[1] = (unsigned char)(bitlen>>16);
311 mac.c[2] = (unsigned char)(bitlen>>8);
312 mac.c[3] = (unsigned char)bitlen;
313 bitlen = mac.u[0];
  /external/ppp/pppd/plugins/rp-pppoe/
plugin.c 133 unsigned int mac[ETH_ALEN]; local
136 &ses, &mac[0], &mac[1], &mac[2],
137 &mac[3], &mac[4], &mac[5]) != 7) {
142 conn->peerEth[i] = (unsigned char) mac[i];
  /libcore/luni/src/main/java/javax/crypto/
Mac.java 34 * (MAC) algorithms.
36 public class Mac implements Cloneable {
39 private static final Engine ENGINE = new Engine("Mac");
50 // Store Mac state (initialized or not initialized)
54 * Creates a new {@code Mac} instance.
61 * the name of the MAC algorithm.
63 protected Mac(MacSpi macSpi, Provider provider, String algorithm) {
71 * Returns the name of the MAC algorithm.
73 * @return the name of the MAC algorithm.
80 * Returns the provider of this {@code Mac} instance
419 Mac mac = new Mac(newSpiImpl, this.provider, this.algorithm); local
    [all...]
  /frameworks/base/packages/DefaultContainerService/src/com/android/defcontainer/
DefaultContainerService.java 67 import javax.crypto.Mac;
548 private Mac getMacInstance(ContainerEncryptionParams encryptionParams) throws IOException {
549 final Mac m;
554 m = Mac.getInstance(macAlgo);
597 final Mac mac = getMacInstance(encryptionParams); local
598 if (mac != null) {
608 * that into our MAC first.
620 mac.update(authenticatedData, 0, authenticatedLength);
645 mAuthenticatedStream = new MacAuthenticatedInputStream(inStream, mac);
    [all...]
  /external/chromium_org/chrome/browser/ui/website_settings/
website_settings.cc 426 const char *key_exchange, *cipher, *mac; local
429 &key_exchange, &cipher, &mac, &is_aead, cipher_suite);
439 ASCIIToUTF16(cipher), ASCIIToUTF16(mac), ASCIIToUTF16(key_exchange));
  /external/chromium_org/content/browser/geolocation/
wifi_data_provider_linux.cc 260 { // Read the mac address
266 std::string mac; local
267 if (!reader.PopVariantOfString(&mac)) {
273 ReplaceSubstringsAfterOffset(&mac, 0U, ":", std::string());
275 if (!base::HexStringToBytes(mac, &mac_bytes) || mac_bytes.size() != 6) {
276 LOG(WARNING) << "Can't parse mac address (found " << mac_bytes.size()
277 << " bytes) so using raw string: " << mac;
278 access_point_data.mac_address = UTF8ToUTF16(mac);
319 << "MAC: " << access_point_data.mac_address << ", "
  /external/chromium_org/third_party/openssl/openssl/ssl/
s3_pkt.c 388 /* We now have - encrypted [ MAC [ compressed [ plain ] ] ]
420 /* r->length is now the compressed data plus mac */
426 unsigned char *mac = NULL; local
435 * removed. This is public information, as is the MAC in use,
437 * amount of time if it's too short to possibly contain a MAC.
453 * the MAC in constant time from within the record,
456 mac = mac_tmp;
466 mac = &rr->data[rr->length];
469 i=s->method->ssl3_enc->mac(s,md,0 /* not send */);
470 if (i < 0 || mac == NULL || CRYPTO_memcmp(md, mac, (size_t)mac_size) != 0
    [all...]
  /external/openssl/ssl/
s3_pkt.c 388 /* We now have - encrypted [ MAC [ compressed [ plain ] ] ]
420 /* r->length is now the compressed data plus mac */
426 unsigned char *mac = NULL; local
435 * removed. This is public information, as is the MAC in use,
437 * amount of time if it's too short to possibly contain a MAC.
453 * the MAC in constant time from within the record,
456 mac = mac_tmp;
466 mac = &rr->data[rr->length];
469 i=s->method->ssl3_enc->mac(s,md,0 /* not send */);
470 if (i < 0 || mac == NULL || CRYPTO_memcmp(md, mac, (size_t)mac_size) != 0
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_eke_common.h 32 /* Keyed Message Digest (MAC) Registry */
66 u8 mac; member in struct:eap_eke_session
82 u8 prf, u8 mac);
eap_sim_common.c 166 const u8 *mac, const u8 *extra, size_t extra_len)
173 if (mac == NULL || wpabuf_len(req) < EAP_SIM_MAC_LEN ||
174 mac < wpabuf_head_u8(req) ||
175 mac > wpabuf_head_u8(req) + wpabuf_len(req) - EAP_SIM_MAC_LEN)
189 os_memset(tmp + (mac - wpabuf_head_u8(req)), 0, EAP_SIM_MAC_LEN);
190 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg",
192 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data",
194 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut",
197 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC",
974 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_pax.c 237 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local
280 (u8 *) data->cid, data->cid_len, NULL, 0, mac);
281 if (os_memcmp(pos, mac, EAP_PAX_MAC_LEN) != 0) {
285 mac, EAP_PAX_MAC_LEN);
353 wpa_printf(MSG_INFO, "EAP-PAX: MAC ID changed during "
379 wpa_printf(MSG_INFO, "EAP-PAX: Unsupported MAC ID 0x%x",

Completed in 2072 milliseconds

1 2 3 4 56 7 8 910