HomeSort by relevance Sort by last modified time
    Searched defs:mac (Results 151 - 175 of 245) sorted by null

1 2 3 4 5 67 8 910

  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 187 u8 mac[EAP_PSK_MAC_LEN]; local
235 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
240 if (os_memcmp(mac, hdr3->mac_s, EAP_PSK_MAC_LEN) != 0) {
eap_peap.c 305 u8 *mac; local
328 mac = wpabuf_put(buf, 20); /* Compound_MAC */
334 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac);
335 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC", mac, SHA1_MAC_LEN);
389 u8 buf[61], mac[SHA1_MAC_LEN]; local
427 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac);
429 if (os_memcmp(mac, pos, SHA1_MAC_LEN) != 0) {
432 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received MAC",
434 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Expected MAC",
435 mac, SHA1_MAC_LEN)
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 230 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected MAC ID 0x%x, "
288 u8 mac[EAP_PAX_MAC_LEN], icvbuf[EAP_PAX_ICV_LEN]; local
397 (u8 *) data->cid, data->cid_len, mac);
398 if (os_memcmp(mac, pos, EAP_PAX_MAC_LEN) != 0) {
402 mac, EAP_PAX_MAC_LEN);
eap_server_psk.c 218 u8 *pos, mac[EAP_PSK_MAC_LEN], *buf; local
310 if (omac1_aes_128(data->ak, buf, buflen, mac)) {
317 if (os_memcmp(mac, resp->mac_p, EAP_PSK_MAC_LEN) != 0) {
320 mac, EAP_PSK_MAC_LEN);
  /external/chromium/chrome/browser/safe_browsing/
safe_browsing_util.h 26 // Container for holding a chunk URL and the MAC of the contents of the URL.
29 std::string mac; member in struct:ChunkUrl
313 // Returns 'true' if 'mac' can be verified using 'key' and 'data'.
315 const std::string& mac,
  /external/chromium_org/third_party/openssl/openssl/ssl/
d1_pkt.c 199 /* Set proper sequence number for mac calculation */
400 /* We now have - encrypted [ MAC [ compressed [ plain ] ] ]
433 /* r->length is now the compressed data plus mac */
439 unsigned char *mac = NULL; local
448 * removed. This is public information, as is the MAC in use,
450 * amount of time if it's too short to possibly contain a MAC.
466 * the MAC in constant time from within the record,
469 mac = mac_tmp;
479 mac = &rr->data[rr->length];
482 i=s->method->ssl3_enc->mac(s,md,0 /* not send */)
    [all...]
  /external/openssh/
kex.h 82 typedef struct Mac Mac;
96 struct Mac {
114 Mac mac; member in struct:Newkeys
monitor_wrap.c 57 #include "mac.h"
59 #ifdef TARGET_OS_MAC /* XXX Broken krb5 headers on Mac */
475 Mac *mac; local
487 mac = &newkey->mac;
505 /* Mac structure */
506 mac->name = buffer_get_string(&b, NULL);
507 if (mac->name == NULL || mac_setup(mac, mac->name) == -1
534 Mac *mac; local
    [all...]
  /external/openssl/ssl/
d1_pkt.c 199 /* Set proper sequence number for mac calculation */
400 /* We now have - encrypted [ MAC [ compressed [ plain ] ] ]
433 /* r->length is now the compressed data plus mac */
439 unsigned char *mac = NULL; local
448 * removed. This is public information, as is the MAC in use,
450 * amount of time if it's too short to possibly contain a MAC.
466 * the MAC in constant time from within the record,
469 mac = mac_tmp;
479 mac = &rr->data[rr->length];
482 i=s->method->ssl3_enc->mac(s,md,0 /* not send */)
    [all...]
  /bionic/libc/kernel/common/linux/
skbuff.h 134 } mac; member in struct:sk_buff
  /development/ndk/platforms/android-3/include/linux/
skbuff.h 132 } mac; member in struct:sk_buff
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
pkcs12.h 107 PKCS12_MAC_DATA *mac; member in struct:__anon15605
167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0)
226 unsigned char *mac, unsigned int *maclen);
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
pkcs12.h 107 PKCS12_MAC_DATA *mac; member in struct:__anon15648
167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0)
226 unsigned char *mac, unsigned int *maclen);
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/
KexManager.java 19 import ch.ethz.ssh2.crypto.digest.MAC;
267 int mac_cs_key_len = MAC.getKeyLen(kxs.np.mac_algo_client_to_server);
271 int mac_sc_key_len = MAC.getKeyLen(kxs.np.mac_algo_server_to_client);
298 MAC mac; local
305 mac = new MAC(kxs.np.mac_algo_client_to_server, km.integrity_key_client_to_server);
310 throw new IOException("Fatal error during MAC startup!");
313 tm.changeSendCipher(cbc, mac);
479 MAC mac local
    [all...]
  /external/openssl/crypto/pkcs12/
pkcs12.h 107 PKCS12_MAC_DATA *mac; member in struct:__anon26074
167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0)
226 unsigned char *mac, unsigned int *maclen);
  /external/openssl/include/openssl/
pkcs12.h 107 PKCS12_MAC_DATA *mac; member in struct:__anon26117
167 #define PKCS12_mac_present(p12) ((p12)->mac ? 1 : 0)
226 unsigned char *mac, unsigned int *maclen);
  /external/wpa_supplicant_8/src/ap/
ieee802_11.c 396 u8 mac[SHA256_MAC_LEN]; local
401 addr, ETH_ALEN, mac) < 0 ||
402 os_memcmp(token, mac, SHA256_MAC_LEN) != 0)
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_upnp.c 779 * @from_mac_addr: Source (Enrollee) MAC address for the event
795 const u8 *mac = from_mac_addr; local
815 os_snprintf(mac_text, sizeof(mac_text), MACSTR, MAC2STR(mac));
893 * @mac: Buffer for returning MAC address
897 u8 mac[ETH_ALEN])
930 os_memcpy(mac, req.ifr_addr.sa_data, 6);
932 if (eth_get(net_if, mac) < 0) {
933 wpa_printf(MSG_ERROR, "WPS UPnP: Failed to get MAC address");
937 #error MAC address fetch not implemente
    [all...]
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
eapol.h 189 uint8 mac[ETHER_ADDR_LEN]; member in struct:__anon32687
  /prebuilts/ndk/4/platforms/android-3/arch-arm/usr/include/linux/
skbuff.h 132 } mac; member in struct:sk_buff
  /prebuilts/ndk/4/platforms/android-4/arch-arm/usr/include/linux/
skbuff.h 132 } mac; member in struct:sk_buff
  /prebuilts/ndk/4/platforms/android-5/arch-arm/usr/include/linux/
skbuff.h 132 } mac; member in struct:sk_buff
  /prebuilts/ndk/4/platforms/android-5/arch-x86/usr/include/linux/
skbuff.h 132 } mac; member in struct:sk_buff
  /prebuilts/ndk/4/platforms/android-8/arch-arm/usr/include/linux/
skbuff.h 132 } mac; member in struct:sk_buff
  /prebuilts/ndk/4/platforms/android-8/arch-x86/usr/include/linux/
skbuff.h 132 } mac; member in struct:sk_buff

Completed in 690 milliseconds

1 2 3 4 5 67 8 910