/external/syslinux/gpxe/src/drivers/net/phantom/ |
nxhal_nic_interface.h | 204 char mac[6]; member in struct:nx_rx_rule_arg_s::__anon37919::__anon37920 207 char mac[6]; member in struct:nx_rx_rule_arg_s::__anon37919::__anon37921 211 char mac[6]; member in struct:nx_rx_rule_arg_s::__anon37919::__anon37922 214 char mac[6]; member in struct:nx_rx_rule_arg_s::__anon37919::__anon37923
|
/external/wpa_supplicant_8/src/crypto/ |
aes-siv.c | 65 size_t num_elem, const u8 *addr[], size_t *len, u8 *mac) 79 return omac1_aes_vector(key, key_len, 1, data, data_len, mac); 104 ret = omac1_aes_vector(key, key_len, 1, data, &len[i], mac); 115 return omac1_aes_vector(key, key_len, 1, data, data_len, mac);
|
/libcore/luni/src/test/java/libcore/java/net/ |
NetworkInterfaceTest.java | 141 byte[] mac = nif.getHardwareAddress(); 142 if (mac != null) { 144 for (int i = 0; i < mac.length; ++i) { 148 flags += String.format("%02x", mac[i]);
|
/libcore/ojluni/src/main/java/javax/crypto/ |
Mac.java | 42 * (MAC) algorithm. 44 * <p> A MAC provides a way to check 51 * <p> A MAC mechanism that is based on cryptographic hash functions is 56 * <p> Android provides the following <code>Mac</code> algorithms: 145 * <a href="{@docRoot}openjdk-redirect.html?v=8&path=/technotes/guides/security/StandardNames.html#Mac"> 146 * Mac section</a> of the 154 public class Mac implements Cloneable { 159 Debug.getInstance("jca", "Mac"); 164 Debug.isOn("engine=") && !Debug.isOn("mac"); 173 // The name of the MAC algorithm [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
virtio_net.h | 36 #define VIRTIO_NET_F_MAC 5 /* Host has given MAC address. */ 56 /* The config defining mac address (if VIRTIO_NET_F_MAC) */ 57 __u8 mac[6]; member in struct:virtio_net_config 120 * Control the MAC filter table. 122 * The MAC filter table is managed by the hypervisor, the guest should 129 * by a concatenated byte stream of the ETH_ALEN MAC addresses. The
|
/system/connectivity/wificond/ |
client_interface_binder.h | 50 const ::std::vector<uint8_t>& mac, bool* success) override;
|
/system/security/keystore/ |
operation_struct.h | 44 bool hasAuthToken() const { return authToken.mac.size() != 0; }
|
/external/boringssl/src/crypto/cipher_extra/ |
e_ssl3.c | 182 // Compute the MAC. This must be first in case the operation is being done 184 uint8_t mac[EVP_MAX_MD_SIZE]; local 186 if (!ssl3_mac(ssl3_ctx, mac, &mac_len, ad, ad_len, in, in_len)) { 199 // Feed the MAC into the cipher in two steps. First complete the final partial 208 if (!EVP_EncryptUpdate(&ssl3_ctx->cipher_ctx, buf, &buf_len, mac, 219 mac + tag_len, mac_len - tag_len)) { 270 // This requires that the caller provide space for the MAC, even though it 292 // Decrypt to get the plaintext + MAC + padding. 305 // Remove CBC padding and MAC. This would normally be timing-sensitive, but 325 // Compute the MAC and compare against the one in the record 326 uint8_t mac[EVP_MAX_MD_SIZE]; local [all...] |
/system/tpm/attestation/common/ |
crypto_utility_impl.cc | 145 std::string mac = local 147 if (mac.length() != encrypted_pb.mac().length()) { 151 if (!crypto::SecureMemEqual(mac.data(), encrypted_pb.mac().data(), 152 mac.length())) { 412 unsigned char mac[SHA512_DIGEST_LENGTH]; local 415 HMAC(EVP_sha512(), key.data(), key.size(), data_buffer, data.size(), mac, local 417 return std::string(std::begin(mac), std::end(mac)); [all...] |
/external/tcpdump/ |
print-mptcp.c | 92 uint8_t mac[8]; member in struct:mp_join::__anon38603::__anon38605 96 uint8_t mac[20]; member in struct:mp_join::__anon38603::__anon38606 224 EXTRACT_64BITS(mpj->u.synack.mac), 230 for (i = 0; i < sizeof(mpj->u.ack.mac); ++i) 231 ND_PRINT((ndo, "%02x", mpj->u.ack.mac[i]));
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
p2p.h | 143 uint8 mac[6]; /* P2P group bssid */ member in struct:wifi_p2p_grp_bssid_se_s 151 uint8 mac[6]; /* P2P device address */ member in struct:wifi_p2p_grp_id_se_s 160 uint8 mac[6]; /* P2P device address */ member in struct:wifi_p2p_intf_se_s 217 uint8 mac[6]; /* intended P2P interface MAC address */ member in struct:wifi_p2p_intintad_se_s 264 uint8 mac[6]; /* P2P Device MAC address */ member in struct:wifi_p2p_devinfo_se_s 288 struct ether_addr addr; /* P2P Device MAC address */
|
/external/boringssl/src/ssl/test/runner/ |
cipher_suites.go | 74 // A cipherSuite is a specific combination of key agreement, cipher and MAC 86 mac func(version uint16, macKey []byte) macFunction 179 mac := ssl30MAC{ 183 copy(mac.key, key) 184 return mac 191 mac := ssl30MAC{ 195 copy(mac.key, key) 196 return mac 203 mac := ssl30MAC{ 207 copy(mac.key, key [all...] |
/cts/tests/tests/net/src/android/net/wifi/aware/cts/ |
SingleDeviceTest.java | 149 public void onIdentityChanged(byte[] mac) { 150 mMac = mac; 167 * Returns the MAC address of the discovery interface supplied to the triggered callback. 466 * information to validate that MAC address changes on every attach. 470 * MAC address being generated. 491 byte[] mac = identityL.getMac(); 492 assertNotNull("Wi-Fi Aware discovery MAC: iteration " + i, mac); 496 macs.add(new TestUtils.MacWrapper(mac)); 704 * Request an Aware data-path (open) as a Responder with an arbitrary peer MAC address. Validat 711 MacAddress mac = MacAddress.fromString("00:01:02:03:04:05"); local 740 MacAddress mac = MacAddress.fromString("00:01:02:03:04:05"); local [all...] |
/external/iptables/iptables/ |
nft-bridge.c | 41 * 2: always print 2 digits, a printed mac address 46 static void ebt_print_mac(const unsigned char *mac) 51 printf("%02x%s", mac[j], 54 printf("%s", ether_ntoa((struct ether_addr *) mac)); 57 /* Put the mac address into 6 (ETH_ALEN) bytes returns 0 on success. */ 58 static void ebt_print_mac_and_mask(const unsigned char *mac, const unsigned char *mask) 62 if (!memcmp(mac, eb_mac_type_unicast, 6) && 65 else if (!memcmp(mac, eb_mac_type_multicast, 6) && 68 else if (!memcmp(mac, eb_mac_type_broadcast, 6) && 71 else if (!memcmp(mac, eb_mac_type_bridge_group, 6) & [all...] |
/external/python/cpython2/Lib/ |
uuid.py | 326 mac = int(word.replace(':', ''), 16) 327 if mac: 328 return mac 331 # VPNs, do not have a colon-delimited MAC address 334 # real MAC address 343 mac = _find_mac('ifconfig', args, ['hwaddr', 'ether'], lambda i: i+1) 344 if mac: 345 return mac 355 # Try getting the MAC addr from arp based on our IP address (Solaris). 381 mac = int(word.replace(':', ''), 16 [all...] |
/frameworks/base/tests/net/java/com/android/server/connectivity/ |
IpConnectivityMetricsTest.java | 357 final byte[] mac = {0x48, 0x7c, 0x2b, 0x6a, 0x3e, 0x4b}; 366 wakeupEvent("wlan0", 1000, v4, tcp, mac, srcIp, dstIp, sport, dport, 1001L); 367 wakeupEvent("wlan0", 10123, v4, tcp, mac, srcIp, dstIp, sport, dport, 1001L); 368 wakeupEvent("wlan0", 1000, v4, udp, mac, srcIp, dstIp, sport, dport, 1001L); 369 wakeupEvent("wlan0", 10008, v4, udp, mac, srcIp, dstIp, sport, dport, 1001L); 370 wakeupEvent("wlan0", -1, v4, udp, mac, srcIp, dstIp, sport, dport, 1001L); 371 wakeupEvent("wlan0", 10008, v4, tcp, mac, srcIp, dstIp, sport, dport, 1001L); 623 void wakeupEvent(String iface, int uid, int ether, int ip, byte[] mac, String srcIp, 626 mNetdListener.onWakeupEvent(prefix, uid, ether, ip, mac, srcIp, dstIp, sport, dport, now);
|
/external/boringssl/src/crypto/poly1305/ |
poly1305.c | 246 void CRYPTO_poly1305_finish(poly1305_state *statep, uint8_t mac[16]) { 254 CRYPTO_poly1305_finish_neon(statep, mac); 309 U32TO8_LE(&mac[0], f0); 311 U32TO8_LE(&mac[4], f1); 313 U32TO8_LE(&mac[8], f2); 315 U32TO8_LE(&mac[12], f3);
|
/external/iw/ |
wowlan.c | 65 char *mac; local 72 mac = strchr(port, '@'); 73 if (!mac) 75 *mac = 0; 76 mac++; 83 if (mac_addr_a2n(macbuf, mac)) 327 " dest=ip:port@mac\n"
|
/external/libxml2/vms/ |
build_libxml.com | 22 $! : 13 October 2003 Craig Berry (craigberry@mac.com) 24 $! : 25 April 2003 Craig Berry (craigberry@mac.com) 26 $! : 28 September 2002 Craig Berry (craigberry@mac.com)
|
/frameworks/av/media/libaudiohal/2.0/ |
DeviceHalHidl.cpp | 65 &address->address.mac[0], &address->address.mac[1], &address->address.mac[2], 66 &address->address.mac[3], &address->address.mac[4], &address->address.mac[5]);
|
/frameworks/av/media/libaudiohal/4.0/ |
DeviceHalHidl.cpp | 71 &address->address.mac[0], &address->address.mac[1], &address->address.mac[2], 72 &address->address.mac[3], &address->address.mac[4], &address->address.mac[5]);
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
SecureBox.java | 48 import javax.crypto.Mac; 303 Mac mac = Mac.getInstance(MAC_ALG); local 305 mac.init(new SecretKeySpec(salt, MAC_ALG)); 310 byte[] pseudorandomKey = mac.doFinal(secret); 313 mac.init(new SecretKeySpec(pseudorandomKey, MAC_ALG)); 318 mac.update(info); 320 byte[] hkdfOutput = mac.doFinal(CONSTANT_01);
|
/prebuilts/go/darwin-x86/src/crypto/hmac/ |
hmac.go | 16 mac := hmac.New(sha256.New, key) 17 mac.Write(message) 18 expectedMAC := mac.Sum(nil)
|
/prebuilts/go/linux-x86/src/crypto/hmac/ |
hmac.go | 16 mac := hmac.New(sha256.New, key) 17 mac.Write(message) 18 expectedMAC := mac.Sum(nil)
|
/system/connectivity/wificond/tests/ |
nl80211_packet_unittest.cpp | 246 std::vector<uint8_t> mac; local 247 EXPECT_TRUE(netlink_packet.GetAttributeValue(NL80211_ATTR_MAC, &mac)); 251 EXPECT_EQ(expected_mac, mac); 268 std::vector<uint8_t> mac; local 269 EXPECT_TRUE(netlink_packet.GetAttributeValue(NL80211_ATTR_MAC, &mac)); 273 EXPECT_EQ(expected_mac, mac);
|