HomeSort by relevance Sort by last modified time
    Searched refs:mac (Results 151 - 175 of 608) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/syslinux/gpxe/src/drivers/net/phantom/
nxhal_nic_interface.h 204 char mac[6]; member in struct:nx_rx_rule_arg_s::__anon37919::__anon37920
207 char mac[6]; member in struct:nx_rx_rule_arg_s::__anon37919::__anon37921
211 char mac[6]; member in struct:nx_rx_rule_arg_s::__anon37919::__anon37922
214 char mac[6]; member in struct:nx_rx_rule_arg_s::__anon37919::__anon37923
  /external/wpa_supplicant_8/src/crypto/
aes-siv.c 65 size_t num_elem, const u8 *addr[], size_t *len, u8 *mac)
79 return omac1_aes_vector(key, key_len, 1, data, data_len, mac);
104 ret = omac1_aes_vector(key, key_len, 1, data, &len[i], mac);
115 return omac1_aes_vector(key, key_len, 1, data, data_len, mac);
  /libcore/luni/src/test/java/libcore/java/net/
NetworkInterfaceTest.java 141 byte[] mac = nif.getHardwareAddress();
142 if (mac != null) {
144 for (int i = 0; i < mac.length; ++i) {
148 flags += String.format("%02x", mac[i]);
  /libcore/ojluni/src/main/java/javax/crypto/
Mac.java 42 * (MAC) algorithm.
44 * <p> A MAC provides a way to check
51 * <p> A MAC mechanism that is based on cryptographic hash functions is
56 * <p> Android provides the following <code>Mac</code> algorithms:
145 * <a href="{@docRoot}openjdk-redirect.html?v=8&path=/technotes/guides/security/StandardNames.html#Mac">
146 * Mac section</a> of the
154 public class Mac implements Cloneable {
159 Debug.getInstance("jca", "Mac");
164 Debug.isOn("engine=") && !Debug.isOn("mac");
173 // The name of the MAC algorithm
    [all...]
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/
virtio_net.h 36 #define VIRTIO_NET_F_MAC 5 /* Host has given MAC address. */
56 /* The config defining mac address (if VIRTIO_NET_F_MAC) */
57 __u8 mac[6]; member in struct:virtio_net_config
120 * Control the MAC filter table.
122 * The MAC filter table is managed by the hypervisor, the guest should
129 * by a concatenated byte stream of the ETH_ALEN MAC addresses. The
  /system/connectivity/wificond/
client_interface_binder.h 50 const ::std::vector<uint8_t>& mac, bool* success) override;
  /system/security/keystore/
operation_struct.h 44 bool hasAuthToken() const { return authToken.mac.size() != 0; }
  /external/boringssl/src/crypto/cipher_extra/
e_ssl3.c 182 // Compute the MAC. This must be first in case the operation is being done
184 uint8_t mac[EVP_MAX_MD_SIZE]; local
186 if (!ssl3_mac(ssl3_ctx, mac, &mac_len, ad, ad_len, in, in_len)) {
199 // Feed the MAC into the cipher in two steps. First complete the final partial
208 if (!EVP_EncryptUpdate(&ssl3_ctx->cipher_ctx, buf, &buf_len, mac,
219 mac + tag_len, mac_len - tag_len)) {
270 // This requires that the caller provide space for the MAC, even though it
292 // Decrypt to get the plaintext + MAC + padding.
305 // Remove CBC padding and MAC. This would normally be timing-sensitive, but
325 // Compute the MAC and compare against the one in the record
326 uint8_t mac[EVP_MAX_MD_SIZE]; local
    [all...]
  /system/tpm/attestation/common/
crypto_utility_impl.cc 145 std::string mac = local
147 if (mac.length() != encrypted_pb.mac().length()) {
151 if (!crypto::SecureMemEqual(mac.data(), encrypted_pb.mac().data(),
152 mac.length())) {
412 unsigned char mac[SHA512_DIGEST_LENGTH]; local
415 HMAC(EVP_sha512(), key.data(), key.size(), data_buffer, data.size(), mac, local
417 return std::string(std::begin(mac), std::end(mac));
    [all...]
  /external/tcpdump/
print-mptcp.c 92 uint8_t mac[8]; member in struct:mp_join::__anon38603::__anon38605
96 uint8_t mac[20]; member in struct:mp_join::__anon38603::__anon38606
224 EXTRACT_64BITS(mpj->u.synack.mac),
230 for (i = 0; i < sizeof(mpj->u.ack.mac); ++i)
231 ND_PRINT((ndo, "%02x", mpj->u.ack.mac[i]));
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
p2p.h 143 uint8 mac[6]; /* P2P group bssid */ member in struct:wifi_p2p_grp_bssid_se_s
151 uint8 mac[6]; /* P2P device address */ member in struct:wifi_p2p_grp_id_se_s
160 uint8 mac[6]; /* P2P device address */ member in struct:wifi_p2p_intf_se_s
217 uint8 mac[6]; /* intended P2P interface MAC address */ member in struct:wifi_p2p_intintad_se_s
264 uint8 mac[6]; /* P2P Device MAC address */ member in struct:wifi_p2p_devinfo_se_s
288 struct ether_addr addr; /* P2P Device MAC address */
  /external/boringssl/src/ssl/test/runner/
cipher_suites.go 74 // A cipherSuite is a specific combination of key agreement, cipher and MAC
86 mac func(version uint16, macKey []byte) macFunction
179 mac := ssl30MAC{
183 copy(mac.key, key)
184 return mac
191 mac := ssl30MAC{
195 copy(mac.key, key)
196 return mac
203 mac := ssl30MAC{
207 copy(mac.key, key
    [all...]
  /cts/tests/tests/net/src/android/net/wifi/aware/cts/
SingleDeviceTest.java 149 public void onIdentityChanged(byte[] mac) {
150 mMac = mac;
167 * Returns the MAC address of the discovery interface supplied to the triggered callback.
466 * information to validate that MAC address changes on every attach.
470 * MAC address being generated.
491 byte[] mac = identityL.getMac();
492 assertNotNull("Wi-Fi Aware discovery MAC: iteration " + i, mac);
496 macs.add(new TestUtils.MacWrapper(mac));
704 * Request an Aware data-path (open) as a Responder with an arbitrary peer MAC address. Validat
711 MacAddress mac = MacAddress.fromString("00:01:02:03:04:05"); local
740 MacAddress mac = MacAddress.fromString("00:01:02:03:04:05"); local
    [all...]
  /external/iptables/iptables/
nft-bridge.c 41 * 2: always print 2 digits, a printed mac address
46 static void ebt_print_mac(const unsigned char *mac)
51 printf("%02x%s", mac[j],
54 printf("%s", ether_ntoa((struct ether_addr *) mac));
57 /* Put the mac address into 6 (ETH_ALEN) bytes returns 0 on success. */
58 static void ebt_print_mac_and_mask(const unsigned char *mac, const unsigned char *mask)
62 if (!memcmp(mac, eb_mac_type_unicast, 6) &&
65 else if (!memcmp(mac, eb_mac_type_multicast, 6) &&
68 else if (!memcmp(mac, eb_mac_type_broadcast, 6) &&
71 else if (!memcmp(mac, eb_mac_type_bridge_group, 6) &
    [all...]
  /external/python/cpython2/Lib/
uuid.py 326 mac = int(word.replace(':', ''), 16)
327 if mac:
328 return mac
331 # VPNs, do not have a colon-delimited MAC address
334 # real MAC address
343 mac = _find_mac('ifconfig', args, ['hwaddr', 'ether'], lambda i: i+1)
344 if mac:
345 return mac
355 # Try getting the MAC addr from arp based on our IP address (Solaris).
381 mac = int(word.replace(':', ''), 16
    [all...]
  /frameworks/base/tests/net/java/com/android/server/connectivity/
IpConnectivityMetricsTest.java 357 final byte[] mac = {0x48, 0x7c, 0x2b, 0x6a, 0x3e, 0x4b};
366 wakeupEvent("wlan0", 1000, v4, tcp, mac, srcIp, dstIp, sport, dport, 1001L);
367 wakeupEvent("wlan0", 10123, v4, tcp, mac, srcIp, dstIp, sport, dport, 1001L);
368 wakeupEvent("wlan0", 1000, v4, udp, mac, srcIp, dstIp, sport, dport, 1001L);
369 wakeupEvent("wlan0", 10008, v4, udp, mac, srcIp, dstIp, sport, dport, 1001L);
370 wakeupEvent("wlan0", -1, v4, udp, mac, srcIp, dstIp, sport, dport, 1001L);
371 wakeupEvent("wlan0", 10008, v4, tcp, mac, srcIp, dstIp, sport, dport, 1001L);
623 void wakeupEvent(String iface, int uid, int ether, int ip, byte[] mac, String srcIp,
626 mNetdListener.onWakeupEvent(prefix, uid, ether, ip, mac, srcIp, dstIp, sport, dport, now);
  /external/boringssl/src/crypto/poly1305/
poly1305.c 246 void CRYPTO_poly1305_finish(poly1305_state *statep, uint8_t mac[16]) {
254 CRYPTO_poly1305_finish_neon(statep, mac);
309 U32TO8_LE(&mac[0], f0);
311 U32TO8_LE(&mac[4], f1);
313 U32TO8_LE(&mac[8], f2);
315 U32TO8_LE(&mac[12], f3);
  /external/iw/
wowlan.c 65 char *mac; local
72 mac = strchr(port, '@');
73 if (!mac)
75 *mac = 0;
76 mac++;
83 if (mac_addr_a2n(macbuf, mac))
327 " dest=ip:port@mac\n"
  /external/libxml2/vms/
build_libxml.com 22 $! : 13 October 2003 Craig Berry (craigberry@mac.com)
24 $! : 25 April 2003 Craig Berry (craigberry@mac.com)
26 $! : 28 September 2002 Craig Berry (craigberry@mac.com)
  /frameworks/av/media/libaudiohal/2.0/
DeviceHalHidl.cpp 65 &address->address.mac[0], &address->address.mac[1], &address->address.mac[2],
66 &address->address.mac[3], &address->address.mac[4], &address->address.mac[5]);
  /frameworks/av/media/libaudiohal/4.0/
DeviceHalHidl.cpp 71 &address->address.mac[0], &address->address.mac[1], &address->address.mac[2],
72 &address->address.mac[3], &address->address.mac[4], &address->address.mac[5]);
  /frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/
SecureBox.java 48 import javax.crypto.Mac;
303 Mac mac = Mac.getInstance(MAC_ALG); local
305 mac.init(new SecretKeySpec(salt, MAC_ALG));
310 byte[] pseudorandomKey = mac.doFinal(secret);
313 mac.init(new SecretKeySpec(pseudorandomKey, MAC_ALG));
318 mac.update(info);
320 byte[] hkdfOutput = mac.doFinal(CONSTANT_01);
  /prebuilts/go/darwin-x86/src/crypto/hmac/
hmac.go 16 mac := hmac.New(sha256.New, key)
17 mac.Write(message)
18 expectedMAC := mac.Sum(nil)
  /prebuilts/go/linux-x86/src/crypto/hmac/
hmac.go 16 mac := hmac.New(sha256.New, key)
17 mac.Write(message)
18 expectedMAC := mac.Sum(nil)
  /system/connectivity/wificond/tests/
nl80211_packet_unittest.cpp 246 std::vector<uint8_t> mac; local
247 EXPECT_TRUE(netlink_packet.GetAttributeValue(NL80211_ATTR_MAC, &mac));
251 EXPECT_EQ(expected_mac, mac);
268 std::vector<uint8_t> mac; local
269 EXPECT_TRUE(netlink_packet.GetAttributeValue(NL80211_ATTR_MAC, &mac));
273 EXPECT_EQ(expected_mac, mac);

Completed in 915 milliseconds

1 2 3 4 5 67 8 91011>>