/external/boringssl/src/util/fipstools/ |
inject-hash.go | 141 mac := hmac.New(sha512.New, zeroKey[:]) 142 mac.Write(moduleText) 143 calculated := mac.Sum(nil)
|
/external/toybox/toys/pending/ |
arping.c | 51 // Gets information of INTERFACE and updates IFINDEX, MAC and IP. 53 uint8_t *mac) 75 if (mac) { 77 memcpy(mac, req.ifr_hwaddr.sa_data, 6);
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Tools/scripts/ |
ftpmirror.py | 38 mac = 0
variable 45 global verbose, interactive, mac, rmok, nologin
72 if o == '-m': mac = 1; nologin = 1; skippats.append('*.o')
131 if mac:
132 # Mac listing has just filenames;
|
/external/wpa_supplicant_8/src/ap/ |
ap_drv_ops.h | 214 const u8 *mac, int accepted, 219 return hapd->driver->set_radius_acl_auth(hapd->drv_priv, mac, accepted, 224 const u8 *mac) 229 return hapd->driver->set_radius_acl_expire(hapd->drv_priv, mac);
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_i.h | 128 u8 mac_addr[ETH_ALEN]; /* mac addr of network i.f. we use */ 161 u8 mac[ETH_ALEN]);
|
/frameworks/base/services/net/java/android/net/util/ |
ConnectivityPacketSummary.java | 366 private static String getMacAddressString(ByteBuffer mac) { 367 if (mac == null || mac.remaining() < ETHER_ADDR_LEN) return "invalid"; 370 mac.get(bytes, 0, bytes.length);
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
eapol.h | 189 uint8 mac[ETHER_ADDR_LEN]; member in struct:__anon46960
|
/hardware/interfaces/keymaster/4.0/ |
types.hal | 166 * Tag::MIN_MAC_LENGTH specifies the minimum length of MAC that can be requested or verified 169 * This value is the minimum MAC length, in bits. It must be a multiple of 8 bits. For HMAC [all...] |
/system/connectivity/wificond/ |
client_interface_impl.h | 79 bool SetMacAddress(const ::std::vector<uint8_t>& mac);
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/bluetooth/ |
BleScannerService.java | 167 String mac = result.getDevice().getAddress(); local 181 // Check privacy mac. 186 } else if (!mOldMac.equals(mac)) {
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/wifiaware/ |
CallbackUtils.java | 97 public void onIdentityChanged(byte[] mac) { 102 mMac = mac; 109 * @return The MAC address returned by the onIdentityChanged() callback, or null on timeout.
|
/device/google/cuttlefish_common/common/commands/wifi_relay/ |
wifi_relay.cpp | 190 const uint8_t *mac) { 203 memcpy(&macCopy[0], mac, ETH_ALEN);
|
/external/iptables/extensions/ |
libarpt_mangle.c | 24 "--mangle-mac-s MAC address\n" 25 "--mangle-mac-d MAC address\n" 38 { .name = "mangle-mac-s", .has_arg = true, .val = MANGLE_DEVS }, 39 { .name = "mangle-mac-d", .has_arg = true, .val = MANGLE_DEVT }, 84 "--mangle-mac-s"); 91 "invalid source MAC"); 101 "! hln not allowed for --mangle-mac-d"); 107 xtables_error(PARAMETER_PROBLEM, "invalid target MAC"); [all...] |
/external/linux-kselftest/tools/testing/selftests/rcutorture/bin/ |
kvm.sh | 71 echo " --mac nn:nn:nn:nn:nn:nn" 144 --mac) 145 checkarg --mac "(MAC address)" $# "$2" '^\([0-9a-fA-F]\{2\}:\)\{5\}[0-9a-fA-F]\{2\}$' error
|
/external/wpa_supplicant_8/src/crypto/ |
sha256-internal.c | 22 * @mac: Buffer for the hash 26 u8 *mac) 38 if (sha256_done(&ctx, mac))
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_eke.c | 34 u8 mac; /* forced MAC or 0 to allow all supported */ member in struct:eap_eke_data 121 pos = os_strstr(phase1, "mac="); 123 data->mac = atoi(pos + 4); 124 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced mac %u", 125 data->mac); 188 static int eap_eke_supp_mac(u8 mac) 190 return mac == EAP_EKE_MAC_HMAC_SHA1 || 191 mac == EAP_EKE_MAC_HMAC_SHA2_256; 262 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u" [all...] |
eap_peap.c | 315 u8 *mac; local 336 mac = wpabuf_put(buf, 20); /* Compound_MAC */ 342 if (hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac) < 0) 344 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC", mac, SHA1_MAC_LEN); 398 u8 buf[61], mac[SHA1_MAC_LEN]; local 436 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac); 438 if (os_memcmp_const(mac, pos, SHA1_MAC_LEN) != 0) { 441 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received MAC", 443 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Expected MAC", 444 mac, SHA1_MAC_LEN) [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_build.c | 431 void p2p_buf_add_advertisement_id(struct wpabuf *buf, u32 id, const u8 *mac) 433 if (!buf || !mac) 440 wpabuf_put_data(buf, mac, ETH_ALEN); 442 id, MAC2STR(mac)); 665 void p2p_buf_add_session_id(struct wpabuf *buf, u32 id, const u8 *mac) 667 if (!buf || !mac) 674 wpabuf_put_data(buf, mac, ETH_ALEN); 676 id, MAC2STR(mac));
|
/frameworks/base/core/java/android/hardware/biometrics/ |
BiometricPrompt.java | 36 import javax.crypto.Mac; 243 * supports {@link Signature}, {@link Cipher} and {@link Mac} objects. 254 public CryptoObject(@NonNull Mac mac) { 255 super(mac); 275 * Get {@link Mac} object. 276 * @return {@link Mac} object or null if this doesn't contain one. 278 public Mac getMac() {
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/ |
WifiAwareDiscoverySessionState.java | 37 * publish/subscribe ID, and MAC address caching (hiding) from clients. 55 PeerInfo(int instanceId, byte[] mac) { 57 mMac = mac; 66 sb.append(mInstanceId).append(", mac=").append(HexEncoding.encode(mMac)).append("]"); 247 * @param peerMac The MAC address of the peer. Never propagated to client 277 * @param peerMac The MAC address of the peer sending the message. This
|
/frameworks/support/compat/src/main/java/androidx/core/hardware/fingerprint/ |
FingerprintManagerCompat.java | 34 import javax.crypto.Mac; 195 private final Mac mMac; 210 public CryptoObject(@NonNull Mac mac) { 211 mMac = mac; 231 * Get {@link Mac} object. 232 * @return {@link Mac} object or null if this doesn't contain one. 235 public Mac getMac() { return mMac; }
|
/hardware/interfaces/audio/4.0/ |
types.hal | 53 * IEEE 802 MAC address. 69 MacAddress mac; // used for BLUETOOTH_A2DP_*
|
/hardware/interfaces/wifi/1.2/default/ |
wifi_sta_iface.h | 108 Return<void> setMacAddress(const hidl_array<uint8_t, 6>& mac, 153 WifiStatus setMacAddressInternal(const std::array<uint8_t, 6>& mac);
|
/system/tpm/attestation/common/ |
print_common_proto.cc | 153 output += indent + " mac: "; 156 base::HexEncode(value.mac().data(), value.mac().size()).c_str());
|
/toolchain/binutils/binutils-2.27/gas/testsuite/gas/mn10300/ |
am33_2.s | 49 mac r1,r2
|