/external/openssh/ |
D | mac.c | 114 mac_setup_by_alg(struct sshmac *mac, const struct macalg *macalg) in mac_setup_by_alg() argument 116 mac->type = macalg->type; in mac_setup_by_alg() 117 if (mac->type == SSH_DIGEST) { in mac_setup_by_alg() 118 if ((mac->hmac_ctx = ssh_hmac_start(macalg->alg)) == NULL) in mac_setup_by_alg() 120 mac->key_len = mac->mac_len = ssh_hmac_bytes(macalg->alg); in mac_setup_by_alg() 122 mac->mac_len = macalg->len / 8; in mac_setup_by_alg() 123 mac->key_len = macalg->key_len / 8; in mac_setup_by_alg() 124 mac->umac_ctx = NULL; in mac_setup_by_alg() 127 mac->mac_len = macalg->truncatebits / 8; in mac_setup_by_alg() 128 mac->etm = macalg->etm; in mac_setup_by_alg() [all …]
|
D | packet.c | 346 struct sshmac *mac, u_int packet_length, u_int discard) in ssh_packet_start_discard() argument 351 if (enc == NULL || !cipher_is_cbc(enc->cipher) || (mac && mac->etm)) { in ssh_packet_start_discard() 356 if (packet_length != PACKET_MAX_SIZE && mac && mac->enabled) in ssh_packet_start_discard() 357 state->packet_discard_mac = mac; in ssh_packet_start_discard() 920 struct sshmac *mac; in ssh_set_newkeys() local 945 mac = &state->newkeys[mode]->mac; in ssh_set_newkeys() 947 mac_clear(mac); in ssh_set_newkeys() 950 explicit_bzero(mac->key, mac->key_len); in ssh_set_newkeys() 954 free(mac->name); in ssh_set_newkeys() 955 free(mac->key); in ssh_set_newkeys() [all …]
|
/external/boringssl/src/crypto/cipher/test/ |
D | make_all_legacy_aead_tests.sh | 5 go run make_legacy_aead_tests.go -cipher rc4 -mac md5 > rc4_md5_tls_tests.txt 6 go run make_legacy_aead_tests.go -cipher rc4 -mac sha1 > rc4_sha1_tls_tests.txt 8 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 > aes_128_cbc_sha1_tls_tests.txt 9 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 -implicit-iv > aes_128_cbc_sha1_tls_impli… 10 go run make_legacy_aead_tests.go -cipher aes128 -mac sha256 > aes_128_cbc_sha256_tls_tests.txt 12 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 > aes_256_cbc_sha1_tls_tests.txt 13 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 -implicit-iv > aes_256_cbc_sha1_tls_impli… 14 go run make_legacy_aead_tests.go -cipher aes256 -mac sha256 > aes_256_cbc_sha256_tls_tests.txt 15 go run make_legacy_aead_tests.go -cipher aes256 -mac sha384 > aes_256_cbc_sha384_tls_tests.txt 17 go run make_legacy_aead_tests.go -cipher 3des -mac sha1 > des_ede3_cbc_sha1_tls_tests.txt [all …]
|
/external/skia/gyp/ |
D | SimpleCocoaApp.gyp | 15 '../src/views/mac/SkEventNotifier.h', 16 '../src/views/mac/SkEventNotifier.mm', 17 '../src/views/mac/skia_mac.mm', 18 '../src/views/mac/SkNSView.h', 19 '../src/views/mac/SkNSView.mm', 20 '../src/views/mac/SkOptionsTableView.h', 21 '../src/views/mac/SkOptionsTableView.mm', 22 '../src/views/mac/SkOSWindow_Mac.mm', 23 '../src/views/mac/SkTextFieldCell.h', 24 '../src/views/mac/SkTextFieldCell.m', [all …]
|
D | example.gyp | 30 [ 'skia_os == "mac"', { 32 '../example/mac/HelloWorldNSView.mm', 33 '../example/mac/HelloWorldDelegate.mm', 35 '../src/views/mac/SkEventNotifier.mm', 36 '../src/views/mac/skia_mac.mm', 37 '../src/views/mac/SkNSView.mm', 38 '../src/views/mac/SkOptionsTableView.mm', 39 '../src/views/mac/SkOSWindow_Mac.mm', 40 '../src/views/mac/SkTextFieldCell.m', 43 '../src/views/mac/' [all …]
|
D | v8.gyp | 70 [ 'skia_os == "mac"', { 72 '../src/views/mac/SampleAppDelegate.h', 73 '../src/views/mac/SampleAppDelegate.mm', 74 '../src/views/mac/SkEventNotifier.mm', 75 '../src/views/mac/skia_mac.mm', 76 '../src/views/mac/SkNSView.h', 77 '../src/views/mac/SkNSView.mm', 78 '../src/views/mac/SkOptionsTableView.h', 79 '../src/views/mac/SkOptionsTableView.mm', 80 '../src/views/mac/SkOSWindow_Mac.mm', [all …]
|
D | SampleApp.gyp | 181 [ 'skia_os == "mac"', { 184 '../src/views/mac/SampleApp-Info.plist', 185 '../src/views/mac/SampleAppDelegate.h', 186 '../src/views/mac/SampleAppDelegate.mm', 187 '../src/views/mac/SkSampleNSView.h', 188 '../src/views/mac/SkSampleNSView.mm', 191 '../src/views/mac/SkEventNotifier.h', 192 '../src/views/mac/SkEventNotifier.mm', 193 '../src/views/mac/skia_mac.mm', 194 '../src/views/mac/SkNSView.h', [all …]
|
D | utils.gyp | 26 '../include/utils/mac', 40 [ 'skia_os == "mac"', { 47 [ 'skia_os in ["mac", "ios"]', { 50 '../include/utils/mac', 56 },{ #else if 'skia_os != "mac"' 58 '../include/utils/mac', 61 '../include/utils/mac/SkCGUtils.h', 62 '../src/utils/mac/SkCreateCGImageRef.cpp',
|
/external/google-breakpad/src/common/ |
D | common.gyp | 32 ['OS=="mac"', { 117 'mac/arch_utilities.cc', 118 'mac/arch_utilities.h', 119 'mac/bootstrap_compat.cc', 120 'mac/bootstrap_compat.h', 121 'mac/byteswap.h', 122 'mac/dump_syms.h', 123 'mac/dump_syms.mm', 124 'mac/file_id.cc', 125 'mac/file_id.h', [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/ |
D | MacOutputStream.java | 11 protected Mac mac; field in MacOutputStream 14 Mac mac) in MacOutputStream() argument 16 this.mac = mac; in MacOutputStream() 22 mac.update((byte)b); in write() 31 mac.update(b, off, len); in write() 36 byte[] res = new byte[mac.getMacSize()]; in getMac() 38 mac.doFinal(res, 0); in getMac()
|
D | MacInputStream.java | 12 protected Mac mac; field in MacInputStream 16 Mac mac) in MacInputStream() argument 19 this.mac = mac; in MacInputStream() 29 mac.update((byte)b); in read() 43 mac.update(b, off, n); in read() 50 return mac; in getMac()
|
/external/tcpdump/tests/ |
D | sflow_multiple_counter_30_pdus.out | 13 deferred 0, late collision 0, excessive collision 0, mac trans error 0 14 carrier error 0, frames too long 0, mac receive errors 0, symbol errors 0 25 deferred 0, late collision 0, excessive collision 0, mac trans error 0 26 carrier error 0, frames too long 0, mac receive errors 0, symbol errors 0 37 deferred 0, late collision 0, excessive collision 0, mac trans error 0 38 carrier error 0, frames too long 0, mac receive errors 0, symbol errors 0 49 deferred 0, late collision 0, excessive collision 0, mac trans error 0 50 carrier error 0, frames too long 0, mac receive errors 0, symbol errors 0 61 deferred 0, late collision 0, excessive collision 0, mac trans error 0 62 carrier error 0, frames too long 0, mac receive errors 0, symbol errors 0 [all …]
|
/external/wpa_supplicant_8/hostapd/logwatch/ |
D | hostapd | 29 if (my ($iface,$mac,$layer,$details) = ($line =~ /(.*?): STA (.*?) (.*?): (.*?)$/i)) { 34 $hostapd{$iface}->{$mac}->{$layer}->{$details}++; 43 foreach my $mac (sort keys %{$hostapd{$iface}}) { 44 print " Client MAC Address $mac:\n"; 45 foreach my $layer (sort keys %{$hostapd{$iface}->{$mac}}) { 47 foreach my $details (sort keys %{$hostapd{$iface}->{$mac}->{$layer}}) { 49 my $count = $hostapd{$iface}->{$mac}->{$layer}->{$details};
|
/external/ppp/pppd/plugins/rp-pppoe/ |
D | plugin.c | 173 unsigned int mac[ETH_ALEN]; in PPPOEConnectDevice() local 176 &ses, &mac[0], &mac[1], &mac[2], in PPPOEConnectDevice() 177 &mac[3], &mac[4], &mac[5]) != 7) { in PPPOEConnectDevice() 182 conn->peerEth[i] = (unsigned char) mac[i]; in PPPOEConnectDevice() 386 unsigned int mac[6]; in pppoe_check_options() local 391 &mac[0], &mac[1], &mac[2], &mac[3], in pppoe_check_options() 392 &mac[4], &mac[5]) != 6) { in pppoe_check_options() 397 conn->req_peer_mac[i] = mac[i]; in pppoe_check_options()
|
/external/boringssl/src/crypto/hmac/ |
D | hmac_test.cc | 108 uint8_t mac[EVP_MAX_MD_SIZE]; in TestHMAC() local 111 bssl::vector_data(&input), input.size(), mac, in TestHMAC() 113 !t->ExpectBytesEqual(bssl::vector_data(&output), output.size(), mac, in TestHMAC() 124 !HMAC_Final(ctx.get(), mac, &mac_len) || in TestHMAC() 125 !t->ExpectBytesEqual(bssl::vector_data(&output), output.size(), mac, in TestHMAC() 134 !HMAC_Final(ctx.get(), mac, &mac_len) || in TestHMAC() 135 !t->ExpectBytesEqual(bssl::vector_data(&output), output.size(), mac, in TestHMAC() 152 if (!HMAC_Final(ctx.get(), mac, &mac_len) || in TestHMAC() 153 !t->ExpectBytesEqual(bssl::vector_data(&output), output.size(), mac, in TestHMAC()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_internal.c | 151 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) in crypto_hash_finish() argument 159 if (mac == NULL || len == NULL) { in crypto_hash_finish() 172 MD5Final(mac, &ctx->u.md5); in crypto_hash_finish() 181 SHA1Final(mac, &ctx->u.sha1); in crypto_hash_finish() 191 sha256_done(&ctx->u.sha256, mac); in crypto_hash_finish() 202 MD5Final(mac, &ctx->u.md5); in crypto_hash_finish() 211 MD5Update(&ctx->u.md5, mac, 16); in crypto_hash_finish() 212 MD5Final(mac, &ctx->u.md5); in crypto_hash_finish() 222 SHA1Final(mac, &ctx->u.sha1); in crypto_hash_finish() 231 SHA1Update(&ctx->u.sha1, mac, 20); in crypto_hash_finish() [all …]
|
D | aes-omac1.c | 44 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_vector() argument 111 aes_encrypt(ctx, pad, mac); in omac1_aes_vector() 131 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_128_vector() argument 133 return omac1_aes_vector(key, 16, num_elem, addr, len, mac); in omac1_aes_128_vector() 149 int omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac) in omac1_aes_128() argument 151 return omac1_aes_128_vector(key, 1, &data, &data_len, mac); in omac1_aes_128() 167 int omac1_aes_256(const u8 *key, const u8 *data, size_t data_len, u8 *mac) in omac1_aes_256() argument 169 return omac1_aes_vector(key, 32, 1, &data, &data_len, mac); in omac1_aes_256()
|
D | sha256.c | 27 const u8 *addr[], const size_t *len, u8 *mac) in hmac_sha256_vector() argument 73 if (sha256_vector(1 + num_elem, _addr, _len, mac) < 0) in hmac_sha256_vector() 85 _addr[1] = mac; in hmac_sha256_vector() 87 return sha256_vector(2, _addr, _len, mac); in hmac_sha256_vector() 101 size_t data_len, u8 *mac) in hmac_sha256() argument 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha256()
|
D | crypto_openssl.c | 66 const u8 *addr[], const size_t *len, u8 *mac) in openssl_digest_vector() argument 86 if (!EVP_DigestFinal(&ctx, mac, &mac_len)) { in openssl_digest_vector() 96 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md4_vector() argument 98 return openssl_digest_vector(EVP_md4(), num_elem, addr, len, mac); in md4_vector() 160 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md5_vector() argument 162 return openssl_digest_vector(EVP_md5(), num_elem, addr, len, mac); in md5_vector() 166 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in sha1_vector() argument 168 return openssl_digest_vector(EVP_sha1(), num_elem, addr, len, mac); in sha1_vector() 174 u8 *mac) in sha256_vector() argument 176 return openssl_digest_vector(EVP_sha256(), num_elem, addr, len, mac); in sha256_vector() [all …]
|
D | sha1.c | 27 const u8 *addr[], const size_t *len, u8 *mac) in hmac_sha1_vector() argument 74 if (sha1_vector(1 + num_elem, _addr, _len, mac)) in hmac_sha1_vector() 86 _addr[1] = mac; in hmac_sha1_vector() 88 ret = sha1_vector(2, _addr, _len, mac); in hmac_sha1_vector() 104 u8 *mac) in hmac_sha1() argument 106 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha1()
|
D | md5.c | 27 const u8 *addr[], const size_t *len, u8 *mac) in hmac_md5_vector() argument 75 if (md5_vector(1 + num_elem, _addr, _len, mac)) in hmac_md5_vector() 87 _addr[1] = mac; in hmac_md5_vector() 89 res = md5_vector(2, _addr, _len, mac); in hmac_md5_vector() 106 u8 *mac) in hmac_md5() argument 108 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5()
|
/external/apache-harmony/crypto/src/test/impl/java/org/apache/harmony/crypto/tests/javax/crypto/ |
D | Mac_ImplTest.java | 83 protected void checkResult(Mac mac) throws InvalidKeyException, in checkResult() argument 85 assertEquals("Incorrect MacLength", mac.getMacLength(), 0); in checkResult() 90 mac.init(scs); in checkResult() 91 byte[] bb = mac.doFinal(); in checkResult() 93 mac.reset(); in checkResult() 94 bb = mac.doFinal(); in checkResult() 97 mac.init(null); in checkResult() 102 mac.init(null, null); in checkResult() 106 mac.init(scs, null); in checkResult() 107 mac.init(scs, parms); in checkResult() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
D | CBCBlockCipherMac.java | 16 private byte[] mac; field in CBCBlockCipherMac 99 mac = new byte[cipher.getBlockSize()]; in CBCBlockCipherMac() 128 cipher.processBlock(buf, 0, mac, 0); in update() 152 cipher.processBlock(buf, 0, mac, 0); in update() 160 cipher.processBlock(in, inOff, mac, 0); in update() 193 cipher.processBlock(buf, 0, mac, 0); in doFinal() 200 cipher.processBlock(buf, 0, mac, 0); in doFinal() 202 System.arraycopy(mac, 0, out, outOff, macSize); in doFinal()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_eke_common.c | 93 static int eap_eke_pnonce_len(u8 mac) in eap_eke_pnonce_len() argument 97 if (mac == EAP_EKE_MAC_HMAC_SHA1) in eap_eke_pnonce_len() 99 else if (mac == EAP_EKE_MAC_HMAC_SHA2_256) in eap_eke_pnonce_len() 108 static int eap_eke_pnonce_ps_len(u8 mac) in eap_eke_pnonce_ps_len() argument 112 if (mac == EAP_EKE_MAC_HMAC_SHA1) in eap_eke_pnonce_ps_len() 114 else if (mac == EAP_EKE_MAC_HMAC_SHA2_256) in eap_eke_pnonce_ps_len() 475 if (sess->mac == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_derive_ke_ki() 477 else if (sess->mac == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_derive_ke_ki() 602 static int eap_eke_mac(u8 mac, const u8 *key, const u8 *data, size_t data_len, in eap_eke_mac() argument 605 if (mac == EAP_EKE_MAC_HMAC_SHA1) in eap_eke_mac() [all …]
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
D | MacTest.java | 136 Mac mac; in testMac02() local 138 mac = Mac.getInstance(validValues[i]); in testMac02() 139 assertEquals("Incorrect algorithm", mac.getAlgorithm(), validValues[i]); in testMac02() 216 Mac mac; in testMac05() local 218 mac = Mac.getInstance(validValues[i], defaultProviderName); in testMac05() 219 assertEquals("Incorrect algorithm", mac.getAlgorithm(), validValues[i]); in testMac05() 220 assertEquals("Incorrect provider", mac.getProvider().getName(), in testMac05() 282 Mac mac; in testMac08() local 284 mac = Mac.getInstance(validValues[i], defaultProvider); in testMac08() 285 assertEquals("Incorrect algorithm", mac.getAlgorithm(), validValues[i]); in testMac08() [all …]
|