Home
last modified time | relevance | path

Searched refs:mac (Results 1 – 25 of 346) sorted by relevance

12345678910>>...14

/external/openssh/
Dmac.c114 mac_setup_by_alg(struct sshmac *mac, const struct macalg *macalg) in mac_setup_by_alg() argument
116 mac->type = macalg->type; in mac_setup_by_alg()
117 if (mac->type == SSH_DIGEST) { in mac_setup_by_alg()
118 if ((mac->hmac_ctx = ssh_hmac_start(macalg->alg)) == NULL) in mac_setup_by_alg()
120 mac->key_len = mac->mac_len = ssh_hmac_bytes(macalg->alg); in mac_setup_by_alg()
122 mac->mac_len = macalg->len / 8; in mac_setup_by_alg()
123 mac->key_len = macalg->key_len / 8; in mac_setup_by_alg()
124 mac->umac_ctx = NULL; in mac_setup_by_alg()
127 mac->mac_len = macalg->truncatebits / 8; in mac_setup_by_alg()
128 mac->etm = macalg->etm; in mac_setup_by_alg()
[all …]
Dpacket.c346 struct sshmac *mac, u_int packet_length, u_int discard) in ssh_packet_start_discard() argument
351 if (enc == NULL || !cipher_is_cbc(enc->cipher) || (mac && mac->etm)) { in ssh_packet_start_discard()
356 if (packet_length != PACKET_MAX_SIZE && mac && mac->enabled) in ssh_packet_start_discard()
357 state->packet_discard_mac = mac; in ssh_packet_start_discard()
920 struct sshmac *mac; in ssh_set_newkeys() local
945 mac = &state->newkeys[mode]->mac; in ssh_set_newkeys()
947 mac_clear(mac); in ssh_set_newkeys()
950 explicit_bzero(mac->key, mac->key_len); in ssh_set_newkeys()
954 free(mac->name); in ssh_set_newkeys()
955 free(mac->key); in ssh_set_newkeys()
[all …]
/external/boringssl/src/crypto/cipher/test/
Dmake_all_legacy_aead_tests.sh5 go run make_legacy_aead_tests.go -cipher rc4 -mac md5 > rc4_md5_tls_tests.txt
6 go run make_legacy_aead_tests.go -cipher rc4 -mac sha1 > rc4_sha1_tls_tests.txt
8 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 > aes_128_cbc_sha1_tls_tests.txt
9 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 -implicit-iv > aes_128_cbc_sha1_tls_impli…
10 go run make_legacy_aead_tests.go -cipher aes128 -mac sha256 > aes_128_cbc_sha256_tls_tests.txt
12 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 > aes_256_cbc_sha1_tls_tests.txt
13 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 -implicit-iv > aes_256_cbc_sha1_tls_impli…
14 go run make_legacy_aead_tests.go -cipher aes256 -mac sha256 > aes_256_cbc_sha256_tls_tests.txt
15 go run make_legacy_aead_tests.go -cipher aes256 -mac sha384 > aes_256_cbc_sha384_tls_tests.txt
17 go run make_legacy_aead_tests.go -cipher 3des -mac sha1 > des_ede3_cbc_sha1_tls_tests.txt
[all …]
/external/skia/gyp/
DSimpleCocoaApp.gyp15 '../src/views/mac/SkEventNotifier.h',
16 '../src/views/mac/SkEventNotifier.mm',
17 '../src/views/mac/skia_mac.mm',
18 '../src/views/mac/SkNSView.h',
19 '../src/views/mac/SkNSView.mm',
20 '../src/views/mac/SkOptionsTableView.h',
21 '../src/views/mac/SkOptionsTableView.mm',
22 '../src/views/mac/SkOSWindow_Mac.mm',
23 '../src/views/mac/SkTextFieldCell.h',
24 '../src/views/mac/SkTextFieldCell.m',
[all …]
Dexample.gyp30 [ 'skia_os == "mac"', {
32 '../example/mac/HelloWorldNSView.mm',
33 '../example/mac/HelloWorldDelegate.mm',
35 '../src/views/mac/SkEventNotifier.mm',
36 '../src/views/mac/skia_mac.mm',
37 '../src/views/mac/SkNSView.mm',
38 '../src/views/mac/SkOptionsTableView.mm',
39 '../src/views/mac/SkOSWindow_Mac.mm',
40 '../src/views/mac/SkTextFieldCell.m',
43 '../src/views/mac/'
[all …]
Dv8.gyp70 [ 'skia_os == "mac"', {
72 '../src/views/mac/SampleAppDelegate.h',
73 '../src/views/mac/SampleAppDelegate.mm',
74 '../src/views/mac/SkEventNotifier.mm',
75 '../src/views/mac/skia_mac.mm',
76 '../src/views/mac/SkNSView.h',
77 '../src/views/mac/SkNSView.mm',
78 '../src/views/mac/SkOptionsTableView.h',
79 '../src/views/mac/SkOptionsTableView.mm',
80 '../src/views/mac/SkOSWindow_Mac.mm',
[all …]
DSampleApp.gyp181 [ 'skia_os == "mac"', {
184 '../src/views/mac/SampleApp-Info.plist',
185 '../src/views/mac/SampleAppDelegate.h',
186 '../src/views/mac/SampleAppDelegate.mm',
187 '../src/views/mac/SkSampleNSView.h',
188 '../src/views/mac/SkSampleNSView.mm',
191 '../src/views/mac/SkEventNotifier.h',
192 '../src/views/mac/SkEventNotifier.mm',
193 '../src/views/mac/skia_mac.mm',
194 '../src/views/mac/SkNSView.h',
[all …]
Dutils.gyp26 '../include/utils/mac',
40 [ 'skia_os == "mac"', {
47 [ 'skia_os in ["mac", "ios"]', {
50 '../include/utils/mac',
56 },{ #else if 'skia_os != "mac"'
58 '../include/utils/mac',
61 '../include/utils/mac/SkCGUtils.h',
62 '../src/utils/mac/SkCreateCGImageRef.cpp',
/external/google-breakpad/src/common/
Dcommon.gyp32 ['OS=="mac"', {
117 'mac/arch_utilities.cc',
118 'mac/arch_utilities.h',
119 'mac/bootstrap_compat.cc',
120 'mac/bootstrap_compat.h',
121 'mac/byteswap.h',
122 'mac/dump_syms.h',
123 'mac/dump_syms.mm',
124 'mac/file_id.cc',
125 'mac/file_id.h',
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/
DMacOutputStream.java11 protected Mac mac; field in MacOutputStream
14 Mac mac) in MacOutputStream() argument
16 this.mac = mac; in MacOutputStream()
22 mac.update((byte)b); in write()
31 mac.update(b, off, len); in write()
36 byte[] res = new byte[mac.getMacSize()]; in getMac()
38 mac.doFinal(res, 0); in getMac()
DMacInputStream.java12 protected Mac mac; field in MacInputStream
16 Mac mac) in MacInputStream() argument
19 this.mac = mac; in MacInputStream()
29 mac.update((byte)b); in read()
43 mac.update(b, off, n); in read()
50 return mac; in getMac()
/external/tcpdump/tests/
Dsflow_multiple_counter_30_pdus.out13 deferred 0, late collision 0, excessive collision 0, mac trans error 0
14 carrier error 0, frames too long 0, mac receive errors 0, symbol errors 0
25 deferred 0, late collision 0, excessive collision 0, mac trans error 0
26 carrier error 0, frames too long 0, mac receive errors 0, symbol errors 0
37 deferred 0, late collision 0, excessive collision 0, mac trans error 0
38 carrier error 0, frames too long 0, mac receive errors 0, symbol errors 0
49 deferred 0, late collision 0, excessive collision 0, mac trans error 0
50 carrier error 0, frames too long 0, mac receive errors 0, symbol errors 0
61 deferred 0, late collision 0, excessive collision 0, mac trans error 0
62 carrier error 0, frames too long 0, mac receive errors 0, symbol errors 0
[all …]
/external/wpa_supplicant_8/hostapd/logwatch/
Dhostapd29 if (my ($iface,$mac,$layer,$details) = ($line =~ /(.*?): STA (.*?) (.*?): (.*?)$/i)) {
34 $hostapd{$iface}->{$mac}->{$layer}->{$details}++;
43 foreach my $mac (sort keys %{$hostapd{$iface}}) {
44 print " Client MAC Address $mac:\n";
45 foreach my $layer (sort keys %{$hostapd{$iface}->{$mac}}) {
47 foreach my $details (sort keys %{$hostapd{$iface}->{$mac}->{$layer}}) {
49 my $count = $hostapd{$iface}->{$mac}->{$layer}->{$details};
/external/ppp/pppd/plugins/rp-pppoe/
Dplugin.c173 unsigned int mac[ETH_ALEN]; in PPPOEConnectDevice() local
176 &ses, &mac[0], &mac[1], &mac[2], in PPPOEConnectDevice()
177 &mac[3], &mac[4], &mac[5]) != 7) { in PPPOEConnectDevice()
182 conn->peerEth[i] = (unsigned char) mac[i]; in PPPOEConnectDevice()
386 unsigned int mac[6]; in pppoe_check_options() local
391 &mac[0], &mac[1], &mac[2], &mac[3], in pppoe_check_options()
392 &mac[4], &mac[5]) != 6) { in pppoe_check_options()
397 conn->req_peer_mac[i] = mac[i]; in pppoe_check_options()
/external/boringssl/src/crypto/hmac/
Dhmac_test.cc108 uint8_t mac[EVP_MAX_MD_SIZE]; in TestHMAC() local
111 bssl::vector_data(&input), input.size(), mac, in TestHMAC()
113 !t->ExpectBytesEqual(bssl::vector_data(&output), output.size(), mac, in TestHMAC()
124 !HMAC_Final(ctx.get(), mac, &mac_len) || in TestHMAC()
125 !t->ExpectBytesEqual(bssl::vector_data(&output), output.size(), mac, in TestHMAC()
134 !HMAC_Final(ctx.get(), mac, &mac_len) || in TestHMAC()
135 !t->ExpectBytesEqual(bssl::vector_data(&output), output.size(), mac, in TestHMAC()
152 if (!HMAC_Final(ctx.get(), mac, &mac_len) || in TestHMAC()
153 !t->ExpectBytesEqual(bssl::vector_data(&output), output.size(), mac, in TestHMAC()
/external/wpa_supplicant_8/src/crypto/
Dcrypto_internal.c151 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) in crypto_hash_finish() argument
159 if (mac == NULL || len == NULL) { in crypto_hash_finish()
172 MD5Final(mac, &ctx->u.md5); in crypto_hash_finish()
181 SHA1Final(mac, &ctx->u.sha1); in crypto_hash_finish()
191 sha256_done(&ctx->u.sha256, mac); in crypto_hash_finish()
202 MD5Final(mac, &ctx->u.md5); in crypto_hash_finish()
211 MD5Update(&ctx->u.md5, mac, 16); in crypto_hash_finish()
212 MD5Final(mac, &ctx->u.md5); in crypto_hash_finish()
222 SHA1Final(mac, &ctx->u.sha1); in crypto_hash_finish()
231 SHA1Update(&ctx->u.sha1, mac, 20); in crypto_hash_finish()
[all …]
Daes-omac1.c44 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_vector() argument
111 aes_encrypt(ctx, pad, mac); in omac1_aes_vector()
131 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_128_vector() argument
133 return omac1_aes_vector(key, 16, num_elem, addr, len, mac); in omac1_aes_128_vector()
149 int omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac) in omac1_aes_128() argument
151 return omac1_aes_128_vector(key, 1, &data, &data_len, mac); in omac1_aes_128()
167 int omac1_aes_256(const u8 *key, const u8 *data, size_t data_len, u8 *mac) in omac1_aes_256() argument
169 return omac1_aes_vector(key, 32, 1, &data, &data_len, mac); in omac1_aes_256()
Dsha256.c27 const u8 *addr[], const size_t *len, u8 *mac) in hmac_sha256_vector() argument
73 if (sha256_vector(1 + num_elem, _addr, _len, mac) < 0) in hmac_sha256_vector()
85 _addr[1] = mac; in hmac_sha256_vector()
87 return sha256_vector(2, _addr, _len, mac); in hmac_sha256_vector()
101 size_t data_len, u8 *mac) in hmac_sha256() argument
103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha256()
Dcrypto_openssl.c66 const u8 *addr[], const size_t *len, u8 *mac) in openssl_digest_vector() argument
86 if (!EVP_DigestFinal(&ctx, mac, &mac_len)) { in openssl_digest_vector()
96 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md4_vector() argument
98 return openssl_digest_vector(EVP_md4(), num_elem, addr, len, mac); in md4_vector()
160 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md5_vector() argument
162 return openssl_digest_vector(EVP_md5(), num_elem, addr, len, mac); in md5_vector()
166 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in sha1_vector() argument
168 return openssl_digest_vector(EVP_sha1(), num_elem, addr, len, mac); in sha1_vector()
174 u8 *mac) in sha256_vector() argument
176 return openssl_digest_vector(EVP_sha256(), num_elem, addr, len, mac); in sha256_vector()
[all …]
Dsha1.c27 const u8 *addr[], const size_t *len, u8 *mac) in hmac_sha1_vector() argument
74 if (sha1_vector(1 + num_elem, _addr, _len, mac)) in hmac_sha1_vector()
86 _addr[1] = mac; in hmac_sha1_vector()
88 ret = sha1_vector(2, _addr, _len, mac); in hmac_sha1_vector()
104 u8 *mac) in hmac_sha1() argument
106 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha1()
Dmd5.c27 const u8 *addr[], const size_t *len, u8 *mac) in hmac_md5_vector() argument
75 if (md5_vector(1 + num_elem, _addr, _len, mac)) in hmac_md5_vector()
87 _addr[1] = mac; in hmac_md5_vector()
89 res = md5_vector(2, _addr, _len, mac); in hmac_md5_vector()
106 u8 *mac) in hmac_md5() argument
108 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5()
/external/apache-harmony/crypto/src/test/impl/java/org/apache/harmony/crypto/tests/javax/crypto/
DMac_ImplTest.java83 protected void checkResult(Mac mac) throws InvalidKeyException, in checkResult() argument
85 assertEquals("Incorrect MacLength", mac.getMacLength(), 0); in checkResult()
90 mac.init(scs); in checkResult()
91 byte[] bb = mac.doFinal(); in checkResult()
93 mac.reset(); in checkResult()
94 bb = mac.doFinal(); in checkResult()
97 mac.init(null); in checkResult()
102 mac.init(null, null); in checkResult()
106 mac.init(scs, null); in checkResult()
107 mac.init(scs, parms); in checkResult()
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/
DCBCBlockCipherMac.java16 private byte[] mac; field in CBCBlockCipherMac
99 mac = new byte[cipher.getBlockSize()]; in CBCBlockCipherMac()
128 cipher.processBlock(buf, 0, mac, 0); in update()
152 cipher.processBlock(buf, 0, mac, 0); in update()
160 cipher.processBlock(in, inOff, mac, 0); in update()
193 cipher.processBlock(buf, 0, mac, 0); in doFinal()
200 cipher.processBlock(buf, 0, mac, 0); in doFinal()
202 System.arraycopy(mac, 0, out, outOff, macSize); in doFinal()
/external/wpa_supplicant_8/src/eap_common/
Deap_eke_common.c93 static int eap_eke_pnonce_len(u8 mac) in eap_eke_pnonce_len() argument
97 if (mac == EAP_EKE_MAC_HMAC_SHA1) in eap_eke_pnonce_len()
99 else if (mac == EAP_EKE_MAC_HMAC_SHA2_256) in eap_eke_pnonce_len()
108 static int eap_eke_pnonce_ps_len(u8 mac) in eap_eke_pnonce_ps_len() argument
112 if (mac == EAP_EKE_MAC_HMAC_SHA1) in eap_eke_pnonce_ps_len()
114 else if (mac == EAP_EKE_MAC_HMAC_SHA2_256) in eap_eke_pnonce_ps_len()
475 if (sess->mac == EAP_EKE_PRF_HMAC_SHA1) in eap_eke_derive_ke_ki()
477 else if (sess->mac == EAP_EKE_PRF_HMAC_SHA2_256) in eap_eke_derive_ke_ki()
602 static int eap_eke_mac(u8 mac, const u8 *key, const u8 *data, size_t data_len, in eap_eke_mac() argument
605 if (mac == EAP_EKE_MAC_HMAC_SHA1) in eap_eke_mac()
[all …]
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/
DMacTest.java136 Mac mac; in testMac02() local
138 mac = Mac.getInstance(validValues[i]); in testMac02()
139 assertEquals("Incorrect algorithm", mac.getAlgorithm(), validValues[i]); in testMac02()
216 Mac mac; in testMac05() local
218 mac = Mac.getInstance(validValues[i], defaultProviderName); in testMac05()
219 assertEquals("Incorrect algorithm", mac.getAlgorithm(), validValues[i]); in testMac05()
220 assertEquals("Incorrect provider", mac.getProvider().getName(), in testMac05()
282 Mac mac; in testMac08() local
284 mac = Mac.getInstance(validValues[i], defaultProvider); in testMac08()
285 assertEquals("Incorrect algorithm", mac.getAlgorithm(), validValues[i]); in testMac08()
[all …]

12345678910>>...14