/external/boringssl/src/crypto/cipher/test/ |
D | make_all_legacy_aead_tests.sh | 5 go run make_legacy_aead_tests.go -cipher rc4 -mac md5 > rc4_md5_tls_tests.txt 6 go run make_legacy_aead_tests.go -cipher rc4 -mac sha1 > rc4_sha1_tls_tests.txt 8 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 > aes_128_cbc_sha1_tls_tests.txt 9 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 -implicit-iv > aes_128_cbc_sha1_tls_impli… 10 go run make_legacy_aead_tests.go -cipher aes128 -mac sha256 > aes_128_cbc_sha256_tls_tests.txt 12 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 > aes_256_cbc_sha1_tls_tests.txt 13 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 -implicit-iv > aes_256_cbc_sha1_tls_impli… 14 go run make_legacy_aead_tests.go -cipher aes256 -mac sha256 > aes_256_cbc_sha256_tls_tests.txt 15 go run make_legacy_aead_tests.go -cipher aes256 -mac sha384 > aes_256_cbc_sha384_tls_tests.txt 17 go run make_legacy_aead_tests.go -cipher 3des -mac sha1 > des_ede3_cbc_sha1_tls_tests.txt [all …]
|
/external/skia/gyp/ |
D | views.gyp | 71 '../src/views/mac/SkEventNotifier.h', 72 '../src/views/mac/SkEventNotifier.mm', 73 '../src/views/mac/SkTextFieldCell.h', 74 '../src/views/mac/SkTextFieldCell.m', 75 '../src/views/mac/SkNSView.h', 76 '../src/views/mac/SkNSView.mm', 77 '../src/views/mac/SkOSWindow_Mac.mm', 78 '../src/views/mac/skia_mac.mm', 90 [ 'skia_os == "mac" and skia_use_sdl == 0', { 101 '../src/views/mac/SkEventNotifier.h', [all …]
|
/external/autotest/server/cros/ |
D | chaos_dynamic_ap_list.conf | 9 wan mac = 68:7f:74:c7:f7:74 21 wan mac = c8:d7:19:06:1b:8e 34 wan mac = c8:d7:19:06:1b:8e 55 wan mac = 00:23:69:7e:bc:d2 68 wan mac = c0:c1:c0:42:e5:7d 78 wan mac = 98:fc:11:47:21:31 90 wan mac = 58:6d:8f:ff:18:71 103 wan mac = 58:6d:8f:ff:18:71 116 wan mac = 20:aa:4b:84:af:af 129 wan mac = 20:aa:4b:84:af:af [all …]
|
/external/google-breakpad/src/common/ |
D | common.gyp | 32 ['OS=="mac"', { 117 'mac/arch_utilities.cc', 118 'mac/arch_utilities.h', 119 'mac/bootstrap_compat.cc', 120 'mac/bootstrap_compat.h', 121 'mac/byteswap.h', 122 'mac/dump_syms.h', 123 'mac/dump_syms.mm', 124 'mac/file_id.cc', 125 'mac/file_id.h', [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/ |
D | MacOutputStream.java | 11 protected Mac mac; field in MacOutputStream 14 Mac mac) in MacOutputStream() argument 16 this.mac = mac; in MacOutputStream() 22 mac.update((byte)b); in write() 31 mac.update(b, off, len); in write() 36 byte[] res = new byte[mac.getMacSize()]; in getMac() 38 mac.doFinal(res, 0); in getMac()
|
D | MacInputStream.java | 12 protected Mac mac; field in MacInputStream 16 Mac mac) in MacInputStream() argument 19 this.mac = mac; in MacInputStream() 29 mac.update((byte)b); in read() 43 mac.update(b, off, n); in read() 50 return mac; in getMac()
|
/external/webrtc/webrtc/modules/video_capture/ |
D | video_capture.gypi | 71 ['OS=="mac"', { 73 'mac/qtkit/video_capture_qtkit.h', 74 'mac/qtkit/video_capture_qtkit.mm', 75 'mac/qtkit/video_capture_qtkit_info.h', 76 'mac/qtkit/video_capture_qtkit_info.mm', 77 'mac/qtkit/video_capture_qtkit_info_objc.h', 78 'mac/qtkit/video_capture_qtkit_info_objc.mm', 79 'mac/qtkit/video_capture_qtkit_objc.h', 80 'mac/qtkit/video_capture_qtkit_objc.mm', 81 'mac/qtkit/video_capture_qtkit_utility.h', [all …]
|
/external/tcpdump/tests/ |
D | sflow_multiple_counter_30_pdus.out | 13 deferred 0, late collision 0, excessive collision 0, mac trans error 0 14 carrier error 0, frames too long 0, mac receive errors 0, symbol errors 0 25 deferred 0, late collision 0, excessive collision 0, mac trans error 0 26 carrier error 0, frames too long 0, mac receive errors 0, symbol errors 0 37 deferred 0, late collision 0, excessive collision 0, mac trans error 0 38 carrier error 0, frames too long 0, mac receive errors 0, symbol errors 0 49 deferred 0, late collision 0, excessive collision 0, mac trans error 0 50 carrier error 0, frames too long 0, mac receive errors 0, symbol errors 0 61 deferred 0, late collision 0, excessive collision 0, mac trans error 0 62 carrier error 0, frames too long 0, mac receive errors 0, symbol errors 0 [all …]
|
/external/mmc-utils/3rdparty/hmac_sha/ |
D | hmac_sha2.c | 105 void hmac_sha224_final(hmac_sha224_ctx *ctx, unsigned char *mac, in hmac_sha224_final() argument 114 memcpy(mac, mac_temp, mac_size); in hmac_sha224_final() 119 unsigned char *mac, unsigned mac_size) in hmac_sha224() argument 125 hmac_sha224_final(&ctx, mac, mac_size); in hmac_sha224() 191 void hmac_sha256_final(hmac_sha256_ctx *ctx, unsigned char *mac, in hmac_sha256_final() argument 200 memcpy(mac, mac_temp, mac_size); in hmac_sha256_final() 205 unsigned char *mac, unsigned mac_size) in hmac_sha256() argument 211 hmac_sha256_final(&ctx, mac, mac_size); in hmac_sha256() 277 void hmac_sha384_final(hmac_sha384_ctx *ctx, unsigned char *mac, in hmac_sha384_final() argument 286 memcpy(mac, mac_temp, mac_size); in hmac_sha384_final() [all …]
|
D | hmac_sha2.h | 100 void hmac_sha224_final(hmac_sha224_ctx *ctx, unsigned char *mac, 104 unsigned char *mac, unsigned mac_size); 111 void hmac_sha256_final(hmac_sha256_ctx *ctx, unsigned char *mac, 115 unsigned char *mac, unsigned mac_size); 122 void hmac_sha384_final(hmac_sha384_ctx *ctx, unsigned char *mac, 126 unsigned char *mac, unsigned mac_size); 133 void hmac_sha512_final(hmac_sha512_ctx *ctx, unsigned char *mac, 137 unsigned char *mac, unsigned mac_size);
|
/external/wpa_supplicant_8/hostapd/logwatch/ |
D | hostapd | 29 if (my ($iface,$mac,$layer,$details) = ($line =~ /(.*?): STA (.*?) (.*?): (.*?)$/i)) { 34 $hostapd{$iface}->{$mac}->{$layer}->{$details}++; 43 foreach my $mac (sort keys %{$hostapd{$iface}}) { 44 print " Client MAC Address $mac:\n"; 45 foreach my $layer (sort keys %{$hostapd{$iface}->{$mac}}) { 47 foreach my $details (sort keys %{$hostapd{$iface}->{$mac}->{$layer}}) { 49 my $count = $hostapd{$iface}->{$mac}->{$layer}->{$details};
|
/external/libchrome/base/ |
D | base.gypi | 283 'mac/authorization_util.h', 284 'mac/authorization_util.mm', 285 'mac/bind_objc_block.h', 286 'mac/bundle_locations.h', 287 'mac/bundle_locations.mm', 288 'mac/call_with_eh_frame.cc', 289 'mac/call_with_eh_frame.h', 290 'mac/call_with_eh_frame_asm.S', 291 'mac/close_nocancel.cc', 292 'mac/cocoa_protocols.h', [all …]
|
/external/ppp/pppd/plugins/rp-pppoe/ |
D | plugin.c | 173 unsigned int mac[ETH_ALEN]; in PPPOEConnectDevice() local 176 &ses, &mac[0], &mac[1], &mac[2], in PPPOEConnectDevice() 177 &mac[3], &mac[4], &mac[5]) != 7) { in PPPOEConnectDevice() 182 conn->peerEth[i] = (unsigned char) mac[i]; in PPPOEConnectDevice() 386 unsigned int mac[6]; in pppoe_check_options() local 391 &mac[0], &mac[1], &mac[2], &mac[3], in pppoe_check_options() 392 &mac[4], &mac[5]) != 6) { in pppoe_check_options() 397 conn->req_peer_mac[i] = mac[i]; in pppoe_check_options()
|
/external/webrtc/webrtc/modules/video_render/ |
D | video_render.gypi | 124 ['OS=="mac"', { 126 'mac/cocoa_full_screen_window.h', 127 'mac/cocoa_render_view.h', 128 'mac/video_render_agl.h', 129 'mac/video_render_mac_carbon_impl.h', 130 'mac/video_render_mac_cocoa_impl.h', 131 'mac/video_render_nsopengl.h', 132 'mac/video_render_nsopengl.mm', 133 'mac/video_render_mac_cocoa_impl.mm', 134 'mac/video_render_agl.cc', [all …]
|
D | BUILD.gn | 93 "mac/cocoa_full_screen_window.h", 94 "mac/cocoa_full_screen_window.mm", 95 "mac/cocoa_render_view.h", 96 "mac/cocoa_render_view.mm", 97 "mac/video_render_agl.cc", 98 "mac/video_render_agl.h", 99 "mac/video_render_mac_carbon_impl.cc", 100 "mac/video_render_mac_carbon_impl.h", 101 "mac/video_render_mac_cocoa_impl.h", 102 "mac/video_render_mac_cocoa_impl.mm", [all …]
|
/external/boringssl/src/crypto/hmac/ |
D | hmac_test.cc | 107 uint8_t mac[EVP_MAX_MD_SIZE]; in TestHMAC() local 110 input.size(), mac, &mac_len) || in TestHMAC() 111 !t->ExpectBytesEqual(output.data(), output.size(), mac, mac_len)) { in TestHMAC() 120 !HMAC_Final(ctx.get(), mac, &mac_len) || in TestHMAC() 121 !t->ExpectBytesEqual(output.data(), output.size(), mac, mac_len)) { in TestHMAC() 129 !HMAC_Final(ctx.get(), mac, &mac_len) || in TestHMAC() 130 !t->ExpectBytesEqual(output.data(), output.size(), mac, mac_len)) { in TestHMAC() 146 if (!HMAC_Final(ctx.get(), mac, &mac_len) || in TestHMAC() 147 !t->ExpectBytesEqual(output.data(), output.size(), mac, mac_len)) { in TestHMAC()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_internal.c | 179 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) in crypto_hash_finish() argument 187 if (mac == NULL || len == NULL) { in crypto_hash_finish() 200 MD5Final(mac, &ctx->u.md5); in crypto_hash_finish() 209 SHA1Final(mac, &ctx->u.sha1); in crypto_hash_finish() 219 sha256_done(&ctx->u.sha256, mac); in crypto_hash_finish() 230 sha384_done(&ctx->u.sha384, mac); in crypto_hash_finish() 241 sha512_done(&ctx->u.sha512, mac); in crypto_hash_finish() 252 MD5Final(mac, &ctx->u.md5); in crypto_hash_finish() 261 MD5Update(&ctx->u.md5, mac, 16); in crypto_hash_finish() 262 MD5Final(mac, &ctx->u.md5); in crypto_hash_finish() [all …]
|
D | aes-omac1.c | 44 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_vector() argument 114 aes_encrypt(ctx, pad, mac); in omac1_aes_vector() 134 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_128_vector() argument 136 return omac1_aes_vector(key, 16, num_elem, addr, len, mac); in omac1_aes_128_vector() 152 int omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac) in omac1_aes_128() argument 154 return omac1_aes_128_vector(key, 1, &data, &data_len, mac); in omac1_aes_128() 170 int omac1_aes_256(const u8 *key, const u8 *data, size_t data_len, u8 *mac) in omac1_aes_256() argument 172 return omac1_aes_vector(key, 32, 1, &data, &data_len, mac); in omac1_aes_256()
|
D | sha256.c | 27 const u8 *addr[], const size_t *len, u8 *mac) in hmac_sha256_vector() argument 73 if (sha256_vector(1 + num_elem, _addr, _len, mac) < 0) in hmac_sha256_vector() 85 _addr[1] = mac; in hmac_sha256_vector() 87 return sha256_vector(2, _addr, _len, mac); in hmac_sha256_vector() 101 size_t data_len, u8 *mac) in hmac_sha256() argument 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha256()
|
D | sha1.c | 27 const u8 *addr[], const size_t *len, u8 *mac) in hmac_sha1_vector() argument 74 if (sha1_vector(1 + num_elem, _addr, _len, mac)) in hmac_sha1_vector() 86 _addr[1] = mac; in hmac_sha1_vector() 88 ret = sha1_vector(2, _addr, _len, mac); in hmac_sha1_vector() 104 u8 *mac) in hmac_sha1() argument 106 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha1()
|
/external/webrtc/webrtc/modules/desktop_capture/ |
D | desktop_capture.gypi | 43 "mac/desktop_configuration.h", 44 "mac/desktop_configuration.mm", 45 "mac/desktop_configuration_monitor.h", 46 "mac/desktop_configuration_monitor.cc", 47 "mac/full_screen_chrome_window_detector.cc", 48 "mac/full_screen_chrome_window_detector.h", 49 "mac/scoped_pixel_buffer_object.cc", 50 "mac/scoped_pixel_buffer_object.h", 51 "mac/window_list_utils.cc", 52 "mac/window_list_utils.h", [all …]
|
/external/boringssl/src/crypto/poly1305/ |
D | poly1305_test.cc | 35 std::vector<uint8_t> key, in, mac; in TestPoly1305() local 38 !t->GetBytes(&mac, "MAC")) { in TestPoly1305() 41 if (key.size() != 32 || mac.size() != 16) { in TestPoly1305() 52 if (!t->ExpectBytesEqual(out, 16, mac.data(), mac.size())) { in TestPoly1305() 63 if (!t->ExpectBytesEqual(out, 16, mac.data(), mac.size())) { in TestPoly1305()
|
/external/autotest/client/tests/kvm/tests/ |
D | nic_hotplug.py | 62 def nic_add(vm, model, netdev_id, mac, rom=None): argument 77 mac, nic_id) 112 mac = virt_utils.generate_mac_address(vm.instance, 1) 113 if not mac: 114 mac = "00:00:02:00:00:02" 116 device_id = nic_add(vm, "virtio", netdev_id, mac, romfile) 120 virt_test_utils.get_linux_ifname(session, mac)) 127 if not virt_utils.wait_for(lambda: (vm.address_cache.get(mac) is 130 ip = vm.address_cache.get(mac) 131 if not virt_utils.verify_ip_address_ownership(ip, mac):
|
/external/apache-harmony/crypto/src/test/impl/java/org/apache/harmony/crypto/tests/javax/crypto/ |
D | Mac_ImplTest.java | 83 protected void checkResult(Mac mac) throws InvalidKeyException, in checkResult() argument 85 assertEquals("Incorrect MacLength", mac.getMacLength(), 0); in checkResult() 90 mac.init(scs); in checkResult() 91 byte[] bb = mac.doFinal(); in checkResult() 93 mac.reset(); in checkResult() 94 bb = mac.doFinal(); in checkResult() 97 mac.init(null); in checkResult() 102 mac.init(null, null); in checkResult() 106 mac.init(scs, null); in checkResult() 107 mac.init(scs, parms); in checkResult() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
D | CBCBlockCipherMac.java | 16 private byte[] mac; field in CBCBlockCipherMac 99 mac = new byte[cipher.getBlockSize()]; in CBCBlockCipherMac() 128 cipher.processBlock(buf, 0, mac, 0); in update() 152 cipher.processBlock(buf, 0, mac, 0); in update() 160 cipher.processBlock(in, inOff, mac, 0); in update() 193 cipher.processBlock(buf, 0, mac, 0); in doFinal() 200 cipher.processBlock(buf, 0, mac, 0); in doFinal() 202 System.arraycopy(mac, 0, out, outOff, macSize); in doFinal()
|