Home
last modified time | relevance | path

Searched refs:MAC (Results 1 – 25 of 114) sorted by relevance

12345

/external/boringssl/src/crypto/poly1305/
Dpoly1305_test.txt5 MAC = a8061dc1305136c6c22b8baf0c0127a9
12 MAC = 00000000000000000000000000000000
16 MAC = 36e5f6b5c5e06070f0efca96227a863e
20 MAC = f3477e7cd95417af89a6b8794c310cf0
24 MAC = 4541669a7eaaee61e708dc7cbcc5eb62
28 MAC = 03000000000000000000000000000000
32 MAC = 03000000000000000000000000000000
36 MAC = 05000000000000000000000000000000
40 MAC = 00000000000000000000000000000000
44 MAC = faffffffffffffffffffffffffffffff
[all …]
/external/llvm/unittests/Option/
DOptionParsingTest.cpp69 unsigned MAI, MAC; in TEST() local
70 InputArgList AL = T.ParseArgs(Args, MAI, MAC); in TEST()
112 unsigned MAI, MAC; in TEST() local
115 InputArgList AL = T.ParseArgs(Args, MAI, MAC, in TEST()
123 AL = T.ParseArgs(Args, MAI, MAC, in TEST()
131 AL = T.ParseArgs(NewArgs, MAI, MAC); in TEST()
140 unsigned MAI, MAC; in TEST() local
143 InputArgList AL = T.ParseArgs(MyArgs, MAI, MAC); in TEST()
149 unsigned MAI, MAC; in TEST() local
152 InputArgList AL = T.ParseArgs(MyArgs, MAI, MAC); in TEST()
[all …]
/external/clang/test/CodeGenObjC/
Dmessages.m1 …ng_cc1 -fobjc-runtime=macosx-fragile-10.5 -emit-llvm -o - %s | FileCheck %s -check-prefix=CHECK-MAC
2 // RUN: %clang_cc1 -emit-llvm -o - %s | FileCheck %s -check-prefix=CHECK-MAC-NF
16 // CHECK-MAC: call {{.*}} @objc_msgSend to
17 // CHECK-MAC-NF: call {{.*}} @objc_msgSend to
22 // CHECK-MAC: call {{.*}} @objc_msgSend to
23 // CHECK-MAC-NF: call {{.*}} @objc_msgSend to
28 // CHECK-MAC: call {{.*}} @objc_msgSend to
29 // CHECK-MAC-NF: call {{.*}} @objc_msgSend to
34 // CHECK-MAC: call {{.*}} @objc_msgSend to
35 // CHECK-MAC-NF: call {{.*}} @objc_msgSend to
[all …]
/external/tcpdump/tests/
Ddcb_pfc.out15 Subtype MAC address (4): 08:00:27:42:ba:59
18 Subtype MAC address (3): 08:00:27:42:ba:59
49 Subtype MAC address (4): 08:00:27:42:ba:59
52 Subtype MAC address (3): 08:00:27:42:ba:59
83 Subtype MAC address (4): 08:00:27:0d:f1:3c
86 Subtype MAC address (3): 08:00:27:0d:f1:3c
117 Subtype MAC address (4): 08:00:27:0d:f1:3c
120 Subtype MAC address (3): 08:00:27:0d:f1:3c
Ddcb_ets.out16 Subtype MAC address (4): 08:00:27:0d:f1:3c
19 Subtype MAC address (3): 08:00:27:0d:f1:3c
113 Subtype MAC address (4): 08:00:27:0d:f1:3c
116 Subtype MAC address (3): 08:00:27:0d:f1:3c
197 Subtype MAC address (4): 08:00:27:0d:f1:3c
200 Subtype MAC address (3): 08:00:27:0d:f1:3c
295 Subtype MAC address (4): 08:00:27:42:ba:59
298 Subtype MAC address (3): 08:00:27:42:ba:59
350 Subtype MAC address (4): 08:00:27:42:ba:59
353 Subtype MAC address (3): 08:00:27:42:ba:59
[all …]
Ddcb_qcn.out27 Subtype MAC address (4): 08:00:27:42:ba:59
30 Subtype MAC address (3): 08:00:27:42:ba:59
58 Subtype MAC address (4): 08:00:27:42:ba:59
61 Subtype MAC address (3): 08:00:27:42:ba:59
101 Subtype MAC address (4): 08:00:27:0d:f1:3c
104 Subtype MAC address (3): 08:00:27:0d:f1:3c
141 Subtype MAC address (4): 08:00:27:0d:f1:3c
144 Subtype MAC address (3): 08:00:27:0d:f1:3c
211 Subtype MAC address (4): 08:00:27:42:ba:59
214 Subtype MAC address (3): 08:00:27:42:ba:59
[all …]
Dlldp_cdp-ev.out41 Subtype MAC address (4): 00:19:2f:a7:b2:8d
56 MAC/PHY configuration/status Subtype (1)
63 Subtype MAC address (4): 00:18:ba:98:68:8f
78 MAC/PHY configuration/status Subtype (1)
85 Subtype MAC address (4): 00:19:2f:a7:b2:8d
100 MAC/PHY configuration/status Subtype (1)
107 Subtype MAC address (4): 00:18:ba:98:68:8f
122 MAC/PHY configuration/status Subtype (1)
167 Subtype MAC address (4): 00:19:2f:a7:b2:8d
182 MAC/PHY configuration/status Subtype (1)
[all …]
/external/clang/test/Index/
Dpreamble-reparse-warn-macro.c8 #define MAC 1 macro
12 #define MAC 2 macro
/external/wpa_supplicant_8/hostapd/
Dhostapd.accept1 # List of MAC addresses that are allowed to authenticate (IEEE 802.11)
3 # MAC address if dynamic VLANs (hostapd.conf dynamic_vlan option) are used.
Dhostapd.wpa_psk2 # with #, must contain a MAC address and PSK separated with a space.
3 # Special MAC address 00:00:00:00:00:00 can be used to configure PSKs that
Dhostapd.deny1 # List of MAC addresses that are not allowed to authenticate (IEEE 802.11)
/external/libvncserver/examples/
DMakefile.am5 MAC=mac macro
24 vncev storepasswd colourmaptest simple simple15 $(MAC) \
/external/autotest/server/site_tests/network_WiFi_DarkResumeActiveScans/
Dcontrol20 (e.g. MAC addresses) to be broadcasted.
25 inevitably broadcasts MAC addresses.
30 broadcasting MAC addresses.
/external/iptables/extensions/
Dlibipt_CLUSTERIP.man2 a certain IP and MAC address without an explicit load balancer in front of
15 Specify the ClusterIP MAC address. Has to be a link\-layer multicast address
Dlibxt_mac.man3 Match source MAC address. It must be of the form XX:XX:XX:XX:XX:XX.
Dlibip6t_eui64.man2 It compares the EUI-64 derived from the source MAC address in Ethernet frame
/external/libgsm/src/
Dlpc.c305 # define STEP( A, B, MAC, MIC ) \ argument
310 *LAR = temp>MAC ? MAC - MIC : (temp<MIC ? 0 : temp - MIC); \
/external/wpa_supplicant_8/wpa_supplicant/
DREADME-P2P218 p2p_asp_provision <peer MAC address> <adv_id=peer adv id>
219 <adv_mac=peer MAC address> [role=2|4|1] <session=session id>
229 MAC address - Mandatory
232 adv_mac - Mandatory MAC address that owns/registered the service
237 session_mac - Mandatory MAC address that owns/initiated the session
245 <adv_mac=local MAC address> <role=1|2|4> <status=0>
246 <session=session id> <session_mac=peer MAC address>
254 MAC address - Mandatory
257 adv_mac - Mandatory MAC address that owns/registered the service
262 session_mac - Mandatory MAC address that owns/initiated the session
[all …]
/external/libnfc-nxp/src/
DphFriNfc_Llcp.c189 return phFriNfc_LlcpMac_Deactivate(&Llcp->MAC); in phFriNfc_Llcp_InternalDeactivate()
611 phFriNfc_LlcpMac_Receive(&Llcp->MAC, &Llcp->sRxBuffer, phFriNfc_Llcp_Receive_CB, Llcp); in phFriNfc_Llcp_HandleMACLinkActivated()
1048 phFriNfc_LlcpMac_Receive(&Llcp->MAC, &Llcp->sRxBuffer, phFriNfc_Llcp_Receive_CB, Llcp); in phFriNfc_Llcp_Receive_CB()
1121 &Llcp->MAC, in phFriNfc_Llcp_InternalSend()
1275 result = phFriNfc_LlcpMac_Reset(&Llcp->MAC, LowerDevice, phFriNfc_Llcp_LinkStatus_CB, Llcp); in phFriNfc_Llcp_Reset()
1320 …return phFriNfc_LlcpMac_ChkLlcp(&Llcp->MAC, psRemoteDevInfo, phFriNfc_Llcp_ChkLlcp_CB, (void*)Llcp… in phFriNfc_Llcp_ChkLlcp()
1345 return phFriNfc_LlcpMac_Activate(&Llcp->MAC); in phFriNfc_Llcp_Activate()
/external/llvm/lib/Target/ARM/
DARMScheduleV6.td240 // Single-precision FP MAC
243 // Double-precision FP MAC
246 // Single-precision Fused FP MAC
249 // Double-precision Fused FP MAC
/external/curl/tests/data/
Dtest32029 <TR><TD>MAC</TD><TD>SHA1</TD></TR>
78 <TR><TD>MAC</TD><TD>SHA1</TD></TR>
/external/dnsmasq/
DFAQ218 MAC address. The boot loader does not send a client-id. Then the OS
222 the MAC address has a static allocation, that address is still in
227 the static assignment to the client ID, not the MAC address. The
228 default client-id will be 01:<MAC address>, so change the dhcp-host
231 ignore client IDs for a particular MAC address, like this:
325 MAC address, which is associated with interface hardware. Once an
326 IP is bound to the MAC address of one interface, it cannot be
327 associated with another MAC address until after the DHCP lease
329 identity rather than the MAC address. If you arrange for the same
337 involve setting client-IDs. It's possible to put more than one MAC
[all …]
/external/dnsmasq/contrib/lease-access/
DREADME3 For some specific application I needed to deny access to a MAC address
/external/autotest/server/site_tests/bluetooth_RegressionServer/
Dcontrol28 logging.info('Please provide Bluetooth device MAC addresses: '
/external/autotest/server/site_tests/network_WiFi_CSADisconnect/
Dcontrol15 disconnected right after receiving a CSA message. This is to make sure the MAC

12345