/freebsd-current/contrib/wpa/src/crypto/ |
H A D | crypto_linux.c | 60 u8 *mac, size_t mac_len) 102 res = recv(t, mac, mac_len, 0); 125 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 128 mac, 16); 132 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 135 mac, MD5_MAC_LEN); 140 u8 *mac) 143 mac, SHA1_MAC_LEN); 148 u8 *mac) 151 mac, SHA256_MAC_LE 57 linux_af_alg_hash_vector(const char *alg, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, size_t mac_len) argument 139 sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 147 sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 155 sha384_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 163 sha512_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 171 hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 179 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument 186 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 194 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument 201 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 209 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument 216 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 224 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument 348 crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument 757 omac1_aes_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 765 omac1_aes_128_vector(const u8 *key, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 772 omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac) argument 778 omac1_aes_256(const u8 *key, const u8 *data, size_t data_len, u8 *mac) argument [all...] |
/freebsd-current/sys/dev/e1000/ |
H A D | e1000_80003es2lan.c | 196 struct e1000_mac_info *mac = &hw->mac; local 204 mac->ops.check_for_link = e1000_check_for_serdes_link_generic; 205 mac->ops.setup_physical_interface = 210 mac->ops.check_for_link = e1000_check_for_copper_link_generic; 211 mac->ops.setup_physical_interface = 217 mac->mta_reg_count = 128; 219 mac->rar_entry_count = E1000_RAR_ENTRIES; 221 mac->asf_firmware_present = true; 223 mac 813 struct e1000_mac_info *mac = &hw->mac; local [all...] |
H A D | e1000_82575.c | 134 switch (hw->mac.type) { 203 switch (hw->mac.type) { 297 hw->mac.ops.check_for_link = 325 struct e1000_mac_info *mac = &hw->mac; local 336 mac->mta_reg_count = 128; 338 mac->uta_reg_count = (hw->mac.type == e1000_82575) ? 0 : 128; 340 mac->rar_entry_count = E1000_RAR_ENTRIES_82575; 341 if (mac 1202 struct e1000_mac_info *mac = &hw->mac; local 1364 struct e1000_mac_info *mac = &hw->mac; local [all...] |
/freebsd-current/sys/dev/ixgbe/ |
H A D | if_bypass.c | 127 if ((error = hw->mac.ops.bypass_rw(hw, cmd, &version) != 0)) 131 if ((error = hw->mac.ops.bypass_rw(hw, cmd, &version) != 0)) 164 error = hw->mac.ops.bypass_rw(hw, 185 if ((error = hw->mac.ops.bypass_set(hw, BYPASS_PAGE_CTL0, 189 error = hw->mac.ops.bypass_set(hw, BYPASS_PAGE_CTL0, 226 error = hw->mac.ops.bypass_rw(hw, BYPASS_PAGE_CTL0, &timeout); 249 error = hw->mac.ops.bypass_set(hw, BYPASS_PAGE_CTL0, 268 error = hw->mac.ops.bypass_rw(hw, BYPASS_PAGE_CTL0, &main_on); 291 error = hw->mac.ops.bypass_set(hw, BYPASS_PAGE_CTL0, 310 error = hw->mac [all...] |
/freebsd-current/crypto/openssl/test/helpers/ |
H A D | pkcs12.c | 38 static void generate_p12(PKCS12_BUILDER *pb, const PKCS12_ENC *mac); 41 static PKCS12 *from_bio_p12(BIO *bio, const PKCS12_ENC *mac); 42 static PKCS12 *read_p12(const char *infile, const PKCS12_ENC *mac); 43 static int check_p12_mac(PKCS12 *p12, const PKCS12_ENC *mac); 137 void end_pkcs12_with_mac(PKCS12_BUILDER *pb, const PKCS12_ENC *mac) argument 141 generate_p12(pb, mac); 146 static void generate_p12(PKCS12_BUILDER *pb, const PKCS12_ENC *mac) argument 169 if (mac != NULL) { 171 md = (EVP_MD *)EVP_get_digestbynid(mac->nid); 173 md = EVP_MD_fetch(test_ctx, OBJ_nid2sn(mac 209 from_bio_p12(BIO *bio, const PKCS12_ENC *mac) argument 238 read_p12(const char *infile, const PKCS12_ENC *mac) argument 262 check_p12_mac(PKCS12 *p12, const PKCS12_ENC *mac) argument 680 start_check_pkcs12_with_mac(PKCS12_BUILDER *pb, const PKCS12_ENC *mac) argument 720 start_check_pkcs12_file_with_mac(PKCS12_BUILDER *pb, const PKCS12_ENC *mac) argument [all...] |
H A D | pkcs12.h | 73 void end_pkcs12_with_mac(PKCS12_BUILDER *pb, const PKCS12_ENC *mac); 88 void start_check_pkcs12_with_mac(PKCS12_BUILDER *pb, const PKCS12_ENC *mac); 90 void start_check_pkcs12_file_with_mac(PKCS12_BUILDER *pb, const PKCS12_ENC *mac);
|
/freebsd-current/contrib/tcpdump/ |
H A D | print-mptcp.c | 92 nd_uint64_t mac; member in struct:mp_join::__anon3651::__anon3653 96 nd_byte mac[20]; member in struct:mp_join::__anon3651::__anon3654 133 nd_uint64_t mac; member in struct:mp_add_addr::__anon3655::__anon3656 137 nd_uint64_t mac; member in struct:mp_add_addr::__anon3655::__anon3657 142 nd_uint64_t mac; member in struct:mp_add_addr::__anon3655::__anon3658 146 nd_uint64_t mac; member in struct:mp_add_addr::__anon3655::__anon3659 250 GET_BE_U_8(mpj->u.synack.mac), 256 for (i = 0; i < sizeof(mpj->u.ack.mac); ++i) 257 ND_PRINT("%02x", mpj->u.ack.mac[i]); 375 ND_PRINT(" hmac 0x%" PRIx64, GET_BE_U_8(add_addr->u.v4np.mac)); [all...] |
/freebsd-current/sys/gnu/dev/bwn/phy_n/ |
H A D | if_bwn_phy_n_ppr.c | 88 void bwn_ppr_clear(struct bwn_mac *mac, struct bwn_ppr *ppr) argument 96 void bwn_ppr_add(struct bwn_mac *mac, struct bwn_ppr *ppr, int diff) argument 106 void bwn_ppr_apply_max(struct bwn_mac *mac, struct bwn_ppr *ppr, uint8_t max) argument 116 void bwn_ppr_apply_min(struct bwn_mac *mac, struct bwn_ppr *ppr, uint8_t min) argument 126 uint8_t bwn_ppr_get_max(struct bwn_mac *mac, struct bwn_ppr *ppr) argument 139 bool bwn_ppr_load_max_from_sprom(struct bwn_mac *mac, struct bwn_ppr *ppr, argument 142 struct bwn_softc *sc = mac->mac_sc; 145 struct bwn_phy *phy = &mac->mac_phy; 157 if (bwn_nphy_get_core_power_info(mac, i, 159 BWN_ERRPRINTF(mac [all...] |
H A D | if_bwn_phy_n_tables.h | 95 struct bwn_mac *mac, bool ghz5, bool ext_lna); 209 uint32_t bwn_ntab_read(struct bwn_mac *mac, uint32_t offset); 210 void bwn_ntab_read_bulk(struct bwn_mac *mac, uint32_t offset, 212 void bwn_ntab_write(struct bwn_mac *mac, uint32_t offset, uint32_t value); 213 void bwn_ntab_write_bulk(struct bwn_mac *mac, uint32_t offset, 216 void bwn_nphy_tables_init(struct bwn_mac *mac); 218 const uint32_t *bwn_nphy_get_tx_gain_table(struct bwn_mac *mac); 220 const int16_t *bwn_ntab_get_rf_pwr_offset_table(struct bwn_mac *mac); 246 struct bwn_mac *mac, uint16_t field, uint8_t override);
|
/freebsd-current/tools/tools/net80211/w00t/libw00t/ |
H A D | w00t.c | 45 int str2mac(char *mac, char *str) argument 56 *mac++ = (char) macf[i]; 63 unsigned char *mac = m; local 65 mac[0], mac[1], mac[2], mac[3], mac[4], mac[5]); 226 int send_ack(int fd, char *mac) argument 252 set_iface_mac(char *iface, char *mac) argument [all...] |
/freebsd-current/sys/security/mac/ |
H A D | mac_process.c | 54 #include <sys/mac.h> 71 #include <security/mac/mac_framework.h> 72 #include <security/mac/mac_internal.h> 73 #include <security/mac/mac_policy.h> 134 mac_execve_enter(struct image_params *imgp, struct mac *mac_p) 137 struct mac mac; local 147 error = copyin(mac_p, &mac, sizeof(mac)); 151 error = mac_check_structmac_consistent(&mac); [all...] |
H A D | mac_framework.c | 61 * - The user MAC API, defined in mac.h, which allows user programs to query 65 * src/sys/security/mac. Sample policy modules may be found in 76 #include <sys/mac.h> 84 #include <security/mac/mac_framework.h> 85 #include <security/mac/mac_internal.h> 86 #include <security/mac/mac_policy.h> 91 SDT_PROVIDER_DEFINE(mac); variable 94 SDT_PROBE_DEFINE2(mac, , policy, modevent, "int", 96 SDT_PROBE_DEFINE1(mac, , policy, register, 98 SDT_PROBE_DEFINE1(mac, , polic 727 mac_check_structmac_consistent(const struct mac *mac) argument [all...] |
H A D | mac_label.c | 43 #include <security/mac/mac_framework.h> 44 #include <security/mac/mac_internal.h> 45 #include <security/mac/mac_policy.h>
|
H A D | mac_audit.c | 52 #include <security/mac/mac_framework.h> 53 #include <security/mac/mac_internal.h> 54 #include <security/mac/mac_policy.h>
|
/freebsd-current/crypto/openssl/crypto/poly1305/asm/ |
H A D | poly1305-mips.pl | 353 my ($ctx,$mac,$nonce) = ($a0,$a1,$a2); 398 dsrl $tmp0,$in0,8 # write mac value 401 sb $in0,0($mac) 403 sb $tmp0,1($mac) 405 sb $tmp1,2($mac) 407 sb $tmp2,3($mac) 409 sb $tmp3,4($mac) 411 sb $tmp0,5($mac) 413 sb $tmp1,6($mac) 415 sb $tmp2,7($mac) [all...] |
/freebsd-current/sys/dev/ath/ |
H A D | if_ath_keycache.c | 86 const HAL_KEYVAL *hk, const u_int8_t mac[IEEE80211_ADDR_LEN]) 101 printf(" mac %s", ether_sprintf(mac)); 123 HAL_KEYVAL *hk, const u_int8_t mac[IEEE80211_ADDR_LEN]) 143 KEYPRINTF(sc, k->wk_keyix+32, hk, mac); 145 return ath_hal_keyset(ah, k->wk_keyix+32, hk, mac); 154 KEYPRINTF(sc, k->wk_keyix, hk, mac); 155 return ath_hal_keyset(ah, k->wk_keyix, hk, mac); 166 KEYPRINTF(sc, k->wk_keyix, hk, mac); 167 return ath_hal_keyset(ah, k->wk_keyix, hk, mac); 85 ath_keyprint(struct ath_softc *sc, const char *tag, u_int ix, const HAL_KEYVAL *hk, const u_int8_t mac[IEEE80211_ADDR_LEN]) argument 122 ath_keyset_tkip(struct ath_softc *sc, const struct ieee80211_key *k, HAL_KEYVAL *hk, const u_int8_t mac[IEEE80211_ADDR_LEN]) argument 199 const u_int8_t *mac; local [all...] |
/freebsd-current/crypto/openssl/crypto/crmf/ |
H A D | crmf_pbm.c | 100 * mac identifies the algorithm and associated parameters of the MAC 104 if (!X509_ALGOR_set0(pbm->mac, OBJ_nid2obj(macnid), V_ASN1_UNDEF, NULL)) { 124 * |out| pointer to the computed mac, will be set on success 125 * |outlen| if not NULL, will set variable to the length of the mac on success 145 if (out == NULL || pbmp == NULL || pbmp->mac == NULL 146 || pbmp->mac->algorithm == NULL || msg == NULL || sec == NULL) { 196 * mac identifies the algorithm and associated parameters of the MAC 200 mac_nid = OBJ_obj2nid(pbmp->mac->algorithm); 226 if (pbmp != NULL && pbmp->mac != NULL) { 229 if (OBJ_obj2txt(buf, sizeof(buf), pbmp->mac [all...] |
/freebsd-current/sys/contrib/libsodium/src/libsodium/crypto_aead/xchacha20poly1305/sodium/ |
H A D | aead_xchacha20poly1305.c | 18 unsigned char *mac, 36 (c, mac, maclen_p, m, mlen, ad, adlen, nsec, npub2, k2); 75 const unsigned char *mac, 89 (m, nsec, c, clen, mac, ad, adlen, npub2, k2); 17 crypto_aead_xchacha20poly1305_ietf_encrypt_detached(unsigned char *c, unsigned char *mac, unsigned long long *maclen_p, const unsigned char *m, unsigned long long mlen, const unsigned char *ad, unsigned long long adlen, const unsigned char *nsec, const unsigned char *npub, const unsigned char *k) argument 71 crypto_aead_xchacha20poly1305_ietf_decrypt_detached(unsigned char *m, unsigned char *nsec, const unsigned char *c, unsigned long long clen, const unsigned char *mac, const unsigned char *ad, unsigned long long adlen, const unsigned char *npub, const unsigned char *k) argument
|
/freebsd-current/sys/contrib/libsodium/src/libsodium/include/sodium/ |
H A D | crypto_aead_chacha20poly1305.h | 64 unsigned char *mac, 79 const unsigned char *mac, 137 unsigned char *mac, 152 const unsigned char *mac,
|
H A D | crypto_box.h | 71 int crypto_box_detached(unsigned char *c, unsigned char *mac, 79 const unsigned char *mac, 109 int crypto_box_detached_afternm(unsigned char *c, unsigned char *mac, 115 const unsigned char *mac,
|
/freebsd-current/sys/contrib/libsodium/test/default/ |
H A D | box_easy2.c | 18 unsigned char *mac; local 41 mac = (unsigned char *) sodium_malloc(crypto_box_MACBYTES); 110 ret = crypto_box_detached(c, mac, m, (unsigned long long) mlen, nonce, 113 ret = crypto_box_detached(c, mac, m, (unsigned long long) mlen, nonce, 116 if (crypto_box_open_detached(m2, c, mac, (unsigned long long) mlen, nonce, 120 if (crypto_box_open_detached(m2, c, mac, (unsigned long long) mlen, nonce, 127 crypto_box_detached_afternm(c, mac, m, (unsigned long long) mlen, nonce, 129 if (crypto_box_open_detached_afternm(m2, c, mac, (unsigned long long) mlen, 139 sodium_free(mac);
|
/freebsd-current/contrib/wpa/src/fst/ |
H A D | fst_ctrl_iface.h | 36 int fst_read_peer_addr(const char *mac, u8 *peer_addr);
|
/freebsd-current/crypto/openssl/crypto/pkcs12/ |
H A D | p12_local.h | 18 PKCS12_MAC_DATA *mac; member in struct:PKCS12_st
|
/freebsd-current/sys/dev/bwn/ |
H A D | if_bwn_misc.h | 46 extern void bwn_dummy_transmission(struct bwn_mac *mac, int ofdm, int paon);
|
/freebsd-current/sys/dev/vnic/ |
H A D | thunder_bgx_var.h | 36 uint8_t mac[ETHER_ADDR_LEN]; member in struct:lmac
|