Searched refs:mac (Results 176 - 200 of 900) sorted by relevance

1234567891011>>

/freebsd-current/crypto/openssl/providers/implementations/kdfs/
H A Dsskdf.c103 unsigned char mac[EVP_MAX_MD_SIZE]; local
145 if (!EVP_DigestFinal_ex(ctx, mac, NULL))
147 memcpy(out, mac, len);
155 OPENSSL_cleanse(mac, sizeof(mac));
226 unsigned char *mac = mac_buf, *kmac_buffer = NULL; local
237 mac = kmac_buffer;
243 if (out_len <= 0 || (mac == mac_buf && out_len > sizeof(mac_buf)))
267 if (!EVP_MAC_final(ctx, mac, NULL, out_len))
269 memcpy(out, mac, le
370 EVP_MAC *mac = EVP_MAC_CTX_get0_mac(ctx->macctx); local
[all...]
/freebsd-current/sys/dev/bwi/
H A Dbwiphy.h67 #define PHY_WRITE(mac, ctrl, val) bwi_phy_write((mac), (ctrl), (val))
68 #define PHY_READ(mac, ctrl) bwi_phy_read((mac), (ctrl))
70 #define PHY_SETBITS(mac, ctrl, bits) \
71 PHY_WRITE((mac), (ctrl), PHY_READ((mac), (ctrl)) | (bits))
72 #define PHY_CLRBITS(mac, ctrl, bits) \
73 PHY_WRITE((mac), (ctrl), PHY_READ((mac), (ctr
[all...]
/freebsd-current/tests/sys/mac/ipacl/
H A Dipacl_test.sh54 sysctl security.mac.ipacl.ipv4=0
63 sysctl security.mac.ipacl.ipv4=1
64 sysctl security.mac.ipacl.rules=
75 sysctl security.mac.ipacl.rules="${rule}"
112 sysctl security.mac.ipacl.rules="${rule}"
134 sysctl security.mac.ipacl.rules=
165 sysctl security.mac.ipacl.ipv6=0
174 sysctl security.mac.ipacl.ipv6=1
175 sysctl security.mac.ipacl.rules=
186 sysctl security.mac
[all...]
/freebsd-current/sys/dev/mlx5/mlx5_core/
H A Dmlx5_eswitch.c219 esw_fdb_set_vport_rule(struct mlx5_eswitch *esw, u8 mac[ETH_ALEN], u32 vport) argument
241 ether_addr_copy(dmac_v, mac);
349 u8 *mac = vaddr->node.addr; local
353 esw_uc = l2addr_hash_find(hash, mac, struct esw_uc_addr);
356 "Failed to set L2 mac(%pM) for vport(%d), mac is already in use by vport(%d)\n",
357 mac, vport, esw_uc->vport);
361 esw_uc = l2addr_hash_add(hash, mac, struct esw_uc_addr, GFP_KERNEL);
366 err = mlx5_mpfs_add_mac(esw->dev, &esw_uc->table_index, mac, 0, 0);
371 vaddr->flow_rule = esw_fdb_set_vport_rule(esw, mac, vpor
385 u8 *mac = vaddr->node.addr; local
410 u8 *mac = vaddr->node.addr; local
441 u8 *mac = vaddr->node.addr; local
575 u8 mac[ETH_ALEN]; local
1185 node_guid_gen_from_mac(u64 *node_guid, u8 mac[ETH_ALEN]) argument
1197 mlx5_eswitch_set_vport_mac(struct mlx5_eswitch *esw, int vport, u8 mac[ETH_ALEN]) argument
[all...]
/freebsd-current/sys/contrib/dev/ath/ath_hal/ar9300/
H A Dar9300_keycache.c135 * Sets the mac part of the specified key cache entry (and any
142 const u_int8_t *mac)
156 if (mac != AH_NULL) {
165 if (mac[0] & 0x01) {
169 mac_hi = (mac[5] << 8) | mac[4];
170 mac_lo = (mac[3] << 24) | (mac[2] << 16)
171 | (mac[1] << 8) | mac[
139 ar9300_set_key_cache_entry_mac( struct ath_hal *ah, u_int16_t entry, const u_int8_t *mac) argument
189 ar9300_set_key_cache_entry(struct ath_hal *ah, u_int16_t entry, const HAL_KEYVAL *k, const u_int8_t *mac, int xor_key) argument
[all...]
/freebsd-current/crypto/openssl/test/
H A Dcmactest.c39 const char *mac; member in struct:test_st
123 if (!TEST_str_eq(p, test[0].mac))
133 if (!TEST_str_eq(p, test[1].mac))
141 if (!TEST_str_eq(p, test[2].mac))
149 if (!TEST_str_eq(p, test[2].mac))
159 if (!TEST_str_eq(p, test[2].mac))
189 if (!TEST_str_eq(p, test[0].mac))
/freebsd-current/contrib/netbsd-tests/crypto/opencrypto/
H A Dh_md5.c83 cs.mac = CRYPTO_MD5;
96 co.mac = buf;
101 if (memcmp(co.mac, tests[i].digest, sizeof(tests[i].digest)))
H A Dh_gcm.c65 cs.mac = CRYPTO_AES_128_GMAC;
83 co.mac = macbuf;
114 co.mac = macbuf;
/freebsd-current/contrib/wpa/src/eap_common/
H A Deap_sim_common.c166 const u8 *mac, const u8 *extra, size_t extra_len)
173 if (mac == NULL || wpabuf_len(req) < EAP_SIM_MAC_LEN ||
174 mac < wpabuf_head_u8(req) ||
175 mac > wpabuf_head_u8(req) + wpabuf_len(req) - EAP_SIM_MAC_LEN)
188 os_memset(tmp + (mac - wpabuf_head_u8(req)), 0, EAP_SIM_MAC_LEN);
200 return (os_memcmp_const(hmac, mac, EAP_SIM_MAC_LEN) == 0) ? 0 : 1;
204 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument
217 os_memset(mac, 0, EAP_SIM_MAC_LEN);
224 os_memcpy(mac, hmac, EAP_SIM_MAC_LEN);
226 mac, EAP_SIM_MAC_LE
165 eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
359 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
398 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument
976 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg
[all...]
/freebsd-current/sys/dev/ath/
H A Dif_ath_debug.h101 #define KEYPRINTF(sc, ix, hk, mac) do { \
103 ath_keyprint(sc, __func__, ix, hk, mac); \
119 #define KEYPRINTF(sc, k, ix, mac) do { \
/freebsd-current/sys/security/mac/
H A Dmac_sysv_sem.c58 #include <security/mac/mac_framework.h>
59 #include <security/mac/mac_internal.h>
60 #include <security/mac/mac_policy.h>
H A Dmac_sysv_shm.c58 #include <security/mac/mac_framework.h>
59 #include <security/mac/mac_internal.h>
60 #include <security/mac/mac_policy.h>
/freebsd-current/crypto/openssh/
H A Dpacket.c90 #include "mac.h"
408 struct sshmac *mac, size_t mac_already, u_int discard)
413 if (enc == NULL || !cipher_is_cbc(enc->cipher) || (mac && mac->etm)) {
419 * Record number of bytes over which the mac has already
422 if (mac && mac->enabled) {
423 state->packet_discard_mac = mac;
866 struct sshmac *mac; local
905 mac
407 ssh_packet_start_discard(struct ssh *ssh, struct sshenc *enc, struct sshmac *mac, size_t mac_already, u_int discard) argument
1081 struct sshmac *mac = NULL; local
1475 struct sshmac *mac = NULL; local
2278 struct sshmac *mac; local
2348 struct sshmac *mac; local
[all...]
/freebsd-current/contrib/wpa/src/crypto/
H A Dcrypto_wolfssl.c34 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
47 wc_Md4Final(&md4, mac);
53 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
66 wc_Md5Final(&md5, mac);
74 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
87 wc_ShaFinal(&sha, mac);
95 u8 *mac)
108 wc_Sha256Final(&sha256, mac);
117 u8 *mac)
130 wc_Sha384Final(&sha384, mac);
94 sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
116 sha384_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
138 sha512_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
159 wolfssl_hmac_vector(int type, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, unsigned int mdlen) argument
185 hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
193 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
202 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
210 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
219 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
227 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
238 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
246 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
257 hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
265 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
941 crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument
968 omac1_aes_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
993 omac1_aes_128_vector(const u8 *key, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
1000 omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac) argument
1006 omac1_aes_256(const u8 *key, const u8 *data, size_t data_len, u8 *mac) argument
[all...]
H A Daes_wrap.h27 const size_t *len, u8 *mac);
30 u8 *mac);
32 u8 *mac);
34 u8 *mac);
/freebsd-current/sys/contrib/libsodium/src/libsodium/crypto_secretbox/xchacha20poly1305/
H A Dsecretbox_xchacha20poly1305.c20 unsigned char *mac,
68 crypto_onetimeauth_poly1305_final(&state, mac);
91 const unsigned char *mac,
104 if (crypto_onetimeauth_poly1305_verify(mac, c, clen, block0) != 0) {
19 crypto_secretbox_xchacha20poly1305_detached(unsigned char *c, unsigned char *mac, const unsigned char *m, unsigned long long mlen, const unsigned char *n, const unsigned char *k) argument
89 crypto_secretbox_xchacha20poly1305_open_detached(unsigned char *m, const unsigned char *c, const unsigned char *mac, unsigned long long clen, const unsigned char *n, const unsigned char *k) argument
/freebsd-current/sys/contrib/libsodium/src/libsodium/crypto_secretbox/
H A Dcrypto_secretbox_easy.c17 crypto_secretbox_detached(unsigned char *c, unsigned char *mac, argument
64 crypto_onetimeauth_poly1305_final(&state, mac);
84 const unsigned char *mac,
97 if (crypto_onetimeauth_poly1305_verify(mac, c, clen, block0) != 0) {
83 crypto_secretbox_open_detached(unsigned char *m, const unsigned char *c, const unsigned char *mac, unsigned long long clen, const unsigned char *n, const unsigned char *k) argument
/freebsd-current/crypto/openssh/regress/
H A Dcipher-speed.sh24 for c in `${SSH} -Q cipher`; do n=0; for m in `${SSH} -Q mac`; do
25 trace "cipher $c mac $m"
34 fail "ssh failed with mac $m cipher $c"
/freebsd-current/sys/contrib/openzfs/include/sys/crypto/
H A Dapi.h56 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac);
/freebsd-current/sys/contrib/openzfs/module/icp/api/
H A Dkcf_mac.c52 * CRYPTO_INVALID_MAC: bogus 'mac' argument.
66 * mac: Storage for the MAC. The length needed depends on the mechanism.
76 * When complete and successful, 'mac' will contain the message
85 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac)
109 mac, spi_ctx_tmpl);
268 * mac: Storage for the message authentication code.
277 crypto_mac_final(crypto_context_t context, crypto_data_t *mac) argument
289 int rv = KCF_PROV_MAC_FINAL(pd, ctx, mac);
84 crypto_mac(crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac) argument
/freebsd-current/crypto/openssl/doc/life-cycles/
H A DMakefile1 GRAPHS=cipher.dot digest.dot kdf.dot mac.dot pkey.dot rand.dot
/freebsd-current/sys/opencrypto/
H A Dktls.h43 struct tls_mac_data mac; member in union:ktls_ocf_encrypt_state::__anon6774
/freebsd-current/sys/security/mac_ntpd/
H A Dmac_ntpd.c35 #include <security/mac/mac_policy.h>
/freebsd-current/sys/security/mac_pimd/
H A Dmac_pimd.c36 #include <security/mac/mac_policy.h>
/freebsd-current/usr.sbin/setpmac/
H A Dsetpmac.c37 #include <sys/mac.h>

Completed in 181 milliseconds

1234567891011>>