/freebsd-current/crypto/openssl/providers/implementations/kdfs/ |
H A D | sskdf.c | 103 unsigned char mac[EVP_MAX_MD_SIZE]; local 145 if (!EVP_DigestFinal_ex(ctx, mac, NULL)) 147 memcpy(out, mac, len); 155 OPENSSL_cleanse(mac, sizeof(mac)); 226 unsigned char *mac = mac_buf, *kmac_buffer = NULL; local 237 mac = kmac_buffer; 243 if (out_len <= 0 || (mac == mac_buf && out_len > sizeof(mac_buf))) 267 if (!EVP_MAC_final(ctx, mac, NULL, out_len)) 269 memcpy(out, mac, le 370 EVP_MAC *mac = EVP_MAC_CTX_get0_mac(ctx->macctx); local [all...] |
/freebsd-current/sys/dev/bwi/ |
H A D | bwiphy.h | 67 #define PHY_WRITE(mac, ctrl, val) bwi_phy_write((mac), (ctrl), (val)) 68 #define PHY_READ(mac, ctrl) bwi_phy_read((mac), (ctrl)) 70 #define PHY_SETBITS(mac, ctrl, bits) \ 71 PHY_WRITE((mac), (ctrl), PHY_READ((mac), (ctrl)) | (bits)) 72 #define PHY_CLRBITS(mac, ctrl, bits) \ 73 PHY_WRITE((mac), (ctrl), PHY_READ((mac), (ctr [all...] |
/freebsd-current/tests/sys/mac/ipacl/ |
H A D | ipacl_test.sh | 54 sysctl security.mac.ipacl.ipv4=0 63 sysctl security.mac.ipacl.ipv4=1 64 sysctl security.mac.ipacl.rules= 75 sysctl security.mac.ipacl.rules="${rule}" 112 sysctl security.mac.ipacl.rules="${rule}" 134 sysctl security.mac.ipacl.rules= 165 sysctl security.mac.ipacl.ipv6=0 174 sysctl security.mac.ipacl.ipv6=1 175 sysctl security.mac.ipacl.rules= 186 sysctl security.mac [all...] |
/freebsd-current/sys/dev/mlx5/mlx5_core/ |
H A D | mlx5_eswitch.c | 219 esw_fdb_set_vport_rule(struct mlx5_eswitch *esw, u8 mac[ETH_ALEN], u32 vport) argument 241 ether_addr_copy(dmac_v, mac); 349 u8 *mac = vaddr->node.addr; local 353 esw_uc = l2addr_hash_find(hash, mac, struct esw_uc_addr); 356 "Failed to set L2 mac(%pM) for vport(%d), mac is already in use by vport(%d)\n", 357 mac, vport, esw_uc->vport); 361 esw_uc = l2addr_hash_add(hash, mac, struct esw_uc_addr, GFP_KERNEL); 366 err = mlx5_mpfs_add_mac(esw->dev, &esw_uc->table_index, mac, 0, 0); 371 vaddr->flow_rule = esw_fdb_set_vport_rule(esw, mac, vpor 385 u8 *mac = vaddr->node.addr; local 410 u8 *mac = vaddr->node.addr; local 441 u8 *mac = vaddr->node.addr; local 575 u8 mac[ETH_ALEN]; local 1185 node_guid_gen_from_mac(u64 *node_guid, u8 mac[ETH_ALEN]) argument 1197 mlx5_eswitch_set_vport_mac(struct mlx5_eswitch *esw, int vport, u8 mac[ETH_ALEN]) argument [all...] |
/freebsd-current/sys/contrib/dev/ath/ath_hal/ar9300/ |
H A D | ar9300_keycache.c | 135 * Sets the mac part of the specified key cache entry (and any 142 const u_int8_t *mac) 156 if (mac != AH_NULL) { 165 if (mac[0] & 0x01) { 169 mac_hi = (mac[5] << 8) | mac[4]; 170 mac_lo = (mac[3] << 24) | (mac[2] << 16) 171 | (mac[1] << 8) | mac[ 139 ar9300_set_key_cache_entry_mac( struct ath_hal *ah, u_int16_t entry, const u_int8_t *mac) argument 189 ar9300_set_key_cache_entry(struct ath_hal *ah, u_int16_t entry, const HAL_KEYVAL *k, const u_int8_t *mac, int xor_key) argument [all...] |
/freebsd-current/crypto/openssl/test/ |
H A D | cmactest.c | 39 const char *mac; member in struct:test_st 123 if (!TEST_str_eq(p, test[0].mac)) 133 if (!TEST_str_eq(p, test[1].mac)) 141 if (!TEST_str_eq(p, test[2].mac)) 149 if (!TEST_str_eq(p, test[2].mac)) 159 if (!TEST_str_eq(p, test[2].mac)) 189 if (!TEST_str_eq(p, test[0].mac))
|
/freebsd-current/contrib/netbsd-tests/crypto/opencrypto/ |
H A D | h_md5.c | 83 cs.mac = CRYPTO_MD5; 96 co.mac = buf; 101 if (memcmp(co.mac, tests[i].digest, sizeof(tests[i].digest)))
|
H A D | h_gcm.c | 65 cs.mac = CRYPTO_AES_128_GMAC; 83 co.mac = macbuf; 114 co.mac = macbuf;
|
/freebsd-current/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.c | 166 const u8 *mac, const u8 *extra, size_t extra_len) 173 if (mac == NULL || wpabuf_len(req) < EAP_SIM_MAC_LEN || 174 mac < wpabuf_head_u8(req) || 175 mac > wpabuf_head_u8(req) + wpabuf_len(req) - EAP_SIM_MAC_LEN) 188 os_memset(tmp + (mac - wpabuf_head_u8(req)), 0, EAP_SIM_MAC_LEN); 200 return (os_memcmp_const(hmac, mac, EAP_SIM_MAC_LEN) == 0) ? 0 : 1; 204 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument 217 os_memset(mac, 0, EAP_SIM_MAC_LEN); 224 os_memcpy(mac, hmac, EAP_SIM_MAC_LEN); 226 mac, EAP_SIM_MAC_LE 165 eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument 359 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument 398 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument 976 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg [all...] |
/freebsd-current/sys/dev/ath/ |
H A D | if_ath_debug.h | 101 #define KEYPRINTF(sc, ix, hk, mac) do { \ 103 ath_keyprint(sc, __func__, ix, hk, mac); \ 119 #define KEYPRINTF(sc, k, ix, mac) do { \
|
/freebsd-current/sys/security/mac/ |
H A D | mac_sysv_sem.c | 58 #include <security/mac/mac_framework.h> 59 #include <security/mac/mac_internal.h> 60 #include <security/mac/mac_policy.h>
|
H A D | mac_sysv_shm.c | 58 #include <security/mac/mac_framework.h> 59 #include <security/mac/mac_internal.h> 60 #include <security/mac/mac_policy.h>
|
/freebsd-current/crypto/openssh/ |
H A D | packet.c | 90 #include "mac.h" 408 struct sshmac *mac, size_t mac_already, u_int discard) 413 if (enc == NULL || !cipher_is_cbc(enc->cipher) || (mac && mac->etm)) { 419 * Record number of bytes over which the mac has already 422 if (mac && mac->enabled) { 423 state->packet_discard_mac = mac; 866 struct sshmac *mac; local 905 mac 407 ssh_packet_start_discard(struct ssh *ssh, struct sshenc *enc, struct sshmac *mac, size_t mac_already, u_int discard) argument 1081 struct sshmac *mac = NULL; local 1475 struct sshmac *mac = NULL; local 2278 struct sshmac *mac; local 2348 struct sshmac *mac; local [all...] |
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | crypto_wolfssl.c | 34 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 47 wc_Md4Final(&md4, mac); 53 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 66 wc_Md5Final(&md5, mac); 74 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 87 wc_ShaFinal(&sha, mac); 95 u8 *mac) 108 wc_Sha256Final(&sha256, mac); 117 u8 *mac) 130 wc_Sha384Final(&sha384, mac); 94 sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 116 sha384_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 138 sha512_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 159 wolfssl_hmac_vector(int type, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, unsigned int mdlen) argument 185 hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 193 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument 202 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 210 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument 219 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 227 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument 238 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 246 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument 257 hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 265 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument 941 crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument 968 omac1_aes_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 993 omac1_aes_128_vector(const u8 *key, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 1000 omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac) argument 1006 omac1_aes_256(const u8 *key, const u8 *data, size_t data_len, u8 *mac) argument [all...] |
H A D | aes_wrap.h | 27 const size_t *len, u8 *mac); 30 u8 *mac); 32 u8 *mac); 34 u8 *mac);
|
/freebsd-current/sys/contrib/libsodium/src/libsodium/crypto_secretbox/xchacha20poly1305/ |
H A D | secretbox_xchacha20poly1305.c | 20 unsigned char *mac, 68 crypto_onetimeauth_poly1305_final(&state, mac); 91 const unsigned char *mac, 104 if (crypto_onetimeauth_poly1305_verify(mac, c, clen, block0) != 0) { 19 crypto_secretbox_xchacha20poly1305_detached(unsigned char *c, unsigned char *mac, const unsigned char *m, unsigned long long mlen, const unsigned char *n, const unsigned char *k) argument 89 crypto_secretbox_xchacha20poly1305_open_detached(unsigned char *m, const unsigned char *c, const unsigned char *mac, unsigned long long clen, const unsigned char *n, const unsigned char *k) argument
|
/freebsd-current/sys/contrib/libsodium/src/libsodium/crypto_secretbox/ |
H A D | crypto_secretbox_easy.c | 17 crypto_secretbox_detached(unsigned char *c, unsigned char *mac, argument 64 crypto_onetimeauth_poly1305_final(&state, mac); 84 const unsigned char *mac, 97 if (crypto_onetimeauth_poly1305_verify(mac, c, clen, block0) != 0) { 83 crypto_secretbox_open_detached(unsigned char *m, const unsigned char *c, const unsigned char *mac, unsigned long long clen, const unsigned char *n, const unsigned char *k) argument
|
/freebsd-current/crypto/openssh/regress/ |
H A D | cipher-speed.sh | 24 for c in `${SSH} -Q cipher`; do n=0; for m in `${SSH} -Q mac`; do 25 trace "cipher $c mac $m" 34 fail "ssh failed with mac $m cipher $c"
|
/freebsd-current/sys/contrib/openzfs/include/sys/crypto/ |
H A D | api.h | 56 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac);
|
/freebsd-current/sys/contrib/openzfs/module/icp/api/ |
H A D | kcf_mac.c | 52 * CRYPTO_INVALID_MAC: bogus 'mac' argument. 66 * mac: Storage for the MAC. The length needed depends on the mechanism. 76 * When complete and successful, 'mac' will contain the message 85 crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac) 109 mac, spi_ctx_tmpl); 268 * mac: Storage for the message authentication code. 277 crypto_mac_final(crypto_context_t context, crypto_data_t *mac) argument 289 int rv = KCF_PROV_MAC_FINAL(pd, ctx, mac); 84 crypto_mac(crypto_mechanism_t *mech, crypto_data_t *data, crypto_key_t *key, crypto_ctx_template_t tmpl, crypto_data_t *mac) argument
|
/freebsd-current/crypto/openssl/doc/life-cycles/ |
H A D | Makefile | 1 GRAPHS=cipher.dot digest.dot kdf.dot mac.dot pkey.dot rand.dot
|
/freebsd-current/sys/opencrypto/ |
H A D | ktls.h | 43 struct tls_mac_data mac; member in union:ktls_ocf_encrypt_state::__anon6774
|
/freebsd-current/sys/security/mac_ntpd/ |
H A D | mac_ntpd.c | 35 #include <security/mac/mac_policy.h>
|
/freebsd-current/sys/security/mac_pimd/ |
H A D | mac_pimd.c | 36 #include <security/mac/mac_policy.h>
|
/freebsd-current/usr.sbin/setpmac/ |
H A D | setpmac.c | 37 #include <sys/mac.h>
|