/freebsd-11-stable/sys/dev/ath/ath_hal/ar5210/ |
H A D | ar5210_misc.c | 34 ar5210GetMacAddress(struct ath_hal *ah, uint8_t *mac) argument 38 OS_MEMCPY(mac, ahp->ah_macaddr, IEEE80211_ADDR_LEN); 42 ar5210SetMacAddress(struct ath_hal *ah, const uint8_t *mac) argument 46 OS_MEMCPY(ahp->ah_macaddr, mac, IEEE80211_ADDR_LEN);
|
/freebsd-11-stable/sys/dev/ath/ath_hal/ar5211/ |
H A D | ar5211_misc.c | 34 ar5211GetMacAddress(struct ath_hal *ah, uint8_t *mac) argument 38 OS_MEMCPY(mac, ahp->ah_macaddr, IEEE80211_ADDR_LEN); 42 ar5211SetMacAddress(struct ath_hal *ah, const uint8_t *mac) argument 46 OS_MEMCPY(ahp->ah_macaddr, mac, IEEE80211_ADDR_LEN);
|
/freebsd-11-stable/sys/mips/atheros/ |
H A D | ar724x_chip.c | 185 ar724x_chip_get_eth_pll(unsigned int mac, int speed) argument
|
H A D | ar934x_chip.c | 289 ar934x_chip_get_eth_pll(unsigned int mac, int speed) argument 304 printf("%s%d: invalid speed %d\n", __func__, mac, speed);
|
/freebsd-11-stable/sys/mips/rmi/dev/sec/ |
H A D | rmisec.c | 188 int mac = 0, cry = 0, sesn; local 236 if (mac) 238 mac = 1; 272 if (mac == 0 && cry == 0) 281 * XXX this routine should run a zero'd mac/encrypt key into context ram.
|
/freebsd-11-stable/contrib/netbsd-tests/net/arp/ |
H A D | t_arp.sh | 351 local mac=$2 353 pkt="Reply $ip is-at $mac, length 28" 360 local mac=$2 362 pkt="$mac > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806),"
|
/freebsd-11-stable/crypto/openssh/ |
H A D | kex.h | 29 #include "mac.h" 124 struct sshmac mac; member in struct:newkeys
|
/freebsd-11-stable/sys/dev/qlnx/qlnxe/ |
H A D | ecore_iov_api.h | 388 * @param mac 392 u8 *mac, int vfid); 399 * @param mac 403 u8 *mac, int vfid); 563 * @return OSAL_NULL if mac isn't forced; Otherwise, returns MAC. 788 static OSAL_INLINE void ecore_iov_bulletin_set_forced_mac(struct ecore_hwfn OSAL_UNUSED *p_hwfn, u8 OSAL_UNUSED *mac, int OSAL_UNUSED vfid) {} argument 789 static OSAL_INLINE enum _ecore_status_t ecore_iov_bulletin_set_mac(struct ecore_hwfn OSAL_UNUSED *p_hwfn, u8 OSAL_UNUSED *mac, OSAL_UNUSED int vfid) {return ECORE_INVAL;} argument
|
/freebsd-11-stable/tools/tools/crypto/ |
H A D | cryptotest.c | 40 * Run count iterations of a crypt+decrypt or mac operation on a buffer of 274 err(1, "malloc (mac)"); 278 sop.mac = alg->code; 332 cop.mac = 0; 350 cop.mac = 0; 372 cop.mac = ciphertext;
|
/freebsd-11-stable/secure/lib/libssh/ |
H A D | Makefile | 16 atomicio.c key.c dispatch.c mac.c uidswap.c uuencode.c misc.c utf8.c \
|
/freebsd-11-stable/sys/dev/bwi/ |
H A D | if_bwivar.h | 485 #define BWI_CREATE_MAC(mac, sc, id, rev) \ 487 BWI_CREATE_REGWIN(&(mac)->mac_regwin, \ 491 (mac)->mac_sc = (sc); \ 684 int bwi_bus_init(struct bwi_softc *, struct bwi_mac *mac);
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | ap_drv_ops.h | 229 const u8 *mac, int accepted, 234 return hapd->driver->set_radius_acl_auth(hapd->drv_priv, mac, accepted, 239 const u8 *mac) 244 return hapd->driver->set_radius_acl_expire(hapd->drv_priv, mac); 228 hostapd_drv_set_radius_acl_auth(struct hostapd_data *hapd, const u8 *mac, int accepted, u32 session_timeout) argument 238 hostapd_drv_set_radius_acl_expire(struct hostapd_data *hapd, const u8 *mac) argument
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_pax.c | 237 u8 *rpos, mac[EAP_PAX_MAC_LEN]; local 280 (u8 *) data->cid, data->cid_len, NULL, 0, mac) < 0) { 288 if (os_memcmp_const(pos, mac, EAP_PAX_MAC_LEN) != 0) { 292 mac, EAP_PAX_MAC_LEN);
|
H A D | eap_peap.c | 318 u8 *mac; local 339 mac = wpabuf_put(buf, 20); /* Compound_MAC */ 345 if (hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac) < 0) 347 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC", mac, SHA1_MAC_LEN); 401 u8 buf[61], mac[SHA1_MAC_LEN]; local 439 hmac_sha1(data->cmk, 20, buf, sizeof(buf), mac); 441 if (os_memcmp_const(mac, pos, SHA1_MAC_LEN) != 0) { 447 mac, SHA1_MAC_LEN);
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_pax.c | 308 u8 mac[EAP_PAX_MAC_LEN], icvbuf[EAP_PAX_ICV_LEN]; local 421 (u8 *) data->cid, data->cid_len, mac) < 0) { 427 if (os_memcmp_const(mac, pos, EAP_PAX_MAC_LEN) != 0) { 431 mac, EAP_PAX_MAC_LEN);
|
H A D | eap_server_psk.c | 218 u8 *pos, mac[EAP_PSK_MAC_LEN], *buf; local 309 if (omac1_aes_128(data->ak, buf, buflen, mac)) { 316 if (os_memcmp_const(mac, resp->mac_p, EAP_PSK_MAC_LEN) != 0) { 319 mac, EAP_PSK_MAC_LEN);
|
/freebsd-11-stable/sys/dev/netmap/ |
H A D | netmap_bdg.h | 86 uint64_t mac; /* the top 2 bytes are the epoch */ member in struct:nm_hash_ent
|
/freebsd-11-stable/usr.sbin/bhyve/ |
H A D | pci_virtio_net.c | 104 uint8_t mac[6]; member in struct:virtio_net_config 811 err = net_parsemac(vtopts, sc->vsc_config.mac); 829 net_genmac(pi, sc->vsc_config.mac); 883 ptr = &sc->vsc_config.mac[offset];
|
/freebsd-11-stable/tools/tools/ath/athratestats/ |
H A D | main.c | 205 ath_setsta(struct ath_ratestats *r, uint8_t *mac) argument 208 memcpy(&r->re.is_u.macaddr, mac, sizeof(r->re.is_u.macaddr));
|
/freebsd-11-stable/usr.sbin/bsnmpd/modules/snmp_wlan/ |
H A D | wlan_snmp.h | 79 uint8_t mac[IEEE80211_ADDR_LEN]; member in struct:wlan_mac_mac 282 struct wlan_mac_mac *wlan_mac_new_mac(const uint8_t *mac);
|
H A D | wlan_snmp.c | 1968 wlan_append_mac_index(&val->var, sub, wif->wname, macl->mac); 2003 return (string_get(val, macl->mac, IEEE80211_ADDR_LEN)); 3156 char *wname, uint8_t *mac) 3173 mac[i] = oid->subs[mac_off + i + 1]; 3179 wlan_append_mac_index(struct asn_oid *oid, uint sub, char *wname, uint8_t *mac) argument 3191 oid->subs[sub + i] = mac[i - 1]; 3892 wlan_mac_find_mac(struct wlan_iface *wif, uint8_t *mac) argument 3897 if (memcmp(wmm->mac, mac, IEEE80211_ADDR_LEN) == 0) 3904 wlan_mac_new_mac(const uint8_t *mac) argument 3155 wlan_mac_index_decode(const struct asn_oid *oid, uint sub, char *wname, uint8_t *mac) argument 3994 char mac[IEEE80211_ADDR_LEN]; local 4010 char mac[IEEE80211_ADDR_LEN]; local 4043 uint8_t mac[IEEE80211_ADDR_LEN]; local 4382 char mac[IEEE80211_ADDR_LEN]; local [all...] |
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | sha512-internal.c | 21 * @mac: Buffer for the hash 25 u8 *mac) 34 if (sha512_done(&ctx, mac)) 24 sha512_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
/freebsd-11-stable/sys/net80211/ |
H A D | ieee80211_proto.h | 234 const uint8_t mac[IEEE80211_ADDR_LEN]); 236 const uint8_t mac[IEEE80211_ADDR_LEN]);
|
/freebsd-11-stable/sys/dev/mwl/ |
H A D | if_mwl.c | 118 const uint8_t mac[IEEE80211_ADDR_LEN]); 245 #define KEYPRINTF(sc, hk, mac) do { \ 247 mwl_keyprint(sc, __func__, hk, mac); \ 255 #define KEYPRINTF(sc, k, mac) do { (void )sc; } while (0) 565 assign_address(struct mwl_softc *sc, uint8_t mac[IEEE80211_ADDR_LEN], int clone) argument 575 mac[0] |= (i << 2)|0x2; 584 reclaim_address(struct mwl_softc *sc, const uint8_t mac[IEEE80211_ADDR_LEN]) argument 586 int i = mac[0] >> 2; 602 uint8_t mac[IEEE80211_ADDR_LEN]; local 604 IEEE80211_ADDR_COPY(mac, mac 1485 mwl_keyprint(struct mwl_softc *sc, const char *tag, const MWL_HAL_KEYVAL *hk, const uint8_t mac[IEEE80211_ADDR_LEN]) argument 1613 _mwl_key_set(struct ieee80211vap *vap, const struct ieee80211_key *k, const uint8_t mac[IEEE80211_ADDR_LEN]) argument 2242 mwl_node_alloc(struct ieee80211vap *vap, const uint8_t mac[IEEE80211_ADDR_LEN]) argument 3894 mwl_setanywepkey(struct ieee80211vap *vap, const uint8_t mac[IEEE80211_ADDR_LEN]) argument [all...] |
/freebsd-11-stable/sys/sys/ |
H A D | sysproto.h | 1063 char mac_p_l_[PADL_(struct mac *)]; struct mac * mac_p; char mac_p_r_[PADR_(struct mac *)]; 1066 char mac_p_l_[PADL_(struct mac *)]; struct mac * mac_p; char mac_p_r_[PADR_(struct mac *)]; 1070 char mac_p_l_[PADL_(struct mac *)]; struct mac * mac_p; char mac_p_r_[PADR_(struct mac *)]; 1074 char mac_p_l_[PADL_(struct mac *)]; struc [all...] |