/freebsd/contrib/wpa/src/pae/ |
H A D | ieee802_1x_key.c | 21 static void joint_two_mac(const u8 *mac1, const u8 *mac2, u8 *out) in joint_two_mac() argument 23 if (os_memcmp(mac1, mac2, ETH_ALEN) < 0) { in joint_two_mac() 25 os_memcpy(out + ETH_ALEN, mac2, ETH_ALEN); in joint_two_mac() 27 os_memcpy(out, mac2, ETH_ALEN); in joint_two_mac() 92 const u8 *mac2, u8 *cak, size_t cak_bytes) in ieee802_1x_cak_aes_cmac() argument 96 joint_two_mac(mac1, mac2, context); in ieee802_1x_cak_aes_cmac() 109 const u8 *mac2, const u8 *sid, in ieee802_1x_ckn_aes_cmac() argument 122 joint_two_mac(mac1, mac2, context + sid_bytes); in ieee802_1x_ckn_aes_cmac()
|
H A D | ieee802_1x_key.h | 13 const u8 *mac2, u8 *cak, size_t cak_bytes); 15 const u8 *mac2, const u8 *sid,
|
H A D | ieee802_1x_kay_i.h | 70 const u8 *mac2, u8 *cak, size_t cak_bytes); 72 const u8 *mac2, const u8 *sid, size_t sid_len, u8 *ckn);
|
/freebsd/sys/dev/qlxgbe/ |
H A D | ql_def.h | 276 #define QL_MAC_CMP(mac1, mac2) \ argument 277 ((((*(uint32_t *) mac1) == (*(uint32_t *) mac2) && \ 278 (*(uint16_t *)(mac1 + 4)) == (*(uint16_t *)(mac2 + 4)))) ? 0 : 1)
|
/freebsd/sys/dev/qlxge/ |
H A D | qls_def.h | 370 #define QL_MAC_CMP(mac1, mac2) \ argument 371 ((((*(uint32_t *) mac1) == (*(uint32_t *) mac2) && \ 372 (*(uint16_t *)(mac1 + 4)) == (*(uint16_t *)(mac2 + 4)))) ? 0 : 1)
|
/freebsd/sys/dev/wg/ |
H A D | wg_cookie.c | 222 bzero(macs->mac2, COOKIE_MAC_SIZE); in cookie_maker_mac() 248 /* If the mac2 is invalid, we want to send a cookie response */ in cookie_checker_validate_macs() 249 if (timingsafe_bcmp(our_macs.mac2, macs->mac2, COOKIE_MAC_SIZE) != 0) in cookie_checker_validate_macs() 252 /* If the mac2 is valid, we may want rate limit the peer. in cookie_checker_validate_macs() 299 blake2s_final(&state, macs->mac2); in macs_mac2()
|
H A D | wg_cookie.h | 24 uint8_t mac2[COOKIE_MAC_SIZE]; member
|
/freebsd/sys/dev/qlnx/qlnxe/ |
H A D | qlnx_def.h | 522 #define QL_MAC_CMP(mac1, mac2) \ argument 523 ((((*(uint32_t *) mac1) == (*(uint32_t *) mac2) && \ 524 (*(uint16_t *)(mac1 + 4)) == (*(uint16_t *)(mac2 + 4)))) ? 0 : 1)
|
/freebsd/sys/contrib/device-tree/src/arm/aspeed/ |
H A D | aspeed-bmc-qcom-dc-scm-v1.dts | 36 &mac2 {
|
H A D | aspeed-bmc-ufispace-ncplite.dts | 137 &mac2 {
|
H A D | aspeed-ast2600-evb.dts | 144 &mac2 {
|
H A D | aspeed-bmc-asus-x4tf.dts | 103 &mac2 {
|
H A D | aspeed-bmc-facebook-yosemite4.dts | 86 &mac2 {
|
H A D | aspeed-bmc-quanta-s6q.dts | 175 &mac2 {
|
H A D | aspeed-bmc-ibm-bonnell.dts | 549 &mac2 {
|
H A D | aspeed-bmc-opp-tacoma.dts | 171 &mac2 {
|
H A D | aspeed-bmc-facebook-bletchley.dts | 285 &mac2 {
|
H A D | aspeed-g6.dtsi | 250 mac2: ethernet@1e670000 { label
|
H A D | aspeed-bmc-ibm-system1.dts | 422 &mac2 {
|
H A D | aspeed-bmc-ibm-rainier.dts | 1691 &mac2 {
|
H A D | aspeed-bmc-ibm-blueridge.dts | 1643 &mac2 {
|
/freebsd/crypto/openssl/test/ |
H A D | evp_extra_test.c | 2457 unsigned char mac2[AES_BLOCK_SIZE]; in test_CMAC_keygen() local 2491 || !TEST_true(get_cmac_val(pkey, mac2)) in test_CMAC_keygen() 2492 || !TEST_mem_eq(mac, sizeof(mac), mac2, sizeof(mac2))) in test_CMAC_keygen()
|
/freebsd/contrib/tcsh/ |
H A D | Ported | 185 CONFIG : mac2 (-DPOSIX -DPOSIXJOBS)
|
H A D | host.defs | 434 hosttype: : "mac2"
|
/freebsd/sys/contrib/device-tree/src/arm/st/ |
H A D | stm32mp131.dtsi | 985 ethernet_mac2_address: mac2@ea {
|