HomeSort by: relevance | last modified time | path
    Searched refs:msk (Results 1 - 25 of 116) sorted by relevancy

1 2 3 4 5

  /src/external/bsd/ipf/dist/lib/
fill6bits.c 14 void fill6bits(bits, msk)
16 u_int *msk;
19 msk[0] = 0;
20 msk[1] = 0;
21 msk[2] = 0;
22 msk[3] = 0;
26 msk[0] = 0xffffffff;
27 msk[1] = 0xffffffff;
28 msk[2] = 0xffffffff;
29 msk[3] = 0xffffffff
    [all...]
count6bits.c 14 int count6bits(msk)
15 u_32_t *msk;
21 if (msk[k] == 0xffffffff)
24 for (j = msk[k]; j; j <<= 1)
genmask.c 14 int genmask(family, msk, mskp)
16 char *msk;
23 if (strchr(msk, '.') || strchr(msk, 'x') || strchr(msk, ':')) {
30 if (inet_pton(AF_INET6, msk, &mskp->in4) != 1)
35 if (inet_aton(msk, &mskp->in4) == 0)
46 bits = (int)strtol(msk, &endptr, 0);
buildopts.c 19 u_32_t msk = 0; local
29 if (strcasecmp(s, io->on_name) || (msk & io->on_bit))
35 msk |= io->on_bit;
optname.c 20 u_long msk = 0; local
28 msk |= io->on_bit;
64 return msk;
  /src/external/bsd/ntp/dist/include/
ntp_psl.h 17 u_int32 msk; member in struct:psl_item_tag
  /src/external/bsd/wpa/dist/wpa_supplicant/
wpas_kay.c 274 u8 *msk, size_t *len)
289 "Failed to get MSK from EAPOL state machines");
295 os_memcpy(msk, key, keylen);
309 struct mka_key *msk; local
319 msk = os_zalloc(sizeof(*msk));
322 if (!msk || !ckn || !cak)
325 msk->len = DEFAULT_KEY_LEN;
326 if (ieee802_1x_auth_get_msk(wpa_s, wpa_s->bssid, msk->key, &msk->len))
    [all...]
  /src/external/bsd/wpa/dist/src/pae/
ieee802_1x_key.h 12 int ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1,
14 int ieee802_1x_ckn_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1,
ieee802_1x_key.c 91 int ieee802_1x_cak_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1,
97 return aes_kdf(msk, 8 * msk_bytes, "IEEE8021 EAP CAK",
108 int ieee802_1x_ckn_aes_cmac(const u8 *msk, size_t msk_bytes, const u8 *mac1,
124 res = aes_kdf(msk, 8 * msk_bytes, "IEEE8021 EAP CKN",
  /src/external/bsd/wpa/dist/src/ap/
wpa_auth_kay.c 357 struct sta_info *sta, u8 *msk, size_t *len)
368 "MACsec: Failed to get MSK from EAPOL state machines");
373 wpa_hexdump_key(MSG_DEBUG, "MSK: ", key, keylen);
377 os_memcpy(msk, key, keylen);
391 struct mka_key *msk; local
401 msk = os_zalloc(sizeof(*msk));
404 if (!msk || !ckn || !cak)
407 msk->len = DEFAULT_KEY_LEN;
408 if (ieee802_1x_auth_get_msk(hapd, sta, msk->key, &msk->len))
    [all...]
  /src/sys/arch/powerpc/marvell/
pic_discovery.c 136 int irq, base, msk; local
148 for (irq = base, msk = 0x00000001; !(cause & msk); irq++, msk <<= 1);
216 int irq, msk, base; local
226 for (irq = base, msk = (1 << base); !(cause & msk); irq++, msk <<= 1);
  /src/external/bsd/wpa/dist/src/eap_common/
eap_psk_common.c 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
eap_sim_common.h 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
84 const u8 *nonce_s, const u8 *mk, u8 *msk,
94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
112 u8 *msk, u8 *emsk)
119 const u8 *nonce_s, u8 *msk,
eap_gpsk_common.c 112 u8 *msk, u8 *emsk,
168 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN);
169 os_memcpy(msk, pos, EAP_MSK_LEN);
191 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
204 * MSK = GKDF-160 (MK, inputString)[0..63]
219 msk, emsk, sk, *sk_len,
227 u8 *msk, u8 *emsk,
240 * MSK = GKDF-160 (MK, inputString)[0..63]
253 msk, emsk, sk, *sk_len,
271 * @msk: Buffer for 64-byte MS
    [all...]
eap_fast_common.h 102 int eap_fast_derive_eap_msk(const u8 *simck, u8 *msk);
eap_gpsk_common.h 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
eap_psk_common.h 70 u8 *msk, u8 *emsk);
eap_sim_common.c 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk)
90 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN);
98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
99 msk, EAP_SIM_KEYING_DATA_LEN);
109 const u8 *nonce_s, const u8 *mk, u8 *msk,
150 if (msk) {
151 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN);
152 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
153 msk, EAP_SIM_KEYING_DATA_LEN);
277 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk
    [all...]
  /src/sys/dev/usb/
uep.c 385 u_char msk; local
440 msk = 0x1f;
443 msk = 0x3f;
446 msk = 0x7f;
449 msk = 0x0f; /* H=0, L=0 */
451 x = uep_adjust(((p[3] & msk) << 7) | p[4], X_OFFSET, X_RATIO);
452 y = uep_adjust(((p[1] & msk) << 7) | p[2], Y_OFFSET, Y_RATIO);
  /src/external/bsd/ipf/dist/ipsend/
ipsopt.c 157 u_32_t msk = 0; local
165 if (strcasecmp(s, io->on_name) || (msk & io->on_bit))
172 msk |= io->on_bit;
  /src/sys/external/bsd/ipf/netinet/
radix_ipf.c 1038 fill6bits(bits, msk)
1040 u_int *msk;
1043 msk[0] = 0;
1044 msk[1] = 0;
1045 msk[2] = 0;
1046 msk[3] = 0;
1050 msk[0] = 0xffffffff;
1051 msk[1] = 0xffffffff;
1052 msk[2] = 0xffffffff;
1053 msk[3] = 0xffffffff
    [all...]
ip_htable.c 1131 u_32_t msk, ips; local
1138 msk = iph->iph_v4_masks.imt4_active[i];
1139 ips = addr->s_addr & msk;
1140 hv = IPE_V4_HASH_FN(ips, msk, iph->iph_size);
1143 (ipe->ipe_mask.in4_addr != msk) ||
1329 i6addr_t *msk, ips; local
1336 msk = iph->iph_v6_masks.imt6_active + i;
1337 ips.i6[0] = addr->i6[0] & msk->i6[0];
1338 ips.i6[1] = addr->i6[1] & msk->i6[1];
1339 ips.i6[2] = addr->i6[2] & msk->i6[2]
    [all...]
  /src/external/bsd/ipf/dist/
radix_ipf.c 1067 fill6bits(bits, msk)
1069 u_int *msk;
1072 msk[0] = 0;
1073 msk[1] = 0;
1074 msk[2] = 0;
1075 msk[3] = 0;
1079 msk[0] = 0xffffffff;
1080 msk[1] = 0xffffffff;
1081 msk[2] = 0xffffffff;
1082 msk[3] = 0xffffffff
    [all...]
ip_htable.c 1190 u_32_t msk, ips; local
1197 msk = iph->iph_v4_masks.imt4_active[i];
1198 ips = addr->s_addr & msk;
1199 hv = IPE_V4_HASH_FN(ips, msk, iph->iph_size);
1202 (ipe->ipe_mask.in4_addr != msk) ||
1397 i6addr_t *msk, ips; local
1404 msk = iph->iph_v6_masks.imt6_active + i;
1405 ips.i6[0] = addr->i6[0] & msk->i6[0];
1406 ips.i6[1] = addr->i6[1] & msk->i6[1];
1407 ips.i6[2] = addr->i6[2] & msk->i6[2]
    [all...]
  /src/tests/lib/libc/gen/
t_fpsetmask.c 345 fp_except_t msk, lst[] = { FP_X_INV, FP_X_DZ, FP_X_OFL, FP_X_UFL }; local
349 msk = fpgetmask();
351 fpsetmask(msk | lst[i]);
353 fpsetmask(msk & ~lst[i]);

Completed in 25 milliseconds

1 2 3 4 5