| /src/external/bsd/tradcpp/dist/tests/ |
| t10.c | 1 #define mac(r)o macro 2 mac(3) 3 mac()
|
| /src/sys/arch/mac68k/mac68k/ |
| conf.c | 49 cons_decl(mac); variable 58 cons_init(mac),
|
| /src/sys/arch/arm/arm/ |
| bootconfig.c | 127 char mac[18]; local 130 strlcpy(mac, ptr, sizeof(mac)); 132 ETHER_ADDR_LEN, mac))
|
| /src/sys/dev/pci/igc/ |
| igc_base.c | 34 return hw->mac.ops.acquire_swfw_sync(hw, mask); 53 hw->mac.ops.release_swfw_sync(hw, mask); 65 struct igc_mac_info *mac = &hw->mac; local 66 uint16_t i, rar_count = mac->rar_entry_count; 76 for (i = 0; i < mac->mta_reg_count; i++) 81 for (i = 0; i < mac->uta_reg_count; i++) 85 ret_val = mac->ops.setup_link(hw);
|
| /src/sys/external/isc/libsodium/dist/test/default/ |
| secretbox_easy.c | 34 unsigned char *mac; local 38 mac = (unsigned char *) sodium_malloc(crypto_secretbox_MACBYTES); 39 assert(c != NULL && mac != NULL); 47 crypto_secretbox_detached(c, mac, m, 131, nonce, firstkey); 49 printf(",0x%02x", (unsigned int) mac[i]); 120 sodium_free(mac);
|
| secretbox_easy2.c | 13 unsigned char *mac; local 23 mac = (unsigned char *) sodium_malloc(crypto_secretbox_MACBYTES); 42 crypto_secretbox_detached(c, mac, m, (unsigned long long) mlen, nonce, k); 43 if (crypto_secretbox_open_detached(NULL, c, mac, (unsigned long long) mlen, 47 if (crypto_secretbox_open_detached(m2, c, mac, (unsigned long long) mlen, 69 sodium_free(mac);
|
| /src/crypto/external/apache2/openssl/dist/ssl/quic/ |
| quic_srt_gen.c | 14 EVP_MAC *mac; member in struct:quic_srt_gen_st 31 if ((srt_gen->mac = EVP_MAC_fetch(libctx, "HMAC", propq)) == NULL) 34 if ((srt_gen->mac_ctx = EVP_MAC_CTX_new(srt_gen->mac)) == NULL) 59 EVP_MAC_free(srt_gen->mac); 68 unsigned char mac[SHA256_DIGEST_LENGTH]; local 77 if (!EVP_MAC_final(srt_gen->mac_ctx, mac, &outl, sizeof(mac)) 78 || outl != sizeof(mac)) 81 assert(sizeof(mac) >= sizeof(token->token)); 82 memcpy(token->token, mac, sizeof(token->token)) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| cipher_overhead_test.c | 28 size_t mac, in, blk, ex; local 34 if (!TEST_true(ssl_cipher_get_overhead(ciph, &mac, &in, &blk, &ex))) { 39 ciph->name, mac, in, blk, ex);
|
| /src/tests/crypto/opencrypto/ |
| h_md5hmac.c | 48 unsigned char mac[16]; member in struct:__anon7790 155 cs.mac = CRYPTO_MD5_HMAC; 168 co.mac = buf; 173 if (memcmp(co.mac, tests[i].mac, sizeof(tests[i].mac)))
|
| h_sha1hmac.c | 48 unsigned char mac[20]; member in struct:__anon7791 165 cs.mac = CRYPTO_SHA1_HMAC; 178 co.mac = buf; 183 if (memcmp(co.mac, &tests[i].mac, sizeof(tests[i].mac)))
|
| h_sha2hmac.c | 48 unsigned char mac[80]; member in struct:__anon7792 241 cs.mac = tests[i].alg; 254 co.mac = buf; 260 if (memcmp(co.mac, &tests[i].mac, sizeof(tests[i].mac)))
|
| h_xcbcmac.c | 54 unsigned char mac[12]; member in struct:__anon7793 85 cs.mac = CRYPTO_AES_XCBC_MAC_96; 101 co.mac = buf; 105 if (memcmp(buf, &tests[i].mac, sizeof(tests[i].mac)))
|
| /src/crypto/external/apache2/openssl/dist/demos/mac/ |
| cmac-aes256.c | 81 /* The known value of the CMAC/AES256 MAC of the above soliloqy */ 102 * A property query used for selecting the MAC implementation. 110 EVP_MAC *mac = NULL; local 124 mac = EVP_MAC_fetch(library_context, "CMAC", propq); 125 if (mac == NULL) { 131 mctx = EVP_MAC_CTX_new(mac); 154 /* Make a call to the final with a NULL buffer to get the length of the MAC */ 164 /* Make one call to the final to get the MAC */ 170 printf("Generated MAC:\n"); 175 fprintf(stderr, "Generated MAC has an unexpected length\n") [all...] |
| gmac.c | 61 EVP_MAC *mac = NULL; local 75 mac = EVP_MAC_fetch(library_context, "GMAC", propq); 76 if (mac == NULL) { 82 mctx = EVP_MAC_CTX_new(mac); 117 /* Make one call to the final to get the MAC */ 123 printf("Generated MAC:\n"); 128 fprintf(stderr, "Generated MAC has an unexpected length\n"); 133 fprintf(stderr, "Generated MAC does not match expected value\n"); 140 EVP_MAC_free(mac);
|
| hmac-sha512.c | 113 /* The known value of the HMAC/SHA3-512 MAC of the above soliloqy */ 182 * A property query used for selecting the MAC implementation. 190 EVP_MAC *mac = NULL; local 205 mac = EVP_MAC_fetch(library_context, "HMAC", propq); 206 if (mac == NULL) { 212 mctx = EVP_MAC_CTX_new(mac); 235 /* Make a call to the final with a NULL buffer to get the length of the MAC */ 245 /* Make one call to the final to get the MAC */ 251 printf("Generated MAC:\n"); 256 fprintf(stderr, "Generated MAC has an unexpected length\n") [all...] |
| siphash.c | 48 EVP_MAC *mac = NULL; local 63 mac = EVP_MAC_fetch(library_context, "SIPHASH", propq); 64 if (mac == NULL) { 70 mctx = EVP_MAC_CTX_new(mac); 101 /* Make one call to the final to get the MAC */ 107 printf("Generated MAC:\n"); 112 fprintf(stderr, "Generated MAC has an unexpected length\n"); 117 fprintf(stderr, "Generated MAC does not match expected value\n"); 124 EVP_MAC_free(mac);
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| cipher_overhead_test.c | 37 size_t mac, in, blk, ex; local 47 if (!TEST_true(ssl_cipher_get_overhead(ciph, &mac, &in, &blk, &ex))) { 52 ciph->name, mac, in, blk, ex);
|
| /src/crypto/external/bsd/openssl/dist/demos/mac/ |
| cmac-aes256.c | 55 /* The known value of the CMAC/AES256 MAC of the above soliloqy */ 62 * A property query used for selecting the MAC implementation. 70 EVP_MAC *mac = NULL; local 84 mac = EVP_MAC_fetch(library_context, "CMAC", propq); 85 if (mac == NULL) { 91 mctx = EVP_MAC_CTX_new(mac); 114 /* Make a call to the final with a NULL buffer to get the length of the MAC */ 124 /* Make one call to the final to get the MAC */ 130 printf("Generated MAC:\n"); 135 fprintf(stderr, "Generated MAC has an unexpected length\n") [all...] |
| gmac.c | 61 EVP_MAC *mac = NULL; local 75 mac = EVP_MAC_fetch(library_context, "GMAC", propq); 76 if (mac == NULL) { 82 mctx = EVP_MAC_CTX_new(mac); 117 /* Make one call to the final to get the MAC */ 123 printf("Generated MAC:\n"); 128 fprintf(stderr, "Generated MAC has an unexpected length\n"); 133 fprintf(stderr, "Generated MAC does not match expected value\n"); 140 EVP_MAC_free(mac);
|
| hmac-sha512.c | 59 /* The known value of the HMAC/SHA3-512 MAC of the above soliloqy */ 72 * A property query used for selecting the MAC implementation. 80 EVP_MAC *mac = NULL; local 95 mac = EVP_MAC_fetch(library_context, "HMAC", propq); 96 if (mac == NULL) { 102 mctx = EVP_MAC_CTX_new(mac); 125 /* Make a call to the final with a NULL buffer to get the length of the MAC */ 135 /* Make one call to the final to get the MAC */ 141 printf("Generated MAC:\n"); 146 fprintf(stderr, "Generated MAC has an unexpected length\n") [all...] |
| siphash.c | 48 EVP_MAC *mac = NULL; local 63 mac = EVP_MAC_fetch(library_context, "SIPHASH", propq); 64 if (mac == NULL) { 70 mctx = EVP_MAC_CTX_new(mac); 101 /* Make one call to the final to get the MAC */ 107 printf("Generated MAC:\n"); 112 fprintf(stderr, "Generated MAC has an unexpected length\n"); 117 fprintf(stderr, "Generated MAC does not match expected value\n"); 124 EVP_MAC_free(mac);
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| cipher_overhead_test.c | 37 size_t mac, in, blk, ex; local 47 if (!TEST_true(ssl_cipher_get_overhead(ciph, &mac, &in, &blk, &ex))) { 52 ciph->name, mac, in, blk, ex);
|
| /src/external/bsd/wpa/dist/src/ap/ |
| comeback_token.c | 37 u8 mac[SHA256_MAC_LEN]; local 60 2, addrs, len, mac) < 0 || 61 os_memcmp_const(token + 2, &mac[2], SHA256_MAC_LEN - 2) != 0)
|
| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_pax_common.c | 18 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 35 u8 mac[SHA1_MAC_LEN]; local 60 if (hmac_sha1_vector(key, key_len, 3, addr, len, mac) < 0) 62 os_memcpy(pos, mac, clen); 72 * eap_pax_mac - EAP-PAX MAC 73 * @mac_id: MAC ID (EAP_PAX_MAC_*) / currently, only HMAC_SHA1_128 is supported 82 * @mac: Buffer for the MAC value (EAP_PAX_MAC_LEN = 16 bytes) 85 * Wrapper function to calculate EAP-PAX MAC. 91 u8 *mac) [all...] |
| /src/sys/arch/i386/stand/efiboot/ |
| efipxe.c | 34 EFI_MAC_ADDRESS mac; member in struct:efipxeinfo 92 memcmp(net->Mode->CurrentAddress.Addr, epi->mac.Addr, 109 memcpy(epi->mac.Addr, net->Mode->CurrentAddress.Addr, epi->addrsz); 126 printf("%c%02x", i == 0 ? ' ' : ':', epi->mac.Addr[i]); 132 efi_pxe_match_booted_interface(const EFI_MAC_ADDRESS *mac, UINT32 addrsz) 138 memcmp(mac->Addr, epi->mac.Addr, addrsz) == 0)
|