/freebsd-10.1-release/contrib/ipfilter/lib/ |
H A D | fill6bits.c | 14 void fill6bits(bits, msk) 16 u_int *msk; 19 msk[0] = 0; 20 msk[1] = 0; 21 msk[2] = 0; 22 msk[3] = 0; 26 msk[0] = 0xffffffff; 27 msk[1] = 0xffffffff; 28 msk[2] = 0xffffffff; 29 msk[ [all...] |
H A D | count6bits.c | 14 int count6bits(msk) 15 u_32_t *msk; 21 if (msk[k] == 0xffffffff) 24 for (j = msk[k]; j; j <<= 1)
|
H A D | buildopts.c | 19 u_32_t msk = 0; local 29 if (strcasecmp(s, io->on_name) || (msk & io->on_bit)) 35 msk |= io->on_bit;
|
H A D | optname.c | 20 u_long msk = 0; local 28 msk |= io->on_bit; 64 return msk;
|
/freebsd-10.1-release/contrib/ipfilter/ |
H A D | genmask.c | 12 int genmask(family, msk, mskp) 14 char *msk; 21 if (strchr(msk, '.') || strchr(msk, 'x') || strchr(msk, ':')) { 28 if (inet_pton(AF_INET6, msk, &mskp->in4) != 1) 33 if (inet_aton(msk, &mskp->in4) == 0) 44 bits = (int)strtol(msk, &endptr, 0);
|
H A D | radix_ipf.c | 1065 fill6bits(bits, msk) 1067 u_int *msk; 1070 msk[0] = 0; 1071 msk[1] = 0; 1072 msk[2] = 0; 1073 msk[3] = 0; 1077 msk[0] = 0xffffffff; 1078 msk[1] = 0xffffffff; 1079 msk[2] = 0xffffffff; 1080 msk[ [all...] |
/freebsd-10.1-release/sys/modules/msk/ |
H A D | Makefile | 3 .PATH: ${.CURDIR}/../../dev/msk
|
/freebsd-10.1-release/contrib/wpa/src/eap_common/ |
H A D | eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument 52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size]))
|
H A D | eap_gpsk_common.c | 111 u8 *msk, u8 *emsk, 168 os_memcpy(msk, pos, EAP_MSK_LEN); 190 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 218 msk, emsk, sk, *sk_len, 226 u8 *msk, u8 *emsk, 252 msk, emsk, sk, *sk_len, 270 * @msk: Buffer for 64-byte MSK 283 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 321 msk, emsk, sk, sk_len, 327 msk, ems 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 224 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_sim_common.h | 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 84 const u8 *nonce_s, const u8 *mk, u8 *msk, 94 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 112 u8 *msk, u8 *emsk) 119 const u8 *nonce_s, u8 *msk, 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
H A D | eap_fast_common.h | 102 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk);
|
H A D | eap_gpsk_common.h | 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
|
H A D | eap_psk_common.h | 70 u8 *msk, u8 *emsk);
|
H A D | eap_sim_common.c | 77 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) argument 90 os_memcpy(msk, pos, EAP_SIM_KEYING_DATA_LEN); 99 msk, EAP_SIM_KEYING_DATA_LEN); 109 const u8 *nonce_s, const u8 *mk, u8 *msk, 150 if (msk) { 151 os_memcpy(msk, buf, EAP_SIM_KEYING_DATA_LEN); 153 msk, EAP_SIM_KEYING_DATA_LEN); 278 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) 316 os_memcpy(msk, pos, EAP_MSK_LEN); 317 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': MSK", msk, EAP_MSK_LE 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 276 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
H A D | eap_sake_common.h | 86 u8 *tek, u8 *msk, u8 *emsk);
|
H A D | eap_fast_common.c | 145 void eap_fast_derive_eap_msk(const u8 *simck, u8 *msk) argument 154 msk, EAP_FAST_KEY_LEN); 156 msk, EAP_FAST_KEY_LEN);
|
H A D | eap_sake_common.c | 254 * @msk: Buffer for 64-byte MSK 260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 294 os_memcpy(msk, key_buf, EAP_MSK_LEN); 296 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN); 259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
/freebsd-10.1-release/contrib/ipfilter/ipsend/ |
H A D | ipsopt.c | 157 u_32_t msk = 0; local 165 if (strcasecmp(s, io->on_name) || (msk & io->on_bit)) 172 msk |= io->on_bit;
|
/freebsd-10.1-release/sys/contrib/ipfilter/netinet/ |
H A D | radix_ipf.c | 1065 fill6bits(bits, msk) 1067 u_int *msk; 1070 msk[0] = 0; 1071 msk[1] = 0; 1072 msk[2] = 0; 1073 msk[3] = 0; 1077 msk[0] = 0xffffffff; 1078 msk[1] = 0xffffffff; 1079 msk[2] = 0xffffffff; 1080 msk[ [all...] |
H A D | ip_htable.c | 1190 u_32_t msk, ips; local 1197 msk = iph->iph_v4_masks.imt4_active[i]; 1198 ips = addr->s_addr & msk; 1199 hv = IPE_V4_HASH_FN(ips, msk, iph->iph_size); 1202 (ipe->ipe_mask.in4_addr != msk) || 1397 i6addr_t *msk, ips; local 1404 msk = iph->iph_v6_masks.imt6_active + i; 1405 ips.i6[0] = addr->i6[0] & msk->i6[0]; 1406 ips.i6[1] = addr->i6[1] & msk->i6[1]; 1407 ips.i6[2] = addr->i6[2] & msk [all...] |
/freebsd-10.1-release/sys/contrib/octeon-sdk/ |
H A D | cvmx-atomic.h | 531 " or %[tmp], %[msk] \n" 537 : [msk] "r" (mask) 564 " or %[tmp], %[msk] \n" 570 : [msk] "r" (mask) 595 " nor %[msk], 0 \n" 598 " and %[tmp], %[msk] \n" 603 : [val] "+m" (*ptr), [tmp] "=&r" (tmp), [ret] "=&r" (ret), [msk] "+r" (mask) 628 " nor %[msk], 0 \n" 631 " and %[tmp], %[msk] \n" 636 : [val] "+m" (*ptr), [tmp] "=&r" (tmp), [ret] "=&r" (ret), [msk] " [all...] |
/freebsd-10.1-release/contrib/wpa/src/eap_peer/ |
H A D | eap_psk.c | 27 u8 msk[EAP_MSK_LEN]; member in struct:eap_psk_data 248 data->msk, data->emsk)) { 254 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 431 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
H A D | eap_sake.c | 26 u8 msk[EAP_MSK_LEN]; member in struct:eap_sake_data 243 (u8 *) &data->tek, data->msk, data->emsk); 448 os_memcpy(key, data->msk, EAP_MSK_LEN);
|
/freebsd-10.1-release/sys/kern/ |
H A D | sys_generic.c | 1147 int msk; local 1150 for (msk = 0; msk < 3; msk++) { 1151 if (ibits[msk] == NULL) 1153 if ((ibits[msk][idx] & bit) == 0) 1155 flags |= select_flags[msk]; 1167 int msk; local 1171 for (msk = 0; msk < [all...] |
/freebsd-10.1-release/sys/conf/ |
H A D | makeLINT.mk | 42 echo "nodevice msk" >> ${.TARGET}-NOIP
|