Lines Matching refs:MAC
1864 for (i=0; i<6; i++) *ptr++ = intf->MAC.b[0];
1876 // 0x16 Sender hardware address (our MAC address)
1877 for (i=0; i<6; i++) *ptr++ = intf->MAC.b[i];
1946 for (i=0; i<6; i++) *ptr++ = (tha ? *tha : intf->MAC).b[i];
1983 for (i=0; i<6; i++) *ptr++ = (tha ? *tha : intf->MAC).b[i];
1993 for (i=0; i<6; i++) *ptr++ = (tha ? *tha : intf->MAC).b[i];
2010 owner->u.owner.IMAC = intf->MAC;
2016 owner->optlen = DNSOpt_Owner_Space(&m->PrimaryMAC, &intf->MAC) - 4;
2095 LogSPS("NDP Announcement %2d Releasing traffic for H-MAC %.6a I-MAC %.6a %s",
2114 LogSPS("ARP Announcement %2d Capturing traffic for H-MAC %.6a I-MAC %.6a %s",
2120 LogSPS("NDP Announcement %2d Capturing traffic for H-MAC %.6a I-MAC %.6a %s",
2234 const int OwnerRecordSpace = (m->AnnounceOwner && intf->MAC.l[0]) ? DNSOpt_Header_Space + DNSOpt_Owner_Space(&m->PrimaryMAC, &intf->MAC) : 0;
2768 // Split MAC@IPAddress and pass them separately
3080 const int OwnerRecordSpace = (m->AnnounceOwner && intf->MAC.l[0]) ? DNSOpt_Header_Space + DNSOpt_Owner_Space(&m->PrimaryMAC, &intf->MAC) : 0;
3267 for (i=0; i<6; i++) *ptr++ = intf->MAC.b[0];
3284 // For Ethernet switches that don't flood-foward packets with unknown unicast destination MAC addresses,
4218 LogSPS("CheckProxyRecords: Removing %d H-MAC %.6a I-MAC %.6a %d %s",
4538 // On multi-threaded systems (like the current Mac OS 9 implementation) that are entirely timer-driven,
4585 // For now this AutoTunnel stuff is specific to Mac OS X.
4828 const int optspace = DNSOpt_Header_Space + DNSOpt_LeaseData_Space + DNSOpt_Owner_Space(&m->PrimaryMAC, &intf->MAC);
5676 LogSPS("ClearIdenticalProxyRecords: Removing %3d H-MAC %.6a I-MAC %.6a %d %d %s",
5708 LogSPS("NDP Announcement -- Releasing traffic for H-MAC %.6a I-MAC %.6a %s",
5713 LogSPS("ClearProxyRecords: Removing %3d AC %2d %02X H-MAC %.6a I-MAC %.6a %d %d %s",
5759 // Find owner sub-option(s). We verify that the MAC is non-zero, otherwise we could inadvertently
5760 // delete all our own AuthRecords (which are identified by having zero MAC tags on them).
6606 // Find owner sub-option(s). We verify that the MAC is non-zero, otherwise we could inadvertently
6607 // delete all our own AuthRecords (which are identified by having zero MAC tags on them).
7301 LogSPS("Received Update for H-MAC %.6a I-MAC %.6a Password %.6a seq %d", &owner.HMAC, &owner.IMAC, &owner.password, owner.seq);
10218 mDNSSameEthAddress(&arp->sha, &intf->MAC) ? msg3 : msg4;
10219 LogSPS("%-7s %s %.6a %.4a for %.4a -- H-MAC %.6a I-MAC %.6a %s",
10231 // We ignore ARPs we sent ourselves (Sender MAC address is our MAC address) because our own proxy ARPs do not constitute a conflict that we need to handle.
10235 if (mDNSSameEthAddress(&arp->sha, &intf->MAC))
10251 LogMsg("%-7s Conflicting ARP from %.6a %.4a for %.4a -- waking H-MAC %.6a I-MAC %.6a %s", intf->ifname,
10302 sha && mDNSSameEthAddress(sha, &intf->MAC) ? msg3 :
10304 LogSPS("%-7s %s %.6a %.16a for %.16a -- H-MAC %.6a I-MAC %.6a %s",
10318 if (mDNSSameEthAddress(sha, &intf->MAC))
10338 LogMsg("%-7s Conflicting NDP from %.6a %.16a for %.16a -- waking H-MAC %.6a I-MAC %.6a %s", intf->ifname,
10390 // For Back to My Mac UDP port 4500 (IPSEC) packets, we do some special handling
10456 LogMsg("Waking host at %s %#a H-MAC %.6a I-MAC %.6a for %s",