HomeSort by relevance Sort by last modified time
    Searched refs:u8 (Results 1 - 25 of 1166) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/src/common/
ieee802_11_common.h 20 const u8 *ssid;
21 const u8 *supp_rates;
22 const u8 *fh_params;
23 const u8 *ds_params;
24 const u8 *cf_params;
25 const u8 *tim;
26 const u8 *ibss_params;
27 const u8 *challenge;
28 const u8 *erp_info;
29 const u8 *ext_supp_rates
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
ieee802_11_common.h 20 u8 *ssid;
21 u8 ssid_len;
22 u8 *supp_rates;
23 u8 supp_rates_len;
24 u8 *fh_params;
25 u8 fh_params_len;
26 u8 *ds_params;
27 u8 ds_params_len;
28 u8 *cf_params;
29 u8 cf_params_len
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/
milenage.h 18 void milenage_generate(const u8 *opc, const u8 *amf, const u8 *k,
19 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
20 u8 *ck, u8 *res, size_t *res_len);
21 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts
    [all...]
  /external/wpa_supplicant/
ms_funcs.h 18 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
19 const u8 *username, size_t username_len,
20 const u8 *password, size_t password_len,
21 u8 *response);
22 void generate_nt_response_pwhash(const u8 *auth_challenge,
23 const u8 *peer_challenge,
24 const u8 *username, size_t username_len,
25 const u8 *password_hash,
26 u8 *response)
    [all...]
eap_psk_common.h 32 #define EAP_PSK_FLAGS_SET_T(t) ((u8) (t) << 6)
40 u8 code;
41 u8 identifier;
43 u8 type; /* EAP_TYPE_PSK */
44 u8 flags;
49 u8 code;
50 u8 identifier;
52 u8 type; /* EAP_TYPE_PSK */
53 u8 flags;
54 u8 rand_s[EAP_PSK_RAND_LEN]
    [all...]
aes_wrap.h 25 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher);
26 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain);
27 int omac1_aes_128_vector(const u8 *key, size_t num_elem,
28 const u8 *addr[], const size_t *len, u8 *mac);
29 int omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac)
    [all...]
crypto_none.c 21 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
26 void des_encrypt(const u8 *clear, const u8 *key, u8 *cypher)
eap_sake_common.h 54 u8 code;
55 u8 identifier;
57 u8 type; /* EAP_TYPE_SAKE */
58 u8 version; /* EAP_SAKE_VERSION */
59 u8 session_id;
60 u8 subtype;
69 const u8 *rand_s;
70 const u8 *rand_p;
71 const u8 *mic_s;
72 const u8 *mic_p
    [all...]
sha256.h 20 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
21 const u8 *addr[], const size_t *len, u8 *mac);
22 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
23 size_t data_len, u8 *mac);
24 void sha256_prf(const u8 *key, size_t key_len, const char *label,
25 const u8 *data, size_t data_len, u8 *buf, size_t buf_len);
  /external/wpa_supplicant_8/src/crypto/
milenage.h 18 void milenage_generate(const u8 *opc, const u8 *amf, const u8 *k,
19 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
20 u8 *ck, u8 *res, size_t *res_len);
21 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts
    [all...]
ms_funcs.h 18 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
19 const u8 *username, size_t username_len,
20 const u8 *password, size_t password_len,
21 u8 *response);
22 int generate_nt_response_pwhash(const u8 *auth_challenge,
23 const u8 *peer_challenge,
24 const u8 *username, size_t username_len,
25 const u8 *password_hash,
26 u8 *response)
    [all...]
aes_wrap.h 25 int __must_check aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher);
26 int __must_check aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain);
27 int __must_check omac1_aes_128_vector(const u8 *key, size_t num_elem,
28 const u8 *addr[], const size_t *len,
29 u8 *mac);
30 int __must_check omac1_aes_128(const u8 *key, const u8 *data, size_t data_len
    [all...]
crypto_none.c 21 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
27 void des_encrypt(const u8 *clear, const u8 *key, u8 *cypher)
sha256.h 20 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
21 const u8 *addr[], const size_t *len, u8 *mac);
22 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
23 size_t data_len, u8 *mac);
24 void sha256_prf(const u8 *key, size_t key_len, const char *label,
25 const u8 *data, size_t data_len, u8 *buf, size_t buf_len);
md5.h 20 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem,
21 const u8 *addr[], const size_t *len, u8 *mac);
22 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
23 u8 *mac);
25 int hmac_md5_vector_non_fips_allow(const u8 *key, size_t key_len,
26 size_t num_elem, const u8 *addr[],
27 const size_t *len, u8 *mac);
28 int hmac_md5_non_fips_allow(const u8 *key, size_t key_len, const u8 *data
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
ms_funcs.h 18 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
19 const u8 *username, size_t username_len,
20 const u8 *password, size_t password_len,
21 u8 *response);
22 void generate_nt_response_pwhash(const u8 *auth_challenge,
23 const u8 *peer_challenge,
24 const u8 *username, size_t username_len,
25 const u8 *password_hash,
26 u8 *response)
    [all...]
aes_wrap.h 25 int __must_check aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher);
26 int __must_check aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain);
27 int __must_check omac1_aes_128_vector(const u8 *key, size_t num_elem,
28 const u8 *addr[], const size_t *len,
29 u8 *mac);
30 int __must_check omac1_aes_128(const u8 *key, const u8 *data, size_t data_len
    [all...]
crypto_none.c 21 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac)
26 void des_encrypt(const u8 *clear, const u8 *key, u8 *cypher)
sha256.h 20 void hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
21 const u8 *addr[], const size_t *len, u8 *mac);
22 void hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
23 size_t data_len, u8 *mac);
24 void sha256_prf(const u8 *key, size_t key_len, const char *label,
25 const u8 *data, size_t data_len, u8 *buf, size_t buf_len);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
mschapv2.h 23 const u8 * mschapv2_remove_domain(const u8 *username, size_t *len);
24 void mschapv2_derive_response(const u8 *username, size_t username_len,
25 const u8 *password, size_t password_len,
27 const u8 *auth_challenge,
28 const u8 *peer_challenge,
29 u8 *nt_response, u8 *auth_response,
30 u8 *master_key);
31 int mschapv2_verify_auth_response(const u8 *auth_response
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.h 23 const u8 * mschapv2_remove_domain(const u8 *username, size_t *len);
24 int mschapv2_derive_response(const u8 *username, size_t username_len,
25 const u8 *password, size_t password_len,
27 const u8 *auth_challenge,
28 const u8 *peer_challenge,
29 u8 *nt_response, u8 *auth_response,
30 u8 *master_key);
31 int mschapv2_verify_auth_response(const u8 *auth_response
    [all...]
  /external/kernel-headers/original/linux/
l3g4200d.h 39 u8 ctrl_reg_1;
40 u8 ctrl_reg_2;
41 u8 ctrl_reg_3;
42 u8 ctrl_reg_4;
43 u8 ctrl_reg_5;
45 u8 int_config;
46 u8 int_source;
48 u8 int_th_x_h;
49 u8 int_th_x_l;
50 u8 int_th_y_h
    [all...]
  /dalvik/vm/mterp/c/
OP_USHR_LONG.cpp 1 HANDLE_OP_SHX_LONG(OP_USHR_LONG, "ushr", (u8), >>)
OP_USHR_LONG_2ADDR.cpp 1 HANDLE_OP_SHX_LONG_2ADDR(OP_USHR_LONG_2ADDR, "ushr", (u8), >>)
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ie.h 21 const u8 *wpa_ie;
23 const u8 *rsn_ie;
25 const u8 *pmkid;
26 const u8 *gtk;
28 const u8 *mac_addr;
31 const u8 *smk;
33 const u8 *nonce;
35 const u8 *lifetime;
37 const u8 *error;
41 const u8 *igtk
    [all...]

Completed in 593 milliseconds

1 2 3 4 5 6 7 8 91011>>