HomeSort by relevance Sort by last modified time
    Searched refs:u8 (Results 126 - 150 of 1382) sorted by null

1 2 3 4 56 7 8 91011>>

  /external/clang/test/Sema/
string-init.c 10 char a2[] = u8"a"; // No error.
16 wchar_t b2[] = u8"a"; // expected-error{{initializing wide char array with non-wide string literal}}
22 char16_t c2[] = u8"a"; // expected-error{{initializing wide char array with non-wide string literal}}
28 char32_t d2[] = u8"a"; // expected-error{{initializing wide char array with non-wide string literal}}
34 int e2[] = u8"a"; // expected-error{{initializing wide char array with non-wide string literal}}
40 long f2[] = u8"a"; // expected-error{{array initializer must be an initializer list}}}
  /external/wpa_supplicant_8/src/ap/
dpp_hostapd.h 20 void hostapd_dpp_rx_action(struct hostapd_data *hapd, const u8 *src,
21 const u8 *buf, size_t len, unsigned int freq);
22 void hostapd_dpp_tx_status(struct hostapd_data *hapd, const u8 *dst,
23 const u8 *data, size_t data_len, int ok);
25 hostapd_dpp_gas_req_handler(struct hostapd_data *hapd, const u8 *sa,
26 const u8 *query, size_t query_len);
sta_info.h 55 u8 op_class;
56 u8 pref;
57 u8 reason_code;
58 u8 num_channels;
59 u8 channels[];
70 u8 addr[6];
77 u8 supported_rates[WLAN_SUPP_RATES_MAX];
79 u8 qosinfo; /* Valid when WLAN_STA_WMM is set */
88 u8 my_nonce[WPA_NONCE_LEN];
89 u8 peer_nonce[WPA_NONCE_LEN]
    [all...]
neighbor_db.h 14 hostapd_neighbor_get(struct hostapd_data *hapd, const u8 *bssid,
16 int hostapd_neighbor_set(struct hostapd_data *hapd, const u8 *bssid,
20 int hostapd_neighbor_remove(struct hostapd_data *hapd, const u8 *bssid,
p2p_hostapd.h 16 int hostapd_p2p_set_noa(struct hostapd_data *hapd, u8 count, int start,
33 u8 * hostapd_eid_p2p_manage(struct hostapd_data *hapd, u8 *eid);
taxonomy.h 14 const u8 *ie, size_t ie_len);
17 const u8 *ie, size_t ie_len);
20 const u8 *ie, size_t ie_len);
mbo_ap.h 21 void mbo_ap_wnm_notification_req(struct hostapd_data *hapd, const u8 *addr,
22 const u8 *buf, size_t len);
40 const u8 *addr,
41 const u8 *buf, size_t len)
tkip_countermeasures.h 12 int michael_mic_failure(struct hostapd_data *hapd, const u8 *addr, int local);
  /external/wpa_supplicant_8/src/crypto/
sha1-prf.c 30 int sha1_prf(const u8 *key, size_t key_len, const char *label,
31 const u8 *data, size_t data_len, u8 *buf, size_t buf_len)
33 u8 counter = 0;
35 u8 hash[SHA1_MAC_LEN];
40 addr[0] = (u8 *) label;
aes-ccm.c 17 static void xor_aes_block(u8 *dst, const u8 *src)
28 static void aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce,
29 const u8 *aad, size_t aad_len, size_t plain_len,
30 u8 *x)
32 u8 aad_buf[2 * AES_BLOCK_SIZE];
33 u8 b[AES_BLOCK_SIZE];
64 static void aes_ccm_auth(void *aes, const u8 *data, size_t len, u8 *x)
84 static void aes_ccm_encr_start(size_t L, const u8 *nonce, u8 *a
    [all...]
dh_groups.h 14 const u8 *generator;
16 const u8 *prime;
18 const u8 *order;
md5.c 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem,
27 const u8 *addr[], const size_t *len, u8 *mac)
29 u8 k_pad[64]; /* padding - key XORd with ipad/opad */
30 u8 tk[16];
31 const u8 *_addr[6];
105 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
106 u8 *mac)
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new.h 164 u8 bssid[ETH_ALEN], unsigned int id);
166 u8 bssid[ETH_ALEN], unsigned int id);
175 int wpas_dbus_register_peer(struct wpa_supplicant *wpa_s, const u8 *dev_addr);
178 const u8 *dev_addr);
180 const u8 *dev_addr);
182 const u8 *dev_addr);
184 const u8 *dev_addr);
188 const u8 *dev_addr, int request,
193 const u8 *src, u16 dev_passwd_id,
194 u8 go_intent)
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_er.h 17 u8 addr[ETH_ALEN];
19 u8 uuid[WPS_UUID_LEN];
20 u8 pri_dev_type[8];
42 u8 uuid[WPS_UUID_LEN];
43 u8 pri_dev_type[8];
44 u8 wps_state;
45 u8 mac_addr[ETH_ALEN];
62 u8 sid[WPS_UUID_LEN];
72 u8 uuid[WPS_UUID_LEN];
80 u8 mac_addr[ETH_ALEN]; /* mac addr of network i.f. we use *
    [all...]
  /external/clang/test/Misc/
ast-dump-wchar.cpp 3 char c8[] = u8"test\0\\\"\t\a\b\234";
4 // CHECK: StringLiteral {{.*}} lvalue u8"test\000\\\"\t\a\b\234"
  /external/linux-kselftest/tools/testing/selftests/powerpc/pmu/ebb/
trace.h 19 u8 type;
20 u8 length;
21 u8 data[0];
29 u8 data[0];
  /external/syslinux/gpxe/src/include/gpxe/
eapol.h 65 u8 version;
68 u8 type;
74 u8 data[0];
87 u8 type;
ieee80211.h 303 u8 addr1[ETH_ALEN]; /**< Address 1 (immediate receiver) */
304 u8 addr2[ETH_ALEN]; /**< Address 2 (immediate sender) */
305 u8 addr3[ETH_ALEN]; /**< Address 3 (often "forward to") */
307 u8 data[0]; /**< Beginning of frame data */
326 u8 dsap; /**< Destination SAP ID */
327 u8 ssap; /**< Source SAP ID */
328 u8 ctrl; /**< Control information */
331 u8 oui[3]; /**< Organization code, usually 0 */
353 u8 addr1[ETH_ALEN]; /**< Address 1 (immediate receiver) */
354 u8 addr2[ETH_ALEN]; /**< Address 2 (immediate sender) *
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_wired_common.h 22 static const u8 pae_group_addr[ETH_ALEN] =
25 int wired_multicast_membership(int sock, int ifindex, const u8 *addr, int add);
26 int driver_wired_get_ssid(void *priv, u8 *ssid);
27 int driver_wired_get_bssid(void *priv, u8 *bssid);
  /external/wpa_supplicant_8/src/eap_peer/
tncc.h 18 u8 * tncc_copy_send_buf(struct tncc_data *tncc, u8 *pos);
32 const u8 *msg, size_t len);
34 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len);
  /external/wpa_supplicant_8/src/eap_server/
tncs.h 18 u8 * tncs_copy_send_buf(struct tncs_data *tncs, u8 *pos);
34 const u8 *msg, size_t len);
40 struct wpabuf * tncs_process_soh(const u8 *soh_tlv, size_t soh_tlv_len,
  /external/wpa_supplicant_8/src/tls/
x509v3.h 43 u8 *ip; /* iPAddress */
53 u8 serial_number[X509_MAX_SERIAL_NUM_LEN];
58 u8 *subject_dn;
63 u8 *public_key;
66 u8 *sign_value;
105 const u8 *cert_start;
107 const u8 *tbs_cert_start;
127 int x509_parse_algorithm_identifier(const u8 *buf, size_t len,
129 const u8 **next);
130 int x509_parse_name(const u8 *buf, size_t len, struct x509_name *name
    [all...]
  /external/clang/test/Lexer/
string_concat.cpp 12 const char* a = u8"abc" u"abc"; // expected-error {{unsupported non-standard concatenation of string literals}}
13 const char* b = u8"abc" U"abc"; // expected-error {{unsupported non-standard concatenation of string literals}}
14 const char* c = u8"abc" L"abc"; // expected-error {{unsupported non-standard concatenation of string literals}}
16 const char* d = u8"abc" uR"(abc)"; // expected-error {{unsupported non-standard concatenation of string literals}}
17 const char* e = u8"abc" UR"(abc)"; // expected-error {{unsupported non-standard concatenation of string literals}}
18 const char* f = u8"abc" LR"(abc)"; // expected-error {{unsupported non-standard concatenation of string literals}}
21 const char16_t* g = u"abc" u8"abc"; // expected-error {{unsupported non-standard concatenation of string literals}}
30 const char32_t* m = U"abc" u8"abc"; // expected-error {{unsupported non-standard concatenation of string literals}}
39 const wchar_t* s = L"abc" u8"abc"; // expected-error {{unsupported non-standard concatenation of string literals}}
  /external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.h 33 u8 addr[ETH_ALEN];
37 u8 supp_ie[80];
50 u8 psk[PMK_LEN];
57 int ibss_rsn_start(struct ibss_rsn *ibss_rsn, const u8 *addr);
58 void ibss_rsn_stop(struct ibss_rsn *ibss_rsn, const u8 *peermac);
59 int ibss_rsn_rx_eapol(struct ibss_rsn *ibss_rsn, const u8 *src_addr,
60 const u8 *buf, size_t len);
61 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
62 void ibss_rsn_handle_auth(struct ibss_rsn *ibss_rsn, const u8 *auth_frame,
mesh_rsn.h 17 u8 mgtk[WPA_TK_MAX_LEN];
19 u8 mgtk_key_id;
21 u8 igtk_key_id;
22 u8 igtk[WPA_TK_MAX_LEN];
34 void mesh_rsn_get_pmkid(struct mesh_rsn *rsn, struct sta_info *sta, u8 *pmkid);
38 const u8 *cat, struct wpabuf *buf);
40 struct ieee802_11_elems *elems, const u8 *cat,
41 const u8 *chosen_pmk,
42 const u8 *start, size_t elems_len);

Completed in 421 milliseconds

1 2 3 4 56 7 8 91011>>