/external/clang/test/Sema/ |
string-init.c | 10 char a2[] = u8"a"; // No error. 16 wchar_t b2[] = u8"a"; // expected-error{{initializing wide char array with non-wide string literal}} 22 char16_t c2[] = u8"a"; // expected-error{{initializing wide char array with non-wide string literal}} 28 char32_t d2[] = u8"a"; // expected-error{{initializing wide char array with non-wide string literal}} 34 int e2[] = u8"a"; // expected-error{{initializing wide char array with non-wide string literal}} 40 long f2[] = u8"a"; // expected-error{{array initializer must be an initializer list}}}
|
/external/wpa_supplicant_8/src/ap/ |
dpp_hostapd.h | 20 void hostapd_dpp_rx_action(struct hostapd_data *hapd, const u8 *src, 21 const u8 *buf, size_t len, unsigned int freq); 22 void hostapd_dpp_tx_status(struct hostapd_data *hapd, const u8 *dst, 23 const u8 *data, size_t data_len, int ok); 25 hostapd_dpp_gas_req_handler(struct hostapd_data *hapd, const u8 *sa, 26 const u8 *query, size_t query_len);
|
sta_info.h | 55 u8 op_class; 56 u8 pref; 57 u8 reason_code; 58 u8 num_channels; 59 u8 channels[]; 70 u8 addr[6]; 77 u8 supported_rates[WLAN_SUPP_RATES_MAX]; 79 u8 qosinfo; /* Valid when WLAN_STA_WMM is set */ 88 u8 my_nonce[WPA_NONCE_LEN]; 89 u8 peer_nonce[WPA_NONCE_LEN] [all...] |
neighbor_db.h | 14 hostapd_neighbor_get(struct hostapd_data *hapd, const u8 *bssid, 16 int hostapd_neighbor_set(struct hostapd_data *hapd, const u8 *bssid, 20 int hostapd_neighbor_remove(struct hostapd_data *hapd, const u8 *bssid,
|
p2p_hostapd.h | 16 int hostapd_p2p_set_noa(struct hostapd_data *hapd, u8 count, int start, 33 u8 * hostapd_eid_p2p_manage(struct hostapd_data *hapd, u8 *eid);
|
taxonomy.h | 14 const u8 *ie, size_t ie_len); 17 const u8 *ie, size_t ie_len); 20 const u8 *ie, size_t ie_len);
|
mbo_ap.h | 21 void mbo_ap_wnm_notification_req(struct hostapd_data *hapd, const u8 *addr, 22 const u8 *buf, size_t len); 40 const u8 *addr, 41 const u8 *buf, size_t len)
|
tkip_countermeasures.h | 12 int michael_mic_failure(struct hostapd_data *hapd, const u8 *addr, int local);
|
/external/wpa_supplicant_8/src/crypto/ |
sha1-prf.c | 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, 31 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 33 u8 counter = 0; 35 u8 hash[SHA1_MAC_LEN]; 40 addr[0] = (u8 *) label;
|
aes-ccm.c | 17 static void xor_aes_block(u8 *dst, const u8 *src) 28 static void aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, 29 const u8 *aad, size_t aad_len, size_t plain_len, 30 u8 *x) 32 u8 aad_buf[2 * AES_BLOCK_SIZE]; 33 u8 b[AES_BLOCK_SIZE]; 64 static void aes_ccm_auth(void *aes, const u8 *data, size_t len, u8 *x) 84 static void aes_ccm_encr_start(size_t L, const u8 *nonce, u8 *a [all...] |
dh_groups.h | 14 const u8 *generator; 16 const u8 *prime; 18 const u8 *order;
|
md5.c | 26 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 27 const u8 *addr[], const size_t *len, u8 *mac) 29 u8 k_pad[64]; /* padding - key XORd with ipad/opad */ 30 u8 tk[16]; 31 const u8 *_addr[6]; 105 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 106 u8 *mac)
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new.h | 164 u8 bssid[ETH_ALEN], unsigned int id); 166 u8 bssid[ETH_ALEN], unsigned int id); 175 int wpas_dbus_register_peer(struct wpa_supplicant *wpa_s, const u8 *dev_addr); 178 const u8 *dev_addr); 180 const u8 *dev_addr); 182 const u8 *dev_addr); 184 const u8 *dev_addr); 188 const u8 *dev_addr, int request, 193 const u8 *src, u16 dev_passwd_id, 194 u8 go_intent) [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_er.h | 17 u8 addr[ETH_ALEN]; 19 u8 uuid[WPS_UUID_LEN]; 20 u8 pri_dev_type[8]; 42 u8 uuid[WPS_UUID_LEN]; 43 u8 pri_dev_type[8]; 44 u8 wps_state; 45 u8 mac_addr[ETH_ALEN]; 62 u8 sid[WPS_UUID_LEN]; 72 u8 uuid[WPS_UUID_LEN]; 80 u8 mac_addr[ETH_ALEN]; /* mac addr of network i.f. we use * [all...] |
/external/clang/test/Misc/ |
ast-dump-wchar.cpp | 3 char c8[] = u8"test\0\\\"\t\a\b\234"; 4 // CHECK: StringLiteral {{.*}} lvalue u8"test\000\\\"\t\a\b\234"
|
/external/linux-kselftest/tools/testing/selftests/powerpc/pmu/ebb/ |
trace.h | 19 u8 type; 20 u8 length; 21 u8 data[0]; 29 u8 data[0];
|
/external/syslinux/gpxe/src/include/gpxe/ |
eapol.h | 65 u8 version; 68 u8 type; 74 u8 data[0]; 87 u8 type;
|
ieee80211.h | 303 u8 addr1[ETH_ALEN]; /**< Address 1 (immediate receiver) */ 304 u8 addr2[ETH_ALEN]; /**< Address 2 (immediate sender) */ 305 u8 addr3[ETH_ALEN]; /**< Address 3 (often "forward to") */ 307 u8 data[0]; /**< Beginning of frame data */ 326 u8 dsap; /**< Destination SAP ID */ 327 u8 ssap; /**< Source SAP ID */ 328 u8 ctrl; /**< Control information */ 331 u8 oui[3]; /**< Organization code, usually 0 */ 353 u8 addr1[ETH_ALEN]; /**< Address 1 (immediate receiver) */ 354 u8 addr2[ETH_ALEN]; /**< Address 2 (immediate sender) * [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_wired_common.h | 22 static const u8 pae_group_addr[ETH_ALEN] = 25 int wired_multicast_membership(int sock, int ifindex, const u8 *addr, int add); 26 int driver_wired_get_ssid(void *priv, u8 *ssid); 27 int driver_wired_get_bssid(void *priv, u8 *bssid);
|
/external/wpa_supplicant_8/src/eap_peer/ |
tncc.h | 18 u8 * tncc_copy_send_buf(struct tncc_data *tncc, u8 *pos); 32 const u8 *msg, size_t len); 34 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len);
|
/external/wpa_supplicant_8/src/eap_server/ |
tncs.h | 18 u8 * tncs_copy_send_buf(struct tncs_data *tncs, u8 *pos); 34 const u8 *msg, size_t len); 40 struct wpabuf * tncs_process_soh(const u8 *soh_tlv, size_t soh_tlv_len,
|
/external/wpa_supplicant_8/src/tls/ |
x509v3.h | 43 u8 *ip; /* iPAddress */ 53 u8 serial_number[X509_MAX_SERIAL_NUM_LEN]; 58 u8 *subject_dn; 63 u8 *public_key; 66 u8 *sign_value; 105 const u8 *cert_start; 107 const u8 *tbs_cert_start; 127 int x509_parse_algorithm_identifier(const u8 *buf, size_t len, 129 const u8 **next); 130 int x509_parse_name(const u8 *buf, size_t len, struct x509_name *name [all...] |
/external/clang/test/Lexer/ |
string_concat.cpp | 12 const char* a = u8"abc" u"abc"; // expected-error {{unsupported non-standard concatenation of string literals}} 13 const char* b = u8"abc" U"abc"; // expected-error {{unsupported non-standard concatenation of string literals}} 14 const char* c = u8"abc" L"abc"; // expected-error {{unsupported non-standard concatenation of string literals}} 16 const char* d = u8"abc" uR"(abc)"; // expected-error {{unsupported non-standard concatenation of string literals}} 17 const char* e = u8"abc" UR"(abc)"; // expected-error {{unsupported non-standard concatenation of string literals}} 18 const char* f = u8"abc" LR"(abc)"; // expected-error {{unsupported non-standard concatenation of string literals}} 21 const char16_t* g = u"abc" u8"abc"; // expected-error {{unsupported non-standard concatenation of string literals}} 30 const char32_t* m = U"abc" u8"abc"; // expected-error {{unsupported non-standard concatenation of string literals}} 39 const wchar_t* s = L"abc" u8"abc"; // expected-error {{unsupported non-standard concatenation of string literals}}
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.h | 33 u8 addr[ETH_ALEN]; 37 u8 supp_ie[80]; 50 u8 psk[PMK_LEN]; 57 int ibss_rsn_start(struct ibss_rsn *ibss_rsn, const u8 *addr); 58 void ibss_rsn_stop(struct ibss_rsn *ibss_rsn, const u8 *peermac); 59 int ibss_rsn_rx_eapol(struct ibss_rsn *ibss_rsn, const u8 *src_addr, 60 const u8 *buf, size_t len); 61 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk); 62 void ibss_rsn_handle_auth(struct ibss_rsn *ibss_rsn, const u8 *auth_frame,
|
mesh_rsn.h | 17 u8 mgtk[WPA_TK_MAX_LEN]; 19 u8 mgtk_key_id; 21 u8 igtk_key_id; 22 u8 igtk[WPA_TK_MAX_LEN]; 34 void mesh_rsn_get_pmkid(struct mesh_rsn *rsn, struct sta_info *sta, u8 *pmkid); 38 const u8 *cat, struct wpabuf *buf); 40 struct ieee802_11_elems *elems, const u8 *cat, 41 const u8 *chosen_pmk, 42 const u8 *start, size_t elems_len);
|