/external/wpa_supplicant_8/src/crypto/ |
sha512.h | 14 int hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, 15 const u8 *addr[], const size_t *len, u8 *mac); 16 int hmac_sha512(const u8 *key, size_t key_len, const u8 *data, 17 size_t data_len, u8 *mac); 18 int sha512_prf(const u8 *key, size_t key_len, const char *label, 19 const u8 *data, size_t data_len, u8 *buf, size_t buf_len); 20 int sha512_prf_bits(const u8 *key, size_t key_len, const char *label [all...] |
des_i.h | 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt); 19 void des_block_decrypt(const u8 *crypt, const u32 *dk, u8 *plain); 21 void des3_key_setup(const u8 *key, struct des3_key_s *dkey); 22 void des3_encrypt(const u8 *plain, const struct des3_key_s *key, u8 *crypt); 23 void des3_decrypt(const u8 *crypt, const struct des3_key_s *key, u8 *plain) [all...] |
aes-encblock.c | 23 int aes_128_encrypt_block(const u8 *key, const u8 *in, u8 *out)
|
sha256.h | 14 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 15 const u8 *addr[], const size_t *len, u8 *mac); 16 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 17 size_t data_len, u8 *mac); 18 int sha256_prf(const u8 *key, size_t key_len, const char *label, 19 const u8 *data, size_t data_len, u8 *buf, size_t buf_len); 20 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label [all...] |
/hardware/qcom/data/ipacfg-mgr/msm8998/ipanat/test/ |
ipa_nat_test.h | 41 #define u8 uint8_t macro 82 int ipa_nat_test000(int, u32, u8); 83 int ipa_nat_test001(int, u32, u8); 84 int ipa_nat_test002(int, u32, u8); 85 int ipa_nat_test003(int, u32, u8); 86 int ipa_nat_test004(int, u32, u8); 87 int ipa_nat_test005(int, u32, u8); 88 int ipa_nat_test006(int, u32, u8); 89 int ipa_nat_test007(int, u32, u8); 90 int ipa_nat_test008(int, u32, u8); [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 75 const u8 *nonce_mt, u16 selected_version, 76 const u8 *ver_list, size_t ver_list_len, 77 int num_chal, const u8 *kc, u8 *mk); 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 79 const u8 *ik, const u8 *ck, u8 *mk); 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk [all...] |
eap_common.h | 15 const u8 *keyname; 16 const u8 *domain; 18 u8 keyname_len; 19 u8 domain_len; 23 const u8 * eap_hdr_validate(int vendor, EapType eap_type, 26 u8 code, u8 identifier); 28 u8 eap_get_id(const struct wpabuf *msg); 30 int erp_parse_tlvs(const u8 *pos, const u8 *end, struct erp_tlvs *tlvs [all...] |
eap_ikev2_common.h | 21 const u8 *i_nonce, size_t i_nonce_len, 22 const u8 *r_nonce, size_t r_nonce_len, 23 u8 *keymat); 24 struct wpabuf * eap_ikev2_build_frag_ack(u8 id, u8 code); 27 const u8 *pos, const u8 *end);
|
eap_gpsk_common.h | 40 u8 vendor[4]; 41 u8 specifier[2]; 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 51 const u8 *rand_client, const u8 *rand_server, 52 const u8 *id_client, size_t id_client_len, 53 const u8 *id_server, size_t id_server_len, 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len [all...] |
chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 16 size_t challenge_len, u8 *response) 18 const u8 *addr[3];
|
eap_psk_common.h | 26 #define EAP_PSK_FLAGS_SET_T(t) ((u8) (t) << 6) 34 u8 flags; 35 u8 rand_s[EAP_PSK_RAND_LEN]; 41 u8 flags; 42 u8 rand_s[EAP_PSK_RAND_LEN]; 43 u8 rand_p[EAP_PSK_RAND_LEN]; 44 u8 mac_p[EAP_PSK_MAC_LEN]; 50 u8 flags; 51 u8 rand_s[EAP_PSK_RAND_LEN]; 52 u8 mac_s[EAP_PSK_MAC_LEN] [all...] |
eap_peap_common.h | 12 int peap_prfplus(int version, const u8 *key, size_t key_len, 13 const char *label, const u8 *seed, size_t seed_len, 14 u8 *buf, size_t buf_len);
|
eap_pax_common.h | 17 u8 op_code; 18 u8 flags; 19 u8 mac_id; 20 u8 dh_group_id; 21 u8 public_key_id; 80 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 82 const u8 *entropy, size_t entropy_len, 83 size_t output_len, u8 *output); 84 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 22 u8 *identity; 42 u8 *anonymous_identity; 49 u8 *imsi_identity; 68 u8 *password; 104 u8 *ca_cert; 115 u8 *ca_path; 129 u8 *client_cert; 156 u8 *private_key; 181 u8 *dh_file; 197 u8 *subject_match [all...] |
/external/wpa_supplicant_8/src/fst/ |
fst_defs.h | 25 (((u8) ((session_type) & 0x7)) | ((switch_intent) ? 0x10 : 0x00)) 28 ((u8) ((session_control) & 0x7)) 35 u8 element_id; 36 u8 length; 38 u8 session_control; 39 u8 new_band_id; 40 u8 new_band_setup; 41 u8 new_band_op; 42 u8 old_band_id; 43 u8 old_band_setup [all...] |
/external/clang/test/Misc/ |
ast-print-char-literal.cpp | 3 char c = u8'1'; 9 template <char c = u8'1'> 13 h<u8'2'>(); 18 // CHECK: char c = u8'1'; 24 // CHECK: template <char c = u8'1'> 26 // CHECK: h<u8'2'>();
|
/external/wpa_supplicant_8/src/common/ |
gas_server.h | 18 const u8 *da, 23 const u8 *adv_proto_id, u8 adv_proto_id_len, 25 (*req_cb)(void *ctx, const u8 *sa, 26 const u8 *query, size_t query_len), 30 int gas_server_rx(struct gas_server *gas, const u8 *da, const u8 *sa, 31 const u8 *bssid, u8 categ, const u8 *data, size_t len [all...] |
gas.h | 13 struct wpabuf * gas_build_initial_req(u8 dialog_token, size_t size); 14 struct wpabuf * gas_build_comeback_req(u8 dialog_token); 15 struct wpabuf * gas_build_initial_resp(u8 dialog_token, u16 status_code, 18 gas_build_comeback_resp(u8 dialog_token, u16 status_code, u8 frag_id, u8 more, 20 struct wpabuf * gas_anqp_build_initial_req(u8 dialog_token, size_t size); 21 struct wpabuf * gas_anqp_build_initial_resp(u8 dialog_token, u16 status_code, 23 struct wpabuf * gas_anqp_build_initial_resp_buf(u8 dialog_token, 27 struct wpabuf * gas_anqp_build_comeback_resp(u8 dialog_token, u16 status_code [all...] |
/external/wpa_supplicant_8/src/tls/ |
pkcs5.h | 12 u8 * pkcs5_decrypt(const u8 *enc_alg, size_t enc_alg_len, 13 const u8 *enc_data, size_t enc_data_len,
|
pkcs1.h | 16 int use_private, const u8 *in, size_t inlen, 17 u8 *out, size_t *outlen); 19 const u8 *in, size_t inlen, 20 u8 *out, size_t *outlen); 22 const u8 *crypt, size_t crypt_len, 23 u8 *plain, size_t *plain_len); 25 const u8 *s, size_t s_len, 27 const u8 *hash, size_t hash_len);
|
tlsv1_client_i.h | 23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; 25 u8 client_random[TLS_RANDOM_LEN]; 26 u8 server_random[TLS_RANDOM_LEN]; 27 u8 master_secret[TLS_MASTER_SECRET_LEN]; 29 u8 alert_level; 30 u8 alert_description; 51 u8 *client_hello_ext; 55 u8 *dh_p; 58 u8 *dh_g; 61 u8 *dh_ys [all...] |
/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 19 u8 pmkid[PMKID_LEN]; 20 u8 pmk[PMK_LEN_MAX]; 24 u8 spa[ETH_ALEN]; 26 u8 *identity; 30 u8 eap_type_authsrv; 46 const u8 *spa, const u8 *pmkid); 48 struct rsn_pmksa_cache *pmksa, const u8 *spa, const u8 *aa, 49 const u8 *pmkid) [all...] |
ieee802_11.h | 20 int ieee802_11_mgmt(struct hostapd_data *hapd, const u8 *buf, size_t len, 22 void ieee802_11_mgmt_cb(struct hostapd_data *hapd, const u8 *buf, size_t len, 46 u8 * hostapd_eid_ext_capab(struct hostapd_data *hapd, u8 *eid); 47 u8 * hostapd_eid_qos_map_set(struct hostapd_data *hapd, u8 *eid); 48 u8 * hostapd_eid_supp_rates(struct hostapd_data *hapd, u8 *eid); 49 u8 * hostapd_eid_ext_supp_rates(struct hostapd_data *hapd, u8 *eid) [all...] |
/external/syslinux/gpxe/src/drivers/net/rtl818x/ |
rtl818x.h | 26 u8 MAC[6]; 27 u8 reserved_0[2]; 29 u8 RX_FIFO_COUNT; 30 u8 reserved_1; 31 u8 TX_FIFO_COUNT; 32 u8 BQREQ; 33 u8 reserved_2[4]; 39 u8 BSSID[6]; 40 u8 RESP_RATE; 41 u8 EIFS [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.h | 30 const u8 *addr, int key_idx, int set_tx, 31 const u8 *seq, size_t seq_len, 32 const u8 *key, size_t key_len); 34 int (*get_bssid)(void *ctx, u8 *bssid); 35 int (*ether_send)(void *ctx, const u8 *dest, u16 proto, const u8 *buf, 39 u8 * (*alloc_eapol)(void *ctx, u8 type, const void *data, u16 data_len, 41 int (*add_pmkid)(void *ctx, void *network_ctx, const u8 *bssid, 42 const u8 *pmkid, const u8 *fils_cache_id [all...] |