/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_module_tests.c | 27 wpa_blacklist_get(NULL, (u8 *) "123456") != NULL || 29 wpa_blacklist_get(&wpa_s, (u8 *) "123456") != NULL) 33 wpa_blacklist_add(NULL, (u8 *) "123456") == 0 || 38 wpa_blacklist_del(NULL, (u8 *) "123456") == 0 || 40 wpa_blacklist_del(&wpa_s, (u8 *) "123456") == 0) 43 if (wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 || 44 wpa_blacklist_add(&wpa_s, (u8 *) "111111") < 0 || 45 wpa_blacklist_add(&wpa_s, (u8 *) "222222") < 0 || 46 wpa_blacklist_add(&wpa_s, (u8 *) "333333") < 0 || 47 wpa_blacklist_add(&wpa_s, (u8 *) "444444") < 0 | [all...] |
blacklist.h | 14 u8 bssid[ETH_ALEN]; 19 const u8 *bssid); 20 int wpa_blacklist_add(struct wpa_supplicant *wpa_s, const u8 *bssid); 21 int wpa_blacklist_del(struct wpa_supplicant *wpa_s, const u8 *bssid);
|
offchannel.h | 14 const u8 *dst, const u8 *src, const u8 *bssid, 15 const u8 *buf, size_t len, unsigned int wait_time, 17 unsigned int freq, const u8 *dst, 18 const u8 *src, const u8 *bssid, 19 const u8 *data, size_t data_len, 30 struct wpa_supplicant *wpa_s, const u8 *dst, const u8 *data [all...] |
wnm_sta.h | 13 u8 measurement_pilot; 14 u8 subelem_len; 15 u8 subelems[255]; 19 u8 max_bssid_indicator; 20 u8 subelem_len; 21 u8 subelems[255]; 25 u8 bssid[ETH_ALEN]; 27 u8 regulatory_class; 28 u8 channel_number; 29 u8 phy_type [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.h | 26 u8 frame_type; /* RSN_REMOTE_FRAME_TYPE_FT_RRB */ 27 u8 packet_type; /* FT_PACKET_REQUEST/FT_PACKET_RESPONSE */ 29 u8 ap_address[ETH_ALEN]; 140 u8 addr[ETH_ALEN]; 141 u8 id[FT_R0KH_ID_MAX_LEN]; 143 u8 key[32]; 150 u8 addr[ETH_ALEN]; 151 u8 id[FT_R1KH_ID_LEN]; 152 u8 key[32]; 182 u8 ssid[SSID_MAX_LEN] [all...] |
rrm.h | 21 const u8 *buf, size_t len); 22 int hostapd_send_lci_req(struct hostapd_data *hapd, const u8 *addr); 23 int hostapd_send_range_req(struct hostapd_data *hapd, const u8 *addr, 24 u16 random_interval, u8 min_ap, 25 const u8 *responders, unsigned int n_responders); 27 int hostapd_send_beacon_req(struct hostapd_data *hapd, const u8 *addr, 28 u8 req_mode, const struct wpabuf *req);
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 27 u8 i_spi[IKEV2_SPI_LEN]; /* IKE_SA Initiator's SPI */ 28 u8 r_spi[IKEV2_SPI_LEN]; /* IKE_SA Responder's SPI */ 29 u8 next_payload; 30 u8 version; /* MjVer | MnVer */ 31 u8 exchange_type; 32 u8 flags; 33 u8 message_id[4]; 34 u8 length[4]; /* total length of HDR + payloads */ 38 u8 next_payload; 39 u8 flags [all...] |
eap_pwd_common.h | 47 u8 random_function; 49 u8 prf; 51 u8 token[4]; 52 u8 prep; 55 u8 identity[0]; /* length inferred from payload */ 60 const u8 *password, size_t password_len, 61 const u8 *id_server, size_t id_server_len, 62 const u8 *id_peer, size_t id_peer_len, 63 const u8 *token); 66 const u8 *confirm_peer, const u8 *confirm_server [all...] |
eap_fast_common.h | 71 u8 session_key_seed[EAP_FAST_SKS_LEN]; 72 u8 server_challenge[16]; /* MSCHAPv2 ServerChallenge */ 73 u8 client_challenge[16]; /* MSCHAPv2 ClientChallenge */ 81 u8 *eap_payload_tlv; 88 u8 *pac; 98 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, 99 const u8 *client_random, u8 *master_secret); 100 u8 * eap_fast_derive_key(void *ssl_ctx, struct tls_connection *conn [all...] |
eap_pax_common.c | 30 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 32 const u8 *entropy, size_t entropy_len, 33 size_t output_len, u8 *output) 35 u8 mac[SHA1_MAC_LEN]; 36 u8 counter, *pos; 37 const u8 *addr[3]; 49 addr[0] = (const u8 *) identifier; 58 for (counter = 1; counter <= (u8) num_blocks; counter++) { 87 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.h | 17 u8 pmkid[PMKID_LEN]; 18 u8 pmk[PMK_LEN_MAX]; 22 u8 aa[ETH_ALEN]; 29 u8 fils_cache_id[2]; 63 const u8 *aa, const u8 *pmkid, 68 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 69 const u8 *pmkid, const u8 *kck, size_t kck_len, 70 const u8 *aa, const u8 *spa, void *network_ctx, int akmp [all...] |
/external/clang/test/CXX/dcl.dcl/dcl.link/ |
p2.cpp | 11 extern u8"C" {} // expected-error {{string literal in language linkage specifier cannot have an encoding-prefix}}
|
/external/wpa_supplicant_8/src/utils/ |
crc32.h | 12 u32 crc32(const u8 *frame, size_t frame_len);
|
/hardware/intel/common/libmix/mix_audio/src/ |
pvt.h | 5 typedef unsigned char u8;
typedef
|
/external/wpa_supplicant_8/src/common/ |
eapol_common.h | 19 u8 version; 20 u8 type; 26 u8 dest[ETH_ALEN]; 27 u8 src[ETH_ALEN]; 65 u8 type; 67 u8 key_length[2]; 70 u8 replay_counter[IEEE8021X_REPLAY_COUNTER_LEN]; 71 u8 key_iv[IEEE8021X_KEY_IV_LEN]; /* cryptographically random number */ 72 u8 key_index; /* key flag in the most significant bit: 78 u8 key_signature[IEEE8021X_KEY_SIGN_LEN] [all...] |
wpa_common.h | 120 #define RSN_SELECTOR_PUT(a, val) WPA_PUT_BE32((u8 *) (a), (val)) 121 #define RSN_SELECTOR_GET(a) WPA_GET_BE32((const u8 *) (a)) 184 u8 type; 186 u8 key_info[2]; /* big endian */ 187 u8 key_length[2]; /* big endian */ 188 u8 replay_counter[WPA_REPLAY_COUNTER_LEN]; 189 u8 key_nonce[WPA_NONCE_LEN]; 190 u8 key_iv[16]; 191 u8 key_rsc[WPA_KEY_RSC_LEN]; 192 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN * [all...] |
dpp.h | 97 u8 mac_addr[ETH_ALEN]; 103 u8 pubkey_hash[SHA256_MAC_LEN]; 111 u8 own_mac[ETH_ALEN]; 112 u8 peer_mac[ETH_ALEN]; 117 u8 Mx[DPP_MAX_SHARED_SECRET_LEN]; 118 u8 Nx[DPP_MAX_SHARED_SECRET_LEN]; 119 u8 z[DPP_MAX_HASH_LEN]; 126 u8 ssid[32]; 137 u8 psk[32]; 145 u8 waiting_pubkey_hash[SHA256_MAC_LEN] [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 42 u8 *_rand, u8 *kc, u8 *sres, 58 char *reauth_id, u16 counter, const u8 *mk); 61 char *reauth_id, u16 counter, const u8 *k_encr, 62 const u8 *k_aut, const u8 *k_re); 72 u8 mk[EAP_SIM_MK_LEN]; 73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; 74 u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN] [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto.h | 32 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac); 42 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac); 53 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, 54 u8 *mac); 68 int __must_check fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, 79 int sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, 80 u8 *mac) [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_das.h | 23 const u8 *nas_ip_addr; 24 const u8 *nas_identifier; 26 const u8 *nas_ipv6_addr; 29 const u8 *sta_addr; 30 const u8 *user_name; 32 const u8 *acct_session_id; 34 const u8 *acct_multi_session_id; 36 const u8 *cui; 42 const u8 *shared_secret;
|
radius.h | 19 u8 code; 20 u8 identifier; 22 u8 authenticator[16]; 44 u8 type; 45 u8 length; /* including this header */ 172 u8 vendor_type; 173 u8 vendor_length; 203 u8 *send; 205 u8 *recv; 227 struct radius_msg * radius_msg_new(u8 code, u8 identifier) [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.h | 34 u8 write_mac_secret[TLS_MAX_WRITE_MAC_SECRET_LEN]; 35 u8 read_mac_secret[TLS_MAX_WRITE_MAC_SECRET_LEN]; 36 u8 write_key[TLS_MAX_WRITE_KEY_LEN]; 37 u8 read_key[TLS_MAX_WRITE_KEY_LEN]; 38 u8 write_iv[TLS_MAX_IV_LEN]; 39 u8 read_iv[TLS_MAX_IV_LEN]; 48 u8 write_seq_num[TLS_SEQ_NUM_LEN]; 49 u8 read_seq_num[TLS_SEQ_NUM_LEN]; 64 int tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf [all...] |
tlsv1_server_i.h | 24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; 26 u8 client_random[TLS_RANDOM_LEN]; 27 u8 server_random[TLS_RANDOM_LEN]; 28 u8 master_secret[TLS_MASTER_SECRET_LEN]; 30 u8 alert_level; 31 u8 alert_description; 48 u8 *session_ticket; 62 u8 *dh_secret; 75 void tlsv1_server_alert(struct tlsv1_server *conn, u8 level, u8 description) [all...] |
rsa.h | 15 crypto_rsa_import_public_key(const u8 *buf, size_t len); 17 crypto_rsa_import_public_key_parts(const u8 *n, size_t n_len, 18 const u8 *e, size_t e_len); 20 crypto_rsa_import_private_key(const u8 *buf, size_t len); 22 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen,
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_i.h | 60 u8 interface_addr[ETH_ALEN]; 66 u8 member_in_go_dev[ETH_ALEN]; 72 u8 member_in_go_iface[ETH_ALEN]; 76 u8 dialog_token; 77 u8 tie_breaker; 78 u8 intended_addr[ETH_ALEN]; 83 u8 oper_ssid[SSID_MAX_LEN]; 132 u8 go_timeout; 133 u8 client_timeout; 138 u8 go_neg_conf_sent [all...] |