/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_pwd_common.h | 47 u8 random_function; 49 u8 prf; 51 u8 token[4]; 52 u8 prep; 55 u8 identity[0]; /* length inferred from payload */ 59 int compute_password_element(EAP_PWD_group *, u16, u8 *, int, u8 *, int, u8 *, 60 int, u8 *); 62 u8 *, u [all...] |
H A D | eap_fast_common.h | 71 u8 session_key_seed[EAP_FAST_SKS_LEN]; 72 u8 server_challenge[16]; /* MSCHAPv2 ServerChallenge */ 73 u8 client_challenge[16]; /* MSCHAPv2 ClientChallenge */ 81 u8 *eap_payload_tlv; 88 u8 *pac; 98 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, 99 const u8 *client_random, u8 *master_secret); 100 u8 * eap_fast_derive_ke [all...] |
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p.h | 35 u8 reg_class; 40 u8 channel[P2P_MAX_REG_CLASS_CHANNELS]; 87 u8 ssid[32]; 97 u8 psk[32]; 112 u8 peer_device_addr[ETH_ALEN]; 117 u8 peer_interface_addr[ETH_ALEN]; 162 u8 p2p_device_addr[ETH_ALEN]; 167 u8 pri_dev_type[8]; 207 u8 dev_capab; 212 u8 group_capa [all...] |
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p.h | 35 u8 reg_class; 40 u8 channel[P2P_MAX_REG_CLASS_CHANNELS]; 87 u8 ssid[32]; 97 u8 psk[32]; 112 u8 peer_device_addr[ETH_ALEN]; 117 u8 peer_interface_addr[ETH_ALEN]; 162 u8 p2p_device_addr[ETH_ALEN]; 167 u8 pri_dev_type[8]; 207 u8 dev_capab; 212 u8 group_capa [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p.h | 35 u8 reg_class; 40 u8 channel[P2P_MAX_REG_CLASS_CHANNELS]; 87 u8 ssid[32]; 97 u8 psk[32]; 112 u8 peer_device_addr[ETH_ALEN]; 117 u8 peer_interface_addr[ETH_ALEN]; 162 u8 p2p_device_addr[ETH_ALEN]; 167 u8 pri_dev_type[8]; 207 u8 dev_capab; 212 u8 group_capa [all...] |
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | eapol_common.h | 19 u8 version; 20 u8 type; 26 u8 dest[ETH_ALEN]; 27 u8 src[ETH_ALEN]; 65 u8 type; 67 u8 key_length[2]; 70 u8 replay_counter[IEEE8021X_REPLAY_COUNTER_LEN]; 71 u8 key_iv[IEEE8021X_KEY_IV_LEN]; /* cryptographically random number */ 72 u8 key_index; /* key flag in the most significant bit: 78 u8 key_signatur [all...] |
H A D | wpa_common.h | 116 #define RSN_SELECTOR_PUT(a, val) WPA_PUT_BE32((u8 *) (a), (val)) 117 #define RSN_SELECTOR_GET(a) WPA_GET_BE32((const u8 *) (a)) 180 u8 type; 182 u8 key_info[2]; /* big endian */ 183 u8 key_length[2]; /* big endian */ 184 u8 replay_counter[WPA_REPLAY_COUNTER_LEN]; 185 u8 key_nonce[WPA_NONCE_LEN]; 186 u8 key_iv[16]; 187 u8 key_rsc[WPA_KEY_RSC_LEN]; 188 u8 key_i [all...] |
H A D | gas.h | 13 struct wpabuf * gas_build_initial_req(u8 dialog_token, size_t size); 14 struct wpabuf * gas_build_comeback_req(u8 dialog_token); 15 struct wpabuf * gas_build_initial_resp(u8 dialog_token, u16 status_code, 17 struct wpabuf * gas_anqp_build_initial_req(u8 dialog_token, size_t size); 18 struct wpabuf * gas_anqp_build_initial_resp(u8 dialog_token, u16 status_code, 20 struct wpabuf * gas_anqp_build_initial_resp_buf(u8 dialog_token, 24 struct wpabuf * gas_anqp_build_comeback_resp(u8 dialog_token, u16 status_code, 25 u8 frag_id, u8 more, 27 struct wpabuf * gas_anqp_build_comeback_resp_buf(u8 dialog_toke [all...] |
/external/wpa_supplicant_8/src/common/ |
H A D | eapol_common.h | 19 u8 version; 20 u8 type; 26 u8 dest[ETH_ALEN]; 27 u8 src[ETH_ALEN]; 65 u8 type; 67 u8 key_length[2]; 70 u8 replay_counter[IEEE8021X_REPLAY_COUNTER_LEN]; 71 u8 key_iv[IEEE8021X_KEY_IV_LEN]; /* cryptographically random number */ 72 u8 key_index; /* key flag in the most significant bit: 78 u8 key_signatur [all...] |
H A D | wpa_common.h | 116 #define RSN_SELECTOR_PUT(a, val) WPA_PUT_BE32((u8 *) (a), (val)) 117 #define RSN_SELECTOR_GET(a) WPA_GET_BE32((const u8 *) (a)) 180 u8 type; 182 u8 key_info[2]; /* big endian */ 183 u8 key_length[2]; /* big endian */ 184 u8 replay_counter[WPA_REPLAY_COUNTER_LEN]; 185 u8 key_nonce[WPA_NONCE_LEN]; 186 u8 key_iv[16]; 187 u8 key_rsc[WPA_KEY_RSC_LEN]; 188 u8 key_i [all...] |
H A D | gas.h | 13 struct wpabuf * gas_build_initial_req(u8 dialog_token, size_t size); 14 struct wpabuf * gas_build_comeback_req(u8 dialog_token); 15 struct wpabuf * gas_build_initial_resp(u8 dialog_token, u16 status_code, 17 struct wpabuf * gas_anqp_build_initial_req(u8 dialog_token, size_t size); 18 struct wpabuf * gas_anqp_build_initial_resp(u8 dialog_token, u16 status_code, 20 struct wpabuf * gas_anqp_build_initial_resp_buf(u8 dialog_token, 24 struct wpabuf * gas_anqp_build_comeback_resp(u8 dialog_token, u16 status_code, 25 u8 frag_id, u8 more, 27 struct wpabuf * gas_anqp_build_comeback_resp_buf(u8 dialog_toke [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | gas_query.h | 19 int gas_query_rx(struct gas_query *gas, const u8 *da, const u8 *sa, 20 const u8 *bssid, u8 categ, const u8 *data, size_t len, 36 int gas_query_req(struct gas_query *gas, const u8 *dst, int freq, 38 void (*cb)(void *ctx, const u8 *dst, u8 dialog_token, 43 void gas_query_cancel(struct gas_query *gas, const u8 *dst, u8 dialog_toke [all...] |
H A D | offchannel.h | 14 const u8 *dst, const u8 *src, const u8 *bssid, 15 const u8 *buf, size_t len, unsigned int wait_time, 17 unsigned int freq, const u8 *dst, 18 const u8 *src, const u8 *bssid, 19 const u8 *data, size_t data_len, 30 struct wpa_supplicant *wpa_s, const u8 *dst, const u8 *dat [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | eapol_common.h | 19 u8 version; 20 u8 type; 26 u8 dest[ETH_ALEN]; 27 u8 src[ETH_ALEN]; 65 u8 type; 67 u8 key_length[2]; 70 u8 replay_counter[IEEE8021X_REPLAY_COUNTER_LEN]; 71 u8 key_iv[IEEE8021X_KEY_IV_LEN]; /* cryptographically random number */ 72 u8 key_index; /* key flag in the most significant bit: 78 u8 key_signatur [all...] |
H A D | wpa_common.h | 116 #define RSN_SELECTOR_PUT(a, val) WPA_PUT_BE32((u8 *) (a), (val)) 117 #define RSN_SELECTOR_GET(a) WPA_GET_BE32((const u8 *) (a)) 180 u8 type; 182 u8 key_info[2]; /* big endian */ 183 u8 key_length[2]; /* big endian */ 184 u8 replay_counter[WPA_REPLAY_COUNTER_LEN]; 185 u8 key_nonce[WPA_NONCE_LEN]; 186 u8 key_iv[16]; 187 u8 key_rsc[WPA_KEY_RSC_LEN]; 188 u8 key_i [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | pmksa_cache_auth.h | 19 u8 pmkid[PMKID_LEN]; 20 u8 pmk[PMK_LEN]; 24 u8 spa[ETH_ALEN]; 26 u8 *identity; 30 u8 eap_type_authsrv; 43 const u8 *spa, const u8 *pmkid); 45 struct rsn_pmksa_cache *pmksa, const u8 *spa, const u8 *aa, 46 const u8 *pmki [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_fast_common.h | 71 u8 session_key_seed[EAP_FAST_SKS_LEN]; 72 u8 server_challenge[16]; /* MSCHAPv2 ServerChallenge */ 73 u8 client_challenge[16]; /* MSCHAPv2 ClientChallenge */ 81 u8 *eap_payload_tlv; 88 u8 *pac; 98 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, 99 const u8 *client_random, u8 *master_secret); 100 u8 * eap_fast_derive_ke [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | pmksa_cache_auth.h | 19 u8 pmkid[PMKID_LEN]; 20 u8 pmk[PMK_LEN]; 24 u8 spa[ETH_ALEN]; 26 u8 *identity; 30 u8 eap_type_authsrv; 43 const u8 *spa, const u8 *pmkid); 45 struct rsn_pmksa_cache *pmksa, const u8 *spa, const u8 *aa, 46 const u8 *pmki [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_fast_common.h | 71 u8 session_key_seed[EAP_FAST_SKS_LEN]; 72 u8 server_challenge[16]; /* MSCHAPv2 ServerChallenge */ 73 u8 client_challenge[16]; /* MSCHAPv2 ClientChallenge */ 81 u8 *eap_payload_tlv; 88 u8 *pac; 98 void eap_fast_derive_master_secret(const u8 *pac_key, const u8 *server_random, 99 const u8 *client_random, u8 *master_secret); 100 u8 * eap_fast_derive_ke [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | pmksa_cache_auth.h | 19 u8 pmkid[PMKID_LEN]; 20 u8 pmk[PMK_LEN]; 24 u8 spa[ETH_ALEN]; 26 u8 *identity; 30 u8 eap_type_authsrv; 43 const u8 *spa, const u8 *pmkid); 45 struct rsn_pmksa_cache *pmksa, const u8 *spa, const u8 *aa, 46 const u8 *pmki [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.h | 42 u8 *_rand, u8 *kc, u8 *sres, 58 char *reauth_id, u16 counter, const u8 *mk); 61 char *reauth_id, u16 counter, const u8 *k_encr, 62 const u8 *k_aut, const u8 *k_re); 72 u8 mk[EAP_SIM_MK_LEN]; 73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; 74 u8 k_au [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_sim_db.h | 42 u8 *_rand, u8 *kc, u8 *sres, 58 char *reauth_id, u16 counter, const u8 *mk); 61 char *reauth_id, u16 counter, const u8 *k_encr, 62 const u8 *k_aut, const u8 *k_re); 72 u8 mk[EAP_SIM_MK_LEN]; 73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; 74 u8 k_au [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.h | 42 u8 *_rand, u8 *kc, u8 *sres, 58 char *reauth_id, u16 counter, const u8 *mk); 61 char *reauth_id, u16 counter, const u8 *k_encr, 62 const u8 *k_aut, const u8 *k_re); 72 u8 mk[EAP_SIM_MK_LEN]; 73 u8 k_encr[EAP_SIM_K_ENCR_LEN]; 74 u8 k_au [all...] |
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.h | 19 u8 code; 20 u8 identifier; 22 u8 authenticator[16]; 44 u8 type; 45 u8 length; /* including this header */ 159 u8 vendor_type; 160 u8 vendor_length; 190 u8 *send; 192 u8 *recv; 214 struct radius_msg * radius_msg_new(u8 cod [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_record.h | 34 u8 write_mac_secret[TLS_MAX_WRITE_MAC_SECRET_LEN]; 35 u8 read_mac_secret[TLS_MAX_WRITE_MAC_SECRET_LEN]; 36 u8 write_key[TLS_MAX_WRITE_KEY_LEN]; 37 u8 read_key[TLS_MAX_WRITE_KEY_LEN]; 38 u8 write_iv[TLS_MAX_IV_LEN]; 39 u8 read_iv[TLS_MAX_IV_LEN]; 48 u8 write_seq_num[TLS_SEQ_NUM_LEN]; 49 u8 read_seq_num[TLS_SEQ_NUM_LEN]; 64 int tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *bu [all...] |