/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_openssl.c | 140 u8 *data, size_t data_len) 166 if (EVP_CipherUpdate(&ctx, data, &outl, data, data_len)) 650 void crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) argument 654 HMAC_Update(&ctx->ctx, data, len); 739 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 742 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); 780 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, argument 783 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 825 int omac1_aes_128(const u8 *key, const u8 *data, size_ argument 139 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) argument [all...] |
H A D | fips_prf_openssl.c | 16 static void sha1_transform(u8 *state, const u8 data[64]) argument 21 SHA1_Transform(&context, data);
|
H A D | md5.c | 17 * hmac_md5_vector - HMAC-MD5 over data vector (RFC 2104) 20 * @num_elem: Number of elements in the data vector 21 * @addr: Pointers to the data areas 22 * @len: Lengths of the data blocks 57 * and text is the data being protected */ 93 * hmac_md5 - HMAC-MD5 over data buffer (RFC 2104) 96 * @data: Pointers to the data area 97 * @data_len: Length of the data area 101 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_ argument [all...] |
H A D | rc4.c | 17 u8 *data, size_t data_len) 44 /* Apply RC4 to data */ 45 pos = data; 16 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) argument
|
H A D | sha1-internal.c | 24 * sha1_vector - SHA-1 hash for data vector 25 * @num_elem: Number of elements in the data vector 26 * @addr: Pointers to the data areas 27 * @len: Lengths of the data blocks 59 void SHA1Update(SHA1_CTX* context, unsigned char* data, unsigned int 62 void SHA1Update(SHA1_CTX* context, unsigned char* data, unsigned 243 /* Run your data through this. */ 248 const unsigned char *data = _data; local 258 os_memcpy(&context->buffer[j], data, (i = 64-j)); 261 SHA1Transform(context->state, &data[ [all...] |
H A D | sha1-prf.c | 21 * @data: Extra data to bind into the key 22 * @data_len: Length of the data 31 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 42 addr[1] = data; 30 sha1_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument
|
H A D | sha1.c | 17 * hmac_sha1_vector - HMAC-SHA1 over data vector (RFC 2104) 20 * @num_elem: Number of elements in the data vector 21 * @addr: Pointers to the data areas 22 * @len: Lengths of the data blocks 57 * and text is the data being protected */ 92 * hmac_sha1 - HMAC-SHA1 over data buffer (RFC 2104) 95 * @data: Pointers to the data area 96 * @data_len: Length of the data area 100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_ argument [all...] |
H A D | sha256-prf.c | 21 * @data: Extra data to bind into the key 22 * @data_len: Length of the data 30 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 32 sha256_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8); 41 * @data: Extra data to bind into the key 42 * @data_len: Length of the data 52 const u8 *data, size_t data_len, u8 *buf, 67 addr[2] = data; 29 sha256_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument 51 sha256_prf_bits(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len_bits) argument [all...] |
H A D | sha256.c | 17 * hmac_sha256_vector - HMAC-SHA256 over data vector (RFC 2104) 20 * @num_elem: Number of elements in the data vector 21 * @addr: Pointers to the data areas 22 * @len: Lengths of the data blocks 57 * and text is the data being protected */ 92 * hmac_sha256 - HMAC-SHA256 over data buffer (RFC 2104) 95 * @data: Pointers to the data area 96 * @data_len: Length of the data area 100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, argument [all...] |
H A D | tls_gnutls.c | 136 * data.. */ 397 "data: %s", gnutls_strerror(ret)); 440 field, gen->d.ia5->data); 442 strlen((char *) gen->d.ia5->data) + 1; 446 snprintf(tmp, len, "%s:%s", field, gen->d.ia5->data); 1084 * to handle the possibility of the decrypted data being longer than 1085 * input data. 1139 int ext_type, const u8 *data, 1138 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
H A D | tls_internal.c | 583 int ext_type, const u8 *data, 589 data, data_len); 582 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
H A D | tls_none.c | 158 int ext_type, const u8 *data, 157 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
H A D | tls_nss.c | 81 wpa_printf(MSG_DEBUG, "NSS: No data available to be read yet"); 111 wpa_hexdump(MSG_MSGDUMP, "NSS: I/O send data", buf, amount); 116 "data to be sent"); 162 PRSocketOptionData *data) 164 switch (data->option) { 167 data->value.non_blocking = PR_TRUE; 171 data->option); 553 * to handle the possibility of the decrypted data being longer than 554 * input data. 600 int ext_type, const u8 *data, 161 nss_io_getsocketoption(PRFileDesc *fd, PRSocketOptionData *data) argument 599 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument [all...] |
H A D | tls_openssl.c | 90 union tls_event_data *data); 785 * automatically. If this is not the case, random data should 802 /* Newer OpenSSL can store app-data per-SSL */ 1126 if (os_strlen((char *) gen->d.ia5->data) == len && 1127 os_memcmp(value, gen->d.ia5->data, len) == 0) 1234 gen->d.dNSName->data, 1236 if (domain_suffix_match(gen->d.dNSName->data, 1264 cn->data, cn->length); 1265 if (domain_suffix_match(cn->data, cn->length, match) == 1) { 1454 "server certificate data"); 2903 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument 3436 tls_session_ticket_ext_cb(SSL *s, const unsigned char *data, int len, void *arg) argument 3463 tls_hello_ext_cb(SSL *s, int client_server, int type, unsigned char *data, int len, void *arg) argument [all...] |
H A D | tls_schannel.c | 330 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process", 344 /* Place for leftover data from Schannel */ 415 "application data", 447 /* TODO: Can this happen? What to do with this data? */ 448 wpa_hexdump(MSG_MSGDUMP, "SChannel - Leftover data", 537 wpa_hexdump_buf_key(MSG_MSGDUMP, "Schannel: Encrypted data " 561 "Schannel: Encrypted data to DecryptMessage", in_data); 605 wpa_printf(MSG_DEBUG, "%s: No output data from " 610 wpa_hexdump_key(MSG_MSGDUMP, "Schannel: Decrypted data from " 653 int ext_type, const u8 *data, 652 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument [all...] |
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver.h | 9 * hostapd. The first part of the file defines data structures used in various 92 * surveyed channel data 212 * If the driver does not support reporting all IEs, the IE data structure is 234 * follow (with beacon_ie_len octets of data) if the driver provides 500 * convert into EVENT_ASSOCINFO data (see below). 1255 * struct beacon_data - Beacon data 1338 * @priv: private driver interface data 1351 * @priv: private driver interface data 1361 * and as such, should be processed as binary data, not a printable 1369 * @priv: private driver interface data 3837 const u8 *data; member in struct:wpa_event_data::ft_rrb_rx 3848 const u8 *data; member in struct:wpa_event_data::tx_status 3984 const u8 *data; member in struct:wpa_event_data::eapol_rx 4062 const u8 *data; member in struct:wpa_event_data::eapol_tx_status 4181 drv_event_eapol_rx(void *ctx, const u8 *src, const u8 *data, size_t data_len) argument [all...] |
H A D | driver_atheros.c | 178 set80211priv(struct atheros_driver_data *drv, int op, void *data, int len) argument 192 * Argument data fits inline; put it there. 194 memcpy(iwr.u.name, data, len); 197 * Argument data too big for inline transfer; setup a 199 * the data for the driver. 201 iwr.u.data.pointer = data; 202 iwr.u.data.length = len; 577 wpa_printf(MSG_DEBUG, "%s: Failed to get encryption data " 617 atheros_read_sta_driver_data(void *priv, struct hostap_sta_driver_data *data, argument 1300 union wpa_event_data data; local 1483 atheros_wireless_event_wireless(struct atheros_driver_data *drv, char *data, int len) argument 1650 atheros_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, int encrypt, const u8 *own_addr, u32 flags) argument 2005 set80211big(struct atheros_driver_data *drv, int op, const void *data, int len) argument 2030 atheros_send_action(void *priv, unsigned int freq, unsigned int wait, const u8 *dst, const u8 *src, const u8 *bssid, const u8 *data, size_t data_len, int no_cck) argument 2160 u8 *data, *pos; local [all...] |
H A D | driver_bsd.c | 525 bsd_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, argument 530 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", data, data_len); 532 return l2_packet_send(drv->sock_xmit, addr, ETH_P_EAPOL, data, 690 bsd_read_sta_driver_data(void *priv, struct hostap_sta_driver_data *data, argument 698 /* XXX? do packets counts include non-data frames? */ 699 data->rx_packets = stats.is_stats.ns_rx_data; 700 data->rx_bytes = stats.is_stats.ns_rx_bytes; 701 data->tx_packets = stats.is_stats.ns_tx_data; 702 data->tx_bytes = stats.is_stats.ns_tx_bytes; 732 union wpa_event_data data; local [all...] |
H A D | driver_hostap.c | 74 printf("Not ToDS data frame (fc=0x%04x)\n", fc); 88 printf("Too short data frame\n"); 100 printf("No ethertype in data frame\n"); 113 printf("Unknown ethertype 0x%04x in data frame\n", ethertype); 133 event.tx_status.data = buf; 168 /* protocol version 3 is reserved for indicating extra data after the 174 printf("extra data in frame (elen=%d)\n", extra_len); 176 printf(" extra data overflow\n"); 282 static int hostap_send_eapol(void *priv, const u8 *addr, const u8 *data, argument 314 memcpy(pos, data, data_le 577 hostap_read_sta_data(void *priv, struct hostap_sta_driver_data *data, const u8 *addr) argument 803 union wpa_event_data data; local 818 hostapd_wireless_event_wireless(struct hostap_driver_data *drv, char *data, int len) argument [all...] |
H A D | driver_hostap.h | 103 * data in memory and automatically re-download after hw_reset */ 115 caddr_t ptr; /* pointer to data in user space */ 116 } data[0]; member in struct:prism2_download_param 144 ((size_t) (&((struct prism2_hostapd_param *) 0)->u.rid.data)) 146 ((size_t) (&((struct prism2_hostapd_param *) 0)->u.generic_elem.data)) 181 u8 data[0]; member in struct:prism2_hostapd_param::__anon33868::__anon33873 185 u8 data[0]; member in struct:prism2_hostapd_param::__anon33868::__anon33874
|
H A D | driver_madwifi.c | 93 set80211priv(struct madwifi_driver_data *drv, int op, void *data, int len) argument 109 * Argument data fits inline; put it there. 111 memcpy(iwr.u.name, data, len); 114 * Argument data too big for inline transfer; setup a 116 * the data for the driver. 118 iwr.u.data.pointer = data; 119 iwr.u.data.length = len; 494 wpa_printf(MSG_DEBUG, "%s: Failed to get encryption data " 535 madwifi_read_sta_driver_data(void *priv, struct hostap_sta_driver_data *data, argument 886 union wpa_event_data data; local 924 madwifi_wireless_event_wireless(struct madwifi_driver_data *drv, char *data, int len) argument 1077 madwifi_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, int encrypt, const u8 *own_addr, u32 flags) argument [all...] |
H A D | driver_ndis.c | 451 char *data, size_t len) 489 os_memcpy(data, o->Data, written); 517 os_memcpy(data, o->Data, o->Length); 526 const char *data, size_t len) 535 wpa_hexdump_key(MSG_MSGDUMP, txt, (const u8 *) data, len); 546 if (data) 547 os_memcpy(o->Data, data, len); 563 wpa_hexdump_key(MSG_MSGDUMP, txt, (const u8 *) data, len); 571 if (data) 572 os_memcpy(o->Data, data, le 450 ndis_get_oid(struct wpa_driver_ndis_data *drv, unsigned int oid, char *data, size_t len) argument 525 ndis_set_oid(struct wpa_driver_ndis_data *drv, unsigned int oid, const char *data, size_t len) argument 1349 union wpa_event_data data; local 1529 wpa_driver_ndis_event_auth(struct wpa_driver_ndis_data *drv, const u8 *data, size_t data_len) argument 1563 wpa_driver_ndis_event_pmkid(struct wpa_driver_ndis_data *drv, const u8 *data, size_t data_len) argument 1608 wpa_driver_ndis_event_media_specific(struct wpa_driver_ndis_data *drv, const u8 *data, size_t data_len) argument [all...] |
H A D | driver_ndis_.c | 25 const u8 *data, size_t data_len); 34 /* Event data: 36 * data length (2 octets (big endian), optional) 37 * data (variable len, optional) 44 u8 *pos, *data = NULL; local 48 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len); 59 wpa_printf(MSG_DEBUG, "NDIS: event data overflow"); 62 data = pos; 63 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_le [all...] |
H A D | driver_nl80211.c | 833 struct wiphy_idx_data data = { local 847 if (send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data) == 0) 848 return data.wiphy_idx; 859 struct wiphy_idx_data data = { local 873 if (send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data) == 0) 874 return data.nlmode; 885 struct wiphy_idx_data data = { local 897 return send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data); 1670 union wpa_event_data data; local 1697 os_memset(&data, 1738 union wpa_event_data data; local 2042 const u8 *data; local 2121 union wpa_event_data data; local 2185 union wpa_event_data data; local 2232 union wpa_event_data data; local 2612 union wpa_event_data data; local 2644 union wpa_event_data data; local 2684 union wpa_event_data data; local 2720 union wpa_event_data data; local 2747 union wpa_event_data data; local 2765 union wpa_event_data data; local 2809 union wpa_event_data data; local 2846 union wpa_event_data data; local 2930 qca_nl80211_avoid_freq(struct wpa_driver_nl80211_data *drv, const u8 *data, size_t len) argument 2977 nl80211_vendor_event_qca(struct wpa_driver_nl80211_data *drv, u32 subcmd, u8 *data, size_t len) argument 2998 u8 *data = NULL; local 3041 union wpa_event_data data; local 3105 union wpa_event_data data; local 4310 u8 data[2048]; local 7101 wpa_driver_nl80211_send_mntr(struct wpa_driver_nl80211_data *drv, const void *data, size_t len, int encrypt, int noack) argument 7158 wpa_driver_nl80211_send_frame(struct i802_bss *bss, const void *data, size_t len, int encrypt, int noack, unsigned int freq, int no_cck, int offchanok, unsigned int wait_time) argument 7211 wpa_driver_nl80211_send_mlme(struct i802_bss *bss, const u8 *data, size_t data_len, int noack, unsigned int freq, int no_cck, int offchanok, unsigned int wait_time) argument 8546 nl80211_send_eapol_data(struct i802_bss *bss, const u8 *addr, const u8 *data, size_t data_len) argument 8576 wpa_driver_nl80211_hapd_send_eapol( void *priv, const u8 *addr, const u8 *data, size_t data_len, int encrypt, const u8 *own_addr, u32 flags) argument 9672 struct hostap_sta_driver_data *data = arg; local 9723 i802_read_sta_data(struct i802_bss *bss, struct hostap_sta_driver_data *data, const u8 *addr) argument 9845 struct hostap_sta_driver_data data; local 10611 wpa_driver_nl80211_send_action(struct i802_bss *bss, unsigned int freq, unsigned int wait_time, const u8 *dst, const u8 *src, const u8 *bssid, const u8 *data, size_t data_len, int no_cck) argument 10935 u8 *data, *pos; local 11120 nl80211_send_frame(void *priv, const u8 *data, size_t data_len, int encrypt) argument 11448 union wpa_event_data data; local 11955 driver_nl80211_send_mlme(void *priv, const u8 *data, size_t data_len, int noack) argument 11979 driver_nl80211_read_sta_data(void *priv, struct hostap_sta_driver_data *data, const u8 *addr) argument 11988 driver_nl80211_send_action(void *priv, unsigned int freq, unsigned int wait_time, const u8 *dst, const u8 *src, const u8 *bssid, const u8 *data, size_t data_len, int no_cck) argument 12391 nl80211_vendor_cmd(void *priv, unsigned int vendor_id, unsigned int subcmd, const u8 *data, size_t data_len, struct wpabuf *buf) argument [all...] |
H A D | driver_none.c | 29 "driver data"); 47 u16 proto, const u8 *data, size_t data_len) 60 "driver data"); 78 const u8 *data, size_t data_len) 46 none_driver_send_ether(void *priv, const u8 *dst, const u8 *src, u16 proto, const u8 *data, size_t data_len) argument 77 none_driver_send_eapol(void *priv, const u8 *dest, u16 proto, const u8 *data, size_t data_len) argument
|