/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | common_module_tests.c | 18 size_t len; member in struct:ieee802_11_parse_test_data 64 res = ieee802_11_parse_elems(test->data, test->len, &elems, 1); 66 ieee802_11_ie_count(test->data, test->len) != test->count) { 86 size_t len; member in struct:rsn_ie_parse_test_data 150 if (wpa_parse_wpa_ie_rsn(test->data, test->len, &data) !=
|
H A D | gas.c | 221 u8 *len; local 244 len = wpabuf_mhead_u8(buf) + offset; 245 WPA_PUT_LE16(len, (u8 *) wpabuf_put(buf, 0) - len - 2);
|
H A D | ieee802_11_common.c | 29 "information element ignored (len=%lu)", 52 "(len=%lu)", 75 "(subtype=%d len=%lu)", 88 "(type=%d len=%lu)", 119 "(type=%d len=%lu)", 134 "(type=%d len=%lu)", 143 "%02x:%02x:%02x len=%lu)", 155 * @len: Length of IE buffer in octets 160 ParseRes ieee802_11_parse_elems(const u8 *start, size_t len, argument 164 size_t left = len; 381 get_hdr_bssid(const struct ieee80211_hdr *hdr, size_t len) argument [all...] |
H A D | ieee802_11_defs.h | 1222 u8 len; member in struct:wnm_sleep_element
|
H A D | sae.c | 105 static void buf_shift_right(u8 *buf, size_t len, size_t bits) argument 108 for (i = len - 1; i > 0; i--) 297 size_t len[2]; local 321 len[0] = password_len; 323 len[1] = sizeof(counter); 341 if (hmac_sha256_vector(addrs, sizeof(addrs), 2, addr, len, 373 size_t len[2]; local 393 len[0] = password_len; 395 len[1] = sizeof(counter); 408 if (hmac_sha256_vector(addrs, sizeof(addrs), 2, addr, len, 893 sae_parse_commit(struct sae_data *sae, const u8 *data, size_t len, const u8 **token, size_t *token_len, int *allowed_groups) argument 928 size_t len[5]; local 1025 sae_check_confirm(struct sae_data *sae, const u8 *data, size_t len) argument [all...] |
H A D | wpa_common.c | 28 * @len: Length of the EAPOL frame (from EAPOL header to the end of the frame) 41 int wpa_eapol_key_mic(const u8 *key, int ver, const u8 *buf, size_t len, argument 49 return hmac_md5(key, 16, buf, len, mic); 52 if (hmac_sha1(key, 16, buf, len, hash)) 58 return omac1_aes_128(key, buf, len, mic); 63 return omac1_aes_128(key, buf, len, mic); 461 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu", 469 hdr->len != rsn_ie_len - 2 || 643 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu", 651 hdr->len ! 746 size_t len[2]; local 797 size_t len[4]; local 855 size_t len[6]; local 914 const size_t len[3] = { 8, ETH_ALEN, ETH_ALEN }; local [all...] |
H A D | wpa_common.h | 228 u8 len; member in struct:wpa_ie_hdr 260 u8 len; member in struct:rsn_ie_hdr 330 int wpa_eapol_key_mic(const u8 *key, int ver, const u8 *buf, size_t len,
|
H A D | wpa_ctrl.c | 281 size_t len; local 414 len = sizeof(buf) - 1; 415 if (wpa_ctrl_request(ctrl, "GET_COOKIE", 10, buf, &len, NULL) == 0) { 416 buf[len] = '\0'; 420 if (wpa_ctrl_request(ctrl, "IFNAME", 6, buf, &len, NULL) == 0) { 421 buf[len] = '\0'; 454 void (*msg_cb)(char *msg, size_t len)) 555 size_t len = 10; local 558 buf, &len, NULL); 561 if (len 452 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument 689 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument 709 DWORD len = *reply_len; local [all...] |
H A D | wpa_helpers.c | 39 size_t len; local 45 len = sizeof(buf); 46 if (wpa_ctrl_request(ctrl, cmd, strlen(cmd), buf, &len, NULL) < 0) { 52 buf[len] = '\0'; 65 size_t len; local 71 len = resp_size; 72 if (wpa_ctrl_request(ctrl, cmd, strlen(cmd), resp, &len, NULL) < 0) { 78 resp[len] = '\0'; 116 size_t len; local 131 len 169 size_t len, flen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-ccm.c | 64 static void aes_ccm_auth(void *aes, const u8 *data, size_t len, u8 *x) argument 66 size_t last = len % AES_BLOCK_SIZE; 69 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { 92 static void aes_ccm_encr(void *aes, size_t L, const u8 *in, size_t len, u8 *out, argument 95 size_t last = len % AES_BLOCK_SIZE; 99 for (i = 1; i <= len / AES_BLOCK_SIZE; i++) {
|
H A D | aes-ctr.c | 28 size_t j, len, left = data_len; local 41 len = (left < AES_BLOCK_SIZE) ? left : AES_BLOCK_SIZE; 42 for (j = 0; j < len; j++) 44 pos += len; 45 left -= len;
|
H A D | aes-gcm.c | 197 /* Prepare block J_0 = IV || 0^31 || 1 [len(IV) = 96] */ 203 * s = 128 * ceil(len(IV)/128) - len(IV) 204 * J_0 = GHASH_H(IV || 0^(s+64) || [len(IV)]_64) 215 static void aes_gcm_gctr(void *aes, const u8 *J0, const u8 *in, size_t len, argument 220 if (len == 0) 225 aes_gctr(aes, J0inc, in, len, out); 235 * u = 128 * ceil[len(C)/128] - len(C) 236 * v = 128 * ceil[len( [all...] |
H A D | aes-internal-dec.c | 59 void * aes_decrypt_init(const u8 *key, size_t len) argument 66 res = rijndaelKeySetupDec(rk, key, len * 8);
|
H A D | aes-internal-enc.c | 98 void * aes_encrypt_init(const u8 *key, size_t len) argument 105 res = rijndaelKeySetupEnc(rk, key, len * 8);
|
H A D | aes-omac1.c | 34 * @len: Lengths of the data blocks 43 const u8 *addr[], const size_t *len, u8 *mac) 57 total_len += len[e]; 62 end = pos + len[0]; 70 end = pos + len[e]; 88 end = pos + len[e]; 42 omac1_aes_128_vector(const u8 *key, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | crypto_cryptoapi.c | 107 const u8 *addr[], const size_t *len, u8 *mac) 127 if (!CryptHashData(hash, (BYTE *) addr[i], len[i], 0)) { 147 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 149 return cryptoapi_hash_vector(CALG_MD4, 16, num_elem, addr, len, mac); 162 DWORD len; member in struct:__anon34087 171 key_blob.len = 8; 218 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 220 return cryptoapi_hash_vector(CALG_MD5, 16, num_elem, addr, len, mac); 224 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 226 return cryptoapi_hash_vector(CALG_SHA, 20, num_elem, addr, len, ma 106 cryptoapi_hash_vector(ALG_ID alg, size_t hash_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 236 aes_encrypt_init(const u8 *key, size_t len) argument 241 DWORD len; member in struct:__anon34088 317 aes_decrypt_init(const u8 *key, size_t len) argument 359 DWORD len; member in struct:__anon34089 455 crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) argument 467 crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument 514 DWORD len; member in struct:__anon34090 590 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument 607 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument 642 crypto_public_key_import(const u8 *key, size_t len) argument 649 crypto_private_key_import(const u8 *key, size_t len, const char *passwd) argument 658 crypto_public_key_from_cert(const u8 *buf, size_t len) argument [all...] |
H A D | crypto_gnutls.c | 15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 24 gcry_md_write(hd, addr[i], len[i]); 55 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 64 gcry_md_write(hd, addr[i], len[i]); 73 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 82 gcry_md_write(hd, addr[i], len[i]); 91 void * aes_encrypt_init(const u8 *key, size_t len) argument 100 if (gcry_cipher_setkey(hd, key, len) != GPG_ERR_NO_ERROR) { 124 void * aes_decrypt_init(const u8 *key, size_t len) argument 131 if (gcry_cipher_setkey(hd, key, len) ! 274 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument 284 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument [all...] |
H A D | crypto_internal-cipher.c | 104 u8 *crypt, size_t len) 111 os_memcpy(crypt, plain, len); 113 ctx->u.rc4.used_bytes, crypt, len); 114 ctx->u.rc4.used_bytes += len; 117 if (len % AES_BLOCK_SIZE) 119 blocks = len / AES_BLOCK_SIZE; 131 if (len % 8) 133 blocks = len / 8; 145 if (len % 8) 147 blocks = len / 103 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument 166 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument [all...] |
H A D | crypto_internal-rsa.c | 22 struct crypto_public_key * crypto_public_key_import(const u8 *key, size_t len) argument 25 crypto_rsa_import_public_key(key, len); 39 size_t len, 45 res = pkcs8_key_import(key, len); 51 res = pkcs8_enc_key_import(key, len, passwd); 60 crypto_rsa_import_private_key(key, len); 65 size_t len) 38 crypto_private_key_import(const u8 *key, size_t len, const char *passwd) argument 64 crypto_public_key_from_cert(const u8 *buf, size_t len) argument
|
H A D | crypto_internal.c | 125 void crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) argument 133 MD5Update(&ctx->u.md5, data, len); 137 SHA1Update(&ctx->u.sha1, data, len); 142 sha256_process(&ctx->u.sha256, data, len); 151 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument 159 if (mac == NULL || len == NULL) { 166 if (*len < 16) { 167 *len = 16; 171 *len = 16; 175 if (*len < 2 [all...] |
H A D | crypto_libtomcrypt.c | 25 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 32 md4_process(&md, addr[i], len[i]); 59 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 66 md5_process(&md, addr[i], len[i]); 72 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 79 sha1_process(&md, addr[i], len[i]); 85 void * aes_encrypt_init(const u8 *key, size_t len) argument 91 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 114 void * aes_decrypt_init(const u8 *key, size_t len) argument 120 if (aes_setup(key, len, 194 crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) argument 214 crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument 350 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument 374 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument 416 crypto_public_key_import(const u8 *key, size_t len) argument 446 crypto_private_key_import(const u8 *key, size_t len, const char *passwd) argument 478 crypto_public_key_from_cert(const u8 *buf, size_t len) argument 553 unsigned long len, modlen; local 616 unsigned long len; local [all...] |
H A D | crypto_none.c | 15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | crypto_nss.c | 25 size_t num_elem, const u8 *addr[], const size_t *len, 38 HASH_Update(ctx, addr[i], len[i]); 74 item.len = 8; 119 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 121 return nss_hash(HASH_AlgMD5, 16, num_elem, addr, len, mac); 125 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 127 return nss_hash(HASH_AlgSHA1, 20, num_elem, addr, len, mac); 131 int sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, argument 134 return nss_hash(HASH_AlgSHA256, 32, num_elem, addr, len, mac); 138 void * aes_encrypt_init(const u8 *key, size_t len) argument 24 nss_hash(HASH_HashType type, unsigned int max_res_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 154 aes_decrypt_init(const u8 *key, size_t len) argument 191 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument 198 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument [all...] |
H A D | crypto_openssl.c | 82 const u8 *addr[], const size_t *len, u8 *mac) 95 if (!EVP_DigestUpdate(&ctx, addr[i], len[i])) { 112 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 114 return openssl_digest_vector(EVP_md4(), num_elem, addr, len, mac); 158 size_t len = skip; 159 if (len > sizeof(skip_buf)) 160 len = sizeof(skip_buf); 161 if (!EVP_CipherUpdate(&ctx, skip_buf, &outl, skip_buf, len)) 163 skip -= len; 176 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u argument 81 openssl_digest_vector(const EVP_MD *type, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 182 sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 189 sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 214 aes_encrypt_init(const u8 *key, size_t len) argument 251 int len = sizeof(buf); local 265 aes_decrypt_init(const u8 *key, size_t len) argument 302 int len = sizeof(buf); local 440 crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, u8 *crypt, size_t len) argument 450 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument 650 crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) argument 658 crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument 707 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 748 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 789 crypto_get_random(void *buf, size_t len) argument 798 omac1_aes_128_vector(const u8 *key, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 838 crypto_bignum_init_set(const u8 *buf, size_t len) argument 1127 int len = BN_num_bytes(e->prime); local 1157 int len = BN_num_bytes(e->prime); local [all...] |
H A D | md4-internal.c | 25 static void MD4Update(MD4_CTX *ctx, const unsigned char *input, size_t len); 29 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument 36 MD4Update(&ctx, addr[i], len[i]); 108 static void MD4Update(MD4_CTX *ctx, const unsigned char *input, size_t len) argument 117 ctx->count += (u64)len << 3; 119 if (len >= need) { 124 len -= need; 129 while (len >= MD4_BLOCK_LENGTH) { 132 len -= MD4_BLOCK_LENGTH; 137 if (len ! [all...] |