/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-cbc.c | 20 * @data: Data to encrypt in-place 21 * @data_len: Length of data in bytes (must be divisible by 16) 24 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 28 u8 *pos = data; 53 * @data: Data to decrypt in-place 54 * @data_len: Length of data in bytes (must be divisible by 16) 57 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 61 u8 *pos = data;
|
H A D | aes-ccm.c | 64 static void aes_ccm_auth(void *aes, const u8 *data, size_t len, u8 *x) argument 71 xor_aes_block(x, data); 72 data += AES_BLOCK_SIZE; 78 x[i] ^= *data++;
|
H A D | aes-ctr.c | 20 * @data: Data to encrypt in-place 21 * @data_len: Length of data in bytes 25 u8 *data, size_t data_len) 30 u8 *pos = data; 24 aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, u8 *data, size_t data_len) argument
|
H A D | aes-eax.c | 21 * @hdr: Header data to be authenticity protected 22 * @hdr_len: Length of the header data bytes 23 * @data: Data to encrypt in-place 24 * @data_len: Length of data in bytes 30 u8 *data, size_t data_len, u8 *tag) 62 if (aes_128_ctr_encrypt(key, nonce_mac, data, data_len)) 65 os_memcpy(buf + 16, data, data_len); 85 * @hdr: Header data to be authenticity protected 86 * @hdr_len: Length of the header data bytes 87 * @data 28 aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, u8 *tag) argument 92 aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, const u8 *tag) argument [all...] |
H A D | aes-omac1.c | 32 * @num_elem: Number of elements in the data vector 33 * @addr: Pointers to the data areas 34 * @len: Lengths of the data blocks 106 * @data: Data buffer for which a MAC is determined 107 * @data_len: Length of data buffer in bytes 115 int omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac) argument 117 return omac1_aes_128_vector(key, 1, &data, &data_len, mac);
|
H A D | crypto_cryptoapi.c | 455 void crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) argument 460 if (!CryptHashData(ctx->hash, (BYTE *) data, len, 0)) {
|
H A D | crypto_internal.c | 125 void crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) argument 133 MD5Update(&ctx->u.md5, data, len); 137 SHA1Update(&ctx->u.sha1, data, len); 142 sha256_process(&ctx->u.sha256, data, len);
|
H A D | crypto_libtomcrypt.c | 194 void crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) argument 201 ctx->error = md5_process(&ctx->u.md, data, len) != CRYPT_OK; 204 ctx->error = sha1_process(&ctx->u.md, data, len) != CRYPT_OK; 208 ctx->error = hmac_process(&ctx->u.hmac, data, len) != CRYPT_OK; 528 "random data for PS", __func__);
|
H A D | crypto_nss.c | 73 item.data = pkey; 113 u8 *data, size_t data_len) 112 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) argument
|
H A D | crypto_openssl.c | 140 u8 *data, size_t data_len) 166 if (EVP_CipherUpdate(&ctx, data, &outl, data, data_len)) 650 void crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) argument 654 HMAC_Update(&ctx->ctx, data, len); 739 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 742 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); 780 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, argument 783 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 825 int omac1_aes_128(const u8 *key, const u8 *data, size_ argument 139 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) argument [all...] |
H A D | fips_prf_openssl.c | 16 static void sha1_transform(u8 *state, const u8 data[64]) argument 21 SHA1_Transform(&context, data);
|
H A D | md5.c | 17 * hmac_md5_vector - HMAC-MD5 over data vector (RFC 2104) 20 * @num_elem: Number of elements in the data vector 21 * @addr: Pointers to the data areas 22 * @len: Lengths of the data blocks 57 * and text is the data being protected */ 93 * hmac_md5 - HMAC-MD5 over data buffer (RFC 2104) 96 * @data: Pointers to the data area 97 * @data_len: Length of the data area 101 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_ argument [all...] |
H A D | rc4.c | 17 u8 *data, size_t data_len) 44 /* Apply RC4 to data */ 45 pos = data; 16 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) argument
|
H A D | sha1-internal.c | 24 * sha1_vector - SHA-1 hash for data vector 25 * @num_elem: Number of elements in the data vector 26 * @addr: Pointers to the data areas 27 * @len: Lengths of the data blocks 59 void SHA1Update(SHA1_CTX* context, unsigned char* data, unsigned int 62 void SHA1Update(SHA1_CTX* context, unsigned char* data, unsigned 243 /* Run your data through this. */ 248 const unsigned char *data = _data; local 258 os_memcpy(&context->buffer[j], data, (i = 64-j)); 261 SHA1Transform(context->state, &data[ [all...] |
H A D | sha1-prf.c | 21 * @data: Extra data to bind into the key 22 * @data_len: Length of the data 31 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 42 addr[1] = data; 30 sha1_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument
|
H A D | sha1.c | 17 * hmac_sha1_vector - HMAC-SHA1 over data vector (RFC 2104) 20 * @num_elem: Number of elements in the data vector 21 * @addr: Pointers to the data areas 22 * @len: Lengths of the data blocks 57 * and text is the data being protected */ 92 * hmac_sha1 - HMAC-SHA1 over data buffer (RFC 2104) 95 * @data: Pointers to the data area 96 * @data_len: Length of the data area 100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_ argument [all...] |
H A D | sha256-prf.c | 21 * @data: Extra data to bind into the key 22 * @data_len: Length of the data 30 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 32 sha256_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8); 41 * @data: Extra data to bind into the key 42 * @data_len: Length of the data 52 const u8 *data, size_t data_len, u8 *buf, 67 addr[2] = data; 29 sha256_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument 51 sha256_prf_bits(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len_bits) argument [all...] |
H A D | sha256.c | 17 * hmac_sha256_vector - HMAC-SHA256 over data vector (RFC 2104) 20 * @num_elem: Number of elements in the data vector 21 * @addr: Pointers to the data areas 22 * @len: Lengths of the data blocks 57 * and text is the data being protected */ 92 * hmac_sha256 - HMAC-SHA256 over data buffer (RFC 2104) 95 * @data: Pointers to the data area 96 * @data_len: Length of the data area 100 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, argument [all...] |
H A D | tls_gnutls.c | 136 * data.. */ 397 "data: %s", gnutls_strerror(ret)); 440 field, gen->d.ia5->data); 442 strlen((char *) gen->d.ia5->data) + 1; 446 snprintf(tmp, len, "%s:%s", field, gen->d.ia5->data); 1084 * to handle the possibility of the decrypted data being longer than 1085 * input data. 1139 int ext_type, const u8 *data, 1138 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
H A D | tls_internal.c | 583 int ext_type, const u8 *data, 589 data, data_len); 582 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
H A D | tls_none.c | 158 int ext_type, const u8 *data, 157 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
H A D | tls_nss.c | 81 wpa_printf(MSG_DEBUG, "NSS: No data available to be read yet"); 111 wpa_hexdump(MSG_MSGDUMP, "NSS: I/O send data", buf, amount); 116 "data to be sent"); 162 PRSocketOptionData *data) 164 switch (data->option) { 167 data->value.non_blocking = PR_TRUE; 171 data->option); 553 * to handle the possibility of the decrypted data being longer than 554 * input data. 600 int ext_type, const u8 *data, 161 nss_io_getsocketoption(PRFileDesc *fd, PRSocketOptionData *data) argument 599 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument [all...] |
H A D | tls_openssl.c | 90 union tls_event_data *data); 785 * automatically. If this is not the case, random data should 802 /* Newer OpenSSL can store app-data per-SSL */ 1126 if (os_strlen((char *) gen->d.ia5->data) == len && 1127 os_memcmp(value, gen->d.ia5->data, len) == 0) 1234 gen->d.dNSName->data, 1236 if (domain_suffix_match(gen->d.dNSName->data, 1264 cn->data, cn->length); 1265 if (domain_suffix_match(cn->data, cn->length, match) == 1) { 1454 "server certificate data"); 2903 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument 3436 tls_session_ticket_ext_cb(SSL *s, const unsigned char *data, int len, void *arg) argument 3463 tls_hello_ext_cb(SSL *s, int client_server, int type, unsigned char *data, int len, void *arg) argument [all...] |
H A D | tls_schannel.c | 330 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process", 344 /* Place for leftover data from Schannel */ 415 "application data", 447 /* TODO: Can this happen? What to do with this data? */ 448 wpa_hexdump(MSG_MSGDUMP, "SChannel - Leftover data", 537 wpa_hexdump_buf_key(MSG_MSGDUMP, "Schannel: Encrypted data " 561 "Schannel: Encrypted data to DecryptMessage", in_data); 605 wpa_printf(MSG_DEBUG, "%s: No output data from " 610 wpa_hexdump_key(MSG_MSGDUMP, "Schannel: Decrypted data from " 653 int ext_type, const u8 *data, 652 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver.h | 9 * hostapd. The first part of the file defines data structures used in various 92 * surveyed channel data 212 * If the driver does not support reporting all IEs, the IE data structure is 234 * follow (with beacon_ie_len octets of data) if the driver provides 500 * convert into EVENT_ASSOCINFO data (see below). 1255 * struct beacon_data - Beacon data 1338 * @priv: private driver interface data 1351 * @priv: private driver interface data 1361 * and as such, should be processed as binary data, not a printable 1369 * @priv: private driver interface data 3837 const u8 *data; member in struct:wpa_event_data::ft_rrb_rx 3848 const u8 *data; member in struct:wpa_event_data::tx_status 3984 const u8 *data; member in struct:wpa_event_data::eapol_rx 4062 const u8 *data; member in struct:wpa_event_data::eapol_tx_status 4181 drv_event_eapol_rx(void *ctx, const u8 *src, const u8 *data, size_t data_len) argument [all...] |