/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-eax.c | 25 * @tag: 16-byte tag value 30 u8 *data, size_t data_len, u8 *tag) 70 tag[i] = nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i]; 89 * @tag: 16-byte tag value 90 * Returns: 0 on success, -1 on failure, -2 if tag does not match 94 u8 *data, size_t data_len, const u8 *tag) 140 if (tag[i] != (nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i])) 28 aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, u8 *tag) argument 92 aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, const u8 *tag) argument
|
H A D | aes-gcm.c | 256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) 275 aes_gctr(aes, J0, S, sizeof(S), tag); 290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) 313 if (os_memcmp_const(tag, T, 16) != 0) { 323 const u8 *aad, size_t aad_len, u8 *tag) 326 tag); 254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument 322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_psk.c | 186 const u8 *pchannel, *tag, *msg; local 264 tag = pchannel; 288 left, tag)) {
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_psk.c | 336 const u8 *pos, *tag; local 370 tag = pos; 381 tag)) {
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | asn1.h | 49 unsigned int tag, length; member in struct:asn1_hdr
|
H A D | tlsv1_cred.c | 85 static const u8 * search_tag(const char *tag, const u8 *buf, size_t len) argument 89 plen = os_strlen(tag); 94 if (os_memcmp(buf + i, tag, plen) == 0) 111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " 124 "certificate end tag (%s)", pem_cert_end); 371 hdr.tag != ASN1_TAG_SEQUENCE) { 373 "valid SEQUENCE - found class %d tag 0x%x", 374 hdr.class, hdr.tag); 384 hdr.tag != ASN1_TAG_INTEGER) { 385 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag foun [all...] |
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | http_client.c | 315 char * http_client_get_hdr_line(struct http_client *c, const char *tag) argument 319 return httpread_hdr_line_get(c->hread, tag);
|
H A D | http_server.c | 187 char * http_request_get_hdr_line(struct http_request *req, const char *tag) argument 189 return httpread_hdr_line_get(req->hread, tag);
|
H A D | httpread.c | 798 * to line within header content matching the given tag 799 * (after the tag itself and any spaces/tabs). 801 * The tag should end with a colon for reliable matching. 805 char * httpread_hdr_line_get(struct httpread *h, const char *tag) argument 807 int tag_len = os_strlen(tag); 814 if (!os_strncasecmp(hdr, tag, tag_len)) {
|
H A D | upnp_xml.c | 39 * with an opening tag <label> and ending with a closing tag </label> with 40 * matching label. (There is also a self-closing tag <label/> which is supposed 62 * xml_next_tag - Advance to next tag 64 * @out: OUT: start of tag just after '<' 65 * @out_tagname: OUT: start of name of tag, skipping namespace 66 * @end: OUT: one after tag 69 * A tag has form: 72 * makes the tag an ending tag), the 161 xml_add_tagged_data(struct wpabuf *buf, const char *tag, const char *data) argument 194 const char *tag, *tagname, *end; local [all...] |
H A D | wps_er.c | 502 const char *tag, *tagname, *end; local 509 if (xml_next_tag(data, &tag, &tagname, &end)) 513 *tag != '/' &&
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-eax.c | 25 * @tag: 16-byte tag value 30 u8 *data, size_t data_len, u8 *tag) 70 tag[i] = nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i]; 89 * @tag: 16-byte tag value 90 * Returns: 0 on success, -1 on failure, -2 if tag does not match 94 u8 *data, size_t data_len, const u8 *tag) 140 if (tag[i] != (nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i])) 28 aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, u8 *tag) argument 92 aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, const u8 *tag) argument
|
H A D | aes-gcm.c | 256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) 275 aes_gctr(aes, J0, S, sizeof(S), tag); 290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) 313 if (os_memcmp_const(tag, T, 16) != 0) { 323 const u8 *aad, size_t aad_len, u8 *tag) 326 tag); 254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument 322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_psk.c | 186 const u8 *pchannel, *tag, *msg; local 264 tag = pchannel; 288 left, tag)) {
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_psk.c | 336 const u8 *pos, *tag; local 370 tag = pos; 381 tag)) {
|
/external/wpa_supplicant_8/src/tls/ |
H A D | asn1.h | 49 unsigned int tag, length; member in struct:asn1_hdr
|
H A D | tlsv1_cred.c | 85 static const u8 * search_tag(const char *tag, const u8 *buf, size_t len) argument 89 plen = os_strlen(tag); 94 if (os_memcmp(buf + i, tag, plen) == 0) 111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " 124 "certificate end tag (%s)", pem_cert_end); 371 hdr.tag != ASN1_TAG_SEQUENCE) { 373 "valid SEQUENCE - found class %d tag 0x%x", 374 hdr.class, hdr.tag); 384 hdr.tag != ASN1_TAG_INTEGER) { 385 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag foun [all...] |
/external/wpa_supplicant_8/src/wps/ |
H A D | http_client.c | 315 char * http_client_get_hdr_line(struct http_client *c, const char *tag) argument 319 return httpread_hdr_line_get(c->hread, tag);
|
H A D | http_server.c | 187 char * http_request_get_hdr_line(struct http_request *req, const char *tag) argument 189 return httpread_hdr_line_get(req->hread, tag);
|
H A D | httpread.c | 798 * to line within header content matching the given tag 799 * (after the tag itself and any spaces/tabs). 801 * The tag should end with a colon for reliable matching. 805 char * httpread_hdr_line_get(struct httpread *h, const char *tag) argument 807 int tag_len = os_strlen(tag); 814 if (!os_strncasecmp(hdr, tag, tag_len)) {
|
H A D | upnp_xml.c | 39 * with an opening tag <label> and ending with a closing tag </label> with 40 * matching label. (There is also a self-closing tag <label/> which is supposed 62 * xml_next_tag - Advance to next tag 64 * @out: OUT: start of tag just after '<' 65 * @out_tagname: OUT: start of name of tag, skipping namespace 66 * @end: OUT: one after tag 69 * A tag has form: 72 * makes the tag an ending tag), the 161 xml_add_tagged_data(struct wpabuf *buf, const char *tag, const char *data) argument 194 const char *tag, *tagname, *end; local [all...] |
H A D | wps_er.c | 502 const char *tag, *tagname, *end; local 509 if (xml_next_tag(data, &tag, &tagname, &end)) 513 *tag != '/' &&
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ctrl_iface.c | 1038 int ndef, int tag) 1043 buf = wpas_p2p_nfc_handover_sel(wpa_s, ndef, tag); 1036 wpas_ctrl_nfc_get_handover_sel_p2p(struct wpa_supplicant *wpa_s, char *reply, size_t max_len, int ndef, int tag) argument
|
H A D | p2p_supplicant.c | 7396 int ndef, int tag) 7406 if (!tag && wpa_s->conf->wps_nfc_dh_pubkey == NULL && 7414 tag ? wpa_s->conf->wps_nfc_dev_pw_id : 7417 tag ? wpa_s->conf->wps_nfc_dev_pw : NULL); 7453 struct p2p_nfc_params *params, int tag) 7489 if (!tag) { 7554 int sel, int tag, int forced_freq) 7564 wpa_hexdump_buf(MSG_DEBUG, "P2P: Received NFC tag payload", data); 7666 if (tag) { 7705 return wpas_p2p_nfc_auth_join(wpa_s, ¶ms, tag); 7395 wpas_p2p_nfc_handover_sel(struct wpa_supplicant *wpa_s, int ndef, int tag) argument 7452 wpas_p2p_nfc_auth_join(struct wpa_supplicant *wpa_s, struct p2p_nfc_params *params, int tag) argument 7552 wpas_p2p_nfc_connection_handover(struct wpa_supplicant *wpa_s, const struct wpabuf *data, int sel, int tag, int forced_freq) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-eax.c | 25 * @tag: 16-byte tag value 30 u8 *data, size_t data_len, u8 *tag) 70 tag[i] = nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i]; 89 * @tag: 16-byte tag value 90 * Returns: 0 on success, -1 on failure, -2 if tag does not match 94 u8 *data, size_t data_len, const u8 *tag) 140 if (tag[i] != (nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i])) 28 aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, u8 *tag) argument 92 aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, const u8 *tag) argument
|