Searched defs:tag (Results 1 - 25 of 981) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/crypto/
H A Daes-eax.c25 * @tag: 16-byte tag value
30 u8 *data, size_t data_len, u8 *tag)
70 tag[i] = nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i];
89 * @tag: 16-byte tag value
90 * Returns: 0 on success, -1 on failure, -2 if tag does not match
94 u8 *data, size_t data_len, const u8 *tag)
140 if (tag[i] != (nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i]))
28 aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, u8 *tag) argument
92 aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, const u8 *tag) argument
H A Daes-gcm.c256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag)
275 aes_gctr(aes, J0, S, sizeof(S), tag);
290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain)
313 if (os_memcmp_const(tag, T, 16) != 0) {
323 const u8 *aad, size_t aad_len, u8 *tag)
326 tag);
254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument
288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_psk.c186 const u8 *pchannel, *tag, *msg; local
264 tag = pchannel;
288 left, tag)) {
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_psk.c336 const u8 *pos, *tag; local
370 tag = pos;
381 tag)) {
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dasn1.h49 unsigned int tag, length; member in struct:asn1_hdr
H A Dtlsv1_cred.c85 static const u8 * search_tag(const char *tag, const u8 *buf, size_t len) argument
89 plen = os_strlen(tag);
94 if (os_memcmp(buf + i, tag, plen) == 0)
111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - "
124 "certificate end tag (%s)", pem_cert_end);
371 hdr.tag != ASN1_TAG_SEQUENCE) {
373 "valid SEQUENCE - found class %d tag 0x%x",
374 hdr.class, hdr.tag);
384 hdr.tag != ASN1_TAG_INTEGER) {
385 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag foun
[all...]
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dhttp_client.c315 char * http_client_get_hdr_line(struct http_client *c, const char *tag) argument
319 return httpread_hdr_line_get(c->hread, tag);
H A Dhttp_server.c187 char * http_request_get_hdr_line(struct http_request *req, const char *tag) argument
189 return httpread_hdr_line_get(req->hread, tag);
H A Dhttpread.c798 * to line within header content matching the given tag
799 * (after the tag itself and any spaces/tabs).
801 * The tag should end with a colon for reliable matching.
805 char * httpread_hdr_line_get(struct httpread *h, const char *tag) argument
807 int tag_len = os_strlen(tag);
814 if (!os_strncasecmp(hdr, tag, tag_len)) {
H A Dupnp_xml.c39 * with an opening tag <label> and ending with a closing tag </label> with
40 * matching label. (There is also a self-closing tag <label/> which is supposed
62 * xml_next_tag - Advance to next tag
64 * @out: OUT: start of tag just after '<'
65 * @out_tagname: OUT: start of name of tag, skipping namespace
66 * @end: OUT: one after tag
69 * A tag has form:
72 * makes the tag an ending tag), the
161 xml_add_tagged_data(struct wpabuf *buf, const char *tag, const char *data) argument
194 const char *tag, *tagname, *end; local
[all...]
H A Dwps_er.c502 const char *tag, *tagname, *end; local
509 if (xml_next_tag(data, &tag, &tagname, &end))
513 *tag != '/' &&
/external/wpa_supplicant_8/src/crypto/
H A Daes-eax.c25 * @tag: 16-byte tag value
30 u8 *data, size_t data_len, u8 *tag)
70 tag[i] = nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i];
89 * @tag: 16-byte tag value
90 * Returns: 0 on success, -1 on failure, -2 if tag does not match
94 u8 *data, size_t data_len, const u8 *tag)
140 if (tag[i] != (nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i]))
28 aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, u8 *tag) argument
92 aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, const u8 *tag) argument
H A Daes-gcm.c256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag)
275 aes_gctr(aes, J0, S, sizeof(S), tag);
290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain)
313 if (os_memcmp_const(tag, T, 16) != 0) {
323 const u8 *aad, size_t aad_len, u8 *tag)
326 tag);
254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument
288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_psk.c186 const u8 *pchannel, *tag, *msg; local
264 tag = pchannel;
288 left, tag)) {
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_psk.c336 const u8 *pos, *tag; local
370 tag = pos;
381 tag)) {
/external/wpa_supplicant_8/src/tls/
H A Dasn1.h49 unsigned int tag, length; member in struct:asn1_hdr
H A Dtlsv1_cred.c85 static const u8 * search_tag(const char *tag, const u8 *buf, size_t len) argument
89 plen = os_strlen(tag);
94 if (os_memcmp(buf + i, tag, plen) == 0)
111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - "
124 "certificate end tag (%s)", pem_cert_end);
371 hdr.tag != ASN1_TAG_SEQUENCE) {
373 "valid SEQUENCE - found class %d tag 0x%x",
374 hdr.class, hdr.tag);
384 hdr.tag != ASN1_TAG_INTEGER) {
385 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag foun
[all...]
/external/wpa_supplicant_8/src/wps/
H A Dhttp_client.c315 char * http_client_get_hdr_line(struct http_client *c, const char *tag) argument
319 return httpread_hdr_line_get(c->hread, tag);
H A Dhttp_server.c187 char * http_request_get_hdr_line(struct http_request *req, const char *tag) argument
189 return httpread_hdr_line_get(req->hread, tag);
H A Dhttpread.c798 * to line within header content matching the given tag
799 * (after the tag itself and any spaces/tabs).
801 * The tag should end with a colon for reliable matching.
805 char * httpread_hdr_line_get(struct httpread *h, const char *tag) argument
807 int tag_len = os_strlen(tag);
814 if (!os_strncasecmp(hdr, tag, tag_len)) {
H A Dupnp_xml.c39 * with an opening tag <label> and ending with a closing tag </label> with
40 * matching label. (There is also a self-closing tag <label/> which is supposed
62 * xml_next_tag - Advance to next tag
64 * @out: OUT: start of tag just after '<'
65 * @out_tagname: OUT: start of name of tag, skipping namespace
66 * @end: OUT: one after tag
69 * A tag has form:
72 * makes the tag an ending tag), the
161 xml_add_tagged_data(struct wpabuf *buf, const char *tag, const char *data) argument
194 const char *tag, *tagname, *end; local
[all...]
H A Dwps_er.c502 const char *tag, *tagname, *end; local
509 if (xml_next_tag(data, &tag, &tagname, &end))
513 *tag != '/' &&
/external/wpa_supplicant_8/wpa_supplicant/
H A Dctrl_iface.c1038 int ndef, int tag)
1043 buf = wpas_p2p_nfc_handover_sel(wpa_s, ndef, tag);
1036 wpas_ctrl_nfc_get_handover_sel_p2p(struct wpa_supplicant *wpa_s, char *reply, size_t max_len, int ndef, int tag) argument
H A Dp2p_supplicant.c7396 int ndef, int tag)
7406 if (!tag && wpa_s->conf->wps_nfc_dh_pubkey == NULL &&
7414 tag ? wpa_s->conf->wps_nfc_dev_pw_id :
7417 tag ? wpa_s->conf->wps_nfc_dev_pw : NULL);
7453 struct p2p_nfc_params *params, int tag)
7489 if (!tag) {
7554 int sel, int tag, int forced_freq)
7564 wpa_hexdump_buf(MSG_DEBUG, "P2P: Received NFC tag payload", data);
7666 if (tag) {
7705 return wpas_p2p_nfc_auth_join(wpa_s, &params, tag);
7395 wpas_p2p_nfc_handover_sel(struct wpa_supplicant *wpa_s, int ndef, int tag) argument
7452 wpas_p2p_nfc_auth_join(struct wpa_supplicant *wpa_s, struct p2p_nfc_params *params, int tag) argument
7552 wpas_p2p_nfc_connection_handover(struct wpa_supplicant *wpa_s, const struct wpabuf *data, int sel, int tag, int forced_freq) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Daes-eax.c25 * @tag: 16-byte tag value
30 u8 *data, size_t data_len, u8 *tag)
70 tag[i] = nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i];
89 * @tag: 16-byte tag value
90 * Returns: 0 on success, -1 on failure, -2 if tag does not match
94 u8 *data, size_t data_len, const u8 *tag)
140 if (tag[i] != (nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i]))
28 aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, u8 *tag) argument
92 aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, const u8 *tag) argument

Completed in 3816 milliseconds

1234567891011>>