Searched defs:token (Results 1 - 25 of 705) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_11.c398 const u8 *token, size_t token_len)
406 os_memcmp_const(token, mac, SHA256_MAC_LEN) != 0)
417 u8 *token; local
426 wpa_hexdump(MSG_DEBUG, "SAE: Updated token key",
435 token = wpabuf_put(buf, SHA256_MAC_LEN);
437 addr, ETH_ALEN, token);
460 const u8 *token = NULL; local
467 mgmt->u.auth.variable, &token,
469 if (token && check_sae_token(hapd, sta->addr, token, token_le
397 check_sae_token(struct hostapd_data *hapd, const u8 *addr, const u8 *token, size_t token_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/common/
H A Dsae.c651 const struct wpabuf *token)
659 if (token)
660 wpabuf_put_buf(buf, token);
729 const u8 *end, const u8 **token,
736 if (token)
737 *token = *pos;
742 if (token)
743 *token = NULL;
894 const u8 **token, size_t *token_len, int *allowed_groups)
908 sae_parse_commit_token(sae, &pos, end, token, token_le
650 sae_write_commit(struct sae_data *sae, struct wpabuf *buf, const struct wpabuf *token) argument
728 sae_parse_commit_token(struct sae_data *sae, const u8 **pos, const u8 *end, const u8 **token, size_t *token_len) argument
893 sae_parse_commit(struct sae_data *sae, const u8 *data, size_t len, const u8 **token, size_t *token_len, int *allowed_groups) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_pwd_common.c91 u8 *id_peer, int id_peer_len, u8 *token)
176 * pwd-seed = H(token | peer-id | server-id | password |
182 eap_pwd_h_update(hash, token, sizeof(u32));
88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
H A Deap_pwd_common.h51 u8 token[4]; member in struct:eap_pwd_id
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_pwd.c27 u32 token; member in struct:eap_pwd_data
179 data->token = os_random();
183 wpabuf_put_data(data->outbuf, &data->token, sizeof(data->token));
591 (os_memcmp(id->token, (u8 *)&data->token, sizeof(data->token))) ||
617 (u8 *) &data->token)) {
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_registrar.c42 static void wps_remove_nfc_pw_token(struct wps_nfc_pw_token *token) argument
44 dl_list_del(&token->list);
45 bin_clear_free(token, sizeof(*token));
51 struct wps_nfc_pw_token *token, *prev; local
52 dl_list_for_each_safe(token, prev, tokens, struct wps_nfc_pw_token,
54 if (pw_id == 0 || pw_id == token->pw_id)
55 wps_remove_nfc_pw_token(token);
63 struct wps_nfc_pw_token *token; local
64 dl_list_for_each(token, token
2585 struct wps_nfc_pw_token *token; local
3551 struct wps_nfc_pw_token *token; local
3632 wps_registrar_remove_nfc_pw_token(struct wps_registrar *reg, struct wps_nfc_pw_token *token) argument
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dieee802_11.c398 const u8 *token, size_t token_len)
406 os_memcmp_const(token, mac, SHA256_MAC_LEN) != 0)
417 u8 *token; local
426 wpa_hexdump(MSG_DEBUG, "SAE: Updated token key",
435 token = wpabuf_put(buf, SHA256_MAC_LEN);
437 addr, ETH_ALEN, token);
460 const u8 *token = NULL; local
467 mgmt->u.auth.variable, &token,
469 if (token && check_sae_token(hapd, sta->addr, token, token_le
397 check_sae_token(struct hostapd_data *hapd, const u8 *addr, const u8 *token, size_t token_len) argument
[all...]
/external/wpa_supplicant_8/src/common/
H A Dsae.c651 const struct wpabuf *token)
659 if (token)
660 wpabuf_put_buf(buf, token);
729 const u8 *end, const u8 **token,
736 if (token)
737 *token = *pos;
742 if (token)
743 *token = NULL;
894 const u8 **token, size_t *token_len, int *allowed_groups)
908 sae_parse_commit_token(sae, &pos, end, token, token_le
650 sae_write_commit(struct sae_data *sae, struct wpabuf *buf, const struct wpabuf *token) argument
728 sae_parse_commit_token(struct sae_data *sae, const u8 **pos, const u8 *end, const u8 **token, size_t *token_len) argument
893 sae_parse_commit(struct sae_data *sae, const u8 *data, size_t len, const u8 **token, size_t *token_len, int *allowed_groups) argument
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_pwd_common.c91 u8 *id_peer, int id_peer_len, u8 *token)
176 * pwd-seed = H(token | peer-id | server-id | password |
182 eap_pwd_h_update(hash, token, sizeof(u32));
88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
H A Deap_pwd_common.h51 u8 token[4]; member in struct:eap_pwd_id
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_pwd.c27 u32 token; member in struct:eap_pwd_data
179 data->token = os_random();
183 wpabuf_put_data(data->outbuf, &data->token, sizeof(data->token));
591 (os_memcmp(id->token, (u8 *)&data->token, sizeof(data->token))) ||
617 (u8 *) &data->token)) {
/external/wpa_supplicant_8/src/wps/
H A Dwps_registrar.c42 static void wps_remove_nfc_pw_token(struct wps_nfc_pw_token *token) argument
44 dl_list_del(&token->list);
45 bin_clear_free(token, sizeof(*token));
51 struct wps_nfc_pw_token *token, *prev; local
52 dl_list_for_each_safe(token, prev, tokens, struct wps_nfc_pw_token,
54 if (pw_id == 0 || pw_id == token->pw_id)
55 wps_remove_nfc_pw_token(token);
63 struct wps_nfc_pw_token *token; local
64 dl_list_for_each(token, token
2585 struct wps_nfc_pw_token *token; local
3551 struct wps_nfc_pw_token *token; local
3632 wps_registrar_remove_nfc_pw_token(struct wps_registrar *reg, struct wps_nfc_pw_token *token) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_11.c398 const u8 *token, size_t token_len)
406 os_memcmp_const(token, mac, SHA256_MAC_LEN) != 0)
417 u8 *token; local
426 wpa_hexdump(MSG_DEBUG, "SAE: Updated token key",
435 token = wpabuf_put(buf, SHA256_MAC_LEN);
437 addr, ETH_ALEN, token);
460 const u8 *token = NULL; local
467 mgmt->u.auth.variable, &token,
469 if (token && check_sae_token(hapd, sta->addr, token, token_le
397 check_sae_token(struct hostapd_data *hapd, const u8 *addr, const u8 *token, size_t token_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dsae.c651 const struct wpabuf *token)
659 if (token)
660 wpabuf_put_buf(buf, token);
729 const u8 *end, const u8 **token,
736 if (token)
737 *token = *pos;
742 if (token)
743 *token = NULL;
894 const u8 **token, size_t *token_len, int *allowed_groups)
908 sae_parse_commit_token(sae, &pos, end, token, token_le
650 sae_write_commit(struct sae_data *sae, struct wpabuf *buf, const struct wpabuf *token) argument
728 sae_parse_commit_token(struct sae_data *sae, const u8 **pos, const u8 *end, const u8 **token, size_t *token_len) argument
893 sae_parse_commit(struct sae_data *sae, const u8 *data, size_t len, const u8 **token, size_t *token_len, int *allowed_groups) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_pwd_common.c91 u8 *id_peer, int id_peer_len, u8 *token)
176 * pwd-seed = H(token | peer-id | server-id | password |
182 eap_pwd_h_update(hash, token, sizeof(u32));
88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
H A Deap_pwd_common.h51 u8 token[4]; member in struct:eap_pwd_id
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_pwd.c27 u32 token; member in struct:eap_pwd_data
179 data->token = os_random();
183 wpabuf_put_data(data->outbuf, &data->token, sizeof(data->token));
591 (os_memcmp(id->token, (u8 *)&data->token, sizeof(data->token))) ||
617 (u8 *) &data->token)) {
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_registrar.c42 static void wps_remove_nfc_pw_token(struct wps_nfc_pw_token *token) argument
44 dl_list_del(&token->list);
45 bin_clear_free(token, sizeof(*token));
51 struct wps_nfc_pw_token *token, *prev; local
52 dl_list_for_each_safe(token, prev, tokens, struct wps_nfc_pw_token,
54 if (pw_id == 0 || pw_id == token->pw_id)
55 wps_remove_nfc_pw_token(token);
63 struct wps_nfc_pw_token *token; local
64 dl_list_for_each(token, token
2585 struct wps_nfc_pw_token *token; local
3551 struct wps_nfc_pw_token *token; local
3632 wps_registrar_remove_nfc_pw_token(struct wps_registrar *reg, struct wps_nfc_pw_token *token) argument
[all...]
/external/vixl/src/a64/
H A Ddebugger-a64.cc42 // Debugger command lines are broken up in token of different type to make
897 Token* token = RegisterToken::Tokenize(arg); local
898 if (token != NULL) {
899 return token;
902 token = FPRegisterToken::Tokenize(arg);
903 if (token != NULL) {
904 return token;
907 token = IdentifierToken::Tokenize(arg);
908 if (token != NULL) {
909 return token;
[all...]
/external/webp/src/enc/
H A Dbackward_references.c907 const PixOrCopy token = PixOrCopyCreateCacheIdx(ix); local
908 VP8LHistogramAddSinglePixOrCopy(histo, &token);
H A Dtoken.c10 // Paginated token buffer
12 // A 'token' is a bit value associated with a probability, either fixed
30 #define MIN_PAGE_SIZE 8192 // minimum number of token per page
210 const token_t token = tokens[n];
211 if (!(token & FIXED_PROBA_BIT)) {
212 Record((token >> 15) & 1, stats + (token & 0x3fffu));
235 const token_t token = tokens[n]; local
236 const int bit = (token >> 15) & 1;
237 if (token
261 const token_t token = tokens[n]; local
[all...]
/external/valgrind/main/coregrind/
H A Dm_libcbase.c424 HChar *token; local
437 /* Find the end of the token. */
438 token = s;
439 s = VG_(strpbrk (token, delim));
441 /* This token finishes the string. */
442 *saveptr = token + VG_(strlen) (token);
445 /* Terminate the token and make OLDS point past it. */
449 return token;
503 HChar *token; local
[all...]
/external/tcpdump/
H A Dmptcp.h73 u_int8_t token[4]; member in struct:mp_join::__anon31452::__anon31453
/external/sqlite/android/
H A Dsqlite3_android.cpp238 * It will split <data> on each instance of <delimiter> and insert each token
240 * token TEXT, source INTEGER, token_index INTEGER, tag (any type)
244 * One row is inserted for each token in <data>.
246 * In the first inserted row, 'token' is the hex collation key of
249 * 'token' will be set to the hex collation key of the I:th token (0-based).
254 * and one row for each token except the first one.
295 char * sql = sqlite3_mprintf("INSERT INTO %s (token, source%s%s) VALUES (?, ?%s%s);",
350 UChar * token = NULL; local
356 token
[all...]
/external/sqlite/dist/orig/
H A Dsqlite3.c2116 ** complete if it ends with a semicolon token and is not a prefix of a
2119 ** independent tokens (they are part of the token in which they are
9178 void *token; /* id that may be used to recursive triggers */ member in struct:SubProgram
11214 ** Each token coming out of the lexer is an instance of
11222 const char *z; /* Text of the token. Not NULL-terminated! */
11223 unsigned int n; /* Number of characters in this token */
11290 ** Expr.op is the opcode. The integer parser token codes are reused
11297 ** or TK_STRING), then Expr.token contains the text of the SQL literal. If
11298 ** the expression is a variable (TK_VARIABLE), then Expr.token contains the
11300 ** then Expr.token contain
13997 void *token; /* Copy of SubProgram.token */ member in struct:VdbeFrame
82625 int token; local
82696 int token; /* Type of token */ local
82746 int token; local
121895 u8 token; /* Value of the next token */ local
[all...]

Completed in 464 milliseconds

1234567891011>>