/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11.c | 398 const u8 *token, size_t token_len) 406 os_memcmp_const(token, mac, SHA256_MAC_LEN) != 0) 417 u8 *token; local 426 wpa_hexdump(MSG_DEBUG, "SAE: Updated token key", 435 token = wpabuf_put(buf, SHA256_MAC_LEN); 437 addr, ETH_ALEN, token); 460 const u8 *token = NULL; local 467 mgmt->u.auth.variable, &token, 469 if (token && check_sae_token(hapd, sta->addr, token, token_le 397 check_sae_token(struct hostapd_data *hapd, const u8 *addr, const u8 *token, size_t token_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | sae.c | 651 const struct wpabuf *token) 659 if (token) 660 wpabuf_put_buf(buf, token); 729 const u8 *end, const u8 **token, 736 if (token) 737 *token = *pos; 742 if (token) 743 *token = NULL; 894 const u8 **token, size_t *token_len, int *allowed_groups) 908 sae_parse_commit_token(sae, &pos, end, token, token_le 650 sae_write_commit(struct sae_data *sae, struct wpabuf *buf, const struct wpabuf *token) argument 728 sae_parse_commit_token(struct sae_data *sae, const u8 **pos, const u8 *end, const u8 **token, size_t *token_len) argument 893 sae_parse_commit(struct sae_data *sae, const u8 *data, size_t len, const u8 **token, size_t *token_len, int *allowed_groups) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pwd_common.c | 91 u8 *id_peer, int id_peer_len, u8 *token) 176 * pwd-seed = H(token | peer-id | server-id | password | 182 eap_pwd_h_update(hash, token, sizeof(u32)); 88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
|
H A D | eap_pwd_common.h | 51 u8 token[4]; member in struct:eap_pwd_id
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_pwd.c | 27 u32 token; member in struct:eap_pwd_data 179 data->token = os_random(); 183 wpabuf_put_data(data->outbuf, &data->token, sizeof(data->token)); 591 (os_memcmp(id->token, (u8 *)&data->token, sizeof(data->token))) || 617 (u8 *) &data->token)) {
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_registrar.c | 42 static void wps_remove_nfc_pw_token(struct wps_nfc_pw_token *token) argument 44 dl_list_del(&token->list); 45 bin_clear_free(token, sizeof(*token)); 51 struct wps_nfc_pw_token *token, *prev; local 52 dl_list_for_each_safe(token, prev, tokens, struct wps_nfc_pw_token, 54 if (pw_id == 0 || pw_id == token->pw_id) 55 wps_remove_nfc_pw_token(token); 63 struct wps_nfc_pw_token *token; local 64 dl_list_for_each(token, token 2585 struct wps_nfc_pw_token *token; local 3551 struct wps_nfc_pw_token *token; local 3632 wps_registrar_remove_nfc_pw_token(struct wps_registrar *reg, struct wps_nfc_pw_token *token) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11.c | 398 const u8 *token, size_t token_len) 406 os_memcmp_const(token, mac, SHA256_MAC_LEN) != 0) 417 u8 *token; local 426 wpa_hexdump(MSG_DEBUG, "SAE: Updated token key", 435 token = wpabuf_put(buf, SHA256_MAC_LEN); 437 addr, ETH_ALEN, token); 460 const u8 *token = NULL; local 467 mgmt->u.auth.variable, &token, 469 if (token && check_sae_token(hapd, sta->addr, token, token_le 397 check_sae_token(struct hostapd_data *hapd, const u8 *addr, const u8 *token, size_t token_len) argument [all...] |
/external/wpa_supplicant_8/src/common/ |
H A D | sae.c | 651 const struct wpabuf *token) 659 if (token) 660 wpabuf_put_buf(buf, token); 729 const u8 *end, const u8 **token, 736 if (token) 737 *token = *pos; 742 if (token) 743 *token = NULL; 894 const u8 **token, size_t *token_len, int *allowed_groups) 908 sae_parse_commit_token(sae, &pos, end, token, token_le 650 sae_write_commit(struct sae_data *sae, struct wpabuf *buf, const struct wpabuf *token) argument 728 sae_parse_commit_token(struct sae_data *sae, const u8 **pos, const u8 *end, const u8 **token, size_t *token_len) argument 893 sae_parse_commit(struct sae_data *sae, const u8 *data, size_t len, const u8 **token, size_t *token_len, int *allowed_groups) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pwd_common.c | 91 u8 *id_peer, int id_peer_len, u8 *token) 176 * pwd-seed = H(token | peer-id | server-id | password | 182 eap_pwd_h_update(hash, token, sizeof(u32)); 88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
|
H A D | eap_pwd_common.h | 51 u8 token[4]; member in struct:eap_pwd_id
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_pwd.c | 27 u32 token; member in struct:eap_pwd_data 179 data->token = os_random(); 183 wpabuf_put_data(data->outbuf, &data->token, sizeof(data->token)); 591 (os_memcmp(id->token, (u8 *)&data->token, sizeof(data->token))) || 617 (u8 *) &data->token)) {
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_registrar.c | 42 static void wps_remove_nfc_pw_token(struct wps_nfc_pw_token *token) argument 44 dl_list_del(&token->list); 45 bin_clear_free(token, sizeof(*token)); 51 struct wps_nfc_pw_token *token, *prev; local 52 dl_list_for_each_safe(token, prev, tokens, struct wps_nfc_pw_token, 54 if (pw_id == 0 || pw_id == token->pw_id) 55 wps_remove_nfc_pw_token(token); 63 struct wps_nfc_pw_token *token; local 64 dl_list_for_each(token, token 2585 struct wps_nfc_pw_token *token; local 3551 struct wps_nfc_pw_token *token; local 3632 wps_registrar_remove_nfc_pw_token(struct wps_registrar *reg, struct wps_nfc_pw_token *token) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11.c | 398 const u8 *token, size_t token_len) 406 os_memcmp_const(token, mac, SHA256_MAC_LEN) != 0) 417 u8 *token; local 426 wpa_hexdump(MSG_DEBUG, "SAE: Updated token key", 435 token = wpabuf_put(buf, SHA256_MAC_LEN); 437 addr, ETH_ALEN, token); 460 const u8 *token = NULL; local 467 mgmt->u.auth.variable, &token, 469 if (token && check_sae_token(hapd, sta->addr, token, token_le 397 check_sae_token(struct hostapd_data *hapd, const u8 *addr, const u8 *token, size_t token_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | sae.c | 651 const struct wpabuf *token) 659 if (token) 660 wpabuf_put_buf(buf, token); 729 const u8 *end, const u8 **token, 736 if (token) 737 *token = *pos; 742 if (token) 743 *token = NULL; 894 const u8 **token, size_t *token_len, int *allowed_groups) 908 sae_parse_commit_token(sae, &pos, end, token, token_le 650 sae_write_commit(struct sae_data *sae, struct wpabuf *buf, const struct wpabuf *token) argument 728 sae_parse_commit_token(struct sae_data *sae, const u8 **pos, const u8 *end, const u8 **token, size_t *token_len) argument 893 sae_parse_commit(struct sae_data *sae, const u8 *data, size_t len, const u8 **token, size_t *token_len, int *allowed_groups) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_pwd_common.c | 91 u8 *id_peer, int id_peer_len, u8 *token) 176 * pwd-seed = H(token | peer-id | server-id | password | 182 eap_pwd_h_update(hash, token, sizeof(u32)); 88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
|
H A D | eap_pwd_common.h | 51 u8 token[4]; member in struct:eap_pwd_id
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_pwd.c | 27 u32 token; member in struct:eap_pwd_data 179 data->token = os_random(); 183 wpabuf_put_data(data->outbuf, &data->token, sizeof(data->token)); 591 (os_memcmp(id->token, (u8 *)&data->token, sizeof(data->token))) || 617 (u8 *) &data->token)) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_registrar.c | 42 static void wps_remove_nfc_pw_token(struct wps_nfc_pw_token *token) argument 44 dl_list_del(&token->list); 45 bin_clear_free(token, sizeof(*token)); 51 struct wps_nfc_pw_token *token, *prev; local 52 dl_list_for_each_safe(token, prev, tokens, struct wps_nfc_pw_token, 54 if (pw_id == 0 || pw_id == token->pw_id) 55 wps_remove_nfc_pw_token(token); 63 struct wps_nfc_pw_token *token; local 64 dl_list_for_each(token, token 2585 struct wps_nfc_pw_token *token; local 3551 struct wps_nfc_pw_token *token; local 3632 wps_registrar_remove_nfc_pw_token(struct wps_registrar *reg, struct wps_nfc_pw_token *token) argument [all...] |
/external/vixl/src/a64/ |
H A D | debugger-a64.cc | 42 // Debugger command lines are broken up in token of different type to make 897 Token* token = RegisterToken::Tokenize(arg); local 898 if (token != NULL) { 899 return token; 902 token = FPRegisterToken::Tokenize(arg); 903 if (token != NULL) { 904 return token; 907 token = IdentifierToken::Tokenize(arg); 908 if (token != NULL) { 909 return token; [all...] |
/external/webp/src/enc/ |
H A D | backward_references.c | 907 const PixOrCopy token = PixOrCopyCreateCacheIdx(ix); local 908 VP8LHistogramAddSinglePixOrCopy(histo, &token);
|
H A D | token.c | 10 // Paginated token buffer 12 // A 'token' is a bit value associated with a probability, either fixed 30 #define MIN_PAGE_SIZE 8192 // minimum number of token per page 210 const token_t token = tokens[n]; 211 if (!(token & FIXED_PROBA_BIT)) { 212 Record((token >> 15) & 1, stats + (token & 0x3fffu)); 235 const token_t token = tokens[n]; local 236 const int bit = (token >> 15) & 1; 237 if (token 261 const token_t token = tokens[n]; local [all...] |
/external/valgrind/main/coregrind/ |
H A D | m_libcbase.c | 424 HChar *token; local 437 /* Find the end of the token. */ 438 token = s; 439 s = VG_(strpbrk (token, delim)); 441 /* This token finishes the string. */ 442 *saveptr = token + VG_(strlen) (token); 445 /* Terminate the token and make OLDS point past it. */ 449 return token; 503 HChar *token; local [all...] |
/external/tcpdump/ |
H A D | mptcp.h | 73 u_int8_t token[4]; member in struct:mp_join::__anon31452::__anon31453
|
/external/sqlite/android/ |
H A D | sqlite3_android.cpp | 238 * It will split <data> on each instance of <delimiter> and insert each token 240 * token TEXT, source INTEGER, token_index INTEGER, tag (any type) 244 * One row is inserted for each token in <data>. 246 * In the first inserted row, 'token' is the hex collation key of 249 * 'token' will be set to the hex collation key of the I:th token (0-based). 254 * and one row for each token except the first one. 295 char * sql = sqlite3_mprintf("INSERT INTO %s (token, source%s%s) VALUES (?, ?%s%s);", 350 UChar * token = NULL; local 356 token [all...] |
/external/sqlite/dist/orig/ |
H A D | sqlite3.c | 2116 ** complete if it ends with a semicolon token and is not a prefix of a 2119 ** independent tokens (they are part of the token in which they are 9178 void *token; /* id that may be used to recursive triggers */ member in struct:SubProgram 11214 ** Each token coming out of the lexer is an instance of 11222 const char *z; /* Text of the token. Not NULL-terminated! */ 11223 unsigned int n; /* Number of characters in this token */ 11290 ** Expr.op is the opcode. The integer parser token codes are reused 11297 ** or TK_STRING), then Expr.token contains the text of the SQL literal. If 11298 ** the expression is a variable (TK_VARIABLE), then Expr.token contains the 11300 ** then Expr.token contain 13997 void *token; /* Copy of SubProgram.token */ member in struct:VdbeFrame 82625 int token; local 82696 int token; /* Type of token */ local 82746 int token; local 121895 u8 token; /* Value of the next token */ local [all...] |