/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-eax.c | 25 * @tag: 16-byte tag value 30 u8 *data, size_t data_len, u8 *tag) 70 tag[i] = nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i]; 89 * @tag: 16-byte tag value 90 * Returns: 0 on success, -1 on failure, -2 if tag does not match 94 u8 *data, size_t data_len, const u8 *tag) 140 if (tag[i] != (nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i])) 28 aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, u8 *tag) argument 92 aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, const u8 *tag) argument
|
H A D | aes-gcm.c | 256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) 275 aes_gctr(aes, J0, S, sizeof(S), tag); 290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) 313 if (os_memcmp_const(tag, T, 16) != 0) { 323 const u8 *aad, size_t aad_len, u8 *tag) 326 tag); 254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument 322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
|
H A D | aes_wrap.h | 36 u8 *data, size_t data_len, u8 *tag); 40 u8 *data, size_t data_len, const u8 *tag); 49 u8 *crypt, u8 *tag); 53 const u8 *aad, size_t aad_len, const u8 *tag, 57 const u8 *aad, size_t aad_len, u8 *tag);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_psk.c | 186 const u8 *pchannel, *tag, *msg; local 264 tag = pchannel; 288 left, tag)) {
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_psk.c | 336 const u8 *pos, *tag; local 370 tag = pos; 381 tag)) {
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | asn1.c | 39 hdr->tag = 0; 47 wpa_printf(MSG_MSGDUMP, "ASN.1: Extended tag data: " 49 hdr->tag = (hdr->tag << 7) | (tmp & 0x7f); 52 hdr->tag = hdr->identifier & 0x1f; 142 if (hdr.class != ASN1_CLASS_UNIVERSAL || hdr.tag != ASN1_TAG_OID) { 144 "tag 0x%x", hdr.class, hdr.tag);
|
H A D | asn1.h | 49 unsigned int tag, length; member in struct:asn1_hdr
|
H A D | pkcs1.c | 236 hdr.tag != ASN1_TAG_SEQUENCE) { 238 "PKCS #1: Expected SEQUENCE (DigestInfo) - found class %d tag 0x%x", 239 hdr.class, hdr.tag); 257 hdr.tag != ASN1_TAG_SEQUENCE) { 259 "PKCS #1: Expected SEQUENCE (AlgorithmIdentifier) - found class %d tag 0x%x", 260 hdr.class, hdr.tag); 290 hdr.tag != ASN1_TAG_OCTETSTRING) { 292 "PKCS #1: Expected OCTETSTRING (Digest) - found class %d tag 0x%x", 293 hdr.class, hdr.tag);
|
H A D | pkcs5.c | 83 hdr.tag != ASN1_TAG_SEQUENCE) { 85 "(PBEParameter) - found class %d tag 0x%x", 86 hdr.class, hdr.tag); 95 hdr.tag != ASN1_TAG_OCTETSTRING || 98 "(salt) - found class %d tag 0x%x size %d", 99 hdr.class, hdr.tag, hdr.length); 110 hdr.class != ASN1_CLASS_UNIVERSAL || hdr.tag != ASN1_TAG_INTEGER) { 112 "class %d tag 0x%x", hdr.class, hdr.tag);
|
H A D | pkcs8.c | 32 hdr.tag != ASN1_TAG_SEQUENCE) { 42 hdr.class != ASN1_CLASS_UNIVERSAL || hdr.tag != ASN1_TAG_INTEGER) { 44 "class %d tag 0x%x; assume PKCS #8 not used", 45 hdr.class, hdr.tag); 73 hdr.tag != ASN1_TAG_SEQUENCE) { 75 "(AlgorithmIdentifier) - found class %d tag 0x%x; " 77 hdr.class, hdr.tag); 108 hdr.tag != ASN1_TAG_OCTETSTRING) { 110 "(privateKey) - found class %d tag 0x%x", 111 hdr.class, hdr.tag); [all...] |
H A D | rsa.c | 40 hdr.class != ASN1_CLASS_UNIVERSAL || hdr.tag != ASN1_TAG_INTEGER) { 42 "tag 0x%x", hdr.class, hdr.tag); 89 hdr.tag != ASN1_TAG_SEQUENCE) { 91 "(public key) - found class %d tag 0x%x", 92 hdr.class, hdr.tag); 196 hdr.tag != ASN1_TAG_SEQUENCE) { 198 "(public key) - found class %d tag 0x%x", 199 hdr.class, hdr.tag);
|
H A D | tlsv1_cred.c | 85 static const u8 * search_tag(const char *tag, const u8 *buf, size_t len) argument 89 plen = os_strlen(tag); 94 if (os_memcmp(buf + i, tag, plen) == 0) 111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " 124 "certificate end tag (%s)", pem_cert_end); 371 hdr.tag != ASN1_TAG_SEQUENCE) { 373 "valid SEQUENCE - found class %d tag 0x%x", 374 hdr.class, hdr.tag); 384 hdr.tag != ASN1_TAG_INTEGER) { 385 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag foun [all...] |
H A D | x509v3.c | 196 hdr.tag != ASN1_TAG_SEQUENCE) { 198 "(AlgorithmIdentifier) - found class %d tag 0x%x", 199 hdr.class, hdr.tag); 238 hdr.tag != ASN1_TAG_SEQUENCE) { 240 "(SubjectPublicKeyInfo) - found class %d tag 0x%x", 241 hdr.class, hdr.tag); 257 hdr.tag != ASN1_TAG_BITSTRING) { 259 "(subjectPublicKey) - found class %d tag 0x%x", 260 hdr.class, hdr.tag); 314 hdr.tag ! [all...] |
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | http_client.c | 315 char * http_client_get_hdr_line(struct http_client *c, const char *tag) argument 319 return httpread_hdr_line_get(c->hread, tag);
|
H A D | http_client.h | 37 char * http_client_get_hdr_line(struct http_client *c, const char *tag);
|
H A D | http_server.c | 187 char * http_request_get_hdr_line(struct http_request *req, const char *tag) argument 189 return httpread_hdr_line_get(req->hread, tag);
|
H A D | http_server.h | 23 char * http_request_get_hdr_line(struct http_request *req, const char *tag);
|
H A D | httpread.c | 798 * to line within header content matching the given tag 799 * (after the tag itself and any spaces/tabs). 801 * The tag should end with a colon for reliable matching. 805 char * httpread_hdr_line_get(struct httpread *h, const char *tag) argument 807 int tag_len = os_strlen(tag); 814 if (!os_strncasecmp(hdr, tag, tag_len)) {
|
H A D | httpread.h | 108 * to line within header content matching the given tag 109 * (after the tag itself and any spaces/tabs). 111 * The tag should end with a colon for reliable matching. 115 char * httpread_hdr_line_get(struct httpread *h, const char *tag);
|
H A D | upnp_xml.c | 39 * with an opening tag <label> and ending with a closing tag </label> with 40 * matching label. (There is also a self-closing tag <label/> which is supposed 62 * xml_next_tag - Advance to next tag 64 * @out: OUT: start of tag just after '<' 65 * @out_tagname: OUT: start of name of tag, skipping namespace 66 * @end: OUT: one after tag 69 * A tag has form: 72 * makes the tag an ending tag), the 161 xml_add_tagged_data(struct wpabuf *buf, const char *tag, const char *data) argument 194 const char *tag, *tagname, *end; local [all...] |
H A D | upnp_xml.h | 17 void xml_add_tagged_data(struct wpabuf *buf, const char *tag,
|
H A D | wps_er.c | 502 const char *tag, *tagname, *end; local 509 if (xml_next_tag(data, &tag, &tagname, &end)) 513 *tag != '/' &&
|
/external/wpa_supplicant_8/hostapd/ |
H A D | wps-ap-nfc.py | 173 def wps_tag_read(tag): 175 if len(tag.ndef.message): 176 for record in tag.ndef.message: 179 summary("WPS tag - send to hostapd") 180 success = wpas_tag_read(tag.ndef.message) 183 summary("Empty tag") 191 def rdwr_connected_write(tag): 192 summary("Tag found - writing - " + str(tag)) 194 tag.ndef.message = str(write_data) 196 print "Done - remove tag" [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-eax.c | 25 * @tag: 16-byte tag value 30 u8 *data, size_t data_len, u8 *tag) 70 tag[i] = nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i]; 89 * @tag: 16-byte tag value 90 * Returns: 0 on success, -1 on failure, -2 if tag does not match 94 u8 *data, size_t data_len, const u8 *tag) 140 if (tag[i] != (nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i])) 28 aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, u8 *tag) argument 92 aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, const u8 *tag) argument
|
H A D | aes-gcm.c | 256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) 275 aes_gctr(aes, J0, S, sizeof(S), tag); 290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) 313 if (os_memcmp_const(tag, T, 16) != 0) { 323 const u8 *aad, size_t aad_len, u8 *tag) 326 tag); 254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument 322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
|