Searched refs:tag (Results 1 - 25 of 1855) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/crypto/
H A Daes-eax.c25 * @tag: 16-byte tag value
30 u8 *data, size_t data_len, u8 *tag)
70 tag[i] = nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i];
89 * @tag: 16-byte tag value
90 * Returns: 0 on success, -1 on failure, -2 if tag does not match
94 u8 *data, size_t data_len, const u8 *tag)
140 if (tag[i] != (nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i]))
28 aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, u8 *tag) argument
92 aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, const u8 *tag) argument
H A Daes-gcm.c256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag)
275 aes_gctr(aes, J0, S, sizeof(S), tag);
290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain)
313 if (os_memcmp_const(tag, T, 16) != 0) {
323 const u8 *aad, size_t aad_len, u8 *tag)
326 tag);
254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument
288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
H A Daes_wrap.h36 u8 *data, size_t data_len, u8 *tag);
40 u8 *data, size_t data_len, const u8 *tag);
49 u8 *crypt, u8 *tag);
53 const u8 *aad, size_t aad_len, const u8 *tag,
57 const u8 *aad, size_t aad_len, u8 *tag);
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_psk.c186 const u8 *pchannel, *tag, *msg; local
264 tag = pchannel;
288 left, tag)) {
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_psk.c336 const u8 *pos, *tag; local
370 tag = pos;
381 tag)) {
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dasn1.c39 hdr->tag = 0;
47 wpa_printf(MSG_MSGDUMP, "ASN.1: Extended tag data: "
49 hdr->tag = (hdr->tag << 7) | (tmp & 0x7f);
52 hdr->tag = hdr->identifier & 0x1f;
142 if (hdr.class != ASN1_CLASS_UNIVERSAL || hdr.tag != ASN1_TAG_OID) {
144 "tag 0x%x", hdr.class, hdr.tag);
H A Dasn1.h49 unsigned int tag, length; member in struct:asn1_hdr
H A Dpkcs1.c236 hdr.tag != ASN1_TAG_SEQUENCE) {
238 "PKCS #1: Expected SEQUENCE (DigestInfo) - found class %d tag 0x%x",
239 hdr.class, hdr.tag);
257 hdr.tag != ASN1_TAG_SEQUENCE) {
259 "PKCS #1: Expected SEQUENCE (AlgorithmIdentifier) - found class %d tag 0x%x",
260 hdr.class, hdr.tag);
290 hdr.tag != ASN1_TAG_OCTETSTRING) {
292 "PKCS #1: Expected OCTETSTRING (Digest) - found class %d tag 0x%x",
293 hdr.class, hdr.tag);
H A Dpkcs5.c83 hdr.tag != ASN1_TAG_SEQUENCE) {
85 "(PBEParameter) - found class %d tag 0x%x",
86 hdr.class, hdr.tag);
95 hdr.tag != ASN1_TAG_OCTETSTRING ||
98 "(salt) - found class %d tag 0x%x size %d",
99 hdr.class, hdr.tag, hdr.length);
110 hdr.class != ASN1_CLASS_UNIVERSAL || hdr.tag != ASN1_TAG_INTEGER) {
112 "class %d tag 0x%x", hdr.class, hdr.tag);
H A Dpkcs8.c32 hdr.tag != ASN1_TAG_SEQUENCE) {
42 hdr.class != ASN1_CLASS_UNIVERSAL || hdr.tag != ASN1_TAG_INTEGER) {
44 "class %d tag 0x%x; assume PKCS #8 not used",
45 hdr.class, hdr.tag);
73 hdr.tag != ASN1_TAG_SEQUENCE) {
75 "(AlgorithmIdentifier) - found class %d tag 0x%x; "
77 hdr.class, hdr.tag);
108 hdr.tag != ASN1_TAG_OCTETSTRING) {
110 "(privateKey) - found class %d tag 0x%x",
111 hdr.class, hdr.tag);
[all...]
H A Drsa.c40 hdr.class != ASN1_CLASS_UNIVERSAL || hdr.tag != ASN1_TAG_INTEGER) {
42 "tag 0x%x", hdr.class, hdr.tag);
89 hdr.tag != ASN1_TAG_SEQUENCE) {
91 "(public key) - found class %d tag 0x%x",
92 hdr.class, hdr.tag);
196 hdr.tag != ASN1_TAG_SEQUENCE) {
198 "(public key) - found class %d tag 0x%x",
199 hdr.class, hdr.tag);
H A Dtlsv1_cred.c85 static const u8 * search_tag(const char *tag, const u8 *buf, size_t len) argument
89 plen = os_strlen(tag);
94 if (os_memcmp(buf + i, tag, plen) == 0)
111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - "
124 "certificate end tag (%s)", pem_cert_end);
371 hdr.tag != ASN1_TAG_SEQUENCE) {
373 "valid SEQUENCE - found class %d tag 0x%x",
374 hdr.class, hdr.tag);
384 hdr.tag != ASN1_TAG_INTEGER) {
385 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag foun
[all...]
H A Dx509v3.c196 hdr.tag != ASN1_TAG_SEQUENCE) {
198 "(AlgorithmIdentifier) - found class %d tag 0x%x",
199 hdr.class, hdr.tag);
238 hdr.tag != ASN1_TAG_SEQUENCE) {
240 "(SubjectPublicKeyInfo) - found class %d tag 0x%x",
241 hdr.class, hdr.tag);
257 hdr.tag != ASN1_TAG_BITSTRING) {
259 "(subjectPublicKey) - found class %d tag 0x%x",
260 hdr.class, hdr.tag);
314 hdr.tag !
[all...]
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dhttp_client.c315 char * http_client_get_hdr_line(struct http_client *c, const char *tag) argument
319 return httpread_hdr_line_get(c->hread, tag);
H A Dhttp_client.h37 char * http_client_get_hdr_line(struct http_client *c, const char *tag);
H A Dhttp_server.c187 char * http_request_get_hdr_line(struct http_request *req, const char *tag) argument
189 return httpread_hdr_line_get(req->hread, tag);
H A Dhttp_server.h23 char * http_request_get_hdr_line(struct http_request *req, const char *tag);
H A Dhttpread.c798 * to line within header content matching the given tag
799 * (after the tag itself and any spaces/tabs).
801 * The tag should end with a colon for reliable matching.
805 char * httpread_hdr_line_get(struct httpread *h, const char *tag) argument
807 int tag_len = os_strlen(tag);
814 if (!os_strncasecmp(hdr, tag, tag_len)) {
H A Dhttpread.h108 * to line within header content matching the given tag
109 * (after the tag itself and any spaces/tabs).
111 * The tag should end with a colon for reliable matching.
115 char * httpread_hdr_line_get(struct httpread *h, const char *tag);
H A Dupnp_xml.c39 * with an opening tag <label> and ending with a closing tag </label> with
40 * matching label. (There is also a self-closing tag <label/> which is supposed
62 * xml_next_tag - Advance to next tag
64 * @out: OUT: start of tag just after '<'
65 * @out_tagname: OUT: start of name of tag, skipping namespace
66 * @end: OUT: one after tag
69 * A tag has form:
72 * makes the tag an ending tag), the
161 xml_add_tagged_data(struct wpabuf *buf, const char *tag, const char *data) argument
194 const char *tag, *tagname, *end; local
[all...]
H A Dupnp_xml.h17 void xml_add_tagged_data(struct wpabuf *buf, const char *tag,
H A Dwps_er.c502 const char *tag, *tagname, *end; local
509 if (xml_next_tag(data, &tag, &tagname, &end))
513 *tag != '/' &&
/external/wpa_supplicant_8/hostapd/
H A Dwps-ap-nfc.py173 def wps_tag_read(tag):
175 if len(tag.ndef.message):
176 for record in tag.ndef.message:
179 summary("WPS tag - send to hostapd")
180 success = wpas_tag_read(tag.ndef.message)
183 summary("Empty tag")
191 def rdwr_connected_write(tag):
192 summary("Tag found - writing - " + str(tag))
194 tag.ndef.message = str(write_data)
196 print "Done - remove tag"
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Daes-eax.c25 * @tag: 16-byte tag value
30 u8 *data, size_t data_len, u8 *tag)
70 tag[i] = nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i];
89 * @tag: 16-byte tag value
90 * Returns: 0 on success, -1 on failure, -2 if tag does not match
94 u8 *data, size_t data_len, const u8 *tag)
140 if (tag[i] != (nonce_mac[i] ^ data_mac[i] ^ hdr_mac[i]))
28 aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, u8 *tag) argument
92 aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, const u8 *tag) argument
H A Daes-gcm.c256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag)
275 aes_gctr(aes, J0, S, sizeof(S), tag);
290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain)
313 if (os_memcmp_const(tag, T, 16) != 0) {
323 const u8 *aad, size_t aad_len, u8 *tag)
326 tag);
254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument
288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument

Completed in 204 milliseconds

1234567891011>>