Home
last modified time | relevance | path

Searched refs:u8 (Results 1 – 25 of 174) sorted by relevance

1234567

/external/wpa_supplicant/
Dms_funcs.h18 void generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
19 const u8 *username, size_t username_len,
20 const u8 *password, size_t password_len,
21 u8 *response);
22 void generate_nt_response_pwhash(const u8 *auth_challenge,
23 const u8 *peer_challenge,
24 const u8 *username, size_t username_len,
25 const u8 *password_hash,
26 u8 *response);
27 void generate_authenticator_response(const u8 *password, size_t password_len,
[all …]
Dms_funcs.c32 static void challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, in challenge_hash()
33 const u8 *username, size_t username_len, in challenge_hash()
34 u8 *challenge) in challenge_hash()
36 u8 hash[SHA1_MAC_LEN]; in challenge_hash()
58 void nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash()
59 u8 *password_hash) in nt_password_hash()
61 u8 buf[512], *pos; in nt_password_hash()
75 md4_vector(1, (const u8 **) &pos, &len, password_hash); in nt_password_hash()
84 void hash_nt_password_hash(const u8 *password_hash, u8 *password_hash_hash) in hash_nt_password_hash()
97 void challenge_response(const u8 *challenge, const u8 *password_hash, in challenge_response()
[all …]
Deap_sim_common.h73 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
74 const u8 *nonce_mt, u16 selected_version,
75 const u8 *ver_list, size_t ver_list_len,
76 int num_chal, const u8 *kc, u8 *mk);
77 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
78 const u8 *ik, const u8 *ck, u8 *mk);
79 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
80 u8 *emsk);
82 const u8 *identity, size_t identity_len,
83 const u8 *nonce_s, const u8 *mk, u8 *msk,
[all …]
Deap_psk_common.h32 #define EAP_PSK_FLAGS_SET_T(t) ((u8) (t) << 6)
40 u8 code;
41 u8 identifier;
43 u8 type; /* EAP_TYPE_PSK */
44 u8 flags;
49 u8 code;
50 u8 identifier;
52 u8 type; /* EAP_TYPE_PSK */
53 u8 flags;
54 u8 rand_s[EAP_PSK_RAND_LEN];
[all …]
Daes_wrap.h25 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher);
26 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain);
27 int omac1_aes_128_vector(const u8 *key, size_t num_elem,
28 const u8 *addr[], const size_t *len, u8 *mac);
29 int omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac);
30 int aes_128_encrypt_block(const u8 *key, const u8 *in, u8 *out);
31 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce,
32 u8 *data, size_t data_len);
33 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len,
34 const u8 *hdr, size_t hdr_len,
[all …]
Deap_sake_common.h54 u8 code;
55 u8 identifier;
57 u8 type; /* EAP_TYPE_SAKE */
58 u8 version; /* EAP_SAKE_VERSION */
59 u8 session_id;
60 u8 subtype;
69 const u8 *rand_s;
70 const u8 *rand_p;
71 const u8 *mic_s;
72 const u8 *mic_p;
[all …]
Dcrypto.h37 void md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac);
46 void md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac);
55 void sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len,
56 u8 *mac);
70 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen);
79 void sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len,
80 u8 *mac);
88 void des_encrypt(const u8 *clear, const u8 *key, u8 *cypher);
96 void * aes_encrypt_init(const u8 *key, size_t len);
104 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt);
[all …]
Dradius.h25 u8 code;
26 u8 identifier;
28 u8 authenticator[16];
44 u8 type;
45 u8 length; /* including this header */
148 u8 vendor_type;
149 u8 vendor_length;
167 u8 *send;
169 u8 *recv;
201 struct radius_msg *radius_msg_new(u8 code, u8 identifier);
[all …]
Deap_pax_common.h23 u8 code;
24 u8 identifier;
26 u8 type; /* EAP_TYPE_PAX */
27 u8 op_code;
28 u8 flags;
29 u8 mac_id;
30 u8 dh_group_id;
31 u8 public_key_id;
89 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len,
91 const u8 *entropy, size_t entropy_len,
[all …]
Deap_gpsk_common.c47 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac()
48 const u8 *data /* Z */, size_t data_len, in eap_gpsk_gkdf_cmac()
49 u8 *buf, size_t len /* X */) in eap_gpsk_gkdf_cmac()
51 u8 *opos; in eap_gpsk_gkdf_cmac()
53 u8 ibuf[2], hash[16]; in eap_gpsk_gkdf_cmac()
54 const u8 *addr[2]; in eap_gpsk_gkdf_cmac()
81 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256()
82 const u8 *data /* Z */, size_t data_len, in eap_gpsk_gkdf_sha256()
83 u8 *buf, size_t len /* X */) in eap_gpsk_gkdf_sha256()
85 u8 *opos; in eap_gpsk_gkdf_sha256()
[all …]
Dwpa_i.h29 u8 kck[16]; /* EAPOL-Key Key Confirmation Key (KCK) */
30 u8 kek[16]; /* EAPOL-Key Key Encryption Key (KEK) */
31 u8 tk1[16]; /* Temporal Key 1 (TK1) */
33 u8 tk2[16]; /* Temporal Key 2 (TK2) */
35 u8 tx_mic_key[8];
36 u8 rx_mic_key[8];
51 u8 addr[ETH_ALEN]; /* other end MAC address */
52 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */
53 u8 pnonce[WPA_NONCE_LEN]; /* Peer Nonce */
54 u8 rsnie_i[PEERKEY_MAX_IE_LEN]; /* Initiator RSN IE */
[all …]
Dconfig_ssid.h126 u8 *ssid;
139 u8 bssid[ETH_ALEN];
149 u8 psk[PMK_LEN];
208 u8 *identity;
222 u8 *anonymous_identity;
232 u8 *eappsk;
245 u8 *nai;
255 u8 *password;
282 u8 *ca_cert;
293 u8 *ca_path;
[all …]
Ddriver.h55 u8 bssid[ETH_ALEN];
56 u8 ssid[32];
58 u8 wpa_ie[SSID_MAX_WPA_IE_LEN];
60 u8 rsn_ie[SSID_MAX_WPA_IE_LEN];
79 const u8 *bssid;
84 const u8 *ssid;
109 const u8 *wpa_ie;
135 const u8 *wep_key[4];
256 int (*get_bssid)(void *priv, u8 *bssid);
273 int (*get_ssid)(void *priv, u8 *ssid);
[all …]
Dwpa.h65 const u8 *addr, int key_idx, int set_tx,
66 const u8 *seq, size_t seq_len,
67 const u8 *key, size_t key_len);
70 int (*get_bssid)(void *ctx, u8 *bssid);
71 int (*ether_send)(void *ctx, const u8 *dest, u16 proto, const u8 *buf,
75 u8 * (*alloc_eapol)(void *ctx, u8 type, const void *data, u16 data_len,
77 int (*add_pmkid)(void *ctx, const u8 *bssid, const u8 *pmkid);
78 int (*remove_pmkid)(void *ctx, const u8 *bssid, const u8 *pmkid);
82 int (*mlme_setprotection)(void *ctx, const u8 *addr,
105 const u8 *pmkid;
[all …]
Daes_wrap.c44 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) in aes_wrap()
46 u8 *a, *r, b[16]; in aes_wrap()
103 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) in aes_unwrap()
105 u8 a[8], *r, b[16]; in aes_unwrap()
158 static void gf_mulx(u8 *pad) in gf_mulx()
180 int omac1_aes_128_vector(const u8 *key, size_t num_elem, in omac1_aes_128_vector()
181 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_128_vector()
184 u8 cbc[BLOCK_SIZE], pad[BLOCK_SIZE]; in omac1_aes_128_vector()
185 const u8 *pos, *end; in omac1_aes_128_vector()
253 int omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac) in omac1_aes_128()
[all …]
Deap_pax_common.c36 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, in eap_pax_kdf()
38 const u8 *entropy, size_t entropy_len, in eap_pax_kdf()
39 size_t output_len, u8 *output) in eap_pax_kdf()
41 u8 mac[SHA1_MAC_LEN]; in eap_pax_kdf()
42 u8 counter, *pos; in eap_pax_kdf()
43 const u8 *addr[3]; in eap_pax_kdf()
55 addr[0] = (const u8 *) identifier; in eap_pax_kdf()
64 for (counter = 1; counter <= (u8) num_blocks; counter++) { in eap_pax_kdf()
92 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, in eap_pax_mac()
93 const u8 *data1, size_t data1_len, in eap_pax_mac()
[all …]
Deap_sim_common.c25 static int eap_sim_prf(const u8 *key, u8 *x, size_t xlen) in eap_sim_prf()
31 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, in eap_sim_derive_mk()
32 const u8 *nonce_mt, u16 selected_version, in eap_sim_derive_mk()
33 const u8 *ver_list, size_t ver_list_len, in eap_sim_derive_mk()
34 int num_chal, const u8 *kc, u8 *mk) in eap_sim_derive_mk()
36 u8 sel_ver[2]; in eap_sim_derive_mk()
59 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, in eap_aka_derive_mk()
60 const u8 *ik, const u8 *ck, u8 *mk) in eap_aka_derive_mk()
62 const u8 *addr[3]; in eap_aka_derive_mk()
80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, u8 *emsk) in eap_sim_derive_keys()
[all …]
Deap_gpsk.c24 u8 rand_server[EAP_GPSK_RAND_LEN];
25 u8 rand_peer[EAP_GPSK_RAND_LEN];
26 u8 msk[EAP_MSK_LEN];
27 u8 emsk[EAP_EMSK_LEN];
28 u8 sk[EAP_GPSK_MAX_SK_LEN];
30 u8 pk[EAP_GPSK_MAX_PK_LEN];
32 u8 session_id;
34 u8 *id_peer;
36 u8 *id_server;
40 u8 *psk;
[all …]
Dsha1.h20 void hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
21 const u8 *addr[], const size_t *len, u8 *mac);
22 void hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
23 u8 *mac);
24 void sha1_prf(const u8 *key, size_t key_len, const char *label,
25 const u8 *data, size_t data_len, u8 *buf, size_t buf_len);
26 void sha1_t_prf(const u8 *key, size_t key_len, const char *label,
27 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len);
28 int tls_prf(const u8 *secret, size_t secret_len, const char *label,
29 const u8 *seed, size_t seed_len, u8 *out, size_t outlen);
[all …]
Dtls.h21 const u8 *master_key; /* TLS master secret */
23 const u8 *client_random;
25 const u8 *server_random;
27 const u8 *inner_secret; /* TLS/IA inner secret */
79 const u8 *ca_cert_blob;
85 const u8 *client_cert_blob;
88 const u8 *private_key_blob;
92 const u8 *dh_blob;
272 u8 *out, size_t out_len);
304 u8 * tls_connection_handshake(void *tls_ctx, struct tls_connection *conn,
[all …]
Dpmksa_cache.h23 u8 pmkid[PMKID_LEN];
24 u8 pmk[PMK_LEN];
28 u8 aa[ETH_ALEN];
45 const u8 *aa, const u8 *pmkid);
48 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
49 const u8 *aa, const u8 *spa, struct wpa_ssid *ssid);
53 int pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid,
54 const u8 *bssid, struct wpa_ssid *ssid,
58 struct wpa_ssid *ssid, const u8 *aa);
75 pmksa_cache_get(struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *pmkid) in pmksa_cache_get()
[all …]
Deap_gpsk_common.h46 u8 vendor[4];
47 u8 specifier[2];
55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
57 const u8 *rand_client, const u8 *rand_server,
58 const u8 *id_client, size_t id_client_len,
59 const u8 *id_server, size_t id_server_len,
60 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
61 u8 *pk, size_t *pk_len);
63 int eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor,
64 int specifier, const u8 *data, size_t len, u8 *mic);
Deap_sake_common.c24 const u8 *pos) in eap_sake_parse_add_attr()
165 int eap_sake_parse_attributes(const u8 *buf, size_t len, in eap_sake_parse_attributes()
168 const u8 *pos = buf, *end = buf + len; in eap_sake_parse_attributes()
213 static void eap_sake_kdf(const u8 *key, size_t key_len, const char *label, in eap_sake_kdf()
214 const u8 *data, size_t data_len, in eap_sake_kdf()
215 const u8 *data2, size_t data2_len, in eap_sake_kdf()
216 u8 *buf, size_t buf_len) in eap_sake_kdf()
218 u8 counter = 0; in eap_sake_kdf()
220 u8 hash[SHA1_MAC_LEN]; in eap_sake_kdf()
225 addr[0] = (u8 *) label; /* Label | Y */ in eap_sake_kdf()
[all …]
Deap_mschapv2.c39 u8 op_code; /* MSCHAPV2_OP_* */
40 u8 mschapv2_id; /* usually same as EAP identifier; must be changed
42 u8 ms_length[2]; /* Note: misaligned; length - 5 */
48 u8 peer_challenge[MSCHAPV2_CHAL_LEN];
49 u8 reserved[8];
50 u8 nt_response[MSCHAPV2_NT_RESPONSE_LEN];
51 u8 flags;
56 u8 encr_password[516];
57 u8 encr_hash[16];
58 u8 peer_challenge[MSCHAPV2_CHAL_LEN];
[all …]
/external/wpa_supplicant/tests/
Dtest_sha1.c26 const u8 pac_key[] = { in test_eap_fast()
32 const u8 seed[] = { in test_eap_fast()
42 const u8 master_secret[] = { in test_eap_fast()
50 const u8 key_block[] = { in test_eap_fast()
66 const u8 sks[] = { in test_eap_fast()
73 const u8 isk[] = { in test_eap_fast()
79 const u8 imck[] = { in test_eap_fast()
89 const u8 msk[] = { in test_eap_fast()
99 u8 tlv[] = { in test_eap_fast()
109 const u8 compound_mac[] = { in test_eap_fast()
[all …]

1234567