Searched refs:byte (Results 1 – 11 of 11) sorted by relevance
/hostap-latest/src/crypto/ |
D | tls_wolfssl.c | 92 byte session_ticket[SESSION_TICKET_LEN]; 2072 byte seed[SEED_LEN]; in tls_connection_get_eap_fast_key() 2075 byte *tmp_out; in tls_connection_get_eap_fast_key() 2076 byte *_out; in tls_connection_get_eap_fast_key() 2078 byte *master_key; in tls_connection_get_eap_fast_key() 2080 byte *server_random; in tls_connection_get_eap_fast_key() 2082 byte *client_random; in tls_connection_get_eap_fast_key()
|
D | crypto_wolfssl.c | 50 static int wc_EccPublicKeyToDer_ex(ecc_key *key, byte *output, in wc_EccPublicKeyToDer_ex() 517 ret = wc_PBKDF2(buf, (const byte *) passphrase, os_strlen(passphrase), in pbkdf2_sha1() 995 byte *secret; in dh5_init_fixed() 3082 byte *buf = NULL; in crypto_ec_key_set_pub_point() 3152 err = wc_PKCS7_VerifySignedData(p7, (byte *) wpabuf_head(pkcs7), in crypto_pkcs7_get_certificates() 3234 const byte *source, word32 in_sz) in crypto_csr_init_type()
|
/hostap-latest/wpa_supplicant/dbus/ |
D | dbus_dict_helpers.c | 671 char byte; in _wpa_dbus_dict_entry_get_byte_array() local 687 dbus_message_iter_get_basic(iter, &byte); in _wpa_dbus_dict_entry_get_byte_array() 688 buffer[count] = byte; in _wpa_dbus_dict_entry_get_byte_array()
|
/hostap-latest/tests/hwsim/vm/ |
D | linux.gdb | 29 # a single 0xCC byte on x86). This breaks out into the debugger and
|
/hostap-latest/hostapd/ |
D | hostapd.eap_user | 6 # NtPasswordHash (16-byte MD4 hash of the unicode presentation of the password
|
D | ChangeLog | 404 * fixed MSCHAP UTF-8 to UCS-2 conversion for three-byte encoding; 406 three-byte encoding EAP methods that use NtPasswordHash
|
/hostap-latest/src/utils/ |
D | common.h | 222 #error Could not determine CPU byte order
|
/hostap-latest/doc/ |
D | porting.doxygen | 44 different size and byte order. Suitable version of these definitions
|
D | dbus.doxygen | 2439 … is returned in P2P Client role. At maximum, 10 separate vendor extension byte arrays can be confi…
|
/hostap-latest/wpa_supplicant/ |
D | ChangeLog | 201 IGTK/BIP KeyID using incorrect byte order 636 * fixed MSCHAP UTF-8 to UCS-2 conversion for three-byte encoding; 638 three-byte encoding EAP methods that use NtPasswordHash 1330 byte result buffer (previously, limited to 32768 bytes) 1534 (16-byte MD4 hash of password) in hash:<32 hex digits> format 2303 ACK, not tunneled EAP-Success (of which only the first byte was
|
D | README-P2P | 526 p2p_service_add bonjour 000000 <32-byte bitfield as hexdump>
|