Home
last modified time | relevance | path

Searched refs:u8 (Results 1 – 25 of 633) sorted by relevance

12345678910>>...26

/hostap-latest/tests/
Dtest-rc4.c17 const u8 *key;
18 const u8 *stream0;
19 const u8 *stream240;
20 const u8 *stream496;
21 const u8 *stream752;
22 const u8 *stream1008;
23 const u8 *stream1520;
24 const u8 *stream2032;
25 const u8 *stream3056;
26 const u8 *stream4080;
[all …]
/hostap-latest/src/common/
Dieee802_11_common.h16 u8 id;
17 u8 datalen;
18 u8 data[];
27 const u8 *ie;
28 u8 ie_len;
30 u8 nof_ies;
34 u8 capability;
35 u8 profile;
41 const u8 *ssid;
42 const u8 *supp_rates;
[all …]
Dwpa_common.h151 #define RSN_SELECTOR_PUT(a, val) WPA_PUT_BE32((u8 *) (a), (val))
152 #define RSN_SELECTOR_GET(a) WPA_GET_BE32((const u8 *) (a))
228 u8 type;
230 u8 key_info[2]; /* big endian */
231 u8 key_length[2]; /* big endian */
232 u8 replay_counter[WPA_REPLAY_COUNTER_LEN];
233 u8 key_nonce[WPA_NONCE_LEN];
234 u8 key_iv[16];
235 u8 key_rsc[WPA_KEY_RSC_LEN];
236 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */
[all …]
Dcommon_module_tests.c23 u8 *data;
30 { (u8 *) "", 0, ParseOK, 0 },
31 { (u8 *) " ", 1, ParseFailed, 0 },
32 { (u8 *) "\xff\x00", 2, ParseUnknown, 1 },
33 { (u8 *) "\xff\x01", 2, ParseFailed, 0 },
34 { (u8 *) "\xdd\x03\x01\x02\x03", 5, ParseUnknown, 1 },
35 { (u8 *) "\xdd\x04\x01\x02\x03\x04", 6, ParseUnknown, 1 },
36 { (u8 *) "\xdd\x04\x00\x50\xf2\x02", 6, ParseUnknown, 1 },
37 { (u8 *) "\xdd\x05\x00\x50\xf2\x02\x02", 7, ParseOK, 1 },
38 { (u8 *) "\xdd\x05\x00\x50\xf2\x02\xff", 7, ParseUnknown, 1 },
[all …]
Dieee802_11_defs.h956 u8 addr1[6];
957 u8 addr2[6];
958 u8 addr3[6];
973 u8 sa[6];
974 u8 timestamp[4];
975 u8 change_seq[1];
992 u8 da[6];
993 u8 sa[6];
994 u8 bssid[6];
1002 u8 variable[];
[all …]
/hostap-latest/src/pae/
Dieee802_1x_kay_i.h40 u8 mi[MI_LEN];
46 u8 mi[MI_LEN];
50 u8 key_server_priority;
66 u8 parameter[4];
69 int (*cak_trfm)(const u8 *msk, size_t msk_bytes, const u8 *mac1,
70 const u8 *mac2, u8 *cak, size_t cak_bytes);
71 int (*ckn_trfm)(const u8 *msk, size_t msk_bytes, const u8 *mac1,
72 const u8 *mac2, const u8 *sid, size_t sid_len, u8 *ckn);
73 int (*kek_trfm)(const u8 *cak, size_t cak_bytes,
74 const u8 *ckn, size_t ckn_len,
[all …]
/hostap-latest/wlantest/
Dwlantest.h31 u8 ssid[32];
33 u8 bssid[ETH_ALEN];
38 u8 pmk[PMK_LEN_MAX];
51 u8 key[13];
57 u8 addr[ETH_ALEN];
58 u8 mld_mac_addr[ETH_ALEN];
59 u8 link_addr[MAX_NUM_MLD_LINKS][ETH_ALEN];
68 u8 rsnie[257]; /* WPA/RSN IE */
69 u8 rsnxe[254]; /* RSNXE data */
71 u8 osenie[257]; /* OSEN IE */
[all …]
/hostap-latest/src/p2p/
Dp2p_i.h61 u8 interface_addr[ETH_ALEN];
67 u8 member_in_go_dev[ETH_ALEN];
73 u8 member_in_go_iface[ETH_ALEN];
77 u8 dialog_token;
78 u8 tie_breaker;
79 u8 intended_addr[ETH_ALEN];
84 u8 oper_ssid[SSID_MAX_LEN];
133 u8 go_timeout;
134 u8 client_timeout;
139 u8 go_neg_conf_sent;
[all …]
Dp2p.h54 u8 reg_class;
59 u8 channel[P2P_MAX_REG_CLASS_CHANNELS];
106 u8 max_oper_chwidth;
118 u8 ssid[SSID_MAX_LEN];
128 u8 psk[32];
143 u8 peer_device_addr[ETH_ALEN];
148 u8 peer_interface_addr[ETH_ALEN];
205 u8 conncap;
210 u8 role;
215 u8 session_mac[ETH_ALEN];
[all …]
/hostap-latest/src/eap_common/
Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
75 const u8 *nonce_mt, u16 selected_version,
76 const u8 *ver_list, size_t ver_list_len,
77 int num_chal, const u8 *kc, u8 *mk);
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
79 const u8 *ik, const u8 *ck, u8 *mk);
80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
81 u8 *emsk);
83 const u8 *identity, size_t identity_len,
84 const u8 *nonce_s, const u8 *mk, u8 *msk,
[all …]
Dikev2_common.h27 u8 i_spi[IKEV2_SPI_LEN]; /* IKE_SA Initiator's SPI */
28 u8 r_spi[IKEV2_SPI_LEN]; /* IKE_SA Responder's SPI */
29 u8 next_payload;
30 u8 version; /* MjVer | MnVer */
31 u8 exchange_type;
32 u8 flags;
33 u8 message_id[4];
34 u8 length[4]; /* total length of HDR + payloads */
38 u8 next_payload;
39 u8 flags;
[all …]
Deap_eke_common.h63 u8 dhgroup;
64 u8 encr;
65 u8 prf;
66 u8 mac;
68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN];
69 u8 ke[EAP_EKE_MAX_KE_LEN];
70 u8 ki[EAP_EKE_MAX_KI_LEN];
71 u8 ka[EAP_EKE_MAX_KA_LEN];
81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
82 u8 prf, u8 mac);
[all …]
/hostap-latest/src/wps/
Dwps_attr_parse.h16 const u8 *version; /* 1 octet */
17 const u8 *version2; /* 1 octet */
18 const u8 *msg_type; /* 1 octet */
19 const u8 *enrollee_nonce; /* WPS_NONCE_LEN (16) octets */
20 const u8 *registrar_nonce; /* WPS_NONCE_LEN (16) octets */
21 const u8 *uuid_r; /* WPS_UUID_LEN (16) octets */
22 const u8 *uuid_e; /* WPS_UUID_LEN (16) octets */
23 const u8 *auth_type_flags; /* 2 octets */
24 const u8 *encr_type_flags; /* 2 octets */
25 const u8 *conn_type_flags; /* 1 octet */
[all …]
Dwps.h48 u8 ssid[SSID_MAX_LEN];
52 u8 key_idx;
53 u8 key[64];
55 u8 mac_addr[ETH_ALEN];
56 const u8 *cred_attr;
86 u8 mac_addr[ETH_ALEN];
92 u8 pri_dev_type[WPS_DEV_TYPE_LEN];
94 u8 sec_dev_type[WPS_SEC_DEVICE_TYPES][WPS_DEV_TYPE_LEN];
95 u8 num_sec_dev_types;
97 u8 rf_bands;
[all …]
/hostap-latest/src/crypto/
Daes_wrap.h21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain,
22 u8 *cipher);
23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n,
24 const u8 *cipher, u8 *plain);
25 int __must_check omac1_aes_vector(const u8 *key, size_t key_len,
26 size_t num_elem, const u8 *addr[],
27 const size_t *len, u8 *mac);
28 int __must_check omac1_aes_128_vector(const u8 *key, size_t num_elem,
29 const u8 *addr[], const size_t *len,
30 u8 *mac);
[all …]
Dms_funcs.h12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge,
13 const u8 *username, size_t username_len,
14 const u8 *password, size_t password_len,
15 u8 *response);
16 int generate_nt_response_pwhash(const u8 *auth_challenge,
17 const u8 *peer_challenge,
18 const u8 *username, size_t username_len,
19 const u8 *password_hash,
20 u8 *response);
21 int generate_authenticator_response(const u8 *password, size_t password_len,
[all …]
Dmilenage.h12 void milenage_generate(const u8 *opc, const u8 *amf, const u8 *k,
13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
14 u8 *ck, u8 *res, size_t *res_len);
15 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts,
16 u8 *sqn);
17 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres,
18 u8 *kc);
19 int milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand,
20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
21 u8 *auts);
[all …]
Dms_funcs.c25 static int utf8_to_ucs2(const u8 *utf8_string, size_t utf8_string_len, in utf8_to_ucs2()
26 u8 *ucs2_buffer, size_t ucs2_buffer_size, in utf8_to_ucs2()
32 u8 c = utf8_string[i]; in utf8_to_ucs2()
45 u8 c2 = utf8_string[++i]; in utf8_to_ucs2()
57 u8 c3 = utf8_string[++i]; in utf8_to_ucs2()
81 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, in challenge_hash()
82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash()
84 u8 hash[SHA1_MAC_LEN]; in challenge_hash()
109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash()
110 u8 *password_hash) in nt_password_hash()
[all …]
/hostap-latest/src/ap/
Dwpa_auth.h29 u8 frame_type; /* RSN_REMOTE_FRAME_TYPE_FT_RRB */
30 u8 packet_type; /* FT_PACKET_REQUEST/FT_PACKET_RESPONSE */
32 u8 ap_address[ETH_ALEN];
154 u8 addr[ETH_ALEN];
155 u8 id[FT_R0KH_ID_MAX_LEN];
157 u8 key[32];
164 u8 addr[ETH_ALEN];
165 u8 id[FT_R1KH_ID_LEN];
166 u8 key[32];
207 u8 ssid[SSID_MAX_LEN];
[all …]
Dieee802_11.h28 int ieee802_11_mgmt(struct hostapd_data *hapd, const u8 *buf, size_t len,
30 void ieee802_11_mgmt_cb(struct hostapd_data *hapd, const u8 *buf, size_t len,
54 u8 * hostapd_eid_ext_capab(struct hostapd_data *hapd, u8 *eid,
56 u8 * hostapd_eid_qos_map_set(struct hostapd_data *hapd, u8 *eid);
57 u8 * hostapd_eid_supp_rates(struct hostapd_data *hapd, u8 *eid);
58 u8 * hostapd_eid_ext_supp_rates(struct hostapd_data *hapd, u8 *eid);
59 u8 * hostapd_eid_rm_enabled_capab(struct hostapd_data *hapd, u8 *eid,
61 u8 * hostapd_eid_ht_capabilities(struct hostapd_data *hapd, u8 *eid);
62 u8 * hostapd_eid_ht_operation(struct hostapd_data *hapd, u8 *eid);
63 u8 * hostapd_eid_vht_capabilities(struct hostapd_data *hapd, u8 *eid, u32 nsts);
[all …]
Dwpa_auth_i.h23 u8 addr[ETH_ALEN];
24 u8 p2p_dev_addr[ETH_ALEN];
56 u8 ANonce[WPA_NONCE_LEN];
57 u8 SNonce[WPA_NONCE_LEN];
58 u8 alt_SNonce[WPA_NONCE_LEN];
59 u8 alt_replay_counter[WPA_REPLAY_COUNTER_LEN];
60 u8 PMK[PMK_LEN_MAX];
62 u8 pmkid[PMKID_LEN]; /* valid if pmkid_set == 1 */
64 u8 keyidx_active;
72 u8 counter[WPA_REPLAY_COUNTER_LEN];
[all …]
Dap_config.h33 u8 meshid[32];
34 u8 meshid_len;
36 u8 mesh_pp_id;
38 u8 mesh_pm_id;
40 u8 mesh_cc_id;
42 u8 mesh_sp_id;
44 u8 mesh_auth_id;
45 u8 *rsn_ie;
66 typedef u8 macaddr[ETH_ALEN];
80 u8 idx;
[all …]
/hostap-latest/src/rsn_supp/
Dwpa.h34 const u8 *addr, int key_idx, int set_tx,
35 const u8 *seq, size_t seq_len,
36 const u8 *key, size_t key_len, enum key_flag key_flag);
38 int (*get_bssid)(void *ctx, u8 *bssid);
39 int (*ether_send)(void *ctx, const u8 *dest, u16 proto, const u8 *buf,
43 u8 * (*alloc_eapol)(void *ctx, u8 type, const void *data, u16 data_len,
45 int (*add_pmkid)(void *ctx, void *network_ctx, const u8 *bssid,
46 const u8 *pmkid, const u8 *fils_cache_id,
47 const u8 *pmk, size_t pmk_len, u32 pmk_lifetime,
48 u8 pmk_reauth_threshold, int akmp);
[all …]
/hostap-latest/src/drivers/
Ddriver.h138 u8 max_tx_power;
191 u8 he_supported;
192 u8 phy_cap[HE_MAX_PHY_CAPAB_SIZE];
193 u8 mac_cap[HE_MAX_MAC_CAPAB_SIZE];
194 u8 mcs[HE_MAX_MCS_CAPAB_SIZE];
195 u8 ppet[HE_MAX_PPET_CAPAB_SIZE];
203 u8 phy_cap[EHT_PHY_CAPAB_LEN];
204 u8 mcs[EHT_MCS_NSS_CAPAB_LEN];
205 u8 ppet[EHT_PPE_THRESH_CAPAB_LEN];
237 u8 channels;
[all …]
/hostap-latest/src/pasn/
Dpasn_common.h26 u8 state;
27 u8 nonce[FILS_NONCE_LEN];
28 u8 anonce[FILS_NONCE_LEN];
29 u8 session[FILS_SESSION_LEN];
30 u8 erp_pmkid[PMKID_LEN];
40 u8 own_addr[ETH_ALEN];
41 u8 peer_addr[ETH_ALEN];
42 u8 bssid[ETH_ALEN];
57 const u8 *rsnxe_ie;
59 u8 custom_pmkid[PMKID_LEN];
[all …]

12345678910>>...26