/hostap-latest/tests/ |
D | test-rc4.c | 17 const u8 *key; 18 const u8 *stream0; 19 const u8 *stream240; 20 const u8 *stream496; 21 const u8 *stream752; 22 const u8 *stream1008; 23 const u8 *stream1520; 24 const u8 *stream2032; 25 const u8 *stream3056; 26 const u8 *stream4080; [all …]
|
/hostap-latest/src/common/ |
D | ieee802_11_common.h | 16 u8 id; 17 u8 datalen; 18 u8 data[]; 27 const u8 *ie; 28 u8 ie_len; 30 u8 nof_ies; 34 u8 capability; 35 u8 profile; 41 const u8 *ssid; 42 const u8 *supp_rates; [all …]
|
D | wpa_common.h | 151 #define RSN_SELECTOR_PUT(a, val) WPA_PUT_BE32((u8 *) (a), (val)) 152 #define RSN_SELECTOR_GET(a) WPA_GET_BE32((const u8 *) (a)) 228 u8 type; 230 u8 key_info[2]; /* big endian */ 231 u8 key_length[2]; /* big endian */ 232 u8 replay_counter[WPA_REPLAY_COUNTER_LEN]; 233 u8 key_nonce[WPA_NONCE_LEN]; 234 u8 key_iv[16]; 235 u8 key_rsc[WPA_KEY_RSC_LEN]; 236 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ [all …]
|
D | common_module_tests.c | 23 u8 *data; 30 { (u8 *) "", 0, ParseOK, 0 }, 31 { (u8 *) " ", 1, ParseFailed, 0 }, 32 { (u8 *) "\xff\x00", 2, ParseUnknown, 1 }, 33 { (u8 *) "\xff\x01", 2, ParseFailed, 0 }, 34 { (u8 *) "\xdd\x03\x01\x02\x03", 5, ParseUnknown, 1 }, 35 { (u8 *) "\xdd\x04\x01\x02\x03\x04", 6, ParseUnknown, 1 }, 36 { (u8 *) "\xdd\x04\x00\x50\xf2\x02", 6, ParseUnknown, 1 }, 37 { (u8 *) "\xdd\x05\x00\x50\xf2\x02\x02", 7, ParseOK, 1 }, 38 { (u8 *) "\xdd\x05\x00\x50\xf2\x02\xff", 7, ParseUnknown, 1 }, [all …]
|
D | ieee802_11_defs.h | 956 u8 addr1[6]; 957 u8 addr2[6]; 958 u8 addr3[6]; 973 u8 sa[6]; 974 u8 timestamp[4]; 975 u8 change_seq[1]; 992 u8 da[6]; 993 u8 sa[6]; 994 u8 bssid[6]; 1002 u8 variable[]; [all …]
|
/hostap-latest/src/pae/ |
D | ieee802_1x_kay_i.h | 40 u8 mi[MI_LEN]; 46 u8 mi[MI_LEN]; 50 u8 key_server_priority; 66 u8 parameter[4]; 69 int (*cak_trfm)(const u8 *msk, size_t msk_bytes, const u8 *mac1, 70 const u8 *mac2, u8 *cak, size_t cak_bytes); 71 int (*ckn_trfm)(const u8 *msk, size_t msk_bytes, const u8 *mac1, 72 const u8 *mac2, const u8 *sid, size_t sid_len, u8 *ckn); 73 int (*kek_trfm)(const u8 *cak, size_t cak_bytes, 74 const u8 *ckn, size_t ckn_len, [all …]
|
/hostap-latest/wlantest/ |
D | wlantest.h | 31 u8 ssid[32]; 33 u8 bssid[ETH_ALEN]; 38 u8 pmk[PMK_LEN_MAX]; 51 u8 key[13]; 57 u8 addr[ETH_ALEN]; 58 u8 mld_mac_addr[ETH_ALEN]; 59 u8 link_addr[MAX_NUM_MLD_LINKS][ETH_ALEN]; 68 u8 rsnie[257]; /* WPA/RSN IE */ 69 u8 rsnxe[254]; /* RSNXE data */ 71 u8 osenie[257]; /* OSEN IE */ [all …]
|
/hostap-latest/src/p2p/ |
D | p2p_i.h | 61 u8 interface_addr[ETH_ALEN]; 67 u8 member_in_go_dev[ETH_ALEN]; 73 u8 member_in_go_iface[ETH_ALEN]; 77 u8 dialog_token; 78 u8 tie_breaker; 79 u8 intended_addr[ETH_ALEN]; 84 u8 oper_ssid[SSID_MAX_LEN]; 133 u8 go_timeout; 134 u8 client_timeout; 139 u8 go_neg_conf_sent; [all …]
|
D | p2p.h | 54 u8 reg_class; 59 u8 channel[P2P_MAX_REG_CLASS_CHANNELS]; 106 u8 max_oper_chwidth; 118 u8 ssid[SSID_MAX_LEN]; 128 u8 psk[32]; 143 u8 peer_device_addr[ETH_ALEN]; 148 u8 peer_interface_addr[ETH_ALEN]; 205 u8 conncap; 210 u8 role; 215 u8 session_mac[ETH_ALEN]; [all …]
|
/hostap-latest/src/eap_common/ |
D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 75 const u8 *nonce_mt, u16 selected_version, 76 const u8 *ver_list, size_t ver_list_len, 77 int num_chal, const u8 *kc, u8 *mk); 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 79 const u8 *ik, const u8 *ck, u8 *mk); 80 int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk, 81 u8 *emsk); 83 const u8 *identity, size_t identity_len, 84 const u8 *nonce_s, const u8 *mk, u8 *msk, [all …]
|
D | ikev2_common.h | 27 u8 i_spi[IKEV2_SPI_LEN]; /* IKE_SA Initiator's SPI */ 28 u8 r_spi[IKEV2_SPI_LEN]; /* IKE_SA Responder's SPI */ 29 u8 next_payload; 30 u8 version; /* MjVer | MnVer */ 31 u8 exchange_type; 32 u8 flags; 33 u8 message_id[4]; 34 u8 length[4]; /* total length of HDR + payloads */ 38 u8 next_payload; 39 u8 flags; [all …]
|
D | eap_eke_common.h | 63 u8 dhgroup; 64 u8 encr; 65 u8 prf; 66 u8 mac; 68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; 69 u8 ke[EAP_EKE_MAX_KE_LEN]; 70 u8 ki[EAP_EKE_MAX_KI_LEN]; 71 u8 ka[EAP_EKE_MAX_KA_LEN]; 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, 82 u8 prf, u8 mac); [all …]
|
/hostap-latest/src/wps/ |
D | wps_attr_parse.h | 16 const u8 *version; /* 1 octet */ 17 const u8 *version2; /* 1 octet */ 18 const u8 *msg_type; /* 1 octet */ 19 const u8 *enrollee_nonce; /* WPS_NONCE_LEN (16) octets */ 20 const u8 *registrar_nonce; /* WPS_NONCE_LEN (16) octets */ 21 const u8 *uuid_r; /* WPS_UUID_LEN (16) octets */ 22 const u8 *uuid_e; /* WPS_UUID_LEN (16) octets */ 23 const u8 *auth_type_flags; /* 2 octets */ 24 const u8 *encr_type_flags; /* 2 octets */ 25 const u8 *conn_type_flags; /* 1 octet */ [all …]
|
D | wps.h | 48 u8 ssid[SSID_MAX_LEN]; 52 u8 key_idx; 53 u8 key[64]; 55 u8 mac_addr[ETH_ALEN]; 56 const u8 *cred_attr; 86 u8 mac_addr[ETH_ALEN]; 92 u8 pri_dev_type[WPS_DEV_TYPE_LEN]; 94 u8 sec_dev_type[WPS_SEC_DEVICE_TYPES][WPS_DEV_TYPE_LEN]; 95 u8 num_sec_dev_types; 97 u8 rf_bands; [all …]
|
/hostap-latest/src/crypto/ |
D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, 22 u8 *cipher); 23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n, 24 const u8 *cipher, u8 *plain); 25 int __must_check omac1_aes_vector(const u8 *key, size_t key_len, 26 size_t num_elem, const u8 *addr[], 27 const size_t *len, u8 *mac); 28 int __must_check omac1_aes_128_vector(const u8 *key, size_t num_elem, 29 const u8 *addr[], const size_t *len, 30 u8 *mac); [all …]
|
D | ms_funcs.h | 12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 13 const u8 *username, size_t username_len, 14 const u8 *password, size_t password_len, 15 u8 *response); 16 int generate_nt_response_pwhash(const u8 *auth_challenge, 17 const u8 *peer_challenge, 18 const u8 *username, size_t username_len, 19 const u8 *password_hash, 20 u8 *response); 21 int generate_authenticator_response(const u8 *password, size_t password_len, [all …]
|
D | milenage.h | 12 void milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 14 u8 *ck, u8 *res, size_t *res_len); 15 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, 16 u8 *sqn); 17 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, 18 u8 *kc); 19 int milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 21 u8 *auts); [all …]
|
D | ms_funcs.c | 25 static int utf8_to_ucs2(const u8 *utf8_string, size_t utf8_string_len, in utf8_to_ucs2() 26 u8 *ucs2_buffer, size_t ucs2_buffer_size, in utf8_to_ucs2() 32 u8 c = utf8_string[i]; in utf8_to_ucs2() 45 u8 c2 = utf8_string[++i]; in utf8_to_ucs2() 57 u8 c3 = utf8_string[++i]; in utf8_to_ucs2() 81 int challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, in challenge_hash() 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() 84 u8 hash[SHA1_MAC_LEN]; in challenge_hash() 109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() 110 u8 *password_hash) in nt_password_hash() [all …]
|
/hostap-latest/src/ap/ |
D | wpa_auth.h | 29 u8 frame_type; /* RSN_REMOTE_FRAME_TYPE_FT_RRB */ 30 u8 packet_type; /* FT_PACKET_REQUEST/FT_PACKET_RESPONSE */ 32 u8 ap_address[ETH_ALEN]; 154 u8 addr[ETH_ALEN]; 155 u8 id[FT_R0KH_ID_MAX_LEN]; 157 u8 key[32]; 164 u8 addr[ETH_ALEN]; 165 u8 id[FT_R1KH_ID_LEN]; 166 u8 key[32]; 207 u8 ssid[SSID_MAX_LEN]; [all …]
|
D | ieee802_11.h | 28 int ieee802_11_mgmt(struct hostapd_data *hapd, const u8 *buf, size_t len, 30 void ieee802_11_mgmt_cb(struct hostapd_data *hapd, const u8 *buf, size_t len, 54 u8 * hostapd_eid_ext_capab(struct hostapd_data *hapd, u8 *eid, 56 u8 * hostapd_eid_qos_map_set(struct hostapd_data *hapd, u8 *eid); 57 u8 * hostapd_eid_supp_rates(struct hostapd_data *hapd, u8 *eid); 58 u8 * hostapd_eid_ext_supp_rates(struct hostapd_data *hapd, u8 *eid); 59 u8 * hostapd_eid_rm_enabled_capab(struct hostapd_data *hapd, u8 *eid, 61 u8 * hostapd_eid_ht_capabilities(struct hostapd_data *hapd, u8 *eid); 62 u8 * hostapd_eid_ht_operation(struct hostapd_data *hapd, u8 *eid); 63 u8 * hostapd_eid_vht_capabilities(struct hostapd_data *hapd, u8 *eid, u32 nsts); [all …]
|
D | wpa_auth_i.h | 23 u8 addr[ETH_ALEN]; 24 u8 p2p_dev_addr[ETH_ALEN]; 56 u8 ANonce[WPA_NONCE_LEN]; 57 u8 SNonce[WPA_NONCE_LEN]; 58 u8 alt_SNonce[WPA_NONCE_LEN]; 59 u8 alt_replay_counter[WPA_REPLAY_COUNTER_LEN]; 60 u8 PMK[PMK_LEN_MAX]; 62 u8 pmkid[PMKID_LEN]; /* valid if pmkid_set == 1 */ 64 u8 keyidx_active; 72 u8 counter[WPA_REPLAY_COUNTER_LEN]; [all …]
|
D | ap_config.h | 33 u8 meshid[32]; 34 u8 meshid_len; 36 u8 mesh_pp_id; 38 u8 mesh_pm_id; 40 u8 mesh_cc_id; 42 u8 mesh_sp_id; 44 u8 mesh_auth_id; 45 u8 *rsn_ie; 66 typedef u8 macaddr[ETH_ALEN]; 80 u8 idx; [all …]
|
/hostap-latest/src/rsn_supp/ |
D | wpa.h | 34 const u8 *addr, int key_idx, int set_tx, 35 const u8 *seq, size_t seq_len, 36 const u8 *key, size_t key_len, enum key_flag key_flag); 38 int (*get_bssid)(void *ctx, u8 *bssid); 39 int (*ether_send)(void *ctx, const u8 *dest, u16 proto, const u8 *buf, 43 u8 * (*alloc_eapol)(void *ctx, u8 type, const void *data, u16 data_len, 45 int (*add_pmkid)(void *ctx, void *network_ctx, const u8 *bssid, 46 const u8 *pmkid, const u8 *fils_cache_id, 47 const u8 *pmk, size_t pmk_len, u32 pmk_lifetime, 48 u8 pmk_reauth_threshold, int akmp); [all …]
|
/hostap-latest/src/drivers/ |
D | driver.h | 138 u8 max_tx_power; 191 u8 he_supported; 192 u8 phy_cap[HE_MAX_PHY_CAPAB_SIZE]; 193 u8 mac_cap[HE_MAX_MAC_CAPAB_SIZE]; 194 u8 mcs[HE_MAX_MCS_CAPAB_SIZE]; 195 u8 ppet[HE_MAX_PPET_CAPAB_SIZE]; 203 u8 phy_cap[EHT_PHY_CAPAB_LEN]; 204 u8 mcs[EHT_MCS_NSS_CAPAB_LEN]; 205 u8 ppet[EHT_PPE_THRESH_CAPAB_LEN]; 237 u8 channels; [all …]
|
/hostap-latest/src/pasn/ |
D | pasn_common.h | 26 u8 state; 27 u8 nonce[FILS_NONCE_LEN]; 28 u8 anonce[FILS_NONCE_LEN]; 29 u8 session[FILS_SESSION_LEN]; 30 u8 erp_pmkid[PMKID_LEN]; 40 u8 own_addr[ETH_ALEN]; 41 u8 peer_addr[ETH_ALEN]; 42 u8 bssid[ETH_ALEN]; 57 const u8 *rsnxe_ie; 59 u8 custom_pmkid[PMKID_LEN]; [all …]
|