/freebsd-10-stable/contrib/wpa/src/crypto/ |
H A D | milenage.h | 12 void milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 14 u8 *ck, u8 *res, size_t *res_len); 15 int milenage_auts(const u8 *op [all...] |
H A D | ms_funcs.h | 12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 13 const u8 *username, size_t username_len, 14 const u8 *password, size_t password_len, 15 u8 *response); 16 int generate_nt_response_pwhash(const u8 *auth_challenge, 17 const u8 *peer_challenge, 18 const u8 *username, size_t username_len, 19 const u8 *password_hash, 20 u8 *respons [all...] |
H A D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher); 22 int __must_check aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain); 23 int __must_check omac1_aes_128_vector(const u8 *key, size_t num_elem, 24 const u8 *addr[], const size_t *len, 25 u8 *mac); 26 int __must_check omac1_aes_128(const u8 *ke [all...] |
H A D | crypto_none.c | 15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 21 void des_encrypt(const u8 *clear, const u8 *key, u8 *cypher)
|
H A D | sha256.h | 14 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 15 const u8 *addr[], const size_t *len, u8 *mac); 16 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 17 size_t data_len, u8 *mac); 18 void sha256_prf(const u8 *key, size_t key_len, const char *label, 19 const u8 *data, size_t data_len, u8 *buf, size_t buf_len); 20 void tls_prf_sha256(const u8 *secre [all...] |
H A D | sha1.h | 14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 15 const u8 *addr[], const size_t *len, u8 *mac); 16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 17 u8 *mac); 18 int sha1_prf(const u8 *key, size_t key_len, const char *label, 19 const u8 *data, size_t data_len, u8 *buf, size_t buf_len); 20 int sha1_t_prf(const u8 *ke [all...] |
H A D | fips_prf_cryptoapi.c | 15 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen)
|
H A D | aes.h | 14 void * aes_encrypt_init(const u8 *key, size_t len); 15 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt); 17 void * aes_decrypt_init(const u8 *key, size_t len); 18 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain);
|
H A D | md5.h | 14 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 15 const u8 *addr[], const size_t *len, u8 *mac); 16 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 17 u8 *mac);
|
H A D | des_i.h | 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt); 19 void des_block_decrypt(const u8 *crypt, const u32 *dk, u8 *plain); 21 void des3_key_setup(const u8 *key, struct des3_key_s *dkey); 22 void des3_encrypt(const u8 *plain, const struct des3_key_s *key, u8 *crypt); 23 void des3_decrypt(const u8 *crypt, const struct des3_key_s *key, u8 *plai [all...] |
/freebsd-10-stable/contrib/wpa/src/common/ |
H A D | ieee802_11_common.h | 14 const u8 *ssid; 15 const u8 *supp_rates; 16 const u8 *fh_params; 17 const u8 *ds_params; 18 const u8 *cf_params; 19 const u8 *tim; 20 const u8 *ibss_params; 21 const u8 *challenge; 22 const u8 *erp_info; 23 const u8 *ext_supp_rate [all...] |
/freebsd-10-stable/contrib/wpa/src/wps/ |
H A D | wps_attr_parse.h | 16 const u8 *version; /* 1 octet */ 17 const u8 *version2; /* 1 octet */ 18 const u8 *msg_type; /* 1 octet */ 19 const u8 *enrollee_nonce; /* WPS_NONCE_LEN (16) octets */ 20 const u8 *registrar_nonce; /* WPS_NONCE_LEN (16) octets */ 21 const u8 *uuid_r; /* WPS_UUID_LEN (16) octets */ 22 const u8 *uuid_e; /* WPS_UUID_LEN (16) octets */ 23 const u8 *auth_type_flags; /* 2 octets */ 24 const u8 *encr_type_flags; /* 2 octets */ 25 const u8 *conn_type_flag [all...] |
/freebsd-10-stable/contrib/wpa/src/eap_peer/ |
H A D | mschapv2.h | 17 const u8 * mschapv2_remove_domain(const u8 *username, size_t *len); 18 int mschapv2_derive_response(const u8 *username, size_t username_len, 19 const u8 *password, size_t password_len, 21 const u8 *auth_challenge, 22 const u8 *peer_challenge, 23 u8 *nt_response, u8 *auth_response, 24 u8 *master_key); 25 int mschapv2_verify_auth_response(const u8 *auth_respons [all...] |
H A D | eap_config.h | 22 u8 *identity; 42 u8 *anonymous_identity; 65 u8 *password; 101 u8 *ca_cert; 112 u8 *ca_path; 126 u8 *client_cert; 153 u8 *private_key; 160 u8 *private_key_passwd; 178 u8 *dh_file; 190 u8 *subject_matc [all...] |
/freebsd-10-stable/sys/dev/mlx5/ |
H A D | mlx5_ifc.h | 258 u8 outer_dmac[0x1]; 259 u8 outer_smac[0x1]; 260 u8 outer_ether_type[0x1]; 261 u8 reserved_0[0x1]; 262 u8 outer_first_prio[0x1]; 263 u8 outer_first_cfi[0x1]; 264 u8 outer_first_vid[0x1]; 265 u8 reserved_1[0x1]; 266 u8 outer_second_prio[0x1]; 267 u8 outer_second_cf [all...] |
/freebsd-10-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sake_common.h | 48 u8 version; /* EAP_SAKE_VERSION */ 49 u8 session_id; 50 u8 subtype; 59 const u8 *rand_s; 60 const u8 *rand_p; 61 const u8 *mic_s; 62 const u8 *mic_p; 63 const u8 *serverid; 65 const u8 *peerid; 67 const u8 *spi_ [all...] |
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 15 size_t challenge_len, u8 *response);
|
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 75 const u8 *nonce_mt, u16 selected_version, 76 const u8 *ver_list, size_t ver_list_len, 77 int num_chal, const u8 *kc, u8 *mk); 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 79 const u8 *ik, const u8 *ck, u8 *mk); 80 int eap_sim_derive_keys(const u8 *m [all...] |
H A D | eap_pax_common.h | 17 u8 op_code; 18 u8 flags; 19 u8 mac_id; 20 u8 dh_group_id; 21 u8 public_key_id; 79 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 81 const u8 *entropy, size_t entropy_len, 82 size_t output_len, u8 *output); 83 int eap_pax_mac(u8 mac_i [all...] |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 16 size_t challenge_len, u8 *response) 18 const u8 *addr[3];
|
H A D | eap_psk_common.h | 26 #define EAP_PSK_FLAGS_SET_T(t) ((u8) (t) << 6) 34 u8 flags; 35 u8 rand_s[EAP_PSK_RAND_LEN]; 41 u8 flags; 42 u8 rand_s[EAP_PSK_RAND_LEN]; 43 u8 rand_p[EAP_PSK_RAND_LEN]; 44 u8 mac_p[EAP_PSK_MAC_LEN]; 50 u8 flags; 51 u8 rand_s[EAP_PSK_RAND_LEN]; 52 u8 mac_ [all...] |
/freebsd-10-stable/contrib/wpa/src/ap/ |
H A D | wpa_auth_ie.h | 13 const u8 *wpa_ie; 15 const u8 *rsn_ie; 17 const u8 *pmkid; 18 const u8 *gtk; 20 const u8 *mac_addr; 23 const u8 *smk; 25 const u8 *nonce; 27 const u8 *lifetime; 29 const u8 *error; 33 const u8 *igt [all...] |
H A D | hs20.h | 14 u8 * hostapd_eid_hs20_indication(struct hostapd_data *hapd, u8 *eid);
|
/freebsd-10-stable/crypto/openssl/crypto/camellia/ |
H A D | cmll_locl.h | 72 typedef unsigned char u8; typedef 74 int Camellia_Ekeygen(int keyBitLength, const u8 *rawKey, 76 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], 78 u8 ciphertext[]); 79 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], 81 u8 plaintext[]); 82 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], 83 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]); 84 void Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[], 85 const KEY_TABLE_TYPE keyTable, u8 plaintex [all...] |
/freebsd-10-stable/sys/dev/qlnx/qlnxe/ |
H A D | ecore_proto_if.h | 48 u8 num_vf_cons; 82 u8 num_cqs; /* num of global CQs */ 83 u8 log_page_size; 84 u8 gl_rq_pi; 85 u8 gl_cmd_pi; 86 u8 debug_mode; 87 u8 is_target; 88 u8 bdq_pbl_num_entries[2]; 115 u8 num_sq_pages_in_ring; 116 u8 num_r2tq_pages_in_rin [all...] |