/freebsd-11.0-release/contrib/wpa/src/wps/ |
H A D | wps_attr_parse.h | 16 const u8 *version; /* 1 octet */ 17 const u8 *version2; /* 1 octet */ 18 const u8 *msg_type; /* 1 octet */ 19 const u8 *enrollee_nonce; /* WPS_NONCE_LEN (16) octets */ 20 const u8 *registrar_nonce; /* WPS_NONCE_LEN (16) octets */ 21 const u8 *uuid_r; /* WPS_UUID_LEN (16) octets */ 22 const u8 *uuid_e; /* WPS_UUID_LEN (16) octets */ 23 const u8 *auth_type_flags; /* 2 octets */ 24 const u8 *encr_type_flags; /* 2 octets */ 25 const u8 *conn_type_flag [all...] |
/freebsd-11.0-release/contrib/wpa/src/crypto/ |
H A D | milenage.h | 12 void milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 14 u8 *ck, u8 *res, size_t *res_len); 15 int milenage_auts(const u8 *op [all...] |
H A D | ms_funcs.h | 12 int generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, 13 const u8 *username, size_t username_len, 14 const u8 *password, size_t password_len, 15 u8 *response); 16 int generate_nt_response_pwhash(const u8 *auth_challenge, 17 const u8 *peer_challenge, 18 const u8 *username, size_t username_len, 19 const u8 *password_hash, 20 u8 *respons [all...] |
H A D | aes_siv.h | 12 int aes_siv_encrypt(const u8 *key, const u8 *pw, 14 const u8 *addr[], const size_t *len, u8 *out); 15 int aes_siv_decrypt(const u8 *key, const u8 *iv_crypt, size_t iv_c_len, 16 size_t num_elem, const u8 *addr[], const size_t *len, 17 u8 *out);
|
H A D | crypto_none.c | 15 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) 21 void des_encrypt(const u8 *clear, const u8 *key, u8 *cypher)
|
H A D | sha384.h | 14 int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, 15 const u8 *addr[], const size_t *len, u8 *mac); 16 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data, 17 size_t data_len, u8 *mac); 18 void sha384_prf(const u8 *key, size_t key_len, const char *label, 19 const u8 *data, size_t data_len, u8 *buf, size_t buf_len); 20 void sha384_prf_bits(const u8 *ke [all...] |
H A D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, 22 u8 *cipher); 23 int __must_check aes_unwrap(const u8 *kek, size_t kek_len, int n, 24 const u8 *cipher, u8 *plain); 25 int __must_check omac1_aes_vector(const u8 *key, size_t key_len, 26 size_t num_elem, const u8 *addr[], 27 const size_t *len, u8 *mac); 28 int __must_check omac1_aes_128_vector(const u8 *ke [all...] |
H A D | sha1.h | 14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 15 const u8 *addr[], const size_t *len, u8 *mac); 16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 17 u8 *mac); 18 int sha1_prf(const u8 *key, size_t key_len, const char *label, 19 const u8 *data, size_t data_len, u8 *buf, size_t buf_len); 20 int sha1_t_prf(const u8 *ke [all...] |
H A D | aes.h | 14 void * aes_encrypt_init(const u8 *key, size_t len); 15 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt); 17 void * aes_decrypt_init(const u8 *key, size_t len); 18 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain);
|
H A D | md5.h | 14 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 15 const u8 *addr[], const size_t *len, u8 *mac); 16 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 17 u8 *mac);
|
H A D | des_i.h | 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt); 19 void des_block_decrypt(const u8 *crypt, const u32 *dk, u8 *plain); 21 void des3_key_setup(const u8 *key, struct des3_key_s *dkey); 22 void des3_encrypt(const u8 *plain, const struct des3_key_s *key, u8 *crypt); 23 void des3_decrypt(const u8 *crypt, const struct des3_key_s *key, u8 *plai [all...] |
/freebsd-11.0-release/sys/dev/mlx5/ |
H A D | mlx5_ifc.h | 235 u8 outer_dmac[0x1]; 236 u8 outer_smac[0x1]; 237 u8 outer_ether_type[0x1]; 238 u8 reserved_0[0x1]; 239 u8 outer_first_prio[0x1]; 240 u8 outer_first_cfi[0x1]; 241 u8 outer_first_vid[0x1]; 242 u8 reserved_1[0x1]; 243 u8 outer_second_prio[0x1]; 244 u8 outer_second_cf [all...] |
/freebsd-11.0-release/contrib/wpa/src/eap_peer/ |
H A D | mschapv2.h | 17 const u8 * mschapv2_remove_domain(const u8 *username, size_t *len); 18 int mschapv2_derive_response(const u8 *username, size_t username_len, 19 const u8 *password, size_t password_len, 21 const u8 *auth_challenge, 22 const u8 *peer_challenge, 23 u8 *nt_response, u8 *auth_response, 24 u8 *master_key); 25 int mschapv2_verify_auth_response(const u8 *auth_respons [all...] |
/freebsd-11.0-release/contrib/wpa/src/pae/ |
H A D | ieee802_1x_key.h | 12 int ieee802_1x_cak_128bits_aes_cmac(const u8 *msk, const u8 *mac1, 13 const u8 *mac2, u8 *cak); 14 int ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1, 15 const u8 *mac2, const u8 *sid, 16 size_t sid_bytes, u8 *ckn); 17 int ieee802_1x_kek_128bits_aes_cmac(const u8 *ca [all...] |
/freebsd-11.0-release/contrib/wpa/src/common/ |
H A D | common_module_tests.c | 19 u8 *data; 26 { (u8 *) "", 0, ParseOK, 0 }, 27 { (u8 *) " ", 1, ParseFailed, 0 }, 28 { (u8 *) "\xff\x00", 2, ParseUnknown, 1 }, 29 { (u8 *) "\xff\x01", 2, ParseFailed, 0 }, 30 { (u8 *) "\xdd\x03\x01\x02\x03", 5, ParseUnknown, 1 }, 31 { (u8 *) "\xdd\x04\x01\x02\x03\x04", 6, ParseUnknown, 1 }, 32 { (u8 *) "\xdd\x04\x00\x50\xf2\x02", 6, ParseUnknown, 1 }, 33 { (u8 *) "\xdd\x05\x00\x50\xf2\x02\x02", 7, ParseOK, 1 }, 34 { (u8 *) "\xd [all...] |
H A D | ieee802_11_common.h | 16 const u8 *ie; 17 u8 ie_len; 19 u8 nof_ies; 24 const u8 *ssid; 25 const u8 *supp_rates; 26 const u8 *ds_params; 27 const u8 *challenge; 28 const u8 *erp_info; 29 const u8 *ext_supp_rates; 30 const u8 *wpa_i [all...] |
/freebsd-11.0-release/contrib/wpa/src/ap/ |
H A D | hs20.h | 14 u8 * hostapd_eid_hs20_indication(struct hostapd_data *hapd, u8 *eid); 15 u8 * hostapd_eid_osen(struct hostapd_data *hapd, u8 *eid); 16 int hs20_send_wnm_notification(struct hostapd_data *hapd, const u8 *addr, 17 u8 osu_method, const char *url); 19 const u8 *addr,
|
/freebsd-11.0-release/contrib/wpa/src/rsn_supp/ |
H A D | wpa_ie.h | 15 const u8 *wpa_ie; 17 const u8 *rsn_ie; 19 const u8 *pmkid; 20 const u8 *gtk; 22 const u8 *mac_addr; 25 const u8 *smk; 27 const u8 *nonce; 29 const u8 *lifetime; 31 const u8 *error; 35 const u8 *igt [all...] |
/freebsd-11.0-release/contrib/wpa/src/eap_common/ |
H A D | eap_sake_common.h | 48 u8 version; /* EAP_SAKE_VERSION */ 49 u8 session_id; 50 u8 subtype; 59 const u8 *rand_s; 60 const u8 *rand_p; 61 const u8 *mic_s; 62 const u8 *mic_p; 63 const u8 *serverid; 65 const u8 *peerid; 67 const u8 *spi_ [all...] |
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, 15 size_t challenge_len, u8 *response);
|
H A D | eap_eke_common.h | 63 u8 dhgroup; 64 u8 encr; 65 u8 prf; 66 u8 mac; 68 u8 shared_secret[EAP_EKE_MAX_HASH_LEN]; 69 u8 ke[EAP_EKE_MAX_KE_LEN]; 70 u8 ki[EAP_EKE_MAX_KI_LEN]; 71 u8 ka[EAP_EKE_MAX_KA_LEN]; 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 enc [all...] |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 75 const u8 *nonce_mt, u16 selected_version, 76 const u8 *ver_list, size_t ver_list_len, 77 int num_chal, const u8 *kc, u8 *mk); 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 79 const u8 *ik, const u8 *ck, u8 *mk); 80 int eap_sim_derive_keys(const u8 *m [all...] |
H A D | eap_common.h | 15 const u8 *keyname; 16 const u8 *domain; 18 u8 keyname_len; 19 u8 domain_len; 23 const u8 * eap_hdr_validate(int vendor, EapType eap_type, 26 u8 code, u8 identifier); 28 u8 eap_get_id(const struct wpabuf *msg); 30 int erp_parse_tlvs(const u8 *pos, const u8 *en [all...] |
H A D | eap_ikev2_common.h | 21 const u8 *i_nonce, size_t i_nonce_len, 22 const u8 *r_nonce, size_t r_nonce_len, 23 u8 *keymat); 24 struct wpabuf * eap_ikev2_build_frag_ack(u8 id, u8 code); 27 const u8 *pos, const u8 *end);
|
/freebsd-11.0-release/crypto/openssl/crypto/camellia/ |
H A D | cmll_locl.h | 72 typedef unsigned char u8; typedef 74 int Camellia_Ekeygen(int keyBitLength, const u8 *rawKey, 76 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], 78 u8 ciphertext[]); 79 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], 81 u8 plaintext[]); 82 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], 83 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]); 84 void Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[], 85 const KEY_TABLE_TYPE keyTable, u8 plaintex [all...] |