Home
last modified time | relevance | path

Searched refs:UINT8 (Results 1 – 25 of 62) sorted by relevance

123

/OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/mvl88w8977/mlan/esa/common/
H A DIEEE_types.h39 (*(UINT16 *)((UINT8 *)macaddr+2) == 0xffff) && \
40 (*(UINT16 *)((UINT8 *)macaddr+4) == 0xffff))
42 #define IS_MULTICAST(macaddr) ((*(UINT8*)macaddr & 0x01) == 0x01)
44 #define IS_GROUP(macaddr) ((*(UINT8*)macaddr & 0x01) == 0x01)
271 UINT8 ip_hl:4; /* header length */
272 UINT8 ip_v:4; /* version */
274 UINT8 ip_tos; /* type of service */
278 UINT8 ip_ttl; /* time to live */
279 UINT8 ip_p; /* protocol */
294 UINT8 priority:4;
[all …]
H A Dcrypt_new_rom.h62 UINT8 enDeAction; /* encrypt or decrypt */
63 UINT8 *pData;
92 extern BOOLEAN (*MRVL_AesEncrypt_hook) (UINT8 *kek, UINT8 kekLen, UINT8 *data,
93 UINT8 *ret, int *ptr_val);
94 extern int MRVL_AesEncrypt(UINT8 *kek, UINT8 kekLen, UINT8 *data, UINT8 *ret);
97 UINT8 *pCmdPtr,
98 UINT8 *pCryptData,
101 extern int MRVL_AesValidateHostRequest(UINT32 *pBitMap, UINT8 *pCmdPtr,
102 UINT8 *pCryptData, SINT8 *pAESWrapEnc);
109 extern BOOLEAN (*MRVL_AesWrap_hook) (UINT8 *kek, UINT8 kekLen, UINT32 n,
[all …]
H A Dwl_mib.h40 UINT8 CfPeriod; /* 0 to 255 */
42 UINT8 PwrMgtMode; /* PwrMgmtMode_e values */
43 UINT8 OpRateSet[16]; /* 16 byte array is sufficient for
59 UINT8 WepKeyMappingWepOn; /* SNMP_Boolean_e values */
60 UINT8 WepKeyMappingVal[WEP_KEY_USER_INPUT]; /* 5 byte string */
61 UINT8 WepKeyMappingStatus; /* SNMP_Rowstatus_e values */
69 UINT8 PrivInvoked; /* SNMP_Boolean_e values */
70 UINT8 WepDefaultKeyId; /* 0 to 3 */
72 UINT8 ExcludeUnencrypt; /* SNMP_Boolean_e values */
75 UINT8 RSNEnabled; /* SNMP_Boolean_e values */
[all …]
H A Dwlpd.h39 UINT8 tdlsPkt:1;
40 UINT8 rsvd:7;
52 UINT8 RxBSSType;
53 UINT8 RxBSSNum;
58 UINT8 userPriority;
59 UINT8 RxRate; // LG 0-3 (11b), 5-12(11g), HT :MCS# (11n)
62 UINT8 RxHTInfo; // [Bit o] RxRate format : Legacy = 0 , HT =1
66 UINT8 PacketType;
67 UINT8 NumFragments;
68 UINT8 EncryptionStatus;
[all …]
H A Dtlv.h284 UINT8 Value[1];
291 UINT8 TlvBuffer[1];
296 UINT8 ChanGroupId;
297 UINT8 ChanBufWt;
301 UINT8 HidPortNum;
302 UINT8 NumIntf;
303 UINT8 BssTypeNumList[1];
316 UINT8 key[1];
320 UINT8 pn[8];
322 UINT8 key[1];
[all …]
H A DpmkCache_rom.h41 UINT8 PMK[MAX_PMK_SIZE]; /* PMK / PSK */
42 UINT8 length;
43 UINT8 passphrase[PSK_PASS_PHRASE_LEN_MAX];
53 extern UINT8 *pmkCacheFindPMK(void *priv, IEEEtypes_MacAddr_t *pBssid);
55 extern BOOLEAN (*pmkCacheFindPSKElement_hook) (UINT8 *pSsid,
56 UINT8 ssidLen,
59 extern pmkElement_t *pmkCacheFindPSKElement(void *priv, UINT8 *pSsid,
60 UINT8 ssidLen);
70 UINT8 *pPMK);
79 extern BOOLEAN (*pmkCacheAddPSK_hook) (UINT8 *pSsid,
[all …]
H A Dcrypt_new_rom.c42 static const UINT8 MRVL_DEFAULT_IV[8] = { 0xA6, 0xA6, 0xA6, 0xA6,
46 UINT8 aesResult[32];
57 MRVL_AES_MEMCMP(UINT8 *dst, UINT8 *src, int len) in MRVL_AES_MEMCMP()
83 MRVL_AES_MEMSET(UINT8 *dst, UINT8 val, int size) in MRVL_AES_MEMSET()
101 MRVL_AES_MEMCPY(UINT8 *dst, UINT8 *src, int size) in MRVL_AES_MEMCPY()
117 MRVL_AesInterCheck(UINT8 *inter, UINT8 *d) in MRVL_AesInterCheck()
294 MRVL_AesEncrypt(UINT8 *kek, UINT8 kekLen, UINT8 *data, UINT8 *ret) in MRVL_AesEncrypt()
297 UINT8 buf[400] = { 0 }; in MRVL_AesEncrypt()
314 rijndael_set_key_2(ctx, (UINT8 *)kek, kekLen * 64, 1); in MRVL_AesEncrypt()
316 rijndael_set_key(ctx, (UINT8 *)kek, kekLen * 64, 1); in MRVL_AesEncrypt()
[all …]
H A Daes_cmac_rom.h30 extern BOOLEAN (*mrvl_aes_cmac_hook) (UINT8 *key, UINT8 *input, int length,
31 UINT8 *mac);
32 extern void mrvl_aes_cmac(phostsa_private priv, UINT8 *key, UINT8 *input,
33 int length, UINT8 *mac);
35 extern BOOLEAN (*mrvl_aes_128_hook) (UINT8 *key, UINT8 *input, UINT8 *output);
36 extern void mrvl_aes_128(UINT8 *key, UINT8 *input, UINT8 *output);
42 extern void xor_128(UINT8 *a, UINT8 *b, UINT8 *out);
43 extern void leftshift_onebit(UINT8 *input, UINT8 *output);
44 extern void padding(UINT8 *lastb, UINT8 *pad, int length);
H A Daes_cmac_rom.c38 static UINT8 const_Rb[16] = {
44 mrvl_aes_128(UINT8 *key, UINT8 *input, UINT8 *output) in mrvl_aes_128()
62 xor_128(UINT8 *a, UINT8 *b, UINT8 *out) in xor_128()
73 leftshift_onebit(UINT8 *input, UINT8 *output) in leftshift_onebit()
76 UINT8 overflow = 0; in leftshift_onebit()
86 generate_subkey(phostsa_private priv, UINT8 *key, UINT8 *K1, UINT8 *K2) in generate_subkey()
90 UINT8 L[16]; in generate_subkey()
91 UINT8 Z[16]; in generate_subkey()
92 UINT8 tmp[16]; in generate_subkey()
116 padding(UINT8 *lastb, UINT8 *pad, int length) in padding()
[all …]
H A Dmrvl_sha256_crypto.c39 UINT8 *addr[], size_t * len, UINT8 *mac) in mrvl_sha256_crypto_vector()
43 UINT8 buf[SHA256_MIN_SCRATCH_BUF] = { 0 }; in mrvl_sha256_crypto_vector()
45 sha256_vector((void *)priv, num_elem, addr, len, mac, (UINT8 *)buf); in mrvl_sha256_crypto_vector()
51 mrvl_sha256_crypto_kdf(void *priv, UINT8 *pKey, in mrvl_sha256_crypto_kdf()
52 UINT8 key_len, in mrvl_sha256_crypto_kdf()
54 UINT8 label_len, in mrvl_sha256_crypto_kdf()
55 UINT8 *pContext, in mrvl_sha256_crypto_kdf()
56 UINT16 context_len, UINT8 *pOutput, UINT16 output_len) in mrvl_sha256_crypto_kdf()
60 UINT8 *vectors[4 + 1]; in mrvl_sha256_crypto_kdf()
62 UINT8 *pResult; in mrvl_sha256_crypto_kdf()
[all …]
H A Dsha256.c63 (a)[0] = (UINT8) (((UINT32) (val)) >> 24); \
64 (a)[1] = (UINT8) (((UINT32) (val)) >> 16); \
65 (a)[2] = (UINT8) (((UINT32) (val)) >> 8); \
66 (a)[3] = (UINT8) (((UINT32) (val)) & 0xff); \
71 (a)[0] = (UINT8) (((UINT64) (val)) >> 56); \
72 (a)[1] = (UINT8) (((UINT64) (val)) >> 48); \
73 (a)[2] = (UINT8) (((UINT64) (val)) >> 40); \
74 (a)[3] = (UINT8) (((UINT64) (val)) >> 32); \
75 (a)[4] = (UINT8) (((UINT64) (val)) >> 24); \
76 (a)[5] = (UINT8) (((UINT64) (val)) >> 16); \
[all …]
H A DpmkCache_rom.c57 UINT8 index; in pmkCacheNewElement()
101 UINT8 index; in pmkCacheUpdateReplacementRank()
132 UINT8 index = 0; in pmkCacheFindPMKElement()
175 pmkCacheFindPSKElement(void *priv, UINT8 *pSsid, UINT8 ssidLen) in pmkCacheFindPSKElement()
179 UINT8 index = 0; in pmkCacheFindPSKElement()
209 UINT8 *
212 UINT8 *pPMK = NULL; in pmkCacheFindPMK()
224 pmkCacheAddPMK(void *priv, IEEEtypes_MacAddr_t *pBssid, UINT8 *pPMK) in pmkCacheAddPMK()
258 pmkCacheAddPSK(void *priv, UINT8 *pSsid, UINT8 ssidLen, UINT8 *pPSK, in pmkCacheAddPSK()
259 UINT8 *pPassphrase) in pmkCacheAddPSK()
[all …]
H A Dsha_256.h37 UINT8 buf[64];
51 UINT8 *msgBuf, UINT8 *pScratchMem);
62 UINT8 *addr[], size_t * len, UINT8 *mac, UINT8 *pScratchMem);
74 void hmac_sha256_vector(void *priv, UINT8 *key,
77 UINT8 *addr[],
78 size_t * len, UINT8 *mac, UINT8 *pScratchMem);
H A DpmkCache.c52 UINT8 *
53 pmkCacheFindPSK(void *priv, UINT8 *pSsid, UINT8 ssidLen) in pmkCacheFindPSK()
55 UINT8 *pPMK = NULL; in pmkCacheFindPSK()
82 UINT8 *
83 pmkCacheFindPassphrase(void *priv, UINT8 *pSsid, UINT8 ssidLen) in pmkCacheFindPassphrase()
85 UINT8 *pPassphrase = NULL; in pmkCacheFindPassphrase()
168 UINT8 *pPMK = NULL; in SupplicantSetPassphrase()
169 UINT8 Passphrase[PSK_PASS_PHRASE_LEN_MAX], *pPassphrase = NULL; in SupplicantSetPassphrase()
170 UINT8 *pSsid = NULL; in SupplicantSetPassphrase()
171 UINT8 ssidLen = 0; in SupplicantSetPassphrase()
[all …]
/OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/mvl88w8977/mlan/esa/
H A Dauthenticator.h66 UINT8 TKIPICVErrors;
67 UINT8 TKIPLocalMICFailures;
68 UINT8 TKIPCounterMeasuresInvoked;
73 UINT8 kck[16]; /* PTK_KCK = L(PTK, 0, 128); */
74 UINT8 kek[16]; /* PTK_KEK = L(PTK, 128, 128); */
75 UINT8 tk[16]; /* PTK_TK = L(PTK, 256, 128); */
80 UINT8 kck[16]; /* PTK_KCK = L(PTK, 0, 128); */
81 UINT8 kek[16]; /* PTK_KEK = L(PTK, 128, 128); */
82 UINT8 tk[16]; /* PTK_TK = L(PTK, 256, 128); */
83 UINT8 rxMicKey[8];
[all …]
H A DkeyCommonDef.h58 UINT8 Key[TK_SIZE];
59 UINT8 RxMICKey[8];
60 UINT8 TxMICKey[8];
72 UINT8 keyDirection;
73 UINT8 keyType:4;
74 UINT8 version:4;
76 UINT8 keyState;
77 UINT8 keyInfo;
83 UINT8 key[CRYPTO_KEY_LEN_MAX];
84 UINT8 txMICKey[MIC_KEY_LEN_MAX];
[all …]
H A DkeyMgmtApStaCommon.h41 extern void supplicantGenerateRand(hostsa_private *priv, UINT8 *dataOut,
47 UINT16 data_length, UINT8 *MIC_Key,
48 UINT8 MIC_Key_length, UINT8 micKeyDescVersion);
50 UINT8 *pMICKey);
51 extern void supplicantConstructContext(phostsa_private priv, UINT8 *pAddr1,
52 UINT8 *pAddr2, UINT8 *pNonce1,
53 UINT8 *pNonce2, UINT8 *pContext);
56 UINT8 *pEAPOLMICKey,
57 UINT8 eapolProtocolVersion,
58 UINT8 forceKeyDescVersion);
[all …]
H A DkeyMgmtSta_rom.h45 UINT8 *pRxReplayCount);
50 extern void supplicantGenerateSha1Pmkid(phostsa_private priv, UINT8 *pPMK,
53 UINT8 *pPMKID);
57 UINT16 key_len, UINT8 isPairwise,
83 UINT8 *pos,
87 *pStaAddr, UINT8 *pPmkid,
93 UINT8 *pos,
96 UINT8 *pPmkid, BOOLEAN addPmkid);
100 UINT8 *pPMK, UINT8 type,
101 UINT8 unicast);
[all …]
H A DkeyMgmtApStaCommon.c43 const UINT8 wpa_oui_none[4] = { 0x00, 0x50, 0xf2, 0x00 };
44 const UINT8 wpa_oui01[4] = { 0x00, 0x50, 0xf2, 0x01 };
45 const UINT8 wpa_oui02[4] = { 0x00, 0x50, 0xf2, 0x02 };
46 const UINT8 wpa_oui03[4] = { 0x00, 0x50, 0xf2, 0x03 };
47 const UINT8 wpa_oui04[4] = { 0x00, 0x50, 0xf2, 0x04 };
48 const UINT8 wpa_oui05[4] = { 0x00, 0x50, 0xf2, 0x05 };
49 const UINT8 wpa_oui06[4] = { 0x00, 0x50, 0xf2, 0x06 };
51 const UINT8 wpa2_oui01[4] = { 0x00, 0x0f, 0xac, 0x01 };
52 const UINT8 wpa2_oui02[4] = { 0x00, 0x0f, 0xac, 0x02 };
53 const UINT8 wpa2_oui03[4] = { 0x00, 0x0f, 0xac, 0x03 };
[all …]
H A DkeyMgmtAp_rom.c55 UINT8
58 UINT8 auth; in convertMrvlAuthToIEEEAuth()
76 convertIEEEAuthToMrvlAuth(UINT8 auth) in convertIEEEAuthToMrvlAuth()
94 UINT8
95 convertMrvlCipherToIEEECipher(UINT8 mrvlcipher) in convertMrvlCipherToIEEECipher()
97 UINT8 Cipher; in convertMrvlCipherToIEEECipher()
119 convertIEEECipherToMrvlCipher(UINT8 cipher) in convertIEEECipherToMrvlCipher()
146 UINT8 *nonce, UINT8 *StaMacAddr) in GenerateGTK_internal()
149 UINT8 inp_data[NONCE_SIZE + sizeof(IEEEtypes_MacAddr_t)]; in GenerateGTK_internal()
150 UINT8 prefix[] = "Group key expansion"; in GenerateGTK_internal()
[all …]
H A DKeyApiStaDefs.h68 UINT8 key[CRYPTO_TKIP_KEY_LEN_MAX];
69 UINT8 txMicKey[MIC_KEY_LEN_MAX];
70 UINT8 rxMicKey[MIC_KEY_LEN_MAX];
77 UINT8 keyIndex;
78 UINT8 isDefaultTx;
79 UINT8 key[CRYPTO_WEP_KEY_LEN_MAX];
83 UINT8 key[CRYPTO_AES_KEY_LEN_MAX];
87 UINT8 keyIndex;
88 UINT8 isDefKey;
89 UINT8 key[WAPI_KEY_LEN];
[all …]
H A DkeyMgmtAp_rom.h49 UINT8 *nonce, UINT8 *StaMacAddr);
53 UINT16 Type, UINT32 replay_cnt[2], UINT8 *Nonce);
60 UINT8 *EAPOL_Encr_Key, Cipher_t *cipher);
63 UINT8 *nonce, UINT8 *StaMacAddr);
79 extern void KeyMgmtAp_DerivePTK(hostsa_private *priv, UINT8 *pPMK, t_u8 *da,
80 t_u8 *sa, UINT8 *ANonce, UINT8 *SNonce,
81 UINT8 *EAPOL_MIC_Key, UINT8 *EAPOL_Encr_Key,
H A DkeyMgmtSta_rom.c68 memcpy(util_fns, &pRsnConfig->AKM, (UINT8 *)pAkm, in supplicantSetAssocRsn_internal()
99 memcpy(util_fns, &pRsnConfig->AKM, (UINT8 *)pAkm, in supplicantSetAssocRsn_internal()
132 UINT8 *pos, in keyMgmtFormatWpaRsnIe_internal()
135 UINT8 *pPmkid, BOOLEAN addPmkid) in keyMgmtFormatWpaRsnIe_internal()
230 memcpy(util_fns, (UINT8 *)pRsnIe->PMKIDList, in keyMgmtFormatWpaRsnIe_internal()
322 key_MgtMaterial_t *pKeyMgtData, UINT8 *pPMK, in install_wpa_none_keys_internal()
323 UINT8 type, UINT8 unicast) in install_wpa_none_keys_internal()
343 memcpy(util_fns, (UINT8 *)pKeyMgtData->keyEncypt.AES.key, pPMK, in install_wpa_none_keys_internal()
348 memcpy(util_fns, (UINT8 *)pKeyMgtData->keyEncypt.TKIP.key, pPMK, in install_wpa_none_keys_internal()
354 memcpy(util_fns, (UINT8 *)pKeyMgtData->keyEncypt.TKIP.txMicKey, in install_wpa_none_keys_internal()
[all …]
H A DkeyMgmtSta.c68 UINT16 key_len, UINT8 isPairwise, KeyData_t *pKey);
71 UINT8 *pn,
72 UINT8 keyIdx, UINT8 keyLen, KeyData_t *pKey);
74 UINT8 *pos,
77 UINT8 *pPmkid, BOOLEAN addPmkid);
218 (UINT8 *)(((IGtkKde_t *)pKde->data)->IGtk), in keyMgmtProcessMsgExt()
361 UINT8 *pSNonce, UINT8 *pEAPOLMICKey, UINT8 forceKeyDescVersion) in GeneratePWKMsg2()
373 UINT8 intf_hr_len = in GeneratePWKMsg2()
413 (UINT8 *)&pTxEapol->keyMsg. in GeneratePWKMsg2()
447 UINT8 intf_hr_len = in GeneratePWKMsg4()
[all …]
H A DkeyMgmtStaTypes.h41 UINT8 wep40:1;
42 UINT8 wep104:1;
43 UINT8 tkip:1;
44 UINT8 ccmp:1;
46 UINT8 rsvd:4;
86 UINT8 akmOui[3];
104 UINT8 keyId[2];
105 UINT8 IPN[6];
106 UINT8 IGtk[32];

123