/external/wpa_supplicant/ |
eap_sim_common.c | 233 struct eap_sim_attrs *attr, int aka, int encr) 300 if (!encr) { 305 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING"); 308 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " 312 "(encr) padding bytes", 396 if (!encr) { 402 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid " 408 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d", 412 if (!encr) { 418 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid 604 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg [all...] |
driver_ndis.c | 574 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr) 576 u32 encr_status = encr; 580 "OID_802_11_ENCRYPTION_STATUS (%d)", encr); 589 u32 encr; local 592 (char *) &encr, sizeof(encr)); 593 if (res != sizeof(encr)) { 598 return encr; 977 u32 auth_mode, encr, priv_mode, mode; local 1044 encr = Ndis802_11Encryption3Enabled [all...] |
eap_aka.c | 147 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for " 155 "EAP-AKA: (encr) AT_NEXT_PSEUDONYM", 164 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for " 172 "EAP-AKA: (encr) AT_NEXT_REAUTH_ID", 662 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No%s%s in reauth packet", 672 wpa_printf(MSG_INFO, "EAP-AKA: (encr) Invalid counter " 700 wpa_hexdump(MSG_DEBUG, "EAP-AKA: (encr) AT_NONCE_S",
|
eap_sim.c | 198 wpa_printf(MSG_INFO, "EAP-SIM: (encr) No memory for " 206 "EAP-SIM: (encr) AT_NEXT_PSEUDONYM", 215 wpa_printf(MSG_INFO, "EAP-SIM: (encr) No memory for " 223 "EAP-SIM: (encr) AT_NEXT_REAUTH_ID", 741 wpa_printf(MSG_INFO, "EAP-SIM: (encr) No%s%s in reauth packet", 750 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid counter " 769 wpa_hexdump(MSG_DEBUG, "EAP-SIM: (encr) AT_NONCE_S",
|
eap_sim_common.h | 142 struct eap_sim_attrs *attr, int aka, int encr);
|
/external/wpa_supplicant/wpa_gui/ |
networkconfig.ui.h | 41 int auth, encr = 0; local 54 encr = 1; 56 encr = 0; 58 encr = 1; 60 encr = 0; 64 encrSelect->setCurrentItem(encr); 163 int encr = encrSelect->currentItem(); local 164 if (encr == 0) 331 int auth = AUTH_NONE, encr = 0; local 342 encr = 1 [all...] |
wpagui.ui.h | 353 QString encr; local 356 encr.append(pairwise_cipher); 357 encr.append(" + "); 358 encr.append(group_cipher); 360 encr.append(pairwise_cipher); 362 encr.append(group_cipher); 363 encr.append(" [group key only]"); 365 encr.append("?"); 367 textEncryption->setText(encr);
|
/external/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 71 int auth, encr = 0; local 84 encr = 1; 86 encr = 0; 88 encr = 1; 90 encr = 0; 94 encrSelect->setCurrentItem(encr); 194 int encr = encrSelect->currentItem(); local 195 if (encr == 0) 370 int auth = AUTH_NONE, encr = 0; local 381 encr = 1 [all...] |
wpagui.cpp | 396 QString encr; local 399 encr.append(pairwise_cipher); 400 encr.append(" + "); 401 encr.append(group_cipher); 403 encr.append(pairwise_cipher); 405 encr.append(group_cipher); 406 encr.append(" [group key only]"); 408 encr.append("?"); 410 textEncryption->setText(encr);
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui/ |
networkconfig.ui.h | 41 int auth, encr = 0; local 54 encr = 1; 56 encr = 0; 58 encr = 1; 60 encr = 0; 64 encrSelect->setCurrentItem(encr); 166 int encr = encrSelect->currentItem(); local 167 if (encr == 0) 345 int auth = AUTH_NONE, encr = 0; local 356 encr = 1 [all...] |
wpagui.ui.h | 353 QString encr; local 356 encr.append(pairwise_cipher); 357 encr.append(" + "); 358 encr.append(group_cipher); 360 encr.append(pairwise_cipher); 362 encr.append(group_cipher); 363 encr.append(" [group key only]"); 365 textEncryption->setText(encr);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.c | 503 struct eap_sim_attrs *attr, int aka, int encr) 570 if (!encr) { 575 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING"); 578 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " 582 "(encr) padding bytes", 678 if (!encr) { 684 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid " 690 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d", 694 if (!encr) { 700 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid 979 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg [all...] |
ikev2_common.c | 208 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length"); 229 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 266 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length"); 292 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 612 /* Encr - RFC 4306, Sect. 3.14 */ 698 const struct ikev2_encr_alg *encr, 712 keys->SK_encr_len = encr->key_len;
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 74 int auth, encr = 0; local 87 encr = 1; 89 encr = 0; 91 encr = 1; 93 encr = 0; 97 encrSelect->setCurrentIndex(encr); 99 wepEnabled(auth == AUTH_NONE && encr == 1); 265 int encr = encrSelect->currentIndex(); local 266 if (encr == 0) 520 int auth = AUTH_NONE, encr = 0 local [all...] |
wpagui.cpp | 548 QString encr; local 551 encr.append(pairwise_cipher); 552 encr.append(" + "); 553 encr.append(group_cipher); 555 encr.append(pairwise_cipher); 557 encr.append(group_cipher); 558 encr.append(" [group key only]"); 560 textEncryption->setText(encr); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
ikev2.h | 24 int encr; member in struct:ikev2_proposal_data
|
ikev2.c | 43 const struct ikev2_encr_alg *encr; local 52 encr = ikev2_get_encr(data->proposal.encr); 53 if (integ == NULL || prf == NULL || encr == NULL) { 131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 210 prop->encr = transform_id; 350 prop.encr = -1; 357 prop.encr != -1 && prop.dh != -1) { 376 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d " 378 data->proposal.encr, data->proposal.prf [all...] |
eap_sim.c | 299 wpa_printf(MSG_INFO, "EAP-SIM: (encr) No memory for " 307 "EAP-SIM: (encr) AT_NEXT_PSEUDONYM", 316 wpa_printf(MSG_INFO, "EAP-SIM: (encr) No memory for " 324 "EAP-SIM: (encr) AT_NEXT_REAUTH_ID", 830 wpa_printf(MSG_INFO, "EAP-SIM: (encr) No%s%s in reauth packet", 839 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid counter " 858 wpa_hexdump(MSG_DEBUG, "EAP-SIM: (encr) AT_NONCE_S",
|
eap_aka.c | 269 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for " 277 "EAP-AKA: (encr) AT_NEXT_PSEUDONYM", 286 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for " 294 "EAP-AKA: (encr) AT_NEXT_REAUTH_ID", 1069 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No%s%s in reauth packet", 1079 wpa_printf(MSG_INFO, "EAP-AKA: (encr) Invalid counter " 1102 wpa_hexdump(MSG_DEBUG, "EAP-AKA: (encr) AT_NONCE_S", [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
ikev2.h | 24 int encr; member in struct:ikev2_proposal_data
|
ikev2.c | 47 const struct ikev2_encr_alg *encr; local 56 encr = ikev2_get_encr(data->proposal.encr); 57 if (integ == NULL || prf == NULL || encr == NULL) { 118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 169 transform_id == data->proposal.encr) { 190 prop->encr = transform_id; 332 prop.encr = -1; 339 prop.encr != -1 && prop.dh != -1) { 359 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d [all...] |
eap_fast.c | 815 struct wpabuf *encr; local 819 encr = eap_server_tls_encrypt(sm, &data->ssl, wpabuf_mhead(plain), 827 (int) wpabuf_len(encr), 830 if (wpabuf_resize(&data->ssl.out_buf, wpabuf_len(encr)) < 0) { 833 wpabuf_free(encr); 836 wpabuf_put_buf(data->ssl.out_buf, encr); 837 wpabuf_free(encr); 841 data->ssl.out_buf = encr; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_common.c | 151 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr, 161 if (encr == NULL || encr_len < 2 * block_size || encr_len % block_size) 171 wpa_hexdump(MSG_MSGDUMP, "WPS: Encrypted Settings", encr, encr_len); 172 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 173 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_ralink.c | 1374 NDIS_802_11_WEP_STATUS encr; local [all...] |
driver_ndis.c | 580 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr) 582 u32 encr_status = encr; 586 "OID_802_11_ENCRYPTION_STATUS (%d)", encr); 595 u32 encr; local 598 (char *) &encr, sizeof(encr)); 599 if (res != sizeof(encr)) { 604 return encr; 990 u32 auth_mode, encr, priv_mode, mode; local 1062 encr = Ndis802_11Encryption3Enabled [all...] |