HomeSort by relevance Sort by last modified time
    Searched full:encr (Results 1 - 25 of 42) sorted by null

1 2

  /external/wpa_supplicant/
eap_sim_common.c 233 struct eap_sim_attrs *attr, int aka, int encr)
300 if (!encr) {
305 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
308 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
312 "(encr) padding bytes",
396 if (!encr) {
402 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
408 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
412 if (!encr) {
418 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid
604 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg
    [all...]
driver_ndis.c 574 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr)
576 u32 encr_status = encr;
580 "OID_802_11_ENCRYPTION_STATUS (%d)", encr);
589 u32 encr; local
592 (char *) &encr, sizeof(encr));
593 if (res != sizeof(encr)) {
598 return encr;
977 u32 auth_mode, encr, priv_mode, mode; local
1044 encr = Ndis802_11Encryption3Enabled
    [all...]
eap_aka.c 147 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for "
155 "EAP-AKA: (encr) AT_NEXT_PSEUDONYM",
164 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for "
172 "EAP-AKA: (encr) AT_NEXT_REAUTH_ID",
662 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No%s%s in reauth packet",
672 wpa_printf(MSG_INFO, "EAP-AKA: (encr) Invalid counter "
700 wpa_hexdump(MSG_DEBUG, "EAP-AKA: (encr) AT_NONCE_S",
eap_sim.c 198 wpa_printf(MSG_INFO, "EAP-SIM: (encr) No memory for "
206 "EAP-SIM: (encr) AT_NEXT_PSEUDONYM",
215 wpa_printf(MSG_INFO, "EAP-SIM: (encr) No memory for "
223 "EAP-SIM: (encr) AT_NEXT_REAUTH_ID",
741 wpa_printf(MSG_INFO, "EAP-SIM: (encr) No%s%s in reauth packet",
750 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid counter "
769 wpa_hexdump(MSG_DEBUG, "EAP-SIM: (encr) AT_NONCE_S",
eap_sim_common.h 142 struct eap_sim_attrs *attr, int aka, int encr);
  /external/wpa_supplicant/wpa_gui/
networkconfig.ui.h 41 int auth, encr = 0; local
54 encr = 1;
56 encr = 0;
58 encr = 1;
60 encr = 0;
64 encrSelect->setCurrentItem(encr);
163 int encr = encrSelect->currentItem(); local
164 if (encr == 0)
331 int auth = AUTH_NONE, encr = 0; local
342 encr = 1
    [all...]
wpagui.ui.h 353 QString encr; local
356 encr.append(pairwise_cipher);
357 encr.append(" + ");
358 encr.append(group_cipher);
360 encr.append(pairwise_cipher);
362 encr.append(group_cipher);
363 encr.append(" [group key only]");
365 encr.append("?");
367 textEncryption->setText(encr);
  /external/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 71 int auth, encr = 0; local
84 encr = 1;
86 encr = 0;
88 encr = 1;
90 encr = 0;
94 encrSelect->setCurrentItem(encr);
194 int encr = encrSelect->currentItem(); local
195 if (encr == 0)
370 int auth = AUTH_NONE, encr = 0; local
381 encr = 1
    [all...]
wpagui.cpp 396 QString encr; local
399 encr.append(pairwise_cipher);
400 encr.append(" + ");
401 encr.append(group_cipher);
403 encr.append(pairwise_cipher);
405 encr.append(group_cipher);
406 encr.append(" [group key only]");
408 encr.append("?");
410 textEncryption->setText(encr);
  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui/
networkconfig.ui.h 41 int auth, encr = 0; local
54 encr = 1;
56 encr = 0;
58 encr = 1;
60 encr = 0;
64 encrSelect->setCurrentItem(encr);
166 int encr = encrSelect->currentItem(); local
167 if (encr == 0)
345 int auth = AUTH_NONE, encr = 0; local
356 encr = 1
    [all...]
wpagui.ui.h 353 QString encr; local
356 encr.append(pairwise_cipher);
357 encr.append(" + ");
358 encr.append(group_cipher);
360 encr.append(pairwise_cipher);
362 encr.append(group_cipher);
363 encr.append(" [group key only]");
365 textEncryption->setText(encr);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.c 503 struct eap_sim_attrs *attr, int aka, int encr)
570 if (!encr) {
575 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
578 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
582 "(encr) padding bytes",
678 if (!encr) {
684 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
690 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
694 if (!encr) {
700 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid
979 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg
    [all...]
ikev2_common.c 208 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length");
229 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
266 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length");
292 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
612 /* Encr - RFC 4306, Sect. 3.14 */
698 const struct ikev2_encr_alg *encr,
712 keys->SK_encr_len = encr->key_len;
  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 74 int auth, encr = 0; local
87 encr = 1;
89 encr = 0;
91 encr = 1;
93 encr = 0;
97 encrSelect->setCurrentIndex(encr);
99 wepEnabled(auth == AUTH_NONE && encr == 1);
265 int encr = encrSelect->currentIndex(); local
266 if (encr == 0)
520 int auth = AUTH_NONE, encr = 0 local
    [all...]
wpagui.cpp 548 QString encr; local
551 encr.append(pairwise_cipher);
552 encr.append(" + ");
553 encr.append(group_cipher);
555 encr.append(pairwise_cipher);
557 encr.append(group_cipher);
558 encr.append(" [group key only]");
560 textEncryption->setText(encr);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
ikev2.h 24 int encr; member in struct:ikev2_proposal_data
ikev2.c 43 const struct ikev2_encr_alg *encr; local
52 encr = ikev2_get_encr(data->proposal.encr);
53 if (integ == NULL || prf == NULL || encr == NULL) {
131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
210 prop->encr = transform_id;
350 prop.encr = -1;
357 prop.encr != -1 && prop.dh != -1) {
376 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d "
378 data->proposal.encr, data->proposal.prf
    [all...]
eap_sim.c 299 wpa_printf(MSG_INFO, "EAP-SIM: (encr) No memory for "
307 "EAP-SIM: (encr) AT_NEXT_PSEUDONYM",
316 wpa_printf(MSG_INFO, "EAP-SIM: (encr) No memory for "
324 "EAP-SIM: (encr) AT_NEXT_REAUTH_ID",
830 wpa_printf(MSG_INFO, "EAP-SIM: (encr) No%s%s in reauth packet",
839 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid counter "
858 wpa_hexdump(MSG_DEBUG, "EAP-SIM: (encr) AT_NONCE_S",
eap_aka.c 269 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for "
277 "EAP-AKA: (encr) AT_NEXT_PSEUDONYM",
286 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for "
294 "EAP-AKA: (encr) AT_NEXT_REAUTH_ID",
1069 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No%s%s in reauth packet",
1079 wpa_printf(MSG_INFO, "EAP-AKA: (encr) Invalid counter "
1102 wpa_hexdump(MSG_DEBUG, "EAP-AKA: (encr) AT_NONCE_S",
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
ikev2.h 24 int encr; member in struct:ikev2_proposal_data
ikev2.c 47 const struct ikev2_encr_alg *encr; local
56 encr = ikev2_get_encr(data->proposal.encr);
57 if (integ == NULL || prf == NULL || encr == NULL) {
118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
169 transform_id == data->proposal.encr) {
190 prop->encr = transform_id;
332 prop.encr = -1;
339 prop.encr != -1 && prop.dh != -1) {
359 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d
    [all...]
eap_fast.c 815 struct wpabuf *encr; local
819 encr = eap_server_tls_encrypt(sm, &data->ssl, wpabuf_mhead(plain),
827 (int) wpabuf_len(encr),
830 if (wpabuf_resize(&data->ssl.out_buf, wpabuf_len(encr)) < 0) {
833 wpabuf_free(encr);
836 wpabuf_put_buf(data->ssl.out_buf, encr);
837 wpabuf_free(encr);
841 data->ssl.out_buf = encr;
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_common.c 151 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr,
161 if (encr == NULL || encr_len < 2 * block_size || encr_len % block_size)
171 wpa_hexdump(MSG_MSGDUMP, "WPS: Encrypted Settings", encr, encr_len);
172 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
173 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_ralink.c 1374 NDIS_802_11_WEP_STATUS encr; local
    [all...]
driver_ndis.c 580 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr)
582 u32 encr_status = encr;
586 "OID_802_11_ENCRYPTION_STATUS (%d)", encr);
595 u32 encr; local
598 (char *) &encr, sizeof(encr));
599 if (res != sizeof(encr)) {
604 return encr;
990 u32 auth_mode, encr, priv_mode, mode; local
1062 encr = Ndis802_11Encryption3Enabled
    [all...]

Completed in 85 milliseconds

1 2