/external/wpa_supplicant_8/wpa_supplicant/ |
wps_supplicant.h | 30 const char *encr; member in struct:wps_new_ap_settings
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
ikev2.h | 24 int encr; member in struct:ikev2_proposal_data
|
ikev2.c | 47 const struct ikev2_encr_alg *encr; local 56 encr = ikev2_get_encr(data->proposal.encr); 57 if (integ == NULL || prf == NULL || encr == NULL) { 118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 169 transform_id == data->proposal.encr) { 190 prop->encr = transform_id; 332 prop.encr = -1; 339 prop.encr != -1 && prop.dh != -1) { 359 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.h | 24 int encr; member in struct:ikev2_proposal_data
|
ikev2.c | 48 const struct ikev2_encr_alg *encr; local 57 encr = ikev2_get_encr(data->proposal.encr); 58 if (integ == NULL || prf == NULL || encr == NULL) { 119 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 170 transform_id == data->proposal.encr) { 191 prop->encr = transform_id; 333 prop.encr = -1; 340 prop.encr != -1 && prop.dh != -1) { 360 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d [all...] |
/external/wpa_supplicant/ |
eap_sim_common.c | 233 struct eap_sim_attrs *attr, int aka, int encr) 300 if (!encr) { 305 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING"); 308 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " 312 "(encr) padding bytes", 396 if (!encr) { 402 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid " 408 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d", 412 if (!encr) { 418 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid 604 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg [all...] |
/external/wpa_supplicant/wpa_gui/ |
networkconfig.ui.h | 41 int auth, encr = 0; local 54 encr = 1; 56 encr = 0; 58 encr = 1; 60 encr = 0; 64 encrSelect->setCurrentItem(encr); 163 int encr = encrSelect->currentItem(); local 164 if (encr == 0) 331 int auth = AUTH_NONE, encr = 0; local 342 encr = 1 [all...] |
wpagui.ui.h | 353 QString encr; local 356 encr.append(pairwise_cipher); 357 encr.append(" + "); 358 encr.append(group_cipher); 360 encr.append(pairwise_cipher); 362 encr.append(group_cipher); 363 encr.append(" [group key only]"); 365 encr.append("?"); 367 textEncryption->setText(encr);
|
/external/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 71 int auth, encr = 0; local 84 encr = 1; 86 encr = 0; 88 encr = 1; 90 encr = 0; 94 encrSelect->setCurrentItem(encr); 194 int encr = encrSelect->currentItem(); local 195 if (encr == 0) 370 int auth = AUTH_NONE, encr = 0; local 381 encr = 1 [all...] |
wpagui.cpp | 396 QString encr; local 399 encr.append(pairwise_cipher); 400 encr.append(" + "); 401 encr.append(group_cipher); 403 encr.append(pairwise_cipher); 405 encr.append(group_cipher); 406 encr.append(" [group key only]"); 408 encr.append("?"); 410 textEncryption->setText(encr);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.c | 503 struct eap_sim_attrs *attr, int aka, int encr) 570 if (!encr) { 575 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING"); 578 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " 582 "(encr) padding bytes", 678 if (!encr) { 684 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid " 690 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d", 694 if (!encr) { 700 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid 979 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
ikev2.h | 24 int encr; member in struct:ikev2_proposal_data
|
ikev2.c | 43 const struct ikev2_encr_alg *encr; local 52 encr = ikev2_get_encr(data->proposal.encr); 53 if (integ == NULL || prf == NULL || encr == NULL) { 131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 210 prop->encr = transform_id; 350 prop.encr = -1; 357 prop.encr != -1 && prop.dh != -1) { 376 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d " 378 data->proposal.encr, data->proposal.prf [all...] |
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui/ |
networkconfig.ui.h | 41 int auth, encr = 0; local 54 encr = 1; 56 encr = 0; 58 encr = 1; 60 encr = 0; 64 encrSelect->setCurrentItem(encr); 166 int encr = encrSelect->currentItem(); local 167 if (encr == 0) 345 int auth = AUTH_NONE, encr = 0; local 356 encr = 1 [all...] |
wpagui.ui.h | 353 QString encr; local 356 encr.append(pairwise_cipher); 357 encr.append(" + "); 358 encr.append(group_cipher); 360 encr.append(pairwise_cipher); 362 encr.append(group_cipher); 363 encr.append(" [group key only]"); 365 textEncryption->setText(encr);
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 74 int auth, encr = 0; local 87 encr = 1; 89 encr = 0; 91 encr = 1; 93 encr = 0; 97 encrSelect->setCurrentIndex(encr); 99 wepEnabled(auth == AUTH_NONE && encr == 1); 265 int encr = encrSelect->currentIndex(); local 266 if (encr == 0) 520 int auth = AUTH_NONE, encr = 0 local [all...] |
wpagui.cpp | 548 QString encr; local 551 encr.append(pairwise_cipher); 552 encr.append(" + "); 553 encr.append(group_cipher); 555 encr.append(pairwise_cipher); 557 encr.append(group_cipher); 558 encr.append(" [group key only]"); 560 textEncryption->setText(encr); [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 504 struct eap_sim_attrs *attr, int aka, int encr) 571 if (!encr) { 576 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING"); 579 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " 583 "(encr) padding bytes", 679 if (!encr) { 685 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid " 691 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d", 695 if (!encr) { 701 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid 980 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.h | 24 int encr; member in struct:ikev2_proposal_data
|
ikev2.c | 44 const struct ikev2_encr_alg *encr; local 53 encr = ikev2_get_encr(data->proposal.encr); 54 if (integ == NULL || prf == NULL || encr == NULL) { 132 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 211 prop->encr = transform_id; 351 prop.encr = -1; 358 prop.encr != -1 && prop.dh != -1) { 377 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d " 379 data->proposal.encr, data->proposal.prf [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui/ |
networkconfig.ui.h | 41 int auth, encr = 0; local 54 encr = 1; 56 encr = 0; 58 encr = 1; 60 encr = 0; 64 encrSelect->setCurrentItem(encr); 166 int encr = encrSelect->currentItem(); local 167 if (encr == 0) 345 int auth = AUTH_NONE, encr = 0; local 356 encr = 1 [all...] |
wpagui.ui.h | 353 QString encr; local 356 encr.append(pairwise_cipher); 357 encr.append(" + "); 358 encr.append(group_cipher); 360 encr.append(pairwise_cipher); 362 encr.append(group_cipher); 363 encr.append(" [group key only]"); 365 textEncryption->setText(encr);
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 77 int auth, encr = 0; local 90 encr = 1; 92 encr = 0; 94 encr = 1; 98 encr = 0; 102 encrSelect->setCurrentIndex(encr); 284 int encr = encrSelect->currentIndex(); local 285 if (encr == 0) 539 int auth = AUTH_NONE_OPEN, encr = 0; local 550 encr = 1 [all...] |
/external/wpa_supplicant_8/hostapd/ |
ctrl_iface.c | 504 char *ssid, *auth, *encr = NULL, *key = NULL; local 516 encr = pos; 524 return hostapd_wps_config_ap(hapd, ssid, auth, encr, key);
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_ralink.c | 1374 NDIS_802_11_WEP_STATUS encr; local [all...] |