HomeSort by relevance Sort by last modified time
    Searched defs:encr (Results 1 - 25 of 33) sorted by null

1 2

  /external/wpa_supplicant_8/wpa_supplicant/
wps_supplicant.h 30 const char *encr; member in struct:wps_new_ap_settings
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
ikev2.h 24 int encr; member in struct:ikev2_proposal_data
ikev2.c 47 const struct ikev2_encr_alg *encr; local
56 encr = ikev2_get_encr(data->proposal.encr);
57 if (integ == NULL || prf == NULL || encr == NULL) {
118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
169 transform_id == data->proposal.encr) {
190 prop->encr = transform_id;
332 prop.encr = -1;
339 prop.encr != -1 && prop.dh != -1) {
359 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
ikev2.h 24 int encr; member in struct:ikev2_proposal_data
ikev2.c 48 const struct ikev2_encr_alg *encr; local
57 encr = ikev2_get_encr(data->proposal.encr);
58 if (integ == NULL || prf == NULL || encr == NULL) {
119 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
170 transform_id == data->proposal.encr) {
191 prop->encr = transform_id;
333 prop.encr = -1;
340 prop.encr != -1 && prop.dh != -1) {
360 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d
    [all...]
  /external/wpa_supplicant/
eap_sim_common.c 233 struct eap_sim_attrs *attr, int aka, int encr)
300 if (!encr) {
305 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
308 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
312 "(encr) padding bytes",
396 if (!encr) {
402 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
408 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
412 if (!encr) {
418 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid
604 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg
    [all...]
  /external/wpa_supplicant/wpa_gui/
networkconfig.ui.h 41 int auth, encr = 0; local
54 encr = 1;
56 encr = 0;
58 encr = 1;
60 encr = 0;
64 encrSelect->setCurrentItem(encr);
163 int encr = encrSelect->currentItem(); local
164 if (encr == 0)
331 int auth = AUTH_NONE, encr = 0; local
342 encr = 1
    [all...]
wpagui.ui.h 353 QString encr; local
356 encr.append(pairwise_cipher);
357 encr.append(" + ");
358 encr.append(group_cipher);
360 encr.append(pairwise_cipher);
362 encr.append(group_cipher);
363 encr.append(" [group key only]");
365 encr.append("?");
367 textEncryption->setText(encr);
  /external/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 71 int auth, encr = 0; local
84 encr = 1;
86 encr = 0;
88 encr = 1;
90 encr = 0;
94 encrSelect->setCurrentItem(encr);
194 int encr = encrSelect->currentItem(); local
195 if (encr == 0)
370 int auth = AUTH_NONE, encr = 0; local
381 encr = 1
    [all...]
wpagui.cpp 396 QString encr; local
399 encr.append(pairwise_cipher);
400 encr.append(" + ");
401 encr.append(group_cipher);
403 encr.append(pairwise_cipher);
405 encr.append(group_cipher);
406 encr.append(" [group key only]");
408 encr.append("?");
410 textEncryption->setText(encr);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.c 503 struct eap_sim_attrs *attr, int aka, int encr)
570 if (!encr) {
575 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
578 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
582 "(encr) padding bytes",
678 if (!encr) {
684 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
690 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
694 if (!encr) {
700 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid
979 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
ikev2.h 24 int encr; member in struct:ikev2_proposal_data
ikev2.c 43 const struct ikev2_encr_alg *encr; local
52 encr = ikev2_get_encr(data->proposal.encr);
53 if (integ == NULL || prf == NULL || encr == NULL) {
131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
210 prop->encr = transform_id;
350 prop.encr = -1;
357 prop.encr != -1 && prop.dh != -1) {
376 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d "
378 data->proposal.encr, data->proposal.prf
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui/
networkconfig.ui.h 41 int auth, encr = 0; local
54 encr = 1;
56 encr = 0;
58 encr = 1;
60 encr = 0;
64 encrSelect->setCurrentItem(encr);
166 int encr = encrSelect->currentItem(); local
167 if (encr == 0)
345 int auth = AUTH_NONE, encr = 0; local
356 encr = 1
    [all...]
wpagui.ui.h 353 QString encr; local
356 encr.append(pairwise_cipher);
357 encr.append(" + ");
358 encr.append(group_cipher);
360 encr.append(pairwise_cipher);
362 encr.append(group_cipher);
363 encr.append(" [group key only]");
365 textEncryption->setText(encr);
  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 74 int auth, encr = 0; local
87 encr = 1;
89 encr = 0;
91 encr = 1;
93 encr = 0;
97 encrSelect->setCurrentIndex(encr);
99 wepEnabled(auth == AUTH_NONE && encr == 1);
265 int encr = encrSelect->currentIndex(); local
266 if (encr == 0)
520 int auth = AUTH_NONE, encr = 0 local
    [all...]
wpagui.cpp 548 QString encr; local
551 encr.append(pairwise_cipher);
552 encr.append(" + ");
553 encr.append(group_cipher);
555 encr.append(pairwise_cipher);
557 encr.append(group_cipher);
558 encr.append(" [group key only]");
560 textEncryption->setText(encr);
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 504 struct eap_sim_attrs *attr, int aka, int encr)
571 if (!encr) {
576 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
579 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
583 "(encr) padding bytes",
679 if (!encr) {
685 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
691 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
695 if (!encr) {
701 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid
980 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.h 24 int encr; member in struct:ikev2_proposal_data
ikev2.c 44 const struct ikev2_encr_alg *encr; local
53 encr = ikev2_get_encr(data->proposal.encr);
54 if (integ == NULL || prf == NULL || encr == NULL) {
132 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
211 prop->encr = transform_id;
351 prop.encr = -1;
358 prop.encr != -1 && prop.dh != -1) {
377 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d "
379 data->proposal.encr, data->proposal.prf
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui/
networkconfig.ui.h 41 int auth, encr = 0; local
54 encr = 1;
56 encr = 0;
58 encr = 1;
60 encr = 0;
64 encrSelect->setCurrentItem(encr);
166 int encr = encrSelect->currentItem(); local
167 if (encr == 0)
345 int auth = AUTH_NONE, encr = 0; local
356 encr = 1
    [all...]
wpagui.ui.h 353 QString encr; local
356 encr.append(pairwise_cipher);
357 encr.append(" + ");
358 encr.append(group_cipher);
360 encr.append(pairwise_cipher);
362 encr.append(group_cipher);
363 encr.append(" [group key only]");
365 textEncryption->setText(encr);
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 77 int auth, encr = 0; local
90 encr = 1;
92 encr = 0;
94 encr = 1;
98 encr = 0;
102 encrSelect->setCurrentIndex(encr);
284 int encr = encrSelect->currentIndex(); local
285 if (encr == 0)
539 int auth = AUTH_NONE_OPEN, encr = 0; local
550 encr = 1
    [all...]
  /external/wpa_supplicant_8/hostapd/
ctrl_iface.c 504 char *ssid, *auth, *encr = NULL, *key = NULL; local
516 encr = pos;
524 return hostapd_wps_config_ap(hapd, ssid, auth, encr, key);
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_ralink.c 1374 NDIS_802_11_WEP_STATUS encr; local
    [all...]

Completed in 1934 milliseconds

1 2