HomeSort by relevance Sort by last modified time
    Searched refs:encr (Results 1 - 25 of 43) sorted by null

1 2

  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui/
networkconfig.ui.h 41 int auth, encr = 0; local
54 encr = 1;
56 encr = 0;
58 encr = 1;
60 encr = 0;
64 encrSelect->setCurrentItem(encr);
166 int encr = encrSelect->currentItem(); local
167 if (encr == 0)
345 int auth = AUTH_NONE, encr = 0; local
356 encr = 1
    [all...]
wpagui.ui.h 353 QString encr; local
356 encr.append(pairwise_cipher);
357 encr.append(" + ");
358 encr.append(group_cipher);
360 encr.append(pairwise_cipher);
362 encr.append(group_cipher);
363 encr.append(" [group key only]");
365 textEncryption->setText(encr);
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_common.c 151 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr,
161 if (encr == NULL || encr_len < 2 * block_size || encr_len % block_size)
171 wpa_hexdump(MSG_MSGDUMP, "WPS: Encrypted Settings", encr, encr_len);
172 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
173 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 74 int auth, encr = 0; local
87 encr = 1;
89 encr = 0;
91 encr = 1;
93 encr = 0;
97 encrSelect->setCurrentIndex(encr);
99 wepEnabled(auth == AUTH_NONE && encr == 1);
265 int encr = encrSelect->currentIndex(); local
266 if (encr == 0)
520 int auth = AUTH_NONE, encr = 0 local
    [all...]
wpagui.cpp 548 QString encr; local
551 encr.append(pairwise_cipher);
552 encr.append(" + ");
553 encr.append(group_cipher);
555 encr.append(pairwise_cipher);
557 encr.append(group_cipher);
558 encr.append(" [group key only]");
560 textEncryption->setText(encr);
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 71 int auth, encr = 0; local
84 encr = 1;
86 encr = 0;
88 encr = 1;
92 encr = 0;
96 encrSelect->setCurrentIndex(encr);
278 int encr = encrSelect->currentIndex(); local
279 if (encr == 0)
533 int auth = AUTH_NONE_OPEN, encr = 0; local
544 encr = 1
    [all...]
wpagui.cpp 568 QString encr; local
571 encr.append(pairwise_cipher);
572 encr.append(" + ");
573 encr.append(group_cipher);
575 encr.append(pairwise_cipher);
577 encr.append(group_cipher);
578 encr.append(" [group key only]");
580 textEncryption->setText(encr);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
ikev2.h 24 int encr; member in struct:ikev2_proposal_data
ikev2.c 43 const struct ikev2_encr_alg *encr; local
52 encr = ikev2_get_encr(data->proposal.encr);
53 if (integ == NULL || prf == NULL || encr == NULL) {
131 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
210 prop->encr = transform_id;
350 prop.encr = -1;
357 prop.encr != -1 && prop.dh != -1) {
376 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d "
378 data->proposal.encr, data->proposal.prf
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
ikev2.h 24 int encr; member in struct:ikev2_proposal_data
ikev2.c 47 const struct ikev2_encr_alg *encr; local
56 encr = ikev2_get_encr(data->proposal.encr);
57 if (integ == NULL || prf == NULL || encr == NULL) {
118 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
169 transform_id == data->proposal.encr) {
190 prop->encr = transform_id;
332 prop.encr = -1;
339 prop.encr != -1 && prop.dh != -1) {
359 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d
    [all...]
eap_fast.c 815 struct wpabuf *encr; local
819 encr = eap_server_tls_encrypt(sm, &data->ssl, wpabuf_mhead(plain),
827 (int) wpabuf_len(encr),
830 if (wpabuf_resize(&data->ssl.out_buf, wpabuf_len(encr)) < 0) {
833 wpabuf_free(encr);
836 wpabuf_put_buf(data->ssl.out_buf, encr);
837 wpabuf_free(encr);
841 data->ssl.out_buf = encr;
    [all...]
  /external/wpa_supplicant_8/src/ap/
wps_hostapd.h 35 const char *auth, const char *encr, const char *key);
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.h 18 int encr; member in struct:ikev2_proposal_data
ikev2.c 38 const struct ikev2_encr_alg *encr; local
47 encr = ikev2_get_encr(data->proposal.encr);
48 if (integ == NULL || prf == NULL || encr == NULL) {
126 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
205 prop->encr = transform_id;
345 prop.encr = -1;
352 prop.encr != -1 && prop.dh != -1) {
371 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d "
373 data->proposal.encr, data->proposal.prf
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
ikev2.h 18 int encr; member in struct:ikev2_proposal_data
ikev2.c 42 const struct ikev2_encr_alg *encr; local
51 encr = ikev2_get_encr(data->proposal.encr);
52 if (integ == NULL || prf == NULL || encr == NULL) {
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
164 transform_id == data->proposal.encr) {
185 prop->encr = transform_id;
327 prop.encr = -1;
334 prop.encr != -1 && prop.dh != -1) {
354 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d
    [all...]
eap_server_fast.c 815 struct wpabuf *encr; local
819 encr = eap_server_tls_encrypt(sm, &data->ssl, plain);
826 (int) wpabuf_len(encr),
829 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) {
832 wpabuf_free(encr);
835 wpabuf_put_buf(data->ssl.tls_out, encr);
836 wpabuf_free(encr);
840 data->ssl.tls_out = encr;
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.c 503 struct eap_sim_attrs *attr, int aka, int encr)
570 if (!encr) {
575 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
578 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
582 "(encr) padding bytes",
678 if (!encr) {
684 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
690 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
694 if (!encr) {
700 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid
979 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 498 struct eap_sim_attrs *attr, int aka, int encr)
565 if (!encr) {
570 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
577 "(encr) padding bytes",
673 if (!encr) {
679 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
685 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
689 if (!encr) {
695 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid
974 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_ralink.c 1374 NDIS_802_11_WEP_STATUS encr; local
    [all...]
driver_ndis.c 580 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr)
582 u32 encr_status = encr;
586 "OID_802_11_ENCRYPTION_STATUS (%d)", encr);
595 u32 encr; local
598 (char *) &encr, sizeof(encr));
599 if (res != sizeof(encr)) {
604 return encr;
990 u32 auth_mode, encr, priv_mode, mode; local
1062 encr = Ndis802_11Encryption3Enabled
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wps_supplicant.h 25 const char *encr; member in struct:wps_new_ap_settings
  /external/wpa_supplicant_8/src/wps/
wps_common.c 149 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr,
159 if (encr == NULL || encr_len < 2 * block_size || encr_len % block_size)
169 wpa_hexdump(MSG_MSGDUMP, "WPS: Encrypted Settings", encr, encr_len);
170 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
171 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
  /external/wpa_supplicant_8/src/drivers/
driver_ndis.c 615 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr)
617 u32 encr_status = encr;
621 "OID_802_11_ENCRYPTION_STATUS (%d)", encr);
630 u32 encr; local
633 (char *) &encr, sizeof(encr));
634 if (res != sizeof(encr)) {
639 return encr;
1061 u32 auth_mode, encr, priv_mode, mode; local
1150 encr = Ndis802_11Encryption3Enabled
    [all...]

Completed in 741 milliseconds

1 2