/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.h | 18 int encr; member in struct:ikev2_proposal_data
|
ikev2.c | 38 const struct ikev2_encr_alg *encr; local 47 encr = ikev2_get_encr(data->proposal.encr); 48 if (integ == NULL || prf == NULL || encr == NULL) { 126 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 205 prop->encr = transform_id; 345 prop.encr = -1; 352 prop.encr != -1 && prop.dh != -1) { 371 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d " 373 data->proposal.encr, data->proposal.prf [all...] |
eap_eke.c | 138 static int eap_eke_supp_encr(u8 encr) 140 return encr == EAP_EKE_ENCR_AES128_CBC; 225 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u", 409 /* DHComponent_P = Encr(key, y_p) */
|
eap_aka.c | 275 "EAP-AKA: (encr) AT_NEXT_PSEUDONYM", 291 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for " 310 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for " 319 "EAP-AKA: (encr) AT_NEXT_REAUTH_ID", 1096 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No%s%s in reauth packet", 1106 wpa_printf(MSG_INFO, "EAP-AKA: (encr) Invalid counter " 1129 wpa_hexdump(MSG_DEBUG, "EAP-AKA: (encr) AT_NONCE_S", [all...] |
eap_sim.c | 305 "EAP-SIM: (encr) AT_NEXT_PSEUDONYM", 321 wpa_printf(MSG_INFO, "EAP-SIM: (encr) No memory for " 340 wpa_printf(MSG_INFO, "EAP-SIM: (encr) No memory for " 349 "EAP-SIM: (encr) AT_NEXT_REAUTH_ID", 858 wpa_printf(MSG_INFO, "EAP-SIM: (encr) No%s%s in reauth packet", 867 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid counter " 886 wpa_hexdump(MSG_DEBUG, "EAP-SIM: (encr) AT_NONCE_S",
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 498 struct eap_sim_attrs *attr, int aka, int encr) 565 if (!encr) { 570 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING"); 573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " 577 "(encr) padding bytes", 673 if (!encr) { 679 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid " 685 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d", 689 if (!encr) { 695 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid 974 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg [all...] |
eap_eke_common.h | 64 u8 encr; member in struct:eap_eke_session 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
|
eap_eke_common.c | 42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr) 49 if (encr != EAP_EKE_ENCR_AES128_CBC) 382 * DHComponent = Encr(key, y) 387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) 391 wpa_hexdump(MSG_DEBUG, "EAP-EKE: IV for Encr(key, y)", 398 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DHComponent = Encr(key, y)", 414 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) 470 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) 620 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) 675 if (sess->encr == EAP_EKE_ENCR_AES128_CBC [all...] |
ikev2_common.c | 203 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length"); 224 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 261 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length"); 287 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 607 /* Encr - RFC 4306, Sect. 3.14 */ 693 const struct ikev2_encr_alg *encr, 707 keys->SK_encr_len = encr->key_len;
|
eap_sim_common.h | 205 struct eap_sim_attrs *attr, int aka, int encr);
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 71 int auth, encr = 0; local 84 encr = 1; 86 encr = 0; 88 encr = 1; 92 encr = 0; 96 encrSelect->setCurrentIndex(encr); 278 int encr = encrSelect->currentIndex(); local 279 if (encr == 0) 533 int auth = AUTH_NONE_OPEN, encr = 0; local 544 encr = 1 [all...] |
wpagui.cpp | 568 QString encr; local 571 encr.append(pairwise_cipher); 572 encr.append(" + "); 573 encr.append(group_cipher); 575 encr.append(pairwise_cipher); 577 encr.append(group_cipher); 578 encr.append(" [group key only]"); 580 textEncryption->setText(encr); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.h | 18 int encr; member in struct:ikev2_proposal_data
|
ikev2.c | 42 const struct ikev2_encr_alg *encr; local 51 encr = ikev2_get_encr(data->proposal.encr); 52 if (integ == NULL || prf == NULL || encr == NULL) { 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 164 transform_id == data->proposal.encr) { 185 prop->encr = transform_id; 327 prop.encr = -1; 334 prop.encr != -1 && prop.dh != -1) { 354 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d [all...] |
eap_server_fast.c | 815 struct wpabuf *encr; local 819 encr = eap_server_tls_encrypt(sm, &data->ssl, plain); 826 (int) wpabuf_len(encr), 829 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) { 832 wpabuf_free(encr); 835 wpabuf_put_buf(data->ssl.tls_out, encr); 836 wpabuf_free(encr); 840 data->ssl.tls_out = encr; [all...] |
/external/wpa_supplicant_8/src/ap/ |
wps_hostapd.h | 33 const char *auth, const char *encr, const char *key);
|
wpa_auth_i.h | 200 int keyidx, int encr, int force_version);
|
wps_hostapd.c | [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_common.c | 149 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr, 159 if (encr == NULL || encr_len < 2 * block_size || encr_len % block_size) 169 wpa_hexdump(MSG_MSGDUMP, "WPS: Encrypted Settings", encr, encr_len); 170 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 171 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
|
wps_i.h | 134 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr,
|
/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 162 * @opc: OPc = 128-bit operator variant algorithm configuration field (encr.) 201 * @opc: OPc = 128-bit operator variant algorithm configuration field (encr.) 228 * @opc: OPc = 128-bit operator variant algorithm configuration field (encr.) 258 * @opc: OPc = 128-bit operator variant algorithm configuration field (encr.)
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wps_supplicant.h | 24 const char *encr; member in struct:wps_new_ap_settings
|
README-WPS | 175 wpa_cli wps_reg <AP BSSID> <AP PIN> <new SSID> <auth> <encr> <new key> 181 <encr> must be one of the following: NONE WEP TKIP CCMP 271 wps_er_config <UUID|BSSID> <AP PIN> <new SSID> <auth> <encr> <new key> 277 <encr> must be one of the following: NONE WEP TKIP CCMP
|
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis.c | 615 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr) 617 u32 encr_status = encr; 621 "OID_802_11_ENCRYPTION_STATUS (%d)", encr); 630 u32 encr; local 633 (char *) &encr, sizeof(encr)); 634 if (res != sizeof(encr)) { 639 return encr; 1053 u32 auth_mode, encr, priv_mode, mode; local 1142 encr = Ndis802_11Encryption3Enabled [all...] |
/external/chromium_org/chrome/browser/sync/glue/ |
generic_change_processor.cc | 463 LOG(ERROR) << "Update: encr case 1."; 473 LOG(ERROR) << "Update: encr case 2."; 483 LOG(ERROR) << "Update: encr case 3."; 493 LOG(ERROR) << "Update: encr case 4.";
|