HomeSort by relevance Sort by last modified time
    Searched refs:encr (Results 1 - 25 of 27) sorted by null

1 2

  /external/wpa_supplicant_8/src/eap_common/
eap_eke_common.h 64 u8 encr; member in struct:eap_eke_session
81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
eap_eke_common.c 42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr)
49 if (encr != EAP_EKE_ENCR_AES128_CBC)
382 * DHComponent = Encr(key, y)
387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC)
391 wpa_hexdump(MSG_DEBUG, "EAP-EKE: IV for Encr(key, y)",
398 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DHComponent = Encr(key, y)",
414 if (sess->encr != EAP_EKE_ENCR_AES128_CBC)
470 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
620 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
675 if (sess->encr == EAP_EKE_ENCR_AES128_CBC
    [all...]
eap_sim_common.c 498 struct eap_sim_attrs *attr, int aka, int encr)
565 if (!encr) {
570 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
577 "(encr) padding bytes",
673 if (!encr) {
679 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
685 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
689 if (!encr) {
695 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid
974 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg
    [all...]
eap_sim_common.h 205 struct eap_sim_attrs *attr, int aka, int encr);
ikev2_common.h 330 const struct ikev2_encr_alg *encr,
ikev2_common.c 190 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
225 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
542 /* Encr - RFC 4306, Sect. 3.14 */
628 const struct ikev2_encr_alg *encr,
642 keys->SK_encr_len = encr->key_len;
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 71 int auth, encr = 0; local
84 encr = 1;
86 encr = 0;
88 encr = 1;
92 encr = 0;
96 encrSelect->setCurrentIndex(encr);
278 int encr = encrSelect->currentIndex(); local
279 if (encr == 0)
533 int auth = AUTH_NONE_OPEN, encr = 0; local
544 encr = 1
    [all...]
wpagui.cpp 568 QString encr; local
571 encr.append(pairwise_cipher);
572 encr.append(" + ");
573 encr.append(group_cipher);
575 encr.append(pairwise_cipher);
577 encr.append(group_cipher);
578 encr.append(" [group key only]");
580 textEncryption->setText(encr);
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.h 18 int encr; member in struct:ikev2_proposal_data
ikev2.c 38 const struct ikev2_encr_alg *encr; local
47 encr = ikev2_get_encr(data->proposal.encr);
48 if (integ == NULL || prf == NULL || encr == NULL) {
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
179 prop->encr = transform_id;
319 prop.encr = -1;
326 prop.encr != -1 && prop.dh != -1) {
345 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d "
347 data->proposal.encr, data->proposal.prf
    [all...]
eap_eke.c 32 u8 encr; /* forced encryption algorithm or 0 to allow all supported */ member in struct:eap_eke_data
108 pos = os_strstr(phase1, "encr=");
110 data->encr = atoi(pos + 5);
111 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced encr %u",
112 data->encr);
176 static int eap_eke_supp_encr(u8 encr)
178 return encr == EAP_EKE_ENCR_AES128_CBC;
263 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u",
271 if ((data->encr && data->encr != *tmp) |
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
ikev2.h 18 int encr; member in struct:ikev2_proposal_data
ikev2.c 42 const struct ikev2_encr_alg *encr; local
51 encr = ikev2_get_encr(data->proposal.encr);
52 if (integ == NULL || prf == NULL || encr == NULL) {
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
164 transform_id == data->proposal.encr) {
185 prop->encr = transform_id;
327 prop.encr = -1;
334 prop.encr != -1 && prop.dh != -1) {
354 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d
    [all...]
eap_server_fast.c 816 struct wpabuf *encr; local
820 encr = eap_server_tls_encrypt(sm, &data->ssl, plain);
827 (int) wpabuf_len(encr),
830 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) {
833 wpabuf_free(encr);
836 wpabuf_put_buf(data->ssl.tls_out, encr);
837 wpabuf_free(encr);
841 data->ssl.tls_out = encr;
    [all...]
eap_server_ikev2.c 103 data->ikev2.proposal.encr = ENCR_AES_CBC;
  /external/wpa_supplicant_8/src/ap/
wps_hostapd.h 34 const char *auth, const char *encr, const char *key);
wpa_auth.c 1989 int wpa_ie_len, secure, keyidx, encr = 0; local
    [all...]
wpa_auth_i.h 218 int keyidx, int encr, int force_version);
wps_hostapd.c     [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_ndis.c 615 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr)
617 u32 encr_status = encr;
621 "OID_802_11_ENCRYPTION_STATUS (%d)", encr);
630 u32 encr; local
633 (char *) &encr, sizeof(encr));
634 if (res != sizeof(encr)) {
639 return encr;
1053 u32 auth_mode, encr, priv_mode, mode; local
1142 encr = Ndis802_11Encryption3Enabled
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wps_supplicant.h 24 const char *encr; member in struct:wps_new_ap_settings
wps_supplicant.c     [all...]
  /external/wpa_supplicant_8/src/wps/
wps_common.c 152 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr,
162 if (encr == NULL || encr_len < 2 * block_size || encr_len % block_size)
172 wpa_hexdump(MSG_MSGDUMP, "WPS: Encrypted Settings", encr, encr_len);
173 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
174 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
wps_i.h 137 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr,
  /external/wpa_supplicant_8/hostapd/
ctrl_iface.c 528 char *ssid, *auth, *encr = NULL, *key = NULL; local
540 encr = pos;
548 return hostapd_wps_config_ap(hapd, ssid, auth, encr, key);
    [all...]

Completed in 308 milliseconds

1 2