HomeSort by relevance Sort by last modified time
    Searched refs:encr (Results 1 - 25 of 28) sorted by null

1 2

  /device/google/contexthub/util/nanoapp_encr/
nanoapp_encr.c 64 struct AppSecEncrHdr encr; local
68 encr.keyID = keyId;
75 // if (encr.keyID <= 0xFFFF)
76 // encr.keyID = AES_KEY_ID(encr.keyID);
78 fprintf(stderr, "Using Key ID: %016" PRIX64 "\n", encr.keyID);
79 rand_bytes(encr.IV, sizeof(encr.IV));
80 printHash(stderr, "Using IV", encr.IV, AES_BLOCK_WORDS);
87 encr.dataLen = bufUsed
158 struct AppSecEncrHdr *encr; local
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_eke_common.h 64 u8 encr; member in struct:eap_eke_session
81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
eap_eke_common.c 42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr)
47 if (dhlen < 0 || encr != EAP_EKE_ENCR_AES128_CBC)
377 * DHComponent = Encr(key, y)
382 if (sess->encr != EAP_EKE_ENCR_AES128_CBC)
386 wpa_hexdump(MSG_DEBUG, "EAP-EKE: IV for Encr(key, y)",
393 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DHComponent = Encr(key, y)",
410 if (sess->encr != EAP_EKE_ENCR_AES128_CBC || !dh)
462 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
612 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
666 if (sess->encr == EAP_EKE_ENCR_AES128_CBC
    [all...]
eap_sim_common.c 496 struct eap_sim_attrs *attr, int aka, int encr)
563 if (!encr) {
568 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
571 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
575 "(encr) padding bytes",
671 if (!encr) {
677 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
683 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
687 if (!encr) {
693 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid
971 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg
    [all...]
eap_sim_common.h 205 struct eap_sim_attrs *attr, int aka, int encr);
ikev2_common.h 330 const struct ikev2_encr_alg *encr,
ikev2_common.c 189 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
224 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
545 /* Encr - RFC 4306, Sect. 3.14 */
631 const struct ikev2_encr_alg *encr,
645 keys->SK_encr_len = encr->key_len;
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 72 int auth, encr = 0; local
85 encr = 1;
87 encr = 0;
89 encr = 1;
93 encr = 0;
97 encrSelect->setCurrentIndex(encr);
279 int encr = encrSelect->currentIndex(); local
280 if (encr == 0)
534 int auth = AUTH_NONE_OPEN, encr = 0; local
545 encr = 1
    [all...]
wpagui.cpp 591 QString encr; local
594 encr.append(pairwise_cipher);
595 encr.append(" + ");
596 encr.append(group_cipher);
598 encr.append(pairwise_cipher);
600 encr.append(group_cipher);
601 encr.append(" [group key only]");
603 textEncryption->setText(encr);
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.h 18 int encr; member in struct:ikev2_proposal_data
ikev2.c 38 const struct ikev2_encr_alg *encr; local
47 encr = ikev2_get_encr(data->proposal.encr);
48 if (integ == NULL || prf == NULL || encr == NULL) {
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
179 prop->encr = transform_id;
319 prop.encr = -1;
326 prop.encr != -1 && prop.dh != -1) {
345 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d "
347 data->proposal.encr, data->proposal.prf
    [all...]
eap_eke.c 32 u8 encr; /* forced encryption algorithm or 0 to allow all supported */ member in struct:eap_eke_data
107 pos = os_strstr(phase1, "encr=");
109 data->encr = atoi(pos + 5);
110 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced encr %u",
111 data->encr);
175 static int eap_eke_supp_encr(u8 encr)
177 return encr == EAP_EKE_ENCR_AES128_CBC;
262 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u",
270 if ((data->encr && data->encr != *tmp) |
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
ikev2.h 18 int encr; member in struct:ikev2_proposal_data
ikev2.c 42 const struct ikev2_encr_alg *encr; local
51 encr = ikev2_get_encr(data->proposal.encr);
52 if (integ == NULL || prf == NULL || encr == NULL) {
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
164 transform_id == data->proposal.encr) {
185 prop->encr = transform_id;
327 prop.encr = -1;
334 prop.encr != -1 && prop.dh != -1) {
354 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d
    [all...]
eap_server_fast.c 820 struct wpabuf *encr; local
824 encr = eap_server_tls_encrypt(sm, &data->ssl, plain);
827 if (!encr)
834 (int) wpabuf_len(encr),
837 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) {
840 wpabuf_free(encr);
843 wpabuf_put_buf(data->ssl.tls_out, encr);
844 wpabuf_free(encr);
848 data->ssl.tls_out = encr;
    [all...]
eap_server_ikev2.c 103 data->ikev2.proposal.encr = ENCR_AES_CBC;
  /external/wpa_supplicant_8/src/ap/
wps_hostapd.h 34 const char *auth, const char *encr, const char *key);
wpa_auth_i.h 267 int keyidx, int encr, int force_version);
wpa_auth.c 1126 "WPA: Encr Key Data bit not set even though AEAD cipher is supposed to be used - drop frame");
2856 int wpa_ie_len, secure, keyidx, encr = 0; local
4564 int wpa_ie_len, secure, keyidx, encr = 0; local
    [all...]
wps_hostapd.c     [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_ndis.c 616 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr)
618 u32 encr_status = encr;
622 "OID_802_11_ENCRYPTION_STATUS (%d)", encr);
631 u32 encr; local
634 (char *) &encr, sizeof(encr));
635 if (res != sizeof(encr)) {
640 return encr;
1041 u32 auth_mode, encr, priv_mode, mode; local
1130 encr = Ndis802_11Encryption3Enabled
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wps_supplicant.h 24 const char *encr; member in struct:wps_new_ap_settings
wps_supplicant.c     [all...]
  /external/wpa_supplicant_8/src/wps/
wps_common.c 155 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr,
165 if (encr == NULL || encr_len < 2 * block_size || encr_len % block_size)
175 wpa_hexdump(MSG_MSGDUMP, "WPS: Encrypted Settings", encr, encr_len);
176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
wps_i.h 137 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr,

Completed in 626 milliseconds

1 2