| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| wps_supplicant.h | 24 const char *encr; member in struct:wps_new_ap_settings
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_tls_common.c | 393 struct wpabuf *plain, *encr; local 418 encr = eap_server_tls_encrypt(sm, data, plain); 420 if (!encr) 422 if (wpabuf_resize(&data->tls_out, wpabuf_len(encr)) < 0) 426 wpabuf_free(encr); 429 wpabuf_put_buf(data->tls_out, encr); 432 encr); 433 wpabuf_free(encr);
|
| ikev2.h | 18 int encr; member in struct:ikev2_proposal_data
|
| ikev2.c | 42 const struct ikev2_encr_alg *encr; local 51 encr = ikev2_get_encr(data->proposal.encr); 52 if (integ == NULL || prf == NULL || encr == NULL) { 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 164 transform_id == data->proposal.encr) { 185 prop->encr = transform_id; 327 prop.encr = -1; 334 prop.encr != -1 && prop.dh != -1) { 354 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d [all...] |
| eap_server_fast.c | 811 struct wpabuf *encr; local 815 encr = eap_server_tls_encrypt(sm, &data->ssl, plain); 818 if (!encr) 825 (int) wpabuf_len(encr), 828 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) { 831 wpabuf_free(encr); 834 wpabuf_put_buf(data->ssl.tls_out, encr); 835 wpabuf_free(encr); 839 data->ssl.tls_out = encr;
|
| eap_server_teap.c | 859 struct wpabuf *encr; local 863 encr = eap_server_tls_encrypt(sm, &data->ssl, plain); 866 if (!encr) 872 (int) wpabuf_len(encr), 875 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) { 878 wpabuf_free(encr); 881 wpabuf_put_buf(data->ssl.tls_out, encr); 882 wpabuf_free(encr); 886 data->ssl.tls_out = encr;
|
| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_eke_common.h | 64 u8 encr; member in struct:eap_eke_session 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
|
| eap_sim_common.c | 496 struct eap_sim_attrs *attr, int aka, int encr) 563 if (!encr) { 568 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING"); 571 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " 575 "(encr) padding bytes", 671 if (!encr) { 677 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid " 683 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d", 687 if (!encr) { 693 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid 976 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| ikev2.h | 18 int encr; member in struct:ikev2_proposal_data
|
| eap_eke.c | 32 u8 encr; /* forced encryption algorithm or 0 to allow all supported */ member in struct:eap_eke_data 107 pos = os_strstr(phase1, "encr="); 109 data->encr = atoi(pos + 5); 110 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced encr %u", 111 data->encr); 175 static int eap_eke_supp_encr(u8 encr) 177 return encr == EAP_EKE_ENCR_AES128_CBC; 262 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u", 270 if ((data->encr && data->encr != *tmp) | [all...] |
| ikev2.c | 38 const struct ikev2_encr_alg *encr; local 47 encr = ikev2_get_encr(data->proposal.encr); 48 if (integ == NULL || prf == NULL || encr == NULL) { 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 179 prop->encr = transform_id; 321 prop.encr = -1; 328 prop.encr != -1 && prop.dh != -1) { 347 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d " 349 data->proposal.encr, data->proposal.prf [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/ |
| networkconfig.cpp | 72 int auth, encr = 0; local 85 encr = 1; 87 encr = 0; 89 encr = 1; 93 encr = 0; 97 encrSelect->setCurrentIndex(encr); 279 int encr = encrSelect->currentIndex(); local 280 if (encr == 0) 534 int auth = AUTH_NONE_OPEN, encr = 0; local 545 encr = 1 [all...] |
| wpagui.cpp | 593 QString encr; local 596 encr.append(pairwise_cipher); 597 encr.append(" + "); 598 encr.append(group_cipher); 600 encr.append(pairwise_cipher); 602 encr.append(group_cipher); 603 encr.append(" [group key only]"); 605 textEncryption->setText(encr);
|
| /src/external/bsd/wpa/dist/hostapd/ |
| ctrl_iface.c | 506 char *ssid, *auth, *encr = NULL, *key = NULL; local 518 encr = pos; 526 return hostapd_wps_config_ap(hapd, ssid, auth, encr, key);
|
| /src/external/bsd/wpa/dist/src/ap/ |
| wpa_auth.c | 1674 "WPA: Encr Key Data bit not set even though AEAD cipher is supposed to be used - drop frame"); 1968 int keyidx, int encr, int force_version) 2000 "WPA: Send EAPOL(version=%d secure=%d mic=%d ack=%d install=%d pairwise=%d kde_len=%zu keyidx=%d encr=%d)", 2006 pairwise, kde_len, keyidx, encr); 2012 version == WPA_KEY_INFO_TYPE_AES_128_CMAC) && encr) { 2020 if (!mic_len && encr) 2036 if (encr && sm->wpa == WPA_VERSION_WPA2) 2067 if (kde && !encr) { 2094 } else if (encr && kde) { 2196 int keyidx, int encr) 4554 int secure, gtkidx, encr = 0; local 6876 int wpa_ie_len, secure, gtkidx, encr = 0; local [all...] |
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver_ndis.c | 616 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr) 618 u32 encr_status = encr; 622 "OID_802_11_ENCRYPTION_STATUS (%d)", encr); 631 u32 encr; local 634 (char *) &encr, sizeof(encr)); 635 if (res != sizeof(encr)) { 640 return encr; 1053 u32 auth_mode, encr, priv_mode, mode; local 1142 encr = Ndis802_11Encryption3Enabled [all...] |