HomeSort by: relevance | last modified time | path
    Searched defs:encr (Results 1 - 16 of 16) sorted by relevancy

  /src/external/bsd/wpa/dist/wpa_supplicant/
wps_supplicant.h 24 const char *encr; member in struct:wps_new_ap_settings
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_tls_common.c 393 struct wpabuf *plain, *encr; local
418 encr = eap_server_tls_encrypt(sm, data, plain);
420 if (!encr)
422 if (wpabuf_resize(&data->tls_out, wpabuf_len(encr)) < 0)
426 wpabuf_free(encr);
429 wpabuf_put_buf(data->tls_out, encr);
432 encr);
433 wpabuf_free(encr);
ikev2.h 18 int encr; member in struct:ikev2_proposal_data
ikev2.c 42 const struct ikev2_encr_alg *encr; local
51 encr = ikev2_get_encr(data->proposal.encr);
52 if (integ == NULL || prf == NULL || encr == NULL) {
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
164 transform_id == data->proposal.encr) {
185 prop->encr = transform_id;
327 prop.encr = -1;
334 prop.encr != -1 && prop.dh != -1) {
354 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d
    [all...]
eap_server_fast.c 811 struct wpabuf *encr; local
815 encr = eap_server_tls_encrypt(sm, &data->ssl, plain);
818 if (!encr)
825 (int) wpabuf_len(encr),
828 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) {
831 wpabuf_free(encr);
834 wpabuf_put_buf(data->ssl.tls_out, encr);
835 wpabuf_free(encr);
839 data->ssl.tls_out = encr;
eap_server_teap.c 859 struct wpabuf *encr; local
863 encr = eap_server_tls_encrypt(sm, &data->ssl, plain);
866 if (!encr)
872 (int) wpabuf_len(encr),
875 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) {
878 wpabuf_free(encr);
881 wpabuf_put_buf(data->ssl.tls_out, encr);
882 wpabuf_free(encr);
886 data->ssl.tls_out = encr;
  /src/external/bsd/wpa/dist/src/eap_common/
eap_eke_common.h 64 u8 encr; member in struct:eap_eke_session
81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
eap_sim_common.c 496 struct eap_sim_attrs *attr, int aka, int encr)
563 if (!encr) {
568 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
571 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
575 "(encr) padding bytes",
671 if (!encr) {
677 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
683 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
687 if (!encr) {
693 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid
976 size_t mac, iv, encr; \/* index from buf *\/ member in struct:eap_sim_msg
    [all...]
  /src/external/bsd/wpa/dist/src/eap_peer/
ikev2.h 18 int encr; member in struct:ikev2_proposal_data
eap_eke.c 32 u8 encr; /* forced encryption algorithm or 0 to allow all supported */ member in struct:eap_eke_data
107 pos = os_strstr(phase1, "encr=");
109 data->encr = atoi(pos + 5);
110 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced encr %u",
111 data->encr);
175 static int eap_eke_supp_encr(u8 encr)
177 return encr == EAP_EKE_ENCR_AES128_CBC;
262 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u",
270 if ((data->encr && data->encr != *tmp) |
    [all...]
ikev2.c 38 const struct ikev2_encr_alg *encr; local
47 encr = ikev2_get_encr(data->proposal.encr);
48 if (integ == NULL || prf == NULL || encr == NULL) {
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
179 prop->encr = transform_id;
321 prop.encr = -1;
328 prop.encr != -1 && prop.dh != -1) {
347 wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d "
349 data->proposal.encr, data->proposal.prf
    [all...]
  /src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 72 int auth, encr = 0; local
85 encr = 1;
87 encr = 0;
89 encr = 1;
93 encr = 0;
97 encrSelect->setCurrentIndex(encr);
279 int encr = encrSelect->currentIndex(); local
280 if (encr == 0)
534 int auth = AUTH_NONE_OPEN, encr = 0; local
545 encr = 1
    [all...]
wpagui.cpp 593 QString encr; local
596 encr.append(pairwise_cipher);
597 encr.append(" + ");
598 encr.append(group_cipher);
600 encr.append(pairwise_cipher);
602 encr.append(group_cipher);
603 encr.append(" [group key only]");
605 textEncryption->setText(encr);
  /src/external/bsd/wpa/dist/hostapd/
ctrl_iface.c 506 char *ssid, *auth, *encr = NULL, *key = NULL; local
518 encr = pos;
526 return hostapd_wps_config_ap(hapd, ssid, auth, encr, key);
  /src/external/bsd/wpa/dist/src/ap/
wpa_auth.c 1674 "WPA: Encr Key Data bit not set even though AEAD cipher is supposed to be used - drop frame");
1968 int keyidx, int encr, int force_version)
2000 "WPA: Send EAPOL(version=%d secure=%d mic=%d ack=%d install=%d pairwise=%d kde_len=%zu keyidx=%d encr=%d)",
2006 pairwise, kde_len, keyidx, encr);
2012 version == WPA_KEY_INFO_TYPE_AES_128_CMAC) && encr) {
2020 if (!mic_len && encr)
2036 if (encr && sm->wpa == WPA_VERSION_WPA2)
2067 if (kde && !encr) {
2094 } else if (encr && kde) {
2196 int keyidx, int encr)
4554 int secure, gtkidx, encr = 0; local
6876 int wpa_ie_len, secure, gtkidx, encr = 0; local
    [all...]
  /src/external/bsd/wpa/dist/src/drivers/
driver_ndis.c 616 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr)
618 u32 encr_status = encr;
622 "OID_802_11_ENCRYPTION_STATUS (%d)", encr);
631 u32 encr; local
634 (char *) &encr, sizeof(encr));
635 if (res != sizeof(encr)) {
640 return encr;
1053 u32 auth_mode, encr, priv_mode, mode; local
1142 encr = Ndis802_11Encryption3Enabled
    [all...]

Completed in 46 milliseconds