Searched refs:suite (Results 1 - 25 of 210) sorted by last modified time

123456789

/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dtls_gnutls.c67 uint8 suite[2]; member in struct:__anon15212
H A Dtls_openssl.c2314 const char *suite; local
2318 suite = "RC4-SHA";
2321 suite = "AES128-SHA";
2324 suite = "DHE-RSA-AES128-SHA";
2327 suite = "ADH-AES128-SHA";
2334 ret = os_snprintf(pos, end - pos, ":%s", suite);
2346 "Cipher suite configuration failed");
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/
H A Ddriver_atmel.c349 /* Atmel driver uses specific values for each cipher suite */
350 static int convertSuiteToDriver(wpa_cipher suite)
354 switch(suite) {
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
H A Dtlsv1_client_read.c130 "cipher suite 0x%04x", cipher_suite);
138 "cipher suite for a resumed connection (0x%04x != "
482 const struct tls_cipher_suite *suite; local
536 "with the selected cipher suite");
543 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
544 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) {
H A Dtlsv1_client_write.c384 const struct tls_cipher_suite *suite; local
386 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
387 if (suite == NULL)
390 keyx = suite->key_exchange;
H A Dtlsv1_common.c87 * tls_get_cipher_suite - Get TLS cipher suite
88 * @suite: Cipher suite identifier
91 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) argument
95 if (tls_cipher_suites[i].suite == suite)
113 const struct tls_cipher_suite *suite; local
116 suite = tls_get_cipher_suite(cipher);
117 if (suite == NULL)
120 switch (suite
[all...]
H A Dtlsv1_common.h176 u16 suite; member in struct:tls_cipher_suite
207 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite);
H A Dtlsv1_record.c25 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite
27 * @cipher_suite: New cipher suite
30 * This function is used to prepare TLS record layer for cipher suite change.
38 const struct tls_cipher_suite *suite; local
41 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
45 suite = tls_get_cipher_suite(cipher_suite);
46 if (suite == NULL)
49 if (suite->hash == TLS_HASH_MD5) {
52 } else if (suite->hash == TLS_HASH_SHA) {
57 data = tls_get_cipher_data(suite
[all...]
H A Dtlsv1_server_read.c142 wpa_printf(MSG_INFO, "TLSv1: No supported cipher suite "
681 const struct tls_cipher_suite *suite; local
730 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
731 if (suite == NULL)
734 keyx = suite->key_exchange;
H A Dtlsv1_server_write.c165 const struct tls_cipher_suite *suite; local
167 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
168 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) {
249 const struct tls_cipher_suite *suite; local
257 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
258 if (suite == NULL)
261 keyx = suite->key_exchange;
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth_ie.c32 u32 suite; local
40 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, conf->wpa_group);
41 if (suite == 0) {
46 RSN_SELECTOR_PUT(pos, suite);
98 u32 suite; local
105 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group);
106 if (suite == 0) {
111 RSN_SELECTOR_PUT(pos, suite);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_gnutls.c45 uint8 suite[2]; member in struct:__anon15435
H A Dtls_openssl.c2611 const char *suite; local
2615 suite = "RC4-SHA";
2618 suite = "AES128-SHA";
2621 suite = "DHE-RSA-AES128-SHA";
2624 suite = "ADH-AES128-SHA";
2631 ret = os_snprintf(pos, end - pos, ":%s", suite);
2643 "Cipher suite configuration failed");
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa_ie.c44 u32 suite; local
56 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, group_cipher);
57 if (suite == 0) {
62 RSN_SELECTOR_PUT(pos, suite);
67 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, pairwise_cipher);
68 if (suite == 0 ||
75 RSN_SELECTOR_PUT(pos, suite);
112 u32 suite; local
127 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, group_cipher);
128 if (suite
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client_read.c131 "cipher suite 0x%04x", cipher_suite);
139 "cipher suite for a resumed connection (0x%04x != "
484 const struct tls_cipher_suite *suite; local
538 "with the selected cipher suite");
545 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
546 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) {
H A Dtlsv1_client_write.c377 const struct tls_cipher_suite *suite; local
379 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
380 if (suite == NULL)
383 keyx = suite->key_exchange;
H A Dtlsv1_common.c91 * tls_get_cipher_suite - Get TLS cipher suite
92 * @suite: Cipher suite identifier
95 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) argument
99 if (tls_cipher_suites[i].suite == suite)
117 const struct tls_cipher_suite *suite; local
120 suite = tls_get_cipher_suite(cipher);
121 if (suite == NULL)
124 switch (suite
[all...]
H A Dtlsv1_common.h214 u16 suite; member in struct:tls_cipher_suite
248 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite);
H A Dtlsv1_record.c20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite
22 * @cipher_suite: New cipher suite
25 * This function is used to prepare TLS record layer for cipher suite change.
33 const struct tls_cipher_suite *suite; local
36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
40 suite = tls_get_cipher_suite(cipher_suite);
41 if (suite == NULL)
44 if (suite->hash == TLS_HASH_MD5) {
47 } else if (suite->hash == TLS_HASH_SHA) {
50 } else if (suite
[all...]
H A Dtlsv1_server_read.c152 wpa_printf(MSG_INFO, "TLSv1: No supported cipher suite "
695 const struct tls_cipher_suite *suite; local
744 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
745 if (suite == NULL)
748 keyx = suite->key_exchange;
H A Dtlsv1_server_write.c162 const struct tls_cipher_suite *suite; local
164 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
165 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) {
247 const struct tls_cipher_suite *suite; local
253 suite = tls_get_cipher_suite(conn->rl.cipher_suite);
254 if (suite == NULL)
257 keyx = suite->key_exchange;
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth_ie.c32 u32 suite; local
40 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, conf->wpa_group);
41 if (suite == 0) {
46 RSN_SELECTOR_PUT(pos, suite);
98 u32 suite; local
105 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group);
106 if (suite == 0) {
111 RSN_SELECTOR_PUT(pos, suite);
/external/wpa_supplicant_8/src/crypto/
H A Dtls_gnutls.c45 uint8 suite[2]; member in struct:__anon15659
H A Dtls_openssl.c2611 const char *suite; local
2615 suite = "RC4-SHA";
2618 suite = "AES128-SHA";
2621 suite = "DHE-RSA-AES128-SHA";
2624 suite = "ADH-AES128-SHA";
2631 ret = os_snprintf(pos, end - pos, ":%s", suite);
2643 "Cipher suite configuration failed");
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa_ie.c44 u32 suite; local
56 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, group_cipher);
57 if (suite == 0) {
62 RSN_SELECTOR_PUT(pos, suite);
67 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, pairwise_cipher);
68 if (suite == 0 ||
75 RSN_SELECTOR_PUT(pos, suite);
112 u32 suite; local
127 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, group_cipher);
128 if (suite
[all...]

Completed in 399 milliseconds

123456789