/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | tls_gnutls.c | 67 uint8 suite[2]; member in struct:__anon15212
|
H A D | tls_openssl.c | 2314 const char *suite; local 2318 suite = "RC4-SHA"; 2321 suite = "AES128-SHA"; 2324 suite = "DHE-RSA-AES128-SHA"; 2327 suite = "ADH-AES128-SHA"; 2334 ret = os_snprintf(pos, end - pos, ":%s", suite); 2346 "Cipher suite configuration failed");
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
H A D | driver_atmel.c | 349 /* Atmel driver uses specific values for each cipher suite */ 350 static int convertSuiteToDriver(wpa_cipher suite) 354 switch(suite) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 130 "cipher suite 0x%04x", cipher_suite); 138 "cipher suite for a resumed connection (0x%04x != " 482 const struct tls_cipher_suite *suite; local 536 "with the selected cipher suite"); 543 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 544 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) {
|
H A D | tlsv1_client_write.c | 384 const struct tls_cipher_suite *suite; local 386 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 387 if (suite == NULL) 390 keyx = suite->key_exchange;
|
H A D | tlsv1_common.c | 87 * tls_get_cipher_suite - Get TLS cipher suite 88 * @suite: Cipher suite identifier 91 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) argument 95 if (tls_cipher_suites[i].suite == suite) 113 const struct tls_cipher_suite *suite; local 116 suite = tls_get_cipher_suite(cipher); 117 if (suite == NULL) 120 switch (suite [all...] |
H A D | tlsv1_common.h | 176 u16 suite; member in struct:tls_cipher_suite 207 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite);
|
H A D | tlsv1_record.c | 25 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite 27 * @cipher_suite: New cipher suite 30 * This function is used to prepare TLS record layer for cipher suite change. 38 const struct tls_cipher_suite *suite; local 41 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 45 suite = tls_get_cipher_suite(cipher_suite); 46 if (suite == NULL) 49 if (suite->hash == TLS_HASH_MD5) { 52 } else if (suite->hash == TLS_HASH_SHA) { 57 data = tls_get_cipher_data(suite [all...] |
H A D | tlsv1_server_read.c | 142 wpa_printf(MSG_INFO, "TLSv1: No supported cipher suite " 681 const struct tls_cipher_suite *suite; local 730 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 731 if (suite == NULL) 734 keyx = suite->key_exchange;
|
H A D | tlsv1_server_write.c | 165 const struct tls_cipher_suite *suite; local 167 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 168 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) { 249 const struct tls_cipher_suite *suite; local 257 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 258 if (suite == NULL) 261 keyx = suite->key_exchange;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.c | 32 u32 suite; local 40 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, conf->wpa_group); 41 if (suite == 0) { 46 RSN_SELECTOR_PUT(pos, suite); 98 u32 suite; local 105 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group); 106 if (suite == 0) { 111 RSN_SELECTOR_PUT(pos, suite);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_gnutls.c | 45 uint8 suite[2]; member in struct:__anon15435
|
H A D | tls_openssl.c | 2611 const char *suite; local 2615 suite = "RC4-SHA"; 2618 suite = "AES128-SHA"; 2621 suite = "DHE-RSA-AES128-SHA"; 2624 suite = "ADH-AES128-SHA"; 2631 ret = os_snprintf(pos, end - pos, ":%s", suite); 2643 "Cipher suite configuration failed");
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ie.c | 44 u32 suite; local 56 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, group_cipher); 57 if (suite == 0) { 62 RSN_SELECTOR_PUT(pos, suite); 67 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, pairwise_cipher); 68 if (suite == 0 || 75 RSN_SELECTOR_PUT(pos, suite); 112 u32 suite; local 127 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, group_cipher); 128 if (suite [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_read.c | 131 "cipher suite 0x%04x", cipher_suite); 139 "cipher suite for a resumed connection (0x%04x != " 484 const struct tls_cipher_suite *suite; local 538 "with the selected cipher suite"); 545 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 546 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) {
|
H A D | tlsv1_client_write.c | 377 const struct tls_cipher_suite *suite; local 379 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 380 if (suite == NULL) 383 keyx = suite->key_exchange;
|
H A D | tlsv1_common.c | 91 * tls_get_cipher_suite - Get TLS cipher suite 92 * @suite: Cipher suite identifier 95 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) argument 99 if (tls_cipher_suites[i].suite == suite) 117 const struct tls_cipher_suite *suite; local 120 suite = tls_get_cipher_suite(cipher); 121 if (suite == NULL) 124 switch (suite [all...] |
H A D | tlsv1_common.h | 214 u16 suite; member in struct:tls_cipher_suite 248 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite);
|
H A D | tlsv1_record.c | 20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite 22 * @cipher_suite: New cipher suite 25 * This function is used to prepare TLS record layer for cipher suite change. 33 const struct tls_cipher_suite *suite; local 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 40 suite = tls_get_cipher_suite(cipher_suite); 41 if (suite == NULL) 44 if (suite->hash == TLS_HASH_MD5) { 47 } else if (suite->hash == TLS_HASH_SHA) { 50 } else if (suite [all...] |
H A D | tlsv1_server_read.c | 152 wpa_printf(MSG_INFO, "TLSv1: No supported cipher suite " 695 const struct tls_cipher_suite *suite; local 744 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 745 if (suite == NULL) 748 keyx = suite->key_exchange;
|
H A D | tlsv1_server_write.c | 162 const struct tls_cipher_suite *suite; local 164 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 165 if (suite && suite->key_exchange == TLS_KEY_X_DH_anon) { 247 const struct tls_cipher_suite *suite; local 253 suite = tls_get_cipher_suite(conn->rl.cipher_suite); 254 if (suite == NULL) 257 keyx = suite->key_exchange;
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.c | 32 u32 suite; local 40 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, conf->wpa_group); 41 if (suite == 0) { 46 RSN_SELECTOR_PUT(pos, suite); 98 u32 suite; local 105 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group); 106 if (suite == 0) { 111 RSN_SELECTOR_PUT(pos, suite);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_gnutls.c | 45 uint8 suite[2]; member in struct:__anon15659
|
H A D | tls_openssl.c | 2611 const char *suite; local 2615 suite = "RC4-SHA"; 2618 suite = "AES128-SHA"; 2621 suite = "DHE-RSA-AES128-SHA"; 2624 suite = "ADH-AES128-SHA"; 2631 ret = os_snprintf(pos, end - pos, ":%s", suite); 2643 "Cipher suite configuration failed");
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ie.c | 44 u32 suite; local 56 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, group_cipher); 57 if (suite == 0) { 62 RSN_SELECTOR_PUT(pos, suite); 67 suite = wpa_cipher_to_suite(WPA_PROTO_WPA, pairwise_cipher); 68 if (suite == 0 || 75 RSN_SELECTOR_PUT(pos, suite); 112 u32 suite; local 127 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, group_cipher); 128 if (suite [all...] |