/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.h | 64 u8 encr; member in struct:eap_eke_session 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
|
H A D | eap_eke_common.c | 42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr) argument 49 if (encr != EAP_EKE_ENCR_AES128_CBC) 387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) 414 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) 470 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) 620 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) 675 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) 731 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, argument 735 sess->encr = encr; [all...] |
H A D | eap_sim_common.c | 498 struct eap_sim_attrs *attr, int aka, int encr) 565 if (!encr) { 570 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING"); 573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " 577 "(encr) padding bytes", 673 if (!encr) { 679 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid " 685 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d", 689 if (!encr) { 695 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invali 497 eap_sim_parse_attr(const u8 *start, const u8 *end, struct eap_sim_attrs *attr, int aka, int encr) argument 974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.h | 64 u8 encr; member in struct:eap_eke_session 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
|
H A D | eap_eke_common.c | 42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr) argument 49 if (encr != EAP_EKE_ENCR_AES128_CBC) 387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) 414 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) 470 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) 620 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) 675 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) 731 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, argument 735 sess->encr = encr; [all...] |
H A D | eap_sim_common.c | 498 struct eap_sim_attrs *attr, int aka, int encr) 565 if (!encr) { 570 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING"); 573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " 577 "(encr) padding bytes", 673 if (!encr) { 679 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid " 685 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d", 689 if (!encr) { 695 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invali 497 eap_sim_parse_attr(const u8 *start, const u8 *end, struct eap_sim_attrs *attr, int aka, int encr) argument 974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.h | 64 u8 encr; member in struct:eap_eke_session 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
|
H A D | eap_eke_common.c | 42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr) argument 49 if (encr != EAP_EKE_ENCR_AES128_CBC) 387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) 414 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) 470 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) 620 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) 675 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) 731 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, argument 735 sess->encr = encr; [all...] |
H A D | eap_sim_common.c | 498 struct eap_sim_attrs *attr, int aka, int encr) 565 if (!encr) { 570 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING"); 573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " 577 "(encr) padding bytes", 673 if (!encr) { 679 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid " 685 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d", 689 if (!encr) { 695 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invali 497 eap_sim_parse_attr(const u8 *start, const u8 *end, struct eap_sim_attrs *attr, int aka, int encr) argument 974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
H A D | networkconfig.cpp | 71 int auth, encr = 0; local 84 encr = 1; 86 encr = 0; 88 encr = 1; 92 encr = 0; 96 encrSelect->setCurrentIndex(encr); 278 int encr = encrSelect->currentIndex(); local 279 if (encr == 0) 533 int auth = AUTH_NONE_OPEN, encr = 0; local 544 encr [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.h | 18 int encr; member in struct:ikev2_proposal_data
|
H A D | ikev2.c | 38 const struct ikev2_encr_alg *encr; local 47 encr = ikev2_get_encr(data->proposal.encr); 48 if (integ == NULL || prf == NULL || encr == NULL) { 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 179 prop->encr = transform_id; 319 prop.encr = -1; 326 prop.encr != -1 && prop.dh != -1) { 347 data->proposal.encr, data->proposal.prf, 654 decrypted = ikev2_decrypt_payload(data->proposal.encr, [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.h | 18 int encr; member in struct:ikev2_proposal_data
|
H A D | ikev2.c | 42 const struct ikev2_encr_alg *encr; local 51 encr = ikev2_get_encr(data->proposal.encr); 52 if (integ == NULL || prf == NULL || encr == NULL) { 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 164 transform_id == data->proposal.encr) { 185 prop->encr = transform_id; 327 prop.encr = -1; 334 prop.encr != -1 && prop.dh != -1) { 356 data->proposal.encr, dat [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.h | 18 int encr; member in struct:ikev2_proposal_data
|
H A D | ikev2.c | 38 const struct ikev2_encr_alg *encr; local 47 encr = ikev2_get_encr(data->proposal.encr); 48 if (integ == NULL || prf == NULL || encr == NULL) { 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 179 prop->encr = transform_id; 319 prop.encr = -1; 326 prop.encr != -1 && prop.dh != -1) { 347 data->proposal.encr, data->proposal.prf, 654 decrypted = ikev2_decrypt_payload(data->proposal.encr, [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.h | 18 int encr; member in struct:ikev2_proposal_data
|
H A D | ikev2.c | 42 const struct ikev2_encr_alg *encr; local 51 encr = ikev2_get_encr(data->proposal.encr); 52 if (integ == NULL || prf == NULL || encr == NULL) { 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 164 transform_id == data->proposal.encr) { 185 prop->encr = transform_id; 327 prop.encr = -1; 334 prop.encr != -1 && prop.dh != -1) { 356 data->proposal.encr, dat [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.h | 18 int encr; member in struct:ikev2_proposal_data
|
H A D | ikev2.c | 38 const struct ikev2_encr_alg *encr; local 47 encr = ikev2_get_encr(data->proposal.encr); 48 if (integ == NULL || prf == NULL || encr == NULL) { 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 179 prop->encr = transform_id; 319 prop.encr = -1; 326 prop.encr != -1 && prop.dh != -1) { 347 data->proposal.encr, data->proposal.prf, 654 decrypted = ikev2_decrypt_payload(data->proposal.encr, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.h | 18 int encr; member in struct:ikev2_proposal_data
|
H A D | ikev2.c | 42 const struct ikev2_encr_alg *encr; local 51 encr = ikev2_get_encr(data->proposal.encr); 52 if (integ == NULL || prf == NULL || encr == NULL) { 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 164 transform_id == data->proposal.encr) { 185 prop->encr = transform_id; 327 prop.encr = -1; 334 prop.encr != -1 && prop.dh != -1) { 356 data->proposal.encr, dat [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wps_hostapd.h | 34 const char *auth, const char *encr, const char *key);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wps_hostapd.h | 34 const char *auth, const char *encr, const char *key);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wps_hostapd.h | 34 const char *auth, const char *encr, const char *key);
|