Searched refs:encr (Results 1 - 25 of 69) sorted by relevance

123

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.h64 u8 encr; member in struct:eap_eke_session
81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
H A Deap_eke_common.c42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr) argument
49 if (encr != EAP_EKE_ENCR_AES128_CBC)
387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC)
414 if (sess->encr != EAP_EKE_ENCR_AES128_CBC)
470 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
620 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
675 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
731 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, argument
735 sess->encr = encr;
[all...]
H A Deap_sim_common.c498 struct eap_sim_attrs *attr, int aka, int encr)
565 if (!encr) {
570 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
577 "(encr) padding bytes",
673 if (!encr) {
679 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
685 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
689 if (!encr) {
695 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invali
497 eap_sim_parse_attr(const u8 *start, const u8 *end, struct eap_sim_attrs *attr, int aka, int encr) argument
974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_eke_common.h64 u8 encr; member in struct:eap_eke_session
81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
H A Deap_eke_common.c42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr) argument
49 if (encr != EAP_EKE_ENCR_AES128_CBC)
387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC)
414 if (sess->encr != EAP_EKE_ENCR_AES128_CBC)
470 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
620 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
675 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
731 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, argument
735 sess->encr = encr;
[all...]
H A Deap_sim_common.c498 struct eap_sim_attrs *attr, int aka, int encr)
565 if (!encr) {
570 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
577 "(encr) padding bytes",
673 if (!encr) {
679 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
685 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
689 if (!encr) {
695 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invali
497 eap_sim_parse_attr(const u8 *start, const u8 *end, struct eap_sim_attrs *attr, int aka, int encr) argument
974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_eke_common.h64 u8 encr; member in struct:eap_eke_session
81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
H A Deap_eke_common.c42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr) argument
49 if (encr != EAP_EKE_ENCR_AES128_CBC)
387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC)
414 if (sess->encr != EAP_EKE_ENCR_AES128_CBC)
470 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
620 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
675 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
731 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, argument
735 sess->encr = encr;
[all...]
H A Deap_sim_common.c498 struct eap_sim_attrs *attr, int aka, int encr)
565 if (!encr) {
570 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
577 "(encr) padding bytes",
673 if (!encr) {
679 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
685 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
689 if (!encr) {
695 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invali
497 eap_sim_parse_attr(const u8 *start, const u8 *end, struct eap_sim_attrs *attr, int aka, int encr) argument
974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg
[all...]
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
H A Dnetworkconfig.cpp71 int auth, encr = 0; local
84 encr = 1;
86 encr = 0;
88 encr = 1;
92 encr = 0;
96 encrSelect->setCurrentIndex(encr);
278 int encr = encrSelect->currentIndex(); local
279 if (encr == 0)
533 int auth = AUTH_NONE_OPEN, encr = 0; local
544 encr
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dikev2.h18 int encr; member in struct:ikev2_proposal_data
H A Dikev2.c38 const struct ikev2_encr_alg *encr; local
47 encr = ikev2_get_encr(data->proposal.encr);
48 if (integ == NULL || prf == NULL || encr == NULL) {
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
179 prop->encr = transform_id;
319 prop.encr = -1;
326 prop.encr != -1 && prop.dh != -1) {
347 data->proposal.encr, data->proposal.prf,
654 decrypted = ikev2_decrypt_payload(data->proposal.encr,
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Dikev2.h18 int encr; member in struct:ikev2_proposal_data
H A Dikev2.c42 const struct ikev2_encr_alg *encr; local
51 encr = ikev2_get_encr(data->proposal.encr);
52 if (integ == NULL || prf == NULL || encr == NULL) {
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
164 transform_id == data->proposal.encr) {
185 prop->encr = transform_id;
327 prop.encr = -1;
334 prop.encr != -1 && prop.dh != -1) {
356 data->proposal.encr, dat
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Dikev2.h18 int encr; member in struct:ikev2_proposal_data
H A Dikev2.c38 const struct ikev2_encr_alg *encr; local
47 encr = ikev2_get_encr(data->proposal.encr);
48 if (integ == NULL || prf == NULL || encr == NULL) {
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
179 prop->encr = transform_id;
319 prop.encr = -1;
326 prop.encr != -1 && prop.dh != -1) {
347 data->proposal.encr, data->proposal.prf,
654 decrypted = ikev2_decrypt_payload(data->proposal.encr,
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Dikev2.h18 int encr; member in struct:ikev2_proposal_data
H A Dikev2.c42 const struct ikev2_encr_alg *encr; local
51 encr = ikev2_get_encr(data->proposal.encr);
52 if (integ == NULL || prf == NULL || encr == NULL) {
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
164 transform_id == data->proposal.encr) {
185 prop->encr = transform_id;
327 prop.encr = -1;
334 prop.encr != -1 && prop.dh != -1) {
356 data->proposal.encr, dat
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dikev2.h18 int encr; member in struct:ikev2_proposal_data
H A Dikev2.c38 const struct ikev2_encr_alg *encr; local
47 encr = ikev2_get_encr(data->proposal.encr);
48 if (integ == NULL || prf == NULL || encr == NULL) {
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
179 prop->encr = transform_id;
319 prop.encr = -1;
326 prop.encr != -1 && prop.dh != -1) {
347 data->proposal.encr, data->proposal.prf,
654 decrypted = ikev2_decrypt_payload(data->proposal.encr,
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Dikev2.h18 int encr; member in struct:ikev2_proposal_data
H A Dikev2.c42 const struct ikev2_encr_alg *encr; local
51 encr = ikev2_get_encr(data->proposal.encr);
52 if (integ == NULL || prf == NULL || encr == NULL) {
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
164 transform_id == data->proposal.encr) {
185 prop->encr = transform_id;
327 prop.encr = -1;
334 prop.encr != -1 && prop.dh != -1) {
356 data->proposal.encr, dat
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwps_hostapd.h34 const char *auth, const char *encr, const char *key);
/external/wpa_supplicant_8/src/ap/
H A Dwps_hostapd.h34 const char *auth, const char *encr, const char *key);
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwps_hostapd.h34 const char *auth, const char *encr, const char *key);

Completed in 3981 milliseconds

123