Searched defs:cipher (Results 1 - 25 of 193) sorted by last modified time

12345678

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dap_config.c888 int cipher = WPA_CIPHER_NONE; local
892 cipher = bss->default_wep_key_len >= 13 ?
894 bss->wpa_group = cipher;
895 bss->wpa_pairwise = cipher;
896 bss->rsn_pairwise = cipher;
898 int cipher = WPA_CIPHER_WEP40; local
900 cipher = WPA_CIPHER_WEP104;
902 bss->wpa_group = cipher;
903 bss->wpa_pairwise = cipher;
904 bss->rsn_pairwise = cipher;
[all...]
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_common.c406 static int wpa_cipher_valid_group(int cipher) argument
408 return wpa_cipher_valid_pairwise(cipher) ||
409 cipher == WPA_CIPHER_WEP104 ||
410 cipher == WPA_CIPHER_WEP40 ||
411 cipher == WPA_CIPHER_GTK_NOT_USED;
416 int wpa_cipher_valid_mgmt_group(int cipher) argument
418 return cipher == WPA_CIPHER_AES_128_CMAC ||
419 cipher == WPA_CIPHER_BIP_GMAC_128 ||
420 cipher == WPA_CIPHER_BIP_GMAC_256 ||
421 cipher
936 wpa_cipher_txt(int cipher) argument
1146 wpa_cipher_key_len(int cipher) argument
1171 wpa_cipher_rsc_len(int cipher) argument
1189 wpa_cipher_to_alg(int cipher) argument
1218 wpa_cipher_valid_pairwise(int cipher) argument
1228 wpa_cipher_to_suite(int proto, int cipher) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Daes-unwrap.c22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits
26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument
35 os_memcpy(a, cipher, 8);
37 os_memcpy(r, cipher + 8, 8 * n);
H A Daes-wrap.c23 * @cipher: Wrapped key, (n + 1) * 64 bits
26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument
33 a = cipher;
34 r = cipher + 8;
52 r = cipher + 8;
71 * These are already in @cipher due to the location of temporary
H A Dcrypto_openssl.c365 const EVP_CIPHER *cipher; local
374 cipher = EVP_rc4();
381 cipher = EVP_aes_128_cbc();
385 cipher = EVP_aes_192_cbc();
389 cipher = EVP_aes_256_cbc();
399 cipher = EVP_des_ede3_cbc();
402 cipher = EVP_des_cbc();
407 cipher = EVP_rc2_ecb();
417 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) ||
427 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NUL
[all...]
H A Dtls_openssl.c2851 "cipher selection: %d", *c);
2862 wpa_printf(MSG_DEBUG, "OpenSSL: cipher suites: %s", buf + 1);
3364 conn->ssl->enc_read_ctx->cipher == NULL ||
3368 c = conn->ssl->enc_read_ctx->cipher;
3406 const SSL_CIPHER **cipher, void *arg)
3410 SSL_CIPHER **cipher, void *arg)
3404 tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg) argument
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_atheros.c287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
293 printf("Unable to set group key cipher to %u\n", v);
474 u_int8_t cipher; local
485 cipher = IEEE80211_CIPHER_WEP;
488 cipher = IEEE80211_CIPHER_TKIP;
491 cipher = IEEE80211_CIPHER_AES_CCM;
495 cipher = IEEE80211_CIPHER_AES_CCM_256;
498 cipher = IEEE80211_CIPHER_AES_GCM;
501 cipher
[all...]
H A Ddriver_madwifi.c253 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
257 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
259 printf("Unable to set group key cipher to %u\n", v);
423 u_int8_t cipher; local
433 cipher = IEEE80211_CIPHER_WEP;
435 cipher = IEEE80211_CIPHER_TKIP;
437 cipher = IEEE80211_CIPHER_AES_CCM;
451 wk.ik_type = cipher;
H A Ddriver_nl80211.c3715 wpa_printf(MSG_DEBUG, "nl80211: Supported cipher %02x-%02x-%02x:%d",
5823 static u32 wpa_cipher_to_cipher_suite(unsigned int cipher) argument
5825 switch (cipher) {
8934 u32 cipher = wpa_cipher_to_cipher_suite(params->pairwise_suite); local
8935 wpa_printf(MSG_DEBUG, " * pairwise=0x%x", cipher);
8936 NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE, cipher);
8945 wpa_printf(MSG_DEBUG, " * skip group cipher configuration for GTK_NOT_USED due to missing driver support advertisement");
8947 u32 cipher = wpa_cipher_to_cipher_suite(params->group_suite); local
8948 wpa_printf(MSG_DEBUG, " * group=0x%x", cipher);
8949 NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, cipher);
[all...]
H A Ddriver_wext.c1938 int wpa_driver_wext_cipher2wext(int cipher) argument
1940 switch (cipher) {
2057 /* TODO: should consider getting wpa version and cipher/key_mgmt suites
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dikev2_common.c179 struct crypto_cipher *cipher; local
194 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
195 if (cipher == NULL) {
196 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
200 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
202 crypto_cipher_deinit(cipher);
205 crypto_cipher_deinit(cipher);
214 struct crypto_cipher *cipher; local
229 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
230 if (cipher
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_fast.c1447 "provisioning TLS cipher suites");
1453 "provisioning TLS cipher suites");
1464 "cipher suites for provisioning");
1572 char cipher[80]; local
1579 cipher, sizeof(cipher)) < 0 ||
1580 os_strstr(cipher, "ADH-") ||
1581 os_strstr(cipher, "anon"))) {
H A Deap_sake.c24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon33662
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_fast.c440 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher "
547 char cipher[64]; local
551 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher))
553 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher "
558 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
H A Deap_server_sake.c23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon33695
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpeerkey.c181 int cipher; local
220 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher &
222 if (cipher < 0) {
223 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2");
230 wpa_cipher_txt(cipher));
242 peerkey->cipher = cipher;
264 /* Include only the selected cipher in pairwise cipher suite */
267 RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN, cipher));
464 int cipher; local
[all...]
H A Dpeerkey.h27 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
H A Dtdls.c106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer
193 switch (peer->cipher) {
203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
686 peer->cipher = 0;
1063 * Regardless of the cipher used on the AP connection, select CCMP
1419 * RSN IE is filled only with CCMP cipher suite.
1422 * Regardless of the cipher used on the AP connection, select CCMP
1739 int cipher; local
1918 cipher
2121 int cipher; local
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client.c547 * tlsv1_client_get_cipher - Get current cipher name
549 * @buf: Buffer for the cipher name
553 * Get the name of the currently used cipher.
558 char *cipher; local
562 cipher = "RC4-MD5";
565 cipher = "RC4-SHA";
568 cipher = "DES-CBC-SHA";
571 cipher = "DES-CBC3-SHA";
574 cipher = "ADH-AES-128-SHA256";
577 cipher
[all...]
H A Dtlsv1_common.c22 * Add support for commonly used cipher suites; don't bother with exportable
103 * tls_get_cipher_suite - Get TLS cipher suite
105 * Returns: Pointer to the cipher data or %NULL if not found
117 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) argument
121 if (tls_ciphers[i].cipher == cipher)
127 int tls_server_key_exchange_allowed(tls_cipher cipher) argument
132 suite = tls_get_cipher_suite(cipher);
H A Dtlsv1_common.h216 tls_cipher cipher; member in struct:tls_cipher_suite
226 tls_cipher cipher; member in struct:tls_cipher_data
249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
250 int tls_server_key_exchange_allowed(tls_cipher cipher);
H A Dtlsv1_server.c493 * tlsv1_server_get_cipher - Get current cipher name
495 * @buf: Buffer for the cipher name
499 * Get the name of the currently used cipher.
504 char *cipher; local
508 cipher = "RC4-MD5";
511 cipher = "RC4-SHA";
514 cipher = "DES-CBC-SHA";
517 cipher = "DES-CBC3-SHA";
520 cipher = "ADH-AES-128-SHA";
523 cipher
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dap_config.c888 int cipher = WPA_CIPHER_NONE; local
892 cipher = bss->default_wep_key_len >= 13 ?
894 bss->wpa_group = cipher;
895 bss->wpa_pairwise = cipher;
896 bss->rsn_pairwise = cipher;
898 int cipher = WPA_CIPHER_WEP40; local
900 cipher = WPA_CIPHER_WEP104;
902 bss->wpa_group = cipher;
903 bss->wpa_pairwise = cipher;
904 bss->rsn_pairwise = cipher;
[all...]
/external/wpa_supplicant_8/src/common/
H A Dwpa_common.c406 static int wpa_cipher_valid_group(int cipher) argument
408 return wpa_cipher_valid_pairwise(cipher) ||
409 cipher == WPA_CIPHER_WEP104 ||
410 cipher == WPA_CIPHER_WEP40 ||
411 cipher == WPA_CIPHER_GTK_NOT_USED;
416 int wpa_cipher_valid_mgmt_group(int cipher) argument
418 return cipher == WPA_CIPHER_AES_128_CMAC ||
419 cipher == WPA_CIPHER_BIP_GMAC_128 ||
420 cipher == WPA_CIPHER_BIP_GMAC_256 ||
421 cipher
936 wpa_cipher_txt(int cipher) argument
1146 wpa_cipher_key_len(int cipher) argument
1171 wpa_cipher_rsc_len(int cipher) argument
1189 wpa_cipher_to_alg(int cipher) argument
1218 wpa_cipher_valid_pairwise(int cipher) argument
1228 wpa_cipher_to_suite(int proto, int cipher) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Daes-unwrap.c22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits
26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument
35 os_memcpy(a, cipher, 8);
37 os_memcpy(r, cipher + 8, 8 * n);

Completed in 274 milliseconds

12345678