/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_config.c | 888 int cipher = WPA_CIPHER_NONE; local 892 cipher = bss->default_wep_key_len >= 13 ? 894 bss->wpa_group = cipher; 895 bss->wpa_pairwise = cipher; 896 bss->rsn_pairwise = cipher; 898 int cipher = WPA_CIPHER_WEP40; local 900 cipher = WPA_CIPHER_WEP104; 902 bss->wpa_group = cipher; 903 bss->wpa_pairwise = cipher; 904 bss->rsn_pairwise = cipher; [all...] |
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 406 static int wpa_cipher_valid_group(int cipher) argument 408 return wpa_cipher_valid_pairwise(cipher) || 409 cipher == WPA_CIPHER_WEP104 || 410 cipher == WPA_CIPHER_WEP40 || 411 cipher == WPA_CIPHER_GTK_NOT_USED; 416 int wpa_cipher_valid_mgmt_group(int cipher) argument 418 return cipher == WPA_CIPHER_AES_128_CMAC || 419 cipher == WPA_CIPHER_BIP_GMAC_128 || 420 cipher == WPA_CIPHER_BIP_GMAC_256 || 421 cipher 936 wpa_cipher_txt(int cipher) argument 1146 wpa_cipher_key_len(int cipher) argument 1171 wpa_cipher_rsc_len(int cipher) argument 1189 wpa_cipher_to_alg(int cipher) argument 1218 wpa_cipher_valid_pairwise(int cipher) argument 1228 wpa_cipher_to_suite(int proto, int cipher) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-unwrap.c | 22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 35 os_memcpy(a, cipher, 8); 37 os_memcpy(r, cipher + 8, 8 * n);
|
H A D | aes-wrap.c | 23 * @cipher: Wrapped key, (n + 1) * 64 bits 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 33 a = cipher; 34 r = cipher + 8; 52 r = cipher + 8; 71 * These are already in @cipher due to the location of temporary
|
H A D | crypto_openssl.c | 365 const EVP_CIPHER *cipher; local 374 cipher = EVP_rc4(); 381 cipher = EVP_aes_128_cbc(); 385 cipher = EVP_aes_192_cbc(); 389 cipher = EVP_aes_256_cbc(); 399 cipher = EVP_des_ede3_cbc(); 402 cipher = EVP_des_cbc(); 407 cipher = EVP_rc2_ecb(); 417 if (!EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, NULL, NULL) || 427 if (!EVP_DecryptInit_ex(&ctx->dec, cipher, NUL [all...] |
H A D | tls_openssl.c | 2851 "cipher selection: %d", *c); 2862 wpa_printf(MSG_DEBUG, "OpenSSL: cipher suites: %s", buf + 1); 3364 conn->ssl->enc_read_ctx->cipher == NULL || 3368 c = conn->ssl->enc_read_ctx->cipher; 3406 const SSL_CIPHER **cipher, void *arg) 3410 SSL_CIPHER **cipher, void *arg) 3404 tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, const SSL_CIPHER **cipher, void *arg) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_atheros.c | 287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 293 printf("Unable to set group key cipher to %u\n", v); 474 u_int8_t cipher; local 485 cipher = IEEE80211_CIPHER_WEP; 488 cipher = IEEE80211_CIPHER_TKIP; 491 cipher = IEEE80211_CIPHER_AES_CCM; 495 cipher = IEEE80211_CIPHER_AES_CCM_256; 498 cipher = IEEE80211_CIPHER_AES_GCM; 501 cipher [all...] |
H A D | driver_madwifi.c | 253 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 257 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 259 printf("Unable to set group key cipher to %u\n", v); 423 u_int8_t cipher; local 433 cipher = IEEE80211_CIPHER_WEP; 435 cipher = IEEE80211_CIPHER_TKIP; 437 cipher = IEEE80211_CIPHER_AES_CCM; 451 wk.ik_type = cipher;
|
H A D | driver_nl80211.c | 3715 wpa_printf(MSG_DEBUG, "nl80211: Supported cipher %02x-%02x-%02x:%d", 5823 static u32 wpa_cipher_to_cipher_suite(unsigned int cipher) argument 5825 switch (cipher) { 8934 u32 cipher = wpa_cipher_to_cipher_suite(params->pairwise_suite); local 8935 wpa_printf(MSG_DEBUG, " * pairwise=0x%x", cipher); 8936 NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE, cipher); 8945 wpa_printf(MSG_DEBUG, " * skip group cipher configuration for GTK_NOT_USED due to missing driver support advertisement"); 8947 u32 cipher = wpa_cipher_to_cipher_suite(params->group_suite); local 8948 wpa_printf(MSG_DEBUG, " * group=0x%x", cipher); 8949 NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, cipher); [all...] |
H A D | driver_wext.c | 1938 int wpa_driver_wext_cipher2wext(int cipher) argument 1940 switch (cipher) { 2057 /* TODO: should consider getting wpa version and cipher/key_mgmt suites
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.c | 179 struct crypto_cipher *cipher; local 194 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 195 if (cipher == NULL) { 196 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 200 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) { 202 crypto_cipher_deinit(cipher); 205 crypto_cipher_deinit(cipher); 214 struct crypto_cipher *cipher; local 229 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 230 if (cipher [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast.c | 1447 "provisioning TLS cipher suites"); 1453 "provisioning TLS cipher suites"); 1464 "cipher suites for provisioning"); 1572 char cipher[80]; local 1579 cipher, sizeof(cipher)) < 0 || 1580 os_strstr(cipher, "ADH-") || 1581 os_strstr(cipher, "anon"))) {
|
H A D | eap_sake.c | 24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon33662
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_fast.c | 440 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher " 547 char cipher[64]; local 551 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher)) 553 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher " 558 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
|
H A D | eap_server_sake.c | 23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon33695
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 181 int cipher; local 220 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher & 222 if (cipher < 0) { 223 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2"); 230 wpa_cipher_txt(cipher)); 242 peerkey->cipher = cipher; 264 /* Include only the selected cipher in pairwise cipher suite */ 267 RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN, cipher)); 464 int cipher; local [all...] |
H A D | peerkey.h | 27 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
|
H A D | tdls.c | 106 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer 193 switch (peer->cipher) { 203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", 686 peer->cipher = 0; 1063 * Regardless of the cipher used on the AP connection, select CCMP 1419 * RSN IE is filled only with CCMP cipher suite. 1422 * Regardless of the cipher used on the AP connection, select CCMP 1739 int cipher; local 1918 cipher 2121 int cipher; local [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client.c | 547 * tlsv1_client_get_cipher - Get current cipher name 549 * @buf: Buffer for the cipher name 553 * Get the name of the currently used cipher. 558 char *cipher; local 562 cipher = "RC4-MD5"; 565 cipher = "RC4-SHA"; 568 cipher = "DES-CBC-SHA"; 571 cipher = "DES-CBC3-SHA"; 574 cipher = "ADH-AES-128-SHA256"; 577 cipher [all...] |
H A D | tlsv1_common.c | 22 * Add support for commonly used cipher suites; don't bother with exportable 103 * tls_get_cipher_suite - Get TLS cipher suite 105 * Returns: Pointer to the cipher data or %NULL if not found 117 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) argument 121 if (tls_ciphers[i].cipher == cipher) 127 int tls_server_key_exchange_allowed(tls_cipher cipher) argument 132 suite = tls_get_cipher_suite(cipher);
|
H A D | tlsv1_common.h | 216 tls_cipher cipher; member in struct:tls_cipher_suite 226 tls_cipher cipher; member in struct:tls_cipher_data 249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher); 250 int tls_server_key_exchange_allowed(tls_cipher cipher);
|
H A D | tlsv1_server.c | 493 * tlsv1_server_get_cipher - Get current cipher name 495 * @buf: Buffer for the cipher name 499 * Get the name of the currently used cipher. 504 char *cipher; local 508 cipher = "RC4-MD5"; 511 cipher = "RC4-SHA"; 514 cipher = "DES-CBC-SHA"; 517 cipher = "DES-CBC3-SHA"; 520 cipher = "ADH-AES-128-SHA"; 523 cipher [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_config.c | 888 int cipher = WPA_CIPHER_NONE; local 892 cipher = bss->default_wep_key_len >= 13 ? 894 bss->wpa_group = cipher; 895 bss->wpa_pairwise = cipher; 896 bss->rsn_pairwise = cipher; 898 int cipher = WPA_CIPHER_WEP40; local 900 cipher = WPA_CIPHER_WEP104; 902 bss->wpa_group = cipher; 903 bss->wpa_pairwise = cipher; 904 bss->rsn_pairwise = cipher; [all...] |
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 406 static int wpa_cipher_valid_group(int cipher) argument 408 return wpa_cipher_valid_pairwise(cipher) || 409 cipher == WPA_CIPHER_WEP104 || 410 cipher == WPA_CIPHER_WEP40 || 411 cipher == WPA_CIPHER_GTK_NOT_USED; 416 int wpa_cipher_valid_mgmt_group(int cipher) argument 418 return cipher == WPA_CIPHER_AES_128_CMAC || 419 cipher == WPA_CIPHER_BIP_GMAC_128 || 420 cipher == WPA_CIPHER_BIP_GMAC_256 || 421 cipher 936 wpa_cipher_txt(int cipher) argument 1146 wpa_cipher_key_len(int cipher) argument 1171 wpa_cipher_rsc_len(int cipher) argument 1189 wpa_cipher_to_alg(int cipher) argument 1218 wpa_cipher_valid_pairwise(int cipher) argument 1228 wpa_cipher_to_suite(int proto, int cipher) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-unwrap.c | 22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 35 os_memcpy(a, cipher, 8); 37 os_memcpy(r, cipher + 8, 8 * n);
|