Searched defs:encr (Results 1 - 25 of 49) sorted by relevance

12

/external/wpa_supplicant_8/wpa_supplicant/
H A Dwps_supplicant.h24 const char *encr; member in struct:wps_new_ap_settings
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Dikev2.h18 int encr; member in struct:ikev2_proposal_data
H A Dikev2.c42 const struct ikev2_encr_alg *encr; local
51 encr = ikev2_get_encr(data->proposal.encr);
52 if (integ == NULL || prf == NULL || encr == NULL) {
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
164 transform_id == data->proposal.encr) {
185 prop->encr = transform_id;
327 prop.encr = -1;
334 prop.encr != -1 && prop.dh != -1) {
356 data->proposal.encr, dat
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Dikev2.h18 int encr; member in struct:ikev2_proposal_data
H A Dikev2.c42 const struct ikev2_encr_alg *encr; local
51 encr = ikev2_get_encr(data->proposal.encr);
52 if (integ == NULL || prf == NULL || encr == NULL) {
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
164 transform_id == data->proposal.encr) {
185 prop->encr = transform_id;
327 prop.encr = -1;
334 prop.encr != -1 && prop.dh != -1) {
356 data->proposal.encr, dat
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Dikev2.h18 int encr; member in struct:ikev2_proposal_data
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.h64 u8 encr; member in struct:eap_eke_session
81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
H A Deap_eke_common.c42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr) argument
49 if (encr != EAP_EKE_ENCR_AES128_CBC)
387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC)
414 if (sess->encr != EAP_EKE_ENCR_AES128_CBC)
470 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
620 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
675 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
731 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, argument
735 sess->encr = encr;
[all...]
H A Deap_sim_common.c498 struct eap_sim_attrs *attr, int aka, int encr)
565 if (!encr) {
570 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
577 "(encr) padding bytes",
673 if (!encr) {
679 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
685 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
689 if (!encr) {
695 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invali
497 eap_sim_parse_attr(const u8 *start, const u8 *end, struct eap_sim_attrs *attr, int aka, int encr) argument
974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg
[all...]
H A Dikev2_common.c190 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
225 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
632 const struct ikev2_encr_alg *encr,
646 keys->SK_encr_len = encr->key_len;
630 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dikev2.h18 int encr; member in struct:ikev2_proposal_data
H A Deap_eke.c32 u8 encr; /* forced encryption algorithm or 0 to allow all supported */ member in struct:eap_eke_data
108 pos = os_strstr(phase1, "encr=");
110 data->encr = atoi(pos + 5);
111 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced encr %u",
112 data->encr);
176 static int eap_eke_supp_encr(u8 encr) argument
178 return encr == EAP_EKE_ENCR_AES128_CBC;
263 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u",
271 if ((data->encr && data->encr !
[all...]
H A Dikev2.c38 const struct ikev2_encr_alg *encr; local
47 encr = ikev2_get_encr(data->proposal.encr);
48 if (integ == NULL || prf == NULL || encr == NULL) {
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
179 prop->encr = transform_id;
319 prop.encr = -1;
326 prop.encr != -1 && prop.dh != -1) {
347 data->proposal.encr, data->proposal.prf,
654 decrypted = ikev2_decrypt_payload(data->proposal.encr,
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_eke_common.h64 u8 encr; member in struct:eap_eke_session
81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
H A Deap_eke_common.c42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr) argument
49 if (encr != EAP_EKE_ENCR_AES128_CBC)
387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC)
414 if (sess->encr != EAP_EKE_ENCR_AES128_CBC)
470 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
620 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
675 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
731 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, argument
735 sess->encr = encr;
[all...]
H A Deap_sim_common.c498 struct eap_sim_attrs *attr, int aka, int encr)
565 if (!encr) {
570 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
577 "(encr) padding bytes",
673 if (!encr) {
679 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
685 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
689 if (!encr) {
695 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invali
497 eap_sim_parse_attr(const u8 *start, const u8 *end, struct eap_sim_attrs *attr, int aka, int encr) argument
974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg
[all...]
H A Dikev2_common.c190 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
225 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
632 const struct ikev2_encr_alg *encr,
646 keys->SK_encr_len = encr->key_len;
630 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Dikev2.h18 int encr; member in struct:ikev2_proposal_data
H A Deap_eke.c32 u8 encr; /* forced encryption algorithm or 0 to allow all supported */ member in struct:eap_eke_data
108 pos = os_strstr(phase1, "encr=");
110 data->encr = atoi(pos + 5);
111 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced encr %u",
112 data->encr);
176 static int eap_eke_supp_encr(u8 encr) argument
178 return encr == EAP_EKE_ENCR_AES128_CBC;
263 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u",
271 if ((data->encr && data->encr !
[all...]
H A Dikev2.c38 const struct ikev2_encr_alg *encr; local
47 encr = ikev2_get_encr(data->proposal.encr);
48 if (integ == NULL || prf == NULL || encr == NULL) {
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
179 prop->encr = transform_id;
319 prop.encr = -1;
326 prop.encr != -1 && prop.dh != -1) {
347 data->proposal.encr, data->proposal.prf,
654 decrypted = ikev2_decrypt_payload(data->proposal.encr,
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_eke_common.h64 u8 encr; member in struct:eap_eke_session
81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dikev2.h18 int encr; member in struct:ikev2_proposal_data
H A Deap_eke.c32 u8 encr; /* forced encryption algorithm or 0 to allow all supported */ member in struct:eap_eke_data
108 pos = os_strstr(phase1, "encr=");
110 data->encr = atoi(pos + 5);
111 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced encr %u",
112 data->encr);
176 static int eap_eke_supp_encr(u8 encr) argument
178 return encr == EAP_EKE_ENCR_AES128_CBC;
263 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u",
271 if ((data->encr && data->encr !
[all...]
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
H A Dnetworkconfig.cpp72 int auth, encr = 0; local
85 encr = 1;
87 encr = 0;
89 encr = 1;
93 encr = 0;
97 encrSelect->setCurrentIndex(encr);
279 int encr = encrSelect->currentIndex(); local
280 if (encr == 0)
534 int auth = AUTH_NONE_OPEN, encr = 0; local
545 encr
[all...]
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_common.c152 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr, argument
162 if (encr == NULL || encr_len < 2 * block_size || encr_len % block_size)
172 wpa_hexdump(MSG_MSGDUMP, "WPS: Encrypted Settings", encr, encr_len);
173 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
174 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),

Completed in 270 milliseconds

12