Searched refs:alg (Results 76 - 100 of 177) sorted by relevance

12345678

/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa_ft.c318 enum wpa_alg alg; local
329 alg = wpa_cipher_to_alg(sm->pairwise_cipher);
332 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc,
546 enum wpa_alg alg; local
573 alg = wpa_cipher_to_alg(sm->group_cipher);
574 if (alg == WPA_ALG_NONE) {
604 if (wpa_sm_set_key(sm, alg, broadcast_ether_addr, keyidx, 0,
H A Dwpa.c593 enum wpa_alg alg; local
613 alg = wpa_cipher_to_alg(sm->pairwise_cipher);
624 if (wpa_sm_set_key(sm, alg, sm->bssid, 0, 1, key_rsc, rsclen,
628 "driver (alg=%d keylen=%d bssid=" MACSTR ")",
629 alg, keylen, MAC2STR(sm->bssid));
650 enum wpa_alg *alg)
654 *alg = wpa_cipher_to_alg(group_cipher);
655 if (*alg == WPA_ALG_NONE) {
675 enum wpa_alg alg; member in struct:wpa_gtk_data
702 if (wpa_sm_set_key(sm, gd->alg, NUL
646 wpa_supplicant_check_group_cipher(struct wpa_sm *sm, int group_cipher, int keylen, int maxkeylen, int *key_rsc_len, enum wpa_alg *alg) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dibss_rsn.c139 static int supp_set_key(void *ctx, enum wpa_alg alg, argument
146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
148 __func__, alg, MAC2STR(addr), key_idx, set_tx);
168 return wpa_drv_set_key(peer->ibss_rsn->wpa_s, alg, addr, key_idx,
290 static int auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg, argument
299 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR
301 __func__, alg, MAC2STR(addr), idx);
303 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d key_idx=%d)",
304 __func__, alg, idx);
329 return wpa_drv_set_key(ibss_rsn->wpa_s, alg, add
[all...]
H A Dmesh_rsn.c100 static int auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg, argument
109 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR
111 __func__, alg, MAC2STR(addr), idx);
113 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d key_idx=%d)",
114 __func__, alg, idx);
118 return wpa_drv_set_key(mesh_rsn->wpa_s, alg, addr, idx,
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa_ft.c318 enum wpa_alg alg; local
329 alg = wpa_cipher_to_alg(sm->pairwise_cipher);
332 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc,
546 enum wpa_alg alg; local
573 alg = wpa_cipher_to_alg(sm->group_cipher);
574 if (alg == WPA_ALG_NONE) {
604 if (wpa_sm_set_key(sm, alg, broadcast_ether_addr, keyidx, 0,
H A Dwpa.c593 enum wpa_alg alg; local
613 alg = wpa_cipher_to_alg(sm->pairwise_cipher);
624 if (wpa_sm_set_key(sm, alg, sm->bssid, 0, 1, key_rsc, rsclen,
628 "driver (alg=%d keylen=%d bssid=" MACSTR ")",
629 alg, keylen, MAC2STR(sm->bssid));
650 enum wpa_alg *alg)
654 *alg = wpa_cipher_to_alg(group_cipher);
655 if (*alg == WPA_ALG_NONE) {
675 enum wpa_alg alg; member in struct:wpa_gtk_data
702 if (wpa_sm_set_key(sm, gd->alg, NUL
646 wpa_supplicant_check_group_cipher(struct wpa_sm *sm, int group_cipher, int keylen, int maxkeylen, int *key_rsc_len, enum wpa_alg *alg) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_privsep.c190 enum wpa_alg alg, const u8 *addr,
198 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d",
199 __func__, priv, alg, key_idx, set_tx);
202 cmd.alg = alg;
189 wpa_driver_privsep_set_key(const char *ifname, void *priv, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) argument
H A Ddriver_hostap.c399 enum wpa_alg alg, const u8 *addr,
421 switch (alg) {
423 os_strlcpy((char *) param->u.crypt.alg, "NONE",
427 os_strlcpy((char *) param->u.crypt.alg, "WEP",
431 os_strlcpy((char *) param->u.crypt.alg, "TKIP",
435 os_strlcpy((char *) param->u.crypt.alg, "CCMP",
398 wpa_driver_hostap_set_key(const char *ifname, void *priv, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) argument
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.c593 enum wpa_alg alg; local
613 alg = wpa_cipher_to_alg(sm->pairwise_cipher);
624 if (wpa_sm_set_key(sm, alg, sm->bssid, 0, 1, key_rsc, rsclen,
628 "driver (alg=%d keylen=%d bssid=" MACSTR ")",
629 alg, keylen, MAC2STR(sm->bssid));
650 enum wpa_alg *alg)
654 *alg = wpa_cipher_to_alg(group_cipher);
655 if (*alg == WPA_ALG_NONE) {
675 enum wpa_alg alg; member in struct:wpa_gtk_data
702 if (wpa_sm_set_key(sm, gd->alg, NUL
646 wpa_supplicant_check_group_cipher(struct wpa_sm *sm, int group_cipher, int keylen, int maxkeylen, int *key_rsc_len, enum wpa_alg *alg) argument
[all...]
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_privsep.c190 enum wpa_alg alg, const u8 *addr,
198 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d",
199 __func__, priv, alg, key_idx, set_tx);
202 cmd.alg = alg;
189 wpa_driver_privsep_set_key(const char *ifname, void *priv, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) argument
H A Ddriver_hostap.c399 enum wpa_alg alg, const u8 *addr,
421 switch (alg) {
423 os_strlcpy((char *) param->u.crypt.alg, "NONE",
427 os_strlcpy((char *) param->u.crypt.alg, "WEP",
431 os_strlcpy((char *) param->u.crypt.alg, "TKIP",
435 os_strlcpy((char *) param->u.crypt.alg, "CCMP",
398 wpa_driver_hostap_set_key(const char *ifname, void *priv, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_privsep.c190 enum wpa_alg alg, const u8 *addr,
198 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d",
199 __func__, priv, alg, key_idx, set_tx);
202 cmd.alg = alg;
189 wpa_driver_privsep_set_key(const char *ifname, void *priv, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) argument
H A Ddriver_hostap.c399 enum wpa_alg alg, const u8 *addr,
421 switch (alg) {
423 os_strlcpy((char *) param->u.crypt.alg, "NONE",
427 os_strlcpy((char *) param->u.crypt.alg, "WEP",
431 os_strlcpy((char *) param->u.crypt.alg, "TKIP",
435 os_strlcpy((char *) param->u.crypt.alg, "CCMP",
398 wpa_driver_hostap_set_key(const char *ifname, void *priv, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) argument
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/
H A DSecretKeyFactoryTest.java421 public mySecretKeyFactory(SecretKeyFactorySpi spi, Provider prov, String alg) { argument
422 super(spi, prov, alg);
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DKeyFactory2Test.java71 private KeepAlive createKeepAlive(String alg) { argument
72 if (alg.equals("RSA")) {
H A DMessageDigest2Test.java326 String alg = MessageDigest.getInstance(digestAlgs[i],
328 assertTrue("getAlgorithm ok", alg.equals(digestAlgs[i]));
/external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/
H A DKeyManagerFactory1Test.java436 String alg) {
437 super(spi, prov, alg);
435 myKeyManagerFactory(KeyManagerFactorySpi spi, Provider prov, String alg) argument
H A DTrustManagerFactory1Test.java439 String alg) {
440 super(spi, prov, alg);
438 myTrustManagerFactory(TrustManagerFactorySpi spi, Provider prov, String alg) argument
H A DSSLContext1Test.java498 public MySSLContext(SSLContextSpi spi, Provider prov, String alg) { argument
499 super(spi, prov, alg);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto_gnutls.c195 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument
208 switch (alg) {
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto_gnutls.c195 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument
208 switch (alg) {
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_gnutls.c195 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument
208 switch (alg) {
/external/wpa_supplicant_8/wpa_supplicant/tests/
H A Dtest_wpa.c136 static int supp_set_key(void *ctx, enum wpa_alg alg, argument
141 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
143 __func__, alg, MAC2STR(addr), key_idx, set_tx);
/external/ipsec-tools/src/racoon/
H A Dproposal.c345 "sec alg mismatched: my:%d peer:%d\n",
655 if (a->alg == IPSECDOI_ATTR_AUTH_NONE)
667 newtr->trns_id = ipsecdoi_authalg2trnsid(a->alg);
668 newtr->authtype = a->alg;
691 newtr->trns_id = a->alg;
693 newtr->authtype = b->alg;
717 newtr->trns_id = a->alg;
/external/vboot_reference/scripts/image_signing/
H A Dsign_official_build.sh204 verity_algorithm=$(get_verity_arg "${vroot_dev}" alg)
217 alg=${verity_algorithm} \

Completed in 3849 milliseconds

12345678