/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ft.c | 318 enum wpa_alg alg; local 329 alg = wpa_cipher_to_alg(sm->pairwise_cipher); 332 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc, 546 enum wpa_alg alg; local 573 alg = wpa_cipher_to_alg(sm->group_cipher); 574 if (alg == WPA_ALG_NONE) { 604 if (wpa_sm_set_key(sm, alg, broadcast_ether_addr, keyidx, 0,
|
H A D | wpa.c | 593 enum wpa_alg alg; local 613 alg = wpa_cipher_to_alg(sm->pairwise_cipher); 624 if (wpa_sm_set_key(sm, alg, sm->bssid, 0, 1, key_rsc, rsclen, 628 "driver (alg=%d keylen=%d bssid=" MACSTR ")", 629 alg, keylen, MAC2STR(sm->bssid)); 650 enum wpa_alg *alg) 654 *alg = wpa_cipher_to_alg(group_cipher); 655 if (*alg == WPA_ALG_NONE) { 675 enum wpa_alg alg; member in struct:wpa_gtk_data 702 if (wpa_sm_set_key(sm, gd->alg, NUL 646 wpa_supplicant_check_group_cipher(struct wpa_sm *sm, int group_cipher, int keylen, int maxkeylen, int *key_rsc_len, enum wpa_alg *alg) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ibss_rsn.c | 139 static int supp_set_key(void *ctx, enum wpa_alg alg, argument 146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 148 __func__, alg, MAC2STR(addr), key_idx, set_tx); 168 return wpa_drv_set_key(peer->ibss_rsn->wpa_s, alg, addr, key_idx, 290 static int auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg, argument 299 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR 301 __func__, alg, MAC2STR(addr), idx); 303 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d key_idx=%d)", 304 __func__, alg, idx); 329 return wpa_drv_set_key(ibss_rsn->wpa_s, alg, add [all...] |
H A D | mesh_rsn.c | 100 static int auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg, argument 109 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR 111 __func__, alg, MAC2STR(addr), idx); 113 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d key_idx=%d)", 114 __func__, alg, idx); 118 return wpa_drv_set_key(mesh_rsn->wpa_s, alg, addr, idx,
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 318 enum wpa_alg alg; local 329 alg = wpa_cipher_to_alg(sm->pairwise_cipher); 332 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc, 546 enum wpa_alg alg; local 573 alg = wpa_cipher_to_alg(sm->group_cipher); 574 if (alg == WPA_ALG_NONE) { 604 if (wpa_sm_set_key(sm, alg, broadcast_ether_addr, keyidx, 0,
|
H A D | wpa.c | 593 enum wpa_alg alg; local 613 alg = wpa_cipher_to_alg(sm->pairwise_cipher); 624 if (wpa_sm_set_key(sm, alg, sm->bssid, 0, 1, key_rsc, rsclen, 628 "driver (alg=%d keylen=%d bssid=" MACSTR ")", 629 alg, keylen, MAC2STR(sm->bssid)); 650 enum wpa_alg *alg) 654 *alg = wpa_cipher_to_alg(group_cipher); 655 if (*alg == WPA_ALG_NONE) { 675 enum wpa_alg alg; member in struct:wpa_gtk_data 702 if (wpa_sm_set_key(sm, gd->alg, NUL 646 wpa_supplicant_check_group_cipher(struct wpa_sm *sm, int group_cipher, int keylen, int maxkeylen, int *key_rsc_len, enum wpa_alg *alg) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_privsep.c | 190 enum wpa_alg alg, const u8 *addr, 198 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d", 199 __func__, priv, alg, key_idx, set_tx); 202 cmd.alg = alg; 189 wpa_driver_privsep_set_key(const char *ifname, void *priv, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) argument
|
H A D | driver_hostap.c | 399 enum wpa_alg alg, const u8 *addr, 421 switch (alg) { 423 os_strlcpy((char *) param->u.crypt.alg, "NONE", 427 os_strlcpy((char *) param->u.crypt.alg, "WEP", 431 os_strlcpy((char *) param->u.crypt.alg, "TKIP", 435 os_strlcpy((char *) param->u.crypt.alg, "CCMP", 398 wpa_driver_hostap_set_key(const char *ifname, void *priv, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 593 enum wpa_alg alg; local 613 alg = wpa_cipher_to_alg(sm->pairwise_cipher); 624 if (wpa_sm_set_key(sm, alg, sm->bssid, 0, 1, key_rsc, rsclen, 628 "driver (alg=%d keylen=%d bssid=" MACSTR ")", 629 alg, keylen, MAC2STR(sm->bssid)); 650 enum wpa_alg *alg) 654 *alg = wpa_cipher_to_alg(group_cipher); 655 if (*alg == WPA_ALG_NONE) { 675 enum wpa_alg alg; member in struct:wpa_gtk_data 702 if (wpa_sm_set_key(sm, gd->alg, NUL 646 wpa_supplicant_check_group_cipher(struct wpa_sm *sm, int group_cipher, int keylen, int maxkeylen, int *key_rsc_len, enum wpa_alg *alg) argument [all...] |
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_privsep.c | 190 enum wpa_alg alg, const u8 *addr, 198 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d", 199 __func__, priv, alg, key_idx, set_tx); 202 cmd.alg = alg; 189 wpa_driver_privsep_set_key(const char *ifname, void *priv, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) argument
|
H A D | driver_hostap.c | 399 enum wpa_alg alg, const u8 *addr, 421 switch (alg) { 423 os_strlcpy((char *) param->u.crypt.alg, "NONE", 427 os_strlcpy((char *) param->u.crypt.alg, "WEP", 431 os_strlcpy((char *) param->u.crypt.alg, "TKIP", 435 os_strlcpy((char *) param->u.crypt.alg, "CCMP", 398 wpa_driver_hostap_set_key(const char *ifname, void *priv, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_privsep.c | 190 enum wpa_alg alg, const u8 *addr, 198 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d", 199 __func__, priv, alg, key_idx, set_tx); 202 cmd.alg = alg; 189 wpa_driver_privsep_set_key(const char *ifname, void *priv, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) argument
|
H A D | driver_hostap.c | 399 enum wpa_alg alg, const u8 *addr, 421 switch (alg) { 423 os_strlcpy((char *) param->u.crypt.alg, "NONE", 427 os_strlcpy((char *) param->u.crypt.alg, "WEP", 431 os_strlcpy((char *) param->u.crypt.alg, "TKIP", 435 os_strlcpy((char *) param->u.crypt.alg, "CCMP", 398 wpa_driver_hostap_set_key(const char *ifname, void *priv, enum wpa_alg alg, const u8 *addr, int key_idx, int set_tx, const u8 *seq, size_t seq_len, const u8 *key, size_t key_len) argument
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
H A D | SecretKeyFactoryTest.java | 421 public mySecretKeyFactory(SecretKeyFactorySpi spi, Provider prov, String alg) { argument 422 super(spi, prov, alg);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyFactory2Test.java | 71 private KeepAlive createKeepAlive(String alg) { argument 72 if (alg.equals("RSA")) {
|
H A D | MessageDigest2Test.java | 326 String alg = MessageDigest.getInstance(digestAlgs[i], 328 assertTrue("getAlgorithm ok", alg.equals(digestAlgs[i]));
|
/external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
H A D | KeyManagerFactory1Test.java | 436 String alg) { 437 super(spi, prov, alg); 435 myKeyManagerFactory(KeyManagerFactorySpi spi, Provider prov, String alg) argument
|
H A D | TrustManagerFactory1Test.java | 439 String alg) { 440 super(spi, prov, alg); 438 myTrustManagerFactory(TrustManagerFactorySpi spi, Provider prov, String alg) argument
|
H A D | SSLContext1Test.java | 498 public MySSLContext(SSLContextSpi spi, Provider prov, String alg) { argument 499 super(spi, prov, alg);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_gnutls.c | 195 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument 208 switch (alg) {
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_gnutls.c | 195 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument 208 switch (alg) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_gnutls.c | 195 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument 208 switch (alg) {
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | test_wpa.c | 136 static int supp_set_key(void *ctx, enum wpa_alg alg, argument 141 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 143 __func__, alg, MAC2STR(addr), key_idx, set_tx);
|
/external/ipsec-tools/src/racoon/ |
H A D | proposal.c | 345 "sec alg mismatched: my:%d peer:%d\n", 655 if (a->alg == IPSECDOI_ATTR_AUTH_NONE) 667 newtr->trns_id = ipsecdoi_authalg2trnsid(a->alg); 668 newtr->authtype = a->alg; 691 newtr->trns_id = a->alg; 693 newtr->authtype = b->alg; 717 newtr->trns_id = a->alg;
|
/external/vboot_reference/scripts/image_signing/ |
H A D | sign_official_build.sh | 204 verity_algorithm=$(get_verity_arg "${vroot_dev}" alg) 217 alg=${verity_algorithm} \
|