/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 72 int auth, encr = 0; in paramsFromScanResults() local 85 encr = 1; in paramsFromScanResults() 87 encr = 0; in paramsFromScanResults() 89 encr = 1; in paramsFromScanResults() 93 encr = 0; in paramsFromScanResults() 97 encrSelect->setCurrentIndex(encr); in paramsFromScanResults() 279 int encr = encrSelect->currentIndex(); in addNetwork() local 280 if (encr == 0) in addNetwork() 534 int auth = AUTH_NONE_OPEN, encr = 0; in paramsFromConfig() local 545 encr = 1; in paramsFromConfig() [all …]
|
D | wpagui.cpp | 591 QString encr; in updateStatus() local 594 encr.append(pairwise_cipher); in updateStatus() 595 encr.append(" + "); in updateStatus() 596 encr.append(group_cipher); in updateStatus() 598 encr.append(pairwise_cipher); in updateStatus() 600 encr.append(group_cipher); in updateStatus() 601 encr.append(" [group key only]"); in updateStatus() 603 textEncryption->setText(encr); in updateStatus()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 72 int auth, encr = 0; in paramsFromScanResults() local 85 encr = 1; in paramsFromScanResults() 87 encr = 0; in paramsFromScanResults() 89 encr = 1; in paramsFromScanResults() 93 encr = 0; in paramsFromScanResults() 97 encrSelect->setCurrentIndex(encr); in paramsFromScanResults() 279 int encr = encrSelect->currentIndex(); in addNetwork() local 280 if (encr == 0) in addNetwork() 534 int auth = AUTH_NONE_OPEN, encr = 0; in paramsFromConfig() local 545 encr = 1; in paramsFromConfig() [all …]
|
D | wpagui.cpp | 593 QString encr; in updateStatus() local 596 encr.append(pairwise_cipher); in updateStatus() 597 encr.append(" + "); in updateStatus() 598 encr.append(group_cipher); in updateStatus() 600 encr.append(pairwise_cipher); in updateStatus() 602 encr.append(group_cipher); in updateStatus() 603 encr.append(" [group key only]"); in updateStatus() 605 textEncryption->setText(encr); in updateStatus()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_tls.c | 271 struct wpabuf *plain, *encr; in eap_tls_process_msg() local 286 encr = eap_server_tls_encrypt(sm, &data->ssl, plain); in eap_tls_process_msg() 288 if (!encr) in eap_tls_process_msg() 290 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) { in eap_tls_process_msg() 293 wpabuf_free(encr); in eap_tls_process_msg() 296 wpabuf_put_buf(data->ssl.tls_out, encr); in eap_tls_process_msg() 298 "EAP-TLS: Data appended to the message", encr); in eap_tls_process_msg() 299 wpabuf_free(encr); in eap_tls_process_msg()
|
D | ikev2.c | 42 const struct ikev2_encr_alg *encr; in ikev2_derive_keys() local 51 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys() 52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 164 transform_id == data->proposal.encr) { in ikev2_parse_transform() 185 prop->encr = transform_id; in ikev2_parse_transform() 327 prop.encr = -1; in ikev2_process_sar1() 334 prop.encr != -1 && prop.dh != -1) { in ikev2_process_sar1() 356 data->proposal.encr, data->proposal.prf, in ikev2_process_sar1() 456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr() [all …]
|
D | eap_server_fast.c | 820 struct wpabuf *encr; in eap_fast_encrypt_phase2() local 824 encr = eap_server_tls_encrypt(sm, &data->ssl, plain); in eap_fast_encrypt_phase2() 827 if (!encr) in eap_fast_encrypt_phase2() 834 (int) wpabuf_len(encr), in eap_fast_encrypt_phase2() 837 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) { in eap_fast_encrypt_phase2() 840 wpabuf_free(encr); in eap_fast_encrypt_phase2() 843 wpabuf_put_buf(data->ssl.tls_out, encr); in eap_fast_encrypt_phase2() 844 wpabuf_free(encr); in eap_fast_encrypt_phase2() 848 data->ssl.tls_out = encr; in eap_fast_encrypt_phase2()
|
D | eap_server_teap.c | 791 struct wpabuf *encr; in eap_teap_encrypt_phase2() local 795 encr = eap_server_tls_encrypt(sm, &data->ssl, plain); in eap_teap_encrypt_phase2() 798 if (!encr) in eap_teap_encrypt_phase2() 804 (int) wpabuf_len(encr), in eap_teap_encrypt_phase2() 807 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) { in eap_teap_encrypt_phase2() 810 wpabuf_free(encr); in eap_teap_encrypt_phase2() 813 wpabuf_put_buf(data->ssl.tls_out, encr); in eap_teap_encrypt_phase2() 814 wpabuf_free(encr); in eap_teap_encrypt_phase2() 818 data->ssl.tls_out = encr; in eap_teap_encrypt_phase2()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_eke_common.c | 42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr) in eap_eke_dhcomp_len() argument 47 if (dhlen < 0 || encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp_len() 359 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp() 387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC || !dh) in eap_eke_shared_secret() 440 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) in eap_eke_derive_ke_ki() 590 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) in eap_eke_prot() 644 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) in eap_eke_decrypt_prot() 699 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, in eap_eke_session_init() argument 703 sess->encr = encr; in eap_eke_session_init() 710 sess->dhcomp_len = eap_eke_dhcomp_len(sess->dhgroup, sess->encr); in eap_eke_session_init()
|
D | eap_sim_common.c | 496 struct eap_sim_attrs *attr, int aka, int encr) in eap_sim_parse_attr() argument 563 if (!encr) { in eap_sim_parse_attr() 671 if (!encr) { in eap_sim_parse_attr() 687 if (!encr) { in eap_sim_parse_attr() 703 if (!encr) { in eap_sim_parse_attr() 751 if (!encr) { in eap_sim_parse_attr() 771 if (!encr) { in eap_sim_parse_attr() 840 if (encr) { in eap_sim_parse_attr() 927 "(aka=%d encr=%d)", aka, encr); in eap_sim_parse_attr() 976 size_t mac, iv, encr; /* index from buf */ member [all …]
|
D | eap_eke_common.h | 64 u8 encr; member 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_eke_common.c | 42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr) in eap_eke_dhcomp_len() argument 47 if (dhlen < 0 || encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp_len() 359 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp() 387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC || !dh) in eap_eke_shared_secret() 440 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) in eap_eke_derive_ke_ki() 590 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) in eap_eke_prot() 644 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) in eap_eke_decrypt_prot() 699 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, in eap_eke_session_init() argument 703 sess->encr = encr; in eap_eke_session_init() 710 sess->dhcomp_len = eap_eke_dhcomp_len(sess->dhgroup, sess->encr); in eap_eke_session_init()
|
D | eap_sim_common.c | 496 struct eap_sim_attrs *attr, int aka, int encr) in eap_sim_parse_attr() argument 563 if (!encr) { in eap_sim_parse_attr() 671 if (!encr) { in eap_sim_parse_attr() 687 if (!encr) { in eap_sim_parse_attr() 703 if (!encr) { in eap_sim_parse_attr() 751 if (!encr) { in eap_sim_parse_attr() 771 if (!encr) { in eap_sim_parse_attr() 840 if (encr) { in eap_sim_parse_attr() 927 "(aka=%d encr=%d)", aka, encr); in eap_sim_parse_attr() 976 size_t mac, iv, encr; /* index from buf */ member [all …]
|
D | eap_eke_common.h | 64 u8 encr; member 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_tls_common.c | 382 struct wpabuf *plain, *encr; in eap_server_tls_phase1() local 400 encr = eap_server_tls_encrypt(sm, data, plain); in eap_server_tls_phase1() 402 if (!encr) in eap_server_tls_phase1() 404 if (wpabuf_resize(&data->tls_out, wpabuf_len(encr)) < 0) in eap_server_tls_phase1() 408 wpabuf_free(encr); in eap_server_tls_phase1() 411 wpabuf_put_buf(data->tls_out, encr); in eap_server_tls_phase1() 414 encr); in eap_server_tls_phase1() 415 wpabuf_free(encr); in eap_server_tls_phase1()
|
D | ikev2.c | 42 const struct ikev2_encr_alg *encr; in ikev2_derive_keys() local 51 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys() 52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 164 transform_id == data->proposal.encr) { in ikev2_parse_transform() 185 prop->encr = transform_id; in ikev2_parse_transform() 327 prop.encr = -1; in ikev2_process_sar1() 334 prop.encr != -1 && prop.dh != -1) { in ikev2_process_sar1() 356 data->proposal.encr, data->proposal.prf, in ikev2_process_sar1() 456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr() [all …]
|
D | eap_server_fast.c | 822 struct wpabuf *encr; in eap_fast_encrypt_phase2() local 826 encr = eap_server_tls_encrypt(sm, &data->ssl, plain); in eap_fast_encrypt_phase2() 829 if (!encr) in eap_fast_encrypt_phase2() 836 (int) wpabuf_len(encr), in eap_fast_encrypt_phase2() 839 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) { in eap_fast_encrypt_phase2() 842 wpabuf_free(encr); in eap_fast_encrypt_phase2() 845 wpabuf_put_buf(data->ssl.tls_out, encr); in eap_fast_encrypt_phase2() 846 wpabuf_free(encr); in eap_fast_encrypt_phase2() 850 data->ssl.tls_out = encr; in eap_fast_encrypt_phase2()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | ikev2.c | 38 const struct ikev2_encr_alg *encr; in ikev2_derive_keys() local 47 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys() 48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 179 prop->encr = transform_id; in ikev2_parse_transform() 321 prop.encr = -1; in ikev2_process_sai1() 328 prop.encr != -1 && prop.dh != -1) { in ikev2_process_sai1() 349 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1() 655 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth() 864 WPA_PUT_BE16(t->transform_id, data->proposal.encr); in ikev2_build_sar1() [all …]
|
D | eap_eke.c | 32 u8 encr; /* forced encryption algorithm or 0 to allow all supported */ member 109 data->encr = atoi(pos + 5); in eap_eke_init() 111 data->encr); in eap_eke_init() 175 static int eap_eke_supp_encr(u8 encr) in eap_eke_supp_encr() argument 177 return encr == EAP_EKE_ENCR_AES128_CBC; in eap_eke_supp_encr() 270 if ((data->encr && data->encr != *tmp) || in eap_eke_process_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | ikev2.c | 38 const struct ikev2_encr_alg *encr; in ikev2_derive_keys() local 47 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys() 48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys() 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys() 179 prop->encr = transform_id; in ikev2_parse_transform() 319 prop.encr = -1; in ikev2_process_sai1() 326 prop.encr != -1 && prop.dh != -1) { in ikev2_process_sai1() 347 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1() 653 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth() 862 WPA_PUT_BE16(t->transform_id, data->proposal.encr); in ikev2_build_sar1() [all …]
|
D | eap_eke.c | 32 u8 encr; /* forced encryption algorithm or 0 to allow all supported */ member 109 data->encr = atoi(pos + 5); in eap_eke_init() 111 data->encr); in eap_eke_init() 175 static int eap_eke_supp_encr(u8 encr) in eap_eke_supp_encr() argument 177 return encr == EAP_EKE_ENCR_AES128_CBC; in eap_eke_supp_encr() 270 if ((data->encr && data->encr != *tmp) || in eap_eke_process_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
D | driver_ndis.c | 616 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr) in ndis_set_encr_status() argument 618 u32 encr_status = encr; in ndis_set_encr_status() 622 "OID_802_11_ENCRYPTION_STATUS (%d)", encr); in ndis_set_encr_status() 631 u32 encr; in ndis_get_encr_status() local 634 (char *) &encr, sizeof(encr)); in ndis_get_encr_status() 635 if (res != sizeof(encr)) { in ndis_get_encr_status() 640 return encr; in ndis_get_encr_status() 1053 u32 auth_mode, encr, priv_mode, mode; in wpa_driver_ndis_associate() local 1142 encr = Ndis802_11Encryption3Enabled; in wpa_driver_ndis_associate() 1145 encr = Ndis802_11Encryption2Enabled; in wpa_driver_ndis_associate() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
D | driver_ndis.c | 616 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr) in ndis_set_encr_status() argument 618 u32 encr_status = encr; in ndis_set_encr_status() 622 "OID_802_11_ENCRYPTION_STATUS (%d)", encr); in ndis_set_encr_status() 631 u32 encr; in ndis_get_encr_status() local 634 (char *) &encr, sizeof(encr)); in ndis_get_encr_status() 635 if (res != sizeof(encr)) { in ndis_get_encr_status() 640 return encr; in ndis_get_encr_status() 1041 u32 auth_mode, encr, priv_mode, mode; in wpa_driver_ndis_associate() local 1130 encr = Ndis802_11Encryption3Enabled; in wpa_driver_ndis_associate() 1133 encr = Ndis802_11Encryption2Enabled; in wpa_driver_ndis_associate() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
D | wps_common.c | 155 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr, in wps_decrypt_encr_settings() argument 165 if (encr == NULL || encr_len < 2 * block_size || encr_len % block_size) in wps_decrypt_encr_settings() 175 wpa_hexdump(MSG_MSGDUMP, "WPS: Encrypted Settings", encr, encr_len); in wps_decrypt_encr_settings() 176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings() 177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
D | wps_common.c | 155 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr, in wps_decrypt_encr_settings() argument 165 if (encr == NULL || encr_len < 2 * block_size || encr_len % block_size) in wps_decrypt_encr_settings() 175 wpa_hexdump(MSG_MSGDUMP, "WPS: Encrypted Settings", encr, encr_len); in wps_decrypt_encr_settings() 176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings() 177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings()
|