Home
last modified time | relevance | path

Searched refs:encr (Results 1 – 25 of 34) sorted by relevance

12

/external/tcpdump/tests/
Dikev2pI2.out5 (t: #1 type=encr id=aes )
10 (t: #1 type=encr id=aes )
15 (t: #1 type=encr id=3des )
20 (t: #1 type=encr id=3des )
25 (t: #1 type=encr id=3des )
30 (t: #1 type=encr id=3des )
Dikev2four.out5 (t: #1 type=encr id=aes (type=keylen value=0080))
6 (t: #2 type=encr id=aes (type=keylen value=0100))
7 (t: #3 type=encr id=aes (type=keylen value=00c0))
8 (t: #4 type=encr id=3des )
29 (t: #1 type=encr id=aes (type=keylen value=0080))
30 (t: #2 type=encr id=aes (type=keylen value=0100))
31 (t: #3 type=encr id=aes (type=keylen value=00c0))
32 (t: #4 type=encr id=3des )
49 (t: #1 type=encr id=aes (type=keylen value=0080))
Dikev2fourv4.out5 (t: #1 type=encr id=aes (type=keylen value=0080))
6 (t: #2 type=encr id=aes (type=keylen value=0100))
7 (t: #3 type=encr id=aes (type=keylen value=00c0))
8 (t: #4 type=encr id=3des )
29 (t: #1 type=encr id=aes (type=keylen value=0080))
30 (t: #2 type=encr id=aes (type=keylen value=0100))
31 (t: #3 type=encr id=aes (type=keylen value=00c0))
32 (t: #4 type=encr id=3des )
49 (t: #1 type=encr id=aes (type=keylen value=0080))
Dikev2fourv.out5 (t: #1 type=encr id=aes (type=keylen value=0080))
6 (t: #2 type=encr id=aes (type=keylen value=0100))
7 (t: #3 type=encr id=aes (type=keylen value=00c0))
8 (t: #4 type=encr id=3des )
29 (t: #1 type=encr id=aes (type=keylen value=0080))
30 (t: #2 type=encr id=aes (type=keylen value=0100))
31 (t: #3 type=encr id=aes (type=keylen value=00c0))
32 (t: #4 type=encr id=3des )
49 (t: #1 type=encr id=aes (type=keylen value=0080))
Dikev2pI2-segfault-v.out5 (t: #1 type=encr id=#26380 )
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.cpp72 int auth, encr = 0; in paramsFromScanResults() local
85 encr = 1; in paramsFromScanResults()
87 encr = 0; in paramsFromScanResults()
89 encr = 1; in paramsFromScanResults()
93 encr = 0; in paramsFromScanResults()
97 encrSelect->setCurrentIndex(encr); in paramsFromScanResults()
279 int encr = encrSelect->currentIndex(); in addNetwork() local
280 if (encr == 0) in addNetwork()
534 int auth = AUTH_NONE_OPEN, encr = 0; in paramsFromConfig() local
545 encr = 1; in paramsFromConfig()
[all …]
Dwpagui.cpp591 QString encr; in updateStatus() local
594 encr.append(pairwise_cipher); in updateStatus()
595 encr.append(" + "); in updateStatus()
596 encr.append(group_cipher); in updateStatus()
598 encr.append(pairwise_cipher); in updateStatus()
600 encr.append(group_cipher); in updateStatus()
601 encr.append(" [group key only]"); in updateStatus()
603 textEncryption->setText(encr); in updateStatus()
/external/wpa_supplicant_8/src/eap_common/
Deap_eke_common.c42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr) in eap_eke_dhcomp_len() argument
47 if (dhlen < 0 || encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp_len()
382 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp()
410 if (sess->encr != EAP_EKE_ENCR_AES128_CBC || !dh) in eap_eke_shared_secret()
462 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) in eap_eke_derive_ke_ki()
612 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) in eap_eke_prot()
666 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) in eap_eke_decrypt_prot()
721 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, in eap_eke_session_init() argument
725 sess->encr = encr; in eap_eke_session_init()
732 sess->dhcomp_len = eap_eke_dhcomp_len(sess->dhgroup, sess->encr); in eap_eke_session_init()
Deap_sim_common.c498 struct eap_sim_attrs *attr, int aka, int encr) in eap_sim_parse_attr() argument
565 if (!encr) { in eap_sim_parse_attr()
673 if (!encr) { in eap_sim_parse_attr()
689 if (!encr) { in eap_sim_parse_attr()
705 if (!encr) { in eap_sim_parse_attr()
753 if (!encr) { in eap_sim_parse_attr()
773 if (!encr) { in eap_sim_parse_attr()
842 if (encr) { in eap_sim_parse_attr()
929 "(aka=%d encr=%d)", aka, encr); in eap_sim_parse_attr()
974 size_t mac, iv, encr; /* index from buf */ member
[all …]
Deap_eke_common.h64 u8 encr; member
81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
Dikev2_common.h330 const struct ikev2_encr_alg *encr,
Deap_sim_common.h205 struct eap_sim_attrs *attr, int aka, int encr);
/external/wpa_supplicant_8/src/eap_server/
Dikev2.c42 const struct ikev2_encr_alg *encr; in ikev2_derive_keys() local
51 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys()
52 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
164 transform_id == data->proposal.encr) { in ikev2_parse_transform()
185 prop->encr = transform_id; in ikev2_parse_transform()
327 prop.encr = -1; in ikev2_process_sar1()
334 prop.encr != -1 && prop.dh != -1) { in ikev2_process_sar1()
356 data->proposal.encr, data->proposal.prf, in ikev2_process_sar1()
456 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_init_encr()
[all …]
Deap_server_fast.c821 struct wpabuf *encr; in eap_fast_encrypt_phase2() local
825 encr = eap_server_tls_encrypt(sm, &data->ssl, plain); in eap_fast_encrypt_phase2()
828 if (!encr) in eap_fast_encrypt_phase2()
835 (int) wpabuf_len(encr), in eap_fast_encrypt_phase2()
838 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) { in eap_fast_encrypt_phase2()
841 wpabuf_free(encr); in eap_fast_encrypt_phase2()
844 wpabuf_put_buf(data->ssl.tls_out, encr); in eap_fast_encrypt_phase2()
845 wpabuf_free(encr); in eap_fast_encrypt_phase2()
849 data->ssl.tls_out = encr; in eap_fast_encrypt_phase2()
Dikev2.h18 int encr; member
/external/wpa_supplicant_8/src/eap_peer/
Dikev2.c38 const struct ikev2_encr_alg *encr; in ikev2_derive_keys() local
47 encr = ikev2_get_encr(data->proposal.encr); in ikev2_derive_keys()
48 if (integ == NULL || prf == NULL || encr == NULL) { in ikev2_derive_keys()
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, in ikev2_derive_keys()
179 prop->encr = transform_id; in ikev2_parse_transform()
319 prop.encr = -1; in ikev2_process_sai1()
326 prop.encr != -1 && prop.dh != -1) { in ikev2_process_sai1()
347 data->proposal.encr, data->proposal.prf, in ikev2_process_sai1()
654 decrypted = ikev2_decrypt_payload(data->proposal.encr, in ikev2_process_sa_auth()
863 WPA_PUT_BE16(t->transform_id, data->proposal.encr); in ikev2_build_sar1()
[all …]
Deap_eke.c32 u8 encr; /* forced encryption algorithm or 0 to allow all supported */ member
110 data->encr = atoi(pos + 5); in eap_eke_init()
112 data->encr); in eap_eke_init()
176 static int eap_eke_supp_encr(u8 encr) in eap_eke_supp_encr() argument
178 return encr == EAP_EKE_ENCR_AES128_CBC; in eap_eke_supp_encr()
271 if ((data->encr && data->encr != *tmp) || in eap_eke_process_id()
Dikev2.h18 int encr; member
/external/wpa_supplicant_8/src/drivers/
Ddriver_ndis.c616 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr) in ndis_set_encr_status() argument
618 u32 encr_status = encr; in ndis_set_encr_status()
622 "OID_802_11_ENCRYPTION_STATUS (%d)", encr); in ndis_set_encr_status()
631 u32 encr; in ndis_get_encr_status() local
634 (char *) &encr, sizeof(encr)); in ndis_get_encr_status()
635 if (res != sizeof(encr)) { in ndis_get_encr_status()
640 return encr; in ndis_get_encr_status()
1041 u32 auth_mode, encr, priv_mode, mode; in wpa_driver_ndis_associate() local
1130 encr = Ndis802_11Encryption3Enabled; in wpa_driver_ndis_associate()
1133 encr = Ndis802_11Encryption2Enabled; in wpa_driver_ndis_associate()
[all …]
/external/wpa_supplicant_8/src/wps/
Dwps_common.c155 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr, in wps_decrypt_encr_settings() argument
165 if (encr == NULL || encr_len < 2 * block_size || encr_len % block_size) in wps_decrypt_encr_settings()
175 wpa_hexdump(MSG_MSGDUMP, "WPS: Encrypted Settings", encr, encr_len); in wps_decrypt_encr_settings()
176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings()
177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings()
/external/wpa_supplicant_8/src/ap/
Dwps_hostapd.h34 const char *auth, const char *encr, const char *key);
Dwpa_auth.c1403 int keyidx, int encr, int force_version) in __wpa_send_eapol() argument
1443 pairwise, (unsigned long) kde_len, keyidx, encr); in __wpa_send_eapol()
1450 version == WPA_KEY_INFO_TYPE_AES_128_CMAC) && encr) { in __wpa_send_eapol()
1458 if (!mic_len && encr) in __wpa_send_eapol()
1474 if (encr && sm->wpa == WPA_VERSION_WPA2) in __wpa_send_eapol()
1507 if (kde && !encr) { in __wpa_send_eapol()
1534 } else if (encr && kde) { in __wpa_send_eapol()
1616 int keyidx, int encr) in wpa_send_eapol() argument
1626 keyidx, encr, 0); in wpa_send_eapol()
2703 int wpa_ie_len, secure, keyidx, encr = 0; in SM_STATE() local
[all …]
Dwpa_auth_i.h225 int keyidx, int encr, int force_version);
/external/wpa_supplicant_8/wpa_supplicant/
Dwps_supplicant.h24 const char *encr; member
DREADME-WPS174 wpa_cli wps_reg <AP BSSID> <AP PIN> <new SSID> <auth> <encr> <new key>
180 <encr> must be one of the following: NONE WEP TKIP CCMP
270 wps_er_config <UUID|BSSID> <AP PIN> <new SSID> <auth> <encr> <new key>
276 <encr> must be one of the following: NONE WEP TKIP CCMP

12