/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_eke_common.h | 64 u8 encr; member in struct:eap_eke_session 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
|
H A D | eap_eke_common.c | 42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr) argument 47 if (dhlen < 0 || encr != EAP_EKE_ENCR_AES128_CBC) 359 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) 387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC || !dh) 440 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) 590 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) 644 if (sess->encr == EAP_EKE_ENCR_AES128_CBC) 699 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, argument 703 sess->encr = encr; [all...] |
H A D | eap_sim_common.c | 496 struct eap_sim_attrs *attr, int aka, int encr) 563 if (!encr) { 568 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING"); 571 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " 575 "(encr) padding bytes", 671 if (!encr) { 677 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid " 683 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d", 687 if (!encr) { 693 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invali 495 eap_sim_parse_attr(const u8 *start, const u8 *end, struct eap_sim_attrs *attr, int aka, int encr) argument 976 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg [all...] |
H A D | ikev2_common.h | 330 const struct ikev2_encr_alg *encr,
|
H A D | eap_sim_common.h | 205 struct eap_sim_attrs *attr, int aka, int encr);
|
H A D | ikev2_common.c | 189 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 224 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 631 const struct ikev2_encr_alg *encr, 645 keys->SK_encr_len = encr->key_len; 629 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_tls.c | 271 struct wpabuf *plain, *encr; local 286 encr = eap_server_tls_encrypt(sm, &data->ssl, plain); 288 if (!encr) 290 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) { 293 wpabuf_free(encr); 296 wpabuf_put_buf(data->ssl.tls_out, encr); 298 "EAP-TLS: Data appended to the message", encr); 299 wpabuf_free(encr);
|
H A D | ikev2.h | 18 int encr; member in struct:ikev2_proposal_data
|
H A D | ikev2.c | 42 const struct ikev2_encr_alg *encr; local 51 encr = ikev2_get_encr(data->proposal.encr); 52 if (integ == NULL || prf == NULL || encr == NULL) { 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 164 transform_id == data->proposal.encr) { 185 prop->encr = transform_id; 327 prop.encr = -1; 334 prop.encr != -1 && prop.dh != -1) { 356 data->proposal.encr, dat [all...] |
H A D | eap_server_fast.c | 820 struct wpabuf *encr; local 824 encr = eap_server_tls_encrypt(sm, &data->ssl, plain); 827 if (!encr) 834 (int) wpabuf_len(encr), 837 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) { 840 wpabuf_free(encr); 843 wpabuf_put_buf(data->ssl.tls_out, encr); 844 wpabuf_free(encr); 848 data->ssl.tls_out = encr;
|
H A D | eap_server_teap.c | 791 struct wpabuf *encr; local 795 encr = eap_server_tls_encrypt(sm, &data->ssl, plain); 798 if (!encr) 804 (int) wpabuf_len(encr), 807 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) { 810 wpabuf_free(encr); 813 wpabuf_put_buf(data->ssl.tls_out, encr); 814 wpabuf_free(encr); 818 data->ssl.tls_out = encr;
|
H A D | eap_server_ikev2.c | 103 data->ikev2.proposal.encr = ENCR_AES_CBC;
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | ikev2.h | 18 int encr; member in struct:ikev2_proposal_data
|
H A D | ikev2.c | 38 const struct ikev2_encr_alg *encr; local 47 encr = ikev2_get_encr(data->proposal.encr); 48 if (integ == NULL || prf == NULL || encr == NULL) { 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 179 prop->encr = transform_id; 319 prop.encr = -1; 326 prop.encr != -1 && prop.dh != -1) { 347 data->proposal.encr, data->proposal.prf, 653 decrypted = ikev2_decrypt_payload(data->proposal.encr, [all...] |
H A D | eap_eke.c | 32 u8 encr; /* forced encryption algorithm or 0 to allow all supported */ member in struct:eap_eke_data 107 pos = os_strstr(phase1, "encr="); 109 data->encr = atoi(pos + 5); 110 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced encr %u", 111 data->encr); 175 static int eap_eke_supp_encr(u8 encr) argument 177 return encr == EAP_EKE_ENCR_AES128_CBC; 262 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u", 270 if ((data->encr && data->encr ! [all...] |
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | wps_hostapd.h | 34 const char *auth, const char *encr, const char *key);
|
H A D | wpa_auth_i.h | 280 int keyidx, int encr, int force_version);
|
H A D | wpa_auth.c | 1433 int keyidx, int encr, int force_version) 1465 "encr=%d)", 1471 pairwise, (unsigned long) kde_len, keyidx, encr); 1477 version == WPA_KEY_INFO_TYPE_AES_128_CMAC) && encr) { 1485 if (!mic_len && encr) 1501 if (encr && sm->wpa == WPA_VERSION_WPA2) 1532 if (kde && !encr) { 1559 } else if (encr && kde) { 1649 int keyidx, int encr) 1659 keyidx, encr, 1429 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument 1645 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument 3148 int wpa_ie_len, secure, keyidx, encr = 0; local 4988 int wpa_ie_len, secure, keyidx, encr = 0; local [all...] |
H A D | wps_hostapd.c | 1736 const char *auth, const char *encr, const char *key) 1758 if (encr) { 1759 if (os_strncmp(encr, "NONE", 4) == 0) 1761 else if (os_strncmp(encr, "TKIP", 4) == 0) 1763 else if (os_strncmp(encr, "CCMP", 4) == 0) 1735 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) argument
|
/freebsd-11-stable/contrib/wpa/src/drivers/ |
H A D | driver_ndis.c | 617 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr) argument 619 u32 encr_status = encr; 623 "OID_802_11_ENCRYPTION_STATUS (%d)", encr); 632 u32 encr; local 635 (char *) &encr, sizeof(encr)); 636 if (res != sizeof(encr)) { 641 return encr; 1042 u32 auth_mode, encr, priv_mode, mode; local 1131 encr [all...] |
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | wps_supplicant.h | 24 const char *encr; member in struct:wps_new_ap_settings
|
H A D | wps_supplicant.c | 1392 settings->encr, settings->key_hex); 2084 settings->encr == NULL || settings->key_hex == NULL) 2109 if (os_strcmp(settings->encr, "NONE") == 0) 2112 else if (os_strcmp(settings->encr, "WEP") == 0) 2115 else if (os_strcmp(settings->encr, "TKIP") == 0) 2117 else if (os_strcmp(settings->encr, "CCMP") == 0)
|
/freebsd-11-stable/contrib/wpa/src/wps/ |
H A D | wps_common.c | 155 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr, argument 165 if (encr == NULL || encr_len < 2 * block_size || encr_len % block_size) 175 wpa_hexdump(MSG_MSGDUMP, "WPS: Encrypted Settings", encr, encr_len); 176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); 177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
|
H A D | wps_i.h | 139 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr,
|
/freebsd-11-stable/contrib/wpa/hostapd/ |
H A D | ctrl_iface.c | 501 char *ssid, *auth, *encr = NULL, *key = NULL; local 513 encr = pos; 521 return hostapd_wps_config_ap(hapd, ssid, auth, encr, key);
|