Searched refs:encr (Results 1 - 25 of 27) sorted by relevance

12

/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Deap_eke_common.h64 u8 encr; member in struct:eap_eke_session
81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
H A Deap_eke_common.c42 static int eap_eke_dhcomp_len(u8 dhgroup, u8 encr) argument
47 if (dhlen < 0 || encr != EAP_EKE_ENCR_AES128_CBC)
359 if (sess->encr != EAP_EKE_ENCR_AES128_CBC)
387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC || !dh)
440 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
590 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
644 if (sess->encr == EAP_EKE_ENCR_AES128_CBC)
699 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, argument
703 sess->encr = encr;
[all...]
H A Deap_sim_common.c496 struct eap_sim_attrs *attr, int aka, int encr)
563 if (!encr) {
568 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
571 wpa_printf(MSG_INFO, "EAP-SIM: (encr) "
575 "(encr) padding bytes",
671 if (!encr) {
677 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid "
683 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
687 if (!encr) {
693 wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invali
495 eap_sim_parse_attr(const u8 *start, const u8 *end, struct eap_sim_attrs *attr, int aka, int encr) argument
976 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg
[all...]
H A Dikev2_common.h330 const struct ikev2_encr_alg *encr,
H A Deap_sim_common.h205 struct eap_sim_attrs *attr, int aka, int encr);
H A Dikev2_common.c189 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
224 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
631 const struct ikev2_encr_alg *encr,
645 keys->SK_encr_len = encr->key_len;
629 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_tls.c271 struct wpabuf *plain, *encr; local
286 encr = eap_server_tls_encrypt(sm, &data->ssl, plain);
288 if (!encr)
290 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) {
293 wpabuf_free(encr);
296 wpabuf_put_buf(data->ssl.tls_out, encr);
298 "EAP-TLS: Data appended to the message", encr);
299 wpabuf_free(encr);
H A Dikev2.h18 int encr; member in struct:ikev2_proposal_data
H A Dikev2.c42 const struct ikev2_encr_alg *encr; local
51 encr = ikev2_get_encr(data->proposal.encr);
52 if (integ == NULL || prf == NULL || encr == NULL) {
113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
164 transform_id == data->proposal.encr) {
185 prop->encr = transform_id;
327 prop.encr = -1;
334 prop.encr != -1 && prop.dh != -1) {
356 data->proposal.encr, dat
[all...]
H A Deap_server_fast.c820 struct wpabuf *encr; local
824 encr = eap_server_tls_encrypt(sm, &data->ssl, plain);
827 if (!encr)
834 (int) wpabuf_len(encr),
837 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) {
840 wpabuf_free(encr);
843 wpabuf_put_buf(data->ssl.tls_out, encr);
844 wpabuf_free(encr);
848 data->ssl.tls_out = encr;
H A Deap_server_teap.c791 struct wpabuf *encr; local
795 encr = eap_server_tls_encrypt(sm, &data->ssl, plain);
798 if (!encr)
804 (int) wpabuf_len(encr),
807 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) {
810 wpabuf_free(encr);
813 wpabuf_put_buf(data->ssl.tls_out, encr);
814 wpabuf_free(encr);
818 data->ssl.tls_out = encr;
H A Deap_server_ikev2.c103 data->ikev2.proposal.encr = ENCR_AES_CBC;
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Dikev2.h18 int encr; member in struct:ikev2_proposal_data
H A Dikev2.c38 const struct ikev2_encr_alg *encr; local
47 encr = ikev2_get_encr(data->proposal.encr);
48 if (integ == NULL || prf == NULL || encr == NULL) {
109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
179 prop->encr = transform_id;
319 prop.encr = -1;
326 prop.encr != -1 && prop.dh != -1) {
347 data->proposal.encr, data->proposal.prf,
653 decrypted = ikev2_decrypt_payload(data->proposal.encr,
[all...]
H A Deap_eke.c32 u8 encr; /* forced encryption algorithm or 0 to allow all supported */ member in struct:eap_eke_data
107 pos = os_strstr(phase1, "encr=");
109 data->encr = atoi(pos + 5);
110 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced encr %u",
111 data->encr);
175 static int eap_eke_supp_encr(u8 encr) argument
177 return encr == EAP_EKE_ENCR_AES128_CBC;
262 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u",
270 if ((data->encr && data->encr !
[all...]
/freebsd-11-stable/contrib/wpa/src/ap/
H A Dwps_hostapd.h34 const char *auth, const char *encr, const char *key);
H A Dwpa_auth_i.h280 int keyidx, int encr, int force_version);
H A Dwpa_auth.c1433 int keyidx, int encr, int force_version)
1465 "encr=%d)",
1471 pairwise, (unsigned long) kde_len, keyidx, encr);
1477 version == WPA_KEY_INFO_TYPE_AES_128_CMAC) && encr) {
1485 if (!mic_len && encr)
1501 if (encr && sm->wpa == WPA_VERSION_WPA2)
1532 if (kde && !encr) {
1559 } else if (encr && kde) {
1649 int keyidx, int encr)
1659 keyidx, encr,
1429 __wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr, int force_version) argument
1645 wpa_send_eapol(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, int key_info, const u8 *key_rsc, const u8 *nonce, const u8 *kde, size_t kde_len, int keyidx, int encr) argument
3148 int wpa_ie_len, secure, keyidx, encr = 0; local
4988 int wpa_ie_len, secure, keyidx, encr = 0; local
[all...]
H A Dwps_hostapd.c1736 const char *auth, const char *encr, const char *key)
1758 if (encr) {
1759 if (os_strncmp(encr, "NONE", 4) == 0)
1761 else if (os_strncmp(encr, "TKIP", 4) == 0)
1763 else if (os_strncmp(encr, "CCMP", 4) == 0)
1735 hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid, const char *auth, const char *encr, const char *key) argument
/freebsd-11-stable/contrib/wpa/src/drivers/
H A Ddriver_ndis.c617 static int ndis_set_encr_status(struct wpa_driver_ndis_data *drv, int encr) argument
619 u32 encr_status = encr;
623 "OID_802_11_ENCRYPTION_STATUS (%d)", encr);
632 u32 encr; local
635 (char *) &encr, sizeof(encr));
636 if (res != sizeof(encr)) {
641 return encr;
1042 u32 auth_mode, encr, priv_mode, mode; local
1131 encr
[all...]
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Dwps_supplicant.h24 const char *encr; member in struct:wps_new_ap_settings
H A Dwps_supplicant.c1392 settings->encr, settings->key_hex);
2084 settings->encr == NULL || settings->key_hex == NULL)
2109 if (os_strcmp(settings->encr, "NONE") == 0)
2112 else if (os_strcmp(settings->encr, "WEP") == 0)
2115 else if (os_strcmp(settings->encr, "TKIP") == 0)
2117 else if (os_strcmp(settings->encr, "CCMP") == 0)
/freebsd-11-stable/contrib/wpa/src/wps/
H A Dwps_common.c155 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr, argument
165 if (encr == NULL || encr_len < 2 * block_size || encr_len % block_size)
175 wpa_hexdump(MSG_MSGDUMP, "WPS: Encrypted Settings", encr, encr_len);
176 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size);
177 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted),
H A Dwps_i.h139 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr,
/freebsd-11-stable/contrib/wpa/hostapd/
H A Dctrl_iface.c501 char *ssid, *auth, *encr = NULL, *key = NULL; local
513 encr = pos;
521 return hostapd_wps_config_ap(hapd, ssid, auth, encr, key);

Completed in 197 milliseconds

12