Home
last modified time | relevance | path

Searched refs:encr (Results 1 – 5 of 5) sorted by relevance

/hal_espressif-latest/components/wpa_supplicant/src/wps/
Dwps_common.c161 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr, in wps_decrypt_encr_settings() argument
171 if (encr == NULL || encr_len < 2 * block_size || encr_len % block_size) in wps_decrypt_encr_settings()
181 wpa_hexdump(MSG_MSGDUMP, "WPS: Encrypted Settings", encr, encr_len); in wps_decrypt_encr_settings()
182 wpabuf_put_data(decrypted, encr + block_size, encr_len - block_size); in wps_decrypt_encr_settings()
183 if (aes_128_cbc_decrypt(wps->keywrapkey, encr, wpabuf_mhead(decrypted), in wps_decrypt_encr_settings()
Dwps_i.h140 struct wpabuf * wps_decrypt_encr_settings(struct wps_data *wps, const u8 *encr,
Dwps_registrar.c2489 static int wps_process_encr_type_flags(struct wps_data *wps, const u8 *encr) in wps_process_encr_type_flags() argument
2493 if (encr == NULL) { in wps_process_encr_type_flags()
2499 encr_types = WPA_GET_BE16(encr); in wps_process_encr_type_flags()
/hal_espressif-latest/components/wpa_supplicant/src/ap/
Dwpa_auth.c1010 int keyidx, int encr, int force_version) in __wpa_send_eapol() argument
1022 wpa_auth,sm, key_rsc, kde, nonce, kde_len, keyidx, encr, force_version); in __wpa_send_eapol()
1046 pairwise, (unsigned long) kde_len, keyidx, encr); in __wpa_send_eapol()
1052 version == WPA_KEY_INFO_TYPE_AES_128_CMAC) && encr) { in __wpa_send_eapol()
1072 if (encr && sm->wpa == WPA_VERSION_WPA2) in __wpa_send_eapol()
1101 if (kde && !encr) { in __wpa_send_eapol()
1104 } else if (encr && kde) { in __wpa_send_eapol()
1195 int keyidx, int encr) in wpa_send_eapol() argument
1204 keyidx, encr, 0); in wpa_send_eapol()
1807 int wpa_ie_len, secure, keyidx, encr = 0; in SM_STATE() local
[all …]
Dwpa_auth_i.h204 int keyidx, int encr, int force_version);