Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 12 of 12) sorted by relevance

/hostap-3.6.0/src/eap_common/
Dikev2_common.c322 payloads->encrypted = pdata; in ikev2_parse_payloads()
431 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload() argument
443 if (encrypted == NULL) { in ikev2_decrypt_payload()
467 iv = encrypted; in ikev2_decrypt_payload()
469 end = encrypted + encrypted_len; in ikev2_decrypt_payload()
Dikev2_common.h310 const u8 *encrypted; member
322 const u8 *encrypted, size_t encrypted_len,
/hostap-3.6.0/src/eap_server/
Dikev2.c448 const u8 *encrypted, in ikev2_process_sa_init_encr() argument
458 hdr, encrypted, encrypted_len, in ikev2_process_sa_init_encr()
495 if (pl->encrypted) { in ikev2_process_sa_init()
498 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted, in ikev2_process_sa_init()
721 &data->keys, 0, hdr, pl->encrypted, in ikev2_process_sa_auth()
/hostap-3.6.0/src/eap_peer/
Deap.h338 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
Dikev2.c657 &data->keys, 1, hdr, pl->encrypted, in ikev2_process_sa_auth()
Deap.c1670 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted) in eap_sm_buildIdentity() argument
1688 } else if (!encrypted && config->anonymous_identity) { in eap_sm_buildIdentity()
/hostap-3.6.0/wpa_supplicant/
Dtodo.txt70 - add support for encrypted configuration fields (e.g., password, psk,
DREADME573 unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
DChangeLog2037 packets to be encrypted; this was apparently broken by the changed
/hostap-3.6.0/hostapd/
Dhostapd.eap_user15 # is transmitted only within the encrypted tunnel in phase 2. If non-anonymous
/hostap-3.6.0/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml104 within an encrypted TLS tunnel.</para>
Dwpa_supplicant.sgml655 encrypted passwords.</para></listitem>