Searched refs:encrypted (Results 1 – 12 of 12) sorted by relevance
/hostap-3.6.0/src/eap_common/ |
D | ikev2_common.c | 322 payloads->encrypted = pdata; in ikev2_parse_payloads() 431 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload() argument 443 if (encrypted == NULL) { in ikev2_decrypt_payload() 467 iv = encrypted; in ikev2_decrypt_payload() 469 end = encrypted + encrypted_len; in ikev2_decrypt_payload()
|
D | ikev2_common.h | 310 const u8 *encrypted; member 322 const u8 *encrypted, size_t encrypted_len,
|
/hostap-3.6.0/src/eap_server/ |
D | ikev2.c | 448 const u8 *encrypted, in ikev2_process_sa_init_encr() argument 458 hdr, encrypted, encrypted_len, in ikev2_process_sa_init_encr() 495 if (pl->encrypted) { in ikev2_process_sa_init() 498 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted, in ikev2_process_sa_init() 721 &data->keys, 0, hdr, pl->encrypted, in ikev2_process_sa_auth()
|
/hostap-3.6.0/src/eap_peer/ |
D | eap.h | 338 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
|
D | ikev2.c | 657 &data->keys, 1, hdr, pl->encrypted, in ikev2_process_sa_auth()
|
D | eap.c | 1670 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted) in eap_sm_buildIdentity() argument 1688 } else if (!encrypted && config->anonymous_identity) { in eap_sm_buildIdentity()
|
/hostap-3.6.0/wpa_supplicant/ |
D | todo.txt | 70 - add support for encrypted configuration fields (e.g., password, psk,
|
D | README | 573 unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
|
D | ChangeLog | 2037 packets to be encrypted; this was apparently broken by the changed
|
/hostap-3.6.0/hostapd/ |
D | hostapd.eap_user | 15 # is transmitted only within the encrypted tunnel in phase 2. If non-anonymous
|
/hostap-3.6.0/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 104 within an encrypted TLS tunnel.</para>
|
D | wpa_supplicant.sgml | 655 encrypted passwords.</para></listitem>
|