/hostap-latest/tests/hwsim/ |
D | test_suite_b.py | 73 pairwise="GCMP", group="GCMP", scan_freq="2412") 153 pairwise="GCMP", group="GCMP", scan_freq="2412") 194 pairwise="GCMP-256", group="GCMP-256", scan_freq="2412") 268 pairwise="GCMP-256", group="GCMP-256", scan_freq="2412") 301 pairwise="GCMP-256", group="GCMP-256", scan_freq="2412", 327 pairwise="GCMP", group="GCMP", scan_freq="2412") 344 pairwise="GCMP-256", group="GCMP-256", scan_freq="2412") 361 pairwise="GCMP", group="GCMP", scan_freq="2412", 380 pairwise="GCMP-256", group="GCMP-256", scan_freq="2412", 445 pairwise="GCMP-256", group="GCMP-256", scan_freq="2412") [all …]
|
D | test_ap_ciphers.py | 38 pairwise=cipher, group=group_cipher, scan_freq="2412") 61 pairwise="CCMP", group="CCMP", scan_freq="2412") 103 pairwise="TKIP", group="TKIP", scan_freq="2412") 143 pairwise="TKIP", group="TKIP", scan_freq="2412") 145 pairwise="CCMP", scan_freq="2412") 191 pairwise="TKIP", group="TKIP", scan_freq="2412") 227 pairwise="TKIP", group="TKIP", scan_freq="2412") 230 pairwise="TKIP", group="TKIP", scan_freq="2412") 259 pairwise="TKIP", group="TKIP", scan_freq="2412", 336 pairwise=cipher, group="CCMP", scan_freq="2412") [all …]
|
D | test_rsn_override.py | 112 pairwise="CCMP", ieee80211w="1", scan_freq="2412") 190 pairwise="GCMP-256 CCMP", wait_connect=not too_long_elems) 400 pairwise="GCMP-256", key_mgmt="SAE-EXT-KEY", 410 pairwise="CCMP", key_mgmt="SAE", 419 pairwise="CCMP", key_mgmt="WPA-PSK", 429 pairwise="CCMP", key_mgmt="WPA-PSK",
|
D | test_ibss.py | 51 def add_ibss(dev, ssid, psk=None, proto=None, key_mgmt=None, pairwise=None, argument 68 if pairwise: 69 dev.set_network(id, "pairwise", pairwise)
|
D | test_ap_mixed.py | 30 dev[0].connect(ssid, key_mgmt="WPA-PSK", proto="WPA", pairwise="TKIP",
|
D | test_wpas_mesh.py | 365 def add_mesh_secure_net(dev, psk=True, pmf=False, pairwise=None, group=None, argument 381 if pairwise: 382 dev.set_network(id, "pairwise", pairwise) 539 id = add_mesh_secure_net(dev[0], pairwise=cipher, group=cipher, pmf=pmf, 544 id = add_mesh_secure_net(dev[1], pairwise=cipher, group=cipher, pmf=pmf, 587 id = add_mesh_secure_net(dev[0], pairwise="TKIP", group="CCMP") 599 id = add_mesh_secure_net(dev[0], pairwise="CCMP", group="TKIP")
|
D | test_p2p_autogo.py | 344 key_mgmt='WPA-PSK', pairwise='CCMP', group='CCMP', 468 key_mgmt='WPA-PSK', pairwise='CCMP', group='CCMP', 920 key_mgmt='WPA-PSK', pairwise='CCMP', group='CCMP',
|
D | test_eht.py | 191 pairwise="GCMP-256", group="GCMP-256", 207 pairwise="GCMP-256", group="GCMP-256", 224 pairwise="GCMP-256", group="CCMP", 229 pairwise="CCMP", group="CCMP", 233 pairwise="CCMP", group="CCMP",
|
D | test_hapd_ctrl.py | 595 dev[0].connect(dst_ssid, psk=passphrase, proto="RSN", pairwise="CCMP", 637 dev[0].connect(dst_ssid, raw_psk=psk, proto="WPA", pairwise="TKIP",
|
D | test_ap_pmf.py | 1263 dev[0].connect("test-pmf", psk="12345678", pairwise="CCMP", ieee80211w="2", 1267 dev[1].connect("test-pmf", psk="12345678", proto="WPA", pairwise="TKIP", 1271 dev[2].connect("test-pmf", psk="12345678", pairwise="TKIP",
|
/hostap-latest/wpa_supplicant/ |
D | wpa_supplicant.conf | 1799 pairwise=CCMP TKIP 1810 pairwise=TKIP 1822 pairwise=CCMP TKIP 1898 pairwise=CCMP 2030 pairwise=CCMP 2041 pairwise=NONE 2069 pairwise=CCMP TKIP 2088 pairwise=CCMP TKIP
|
D | win_example.reg | 31 "pairwise"="CCMP"
|
/hostap-latest/src/ap/ |
D | wpa_auth_ft.c | 1209 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member 1227 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member 1359 const u8 *pmk_r0_name, int pairwise, in wpa_ft_store_pmk_r0() argument 1380 r0->pairwise = pairwise; in wpa_ft_store_pmk_r0() 1446 const u8 *pmk_r1_name, int pairwise, in wpa_ft_store_pmk_r1() argument 1471 r1->pairwise = pairwise; in wpa_ft_store_pmk_r1() 1512 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, in wpa_ft_fetch_pmk_r1() argument 1530 if (pairwise) in wpa_ft_fetch_pmk_r1() 1531 *pairwise = r1->pairwise; in wpa_ft_fetch_pmk_r1() 2109 pmk_r0_name, sm->pairwise, &vlan, expires_in, in wpa_ft_store_pmk_fils() [all …]
|
D | wpa_auth_ie.c | 124 int pairwise, int key_mgmt, u16 rsn_capab, in rsne_write_data() argument 152 res = rsn_cipher_put_suites(pos, pairwise); in rsne_write_data() 166 pairwise); in rsne_write_data() 1210 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie() 1211 if (sm->pairwise < 0) in wpa_validate_wpa_ie() 1225 if (sm->pairwise != assoc_sm->pairwise) in wpa_validate_wpa_ie() 1317 sm->pairwise != WPA_CIPHER_TKIP && in wpa_validate_wpa_ie() 1372 sm->pairwise = WPA_CIPHER_CCMP; in wpa_validate_osen()
|
D | wpa_auth.c | 1273 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { 1414 if (sm->pairwise != WPA_CIPHER_TKIP && 1979 int version, pairwise; local 1994 else if (sm->pairwise != WPA_CIPHER_TKIP) 1999 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); 2008 pairwise, kde_len, keyidx, encr); 2044 alg = pairwise ? sm->pairwise : conf->wpa_group; 2045 if (sm->wpa == WPA_VERSION_WPA2 && !pairwise) 2166 if (!pairwise && 2201 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local [all …]
|
D | wpa_auth_i.h | 122 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
|
/hostap-latest/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; in addNetwork() local 281 pairwise = "TKIP"; in addNetwork() 283 pairwise = "CCMP"; in addNetwork() 290 if (pairwise) { in addNetwork() 291 setNetworkParam(id, "pairwise", pairwise, false); in addNetwork()
|
/hostap-latest/src/drivers/ |
D | driver_ndis.c | 904 const u8 *bssid, int pairwise) in wpa_driver_ndis_remove_key() argument 914 if (pairwise) in wpa_driver_ndis_remove_key() 920 if (!pairwise) { in wpa_driver_ndis_remove_key() 934 int pairwise, int key_idx, int set_tx, in wpa_driver_ndis_add_wep() argument 950 if (pairwise) in wpa_driver_ndis_add_wep() 975 int res, pairwise; in wpa_driver_ndis_set_key() local 980 pairwise = 0; in wpa_driver_ndis_set_key() 985 pairwise = 1; in wpa_driver_ndis_set_key() 991 pairwise); in wpa_driver_ndis_set_key() 995 return wpa_driver_ndis_add_wep(drv, pairwise, key_idx, set_tx, in wpa_driver_ndis_set_key() [all …]
|
/hostap-latest/wpa_supplicant/examples/ |
D | wpa-psk-tkip.conf | 9 pairwise=TKIP
|
D | wpa2-eap-ccmp.conf | 9 pairwise=CCMP
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 68 pairwise=CCMP TKIP 160 pairwise=CCMP TKIP
|
/hostap-latest/src/rsn_supp/ |
D | wpa.h | 232 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 438 int pairwise) in wpa_sm_key_request() argument
|
/hostap-latest/src/common/ |
D | wpa_common.c | 3354 int pairwise = 0; in wpa_select_ap_group_cipher() local 3358 pairwise |= wpa_pairwise; in wpa_select_ap_group_cipher() 3360 pairwise |= rsn_pairwise; in wpa_select_ap_group_cipher() 3362 if (pairwise & WPA_CIPHER_TKIP) in wpa_select_ap_group_cipher() 3364 if ((pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP)) == WPA_CIPHER_GCMP) in wpa_select_ap_group_cipher() 3366 if ((pairwise & (WPA_CIPHER_GCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher() 3369 if ((pairwise & (WPA_CIPHER_CCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher()
|
/hostap-latest/wpa_supplicant/dbus/ |
D | dbus_new_handlers.c | 5426 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ in wpas_dbus_get_bss_security_prop() local 5538 pairwise[n++] = "tkip"; in wpas_dbus_get_bss_security_prop() 5541 pairwise[n++] = "ccmp"; in wpas_dbus_get_bss_security_prop() 5543 pairwise[n++] = "gcmp"; in wpas_dbus_get_bss_security_prop() 5545 pairwise[n++] = "ccmp-256"; in wpas_dbus_get_bss_security_prop() 5547 pairwise[n++] = "gcmp-256"; in wpas_dbus_get_bss_security_prop() 5550 pairwise, n)) in wpas_dbus_get_bss_security_prop()
|
/hostap-latest/hostapd/ |
D | README | 324 # Set of accepted cipher suites (encryption algorithms) for pairwise keys 330 # allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise,
|