Home
last modified time | relevance | path

Searched refs:pairwise (Results 1 – 25 of 44) sorted by relevance

12

/hostap-latest/tests/hwsim/
Dtest_suite_b.py73 pairwise="GCMP", group="GCMP", scan_freq="2412")
153 pairwise="GCMP", group="GCMP", scan_freq="2412")
194 pairwise="GCMP-256", group="GCMP-256", scan_freq="2412")
268 pairwise="GCMP-256", group="GCMP-256", scan_freq="2412")
301 pairwise="GCMP-256", group="GCMP-256", scan_freq="2412",
327 pairwise="GCMP", group="GCMP", scan_freq="2412")
344 pairwise="GCMP-256", group="GCMP-256", scan_freq="2412")
361 pairwise="GCMP", group="GCMP", scan_freq="2412",
380 pairwise="GCMP-256", group="GCMP-256", scan_freq="2412",
445 pairwise="GCMP-256", group="GCMP-256", scan_freq="2412")
[all …]
Dtest_ap_ciphers.py38 pairwise=cipher, group=group_cipher, scan_freq="2412")
61 pairwise="CCMP", group="CCMP", scan_freq="2412")
103 pairwise="TKIP", group="TKIP", scan_freq="2412")
143 pairwise="TKIP", group="TKIP", scan_freq="2412")
145 pairwise="CCMP", scan_freq="2412")
191 pairwise="TKIP", group="TKIP", scan_freq="2412")
227 pairwise="TKIP", group="TKIP", scan_freq="2412")
230 pairwise="TKIP", group="TKIP", scan_freq="2412")
259 pairwise="TKIP", group="TKIP", scan_freq="2412",
336 pairwise=cipher, group="CCMP", scan_freq="2412")
[all …]
Dtest_rsn_override.py112 pairwise="CCMP", ieee80211w="1", scan_freq="2412")
190 pairwise="GCMP-256 CCMP", wait_connect=not too_long_elems)
400 pairwise="GCMP-256", key_mgmt="SAE-EXT-KEY",
410 pairwise="CCMP", key_mgmt="SAE",
419 pairwise="CCMP", key_mgmt="WPA-PSK",
429 pairwise="CCMP", key_mgmt="WPA-PSK",
Dtest_ibss.py51 def add_ibss(dev, ssid, psk=None, proto=None, key_mgmt=None, pairwise=None, argument
68 if pairwise:
69 dev.set_network(id, "pairwise", pairwise)
Dtest_ap_mixed.py30 dev[0].connect(ssid, key_mgmt="WPA-PSK", proto="WPA", pairwise="TKIP",
Dtest_wpas_mesh.py365 def add_mesh_secure_net(dev, psk=True, pmf=False, pairwise=None, group=None, argument
381 if pairwise:
382 dev.set_network(id, "pairwise", pairwise)
539 id = add_mesh_secure_net(dev[0], pairwise=cipher, group=cipher, pmf=pmf,
544 id = add_mesh_secure_net(dev[1], pairwise=cipher, group=cipher, pmf=pmf,
587 id = add_mesh_secure_net(dev[0], pairwise="TKIP", group="CCMP")
599 id = add_mesh_secure_net(dev[0], pairwise="CCMP", group="TKIP")
Dtest_p2p_autogo.py344 key_mgmt='WPA-PSK', pairwise='CCMP', group='CCMP',
468 key_mgmt='WPA-PSK', pairwise='CCMP', group='CCMP',
920 key_mgmt='WPA-PSK', pairwise='CCMP', group='CCMP',
Dtest_eht.py191 pairwise="GCMP-256", group="GCMP-256",
207 pairwise="GCMP-256", group="GCMP-256",
224 pairwise="GCMP-256", group="CCMP",
229 pairwise="CCMP", group="CCMP",
233 pairwise="CCMP", group="CCMP",
Dtest_hapd_ctrl.py595 dev[0].connect(dst_ssid, psk=passphrase, proto="RSN", pairwise="CCMP",
637 dev[0].connect(dst_ssid, raw_psk=psk, proto="WPA", pairwise="TKIP",
Dtest_ap_pmf.py1263 dev[0].connect("test-pmf", psk="12345678", pairwise="CCMP", ieee80211w="2",
1267 dev[1].connect("test-pmf", psk="12345678", proto="WPA", pairwise="TKIP",
1271 dev[2].connect("test-pmf", psk="12345678", pairwise="TKIP",
/hostap-latest/wpa_supplicant/
Dwpa_supplicant.conf1799 pairwise=CCMP TKIP
1810 pairwise=TKIP
1822 pairwise=CCMP TKIP
1898 pairwise=CCMP
2030 pairwise=CCMP
2041 pairwise=NONE
2069 pairwise=CCMP TKIP
2088 pairwise=CCMP TKIP
Dwin_example.reg31 "pairwise"="CCMP"
/hostap-latest/src/ap/
Dwpa_auth_ft.c1209 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
1227 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
1359 const u8 *pmk_r0_name, int pairwise, in wpa_ft_store_pmk_r0() argument
1380 r0->pairwise = pairwise; in wpa_ft_store_pmk_r0()
1446 const u8 *pmk_r1_name, int pairwise, in wpa_ft_store_pmk_r1() argument
1471 r1->pairwise = pairwise; in wpa_ft_store_pmk_r1()
1512 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, in wpa_ft_fetch_pmk_r1() argument
1530 if (pairwise) in wpa_ft_fetch_pmk_r1()
1531 *pairwise = r1->pairwise; in wpa_ft_fetch_pmk_r1()
2109 pmk_r0_name, sm->pairwise, &vlan, expires_in, in wpa_ft_store_pmk_fils()
[all …]
Dwpa_auth_ie.c124 int pairwise, int key_mgmt, u16 rsn_capab, in rsne_write_data() argument
152 res = rsn_cipher_put_suites(pos, pairwise); in rsne_write_data()
166 pairwise); in rsne_write_data()
1210 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie()
1211 if (sm->pairwise < 0) in wpa_validate_wpa_ie()
1225 if (sm->pairwise != assoc_sm->pairwise) in wpa_validate_wpa_ie()
1317 sm->pairwise != WPA_CIPHER_TKIP && in wpa_validate_wpa_ie()
1372 sm->pairwise = WPA_CIPHER_CCMP; in wpa_validate_osen()
Dwpa_auth.c1273 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
1414 if (sm->pairwise != WPA_CIPHER_TKIP &&
1979 int version, pairwise; local
1994 else if (sm->pairwise != WPA_CIPHER_TKIP)
1999 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
2008 pairwise, kde_len, keyidx, encr);
2044 alg = pairwise ? sm->pairwise : conf->wpa_group;
2045 if (sm->wpa == WPA_VERSION_WPA2 && !pairwise)
2166 if (!pairwise &&
2201 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local
[all …]
Dwpa_auth_i.h122 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
/hostap-latest/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.cpp244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; in addNetwork() local
281 pairwise = "TKIP"; in addNetwork()
283 pairwise = "CCMP"; in addNetwork()
290 if (pairwise) { in addNetwork()
291 setNetworkParam(id, "pairwise", pairwise, false); in addNetwork()
/hostap-latest/src/drivers/
Ddriver_ndis.c904 const u8 *bssid, int pairwise) in wpa_driver_ndis_remove_key() argument
914 if (pairwise) in wpa_driver_ndis_remove_key()
920 if (!pairwise) { in wpa_driver_ndis_remove_key()
934 int pairwise, int key_idx, int set_tx, in wpa_driver_ndis_add_wep() argument
950 if (pairwise) in wpa_driver_ndis_add_wep()
975 int res, pairwise; in wpa_driver_ndis_set_key() local
980 pairwise = 0; in wpa_driver_ndis_set_key()
985 pairwise = 1; in wpa_driver_ndis_set_key()
991 pairwise); in wpa_driver_ndis_set_key()
995 return wpa_driver_ndis_add_wep(drv, pairwise, key_idx, set_tx, in wpa_driver_ndis_set_key()
[all …]
/hostap-latest/wpa_supplicant/examples/
Dwpa-psk-tkip.conf9 pairwise=TKIP
Dwpa2-eap-ccmp.conf9 pairwise=CCMP
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml68 pairwise=CCMP TKIP
160 pairwise=CCMP TKIP
/hostap-latest/src/rsn_supp/
Dwpa.h232 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
438 int pairwise) in wpa_sm_key_request() argument
/hostap-latest/src/common/
Dwpa_common.c3354 int pairwise = 0; in wpa_select_ap_group_cipher() local
3358 pairwise |= wpa_pairwise; in wpa_select_ap_group_cipher()
3360 pairwise |= rsn_pairwise; in wpa_select_ap_group_cipher()
3362 if (pairwise & WPA_CIPHER_TKIP) in wpa_select_ap_group_cipher()
3364 if ((pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP)) == WPA_CIPHER_GCMP) in wpa_select_ap_group_cipher()
3366 if ((pairwise & (WPA_CIPHER_GCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher()
3369 if ((pairwise & (WPA_CIPHER_CCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher()
/hostap-latest/wpa_supplicant/dbus/
Ddbus_new_handlers.c5426 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ in wpas_dbus_get_bss_security_prop() local
5538 pairwise[n++] = "tkip"; in wpas_dbus_get_bss_security_prop()
5541 pairwise[n++] = "ccmp"; in wpas_dbus_get_bss_security_prop()
5543 pairwise[n++] = "gcmp"; in wpas_dbus_get_bss_security_prop()
5545 pairwise[n++] = "ccmp-256"; in wpas_dbus_get_bss_security_prop()
5547 pairwise[n++] = "gcmp-256"; in wpas_dbus_get_bss_security_prop()
5550 pairwise, n)) in wpas_dbus_get_bss_security_prop()
/hostap-latest/hostapd/
DREADME324 # Set of accepted cipher suites (encryption algorithms) for pairwise keys
330 # allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise,

12