HomeSort by: relevance | last modified time | path
    Searched defs:pairwise (Results 1 - 9 of 9) sorted by relevancy

  /src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local
281 pairwise = "TKIP";
283 pairwise = "CCMP";
290 if (pairwise) {
291 setNetworkParam(id, "pairwise", pairwise, false);
549 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
  /src/external/bsd/wpa/dist/src/common/
wpa_common.c 172 * to use AES Keywrap based on the negotiated pairwise cipher. This function
371 * @pmk: Pairwise master key
378 * @ptk: Buffer for pairwise transient key
380 * @cipher: Negotiated pairwise cipher
384 * IEEE Std 802.11i-2004 - 8.5.1.2 Pairwise key hierarchy
385 * PTK = PRF-X(PMK, "Pairwise key expansion",
1434 * on the pairwise cipher suite provided in the RSNE by the AP in the second
1448 * @pmk: Pairwise master key
1455 * @ptk: Buffer for pairwise transient key
1457 * @cipher: Negotiated pairwise ciphe
3346 int pairwise = 0; local
    [all...]
  /src/external/bsd/wpa/dist/src/ap/
wpa_auth_i.h 120 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
wpa_auth.c 1272 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
1274 "ignore Michael MIC failure report since pairwise cipher is not TKIP");
1413 if (sm->pairwise != WPA_CIPHER_TKIP &&
1613 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
1661 msgtxt = "4/4 Pairwise";
1664 msgtxt = "2/4 Pairwise";
1977 int version, pairwise; local
1992 else if (sm->pairwise != WPA_CIPHER_TKIP)
1997 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
2000 "WPA: Send EAPOL(version=%d secure=%d mic=%d ack=%d install=%d pairwise=%d kde_len=%zu keyidx=%d encr=%d)"
2199 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local
6058 u32 pairwise = 0; local
    [all...]
wpa_auth_ft.c 1209 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa
1227 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa
1359 const u8 *pmk_r0_name, int pairwise,
1380 r0->pairwise = pairwise;
1446 const u8 *pmk_r1_name, int pairwise,
1471 r1->pairwise = pairwise;
2990 int pairwise; local
3180 int pairwise, session_timeout = 0; local
4169 int pairwise; local
    [all...]
  /src/external/bsd/wpa/dist/wpa_supplicant/dbus/
dbus_new_handlers.c 140 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap",
3245 /***** pairwise cipher */
3254 &iter_dict, "Pairwise", args,
3258 if (!wpa_dbus_dict_begin_string_array(&iter_dict, "Pairwise",
5426 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ local
5534 /* Pairwise */
5538 pairwise[n++] = "tkip";
5541 pairwise[n++] = "ccmp";
5543 pairwise[n++] = "gcmp"
    [all...]
  /src/external/bsd/wpa/dist/wpa_supplicant/
events.c 3237 /* Update pairwise cipher from (Re)Association Request frame info */
3243 "WPA: AP pairwise cipher 0x%x network pairwise cipher 0x%x; available pairwise cipher 0x%x",
4677 int pairwise; local
4681 pairwise = (data && data->michael_mic_failure.unicast);
4699 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
4747 wpa_s->pending_mic_error_pairwise = pairwise;
4756 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
4759 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
    [all...]
ctrl_iface.c 4809 if (os_strcmp(field, "pairwise") == 0)
10313 int error, pairwise; local
10319 pairwise = atoi(pos);
10320 wpa_sm_key_request(wpa_s->wpa, error, pairwise);
  /src/external/bsd/wpa/dist/src/drivers/
driver_ndis.c 904 const u8 *bssid, int pairwise)
914 if (pairwise)
920 if (!pairwise) {
934 int pairwise, int key_idx, int set_tx,
950 if (pairwise)
975 int res, pairwise; local
980 pairwise = 0;
984 /* Pairwise Key */
985 pairwise = 1;
991 pairwise);
1541 int pairwise = 0, group = 0; local
    [all...]

Completed in 45 milliseconds