Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching defs:cipher

153  * Management Group Cipher Suite (4 octets) (default: AES-128-CMAC)
229 * wpa_cipher_txt - Convert cipher suite to a text string
230 * @cipher: Cipher suite (WPA_CIPHER_* enum)
231 * Returns: Pointer to a text string of the cipher suite name
233 static const char * wpa_cipher_txt(int cipher)
235 switch (cipher) {
524 "cipher", __func__);
554 "pairwise cipher", __func__);
612 "group cipher 0x%x", __func__,
678 wpa_printf(MSG_WARNING, "Invalid group cipher (%d).",
693 wpa_printf(MSG_WARNING, "Invalid pairwise cipher (%d).",
755 wpa_printf(MSG_WARNING, "Invalid group cipher (%d).",
770 wpa_printf(MSG_WARNING, "Invalid pairwise cipher (%d).",
816 /* Management Group Cipher Suite */
1619 wpa_printf(MSG_DEBUG, "WPA: Pairwise Cipher Suite: "
1623 wpa_printf(MSG_WARNING, "WPA: Unsupported pairwise cipher %d",
1685 wpa_printf(MSG_WARNING, "WPA: Unsupported Group Cipher %d",
1691 wpa_printf(MSG_WARNING, "WPA: Unsupported %s Group Cipher key "
2257 int cipher;
2296 cipher = ie.pairwise_cipher & ssid->pairwise_cipher;
2297 if (cipher & WPA_CIPHER_CCMP) {
2299 cipher = WPA_CIPHER_CCMP;
2300 } else if (cipher & WPA_CIPHER_TKIP) {
2302 cipher = WPA_CIPHER_TKIP;
2304 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2");
2322 peerkey->cipher = cipher;
2339 /* Include only the selected cipher in pairwise cipher suite */
2342 if (cipher == WPA_CIPHER_CCMP)
2344 else if (cipher == WPA_CIPHER_TKIP)
2412 if (peerkey->cipher == WPA_CIPHER_CCMP)
2420 if (peerkey->cipher == WPA_CIPHER_CCMP)
2471 if (peerkey->cipher == WPA_CIPHER_CCMP)
2480 if (peerkey->cipher == WPA_CIPHER_CCMP)
2552 int cipher;
2581 cipher = ie.pairwise_cipher & ssid->pairwise_cipher;
2582 if (cipher & WPA_CIPHER_CCMP) {
2584 peerkey->cipher = WPA_CIPHER_CCMP;
2585 } else if (cipher & WPA_CIPHER_TKIP) {
2587 peerkey->cipher = WPA_CIPHER_TKIP;
2590 " selected unacceptable cipher",
2919 if (peerkey->cipher == WPA_CIPHER_TKIP) {
2930 if (wpa_sm_set_key(sm, peerkey->cipher, peerkey->addr, 0, 1,
2950 if (wpa_sm_set_key(sm, peerkey->cipher, peerkey->addr, 0, 1,
2952 peerkey->cipher == WPA_CIPHER_TKIP ? 32 : 16) < 0) {
3634 static int wpa_cipher_bits(int cipher)
3636 switch (cipher) {
3671 static const u8 * wpa_cipher_suite(struct wpa_sm *sm, int cipher)
3674 switch (cipher) {