/external/wpa_supplicant_6/wpa_supplicant/examples/ |
wpa2-eap-ccmp.conf | 1 # WPA2-EAP/CCMP using EAP-TLS 9 pairwise=CCMP 10 group=CCMP
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpa2-eap-ccmp.conf | 1 # WPA2-EAP/CCMP using EAP-TLS 9 pairwise=CCMP 10 group=CCMP
|
/hardware/ti/wlan/wl1271/stad/src/Connection_Managment/ |
admCtrlWpa.c | 128 /* STA CCMP */ { TI_NOK, TWD_CIPHER_NONE, TWD_CIPHER_NONE ,0}, 135 /* STA CCMP */ { TI_NOK, TWD_CIPHER_NONE, TWD_CIPHER_NONE ,0}, 142 /* STA CCMP */ { TI_NOK, TWD_CIPHER_NONE, TWD_CIPHER_NONE ,0}, 149 /* STA CCMP */ { TI_NOK, TWD_CIPHER_NONE, TWD_CIPHER_NONE ,0}, 151 /* AP multicast CCMP */ { 156 /* STA CCMP */ { TI_OK, TWD_CIPHER_NONE, TWD_CIPHER_AES_CCMP ,3}, 163 /* STA CCMP */ { TI_NOK, TWD_CIPHER_NONE, TWD_CIPHER_NONE ,0}, 171 /* STA CCMP */ { TI_NOK, TWD_CIPHER_NONE, TWD_CIPHER_NONE ,0}, 178 /* STA CCMP */ { TI_OK, TWD_CIPHER_WEP, TWD_CIPHER_WEP ,1}, 185 /* STA CCMP */ { TI_NOK, TWD_CIPHER_NONE, TWD_CIPHER_NONE ,0} [all...] |
admCtrlWpa2.c | 136 /* STA CCMP */ { TI_NOK, TWD_CIPHER_NONE, TWD_CIPHER_NONE ,0}, 143 /* STA CCMP */ { TI_NOK, TWD_CIPHER_NONE, TWD_CIPHER_NONE ,0}, 150 /* STA CCMP */ { TI_NOK, TWD_CIPHER_NONE, TWD_CIPHER_NONE ,0}, 157 /* STA CCMP */ { TI_NOK, TWD_CIPHER_NONE, TWD_CIPHER_NONE ,0}, 159 /* AP multicast CCMP */ { 164 /* STA CCMP */ { TI_OK, TWD_CIPHER_NONE, TWD_CIPHER_AES_CCMP ,3}, 171 /* STA CCMP */ { TI_NOK, TWD_CIPHER_NONE, TWD_CIPHER_NONE ,0}, 179 /* STA CCMP */ { TI_NOK, TWD_CIPHER_NONE, TWD_CIPHER_NONE ,0}, 186 /* STA CCMP */ { TI_NOK, TWD_CIPHER_NONE, TWD_CIPHER_NONE ,0}, 193 /* STA CCMP */ { TI_NOK, TWD_CIPHER_NONE, TWD_CIPHER_NONE ,0} [all...] |
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.conf.sgml | 59 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers 64 pairwise=CCMP TKIP 65 group=CCMP TKIP 156 pairwise=CCMP TKIP 157 group=CCMP TKIP WEP104 WEP40
|
wpa_background.sgml | 75 support for more robust encryption algorithm (CCMP: AES in Counter
|
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_supplicant.conf.orig | 246 # and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). In addition, ap_scan has 248 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not 281 # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0] 285 # If not set, this defaults to: CCMP TKIP 288 # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0] 292 # If not set, this defaults to: CCMP TKIP WEP104 WEP40 532 pairwise=CCMP TKIP 533 group=CCMP TKIP WEP104 WEP40 549 # Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used WEP104 555 pairwise=CCMP TKI [all...] |
wps_supplicant.c | 97 int wpa2 = 0, ccmp = 0; local 100 * Many existing WPS APs do not know how to negotiate WPA2 or CCMP in 102 * TKIP+CCMP). Try to use scan results to figure out whether the AP 139 ccmp = 1; 144 ccmp = 1; 160 if (ccmp && !(ssid->pairwise_cipher & WPA_CIPHER_CCMP) && 163 wpa_printf(MSG_DEBUG, "WPS: Add CCMP into the credential "
|
config_ssid.h | 275 * static WEP) and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). In 278 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf | 306 # and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). WPA-None requires 308 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not 352 # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0] 356 # If not set, this defaults to: CCMP TKIP 359 # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0] 363 # If not set, this defaults to: CCMP TKIP WEP104 WEP40 613 pairwise=CCMP TKIP 614 group=CCMP TKIP WEP104 WEP40 630 # Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used WEP104 636 pairwise=CCMP TKI [all...] |
README-Windows.txt | 32 - WPA-PSK, TKIP, CCMP, TKIP+CCMP 33 - WPA-EAP, TKIP, CCMP, TKIP+CCMP 34 - WPA2-PSK, TKIP, CCMP, TKIP+CCMP 35 - WPA2-EAP, TKIP, CCMP, TKIP+CCMP
|
README-WPS | 167 wpa_cli wps_reg 02:34:56:78:9a:bc 12345670 testing WPA2PSK CCMP 12345678 171 <encr> must be one of the following: NONE WEP TKIP CCMP 263 wps_er_config 87654321-9abc-def0-1234-56789abc0002 12345670 testing WPA2PSK CCMP 12345678 267 <encr> must be one of the following: NONE WEP TKIP CCMP
|
wps_supplicant.c | 114 int wpa2 = 0, ccmp = 0; local 117 * Many existing WPS APs do not know how to negotiate WPA2 or CCMP in 119 * TKIP+CCMP). Try to use scan results to figure out whether the AP 142 ccmp = 1; 147 ccmp = 1; 163 if (ccmp && !(ssid->pairwise_cipher & WPA_CIPHER_CCMP) && 166 wpa_printf(MSG_DEBUG, "WPS: Add CCMP into the credential " [all...] |
/external/wpa_supplicant_8/hostapd/ |
README | 59 Authenticator and dynamic TKIP/CCMP keying. 240 - key management for CCMP, TKIP, WEP104, WEP40 303 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) 307 Some wireless LAN vendors are already providing support for CCMP in 309 certification for CCMP and/or mixed modes using both TKIP and CCMP, so 344 # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i] 347 # is automatically selected based on this configuration. If only CCMP is 348 # allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise, 350 #wpa_pairwise=TKIP CCMP [all...] |
README-WPS | 81 wpa_pairwise=CCMP 244 hostapd_cli wps_config testing WPA2PSK CCMP 12345678 248 <encr> must be one of the following: NONE WEP TKIP CCMP
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
Apple80211.h | 126 * multiCipher: CFNumber(kCFNumberSInt32Type); 0 = none, 5 = CCMP? 133 * cipherMode: CFNumber(kCFNumberSInt32Type); 0 = none, 4 = CCMP?
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui/ |
networkconfig.ui.h | 53 if (flags.find("-CCMP") >= 0) 89 encrSelect->insertItem("CCMP"); 170 pairwise = "CCMP"; 179 setNetworkParam(id, "group", "TKIP CCMP WEP104 WEP40", false); 364 if (strstr(reply, "CCMP") && auth != AUTH_NONE)
|
/frameworks/base/wifi/java/android/net/wifi/ |
WifiConfiguration.java | 204 public static final int CCMP = 2; 208 public static final String[] strings = { "NONE", "TKIP", "CCMP" }; 214 * CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0] 230 public static final int CCMP = 3; 234 public static final String[] strings = { "WEP40", "WEP104", "TKIP", "CCMP" }; 351 * Defaults to CCMP TKIP. 357 * Defaults to CCMP TKIP WEP104 WEP40.
|
/external/tcpdump/ |
print-decnet.c | 711 struct ccmsg *ccmp = (struct ccmsg *)nspp; local 720 TCHECK(*ccmp); 721 services = EXTRACT_LE_8BITS(ccmp->cc_services); 722 info = EXTRACT_LE_8BITS(ccmp->cc_info); 723 segsize = EXTRACT_LE_16BITS(ccmp->cc_segsize); 724 optlen = EXTRACT_LE_8BITS(ccmp->cc_optlen);
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 86 if (flags.indexOf("-CCMP") >= 0) 131 encrSelect->addItem("CCMP"); 269 pairwise = "CCMP"; 278 setNetworkParam(id, "group", "TKIP CCMP WEP104 WEP40", false); 539 if (strstr(reply, "CCMP") && auth != AUTH_NONE)
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 83 if (flags.indexOf("-CCMP") >= 0) 133 encrSelect->addItem("CCMP"); 282 pairwise = "CCMP"; 291 setNetworkParam(id, "group", "TKIP CCMP WEP104 WEP40", false); 552 if (strstr(reply, "CCMP") && auth != AUTH_NONE_OPEN &&
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.h | 214 * Group Suite Selector (4 octets) (default: CCMP) 216 * Pairwise Suite List (4 * n octets) (default: CCMP)
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 216 * Group Suite Selector (4 octets) (default: CCMP) 218 * Pairwise Suite List (4 * n octets) (default: CCMP)
|
/system/netd/ |
SoftapController.cpp | 302 asprintf(&fbuf, "%swpa=1\nwpa_pairwise=TKIP CCMP\nwpa_psk=%s\n", wbuf, psk_str); 305 asprintf(&fbuf, "%swpa=2\nrsn_pairwise=CCMP\nwpa_psk=%s\n", wbuf, psk_str);
|
/hardware/ti/wlan/wl1271/CUDK/configurationutility/src/ |
wpa_core.c | 681 os_sprintf(cmd, (PS8)"SET_NETWORK %d pairwise CCMP", NetworkID); 683 os_sprintf(cmd, (PS8)"SET_NETWORK %d pairwise CCMP TKIP", NetworkID); 701 os_sprintf(cmd, (PS8)"SET_NETWORK %d group CCMP", NetworkID); 703 os_sprintf(cmd, (PS8)"SET_NETWORK %d group CCMP TKIP", NetworkID);
|