HomeSort by relevance Sort by last modified time
    Searched full:ccmp (Results 1 - 25 of 70) sorted by null

1 2 3

  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpa2-eap-ccmp.conf 1 # WPA2-EAP/CCMP using EAP-TLS
9 pairwise=CCMP
10 group=CCMP
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_supplicant.conf.sgml 59 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
64 pairwise=CCMP TKIP
65 group=CCMP TKIP
156 pairwise=CCMP TKIP
157 group=CCMP TKIP WEP104 WEP40
wpa_background.sgml 75 support for more robust encryption algorithm (CCMP: AES in Counter
  /external/wpa_supplicant_8/wpa_supplicant/
README-Windows.txt 27 - WPA-PSK, TKIP, CCMP, TKIP+CCMP
28 - WPA-EAP, TKIP, CCMP, TKIP+CCMP
29 - WPA2-PSK, TKIP, CCMP, TKIP+CCMP
30 - WPA2-EAP, TKIP, CCMP, TKIP+CCMP
README-HS20 342 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP]
383 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP]
394 pairwise_cipher=CCMP <--- link layer security indication
395 group_cipher=CCMP
424 pairwise_cipher (CCMP = secure, NONE = no encryption used).
431 02:00:00:00:01:00 2412 -30 [WPA2-EAP-CCMP][ESS][HS20] Example Network
448 flags=[WPA2-EAP-CCMP][ESS][HS20]
wpa_supplicant.conf 508 # and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). WPA-None requires
510 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not
584 # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0]
588 # If not set, this defaults to: CCMP TKIP
591 # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0]
595 # If not set, this defaults to: CCMP TKIP WEP104 WEP40
    [all...]
README-WPS 177 wpa_cli wps_reg 02:34:56:78:9a:bc 12345670 testing WPA2PSK CCMP 12345678
181 <encr> must be one of the following: NONE WEP TKIP CCMP
273 wps_er_config 87654321-9abc-def0-1234-56789abc0002 12345670 testing WPA2PSK CCMP 12345678
277 <encr> must be one of the following: NONE WEP TKIP CCMP
README 88 - key management for CCMP, TKIP, WEP104, WEP40
252 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC)
523 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
528 pairwise=CCMP TKIP
529 group=CCMP TKIP
605 pairwise=CCMP TKIP
606 group=CCMP TKIP WEP104 WEP40
    [all...]
config_ssid.h 314 * static WEP) and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). In
317 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
wps_supplicant.c 149 int wpa2 = 0, ccmp = 0; local
152 * Many existing WPS APs do not know how to negotiate WPA2 or CCMP in
154 * TKIP+CCMP). Try to use scan results to figure out whether the AP
177 ccmp = 1;
182 ccmp = 1;
198 if (ccmp && !(ssid->pairwise_cipher & WPA_CIPHER_CCMP) &&
201 wpa_printf(MSG_DEBUG, "WPS: Add CCMP into the credential "
    [all...]
  /external/wpa_supplicant_8/hostapd/
README 59 Authenticator and dynamic TKIP/CCMP keying.
240 - key management for CCMP, TKIP, WEP104, WEP40
303 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC)
307 Some wireless LAN vendors are already providing support for CCMP in
309 certification for CCMP and/or mixed modes using both TKIP and CCMP, so
344 # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i]
347 # is automatically selected based on this configuration. If only CCMP is
348 # allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise,
350 #wpa_pairwise=TKIP CCMP
    [all...]
README-WPS 85 wpa_pairwise=CCMP
248 hostapd_cli wps_config testing WPA2PSK CCMP 12345678
252 <encr> must be one of the following: NONE WEP TKIP CCMP
  /system/netd/
SoftapController.cpp 147 asprintf(&fbuf, "%swpa=1\nwpa_pairwise=TKIP CCMP\nwpa_psk=%s\n", wbuf, psk_str);
150 asprintf(&fbuf, "%swpa=2\nrsn_pairwise=CCMP\nwpa_psk=%s\n", wbuf, psk_str);
  /frameworks/base/wifi/java/android/net/wifi/
WifiConfiguration.java 121 public static final int CCMP = 2;
125 public static final String[] strings = { "NONE", "TKIP", "CCMP" };
131 * CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0]
147 public static final int CCMP = 3;
151 public static final String[] strings = { "WEP40", "WEP104", "TKIP", "CCMP" };
270 * Defaults to CCMP TKIP.
276 * Defaults to CCMP TKIP WEP104 WEP40.
  /frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/functional/
WifiAssociationTest.java 188 config.allowedPairwiseCiphers.set(PairwiseCipher.CCMP);
189 config.allowedGroupCiphers.set(GroupCipher.CCMP);
  /external/tcpdump/
print-decnet.c 711 struct ccmsg *ccmp = (struct ccmsg *)nspp; local
720 TCHECK(*ccmp);
721 services = EXTRACT_LE_8BITS(ccmp->cc_services);
722 info = EXTRACT_LE_8BITS(ccmp->cc_info);
723 segsize = EXTRACT_LE_16BITS(ccmp->cc_segsize);
724 optlen = EXTRACT_LE_8BITS(ccmp->cc_optlen);
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 83 if (flags.indexOf("-CCMP") >= 0)
133 encrSelect->addItem("CCMP");
282 pairwise = "CCMP";
291 setNetworkParam(id, "group", "TKIP CCMP WEP104 WEP40", false);
552 if (strstr(reply, "CCMP") && auth != AUTH_NONE_OPEN &&
networkconfig.ui 126 <string>CCMP</string>
  /external/wpa_supplicant_8/src/common/
wpa_common.h 230 * Group Suite Selector (4 octets) (default: CCMP)
232 * Pairwise Suite List (4 * n octets) (default: CCMP)
wpa_common.c 910 return "CCMP";
912 return "CCMP+TKIP";
1283 if (os_strcmp(start, "CCMP") == 0)
    [all...]
  /external/llvm/test/MC/AArch64/
basic-a64-diagnostics.s     [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_old_handlers.c 539 const char *args[] = {"CCMP", "TKIP", "NONE"};
554 &iter_array, "CCMP"))
581 "CCMP", "TKIP", "WEP104", "WEP40"
597 &iter_array, "CCMP"))
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 108 u8 tk[16]; /* TPK-TK; assuming only CCMP will be used */
961 * AES-CCMP is the default Encryption preferred for TDLS, so
962 * RSN IE is filled only with CCMP CIPHER
965 * Regardless of the cipher used on the AP connection, select CCMP
    [all...]
  /external/chromium_org/third_party/harfbuzz-ng/src/
hb-ot-shape-complex-sea.cc 89 /* The Indic specs do not require ccmp, but we apply it here since if
  /external/harfbuzz_ng/src/
hb-ot-shape-complex-sea.cc 89 /* The Indic specs do not require ccmp, but we apply it here since if

Completed in 1906 milliseconds

1 2 3