/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpa2-eap-ccmp.conf | 1 # WPA2-EAP/CCMP using EAP-TLS 9 pairwise=CCMP 10 group=CCMP
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.conf.sgml | 59 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers 64 pairwise=CCMP TKIP 65 group=CCMP TKIP 156 pairwise=CCMP TKIP 157 group=CCMP TKIP WEP104 WEP40
|
wpa_background.sgml | 75 support for more robust encryption algorithm (CCMP: AES in Counter
|
/external/wpa_supplicant_8/wpa_supplicant/ |
README-Windows.txt | 27 - WPA-PSK, TKIP, CCMP, TKIP+CCMP 28 - WPA-EAP, TKIP, CCMP, TKIP+CCMP 29 - WPA2-PSK, TKIP, CCMP, TKIP+CCMP 30 - WPA2-EAP, TKIP, CCMP, TKIP+CCMP
|
README-HS20 | 342 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP] 383 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP] 394 pairwise_cipher=CCMP <--- link layer security indication 395 group_cipher=CCMP 424 pairwise_cipher (CCMP = secure, NONE = no encryption used). 431 02:00:00:00:01:00 2412 -30 [WPA2-EAP-CCMP][ESS][HS20] Example Network 448 flags=[WPA2-EAP-CCMP][ESS][HS20]
|
wpa_supplicant.conf | 508 # and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). WPA-None requires 510 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not 584 # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0] 588 # If not set, this defaults to: CCMP TKIP 591 # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0] 595 # If not set, this defaults to: CCMP TKIP WEP104 WEP40 [all...] |
README-WPS | 177 wpa_cli wps_reg 02:34:56:78:9a:bc 12345670 testing WPA2PSK CCMP 12345678 181 <encr> must be one of the following: NONE WEP TKIP CCMP 273 wps_er_config 87654321-9abc-def0-1234-56789abc0002 12345670 testing WPA2PSK CCMP 12345678 277 <encr> must be one of the following: NONE WEP TKIP CCMP
|
README | 88 - key management for CCMP, TKIP, WEP104, WEP40 252 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) 523 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers 528 pairwise=CCMP TKIP 529 group=CCMP TKIP 605 pairwise=CCMP TKIP 606 group=CCMP TKIP WEP104 WEP40 [all...] |
config_ssid.h | 314 * static WEP) and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). In 317 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
wps_supplicant.c | 149 int wpa2 = 0, ccmp = 0; local 152 * Many existing WPS APs do not know how to negotiate WPA2 or CCMP in 154 * TKIP+CCMP). Try to use scan results to figure out whether the AP 177 ccmp = 1; 182 ccmp = 1; 198 if (ccmp && !(ssid->pairwise_cipher & WPA_CIPHER_CCMP) && 201 wpa_printf(MSG_DEBUG, "WPS: Add CCMP into the credential " [all...] |
/external/wpa_supplicant_8/hostapd/ |
README | 59 Authenticator and dynamic TKIP/CCMP keying. 240 - key management for CCMP, TKIP, WEP104, WEP40 303 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) 307 Some wireless LAN vendors are already providing support for CCMP in 309 certification for CCMP and/or mixed modes using both TKIP and CCMP, so 344 # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i] 347 # is automatically selected based on this configuration. If only CCMP is 348 # allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise, 350 #wpa_pairwise=TKIP CCMP [all...] |
README-WPS | 85 wpa_pairwise=CCMP 248 hostapd_cli wps_config testing WPA2PSK CCMP 12345678 252 <encr> must be one of the following: NONE WEP TKIP CCMP
|
/system/netd/ |
SoftapController.cpp | 147 asprintf(&fbuf, "%swpa=1\nwpa_pairwise=TKIP CCMP\nwpa_psk=%s\n", wbuf, psk_str); 150 asprintf(&fbuf, "%swpa=2\nrsn_pairwise=CCMP\nwpa_psk=%s\n", wbuf, psk_str);
|
/frameworks/base/wifi/java/android/net/wifi/ |
WifiConfiguration.java | 121 public static final int CCMP = 2; 125 public static final String[] strings = { "NONE", "TKIP", "CCMP" }; 131 * CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0] 147 public static final int CCMP = 3; 151 public static final String[] strings = { "WEP40", "WEP104", "TKIP", "CCMP" }; 270 * Defaults to CCMP TKIP. 276 * Defaults to CCMP TKIP WEP104 WEP40.
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/functional/ |
WifiAssociationTest.java | 188 config.allowedPairwiseCiphers.set(PairwiseCipher.CCMP); 189 config.allowedGroupCiphers.set(GroupCipher.CCMP);
|
/external/tcpdump/ |
print-decnet.c | 711 struct ccmsg *ccmp = (struct ccmsg *)nspp; local 720 TCHECK(*ccmp); 721 services = EXTRACT_LE_8BITS(ccmp->cc_services); 722 info = EXTRACT_LE_8BITS(ccmp->cc_info); 723 segsize = EXTRACT_LE_16BITS(ccmp->cc_segsize); 724 optlen = EXTRACT_LE_8BITS(ccmp->cc_optlen);
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 83 if (flags.indexOf("-CCMP") >= 0) 133 encrSelect->addItem("CCMP"); 282 pairwise = "CCMP"; 291 setNetworkParam(id, "group", "TKIP CCMP WEP104 WEP40", false); 552 if (strstr(reply, "CCMP") && auth != AUTH_NONE_OPEN &&
|
networkconfig.ui | 126 <string>CCMP</string>
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 230 * Group Suite Selector (4 octets) (default: CCMP) 232 * Pairwise Suite List (4 * n octets) (default: CCMP)
|
wpa_common.c | 910 return "CCMP"; 912 return "CCMP+TKIP"; 1283 if (os_strcmp(start, "CCMP") == 0) [all...] |
/external/llvm/test/MC/AArch64/ |
basic-a64-diagnostics.s | [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_old_handlers.c | 539 const char *args[] = {"CCMP", "TKIP", "NONE"}; 554 &iter_array, "CCMP")) 581 "CCMP", "TKIP", "WEP104", "WEP40" 597 &iter_array, "CCMP")) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 108 u8 tk[16]; /* TPK-TK; assuming only CCMP will be used */ 961 * AES-CCMP is the default Encryption preferred for TDLS, so 962 * RSN IE is filled only with CCMP CIPHER 965 * Regardless of the cipher used on the AP connection, select CCMP [all...] |
/external/chromium_org/third_party/harfbuzz-ng/src/ |
hb-ot-shape-complex-sea.cc | 89 /* The Indic specs do not require ccmp, but we apply it here since if
|
/external/harfbuzz_ng/src/ |
hb-ot-shape-complex-sea.cc | 89 /* The Indic specs do not require ccmp, but we apply it here since if
|