/external/autotest/server/cros/ap_configurators/ |
dlink_dir505l_ap_configurator.py | 196 wpa_item = 'WPA2 Only'
|
dlinkwbr1310_ap_configurator.py | 190 wpa_item = 'Enable WPA2 Wireless Security (enhanced)'
|
keeboxw150nr_ap_configurator.py | 223 self.select_item_from_popup_by_id('WPA2 Only', 'security_type')
|
levelone_ap_configurator.py | 162 wpa_item = 'WPA2-PSK'
|
linksys_ap_configurator.py | 188 wpa_item = 'WPA2 Personal'
|
linksyswrt600_ap_configurator.py | 178 wpa_item = ' WPA2-Personal'
|
netgear_single_band_configurator.py | 160 xpath = '//input[@name="security_type" and @value="WPA2-PSK"]'
|
trendnet654tr_ap_configurator.py | 156 wpa_item = 'Enable WPA2 Wireless Security ( enhanced )'
|
trendnet692gr_ap_configurator.py | 188 wpa_item = 'WPA2-PSK'
|
trendnet731br_ap_configurator.py | 135 self.select_item_from_popup_by_id(' WPA2 ','wep_type')
|
trendnet812dru_ap_configurator.py | 146 wpa_item = 'WPA2-PSK'
|
trendnet_ap_configurator.py | 201 wpa_item = 'WPA2-PSK'
|
/external/autotest/server/site_tests/network_WiFi_PMKSACaching/ |
network_WiFi_PMKSACaching.py | 70 # PMKSA caching is only defined for WPA2.
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_i.h | 100 WPA_VERSION_WPA2 = 2 /* WPA2 / IEEE 802.11i */
|
/external/wpa_supplicant_8/wpa_supplicant/ |
todo.txt | 8 - if driver/hw is not WPA2 capable, must remove WPA_PROTO_RSN flag from
|
ChangeLog | 194 * removed support for WEP40/WEP104 as a group cipher with WPA/WPA2 333 * modified WPS to merge mixed-WPA/WPA2 credentials from a single session 475 stronger password-based authentication with WPA2-Personal 590 WPA/WPA2-Personal configuration 631 * added "wpa_cli status wps" command to fetch WPA2-Personal passhrase [all...] |
README | 91 - RSN/WPA2 (IEEE 802.11i) 127 Linux drivers that support WPA/WPA2 configuration with the generic 148 is to add full WPA/WPA2 support to Linux wireless extensions to allow 241 IEEE 802.11i / WPA2 247 version of WPA called WPA2. This includes, e.g., support for more 477 -c wpa2.conf -i wlan1 -D wext 493 -M -c wpa2.conf 518 file, network security level (WPA/WPA2 is preferred), and signal [all...] |
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/util/ |
InformationElementUtilTest.java | 270 assertEquals("[WPA2-PSK-CCMP+TKIP]", result); 296 assertEquals("[WPA2]", result); 386 assertEquals("[WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP]", result); 418 assertEquals("[WPA][WPA2]", result); [all...] |
/packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/model/ |
WifiInfoTest.java | 33 private static final String TEST_SECURITY_TYPE = "WPA2";
|
/packages/apps/ManagedProvisioning/tests/robotests/src/com/android/managedprovisioning/model/ |
WifiInfoRoboTest.java | 40 private static final String TEST_SECURITY_TYPE = "WPA2";
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | [all...] |
/device/google/marlin/ |
wpa_supplicant_wcn.conf | 250 # RSN = WPA2/IEEE 802.11i (also WPA2 can be used as an alias for RSN) 264 # OPEN = Open System authentication (required for WPA/WPA2) 310 # Enable/disable opportunistic PMKSA caching for WPA2. 319 # allowed. This is only used with RSN/WPA2. 689 ## EAP-FAST with WPA (WPA or WPA2)
|
/device/google/wahoo/ |
wpa_supplicant_wcn.conf | 250 # RSN = WPA2/IEEE 802.11i (also WPA2 can be used as an alias for RSN) 264 # OPEN = Open System authentication (required for WPA/WPA2) 310 # Enable/disable opportunistic PMKSA caching for WPA2. 319 # allowed. This is only used with RSN/WPA2. 689 ## EAP-FAST with WPA (WPA or WPA2)
|
/external/autotest/server/cros/network/ |
chaos_clique_utils.py | 262 # We have only seen WPA2 be backwards compatible, and we want 264 # promote this to WPA2 only.
|
/external/syslinux/gpxe/src/include/gpxe/ |
wpa.h | 45 /** Key descriptor version, indicating WPA or WPA2 */ 79 /** Key descriptor version field value for WPA2 (CCMP) */
|