Searched refs:pairwise (Results 1 - 15 of 15) sorted by relevance

/freebsd-11-stable/contrib/wpa/wpa_supplicant/examples/
H A Dwpa-psk-tkip.conf9 pairwise=TKIP
H A Dwpa2-eap-ccmp.conf9 pairwise=CCMP
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf97 # key_mgmt, pairwise, group, proto variables
817 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not
934 # pairwise: list of accepted pairwise (unicast) ciphers for WPA
938 # pairwise keys)
1536 pairwise=CCMP TKIP
1547 pairwise=TKIP
1559 pairwise=CCMP TKIP
1628 # Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and
1635 pairwise
[all...]
H A Devents.c3174 int pairwise; local
3178 pairwise = (data && data->michael_mic_failure.unicast);
3196 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
3244 wpa_s->pending_mic_error_pairwise = pairwise;
3253 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
3256 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
H A Dctrl_iface.c4395 if (os_strcmp(field, "pairwise") == 0)
9243 int error, pairwise; local
9249 pairwise = atoi(pos);
9250 wpa_sm_key_request(wpa_s->wpa, error, pairwise);
H A Dconfig.c1131 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher "
1138 wpa_printf(MSG_MSGDUMP, "pairwise: 0x%x", val);
2234 { FUNC(pairwise) },
/freebsd-11-stable/contrib/wpa/src/ap/
H A Dwpa_auth_ft.c1173 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa
1191 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa
1323 const u8 *pmk_r0_name, int pairwise,
1344 r0->pairwise = pairwise;
1410 const u8 *pmk_r1_name, int pairwise,
1435 r1->pairwise = pairwise;
1476 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise,
1494 if (pairwise)
1320 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, size_t pmk_r0_len, const u8 *pmk_r0_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) argument
1407 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, size_t pmk_r1_len, const u8 *pmk_r1_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) argument
1474 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, struct vlan_description *vlan, const u8 **identity, size_t *identity_len, const u8 **radius_cui, size_t *radius_cui_len, int *session_timeout) argument
2684 int pairwise; local
2873 int pairwise, session_timeout = 0; local
3757 int pairwise; local
[all...]
H A Dwpa_auth.c854 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
857 "pairwise cipher is not TKIP");
1022 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
1049 if (sm->pairwise == WPA_CIPHER_CCMP ||
1050 sm->pairwise == WPA_CIPHER_GCMP) {
1441 int version, pairwise; local
1456 else if (sm->pairwise != WPA_CIPHER_TKIP)
1461 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
1464 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d "
1471 pairwise, (unsigne
1652 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local
4216 u32 pairwise = 0; local
[all...]
H A Dwpa_auth_i.h111 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
H A Dwpa_auth_ie.c54 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).",
139 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).",
754 wpa_printf(MSG_DEBUG, "Invalid %s pairwise cipher (0x%x) "
851 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
852 if (sm->pairwise < 0)
959 sm->pairwise = WPA_CIPHER_CCMP;
/freebsd-11-stable/contrib/wpa/src/drivers/
H A Ddriver_ndis.c905 const u8 *bssid, int pairwise)
915 if (pairwise)
921 if (!pairwise) {
935 int pairwise, int key_idx, int set_tx,
951 if (pairwise)
976 int res, pairwise; local
981 pairwise = 0;
986 pairwise = 1;
992 pairwise);
996 return wpa_driver_ndis_add_wep(drv, pairwise, key_id
903 wpa_driver_ndis_remove_key(struct wpa_driver_ndis_data *drv, int key_idx, const u8 *addr, const u8 *bssid, int pairwise) argument
934 wpa_driver_ndis_add_wep(struct wpa_driver_ndis_data *drv, int pairwise, int key_idx, int set_tx, const u8 *key, size_t key_len) argument
1530 int pairwise = 0, group = 0; local
[all...]
/freebsd-11-stable/contrib/wpa/src/rsn_supp/
H A Dwpa.h149 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
292 int pairwise)
291 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
H A Dwpa.c173 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet
179 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
219 if (pairwise)
236 "pairwise=%d ptk_set=%d len=%lu)",
237 error, pairwise, sm->ptk_set, (unsigned long) rlen);
801 "Suite: NONE - do not use pairwise keys");
807 "WPA: Unsupported pairwise cipher %d",
958 /* Ignore Tx bit for GTK if a pairwise key is used. One AP
964 "WPA: Tx bit set for GTK, but pairwise "
[all...]
/freebsd-11-stable/contrib/wpa/src/common/
H A Dwpa_common.c157 * to use AES Keywrap based on the negotiated pairwise cipher. This function
335 * @ptk: Buffer for pairwise transient key
337 * @cipher: Negotiated pairwise cipher
1274 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
1288 "pairwise cipher", __func__);
1446 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
2567 int pairwise = 0; local
2569 /* Select group cipher based on the enabled pairwise cipher suites */
2571 pairwise |= wpa_pairwise;
2573 pairwise |
[all...]
/freebsd-11-stable/contrib/wpa/wpa_supplicant/dbus/
H A Ddbus_new_handlers.c139 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap",
2619 /***** pairwise cipher */
4499 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ local
4594 pairwise[n++] = "tkip";
4596 pairwise[n++] = "ccmp";
4598 pairwise[n++] = "gcmp";
4600 pairwise[n++] = "ccmp-256";
4602 pairwise[n++] = "gcmp-256";
4605 pairwise,
[all...]

Completed in 464 milliseconds