/freebsd-11-stable/contrib/wpa/wpa_supplicant/examples/ |
H A D | wpa-psk-tkip.conf | 9 pairwise=TKIP
|
H A D | wpa2-eap-ccmp.conf | 9 pairwise=CCMP
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 97 # key_mgmt, pairwise, group, proto variables 817 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not 934 # pairwise: list of accepted pairwise (unicast) ciphers for WPA 938 # pairwise keys) 1536 pairwise=CCMP TKIP 1547 pairwise=TKIP 1559 pairwise=CCMP TKIP 1628 # Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and 1635 pairwise [all...] |
H A D | events.c | 3174 int pairwise; local 3178 pairwise = (data && data->michael_mic_failure.unicast); 3196 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 3244 wpa_s->pending_mic_error_pairwise = pairwise; 3253 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 3256 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
|
H A D | ctrl_iface.c | 4395 if (os_strcmp(field, "pairwise") == 0) 9243 int error, pairwise; local 9249 pairwise = atoi(pos); 9250 wpa_sm_key_request(wpa_s->wpa, error, pairwise);
|
H A D | config.c | 1131 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher " 1138 wpa_printf(MSG_MSGDUMP, "pairwise: 0x%x", val); 2234 { FUNC(pairwise) },
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | wpa_auth_ft.c | 1173 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa 1191 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa 1323 const u8 *pmk_r0_name, int pairwise, 1344 r0->pairwise = pairwise; 1410 const u8 *pmk_r1_name, int pairwise, 1435 r1->pairwise = pairwise; 1476 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, 1494 if (pairwise) 1320 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, size_t pmk_r0_len, const u8 *pmk_r0_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) argument 1407 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, size_t pmk_r1_len, const u8 *pmk_r1_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) argument 1474 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, struct vlan_description *vlan, const u8 **identity, size_t *identity_len, const u8 **radius_cui, size_t *radius_cui_len, int *session_timeout) argument 2684 int pairwise; local 2873 int pairwise, session_timeout = 0; local 3757 int pairwise; local [all...] |
H A D | wpa_auth.c | 854 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { 857 "pairwise cipher is not TKIP"); 1022 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys 1049 if (sm->pairwise == WPA_CIPHER_CCMP || 1050 sm->pairwise == WPA_CIPHER_GCMP) { 1441 int version, pairwise; local 1456 else if (sm->pairwise != WPA_CIPHER_TKIP) 1461 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); 1464 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d " 1471 pairwise, (unsigne 1652 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local 4216 u32 pairwise = 0; local [all...] |
H A D | wpa_auth_i.h | 111 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
|
H A D | wpa_auth_ie.c | 54 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 139 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 754 wpa_printf(MSG_DEBUG, "Invalid %s pairwise cipher (0x%x) " 851 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); 852 if (sm->pairwise < 0) 959 sm->pairwise = WPA_CIPHER_CCMP;
|
/freebsd-11-stable/contrib/wpa/src/drivers/ |
H A D | driver_ndis.c | 905 const u8 *bssid, int pairwise) 915 if (pairwise) 921 if (!pairwise) { 935 int pairwise, int key_idx, int set_tx, 951 if (pairwise) 976 int res, pairwise; local 981 pairwise = 0; 986 pairwise = 1; 992 pairwise); 996 return wpa_driver_ndis_add_wep(drv, pairwise, key_id 903 wpa_driver_ndis_remove_key(struct wpa_driver_ndis_data *drv, int key_idx, const u8 *addr, const u8 *bssid, int pairwise) argument 934 wpa_driver_ndis_add_wep(struct wpa_driver_ndis_data *drv, int pairwise, int key_idx, int set_tx, const u8 *key, size_t key_len) argument 1530 int pairwise = 0, group = 0; local [all...] |
/freebsd-11-stable/contrib/wpa/src/rsn_supp/ |
H A D | wpa.h | 149 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 292 int pairwise) 291 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
|
H A D | wpa.c | 173 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet 179 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument 219 if (pairwise) 236 "pairwise=%d ptk_set=%d len=%lu)", 237 error, pairwise, sm->ptk_set, (unsigned long) rlen); 801 "Suite: NONE - do not use pairwise keys"); 807 "WPA: Unsupported pairwise cipher %d", 958 /* Ignore Tx bit for GTK if a pairwise key is used. One AP 964 "WPA: Tx bit set for GTK, but pairwise " [all...] |
/freebsd-11-stable/contrib/wpa/src/common/ |
H A D | wpa_common.c | 157 * to use AES Keywrap based on the negotiated pairwise cipher. This function 335 * @ptk: Buffer for pairwise transient key 337 * @cipher: Negotiated pairwise cipher 1274 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 1288 "pairwise cipher", __func__); 1446 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 2567 int pairwise = 0; local 2569 /* Select group cipher based on the enabled pairwise cipher suites */ 2571 pairwise |= wpa_pairwise; 2573 pairwise | [all...] |
/freebsd-11-stable/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers.c | 139 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap", 2619 /***** pairwise cipher */ 4499 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ local 4594 pairwise[n++] = "tkip"; 4596 pairwise[n++] = "ccmp"; 4598 pairwise[n++] = "gcmp"; 4600 pairwise[n++] = "ccmp-256"; 4602 pairwise[n++] = "gcmp-256"; 4605 pairwise, [all...] |