Home
last modified time | relevance | path

Searched refs:pairwise (Results 1 – 25 of 119) sorted by relevance

12345

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dwpa_supplicant.conf1706 pairwise=CCMP TKIP
1717 pairwise=TKIP
1729 pairwise=CCMP TKIP
1805 pairwise=CCMP
1937 pairwise=CCMP
1948 pairwise=NONE
1976 pairwise=CCMP TKIP
1995 pairwise=CCMP TKIP
Dwin_example.reg31 "pairwise"="CCMP"
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Dwpa_supplicant.conf1548 pairwise=CCMP TKIP
1559 pairwise=TKIP
1571 pairwise=CCMP TKIP
1647 pairwise=CCMP
1779 pairwise=CCMP
1790 pairwise=NONE
1818 pairwise=CCMP TKIP
1837 pairwise=CCMP TKIP
Dwin_example.reg31 "pairwise"="CCMP"
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dwpa_auth_ft.c1173 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
1191 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
1323 const u8 *pmk_r0_name, int pairwise, in wpa_ft_store_pmk_r0() argument
1344 r0->pairwise = pairwise; in wpa_ft_store_pmk_r0()
1410 const u8 *pmk_r1_name, int pairwise, in wpa_ft_store_pmk_r1() argument
1435 r1->pairwise = pairwise; in wpa_ft_store_pmk_r1()
1476 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, in wpa_ft_fetch_pmk_r1() argument
1494 if (pairwise) in wpa_ft_fetch_pmk_r1()
1495 *pairwise = r1->pairwise; in wpa_ft_fetch_pmk_r1()
2072 pmk_r0_name, sm->pairwise, &vlan, expires_in, in wpa_ft_store_pmk_fils()
[all …]
Dwpa_auth.c860 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { in wpa_receive_error_report()
1055 if (sm->pairwise == WPA_CIPHER_CCMP || in wpa_receive()
1056 sm->pairwise == WPA_CIPHER_GCMP) { in wpa_receive()
1447 int version, pairwise; in __wpa_send_eapol() local
1462 else if (sm->pairwise != WPA_CIPHER_TKIP) in __wpa_send_eapol()
1467 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); in __wpa_send_eapol()
1477 pairwise, (unsigned long) kde_len, keyidx, encr); in __wpa_send_eapol()
1513 alg = pairwise ? sm->pairwise : wpa_auth->conf.wpa_group; in __wpa_send_eapol()
1514 if (sm->wpa == WPA_VERSION_WPA2 && !pairwise) in __wpa_send_eapol()
1632 if (!pairwise && in __wpa_send_eapol()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dwpa_auth_ft.c1175 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
1193 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
1325 const u8 *pmk_r0_name, int pairwise, in wpa_ft_store_pmk_r0() argument
1346 r0->pairwise = pairwise; in wpa_ft_store_pmk_r0()
1412 const u8 *pmk_r1_name, int pairwise, in wpa_ft_store_pmk_r1() argument
1437 r1->pairwise = pairwise; in wpa_ft_store_pmk_r1()
1478 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, in wpa_ft_fetch_pmk_r1() argument
1496 if (pairwise) in wpa_ft_fetch_pmk_r1()
1497 *pairwise = r1->pairwise; in wpa_ft_fetch_pmk_r1()
2075 pmk_r0_name, sm->pairwise, &vlan, expires_in, in wpa_ft_store_pmk_fils()
[all …]
Dwpa_auth.c920 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { in wpa_receive_error_report()
1126 if (sm->pairwise == WPA_CIPHER_CCMP || in wpa_receive()
1127 sm->pairwise == WPA_CIPHER_GCMP) { in wpa_receive()
1510 int version, pairwise; in __wpa_send_eapol() local
1525 else if (sm->pairwise != WPA_CIPHER_TKIP) in __wpa_send_eapol()
1530 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); in __wpa_send_eapol()
1539 pairwise, kde_len, keyidx, encr); in __wpa_send_eapol()
1575 alg = pairwise ? sm->pairwise : conf->wpa_group; in __wpa_send_eapol()
1576 if (sm->wpa == WPA_VERSION_WPA2 && !pairwise) in __wpa_send_eapol()
1693 if (!pairwise && in __wpa_send_eapol()
[all …]
Dwpa_auth_ie.c912 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie()
913 if (sm->pairwise < 0) in wpa_validate_wpa_ie()
997 sm->pairwise != WPA_CIPHER_TKIP && in wpa_validate_wpa_ie()
1052 sm->pairwise = WPA_CIPHER_CCMP; in wpa_validate_osen()
/third_party/skia/gn/
Dcompile_sksl_tests.py22 def pairwise(iterable): function
64 for input, targetDir in pairwise(inputs):
/third_party/ffmpeg/libavutil/x86/
Dlls.asm57 ; Compute all 3 pairwise products of a 2x2 block that lies on the diagonal
73 ; Compute all 16 pairwise products of a 4x4 block
135 ; Compute all 10 pairwise products of a 4x4 block that lies on the diagonal
167 ; Compute all 16 pairwise products of a 4x4 block
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.cpp244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; in addNetwork() local
281 pairwise = "TKIP"; in addNetwork()
283 pairwise = "CCMP"; in addNetwork()
290 if (pairwise) { in addNetwork()
291 setNetworkParam(id, "pairwise", pairwise, false); in addNetwork()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.cpp244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; in addNetwork() local
281 pairwise = "TKIP"; in addNetwork()
283 pairwise = "CCMP"; in addNetwork()
290 if (pairwise) { in addNetwork()
291 setNetworkParam(id, "pairwise", pairwise, false); in addNetwork()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/
Ddriver_ndis.c904 const u8 *bssid, int pairwise) in wpa_driver_ndis_remove_key() argument
914 if (pairwise) in wpa_driver_ndis_remove_key()
920 if (!pairwise) { in wpa_driver_ndis_remove_key()
934 int pairwise, int key_idx, int set_tx, in wpa_driver_ndis_add_wep() argument
950 if (pairwise) in wpa_driver_ndis_add_wep()
975 int res, pairwise; in wpa_driver_ndis_set_key() local
980 pairwise = 0; in wpa_driver_ndis_set_key()
985 pairwise = 1; in wpa_driver_ndis_set_key()
991 pairwise); in wpa_driver_ndis_set_key()
995 return wpa_driver_ndis_add_wep(drv, pairwise, key_idx, set_tx, in wpa_driver_ndis_set_key()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/
Ddriver_ndis.c904 const u8 *bssid, int pairwise) in wpa_driver_ndis_remove_key() argument
914 if (pairwise) in wpa_driver_ndis_remove_key()
920 if (!pairwise) { in wpa_driver_ndis_remove_key()
934 int pairwise, int key_idx, int set_tx, in wpa_driver_ndis_add_wep() argument
950 if (pairwise) in wpa_driver_ndis_add_wep()
975 int res, pairwise; in wpa_driver_ndis_set_key() local
980 pairwise = 0; in wpa_driver_ndis_set_key()
985 pairwise = 1; in wpa_driver_ndis_set_key()
991 pairwise); in wpa_driver_ndis_set_key()
995 return wpa_driver_ndis_add_wep(drv, pairwise, key_idx, set_tx, in wpa_driver_ndis_set_key()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/examples/
Dwpa-psk-tkip.conf9 pairwise=TKIP
Dwpa2-eap-ccmp.conf9 pairwise=CCMP
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/examples/
Dwpa-psk-tkip.conf9 pairwise=TKIP
Dwpa2-eap-ccmp.conf9 pairwise=CCMP
/third_party/python/Lib/test/
Dtest_itertools.py1030 self.assertEqual(list(pairwise('')), [])
1031 self.assertEqual(list(pairwise('a')), [])
1032 self.assertEqual(list(pairwise('ab')),
1034 self.assertEqual(list(pairwise('abcde')),
1036 self.assertEqual(list(pairwise(range(10_000))),
1040 pairwise() # too few arguments
1042 pairwise('abc', 10) # too many arguments
1044 pairwise(iterable='abc') # keyword arguments
1046 pairwise(None) # non-iterable argument
1859 self.makecycle(pairwise([a]*5), a)
[all …]
/third_party/typescript/tests/baselines/reference/
DgenericCallWithOverloadedFunctionTypedArguments2.errors.txt6 // Inferences are made quadratic-pairwise to and from these overload sets
DgenericCallWithOverloadedConstructorTypedArguments2.errors.txt6 // Inferences are made quadratic-pairwise to and from these overload sets
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
Dwpa_common.c2567 int pairwise = 0; in wpa_select_ap_group_cipher() local
2571 pairwise |= wpa_pairwise; in wpa_select_ap_group_cipher()
2573 pairwise |= rsn_pairwise; in wpa_select_ap_group_cipher()
2575 if (pairwise & WPA_CIPHER_TKIP) in wpa_select_ap_group_cipher()
2577 if ((pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP)) == WPA_CIPHER_GCMP) in wpa_select_ap_group_cipher()
2579 if ((pairwise & (WPA_CIPHER_GCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher()
2582 if ((pairwise & (WPA_CIPHER_CCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml68 pairwise=CCMP TKIP
160 pairwise=CCMP TKIP
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml64 pairwise=CCMP TKIP
156 pairwise=CCMP TKIP

12345