/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | wpa_supplicant.conf | 1706 pairwise=CCMP TKIP 1717 pairwise=TKIP 1729 pairwise=CCMP TKIP 1805 pairwise=CCMP 1937 pairwise=CCMP 1948 pairwise=NONE 1976 pairwise=CCMP TKIP 1995 pairwise=CCMP TKIP
|
D | win_example.reg | 31 "pairwise"="CCMP"
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | wpa_supplicant.conf | 1548 pairwise=CCMP TKIP 1559 pairwise=TKIP 1571 pairwise=CCMP TKIP 1647 pairwise=CCMP 1779 pairwise=CCMP 1790 pairwise=NONE 1818 pairwise=CCMP TKIP 1837 pairwise=CCMP TKIP
|
D | win_example.reg | 31 "pairwise"="CCMP"
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | wpa_auth_ft.c | 1173 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member 1191 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member 1323 const u8 *pmk_r0_name, int pairwise, in wpa_ft_store_pmk_r0() argument 1344 r0->pairwise = pairwise; in wpa_ft_store_pmk_r0() 1410 const u8 *pmk_r1_name, int pairwise, in wpa_ft_store_pmk_r1() argument 1435 r1->pairwise = pairwise; in wpa_ft_store_pmk_r1() 1476 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, in wpa_ft_fetch_pmk_r1() argument 1494 if (pairwise) in wpa_ft_fetch_pmk_r1() 1495 *pairwise = r1->pairwise; in wpa_ft_fetch_pmk_r1() 2072 pmk_r0_name, sm->pairwise, &vlan, expires_in, in wpa_ft_store_pmk_fils() [all …]
|
D | wpa_auth.c | 860 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { in wpa_receive_error_report() 1055 if (sm->pairwise == WPA_CIPHER_CCMP || in wpa_receive() 1056 sm->pairwise == WPA_CIPHER_GCMP) { in wpa_receive() 1447 int version, pairwise; in __wpa_send_eapol() local 1462 else if (sm->pairwise != WPA_CIPHER_TKIP) in __wpa_send_eapol() 1467 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); in __wpa_send_eapol() 1477 pairwise, (unsigned long) kde_len, keyidx, encr); in __wpa_send_eapol() 1513 alg = pairwise ? sm->pairwise : wpa_auth->conf.wpa_group; in __wpa_send_eapol() 1514 if (sm->wpa == WPA_VERSION_WPA2 && !pairwise) in __wpa_send_eapol() 1632 if (!pairwise && in __wpa_send_eapol() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | wpa_auth_ft.c | 1175 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member 1193 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member 1325 const u8 *pmk_r0_name, int pairwise, in wpa_ft_store_pmk_r0() argument 1346 r0->pairwise = pairwise; in wpa_ft_store_pmk_r0() 1412 const u8 *pmk_r1_name, int pairwise, in wpa_ft_store_pmk_r1() argument 1437 r1->pairwise = pairwise; in wpa_ft_store_pmk_r1() 1478 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, in wpa_ft_fetch_pmk_r1() argument 1496 if (pairwise) in wpa_ft_fetch_pmk_r1() 1497 *pairwise = r1->pairwise; in wpa_ft_fetch_pmk_r1() 2075 pmk_r0_name, sm->pairwise, &vlan, expires_in, in wpa_ft_store_pmk_fils() [all …]
|
D | wpa_auth.c | 920 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { in wpa_receive_error_report() 1126 if (sm->pairwise == WPA_CIPHER_CCMP || in wpa_receive() 1127 sm->pairwise == WPA_CIPHER_GCMP) { in wpa_receive() 1510 int version, pairwise; in __wpa_send_eapol() local 1525 else if (sm->pairwise != WPA_CIPHER_TKIP) in __wpa_send_eapol() 1530 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); in __wpa_send_eapol() 1539 pairwise, kde_len, keyidx, encr); in __wpa_send_eapol() 1575 alg = pairwise ? sm->pairwise : conf->wpa_group; in __wpa_send_eapol() 1576 if (sm->wpa == WPA_VERSION_WPA2 && !pairwise) in __wpa_send_eapol() 1693 if (!pairwise && in __wpa_send_eapol() [all …]
|
D | wpa_auth_ie.c | 912 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie() 913 if (sm->pairwise < 0) in wpa_validate_wpa_ie() 997 sm->pairwise != WPA_CIPHER_TKIP && in wpa_validate_wpa_ie() 1052 sm->pairwise = WPA_CIPHER_CCMP; in wpa_validate_osen()
|
/third_party/skia/gn/ |
D | compile_sksl_tests.py | 22 def pairwise(iterable): function 64 for input, targetDir in pairwise(inputs):
|
/third_party/ffmpeg/libavutil/x86/ |
D | lls.asm | 57 ; Compute all 3 pairwise products of a 2x2 block that lies on the diagonal 73 ; Compute all 16 pairwise products of a 4x4 block 135 ; Compute all 10 pairwise products of a 4x4 block that lies on the diagonal 167 ; Compute all 16 pairwise products of a 4x4 block
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; in addNetwork() local 281 pairwise = "TKIP"; in addNetwork() 283 pairwise = "CCMP"; in addNetwork() 290 if (pairwise) { in addNetwork() 291 setNetworkParam(id, "pairwise", pairwise, false); in addNetwork()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; in addNetwork() local 281 pairwise = "TKIP"; in addNetwork() 283 pairwise = "CCMP"; in addNetwork() 290 if (pairwise) { in addNetwork() 291 setNetworkParam(id, "pairwise", pairwise, false); in addNetwork()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
D | driver_ndis.c | 904 const u8 *bssid, int pairwise) in wpa_driver_ndis_remove_key() argument 914 if (pairwise) in wpa_driver_ndis_remove_key() 920 if (!pairwise) { in wpa_driver_ndis_remove_key() 934 int pairwise, int key_idx, int set_tx, in wpa_driver_ndis_add_wep() argument 950 if (pairwise) in wpa_driver_ndis_add_wep() 975 int res, pairwise; in wpa_driver_ndis_set_key() local 980 pairwise = 0; in wpa_driver_ndis_set_key() 985 pairwise = 1; in wpa_driver_ndis_set_key() 991 pairwise); in wpa_driver_ndis_set_key() 995 return wpa_driver_ndis_add_wep(drv, pairwise, key_idx, set_tx, in wpa_driver_ndis_set_key() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
D | driver_ndis.c | 904 const u8 *bssid, int pairwise) in wpa_driver_ndis_remove_key() argument 914 if (pairwise) in wpa_driver_ndis_remove_key() 920 if (!pairwise) { in wpa_driver_ndis_remove_key() 934 int pairwise, int key_idx, int set_tx, in wpa_driver_ndis_add_wep() argument 950 if (pairwise) in wpa_driver_ndis_add_wep() 975 int res, pairwise; in wpa_driver_ndis_set_key() local 980 pairwise = 0; in wpa_driver_ndis_set_key() 985 pairwise = 1; in wpa_driver_ndis_set_key() 991 pairwise); in wpa_driver_ndis_set_key() 995 return wpa_driver_ndis_add_wep(drv, pairwise, key_idx, set_tx, in wpa_driver_ndis_set_key() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/examples/ |
D | wpa-psk-tkip.conf | 9 pairwise=TKIP
|
D | wpa2-eap-ccmp.conf | 9 pairwise=CCMP
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/examples/ |
D | wpa-psk-tkip.conf | 9 pairwise=TKIP
|
D | wpa2-eap-ccmp.conf | 9 pairwise=CCMP
|
/third_party/python/Lib/test/ |
D | test_itertools.py | 1030 self.assertEqual(list(pairwise('')), []) 1031 self.assertEqual(list(pairwise('a')), []) 1032 self.assertEqual(list(pairwise('ab')), 1034 self.assertEqual(list(pairwise('abcde')), 1036 self.assertEqual(list(pairwise(range(10_000))), 1040 pairwise() # too few arguments 1042 pairwise('abc', 10) # too many arguments 1044 pairwise(iterable='abc') # keyword arguments 1046 pairwise(None) # non-iterable argument 1859 self.makecycle(pairwise([a]*5), a) [all …]
|
/third_party/typescript/tests/baselines/reference/ |
D | genericCallWithOverloadedFunctionTypedArguments2.errors.txt | 6 // Inferences are made quadratic-pairwise to and from these overload sets
|
D | genericCallWithOverloadedConstructorTypedArguments2.errors.txt | 6 // Inferences are made quadratic-pairwise to and from these overload sets
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
D | wpa_common.c | 2567 int pairwise = 0; in wpa_select_ap_group_cipher() local 2571 pairwise |= wpa_pairwise; in wpa_select_ap_group_cipher() 2573 pairwise |= rsn_pairwise; in wpa_select_ap_group_cipher() 2575 if (pairwise & WPA_CIPHER_TKIP) in wpa_select_ap_group_cipher() 2577 if ((pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP)) == WPA_CIPHER_GCMP) in wpa_select_ap_group_cipher() 2579 if ((pairwise & (WPA_CIPHER_GCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher() 2582 if ((pairwise & (WPA_CIPHER_CCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 68 pairwise=CCMP TKIP 160 pairwise=CCMP TKIP
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 64 pairwise=CCMP TKIP 156 pairwise=CCMP TKIP
|