Home
last modified time | relevance | path

Searched refs:pairwise (Results 1 – 25 of 32) sorted by relevance

12

/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_supplicant.conf1066 pairwise=CCMP TKIP
1077 pairwise=TKIP
1089 pairwise=CCMP TKIP
1165 pairwise=CCMP
1297 pairwise=CCMP
1308 pairwise=NONE
1319 pairwise=CCMP TKIP
1338 pairwise=CCMP TKIP
Devents.c2266 int pairwise; local
2270 pairwise = (data && data->michael_mic_failure.unicast);
2288 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
2336 wpa_s->pending_mic_error_pairwise = pairwise;
2345 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
2348 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
Dtodo.txt34 - test madwifi with pairwise=TKIP group=WEP104
DREADME529 pairwise=CCMP TKIP
606 pairwise=CCMP TKIP
767 get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg> = get capabilies
888 wpa_cli -iwlan0 set_network 0 pairwise TKIP
DREADME-Windows.txt182 pairwise=TKIP
/external/wpa_supplicant_8/src/ap/
Dwpa_auth_ft.c149 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
159 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
205 const u8 *pmk_r0_name, int pairwise) in wpa_ft_store_pmk_r0() argument
219 r0->pairwise = pairwise; in wpa_ft_store_pmk_r0()
230 u8 *pmk_r0, int *pairwise) in wpa_ft_fetch_pmk_r0() argument
241 if (pairwise) in wpa_ft_fetch_pmk_r0()
242 *pairwise = r0->pairwise; in wpa_ft_fetch_pmk_r0()
255 const u8 *pmk_r1_name, int pairwise) in wpa_ft_store_pmk_r1() argument
269 r1->pairwise = pairwise; in wpa_ft_store_pmk_r1()
280 u8 *pmk_r1, int *pairwise) in wpa_ft_fetch_pmk_r1() argument
[all …]
Dwpa_auth.c765 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { in wpa_receive_error_report()
883 if (sm->pairwise == WPA_CIPHER_CCMP || in wpa_receive()
884 sm->pairwise == WPA_CIPHER_GCMP) { in wpa_receive()
1291 int version, pairwise; in __wpa_send_eapol() local
1302 else if (sm->pairwise != WPA_CIPHER_TKIP) in __wpa_send_eapol()
1307 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); in __wpa_send_eapol()
1317 pairwise, (unsigned long) kde_len, keyidx, encr); in __wpa_send_eapol()
1349 alg = pairwise ? sm->pairwise : wpa_auth->conf.wpa_group; in __wpa_send_eapol()
1426 if (!pairwise && in __wpa_send_eapol()
1452 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; in wpa_send_eapol() local
[all …]
Dwpa_auth.h72 le16 pairwise; member
91 le16 pairwise; member
Dwpa_auth_ie.c638 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie()
639 if (sm->pairwise < 0) in wpa_validate_wpa_ie()
711 sm->pairwise = WPA_CIPHER_CCMP; in wpa_validate_osen()
Dwpa_auth_i.h104 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
/external/guava/guava-tests/test/com/google/common/base/
DEquivalenceTest.java38 EquivalenceTester.of(Equivalences.equals().<String>pairwise()) in testPairwiseEquivalent()
48 .addEqualityGroup(Equivalences.equals().pairwise(), Equivalences.equals().pairwise()) in testPairwiseEquivalent_equals()
49 .addEqualityGroup(Equivalences.identity().pairwise()) in testPairwiseEquivalent_equals()
/external/wpa_supplicant_8/wpa_supplicant/examples/
Dwpa-psk-tkip.conf9 pairwise=TKIP
Dwpa2-eap-ccmp.conf9 pairwise=CCMP
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.cpp243 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; in addNetwork() local
280 pairwise = "TKIP"; in addNetwork()
282 pairwise = "CCMP"; in addNetwork()
289 if (pairwise) { in addNetwork()
290 setNetworkParam(id, "pairwise", pairwise, false); in addNetwork()
/external/wpa_supplicant_8/src/drivers/
Ddriver_ndis.c916 const u8 *bssid, int pairwise) in wpa_driver_ndis_remove_key() argument
926 if (pairwise) in wpa_driver_ndis_remove_key()
932 if (!pairwise) { in wpa_driver_ndis_remove_key()
946 int pairwise, int key_idx, int set_tx, in wpa_driver_ndis_add_wep() argument
962 if (pairwise) in wpa_driver_ndis_add_wep()
987 int res, pairwise; in wpa_driver_ndis_set_key() local
992 pairwise = 0; in wpa_driver_ndis_set_key()
997 pairwise = 1; in wpa_driver_ndis_set_key()
1003 pairwise); in wpa_driver_ndis_set_key()
1007 return wpa_driver_ndis_add_wep(drv, pairwise, key_idx, set_tx, in wpa_driver_ndis_set_key()
[all …]
/external/wpa_supplicant_8/src/common/
Dwpa_common.c1480 int pairwise = 0; in wpa_select_ap_group_cipher() local
1484 pairwise |= wpa_pairwise; in wpa_select_ap_group_cipher()
1486 pairwise |= rsn_pairwise; in wpa_select_ap_group_cipher()
1488 if (pairwise & WPA_CIPHER_TKIP) in wpa_select_ap_group_cipher()
1490 if ((pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP)) == WPA_CIPHER_GCMP) in wpa_select_ap_group_cipher()
1492 if ((pairwise & (WPA_CIPHER_GCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher()
1495 if ((pairwise & (WPA_CIPHER_CCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher()
/external/wpa_supplicant_8/src/rsn_supp/
Dwpa.h131 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
253 int pairwise) in wpa_sm_key_request() argument
Dwpa.c85 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) in wpa_sm_key_request() argument
121 if (pairwise) in wpa_sm_key_request()
134 error, pairwise, sm->ptk_set, (unsigned long) rlen); in wpa_sm_key_request()
/external/guava/guava/src/com/google/common/base/
DEquivalence.java244 public final <S extends T> Equivalence<Iterable<S>> pairwise() { in pairwise() method in Equivalence
/external/harfbuzz_ng/src/hb-ucdn/
DREADME13 Database and low-level normalization functions (pairwise canonical
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml64 pairwise=CCMP TKIP
156 pairwise=CCMP TKIP
/external/wpa_supplicant_8/wpa_supplicant/dbus/
Ddbus_new_handlers.c3777 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ in wpas_dbus_get_bss_security_prop() local
3843 pairwise[n++] = "tkip"; in wpas_dbus_get_bss_security_prop()
3845 pairwise[n++] = "ccmp"; in wpas_dbus_get_bss_security_prop()
3847 pairwise[n++] = "gcmp"; in wpas_dbus_get_bss_security_prop()
3849 pairwise[n++] = "ccmp-256"; in wpas_dbus_get_bss_security_prop()
3851 pairwise[n++] = "gcmp-256"; in wpas_dbus_get_bss_security_prop()
3854 pairwise, n)) in wpas_dbus_get_bss_security_prop()
/external/bison/data/m4sugar/
Dforeach.m4246 # Perform a pairwise grouping of consecutive ARGs, by expanding
305 # temporary macro to perform pairwise comparisons until an inequality
/external/wpa_supplicant_8/hostapd/
DREADME342 # Set of accepted cipher suites (encryption algorithms) for pairwise keys
348 # allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise,
/external/qemu/target-arm/
Dtranslate.c4501 int pairwise; in disas_neon_data_insn() local
4598 pairwise = 0; in disas_neon_data_insn()
4619 pairwise = 1; in disas_neon_data_insn()
4622 pairwise = (u && size < 2); /* if VPADD (float) */ in disas_neon_data_insn()
4625 pairwise = u; /* if VPMIN/VPMAX (float) */ in disas_neon_data_insn()
4653 if (pairwise && q) { in disas_neon_data_insn()
4660 if (pairwise) { in disas_neon_data_insn()
4937 if (pairwise && rd == rm) { in disas_neon_data_insn()
4944 if (pairwise && rd == rm) { in disas_neon_data_insn()

12