/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_supplicant.conf | 1066 pairwise=CCMP TKIP 1077 pairwise=TKIP 1089 pairwise=CCMP TKIP 1165 pairwise=CCMP 1297 pairwise=CCMP 1308 pairwise=NONE 1319 pairwise=CCMP TKIP 1338 pairwise=CCMP TKIP
|
D | events.c | 2266 int pairwise; local 2270 pairwise = (data && data->michael_mic_failure.unicast); 2288 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 2336 wpa_s->pending_mic_error_pairwise = pairwise; 2345 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 2348 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
|
D | todo.txt | 34 - test madwifi with pairwise=TKIP group=WEP104
|
D | README | 529 pairwise=CCMP TKIP 606 pairwise=CCMP TKIP 767 get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg> = get capabilies 888 wpa_cli -iwlan0 set_network 0 pairwise TKIP
|
D | README-Windows.txt | 182 pairwise=TKIP
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ft.c | 149 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member 159 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member 205 const u8 *pmk_r0_name, int pairwise) in wpa_ft_store_pmk_r0() argument 219 r0->pairwise = pairwise; in wpa_ft_store_pmk_r0() 230 u8 *pmk_r0, int *pairwise) in wpa_ft_fetch_pmk_r0() argument 241 if (pairwise) in wpa_ft_fetch_pmk_r0() 242 *pairwise = r0->pairwise; in wpa_ft_fetch_pmk_r0() 255 const u8 *pmk_r1_name, int pairwise) in wpa_ft_store_pmk_r1() argument 269 r1->pairwise = pairwise; in wpa_ft_store_pmk_r1() 280 u8 *pmk_r1, int *pairwise) in wpa_ft_fetch_pmk_r1() argument [all …]
|
D | wpa_auth.c | 765 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { in wpa_receive_error_report() 883 if (sm->pairwise == WPA_CIPHER_CCMP || in wpa_receive() 884 sm->pairwise == WPA_CIPHER_GCMP) { in wpa_receive() 1291 int version, pairwise; in __wpa_send_eapol() local 1302 else if (sm->pairwise != WPA_CIPHER_TKIP) in __wpa_send_eapol() 1307 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); in __wpa_send_eapol() 1317 pairwise, (unsigned long) kde_len, keyidx, encr); in __wpa_send_eapol() 1349 alg = pairwise ? sm->pairwise : wpa_auth->conf.wpa_group; in __wpa_send_eapol() 1426 if (!pairwise && in __wpa_send_eapol() 1452 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; in wpa_send_eapol() local [all …]
|
D | wpa_auth.h | 72 le16 pairwise; member 91 le16 pairwise; member
|
D | wpa_auth_ie.c | 638 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie() 639 if (sm->pairwise < 0) in wpa_validate_wpa_ie() 711 sm->pairwise = WPA_CIPHER_CCMP; in wpa_validate_osen()
|
D | wpa_auth_i.h | 104 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
|
/external/guava/guava-tests/test/com/google/common/base/ |
D | EquivalenceTest.java | 38 EquivalenceTester.of(Equivalences.equals().<String>pairwise()) in testPairwiseEquivalent() 48 .addEqualityGroup(Equivalences.equals().pairwise(), Equivalences.equals().pairwise()) in testPairwiseEquivalent_equals() 49 .addEqualityGroup(Equivalences.identity().pairwise()) in testPairwiseEquivalent_equals()
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
D | wpa-psk-tkip.conf | 9 pairwise=TKIP
|
D | wpa2-eap-ccmp.conf | 9 pairwise=CCMP
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 243 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; in addNetwork() local 280 pairwise = "TKIP"; in addNetwork() 282 pairwise = "CCMP"; in addNetwork() 289 if (pairwise) { in addNetwork() 290 setNetworkParam(id, "pairwise", pairwise, false); in addNetwork()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_ndis.c | 916 const u8 *bssid, int pairwise) in wpa_driver_ndis_remove_key() argument 926 if (pairwise) in wpa_driver_ndis_remove_key() 932 if (!pairwise) { in wpa_driver_ndis_remove_key() 946 int pairwise, int key_idx, int set_tx, in wpa_driver_ndis_add_wep() argument 962 if (pairwise) in wpa_driver_ndis_add_wep() 987 int res, pairwise; in wpa_driver_ndis_set_key() local 992 pairwise = 0; in wpa_driver_ndis_set_key() 997 pairwise = 1; in wpa_driver_ndis_set_key() 1003 pairwise); in wpa_driver_ndis_set_key() 1007 return wpa_driver_ndis_add_wep(drv, pairwise, key_idx, set_tx, in wpa_driver_ndis_set_key() [all …]
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 1480 int pairwise = 0; in wpa_select_ap_group_cipher() local 1484 pairwise |= wpa_pairwise; in wpa_select_ap_group_cipher() 1486 pairwise |= rsn_pairwise; in wpa_select_ap_group_cipher() 1488 if (pairwise & WPA_CIPHER_TKIP) in wpa_select_ap_group_cipher() 1490 if ((pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP)) == WPA_CIPHER_GCMP) in wpa_select_ap_group_cipher() 1492 if ((pairwise & (WPA_CIPHER_GCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher() 1495 if ((pairwise & (WPA_CIPHER_CCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.h | 131 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 253 int pairwise) in wpa_sm_key_request() argument
|
D | wpa.c | 85 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) in wpa_sm_key_request() argument 121 if (pairwise) in wpa_sm_key_request() 134 error, pairwise, sm->ptk_set, (unsigned long) rlen); in wpa_sm_key_request()
|
/external/guava/guava/src/com/google/common/base/ |
D | Equivalence.java | 244 public final <S extends T> Equivalence<Iterable<S>> pairwise() { in pairwise() method in Equivalence
|
/external/harfbuzz_ng/src/hb-ucdn/ |
D | README | 13 Database and low-level normalization functions (pairwise canonical
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 64 pairwise=CCMP TKIP 156 pairwise=CCMP TKIP
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
D | dbus_new_handlers.c | 3777 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ in wpas_dbus_get_bss_security_prop() local 3843 pairwise[n++] = "tkip"; in wpas_dbus_get_bss_security_prop() 3845 pairwise[n++] = "ccmp"; in wpas_dbus_get_bss_security_prop() 3847 pairwise[n++] = "gcmp"; in wpas_dbus_get_bss_security_prop() 3849 pairwise[n++] = "ccmp-256"; in wpas_dbus_get_bss_security_prop() 3851 pairwise[n++] = "gcmp-256"; in wpas_dbus_get_bss_security_prop() 3854 pairwise, n)) in wpas_dbus_get_bss_security_prop()
|
/external/bison/data/m4sugar/ |
D | foreach.m4 | 246 # Perform a pairwise grouping of consecutive ARGs, by expanding 305 # temporary macro to perform pairwise comparisons until an inequality
|
/external/wpa_supplicant_8/hostapd/ |
D | README | 342 # Set of accepted cipher suites (encryption algorithms) for pairwise keys 348 # allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise,
|
/external/qemu/target-arm/ |
D | translate.c | 4501 int pairwise; in disas_neon_data_insn() local 4598 pairwise = 0; in disas_neon_data_insn() 4619 pairwise = 1; in disas_neon_data_insn() 4622 pairwise = (u && size < 2); /* if VPADD (float) */ in disas_neon_data_insn() 4625 pairwise = u; /* if VPMIN/VPMAX (float) */ in disas_neon_data_insn() 4653 if (pairwise && q) { in disas_neon_data_insn() 4660 if (pairwise) { in disas_neon_data_insn() 4937 if (pairwise && rd == rm) { in disas_neon_data_insn() 4944 if (pairwise && rd == rm) { in disas_neon_data_insn()
|