/external/wpa_supplicant/ |
events.c | 778 int pairwise; local 782 pairwise = (data && data->michael_mic_failure.unicast); 783 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
|
driver_ndis.c | 841 const u8 *bssid, int pairwise) 851 if (pairwise) 857 if (!pairwise) { 871 int pairwise, int key_idx, int set_tx, 887 if (pairwise) 910 int res, pairwise; local 916 pairwise = 0; 920 /* Pairwise Key */ 921 pairwise = 1; 927 pairwise); 1407 int pairwise = 0, group = 0; local [all...] |
/external/wpa_supplicant/wpa_gui/ |
networkconfig.ui.h | 135 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local 165 pairwise = "TKIP"; 167 pairwise = "CCMP"; 174 if (pairwise) { 175 setNetworkParam(id, "pairwise", pairwise, false); 346 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
|
/external/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 166 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local 196 pairwise = "TKIP"; 198 pairwise = "CCMP"; 205 if (pairwise) { 206 setNetworkParam(id, "pairwise", pairwise, false); 385 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
|
/external/wpa_supplicant_6/wpa_supplicant/ |
events.c | 991 int pairwise; local 995 pairwise = (data && data->michael_mic_failure.unicast); 1013 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 1058 wpa_s->pending_mic_error_pairwise = pairwise; 1067 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 1070 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui/ |
networkconfig.ui.h | 138 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local 168 pairwise = "TKIP"; 170 pairwise = "CCMP"; 177 if (pairwise) { 178 setNetworkParam(id, "pairwise", pairwise, false); 360 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 237 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local 267 pairwise = "TKIP"; 269 pairwise = "CCMP"; 276 if (pairwise) { 277 setNetworkParam(id, "pairwise", pairwise, false); 535 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ap.c | 58 int pairwise; local 163 /* Select group cipher based on the enabled pairwise cipher suites */ 164 pairwise = 0; 166 pairwise |= bss->wpa_pairwise; 170 pairwise |= bss->rsn_pairwise; 172 if (pairwise & WPA_CIPHER_TKIP) 387 wpa_printf(MSG_WARNING, "WPA: Failed to select pairwise "
|
events.c | 1509 int pairwise; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui/ |
networkconfig.ui.h | 138 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local 168 pairwise = "TKIP"; 170 pairwise = "CCMP"; 177 if (pairwise) { 178 setNetworkParam(id, "pairwise", pairwise, false); 360 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 249 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local 286 pairwise = "TKIP"; 288 pairwise = "CCMP"; 295 if (pairwise) { 296 setNetworkParam(id, "pairwise", pairwise, false); 554 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
|
/external/wpa_supplicant_8/hostapd/ |
config_file.c | 1158 int pairwise; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_ralink.c | 1178 const u8 *bssid, int pairwise) 1191 if (pairwise) 1200 if (0 /* !pairwise */) { 1212 int pairwise, int key_idx, int set_tx, 1252 int res, pairwise; local 1263 pairwise = 0; 1266 /* Pairwise Key */ 1267 pairwise = 1; 1273 pairwise); 1277 return wpa_driver_ralink_add_wep(drv, pairwise, key_idx [all...] |
driver_ndis.c | 853 const u8 *bssid, int pairwise) 863 if (pairwise) 869 if (!pairwise) { 883 int pairwise, int key_idx, int set_tx, 899 if (pairwise) 923 int res, pairwise; local 929 pairwise = 0; 933 /* Pairwise Key */ 934 pairwise = 1; 940 pairwise); 1440 int pairwise = 0, group = 0; local [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_ralink.c | 1096 const u8 *bssid, int pairwise) 1109 if (pairwise) 1118 if (0 /* !pairwise */) { 1130 int pairwise, int key_idx, int set_tx, 1171 int res, pairwise; local 1183 pairwise = 0; 1186 /* Pairwise Key */ 1187 pairwise = 1; 1193 pairwise); 1198 return wpa_driver_ralink_add_wep(drv, pairwise, key_idx [all...] |
driver_ndis.c | 930 const u8 *bssid, int pairwise) 940 if (pairwise) 946 if (!pairwise) { 960 int pairwise, int key_idx, int set_tx, 976 if (pairwise) 1001 int res, pairwise; local 1006 pairwise = 0; 1010 /* Pairwise Key */ 1011 pairwise = 1; 1017 pairwise); 1547 int pairwise = 0, group = 0; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.c | 753 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys 776 msgtxt = "4/4 Pairwise"; 779 msgtxt = "2/4 Pairwise"; 786 if (sm->pairwise == WPA_CIPHER_CCMP) { 1126 int version, pairwise; local 1135 else if (sm->pairwise == WPA_CIPHER_CCMP) 1140 pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; 1143 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d " 1150 pairwise, (unsigned long) kde_len, keyidx, encr); 1181 alg = pairwise ? sm->pairwise : wpa_auth->conf.wpa_group 1285 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local 2595 u32 pairwise = 0; local [all...] |
wpa_auth.h | 77 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame 96 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
|
wpa_auth_ft.c | 158 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa 168 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa 214 const u8 *pmk_r0_name, int pairwise) 228 r0->pairwise = pairwise; 239 u8 *pmk_r0, int *pairwise) 250 if (pairwise) 251 *pairwise = r0->pairwise 926 int pairwise; local 1378 int pairwise; local 1460 int pairwise; local 1528 int pairwise; local [all...] |
wpa_auth_i.h | 105 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers.c | 129 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap", 2838 const char *pairwise[2]; \/* max 2 pairwise ciphers is supported *\/ local [all...] |
/external/qemu/target-arm/ |
translate.c | 4425 int pairwise; local [all...] |