HomeSort by relevance Sort by last modified time
    Searched defs:pairwise (Results 1 - 17 of 17) sorted by null

  /external/guava/guava/src/com/google/common/base/
Equivalence.java 244 public final <S extends T> Equivalence<Iterable<S>> pairwise() { method in class:Equivalence
  /external/wpa_supplicant_6/wpa_supplicant/
events.c 991 int pairwise; local
995 pairwise = (data && data->michael_mic_failure.unicast);
1013 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
1058 wpa_s->pending_mic_error_pairwise = pairwise;
1067 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
1070 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui/
networkconfig.ui.h 138 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local
168 pairwise = "TKIP";
170 pairwise = "CCMP";
177 if (pairwise) {
178 setNetworkParam(id, "pairwise", pairwise, false);
360 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 237 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local
267 pairwise = "TKIP";
269 pairwise = "CCMP";
276 if (pairwise) {
277 setNetworkParam(id, "pairwise", pairwise, false);
535 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
  /external/wpa_supplicant_8/wpa_supplicant/
ap.c 49 int pairwise; local
182 /* Select group cipher based on the enabled pairwise cipher suites */
183 pairwise = 0;
185 pairwise |= bss->wpa_pairwise;
189 pairwise |= bss->rsn_pairwise;
191 if (pairwise & WPA_CIPHER_TKIP)
236 (!(pairwise & WPA_CIPHER_CCMP) || !(bss->wpa & 2)))
435 wpa_printf(MSG_WARNING, "WPA: Failed to select pairwise "
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 243 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local
280 pairwise = "TKIP";
282 pairwise = "CCMP";
289 if (pairwise) {
290 setNetworkParam(id, "pairwise", pairwise, false);
548 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
  /external/wpa_supplicant_8/hostapd/
config_file.c 1194 int pairwise; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_ralink.c 1178 const u8 *bssid, int pairwise)
1191 if (pairwise)
1200 if (0 /* !pairwise */) {
1212 int pairwise, int key_idx, int set_tx,
1252 int res, pairwise; local
1263 pairwise = 0;
1266 /* Pairwise Key */
1267 pairwise = 1;
1273 pairwise);
1277 return wpa_driver_ralink_add_wep(drv, pairwise, key_idx
    [all...]
driver_ndis.c 853 const u8 *bssid, int pairwise)
863 if (pairwise)
869 if (!pairwise) {
883 int pairwise, int key_idx, int set_tx,
899 if (pairwise)
923 int res, pairwise; local
929 pairwise = 0;
933 /* Pairwise Key */
934 pairwise = 1;
940 pairwise);
1440 int pairwise = 0, group = 0; local
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth.c 736 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
739 "pairwise cipher is not TKIP");
819 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
842 msgtxt = "4/4 Pairwise";
845 msgtxt = "2/4 Pairwise";
852 if (sm->pairwise == WPA_CIPHER_CCMP) {
1234 int version, pairwise; local
1393 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local
2725 u32 pairwise = 0; local
    [all...]
wpa_auth.h 71 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame
90 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
wpa_auth_ft.c 129 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa
139 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa
185 const u8 *pmk_r0_name, int pairwise)
199 r0->pairwise = pairwise;
210 u8 *pmk_r0, int *pairwise)
221 if (pairwise)
222 *pairwise = r0->pairwise
760 int pairwise; local
1212 int pairwise; local
1294 int pairwise; local
1362 int pairwise; local
    [all...]
wpa_auth_i.h 102 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new_handlers.c 129 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap",
2969 const char *pairwise[2]; \/* max 2 pairwise ciphers is supported *\/ local
    [all...]
  /external/qemu/target-arm/
translate.c 4425 int pairwise; local
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_ndis.c 924 const u8 *bssid, int pairwise)
934 if (pairwise)
940 if (!pairwise) {
954 int pairwise, int key_idx, int set_tx,
970 if (pairwise)
995 int res, pairwise; local
1000 pairwise = 0;
1004 /* Pairwise Key */
1005 pairwise = 1;
1011 pairwise);
1541 int pairwise = 0, group = 0; local
    [all...]
  /prebuilts/tools/common/guava-tools/
guava-10.0.1.jar 

Completed in 199 milliseconds