/hardware/ti/wlan/wl1271/stad/src/Connection_Managment/ |
keyParserExternal.c | 250 { /* Pairwise key */ 254 TRACE0(pKeyParser->hReport, REPORT_SEVERITY_WARNING, "EXT_KEY_PARSER: ERROR: Pairwise key must have index 0 !!!\n"); 366 { /* delete all pairwise keys or for the current BSSID */
|
admCtrlWpa2.h | 118 #define WPA2_GROUP_4_UNICAST_CAPABILITY_MASK 0x0002 /* bit 1 No Pairwise */
|
/external/llvm/include/llvm/ |
IntrinsicsARM.td | 231 // Vector Pairwise Add. 234 // Vector Pairwise Add Long. 245 // Vector Pairwise Add and Accumulate Long. 257 // Vector Pairwise Maximum and Minimum.
|
/external/oprofile/libpp/ |
diff_container.cpp | 121 * Do a pairwise comparison of the two symbol sets. We're
|
/frameworks/base/graphics/java/android/graphics/ |
Insets.java | 75 * pairwise equal.
|
/frameworks/ml/bordeaux/learning/stochastic_linear_ranker/native/ |
stochastic_linear_ranker.cpp | 82 if (rank_loss_type_ == PAIRWISE) {
|
stochastic_linear_ranker.h | 59 rank_loss_type_ = PAIRWISE;
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_ralink.c | 1178 const u8 *bssid, int pairwise) 1191 if (pairwise) 1200 if (0 /* !pairwise */) { 1212 int pairwise, int key_idx, int set_tx, 1252 int res, pairwise; local 1263 pairwise = 0; 1266 /* Pairwise Key */ 1267 pairwise = 1; 1273 pairwise); 1277 return wpa_driver_ralink_add_wep(drv, pairwise, key_idx [all...] |
driver_ndis.c | 853 const u8 *bssid, int pairwise) 863 if (pairwise) 869 if (!pairwise) { 883 int pairwise, int key_idx, int set_tx, 899 if (pairwise) 923 int res, pairwise; local 929 pairwise = 0; 933 /* Pairwise Key */ 934 pairwise = 1; 940 pairwise); 1440 int pairwise = 0, group = 0; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.h | 123 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 244 int pairwise)
|
wpa_ft.c | 186 /* Pairwise Suite Count */ 190 /* Pairwise Suite List */ 196 wpa_printf(MSG_WARNING, "FT: Invalid pairwise cipher (%d)", 336 wpa_printf(MSG_WARNING, "FT: Unsupported pairwise cipher %d",
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.conf.sgml | 64 pairwise=CCMP TKIP 156 pairwise=CCMP TKIP
|
/hardware/ti/wlan/wl1271/CUDK/configurationutility/src/ |
wpa_core.c | 672 /* set pairwise encryption of the new network block */ 675 os_sprintf(cmd, (PS8)"SET_NETWORK %d pairwise NONE", NetworkID); 677 os_sprintf(cmd, (PS8)"SET_NETWORK %d pairwise NONE", NetworkID); 679 os_sprintf(cmd, (PS8)"SET_NETWORK %d pairwise TKIP", NetworkID); 681 os_sprintf(cmd, (PS8)"SET_NETWORK %d pairwise CCMP", NetworkID); 683 os_sprintf(cmd, (PS8)"SET_NETWORK %d pairwise CCMP TKIP", NetworkID);
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa.c | 135 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet 141 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) 173 if (pairwise) 184 "pairwise=%d ptk_set=%d len=%lu)", 185 error, pairwise, sm->ptk_set, (unsigned long) rlen); 368 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", 534 wpa_printf(MSG_DEBUG, "WPA: Pairwise Cipher Suite: " 535 "NONE - do not use pairwise keys"); 538 wpa_printf(MSG_WARNING, "WPA: Unsupported pairwise cipher %d" [all...] |
pmksa_cache.c | 43 * @pmk: Pairwise master key 49 * IEEE Std 802.11i-2004 - 8.5.1.2 Pairwise key hierarchy 150 * @pmk: The new pairwise master key
|
wpa_ie.c | 112 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 223 wpa_printf(MSG_WARNING, "Invalid pairwise cipher (%d).", 301 wpa_printf(MSG_WARNING, "Invalid pairwise cipher (%d).",
|
wpa_ft.c | 158 /* Pairwise Suite Count */ 162 /* Pairwise Suite List */ 168 wpa_printf(MSG_WARNING, "FT: Invalid pairwise cipher (%d)", 411 wpa_printf(MSG_WARNING, "FT: Unsupported pairwise cipher %d",
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.c | 75 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 176 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 557 wpa_printf(MSG_DEBUG, "Invalid %s pairwise cipher (0x%x) " 609 sm->pairwise = WPA_CIPHER_CCMP; 611 sm->pairwise = WPA_CIPHER_TKIP;
|
/external/wpa_supplicant_6/wpa_supplicant/ |
events.c | 991 int pairwise; local 995 pairwise = (data && data->michael_mic_failure.unicast); 1013 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 1058 wpa_s->pending_mic_error_pairwise = pairwise; 1067 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 1070 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
|
config_ssid.h | 140 * pairwise_cipher - Bitfield of allowed pairwise ciphers, WPA_CIPHER_* 278 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
config_winreg.c | 343 /* Group cipher cannot be stronger than the pairwise cipher. */ 345 "list since it was not allowed for pairwise " 714 value = wpa_config_get(ssid, "pairwise"); 718 wpa_config_write_reg_string(hk, "pairwise", value);
|
todo.txt | 37 - test madwifi with pairwise=TKIP group=WEP104
|
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis.c | 924 const u8 *bssid, int pairwise) 934 if (pairwise) 940 if (!pairwise) { 954 int pairwise, int key_idx, int set_tx, 970 if (pairwise) 995 int res, pairwise; local 1000 pairwise = 0; 1004 /* Pairwise Key */ 1005 pairwise = 1; 1011 pairwise); 1541 int pairwise = 0, group = 0; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
config_winreg.c | 357 /* Group cipher cannot be stronger than the pairwise cipher. */ 359 "list since it was not allowed for pairwise " 751 value = wpa_config_get(ssid, "pairwise"); 755 wpa_config_write_reg_string(hk, "pairwise", value);
|
todo.txt | 34 - test madwifi with pairwise=TKIP group=WEP104
|