/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 79 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet 85 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) 117 if (pairwise) 129 "pairwise=%d ptk_set=%d len=%lu)", 130 error, pairwise, sm->ptk_set, (unsigned long) rlen); 359 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", 529 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Pairwise Cipher " 530 "Suite: NONE - do not use pairwise keys"); 534 "WPA: Unsupported pairwise cipher %d" [all...] |
wpa_ie.c | 79 wpa_printf(MSG_WARNING, "Invalid pairwise cipher (%d).", 157 wpa_printf(MSG_WARNING, "Invalid pairwise cipher (%d).",
|
tdls.c | 171 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: " 172 "NONE - do not use pairwise keys"); 175 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_hostap.c | 347 /* Allow unencrypted EAPOL messages even if pairwise keys are set when 349 * encrypted, but WPA encrypts them when pairwise keys are in use. */
|
/external/wpa_supplicant_8/hostapd/ |
config_file.c | 1194 int pairwise; local [all...] |
README | 342 # Set of accepted cipher suites (encryption algorithms) for pairwise keys 348 # allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
config_ssid.h | 143 * pairwise_cipher - Bitfield of allowed pairwise ciphers, WPA_CIPHER_* 288 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
ibss_rsn.c | 131 * In IBSS RSN, the pairwise key from the 4-way handshake 284 * In IBSS RSN, the pairwise key from the 4-way handshake
|
config_file.c | 110 /* Group cipher cannot be stronger than the pairwise cipher. */ 112 " list since it was not allowed for pairwise " 417 value = wpa_config_get(ssid, "pairwise");
|
events.c | [all...] |
README | 523 pairwise=CCMP TKIP 600 pairwise=CCMP TKIP 761 get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg> = get capabilies 882 wpa_cli -iwlan0 set_network 0 pairwise TKIP [all...] |
/frameworks/ml/bordeaux/learning/stochastic_linear_ranker/jni/ |
jni_stochastic_linear_ranker.cpp | 201 classifier->SetRankLossType(learning_stochastic_linear::PAIRWISE); 349 case learning_stochastic_linear::PAIRWISE :
|
/external/wpa_supplicant_6/wpa_supplicant/ |
ctrl_iface_dbus_handlers.c | 564 /***** pairwise cipher */ 569 &iter_dict, "pairwise", args, 574 if (!wpa_dbus_dict_begin_string_array(&iter_dict, "pairwise", 916 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap", [all...] |
config_file.c | 119 /* Group cipher cannot be stronger than the pairwise cipher. */ 121 " list since it was not allowed for pairwise " 659 value = wpa_config_get(ssid, "pairwise");
|
README | 603 pairwise=CCMP TKIP 680 pairwise=CCMP TKIP 841 get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg> = get capabilies [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_old_handlers.c | 542 /***** pairwise cipher */ 547 &iter_dict, "pairwise", args, 552 if (!wpa_dbus_dict_begin_string_array(&iter_dict, "pairwise", 887 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap", [all...] |
dbus_new_handlers.c | 129 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap", 2969 const char *pairwise[2]; \/* max 2 pairwise ciphers is supported *\/ local [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
WifiConfiguration.java | 194 * Recognized pairwise ciphers for WPA. 206 public static final String varName = "pairwise"; 349 * The set of pairwise ciphers for WPA supported by this configuration.
|
/dalvik/dexgen/src/com/android/dexgen/rop/code/ |
RegisterSpecSet.java | 311 * instance. The intersection consists of the pairwise
|
/dalvik/dx/src/com/android/dx/rop/code/ |
RegisterSpecSet.java | 310 * instance. The intersection consists of the pairwise
|
/external/dexmaker/src/dx/java/com/android/dx/rop/code/ |
RegisterSpecSet.java | 310 * instance. The intersection consists of the pairwise
|
/external/guava/guava/src/com/google/common/base/ |
Equivalence.java | 244 public final <S extends T> Equivalence<Iterable<S>> pairwise() { method in class:Equivalence
|
/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.c | 214 * @pmk: The new pairwise master key
|
/external/chromium/chrome/browser/safe_browsing/ |
safe_browsing_store_file.cc | 581 // chunks pairwise, merge those chunks pairwise, and so on, then
|
/hardware/ti/wlan/wl1271/stad/src/Connection_Managment/ |
rsn.c | [all...] |