/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpa-psk-tkip.conf | 9 pairwise=TKIP
|
wpa2-eap-ccmp.conf | 9 pairwise=CCMP
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf | 106 # key_mgmt, pairwise, group, proto variables 510 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not 583 # pairwise: list of accepted pairwise (unicast) ciphers for WPA 587 # pairwise keys) [all...] |
events.c | 2125 int pairwise; local [all...] |
config.c | 678 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher " 683 wpa_printf(MSG_MSGDUMP, "pairwise: 0x%x", val); [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 142 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa 152 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa 198 const u8 *pmk_r0_name, int pairwise) 212 r0->pairwise = pairwise; 223 u8 *pmk_r0, int *pairwise) 234 if (pairwise) 235 *pairwise = r0->pairwise 794 int pairwise; local 1260 int pairwise; local 1343 int pairwise; local 1411 int pairwise; local [all...] |
wpa_auth.c | 725 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { 728 "pairwise cipher is not TKIP"); 810 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys 833 msgtxt = "4/4 Pairwise"; 836 msgtxt = "2/4 Pairwise"; 843 if (sm->pairwise == WPA_CIPHER_CCMP || 844 sm->pairwise == WPA_CIPHER_GCMP) { 1227 int version, pairwise; local 1383 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local 2805 u32 pairwise = 0; local [all...] |
wpa_auth.h | 71 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame 90 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
|
wpa_auth_i.h | 104 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
|
wpa_auth_ie.c | 54 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 139 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 516 wpa_printf(MSG_DEBUG, "Invalid %s pairwise cipher (0x%x) " 567 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); 568 if (sm->pairwise < 0)
|
/external/guava/guava-tests/test/com/google/common/base/ |
EquivalenceTest.java | 38 EquivalenceTester.of(Equivalences.equals().<String>pairwise()) 48 .addEqualityGroup(Equivalences.equals().pairwise(), Equivalences.equals().pairwise()) 49 .addEqualityGroup(Equivalences.identity().pairwise())
|
/external/guava/guava/src/com/google/common/base/ |
Equivalence.java | 244 public final <S extends T> Equivalence<Iterable<S>> pairwise() { method in class:Equivalence
|
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis.c | 916 const u8 *bssid, int pairwise) 926 if (pairwise) 932 if (!pairwise) { 946 int pairwise, int key_idx, int set_tx, 962 if (pairwise) 987 int res, pairwise; local 992 pairwise = 0; 996 /* Pairwise Key */ 997 pairwise = 1; 1003 pairwise); 1533 int pairwise = 0, group = 0; local [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 69 * @pmk: Pairwise master key 76 * @ptk: Buffer for pairwise transient key 80 * IEEE Std 802.11i-2004 - 8.5.1.2 Pairwise key hierarchy 81 * PTK = PRF-X(PMK, "Pairwise key expansion", 464 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 476 "pairwise cipher", __func__); 641 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 861 * @pmk: Pairwise master key 868 * IEEE Std 802.11i-2004 - 8.5.1.2 Pairwise key hierarchy 1027 /* Skip Pairwise Cipher Suite Count and List * 1364 int pairwise = 0; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 243 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local 280 pairwise = "TKIP"; 282 pairwise = "CCMP"; 289 if (pairwise) { 290 setNetworkParam(id, "pairwise", pairwise, false); 548 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.h | 128 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 254 int pairwise)
|
wpa.c | 79 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet 85 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) 117 if (pairwise) 129 "pairwise=%d ptk_set=%d len=%lu)", 130 error, pairwise, sm->ptk_set, (unsigned long) rlen); 365 wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", 522 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Pairwise Cipher " 523 "Suite: NONE - do not use pairwise keys"); 529 "WPA: Unsupported pairwise cipher %d" [all...] |
/external/chromium_org/v8/test/mjsunit/ |
sin-cos.js | 143 // Sum squares up by adding them pairwise, to avoid losing precision.
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers.c | 124 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap", 3286 const char *pairwise[3]; \/* max 3 pairwise ciphers is supported *\/ local [all...] |
/external/qemu/target-arm/ |
translate.c | 4425 int pairwise; local [all...] |
/prebuilts/sdk/tools/lib/ |
guava-10.0.1.jar | |
lint.jar | |
lint_api.jar | |
lint_checks.jar | |
/external/droiddriver/libs/ |
guava-13.0.jar | |