/external/guava/guava/src/com/google/common/base/ |
Equivalence.java | 244 public final <S extends T> Equivalence<Iterable<S>> pairwise() { method in class:Equivalence
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 243 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local 280 pairwise = "TKIP"; 282 pairwise = "CCMP"; 289 if (pairwise) { 290 setNetworkParam(id, "pairwise", pairwise, false); 548 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 75 * @pmk: Pairwise master key 82 * @ptk: Buffer for pairwise transient key 86 * IEEE Std 802.11i-2004 - 8.5.1.2 Pairwise key hierarchy 87 * PTK = PRF-X(PMK, "Pairwise key expansion", 500 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 512 "pairwise cipher", __func__); 678 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 899 * @pmk: Pairwise master key 906 * IEEE Std 802.11i-2004 - 8.5.1.2 Pairwise key hierarchy 1095 /* Skip Pairwise Cipher Suite Count and List * 1480 int pairwise = 0; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.h | 72 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame 91 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
|
wpa_auth_ft.c | 149 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa 159 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa 205 const u8 *pmk_r0_name, int pairwise) 219 r0->pairwise = pairwise; 230 u8 *pmk_r0, int *pairwise) 241 if (pairwise) 242 *pairwise = r0->pairwise 811 int pairwise; local 1316 int pairwise; local 1444 int pairwise, res; local 1510 int pairwise; local [all...] |
wpa_auth_i.h | 104 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
|
wpa_auth.c | 765 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { 768 "pairwise cipher is not TKIP"); 850 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys 873 msgtxt = "4/4 Pairwise"; 876 msgtxt = "2/4 Pairwise"; 883 if (sm->pairwise == WPA_CIPHER_CCMP || 884 sm->pairwise == WPA_CIPHER_GCMP) { 1291 int version, pairwise; local 1451 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local 2932 u32 pairwise = 0; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
events.c | 2264 int pairwise; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers.c | 141 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap", 3694 const char *pairwise[5]; \/* max 5 pairwise ciphers is supported *\/ local [all...] |
/external/qemu/target-arm/ |
translate.c | 4501 int pairwise; local [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis.c | 916 const u8 *bssid, int pairwise) 926 if (pairwise) 932 if (!pairwise) { 946 int pairwise, int key_idx, int set_tx, 962 if (pairwise) 987 int res, pairwise; local 992 pairwise = 0; 996 /* Pairwise Key */ 997 pairwise = 1; 1003 pairwise); 1533 int pairwise = 0, group = 0; local [all...] |
/prebuilts/sdk/tools/lib/ |
guava-10.0.1.jar | |
lint.jar | |
lint_api.jar | |
lint_checks.jar | |
/external/owasp/sanitizer/distrib/lib/ |
guava.jar | |
/external/owasp/sanitizer/lib/guava-libraries/ |
guava.jar | |
/packages/services/Telecomm/libs/ |
guava.jar | |
/prebuilts/tools/common/m2/repository/org/gradle/gradle-tooling-api/1.10/ |
gradle-tooling-api-1.10.jar | |
/prebuilts/tools/common/m2/repository/org/gradle/gradle-tooling-api/1.11/ |
gradle-tooling-api-1.11.jar | |
/prebuilts/tools/common/m2/repository/org/gradle/gradle-tooling-api/1.12/ |
gradle-tooling-api-1.12.jar | |
/prebuilts/tools/common/m2/repository/org/gradle/gradle-tooling-api/1.6/ |
gradle-tooling-api-1.6.jar | |
/prebuilts/tools/common/m2/repository/org/gradle/gradle-tooling-api/1.6-rc-1/ |
gradle-tooling-api-1.6-rc-1.jar | |
/prebuilts/tools/common/m2/repository/org/gradle/gradle-tooling-api/1.7/ |
gradle-tooling-api-1.7.jar | |
/prebuilts/tools/common/m2/repository/org/gradle/gradle-tooling-api/1.9/ |
gradle-tooling-api-1.9.jar | |