HomeSort by relevance Sort by last modified time
    Searched refs:pairwise (Results 1 - 25 of 118) sorted by null

1 2 3 4 5

  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpa-psk-tkip.conf 9 pairwise=TKIP
wpa2-eap-ccmp.conf 9 pairwise=CCMP
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.conf 108 # key_mgmt, pairwise, group, proto variables
750 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not
    [all...]
events.c 2855 int pairwise; local
    [all...]
config.c 998 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher "
1005 wpa_printf(MSG_MSGDUMP, "pairwise: 0x%x", val);
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 161 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa
171 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa
217 const u8 *pmk_r0_name, int pairwise)
231 r0->pairwise = pairwise;
242 u8 *pmk_r0, int *pairwise)
253 if (pairwise)
254 *pairwise = r0->pairwise
839 int pairwise; local
920 int pairwise; local
1436 int pairwise; local
1571 int pairwise, res; local
1642 int pairwise; local
    [all...]
wpa_auth.c 819 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
822 "pairwise cipher is not TKIP");
969 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
994 msgtxt = "4/4 Pairwise";
997 msgtxt = "2/4 Pairwise";
1004 if (sm->pairwise == WPA_CIPHER_CCMP ||
1005 sm->pairwise == WPA_CIPHER_GCMP) {
1411 int version, pairwise; local
1619 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local
3674 u32 pairwise = 0; local
    [all...]
wpa_auth.h 80 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame
103 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
wpa_auth_i.h 102 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
wpa_auth_ie.c 54 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).",
139 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).",
366 /* Pairwise Cipher Suite Count and List */
670 wpa_printf(MSG_DEBUG, "Invalid %s pairwise cipher (0x%x) "
726 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
727 if (sm->pairwise < 0)
802 sm->pairwise = WPA_CIPHER_CCMP;
  /external/guava/guava-gwt/test-super/com/google/common/base/super/com/google/common/base/
EquivalenceTest.java 36 EquivalenceTester.of(Equivalence.equals().<String>pairwise())
46 .addEqualityGroup(Equivalence.equals().pairwise(), Equivalence.equals().pairwise())
47 .addEqualityGroup(Equivalence.identity().pairwise())
  /external/guava/guava-tests/test/com/google/common/base/
EquivalenceTest.java 39 EquivalenceTester.of(Equivalence.equals().<String>pairwise())
49 .addEqualityGroup(Equivalence.equals().pairwise(), Equivalence.equals().pairwise())
50 .addEqualityGroup(Equivalence.identity().pairwise())
  /external/guava/guava/src/com/google/common/base/
Equivalence.java 241 public final <S extends T> Equivalence<Iterable<S>> pairwise() { method in class:Equivalence
  /external/wpa_supplicant_8/src/drivers/
driver_ndis.c 904 const u8 *bssid, int pairwise)
914 if (pairwise)
920 if (!pairwise) {
934 int pairwise, int key_idx, int set_tx,
950 if (pairwise)
975 int res, pairwise; local
980 pairwise = 0;
984 /* Pairwise Key */
985 pairwise = 1;
991 pairwise);
1521 int pairwise = 0, group = 0; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local
281 pairwise = "TKIP";
283 pairwise = "CCMP";
290 if (pairwise) {
291 setNetworkParam(id, "pairwise", pairwise, false);
549 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
  /external/wpa_supplicant_8/src/rsn_supp/
wpa.h 144 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
276 int pairwise)
wpa.c 166 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet
172 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise)
213 if (pairwise)
230 "pairwise=%d ptk_set=%d len=%lu)",
231 error, pairwise, sm->ptk_set, (unsigned long) rlen);
509 return wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion",
699 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Pairwise Cipher "
700 "Suite: NONE - do not use pairwise keys");
706 "WPA: Unsupported pairwise cipher %d"
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.c 144 * @pmk: Pairwise master key
151 * @ptk: Buffer for pairwise transient key
153 * @cipher: Negotiated pairwise cipher
156 * IEEE Std 802.11i-2004 - 8.5.1.2 Pairwise key hierarchy
157 * PTK = PRF-X(PMK, "Pairwise key expansion",
878 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
890 "pairwise cipher", __func__);
1048 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
1968 int pairwise = 0; local
    [all...]
  /prebuilts/go/darwin-x86/src/strings/
replace_test.go 116 // overall non-empty common prefix, but some pairwise common prefixes.
138 // gen2 has multiple old strings with no pairwise common prefix.
  /prebuilts/go/linux-x86/src/strings/
replace_test.go 116 // overall non-empty common prefix, but some pairwise common prefixes.
138 // gen2 has multiple old strings with no pairwise common prefix.
  /external/v8/tools/
logreader.js 122 // In pairwise mode, a "current-time" line ends the timed range.
tickprocessor.js 823 '--pairwise-timed-range': ['pairwiseTimedRange', true,
833 this.argsDispatch_['--ptr'] = this.argsDispatch_['--pairwise-timed-range'];
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new_handlers.c 131 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap",
3918 const char *pairwise[5]; \/* max 5 pairwise ciphers is supported *\/ local
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/rsa/
rsa.go 263 // Make sure that primes is pairwise unequal.
  /prebuilts/go/linux-x86/src/crypto/rsa/
rsa.go 263 // Make sure that primes is pairwise unequal.

Completed in 1646 milliseconds

1 2 3 4 5