/external/wpa_supplicant_6/wpa_supplicant/examples/ |
H A D | wpa-psk-tkip.conf | 9 pairwise=TKIP
|
H A D | wpa2-eap-ccmp.conf | 9 pairwise=CCMP
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
H A D | wpa-psk-tkip.conf | 9 pairwise=TKIP
|
H A D | wpa2-eap-ccmp.conf | 9 pairwise=CCMP
|
/external/wpa_supplicant_6/wpa_supplicant/ |
H A D | wpa_supplicant.conf.orig | 104 # key_mgmt, pairwise, group, proto variables 248 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not 280 # pairwise: list of accepted pairwise (unicast) ciphers for WPA 284 # pairwise keys) 532 pairwise=CCMP TKIP 543 pairwise=TKIP 555 pairwise=CCMP TKIP 624 # Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and 631 pairwise [all...] |
H A D | events.c | 991 int pairwise; local 995 pairwise = (data && data->michael_mic_failure.unicast); 1013 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 1058 wpa_s->pending_mic_error_pairwise = pairwise; 1067 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 1070 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 106 # key_mgmt, pairwise, group, proto variables 456 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not 509 # pairwise: list of accepted pairwise (unicast) ciphers for WPA 513 # pairwise keys) 813 pairwise=CCMP TKIP 824 pairwise=TKIP 836 pairwise=CCMP TKIP 905 # Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and 912 pairwise [all...] |
H A D | ap.c | 49 int pairwise; local 210 /* Select group cipher based on the enabled pairwise cipher suites */ 211 pairwise = 0; 213 pairwise |= bss->wpa_pairwise; 217 pairwise |= bss->rsn_pairwise; 219 if (pairwise & WPA_CIPHER_TKIP) 221 else if ((pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP)) == 267 (!(pairwise & WPA_CIPHER_CCMP) || !(bss->wpa & 2))) 474 wpa_printf(MSG_WARNING, "WPA: Failed to select pairwise "
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ft.c | 142 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa 152 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa 198 const u8 *pmk_r0_name, int pairwise) 212 r0->pairwise = pairwise; 223 u8 *pmk_r0, int *pairwise) 234 if (pairwise) 235 *pairwise = r0->pairwise; 248 const u8 *pmk_r1_name, int pairwise) 196 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, const u8 *pmk_r0_name, int pairwise) argument 221 wpa_ft_fetch_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0_name, u8 *pmk_r0, int *pairwise) argument 246 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, const u8 *pmk_r1_name, int pairwise) argument 271 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, int *pairwise) argument 793 int pairwise; local 1253 int pairwise; local 1335 int pairwise; local 1403 int pairwise; local 1589 wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_ft_pmk_r0_sa *pmk_r0, struct ft_remote_r1kh *r1kh, const u8 *s1kh_id, int pairwise) argument [all...] |
H A D | wpa_auth.c | 716 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { 719 "pairwise cipher is not TKIP"); 799 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys 832 if (sm->pairwise == WPA_CIPHER_CCMP || 833 sm->pairwise == WPA_CIPHER_GCMP) { 1215 int version, pairwise; local 1224 else if (sm->pairwise != WPA_CIPHER_TKIP) 1229 pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; 1232 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d " 1239 pairwise, (unsigne 1361 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local 2829 u32 pairwise = 0; local [all...] |
H A D | wpa_auth.h | 71 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame 90 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ft.c | 142 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa 152 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa 198 const u8 *pmk_r0_name, int pairwise) 212 r0->pairwise = pairwise; 223 u8 *pmk_r0, int *pairwise) 234 if (pairwise) 235 *pairwise = r0->pairwise; 248 const u8 *pmk_r1_name, int pairwise) 196 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, const u8 *pmk_r0_name, int pairwise) argument 221 wpa_ft_fetch_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0_name, u8 *pmk_r0, int *pairwise) argument 246 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, const u8 *pmk_r1_name, int pairwise) argument 271 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, int *pairwise) argument 793 int pairwise; local 1253 int pairwise; local 1335 int pairwise; local 1403 int pairwise; local 1589 wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_ft_pmk_r0_sa *pmk_r0, struct ft_remote_r1kh *r1kh, const u8 *s1kh_id, int pairwise) argument [all...] |
H A D | wpa_auth.c | 716 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { 719 "pairwise cipher is not TKIP"); 799 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys 832 if (sm->pairwise == WPA_CIPHER_CCMP || 833 sm->pairwise == WPA_CIPHER_GCMP) { 1215 int version, pairwise; local 1224 else if (sm->pairwise != WPA_CIPHER_TKIP) 1229 pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; 1232 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d " 1239 pairwise, (unsigne 1361 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local 2829 u32 pairwise = 0; local [all...] |
H A D | wpa_auth.h | 71 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame 90 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ft.c | 142 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa 152 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa 198 const u8 *pmk_r0_name, int pairwise) 212 r0->pairwise = pairwise; 223 u8 *pmk_r0, int *pairwise) 234 if (pairwise) 235 *pairwise = r0->pairwise; 248 const u8 *pmk_r1_name, int pairwise) 196 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, const u8 *pmk_r0_name, int pairwise) argument 221 wpa_ft_fetch_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0_name, u8 *pmk_r0, int *pairwise) argument 246 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, const u8 *pmk_r1_name, int pairwise) argument 271 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, int *pairwise) argument 793 int pairwise; local 1253 int pairwise; local 1335 int pairwise; local 1403 int pairwise; local 1589 wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_ft_pmk_r0_sa *pmk_r0, struct ft_remote_r1kh *r1kh, const u8 *s1kh_id, int pairwise) argument [all...] |
H A D | wpa_auth.c | 716 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { 719 "pairwise cipher is not TKIP"); 799 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys 832 if (sm->pairwise == WPA_CIPHER_CCMP || 833 sm->pairwise == WPA_CIPHER_GCMP) { 1215 int version, pairwise; local 1224 else if (sm->pairwise != WPA_CIPHER_TKIP) 1229 pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; 1232 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d " 1239 pairwise, (unsigne 1361 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local 2829 u32 pairwise = 0; local [all...] |
H A D | wpa_auth.h | 71 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame 90 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
|
/external/guava/guava-tests/test/com/google/common/base/ |
H A D | EquivalenceTest.java | 38 EquivalenceTester.of(Equivalences.equals().<String>pairwise()) 48 .addEqualityGroup(Equivalences.equals().pairwise(), Equivalences.equals().pairwise()) 49 .addEqualityGroup(Equivalences.identity().pairwise())
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui/ |
H A D | networkconfig.ui.h | 138 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local 168 pairwise = "TKIP"; 170 pairwise = "CCMP"; 177 if (pairwise) { 178 setNetworkParam(id, "pairwise", pairwise, false); 360 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.h | 121 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 235 int pairwise) 234 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
H A D | driver_ralink.c | 1178 const u8 *bssid, int pairwise) 1191 if (pairwise) 1200 if (0 /* !pairwise */) { 1212 int pairwise, int key_idx, int set_tx, 1252 int res, pairwise; local 1263 pairwise = 0; 1267 pairwise = 1; 1273 pairwise); 1277 return wpa_driver_ralink_add_wep(drv, pairwise, key_idx, 1293 if (pairwise) 1176 wpa_driver_ralink_remove_key(struct wpa_driver_ralink_data *drv, int key_idx, const u8 *addr, const u8 *bssid, int pairwise) argument 1211 wpa_driver_ralink_add_wep(struct wpa_driver_ralink_data *drv, int pairwise, int key_idx, int set_tx, const u8 *key, size_t key_len) argument [all...] |
/external/guava/guava/src/com/google/common/base/ |
H A D | Equivalence.java | 244 public final <S extends T> Equivalence<Iterable<S>> pairwise() { method in class:Equivalence
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.h | 123 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 244 int pairwise) 243 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.h | 123 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 244 int pairwise) 243 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.h | 123 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 244 int pairwise) 243 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
|