Searched refs:pairwise (Results 1 - 25 of 47) sorted by relevance

12

/external/wpa_supplicant_6/wpa_supplicant/examples/
H A Dwpa-psk-tkip.conf9 pairwise=TKIP
H A Dwpa2-eap-ccmp.conf9 pairwise=CCMP
/external/wpa_supplicant_8/wpa_supplicant/examples/
H A Dwpa-psk-tkip.conf9 pairwise=TKIP
H A Dwpa2-eap-ccmp.conf9 pairwise=CCMP
/external/wpa_supplicant_6/wpa_supplicant/
H A Dwpa_supplicant.conf.orig104 # key_mgmt, pairwise, group, proto variables
248 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not
280 # pairwise: list of accepted pairwise (unicast) ciphers for WPA
284 # pairwise keys)
532 pairwise=CCMP TKIP
543 pairwise=TKIP
555 pairwise=CCMP TKIP
624 # Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and
631 pairwise
[all...]
H A Devents.c991 int pairwise; local
995 pairwise = (data && data->michael_mic_failure.unicast);
1013 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
1058 wpa_s->pending_mic_error_pairwise = pairwise;
1067 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
1070 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpa_supplicant.conf106 # key_mgmt, pairwise, group, proto variables
456 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not
509 # pairwise: list of accepted pairwise (unicast) ciphers for WPA
513 # pairwise keys)
813 pairwise=CCMP TKIP
824 pairwise=TKIP
836 pairwise=CCMP TKIP
905 # Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and
912 pairwise
[all...]
H A Dap.c49 int pairwise; local
210 /* Select group cipher based on the enabled pairwise cipher suites */
211 pairwise = 0;
213 pairwise |= bss->wpa_pairwise;
217 pairwise |= bss->rsn_pairwise;
219 if (pairwise & WPA_CIPHER_TKIP)
221 else if ((pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP)) ==
267 (!(pairwise & WPA_CIPHER_CCMP) || !(bss->wpa & 2)))
474 wpa_printf(MSG_WARNING, "WPA: Failed to select pairwise "
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth_ft.c142 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa
152 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa
198 const u8 *pmk_r0_name, int pairwise)
212 r0->pairwise = pairwise;
223 u8 *pmk_r0, int *pairwise)
234 if (pairwise)
235 *pairwise = r0->pairwise;
248 const u8 *pmk_r1_name, int pairwise)
196 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, const u8 *pmk_r0_name, int pairwise) argument
221 wpa_ft_fetch_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0_name, u8 *pmk_r0, int *pairwise) argument
246 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, const u8 *pmk_r1_name, int pairwise) argument
271 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, int *pairwise) argument
793 int pairwise; local
1253 int pairwise; local
1335 int pairwise; local
1403 int pairwise; local
1589 wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_ft_pmk_r0_sa *pmk_r0, struct ft_remote_r1kh *r1kh, const u8 *s1kh_id, int pairwise) argument
[all...]
H A Dwpa_auth.c716 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
719 "pairwise cipher is not TKIP");
799 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
832 if (sm->pairwise == WPA_CIPHER_CCMP ||
833 sm->pairwise == WPA_CIPHER_GCMP) {
1215 int version, pairwise; local
1224 else if (sm->pairwise != WPA_CIPHER_TKIP)
1229 pairwise = key_info & WPA_KEY_INFO_KEY_TYPE;
1232 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d "
1239 pairwise, (unsigne
1361 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local
2829 u32 pairwise = 0; local
[all...]
H A Dwpa_auth.h71 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame
90 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth_ft.c142 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa
152 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa
198 const u8 *pmk_r0_name, int pairwise)
212 r0->pairwise = pairwise;
223 u8 *pmk_r0, int *pairwise)
234 if (pairwise)
235 *pairwise = r0->pairwise;
248 const u8 *pmk_r1_name, int pairwise)
196 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, const u8 *pmk_r0_name, int pairwise) argument
221 wpa_ft_fetch_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0_name, u8 *pmk_r0, int *pairwise) argument
246 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, const u8 *pmk_r1_name, int pairwise) argument
271 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, int *pairwise) argument
793 int pairwise; local
1253 int pairwise; local
1335 int pairwise; local
1403 int pairwise; local
1589 wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_ft_pmk_r0_sa *pmk_r0, struct ft_remote_r1kh *r1kh, const u8 *s1kh_id, int pairwise) argument
[all...]
H A Dwpa_auth.c716 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
719 "pairwise cipher is not TKIP");
799 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
832 if (sm->pairwise == WPA_CIPHER_CCMP ||
833 sm->pairwise == WPA_CIPHER_GCMP) {
1215 int version, pairwise; local
1224 else if (sm->pairwise != WPA_CIPHER_TKIP)
1229 pairwise = key_info & WPA_KEY_INFO_KEY_TYPE;
1232 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d "
1239 pairwise, (unsigne
1361 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local
2829 u32 pairwise = 0; local
[all...]
H A Dwpa_auth.h71 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame
90 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth_ft.c142 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa
152 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa
198 const u8 *pmk_r0_name, int pairwise)
212 r0->pairwise = pairwise;
223 u8 *pmk_r0, int *pairwise)
234 if (pairwise)
235 *pairwise = r0->pairwise;
248 const u8 *pmk_r1_name, int pairwise)
196 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, const u8 *pmk_r0_name, int pairwise) argument
221 wpa_ft_fetch_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0_name, u8 *pmk_r0, int *pairwise) argument
246 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, const u8 *pmk_r1_name, int pairwise) argument
271 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, int *pairwise) argument
793 int pairwise; local
1253 int pairwise; local
1335 int pairwise; local
1403 int pairwise; local
1589 wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_ft_pmk_r0_sa *pmk_r0, struct ft_remote_r1kh *r1kh, const u8 *s1kh_id, int pairwise) argument
[all...]
H A Dwpa_auth.c716 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
719 "pairwise cipher is not TKIP");
799 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
832 if (sm->pairwise == WPA_CIPHER_CCMP ||
833 sm->pairwise == WPA_CIPHER_GCMP) {
1215 int version, pairwise; local
1224 else if (sm->pairwise != WPA_CIPHER_TKIP)
1229 pairwise = key_info & WPA_KEY_INFO_KEY_TYPE;
1232 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d "
1239 pairwise, (unsigne
1361 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local
2829 u32 pairwise = 0; local
[all...]
H A Dwpa_auth.h71 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame
90 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
/external/guava/guava-tests/test/com/google/common/base/
H A DEquivalenceTest.java38 EquivalenceTester.of(Equivalences.equals().<String>pairwise())
48 .addEqualityGroup(Equivalences.equals().pairwise(), Equivalences.equals().pairwise())
49 .addEqualityGroup(Equivalences.identity().pairwise())
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui/
H A Dnetworkconfig.ui.h138 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local
168 pairwise = "TKIP";
170 pairwise = "CCMP";
177 if (pairwise) {
178 setNetworkParam(id, "pairwise", pairwise, false);
360 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
H A Dwpa.h121 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
235 int pairwise)
234 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/
H A Ddriver_ralink.c1178 const u8 *bssid, int pairwise)
1191 if (pairwise)
1200 if (0 /* !pairwise */) {
1212 int pairwise, int key_idx, int set_tx,
1252 int res, pairwise; local
1263 pairwise = 0;
1267 pairwise = 1;
1273 pairwise);
1277 return wpa_driver_ralink_add_wep(drv, pairwise, key_idx,
1293 if (pairwise)
1176 wpa_driver_ralink_remove_key(struct wpa_driver_ralink_data *drv, int key_idx, const u8 *addr, const u8 *bssid, int pairwise) argument
1211 wpa_driver_ralink_add_wep(struct wpa_driver_ralink_data *drv, int pairwise, int key_idx, int set_tx, const u8 *key, size_t key_len) argument
[all...]
/external/guava/guava/src/com/google/common/base/
H A DEquivalence.java244 public final <S extends T> Equivalence<Iterable<S>> pairwise() { method in class:Equivalence
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.h123 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
244 int pairwise)
243 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.h123 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
244 int pairwise)
243 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.h123 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
244 int pairwise)
243 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument

Completed in 547 milliseconds

12