/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_i.h | 104 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
|
H A D | wpa_auth_ie.c | 54 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 139 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 586 wpa_printf(MSG_DEBUG, "Invalid %s pairwise cipher (0x%x) " 638 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); 639 if (sm->pairwise < 0) 711 sm->pairwise = WPA_CIPHER_CCMP;
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_i.h | 104 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
|
H A D | wpa_auth_ie.c | 54 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 139 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 586 wpa_printf(MSG_DEBUG, "Invalid %s pairwise cipher (0x%x) " 638 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); 639 if (sm->pairwise < 0) 711 sm->pairwise = WPA_CIPHER_CCMP;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.c | 54 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 139 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 586 wpa_printf(MSG_DEBUG, "Invalid %s pairwise cipher (0x%x) " 638 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); 639 if (sm->pairwise < 0) 711 sm->pairwise = WPA_CIPHER_CCMP;
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers.c | 141 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap", 2304 /***** pairwise cipher */ 3694 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ local 3760 pairwise[n++] = "tkip"; 3762 pairwise[n++] = "ccmp"; 3764 pairwise[n++] = "gcmp"; 3766 pairwise[n++] = "ccmp-256"; 3768 pairwise[n++] = "gcmp-256"; 3771 pairwise, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | events.c | 2264 int pairwise; local 2268 pairwise = (data && data->michael_mic_failure.unicast); 2286 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 2334 wpa_s->pending_mic_error_pairwise = pairwise; 2343 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 2346 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
|
H A D | config.c | 733 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher " 738 wpa_printf(MSG_MSGDUMP, "pairwise: 0x%x", val); 1640 { FUNC(pairwise) },
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 79 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet 85 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument 121 if (pairwise) 133 "pairwise=%d ptk_set=%d len=%lu)", 134 error, pairwise, sm->ptk_set, (unsigned long) rlen); 558 "Suite: NONE - do not use pairwise keys"); 564 "WPA: Unsupported pairwise cipher %d", 684 /* Ignore Tx bit for GTK if a pairwise key is used. One AP 690 "WPA: Tx bit set for GTK, but pairwise " [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.c | 79 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet 85 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument 121 if (pairwise) 133 "pairwise=%d ptk_set=%d len=%lu)", 134 error, pairwise, sm->ptk_set, (unsigned long) rlen); 558 "Suite: NONE - do not use pairwise keys"); 564 "WPA: Unsupported pairwise cipher %d", 684 /* Ignore Tx bit for GTK if a pairwise key is used. One AP 690 "WPA: Tx bit set for GTK, but pairwise " [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.c | 79 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet 85 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument 121 if (pairwise) 133 "pairwise=%d ptk_set=%d len=%lu)", 134 error, pairwise, sm->ptk_set, (unsigned long) rlen); 558 "Suite: NONE - do not use pairwise keys"); 564 "WPA: Unsupported pairwise cipher %d", 684 /* Ignore Tx bit for GTK if a pairwise key is used. One AP 690 "WPA: Tx bit set for GTK, but pairwise " [all...] |
/external/qemu/target-arm/ |
H A D | translate.c | 3682 /* 32-bit pairwise ops end up the same as the elementwise versions. */ 4501 int pairwise; local 4598 pairwise = 0; 4619 pairwise = 1; 4622 pairwise = (u && size < 2); /* if VPADD (float) */ 4625 pairwise = u; /* if VPMIN/VPMAX (float) */ 4653 if (pairwise && q) { 4654 /* All the pairwise insns UNDEF if Q is set */ 4660 if (pairwise) { 4935 straight into the destination register. For pairwise operation [all...] |
/external/owasp/sanitizer/distrib/lib/ |
H A D | guava.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/common/ com/google/common/collect/ ... |
/external/owasp/sanitizer/lib/guava-libraries/ |
H A D | guava.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/common/ com/google/common/collect/ ... |
/external/chromium_org/third_party/WebKit/Source/devtools/scripts/closure/ |
H A D | compiler.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/debugging/ com/google/debugging/sourcemap/ ... |