Searched defs:pairwise (Results 1 - 25 of 34) sorted by relevance

12

/external/guava/guava/src/com/google/common/base/
H A DEquivalence.java244 public final <S extends T> Equivalence<Iterable<S>> pairwise() { method in class:Equivalence
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
H A Dnetworkconfig.cpp243 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local
280 pairwise = "TKIP";
282 pairwise = "CCMP";
289 if (pairwise) {
290 setNetworkParam(id, "pairwise", pairwise, false);
548 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth.h72 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame
91 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
H A Dwpa_auth_ft.c149 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa
159 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa
205 const u8 *pmk_r0_name, int pairwise)
219 r0->pairwise = pairwise;
230 u8 *pmk_r0, int *pairwise)
241 if (pairwise)
242 *pairwise = r0->pairwise;
255 const u8 *pmk_r1_name, int pairwise)
203 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, const u8 *pmk_r0_name, int pairwise) argument
228 wpa_ft_fetch_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0_name, u8 *pmk_r0, int *pairwise) argument
253 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, const u8 *pmk_r1_name, int pairwise) argument
278 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, int *pairwise) argument
812 int pairwise; local
1317 int pairwise; local
1447 int pairwise, res; local
1514 int pairwise; local
1706 wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_ft_pmk_r0_sa *pmk_r0, struct ft_remote_r1kh *r1kh, const u8 *s1kh_id, int pairwise) argument
[all...]
H A Dwpa_auth_i.h104 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
H A Dwpa_auth.c765 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
768 "pairwise cipher is not TKIP");
850 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
883 if (sm->pairwise == WPA_CIPHER_CCMP ||
884 sm->pairwise == WPA_CIPHER_GCMP) {
1291 int version, pairwise; local
1302 else if (sm->pairwise != WPA_CIPHER_TKIP)
1307 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
1310 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d "
1317 pairwise, (unsigne
1452 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local
2933 u32 pairwise = 0; local
[all...]
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_common.c82 * @ptk: Buffer for pairwise transient key
500 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
512 "pairwise cipher", __func__);
678 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
1480 int pairwise = 0; local
1482 /* Select group cipher based on the enabled pairwise cipher suites */
1484 pairwise |= wpa_pairwise;
1486 pairwise |= rsn_pairwise;
1488 if (pairwise & WPA_CIPHER_TKIP)
1490 if ((pairwise
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.h131 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
253 int pairwise)
252 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
H A Dwpa.c79 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet
85 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
121 if (pairwise)
133 "pairwise=%d ptk_set=%d len=%lu)",
134 error, pairwise, sm->ptk_set, (unsigned long) rlen);
558 "Suite: NONE - do not use pairwise keys");
564 "WPA: Unsupported pairwise cipher %d",
684 /* Ignore Tx bit for GTK if a pairwise key is used. One AP
690 "WPA: Tx bit set for GTK, but pairwise "
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth.h72 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame
91 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
H A Dwpa_auth_ft.c149 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa
159 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa
205 const u8 *pmk_r0_name, int pairwise)
219 r0->pairwise = pairwise;
230 u8 *pmk_r0, int *pairwise)
241 if (pairwise)
242 *pairwise = r0->pairwise;
255 const u8 *pmk_r1_name, int pairwise)
203 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, const u8 *pmk_r0_name, int pairwise) argument
228 wpa_ft_fetch_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0_name, u8 *pmk_r0, int *pairwise) argument
253 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, const u8 *pmk_r1_name, int pairwise) argument
278 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, int *pairwise) argument
812 int pairwise; local
1317 int pairwise; local
1447 int pairwise, res; local
1514 int pairwise; local
1706 wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_ft_pmk_r0_sa *pmk_r0, struct ft_remote_r1kh *r1kh, const u8 *s1kh_id, int pairwise) argument
[all...]
H A Dwpa_auth_i.h104 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
H A Dwpa_auth.c765 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
768 "pairwise cipher is not TKIP");
850 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
883 if (sm->pairwise == WPA_CIPHER_CCMP ||
884 sm->pairwise == WPA_CIPHER_GCMP) {
1291 int version, pairwise; local
1302 else if (sm->pairwise != WPA_CIPHER_TKIP)
1307 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
1310 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d "
1317 pairwise, (unsigne
1452 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local
2933 u32 pairwise = 0; local
[all...]
/external/wpa_supplicant_8/src/common/
H A Dwpa_common.c82 * @ptk: Buffer for pairwise transient key
500 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
512 "pairwise cipher", __func__);
678 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
1480 int pairwise = 0; local
1482 /* Select group cipher based on the enabled pairwise cipher suites */
1484 pairwise |= wpa_pairwise;
1486 pairwise |= rsn_pairwise;
1488 if (pairwise & WPA_CIPHER_TKIP)
1490 if ((pairwise
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.h131 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
253 int pairwise)
252 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
H A Dwpa.c79 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet
85 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
121 if (pairwise)
133 "pairwise=%d ptk_set=%d len=%lu)",
134 error, pairwise, sm->ptk_set, (unsigned long) rlen);
558 "Suite: NONE - do not use pairwise keys");
564 "WPA: Unsupported pairwise cipher %d",
684 /* Ignore Tx bit for GTK if a pairwise key is used. One AP
690 "WPA: Tx bit set for GTK, but pairwise "
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth.h72 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame
91 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
H A Dwpa_auth_ft.c149 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa
159 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa
205 const u8 *pmk_r0_name, int pairwise)
219 r0->pairwise = pairwise;
230 u8 *pmk_r0, int *pairwise)
241 if (pairwise)
242 *pairwise = r0->pairwise;
255 const u8 *pmk_r1_name, int pairwise)
203 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, const u8 *pmk_r0_name, int pairwise) argument
228 wpa_ft_fetch_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0_name, u8 *pmk_r0, int *pairwise) argument
253 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, const u8 *pmk_r1_name, int pairwise) argument
278 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, int *pairwise) argument
812 int pairwise; local
1317 int pairwise; local
1447 int pairwise, res; local
1514 int pairwise; local
1706 wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_ft_pmk_r0_sa *pmk_r0, struct ft_remote_r1kh *r1kh, const u8 *s1kh_id, int pairwise) argument
[all...]
H A Dwpa_auth_i.h104 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
H A Dwpa_auth.c765 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
768 "pairwise cipher is not TKIP");
850 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
883 if (sm->pairwise == WPA_CIPHER_CCMP ||
884 sm->pairwise == WPA_CIPHER_GCMP) {
1291 int version, pairwise; local
1302 else if (sm->pairwise != WPA_CIPHER_TKIP)
1307 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
1310 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d "
1317 pairwise, (unsigne
1452 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local
2933 u32 pairwise = 0; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dwpa_common.c82 * @ptk: Buffer for pairwise transient key
500 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
512 "pairwise cipher", __func__);
678 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
1480 int pairwise = 0; local
1482 /* Select group cipher based on the enabled pairwise cipher suites */
1484 pairwise |= wpa_pairwise;
1486 pairwise |= rsn_pairwise;
1488 if (pairwise & WPA_CIPHER_TKIP)
1490 if ((pairwise
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.h131 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
253 int pairwise)
252 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
H A Dwpa.c79 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet
85 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
121 if (pairwise)
133 "pairwise=%d ptk_set=%d len=%lu)",
134 error, pairwise, sm->ptk_set, (unsigned long) rlen);
558 "Suite: NONE - do not use pairwise keys");
564 "WPA: Unsupported pairwise cipher %d",
684 /* Ignore Tx bit for GTK if a pairwise key is used. One AP
690 "WPA: Tx bit set for GTK, but pairwise "
[all...]
/external/wpa_supplicant_8/wpa_supplicant/dbus/
H A Ddbus_new_handlers.c142 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap",
2387 /***** pairwise cipher */
3777 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ local
3843 pairwise[n++] = "tkip";
3845 pairwise[n++] = "ccmp";
3847 pairwise[n++] = "gcmp";
3849 pairwise[n++] = "ccmp-256";
3851 pairwise[n++] = "gcmp-256";
3854 pairwise,
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Devents.c2266 int pairwise; local
2270 pairwise = (data && data->michael_mic_failure.unicast);
2288 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
2336 wpa_s->pending_mic_error_pairwise = pairwise;
2345 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
2348 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);

Completed in 472 milliseconds

12