/external/guava/guava/src/com/google/common/base/ |
H A D | Equivalence.java | 241 public final <S extends T> Equivalence<Iterable<S>> pairwise() { method in class:Equivalence
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
H A D | networkconfig.cpp | 244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local 281 pairwise = "TKIP"; 283 pairwise = "CCMP"; 290 if (pairwise) { 291 setNetworkParam(id, "pairwise", pairwise, false); 549 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.h | 73 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame 92 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
|
H A D | wpa_auth_ft.c | 150 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa 160 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa 206 const u8 *pmk_r0_name, int pairwise) 220 r0->pairwise = pairwise; 231 u8 *pmk_r0, int *pairwise) 242 if (pairwise) 243 *pairwise = r0->pairwise; 256 const u8 *pmk_r1_name, int pairwise) 204 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, const u8 *pmk_r0_name, int pairwise) argument 229 wpa_ft_fetch_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0_name, u8 *pmk_r0, int *pairwise) argument 254 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, const u8 *pmk_r1_name, int pairwise) argument 279 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, int *pairwise) argument 811 int pairwise; local 1319 int pairwise; local 1453 int pairwise, res; local 1524 int pairwise; local 1719 wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_ft_pmk_r0_sa *pmk_r0, struct ft_remote_r1kh *r1kh, const u8 *s1kh_id, int pairwise) argument [all...] |
H A D | wpa_auth_i.h | 107 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
|
H A D | wpa_auth.c | 804 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { 807 "pairwise cipher is not TKIP"); 945 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys 978 if (sm->pairwise == WPA_CIPHER_CCMP || 979 sm->pairwise == WPA_CIPHER_GCMP) { 1415 int version, pairwise; local 1431 else if (sm->pairwise != WPA_CIPHER_TKIP) 1436 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); 1439 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d " 1446 pairwise, (unsigne 1608 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local 3114 u32 pairwise = 0; local [all...] |
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 127 * @ptk: Buffer for pairwise transient key 129 * @cipher: Negotiated pairwise cipher 597 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 609 "pairwise cipher", __func__); 766 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 1636 int pairwise = 0; local 1638 /* Select group cipher based on the enabled pairwise cipher suites */ 1640 pairwise |= wpa_pairwise; 1642 pairwise |= rsn_pairwise; 1644 if (pairwise [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.h | 139 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 266 int pairwise) 265 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
|
H A D | wpa.c | 83 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet 89 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument 130 if (pairwise) 149 "pairwise=%d ptk_set=%d len=%lu)", 150 error, pairwise, sm->ptk_set, (unsigned long) rlen); 602 "Suite: NONE - do not use pairwise keys"); 608 "WPA: Unsupported pairwise cipher %d", 731 /* Ignore Tx bit for GTK if a pairwise key is used. One AP 737 "WPA: Tx bit set for GTK, but pairwise " [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth.h | 73 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame 92 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
|
H A D | wpa_auth_ft.c | 150 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa 160 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa 206 const u8 *pmk_r0_name, int pairwise) 220 r0->pairwise = pairwise; 231 u8 *pmk_r0, int *pairwise) 242 if (pairwise) 243 *pairwise = r0->pairwise; 256 const u8 *pmk_r1_name, int pairwise) 204 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, const u8 *pmk_r0_name, int pairwise) argument 229 wpa_ft_fetch_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0_name, u8 *pmk_r0, int *pairwise) argument 254 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, const u8 *pmk_r1_name, int pairwise) argument 279 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, int *pairwise) argument 811 int pairwise; local 1319 int pairwise; local 1453 int pairwise, res; local 1524 int pairwise; local 1719 wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_ft_pmk_r0_sa *pmk_r0, struct ft_remote_r1kh *r1kh, const u8 *s1kh_id, int pairwise) argument [all...] |
H A D | wpa_auth_i.h | 107 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
|
H A D | wpa_auth.c | 804 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { 807 "pairwise cipher is not TKIP"); 945 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys 978 if (sm->pairwise == WPA_CIPHER_CCMP || 979 sm->pairwise == WPA_CIPHER_GCMP) { 1415 int version, pairwise; local 1431 else if (sm->pairwise != WPA_CIPHER_TKIP) 1436 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); 1439 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d " 1446 pairwise, (unsigne 1608 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local 3114 u32 pairwise = 0; local [all...] |
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 127 * @ptk: Buffer for pairwise transient key 129 * @cipher: Negotiated pairwise cipher 597 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 609 "pairwise cipher", __func__); 766 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 1636 int pairwise = 0; local 1638 /* Select group cipher based on the enabled pairwise cipher suites */ 1640 pairwise |= wpa_pairwise; 1642 pairwise |= rsn_pairwise; 1644 if (pairwise [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.h | 139 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 266 int pairwise) 265 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
|
H A D | wpa.c | 83 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet 89 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument 130 if (pairwise) 149 "pairwise=%d ptk_set=%d len=%lu)", 150 error, pairwise, sm->ptk_set, (unsigned long) rlen); 602 "Suite: NONE - do not use pairwise keys"); 608 "WPA: Unsupported pairwise cipher %d", 731 /* Ignore Tx bit for GTK if a pairwise key is used. One AP 737 "WPA: Tx bit set for GTK, but pairwise " [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth.h | 73 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame 92 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
|
H A D | wpa_auth_ft.c | 150 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa 160 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa 206 const u8 *pmk_r0_name, int pairwise) 220 r0->pairwise = pairwise; 231 u8 *pmk_r0, int *pairwise) 242 if (pairwise) 243 *pairwise = r0->pairwise; 256 const u8 *pmk_r1_name, int pairwise) 204 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, const u8 *pmk_r0_name, int pairwise) argument 229 wpa_ft_fetch_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0_name, u8 *pmk_r0, int *pairwise) argument 254 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, const u8 *pmk_r1_name, int pairwise) argument 279 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, int *pairwise) argument 811 int pairwise; local 1319 int pairwise; local 1453 int pairwise, res; local 1524 int pairwise; local 1719 wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_ft_pmk_r0_sa *pmk_r0, struct ft_remote_r1kh *r1kh, const u8 *s1kh_id, int pairwise) argument [all...] |
H A D | wpa_auth_i.h | 107 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
|
H A D | wpa_auth.c | 804 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { 807 "pairwise cipher is not TKIP"); 945 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys 978 if (sm->pairwise == WPA_CIPHER_CCMP || 979 sm->pairwise == WPA_CIPHER_GCMP) { 1415 int version, pairwise; local 1431 else if (sm->pairwise != WPA_CIPHER_TKIP) 1436 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); 1439 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d " 1446 pairwise, (unsigne 1608 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local 3114 u32 pairwise = 0; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 127 * @ptk: Buffer for pairwise transient key 129 * @cipher: Negotiated pairwise cipher 597 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 609 "pairwise cipher", __func__); 766 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 1636 int pairwise = 0; local 1638 /* Select group cipher based on the enabled pairwise cipher suites */ 1640 pairwise |= wpa_pairwise; 1642 pairwise |= rsn_pairwise; 1644 if (pairwise [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.h | 139 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 266 int pairwise) 265 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
|
H A D | wpa.c | 83 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet 89 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument 130 if (pairwise) 149 "pairwise=%d ptk_set=%d len=%lu)", 150 error, pairwise, sm->ptk_set, (unsigned long) rlen); 602 "Suite: NONE - do not use pairwise keys"); 608 "WPA: Unsupported pairwise cipher %d", 731 /* Ignore Tx bit for GTK if a pairwise key is used. One AP 737 "WPA: Tx bit set for GTK, but pairwise " [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers.c | 131 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap", 2356 /***** pairwise cipher */ 3654 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ local 3728 pairwise[n++] = "tkip"; 3730 pairwise[n++] = "ccmp"; 3732 pairwise[n++] = "gcmp"; 3734 pairwise[n++] = "ccmp-256"; 3736 pairwise[n++] = "gcmp-256"; 3739 pairwise, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | events.c | 2443 int pairwise; local 2447 pairwise = (data && data->michael_mic_failure.unicast); 2465 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 2513 wpa_s->pending_mic_error_pairwise = pairwise; 2522 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 2525 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
|