Searched refs:pairwise (Results 1 - 25 of 39) sorted by relevance

12

/external/wpa_supplicant_8/wpa_supplicant/examples/
H A Dwpa-psk-tkip.conf9 pairwise=TKIP
H A Dwpa2-eap-ccmp.conf9 pairwise=CCMP
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpa_supplicant.conf110 # key_mgmt, pairwise, group, proto variables
647 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not
726 # pairwise: list of accepted pairwise (unicast) ciphers for WPA
730 # pairwise keys)
1162 pairwise=CCMP TKIP
1173 pairwise=TKIP
1185 pairwise=CCMP TKIP
1254 # Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and
1261 pairwise
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth_ft.c150 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa
160 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa
206 const u8 *pmk_r0_name, int pairwise)
220 r0->pairwise = pairwise;
231 u8 *pmk_r0, int *pairwise)
242 if (pairwise)
243 *pairwise = r0->pairwise;
256 const u8 *pmk_r1_name, int pairwise)
204 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, const u8 *pmk_r0_name, int pairwise) argument
229 wpa_ft_fetch_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0_name, u8 *pmk_r0, int *pairwise) argument
254 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, const u8 *pmk_r1_name, int pairwise) argument
279 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, int *pairwise) argument
811 int pairwise; local
1319 int pairwise; local
1453 int pairwise, res; local
1524 int pairwise; local
1719 wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_ft_pmk_r0_sa *pmk_r0, struct ft_remote_r1kh *r1kh, const u8 *s1kh_id, int pairwise) argument
[all...]
H A Dwpa_auth.h73 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame
92 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
H A Dwpa_auth.c804 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
807 "pairwise cipher is not TKIP");
945 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
978 if (sm->pairwise == WPA_CIPHER_CCMP ||
979 sm->pairwise == WPA_CIPHER_GCMP) {
1415 int version, pairwise; local
1431 else if (sm->pairwise != WPA_CIPHER_TKIP)
1436 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
1439 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d "
1446 pairwise, (unsigne
1608 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local
3114 u32 pairwise = 0; local
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth_ft.c150 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa
160 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa
206 const u8 *pmk_r0_name, int pairwise)
220 r0->pairwise = pairwise;
231 u8 *pmk_r0, int *pairwise)
242 if (pairwise)
243 *pairwise = r0->pairwise;
256 const u8 *pmk_r1_name, int pairwise)
204 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, const u8 *pmk_r0_name, int pairwise) argument
229 wpa_ft_fetch_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0_name, u8 *pmk_r0, int *pairwise) argument
254 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, const u8 *pmk_r1_name, int pairwise) argument
279 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, int *pairwise) argument
811 int pairwise; local
1319 int pairwise; local
1453 int pairwise, res; local
1524 int pairwise; local
1719 wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_ft_pmk_r0_sa *pmk_r0, struct ft_remote_r1kh *r1kh, const u8 *s1kh_id, int pairwise) argument
[all...]
H A Dwpa_auth.h73 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame
92 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
H A Dwpa_auth.c804 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
807 "pairwise cipher is not TKIP");
945 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
978 if (sm->pairwise == WPA_CIPHER_CCMP ||
979 sm->pairwise == WPA_CIPHER_GCMP) {
1415 int version, pairwise; local
1431 else if (sm->pairwise != WPA_CIPHER_TKIP)
1436 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
1439 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d "
1446 pairwise, (unsigne
1608 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local
3114 u32 pairwise = 0; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth_ft.c150 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa
160 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa
206 const u8 *pmk_r0_name, int pairwise)
220 r0->pairwise = pairwise;
231 u8 *pmk_r0, int *pairwise)
242 if (pairwise)
243 *pairwise = r0->pairwise;
256 const u8 *pmk_r1_name, int pairwise)
204 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, const u8 *pmk_r0_name, int pairwise) argument
229 wpa_ft_fetch_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0_name, u8 *pmk_r0, int *pairwise) argument
254 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, const u8 *pmk_r1_name, int pairwise) argument
279 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, int *pairwise) argument
811 int pairwise; local
1319 int pairwise; local
1453 int pairwise, res; local
1524 int pairwise; local
1719 wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_ft_pmk_r0_sa *pmk_r0, struct ft_remote_r1kh *r1kh, const u8 *s1kh_id, int pairwise) argument
[all...]
H A Dwpa_auth.h73 le16 pairwise; member in struct:ft_r0kh_r1kh_resp_frame
92 le16 pairwise; member in struct:ft_r0kh_r1kh_push_frame
H A Dwpa_auth.c804 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
807 "pairwise cipher is not TKIP");
945 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
978 if (sm->pairwise == WPA_CIPHER_CCMP ||
979 sm->pairwise == WPA_CIPHER_GCMP) {
1415 int version, pairwise; local
1431 else if (sm->pairwise != WPA_CIPHER_TKIP)
1436 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
1439 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d "
1446 pairwise, (unsigne
1608 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local
3114 u32 pairwise = 0; local
[all...]
/external/guava/guava-gwt/test-super/com/google/common/base/super/com/google/common/base/
H A DEquivalenceTest.java36 EquivalenceTester.of(Equivalence.equals().<String>pairwise())
46 .addEqualityGroup(Equivalence.equals().pairwise(), Equivalence.equals().pairwise())
47 .addEqualityGroup(Equivalence.identity().pairwise())
/external/guava/guava-tests/test/com/google/common/base/
H A DEquivalenceTest.java39 EquivalenceTester.of(Equivalence.equals().<String>pairwise())
49 .addEqualityGroup(Equivalence.equals().pairwise(), Equivalence.equals().pairwise())
50 .addEqualityGroup(Equivalence.identity().pairwise())
/external/guava/guava/src/com/google/common/base/
H A DEquivalence.java241 public final <S extends T> Equivalence<Iterable<S>> pairwise() { method in class:Equivalence
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_ndis.c916 const u8 *bssid, int pairwise)
926 if (pairwise)
932 if (!pairwise) {
946 int pairwise, int key_idx, int set_tx,
962 if (pairwise)
987 int res, pairwise; local
992 pairwise = 0;
997 pairwise = 1;
1003 pairwise);
1007 return wpa_driver_ndis_add_wep(drv, pairwise, key_id
914 wpa_driver_ndis_remove_key(struct wpa_driver_ndis_data *drv, int key_idx, const u8 *addr, const u8 *bssid, int pairwise) argument
945 wpa_driver_ndis_add_wep(struct wpa_driver_ndis_data *drv, int pairwise, int key_idx, int set_tx, const u8 *key, size_t key_len) argument
1533 int pairwise = 0, group = 0; local
[all...]
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_ndis.c916 const u8 *bssid, int pairwise)
926 if (pairwise)
932 if (!pairwise) {
946 int pairwise, int key_idx, int set_tx,
962 if (pairwise)
987 int res, pairwise; local
992 pairwise = 0;
997 pairwise = 1;
1003 pairwise);
1007 return wpa_driver_ndis_add_wep(drv, pairwise, key_id
914 wpa_driver_ndis_remove_key(struct wpa_driver_ndis_data *drv, int key_idx, const u8 *addr, const u8 *bssid, int pairwise) argument
945 wpa_driver_ndis_add_wep(struct wpa_driver_ndis_data *drv, int pairwise, int key_idx, int set_tx, const u8 *key, size_t key_len) argument
1533 int pairwise = 0, group = 0; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_ndis.c916 const u8 *bssid, int pairwise)
926 if (pairwise)
932 if (!pairwise) {
946 int pairwise, int key_idx, int set_tx,
962 if (pairwise)
987 int res, pairwise; local
992 pairwise = 0;
997 pairwise = 1;
1003 pairwise);
1007 return wpa_driver_ndis_add_wep(drv, pairwise, key_id
914 wpa_driver_ndis_remove_key(struct wpa_driver_ndis_data *drv, int key_idx, const u8 *addr, const u8 *bssid, int pairwise) argument
945 wpa_driver_ndis_add_wep(struct wpa_driver_ndis_data *drv, int pairwise, int key_idx, int set_tx, const u8 *key, size_t key_len) argument
1533 int pairwise = 0, group = 0; local
[all...]
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_common.c127 * @ptk: Buffer for pairwise transient key
129 * @cipher: Negotiated pairwise cipher
597 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
609 "pairwise cipher", __func__);
766 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
1636 int pairwise = 0; local
1638 /* Select group cipher based on the enabled pairwise cipher suites */
1640 pairwise |= wpa_pairwise;
1642 pairwise |= rsn_pairwise;
1644 if (pairwise
[all...]
/external/wpa_supplicant_8/src/common/
H A Dwpa_common.c127 * @ptk: Buffer for pairwise transient key
129 * @cipher: Negotiated pairwise cipher
597 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
609 "pairwise cipher", __func__);
766 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
1636 int pairwise = 0; local
1638 /* Select group cipher based on the enabled pairwise cipher suites */
1640 pairwise |= wpa_pairwise;
1642 pairwise |= rsn_pairwise;
1644 if (pairwise
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dwpa_common.c127 * @ptk: Buffer for pairwise transient key
129 * @cipher: Negotiated pairwise cipher
597 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
609 "pairwise cipher", __func__);
766 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
1636 int pairwise = 0; local
1638 /* Select group cipher based on the enabled pairwise cipher suites */
1640 pairwise |= wpa_pairwise;
1642 pairwise |= rsn_pairwise;
1644 if (pairwise
[all...]
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
H A Dnetworkconfig.cpp244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local
281 pairwise = "TKIP";
283 pairwise = "CCMP";
290 if (pairwise) {
291 setNetworkParam(id, "pairwise", pairwise, false);
549 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.h139 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
266 int pairwise)
265 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.h139 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
266 int pairwise)
265 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.h139 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
266 int pairwise)
265 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) argument

Completed in 387 milliseconds

12