| /src/external/bsd/wpa/dist/wpa_supplicant/examples/ |
| wpa-psk-tkip.conf | 9 pairwise=TKIP
|
| wpa2-eap-ccmp.conf | 9 pairwise=CCMP
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| wpa_supplicant.conf | 105 # key_mgmt, pairwise, group, proto variables 942 # proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not 1063 # pairwise: list of accepted pairwise (unicast) ciphers for WPA 1067 # pairwise keys) 1203 # PTK0 rekeys (using only one Key ID value for pairwise keys) can degrade the 1788 pairwise=CCMP TKIP 1799 pairwise=TKIP 1811 pairwise=CCMP TKIP 1880 # Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise an [all...] |
| events.c | 3237 /* Update pairwise cipher from (Re)Association Request frame info */ 3243 "WPA: AP pairwise cipher 0x%x network pairwise cipher 0x%x; available pairwise cipher 0x%x", 4677 int pairwise; local 4681 pairwise = (data && data->michael_mic_failure.unicast); 4699 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 4747 wpa_s->pending_mic_error_pairwise = pairwise; 4756 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 4759 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); [all...] |
| config.c | 1236 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher " 1243 wpa_printf(MSG_MSGDUMP, "pairwise: 0x%x", val); 2535 { FUNC(pairwise) },
|
| ctrl_iface.c | 4809 if (os_strcmp(field, "pairwise") == 0) 10313 int error, pairwise; local 10319 pairwise = atoi(pos); 10320 wpa_sm_key_request(wpa_s->wpa, error, pairwise);
|
| /src/external/lgpl3/gmp/dist/mpn/x86/pentium/ |
| copyd.asm | 77 movl (%eax), %esi C read words pairwise 79 movl %esi, 56(%edx,%ecx,4) C store words pairwise
|
| copyi.asm | 95 movl (%esi), %eax C read words pairwise 97 movl %eax, -60(%edx,%ecx,4) C store words pairwise
|
| /src/external/bsd/wpa/dist/src/ap/ |
| wpa_auth_ft.c | 1209 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r0_sa 1227 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_ft_pmk_r1_sa 1359 const u8 *pmk_r0_name, int pairwise, 1380 r0->pairwise = pairwise; 1446 const u8 *pmk_r1_name, int pairwise, 1471 r1->pairwise = pairwise; 2990 int pairwise; local 3180 int pairwise, session_timeout = 0; local 4169 int pairwise; local [all...] |
| wpa_auth.c | 1272 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { 1274 "ignore Michael MIC failure report since pairwise cipher is not TKIP"); 1413 if (sm->pairwise != WPA_CIPHER_TKIP && 1613 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys 1661 msgtxt = "4/4 Pairwise"; 1664 msgtxt = "2/4 Pairwise"; 1977 int version, pairwise; local 1992 else if (sm->pairwise != WPA_CIPHER_TKIP) 1997 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); 2000 "WPA: Send EAPOL(version=%d secure=%d mic=%d ack=%d install=%d pairwise=%d kde_len=%zu keyidx=%d encr=%d)" 2199 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local 6058 u32 pairwise = 0; local [all...] |
| wpa_auth_ie.c | 55 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 169 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 473 /* Pairwise Cipher Suite Count and List */ 850 wpa_printf(MSG_DEBUG, "Invalid %s pairwise cipher (0x%x) " 957 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); 958 if (sm->pairwise < 0) 969 * AKM or pairwise cipher from association STA */ 972 if (sm->pairwise != assoc_sm->pairwise) 1064 sm->pairwise != WPA_CIPHER_TKIP & [all...] |
| wpa_auth_i.h | 120 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member in struct:wpa_state_machine
|
| wpa_auth.h | 105 * required: PMK_R1, PMK_R1_NAME, PAIRWISE 542 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise,
|
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver_ndis.c | 904 const u8 *bssid, int pairwise) 914 if (pairwise) 920 if (!pairwise) { 934 int pairwise, int key_idx, int set_tx, 950 if (pairwise) 975 int res, pairwise; local 980 pairwise = 0; 984 /* Pairwise Key */ 985 pairwise = 1; 991 pairwise); 1541 int pairwise = 0, group = 0; local [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/ |
| networkconfig.cpp | 244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local 281 pairwise = "TKIP"; 283 pairwise = "CCMP"; 290 if (pairwise) { 291 setNetworkParam(id, "pairwise", pairwise, false); 549 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id);
|
| /src/usr.bin/make/unit-tests/ |
| varmod-undefined.mk | 33 # need to match pairwise. In the following example, the :S modifier uses '{'
|
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| wpa.h | 219 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 390 int pairwise)
|
| wpa.c | 214 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet 220 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) 227 if (pairwise && sm->wpa_deny_ptk0_rekey && !sm->use_ext_key_id && 269 if (pairwise) 286 "pairwise=%d ptk_set=%d len=%lu)", 287 error, pairwise, sm->ptk_set, (unsigned long) rlen); 720 ret = wpa_pmk_to_ptk(sm->pmk, sm->pmk_len, "Pairwise key expansion", 1203 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Pairwise Cipher " 1204 "Suite: NONE - do not use pairwise keys") [all...] |
| /src/external/bsd/wpa/dist/src/common/ |
| wpa_common.c | 172 * to use AES Keywrap based on the negotiated pairwise cipher. This function 371 * @pmk: Pairwise master key 378 * @ptk: Buffer for pairwise transient key 380 * @cipher: Negotiated pairwise cipher 384 * IEEE Std 802.11i-2004 - 8.5.1.2 Pairwise key hierarchy 385 * PTK = PRF-X(PMK, "Pairwise key expansion", 1434 * on the pairwise cipher suite provided in the RSNE by the AP in the second 1448 * @pmk: Pairwise master key 1455 * @ptk: Buffer for pairwise transient key 1457 * @cipher: Negotiated pairwise ciphe 3346 int pairwise = 0; local [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/dbus/ |
| dbus_new_handlers.c | 140 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap", 3245 /***** pairwise cipher */ 3254 &iter_dict, "Pairwise", args, 3258 if (!wpa_dbus_dict_begin_string_array(&iter_dict, "Pairwise", 5426 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ local 5534 /* Pairwise */ 5538 pairwise[n++] = "tkip"; 5541 pairwise[n++] = "ccmp"; 5543 pairwise[n++] = "gcmp" [all...] |
| /src/external/gpl3/gcc.old/dist/libphobos/src/std/algorithm/ |
| iteration.d | 4288 pairwise summing of floating point numbers. 7284 $(HTTP en.wikipedia.org/wiki/Pairwise_summation, pairwise summation) 7389 // Pairwise summation http://en.wikipedia.org/wiki/Pairwise_summation
|