/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth_ft.c | 1175 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member 1193 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member 1325 const u8 *pmk_r0_name, int pairwise, in wpa_ft_store_pmk_r0() 1346 r0->pairwise = pairwise; in wpa_ft_store_pmk_r0() 1412 const u8 *pmk_r1_name, int pairwise, in wpa_ft_store_pmk_r1() 1437 r1->pairwise = pairwise; in wpa_ft_store_pmk_r1() 1478 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, in wpa_ft_fetch_pmk_r1() 1496 if (pairwise) in wpa_ft_fetch_pmk_r1() 1322 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, size_t pmk_r0_len, const u8 *pmk_r0_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) wpa_ft_store_pmk_r0() argument 1409 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, size_t pmk_r1_len, const u8 *pmk_r1_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) wpa_ft_store_pmk_r1() argument 1476 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, struct vlan_description *vlan, const u8 **identity, size_t *identity_len, const u8 **radius_cui, size_t *radius_cui_len, int *session_timeout) wpa_ft_fetch_pmk_r1() argument 2877 int pairwise; wpa_ft_psk_pmk_r1() local 3064 int pairwise, session_timeout = 0; wpa_ft_process_auth_req() local 3985 int pairwise; wpa_ft_rrb_rx_r1() local [all...] |
H A D | wpa_auth.c | 937 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { in wpa_receive_error_report() 939 "ignore Michael MIC failure report since pairwise cipher is not TKIP"); in wpa_receive_error_report() 1116 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys in wpa_receive() 1143 if (sm->pairwise == WPA_CIPHER_CCMP || in wpa_receive() 1144 sm->pairwise == WPA_CIPHER_GCMP) { in wpa_receive() 1527 int version, pairwise; in __wpa_send_eapol() local 1542 else if (sm->pairwise != WPA_CIPHER_TKIP) in __wpa_send_eapol() 1547 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); in __wpa_send_eapol() 1550 "WPA: Send EAPOL(version=%d secure=%d mic=%d ack=%d install=%d pairwise=%d kde_len=%zu keyidx=%d encr=%d)", in __wpa_send_eapol() 1556 pairwise, kde_le in __wpa_send_eapol() 1734 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; wpa_send_eapol() local 4652 u32 pairwise = 0; wpa_get_mib_sta() local [all...] |
H A D | wpa_auth_ie.c | 54 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", in wpa_write_wpa_ie() 168 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", in wpa_write_rsn_ie() 816 wpa_printf(MSG_DEBUG, "Invalid %s pairwise cipher (0x%x) " in wpa_validate_wpa_ie() 922 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie() 923 if (sm->pairwise < 0) in wpa_validate_wpa_ie() 1007 sm->pairwise != WPA_CIPHER_TKIP && in wpa_validate_wpa_ie() 1062 sm->pairwise = WPA_CIPHER_CCMP; in wpa_validate_osen()
|
H A D | wpa_auth_i.h | 116 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
|
H A D | wpa_auth.h | 480 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth_ft.c | 1173 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member 1191 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member 1323 const u8 *pmk_r0_name, int pairwise, in wpa_ft_store_pmk_r0() 1344 r0->pairwise = pairwise; in wpa_ft_store_pmk_r0() 1410 const u8 *pmk_r1_name, int pairwise, in wpa_ft_store_pmk_r1() 1435 r1->pairwise = pairwise; in wpa_ft_store_pmk_r1() 1476 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, in wpa_ft_fetch_pmk_r1() 1494 if (pairwise) in wpa_ft_fetch_pmk_r1() 1320 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, size_t pmk_r0_len, const u8 *pmk_r0_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) wpa_ft_store_pmk_r0() argument 1407 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, size_t pmk_r1_len, const u8 *pmk_r1_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) wpa_ft_store_pmk_r1() argument 1474 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, struct vlan_description *vlan, const u8 **identity, size_t *identity_len, const u8 **radius_cui, size_t *radius_cui_len, int *session_timeout) wpa_ft_fetch_pmk_r1() argument 2684 int pairwise; wpa_ft_psk_pmk_r1() local 2873 int pairwise, session_timeout = 0; wpa_ft_process_auth_req() local 3757 int pairwise; wpa_ft_rrb_rx_r1() local [all...] |
H A D | wpa_auth.c | 860 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { in wpa_receive_error_report() 863 "pairwise cipher is not TKIP"); in wpa_receive_error_report() 1028 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys in wpa_receive() 1055 if (sm->pairwise == WPA_CIPHER_CCMP || in wpa_receive() 1056 sm->pairwise == WPA_CIPHER_GCMP) { in wpa_receive() 1447 int version, pairwise; in __wpa_send_eapol() local 1462 else if (sm->pairwise != WPA_CIPHER_TKIP) in __wpa_send_eapol() 1467 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); in __wpa_send_eapol() 1470 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d " in __wpa_send_eapol() 1477 pairwise, (unsigne in __wpa_send_eapol() 1658 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; wpa_send_eapol() local 4225 u32 pairwise = 0; wpa_get_mib_sta() local [all...] |
H A D | wpa_auth_i.h | 111 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
|
H A D | wpa_auth_ie.c | 54 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", in wpa_write_wpa_ie() 139 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", in wpa_write_rsn_ie() 754 wpa_printf(MSG_DEBUG, "Invalid %s pairwise cipher (0x%x) " in wpa_validate_wpa_ie() 851 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie() 852 if (sm->pairwise < 0) in wpa_validate_wpa_ie() 959 sm->pairwise = WPA_CIPHER_CCMP; in wpa_validate_osen()
|
/third_party/skia/gn/ |
H A D | compile_sksl_tests.py | 22 def pairwise(iterable): function 23 # Iterate over an array pairwise (two elements at a time). 64 for input, targetDir in pairwise(inputs):
|
/third_party/ffmpeg/libavutil/x86/ |
H A D | lls.asm | 57 ; Compute all 3 pairwise products of a 2x2 block that lies on the diagonal 73 ; Compute all 16 pairwise products of a 4x4 block 135 ; Compute all 10 pairwise products of a 4x4 block that lies on the diagonal 167 ; Compute all 16 pairwise products of a 4x4 block
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
H A D | driver_ndis.c | 904 const u8 *bssid, int pairwise) in wpa_driver_ndis_remove_key() 914 if (pairwise) in wpa_driver_ndis_remove_key() 920 if (!pairwise) { in wpa_driver_ndis_remove_key() 934 int pairwise, int key_idx, int set_tx, in wpa_driver_ndis_add_wep() 950 if (pairwise) in wpa_driver_ndis_add_wep() 975 int res, pairwise; in wpa_driver_ndis_set_key() local 980 pairwise = 0; in wpa_driver_ndis_set_key() 985 pairwise = 1; in wpa_driver_ndis_set_key() 991 pairwise); in wpa_driver_ndis_set_key() 995 return wpa_driver_ndis_add_wep(drv, pairwise, key_id in wpa_driver_ndis_set_key() 902 wpa_driver_ndis_remove_key(struct wpa_driver_ndis_data *drv, int key_idx, const u8 *addr, const u8 *bssid, int pairwise) wpa_driver_ndis_remove_key() argument 933 wpa_driver_ndis_add_wep(struct wpa_driver_ndis_data *drv, int pairwise, int key_idx, int set_tx, const u8 *key, size_t key_len) wpa_driver_ndis_add_wep() argument 1529 int pairwise = 0, group = 0; wpa_driver_ndis_event_auth() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_ndis.c | 904 const u8 *bssid, int pairwise) in wpa_driver_ndis_remove_key() 914 if (pairwise) in wpa_driver_ndis_remove_key() 920 if (!pairwise) { in wpa_driver_ndis_remove_key() 934 int pairwise, int key_idx, int set_tx, in wpa_driver_ndis_add_wep() 950 if (pairwise) in wpa_driver_ndis_add_wep() 975 int res, pairwise; in wpa_driver_ndis_set_key() local 980 pairwise = 0; in wpa_driver_ndis_set_key() 985 pairwise = 1; in wpa_driver_ndis_set_key() 991 pairwise); in wpa_driver_ndis_set_key() 995 return wpa_driver_ndis_add_wep(drv, pairwise, key_id in wpa_driver_ndis_set_key() 902 wpa_driver_ndis_remove_key(struct wpa_driver_ndis_data *drv, int key_idx, const u8 *addr, const u8 *bssid, int pairwise) wpa_driver_ndis_remove_key() argument 933 wpa_driver_ndis_add_wep(struct wpa_driver_ndis_data *drv, int pairwise, int key_idx, int set_tx, const u8 *key, size_t key_len) wpa_driver_ndis_add_wep() argument 1541 int pairwise = 0, group = 0; wpa_driver_ndis_event_auth() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/wpa_gui-qt4/ |
H A D | networkconfig.cpp | 244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; in addNetwork() local 281 pairwise = "TKIP"; in addNetwork() 283 pairwise = "CCMP"; in addNetwork() 290 if (pairwise) { in addNetwork() 291 setNetworkParam(id, "pairwise", pairwise, false); in addNetwork() 549 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id); in paramsFromConfig()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/wpa_gui-qt4/ |
H A D | networkconfig.cpp | 244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; in addNetwork() local 281 pairwise = "TKIP"; in addNetwork() 283 pairwise = "CCMP"; in addNetwork() 290 if (pairwise) { in addNetwork() 291 setNetworkParam(id, "pairwise", pairwise, false); in addNetwork() 549 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id); in paramsFromConfig()
|
/third_party/python/Lib/test/ |
H A D | test_itertools.py | 1064 self.assertEqual(list(pairwise('')), []) 1065 self.assertEqual(list(pairwise('a')), []) 1066 self.assertEqual(list(pairwise('ab')), 1068 self.assertEqual(list(pairwise('abcde')), 1070 self.assertEqual(list(pairwise(range(10_000))), 1074 pairwise() # too few arguments 1076 pairwise('abc', 10) # too many arguments 1078 pairwise(iterable='abc') # keyword arguments 1080 pairwise(None) # non-iterable argument 1894 self.makecycle(pairwise([ [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | wpa_common.c | 157 * to use AES Keywrap based on the negotiated pairwise cipher. This function 335 * @ptk: Buffer for pairwise transient key 337 * @cipher: Negotiated pairwise cipher 1274 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " in wpa_parse_wpa_ie_rsn() 1288 "pairwise cipher", __func__); in wpa_parse_wpa_ie_rsn() 1446 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " in wpa_parse_wpa_ie_wpa() 2567 int pairwise = 0; in wpa_select_ap_group_cipher() local 2569 /* Select group cipher based on the enabled pairwise cipher suites */ in wpa_select_ap_group_cipher() 2571 pairwise |= wpa_pairwise; in wpa_select_ap_group_cipher() 2573 pairwise | in wpa_select_ap_group_cipher() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | wpa.h | 149 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 292 int pairwise) in wpa_sm_key_request() 291 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) wpa_sm_key_request() argument
|
H A D | wpa.c | 173 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet 179 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) in wpa_sm_key_request() argument 219 if (pairwise) in wpa_sm_key_request() 236 "pairwise=%d ptk_set=%d len=%lu)", in wpa_sm_key_request() 237 error, pairwise, sm->ptk_set, (unsigned long) rlen); in wpa_sm_key_request() 801 "Suite: NONE - do not use pairwise keys"); in wpa_supplicant_install_ptk() 807 "WPA: Unsupported pairwise cipher %d", in wpa_supplicant_install_ptk() 958 /* Ignore Tx bit for GTK if a pairwise key is used. One AP in wpa_supplicant_gtk_tx_bit_workaround() 964 "WPA: Tx bit set for GTK, but pairwise " in wpa_supplicant_gtk_tx_bit_workaround() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | wpa.h | 206 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 383 int pairwise) in wpa_sm_key_request() 382 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) wpa_sm_key_request() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers.c | 139 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap", 2619 /***** pairwise cipher */ in wpas_dbus_getter_capabilities() 4499 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ in wpas_dbus_get_bss_security_prop() local 4594 pairwise[n++] = "tkip"; in wpas_dbus_get_bss_security_prop() 4596 pairwise[n++] = "ccmp"; in wpas_dbus_get_bss_security_prop() 4598 pairwise[n++] = "gcmp"; in wpas_dbus_get_bss_security_prop() 4600 pairwise[n++] = "ccmp-256"; in wpas_dbus_get_bss_security_prop() 4602 pairwise[n++] = "gcmp-256"; in wpas_dbus_get_bss_security_prop() 4605 pairwise, in wpas_dbus_get_bss_security_prop() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | wpa_common.c | 168 * to use AES Keywrap based on the negotiated pairwise cipher. This function 369 * @ptk: Buffer for pairwise transient key 371 * @cipher: Negotiated pairwise cipher 1248 * on the pairwise cipher suite provided in the RSNE by the AP in the second 1269 * @ptk: Buffer for pairwise transient key 1271 * @cipher: Negotiated pairwise cipher 1390 * @cipher: Negotiated pairwise cipher 1475 * @cipher: Negotiated pairwise cipher 1686 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " in wpa_parse_wpa_ie_rsn() 1699 "pairwise ciphe in wpa_parse_wpa_ie_rsn() 3038 int pairwise = 0; wpa_select_ap_group_cipher() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers.c | 140 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap", 2985 /***** pairwise cipher */ in wpas_dbus_getter_capabilities() 5106 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ in wpas_dbus_get_bss_security_prop() local 5212 pairwise[n++] = "tkip"; in wpas_dbus_get_bss_security_prop() 5215 pairwise[n++] = "ccmp"; in wpas_dbus_get_bss_security_prop() 5217 pairwise[n++] = "gcmp"; in wpas_dbus_get_bss_security_prop() 5219 pairwise[n++] = "ccmp-256"; in wpas_dbus_get_bss_security_prop() 5221 pairwise[n++] = "gcmp-256"; in wpas_dbus_get_bss_security_prop() 5224 pairwise, in wpas_dbus_get_bss_security_prop() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | events.c | 3180 int pairwise; in wpa_supplicant_event_michael_mic_failure() local 3184 pairwise = (data && data->michael_mic_failure.unicast); in wpa_supplicant_event_michael_mic_failure() 3202 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); in wpa_supplicant_event_michael_mic_failure() 3250 wpa_s->pending_mic_error_pairwise = pairwise; in wpa_supplicant_event_michael_mic_failure() 3259 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); in wpa_supplicant_event_michael_mic_failure() 3262 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); in wpa_supplicant_event_michael_mic_failure()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | events.c | 3081 /* Update pairwise cipher from (Re)Association Request frame info */ in wpa_supplicant_use_own_rsne_params() 3087 "WPA: AP pairwise cipher 0x%x network pairwise cipher 0x%x; available pairwise cipher 0x%x", in wpa_supplicant_use_own_rsne_params() 4649 int pairwise; 4656 pairwise = (data && data->michael_mic_failure.unicast); 4674 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 4722 wpa_s->pending_mic_error_pairwise = pairwise; 4731 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); 4734 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); [all...] |