Home
last modified time | relevance | path

Searched refs:pairwise (Results 1 - 25 of 30) sorted by relevance

12

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dwpa_auth_ft.c1175 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
1193 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
1325 const u8 *pmk_r0_name, int pairwise, in wpa_ft_store_pmk_r0()
1346 r0->pairwise = pairwise; in wpa_ft_store_pmk_r0()
1412 const u8 *pmk_r1_name, int pairwise, in wpa_ft_store_pmk_r1()
1437 r1->pairwise = pairwise; in wpa_ft_store_pmk_r1()
1478 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, in wpa_ft_fetch_pmk_r1()
1496 if (pairwise) in wpa_ft_fetch_pmk_r1()
1322 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, size_t pmk_r0_len, const u8 *pmk_r0_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) wpa_ft_store_pmk_r0() argument
1409 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, size_t pmk_r1_len, const u8 *pmk_r1_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) wpa_ft_store_pmk_r1() argument
1476 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, struct vlan_description *vlan, const u8 **identity, size_t *identity_len, const u8 **radius_cui, size_t *radius_cui_len, int *session_timeout) wpa_ft_fetch_pmk_r1() argument
2877 int pairwise; wpa_ft_psk_pmk_r1() local
3064 int pairwise, session_timeout = 0; wpa_ft_process_auth_req() local
3985 int pairwise; wpa_ft_rrb_rx_r1() local
[all...]
H A Dwpa_auth.c937 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { in wpa_receive_error_report()
939 "ignore Michael MIC failure report since pairwise cipher is not TKIP"); in wpa_receive_error_report()
1116 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys in wpa_receive()
1143 if (sm->pairwise == WPA_CIPHER_CCMP || in wpa_receive()
1144 sm->pairwise == WPA_CIPHER_GCMP) { in wpa_receive()
1527 int version, pairwise; in __wpa_send_eapol() local
1542 else if (sm->pairwise != WPA_CIPHER_TKIP) in __wpa_send_eapol()
1547 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); in __wpa_send_eapol()
1550 "WPA: Send EAPOL(version=%d secure=%d mic=%d ack=%d install=%d pairwise=%d kde_len=%zu keyidx=%d encr=%d)", in __wpa_send_eapol()
1556 pairwise, kde_le in __wpa_send_eapol()
1734 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; wpa_send_eapol() local
4652 u32 pairwise = 0; wpa_get_mib_sta() local
[all...]
H A Dwpa_auth_ie.c54 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", in wpa_write_wpa_ie()
168 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", in wpa_write_rsn_ie()
816 wpa_printf(MSG_DEBUG, "Invalid %s pairwise cipher (0x%x) " in wpa_validate_wpa_ie()
922 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie()
923 if (sm->pairwise < 0) in wpa_validate_wpa_ie()
1007 sm->pairwise != WPA_CIPHER_TKIP && in wpa_validate_wpa_ie()
1062 sm->pairwise = WPA_CIPHER_CCMP; in wpa_validate_osen()
H A Dwpa_auth_i.h116 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
H A Dwpa_auth.h480 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dwpa_auth_ft.c1173 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
1191 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
1323 const u8 *pmk_r0_name, int pairwise, in wpa_ft_store_pmk_r0()
1344 r0->pairwise = pairwise; in wpa_ft_store_pmk_r0()
1410 const u8 *pmk_r1_name, int pairwise, in wpa_ft_store_pmk_r1()
1435 r1->pairwise = pairwise; in wpa_ft_store_pmk_r1()
1476 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, in wpa_ft_fetch_pmk_r1()
1494 if (pairwise) in wpa_ft_fetch_pmk_r1()
1320 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, size_t pmk_r0_len, const u8 *pmk_r0_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) wpa_ft_store_pmk_r0() argument
1407 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, size_t pmk_r1_len, const u8 *pmk_r1_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) wpa_ft_store_pmk_r1() argument
1474 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, struct vlan_description *vlan, const u8 **identity, size_t *identity_len, const u8 **radius_cui, size_t *radius_cui_len, int *session_timeout) wpa_ft_fetch_pmk_r1() argument
2684 int pairwise; wpa_ft_psk_pmk_r1() local
2873 int pairwise, session_timeout = 0; wpa_ft_process_auth_req() local
3757 int pairwise; wpa_ft_rrb_rx_r1() local
[all...]
H A Dwpa_auth.c860 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { in wpa_receive_error_report()
863 "pairwise cipher is not TKIP"); in wpa_receive_error_report()
1028 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys in wpa_receive()
1055 if (sm->pairwise == WPA_CIPHER_CCMP || in wpa_receive()
1056 sm->pairwise == WPA_CIPHER_GCMP) { in wpa_receive()
1447 int version, pairwise; in __wpa_send_eapol() local
1462 else if (sm->pairwise != WPA_CIPHER_TKIP) in __wpa_send_eapol()
1467 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); in __wpa_send_eapol()
1470 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d " in __wpa_send_eapol()
1477 pairwise, (unsigne in __wpa_send_eapol()
1658 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; wpa_send_eapol() local
4225 u32 pairwise = 0; wpa_get_mib_sta() local
[all...]
H A Dwpa_auth_i.h111 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
H A Dwpa_auth_ie.c54 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", in wpa_write_wpa_ie()
139 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", in wpa_write_rsn_ie()
754 wpa_printf(MSG_DEBUG, "Invalid %s pairwise cipher (0x%x) " in wpa_validate_wpa_ie()
851 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie()
852 if (sm->pairwise < 0) in wpa_validate_wpa_ie()
959 sm->pairwise = WPA_CIPHER_CCMP; in wpa_validate_osen()
/third_party/skia/gn/
H A Dcompile_sksl_tests.py22 def pairwise(iterable): function
23 # Iterate over an array pairwise (two elements at a time).
64 for input, targetDir in pairwise(inputs):
/third_party/ffmpeg/libavutil/x86/
H A Dlls.asm57 ; Compute all 3 pairwise products of a 2x2 block that lies on the diagonal
73 ; Compute all 16 pairwise products of a 4x4 block
135 ; Compute all 10 pairwise products of a 4x4 block that lies on the diagonal
167 ; Compute all 16 pairwise products of a 4x4 block
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/
H A Ddriver_ndis.c904 const u8 *bssid, int pairwise) in wpa_driver_ndis_remove_key()
914 if (pairwise) in wpa_driver_ndis_remove_key()
920 if (!pairwise) { in wpa_driver_ndis_remove_key()
934 int pairwise, int key_idx, int set_tx, in wpa_driver_ndis_add_wep()
950 if (pairwise) in wpa_driver_ndis_add_wep()
975 int res, pairwise; in wpa_driver_ndis_set_key() local
980 pairwise = 0; in wpa_driver_ndis_set_key()
985 pairwise = 1; in wpa_driver_ndis_set_key()
991 pairwise); in wpa_driver_ndis_set_key()
995 return wpa_driver_ndis_add_wep(drv, pairwise, key_id in wpa_driver_ndis_set_key()
902 wpa_driver_ndis_remove_key(struct wpa_driver_ndis_data *drv, int key_idx, const u8 *addr, const u8 *bssid, int pairwise) wpa_driver_ndis_remove_key() argument
933 wpa_driver_ndis_add_wep(struct wpa_driver_ndis_data *drv, int pairwise, int key_idx, int set_tx, const u8 *key, size_t key_len) wpa_driver_ndis_add_wep() argument
1529 int pairwise = 0, group = 0; wpa_driver_ndis_event_auth() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/
H A Ddriver_ndis.c904 const u8 *bssid, int pairwise) in wpa_driver_ndis_remove_key()
914 if (pairwise) in wpa_driver_ndis_remove_key()
920 if (!pairwise) { in wpa_driver_ndis_remove_key()
934 int pairwise, int key_idx, int set_tx, in wpa_driver_ndis_add_wep()
950 if (pairwise) in wpa_driver_ndis_add_wep()
975 int res, pairwise; in wpa_driver_ndis_set_key() local
980 pairwise = 0; in wpa_driver_ndis_set_key()
985 pairwise = 1; in wpa_driver_ndis_set_key()
991 pairwise); in wpa_driver_ndis_set_key()
995 return wpa_driver_ndis_add_wep(drv, pairwise, key_id in wpa_driver_ndis_set_key()
902 wpa_driver_ndis_remove_key(struct wpa_driver_ndis_data *drv, int key_idx, const u8 *addr, const u8 *bssid, int pairwise) wpa_driver_ndis_remove_key() argument
933 wpa_driver_ndis_add_wep(struct wpa_driver_ndis_data *drv, int pairwise, int key_idx, int set_tx, const u8 *key, size_t key_len) wpa_driver_ndis_add_wep() argument
1541 int pairwise = 0, group = 0; wpa_driver_ndis_event_auth() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/wpa_gui-qt4/
H A Dnetworkconfig.cpp244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; in addNetwork() local
281 pairwise = "TKIP"; in addNetwork()
283 pairwise = "CCMP"; in addNetwork()
290 if (pairwise) { in addNetwork()
291 setNetworkParam(id, "pairwise", pairwise, false); in addNetwork()
549 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id); in paramsFromConfig()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/wpa_gui-qt4/
H A Dnetworkconfig.cpp244 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; in addNetwork() local
281 pairwise = "TKIP"; in addNetwork()
283 pairwise = "CCMP"; in addNetwork()
290 if (pairwise) { in addNetwork()
291 setNetworkParam(id, "pairwise", pairwise, false); in addNetwork()
549 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d pairwise", network_id); in paramsFromConfig()
/third_party/python/Lib/test/
H A Dtest_itertools.py1064 self.assertEqual(list(pairwise('')), [])
1065 self.assertEqual(list(pairwise('a')), [])
1066 self.assertEqual(list(pairwise('ab')),
1068 self.assertEqual(list(pairwise('abcde')),
1070 self.assertEqual(list(pairwise(range(10_000))),
1074 pairwise() # too few arguments
1076 pairwise('abc', 10) # too many arguments
1078 pairwise(iterable='abc') # keyword arguments
1080 pairwise(None) # non-iterable argument
1894 self.makecycle(pairwise([
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
H A Dwpa_common.c157 * to use AES Keywrap based on the negotiated pairwise cipher. This function
335 * @ptk: Buffer for pairwise transient key
337 * @cipher: Negotiated pairwise cipher
1274 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " in wpa_parse_wpa_ie_rsn()
1288 "pairwise cipher", __func__); in wpa_parse_wpa_ie_rsn()
1446 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " in wpa_parse_wpa_ie_wpa()
2567 int pairwise = 0; in wpa_select_ap_group_cipher() local
2569 /* Select group cipher based on the enabled pairwise cipher suites */ in wpa_select_ap_group_cipher()
2571 pairwise |= wpa_pairwise; in wpa_select_ap_group_cipher()
2573 pairwise | in wpa_select_ap_group_cipher()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
H A Dwpa.h149 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
292 int pairwise) in wpa_sm_key_request()
291 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) wpa_sm_key_request() argument
H A Dwpa.c173 * @pairwise: 1 = error report for pairwise packet, 0 = for group packet
179 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) in wpa_sm_key_request() argument
219 if (pairwise) in wpa_sm_key_request()
236 "pairwise=%d ptk_set=%d len=%lu)", in wpa_sm_key_request()
237 error, pairwise, sm->ptk_set, (unsigned long) rlen); in wpa_sm_key_request()
801 "Suite: NONE - do not use pairwise keys"); in wpa_supplicant_install_ptk()
807 "WPA: Unsupported pairwise cipher %d", in wpa_supplicant_install_ptk()
958 /* Ignore Tx bit for GTK if a pairwise key is used. One AP in wpa_supplicant_gtk_tx_bit_workaround()
964 "WPA: Tx bit set for GTK, but pairwise " in wpa_supplicant_gtk_tx_bit_workaround()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
H A Dwpa.h206 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
383 int pairwise) in wpa_sm_key_request()
382 wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise) wpa_sm_key_request() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/dbus/
H A Ddbus_new_handlers.c139 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap",
2619 /***** pairwise cipher */ in wpas_dbus_getter_capabilities()
4499 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ in wpas_dbus_get_bss_security_prop() local
4594 pairwise[n++] = "tkip"; in wpas_dbus_get_bss_security_prop()
4596 pairwise[n++] = "ccmp"; in wpas_dbus_get_bss_security_prop()
4598 pairwise[n++] = "gcmp"; in wpas_dbus_get_bss_security_prop()
4600 pairwise[n++] = "ccmp-256"; in wpas_dbus_get_bss_security_prop()
4602 pairwise[n++] = "gcmp-256"; in wpas_dbus_get_bss_security_prop()
4605 pairwise, in wpas_dbus_get_bss_security_prop()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Dwpa_common.c168 * to use AES Keywrap based on the negotiated pairwise cipher. This function
369 * @ptk: Buffer for pairwise transient key
371 * @cipher: Negotiated pairwise cipher
1248 * on the pairwise cipher suite provided in the RSNE by the AP in the second
1269 * @ptk: Buffer for pairwise transient key
1271 * @cipher: Negotiated pairwise cipher
1390 * @cipher: Negotiated pairwise cipher
1475 * @cipher: Negotiated pairwise cipher
1686 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " in wpa_parse_wpa_ie_rsn()
1699 "pairwise ciphe in wpa_parse_wpa_ie_rsn()
3038 int pairwise = 0; wpa_select_ap_group_cipher() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/dbus/
H A Ddbus_new_handlers.c140 "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap",
2985 /***** pairwise cipher */ in wpas_dbus_getter_capabilities()
5106 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ in wpas_dbus_get_bss_security_prop() local
5212 pairwise[n++] = "tkip"; in wpas_dbus_get_bss_security_prop()
5215 pairwise[n++] = "ccmp"; in wpas_dbus_get_bss_security_prop()
5217 pairwise[n++] = "gcmp"; in wpas_dbus_get_bss_security_prop()
5219 pairwise[n++] = "ccmp-256"; in wpas_dbus_get_bss_security_prop()
5221 pairwise[n++] = "gcmp-256"; in wpas_dbus_get_bss_security_prop()
5224 pairwise, in wpas_dbus_get_bss_security_prop()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Devents.c3180 int pairwise; in wpa_supplicant_event_michael_mic_failure() local
3184 pairwise = (data && data->michael_mic_failure.unicast); in wpa_supplicant_event_michael_mic_failure()
3202 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); in wpa_supplicant_event_michael_mic_failure()
3250 wpa_s->pending_mic_error_pairwise = pairwise; in wpa_supplicant_event_michael_mic_failure()
3259 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); in wpa_supplicant_event_michael_mic_failure()
3262 wpa_sm_key_request(wpa_s->wpa, 1, pairwise); in wpa_supplicant_event_michael_mic_failure()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Devents.c3081 /* Update pairwise cipher from (Re)Association Request frame info */ in wpa_supplicant_use_own_rsne_params()
3087 "WPA: AP pairwise cipher 0x%x network pairwise cipher 0x%x; available pairwise cipher 0x%x", in wpa_supplicant_use_own_rsne_params()
4649 int pairwise;
4656 pairwise = (data && data->michael_mic_failure.unicast);
4674 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
4722 wpa_s->pending_mic_error_pairwise = pairwise;
4731 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
4734 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
[all...]

Completed in 60 milliseconds

12