Home
last modified time | relevance | path

Searched refs:pairwise (Results 1 – 25 of 53) sorted by relevance

123

/freebsd/contrib/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf1788 pairwise=CCMP TKIP
1799 pairwise=TKIP
1811 pairwise=CCMP TKIP
1887 pairwise=CCMP
2019 pairwise=CCMP
2030 pairwise=NONE
2058 pairwise=CCMP TKIP
2077 pairwise=CCMP TKIP
H A DREADME545 pairwise=CCMP TKIP
622 pairwise=CCMP TKIP
783 get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg> = get capabilities
904 wpa_cli -iwlan0 set_network 0 pairwise TKIP
/freebsd/contrib/wpa/src/ap/
H A Dwpa_auth_ft.c1209 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
1227 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
1359 const u8 *pmk_r0_name, int pairwise, in wpa_ft_store_pmk_r0() argument
1380 r0->pairwise = pairwise; in wpa_ft_store_pmk_r0()
1446 const u8 *pmk_r1_name, int pairwise, in wpa_ft_store_pmk_r1() argument
1471 r1->pairwise = pairwise; in wpa_ft_store_pmk_r1()
1512 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, in wpa_ft_fetch_pmk_r1() argument
1530 if (pairwise) in wpa_ft_fetch_pmk_r1()
1531 *pairwise = r1->pairwise; in wpa_ft_fetch_pmk_r1()
2109 pmk_r0_name, sm->pairwise, &vlan, expires_in, in wpa_ft_store_pmk_fils()
[all …]
H A Dwpa_auth.c1272 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
1413 if (sm->pairwise != WPA_CIPHER_TKIP &&
1977 int version, pairwise; local
1992 else if (sm->pairwise != WPA_CIPHER_TKIP)
1997 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
2006 pairwise, kde_len, keyidx, encr);
2042 alg = pairwise ? sm->pairwise : conf->wpa_group;
2043 if (sm->wpa == WPA_VERSION_WPA2 && !pairwise)
2164 if (!pairwise &&
2199 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local
[all …]
H A Dwpa_auth_ie.c957 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie()
958 if (sm->pairwise < 0) in wpa_validate_wpa_ie()
972 if (sm->pairwise != assoc_sm->pairwise) in wpa_validate_wpa_ie()
1064 sm->pairwise != WPA_CIPHER_TKIP && in wpa_validate_wpa_ie()
1119 sm->pairwise = WPA_CIPHER_CCMP; in wpa_validate_osen()
H A Dwpa_auth_i.h120 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
H A Dwpa_auth.h542 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise,
/freebsd/contrib/wpa/wpa_supplicant/examples/
H A Dwpa-psk-tkip.conf9 pairwise=TKIP
H A Dwpa2-eap-ccmp.conf9 pairwise=CCMP
/freebsd/sys/contrib/dev/iwlwifi/mld/
H A Dkey.c16 bool pairwise = key->flags & IEEE80211_KEY_FLAG_PAIRWISE; in iwl_mld_get_key_flags() local
20 if (!pairwise) in iwl_mld_get_key_flags()
50 if ((sta && sta->mfp && pairwise) || igtk) in iwl_mld_get_key_flags()
/freebsd/sys/contrib/dev/iwlwifi/mvm/
H A Dmld-key.c65 bool pairwise = keyconf->flags & IEEE80211_KEY_FLAG_PAIRWISE; in iwl_mvm_get_sec_flags() local
71 if (!pairwise) in iwl_mvm_get_sec_flags()
108 if ((!IS_ERR_OR_NULL(sta) && sta->mfp && pairwise) || igtk) in iwl_mvm_get_sec_flags()
/freebsd/contrib/wpa/src/drivers/
H A Ddriver_ndis.c904 const u8 *bssid, int pairwise) in wpa_driver_ndis_remove_key() argument
914 if (pairwise) in wpa_driver_ndis_remove_key()
920 if (!pairwise) { in wpa_driver_ndis_remove_key()
934 int pairwise, int key_idx, int set_tx, in wpa_driver_ndis_add_wep() argument
950 if (pairwise) in wpa_driver_ndis_add_wep()
975 int res, pairwise; in wpa_driver_ndis_set_key() local
980 pairwise = 0; in wpa_driver_ndis_set_key()
985 pairwise = 1; in wpa_driver_ndis_set_key()
991 pairwise); in wpa_driver_ndis_set_key()
995 return wpa_driver_ndis_add_wep(drv, pairwise, key_idx, set_tx, in wpa_driver_ndis_set_key()
[all …]
/freebsd/contrib/wpa/wpa_supplicant/doc/docbook/
H A Dwpa_supplicant.conf.sgml68 pairwise=CCMP TKIP
160 pairwise=CCMP TKIP
/freebsd/contrib/llvm-project/llvm/lib/Target/AArch64/
H A DAArch64SchedA57.td358 // Advance for absolute diff accum, pairwise add and accumulate, shift accumulate
414 // ASIMD pairwise add and accumulate
450 // ASIMD FP arith, pairwise, D-form
452 // ASIMD FP arith, pairwise, Q-form
486 // ASIMD FP max/min, pairwise, D-form
488 // ASIMD FP max/min, pairwise, Q-form
H A DAArch64SchedA510.td469 // ASIMD pairwise add and accumulate
675 // Arithmetic, pairwise add
678 // Arithmetic, pairwise add and accum long
870 // Max/min, basic and pairwise
1077 // Floating point min/max pairwise
H A DAArch64SchedThunderX2T99.td1244 // ASIMD pairwise add and accumulate
1401 // ASIMD FP arith,pairwise, D-form
1402 // ASIMD FP arith, pairwise, Q-form
1451 // ASIMD FP max/min, pairwise, D-form
1452 // ASIMD FP max/min, pairwise, Q-form
H A DAArch64SchedThunderX3T110.td1352 // ASIMD pairwise add and accumulate
1509 // ASIMD FP arith,pairwise, D-form
1510 // ASIMD FP arith, pairwise, Q-form
1559 // ASIMD FP max/min, pairwise, D-form
1560 // ASIMD FP max/min, pairwise, Q-form
H A DAArch64SchedNeoverseN2.td1019 // ASIMD pairwise add and accumulate long
1057 // ASIMD FP max/min, pairwise
1617 // Arithmetic, pairwise add
1620 // Arithmetic, pairwise add and accum long
1787 // Max/min, basic and pairwise
1998 // Floating point min/max pairwise
/freebsd/contrib/wpa/src/rsn_supp/
H A Dwpa.h219 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
390 int pairwise) in wpa_sm_key_request() argument
/freebsd/crypto/openssl/doc/man7/
H A DEVP_PKEY-DSA.pod61 the rules within SP800-56Ar3 for public, private and pairwise tests respectively.
/freebsd/contrib/wpa/src/common/
H A Dwpa_common.c3346 int pairwise = 0; in wpa_select_ap_group_cipher() local
3350 pairwise |= wpa_pairwise; in wpa_select_ap_group_cipher()
3352 pairwise |= rsn_pairwise; in wpa_select_ap_group_cipher()
3354 if (pairwise & WPA_CIPHER_TKIP) in wpa_select_ap_group_cipher()
3356 if ((pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP)) == WPA_CIPHER_GCMP) in wpa_select_ap_group_cipher()
3358 if ((pairwise & (WPA_CIPHER_GCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher()
3361 if ((pairwise & (WPA_CIPHER_CCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher()
/freebsd/contrib/llvm-project/libcxx/modules/std/
H A Dranges.cppm
H A Dranges.inc303 using std::ranges::views::pairwise;
/freebsd/contrib/wpa/wpa_supplicant/dbus/
H A Ddbus_new_handlers.c5426 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ in wpas_dbus_get_bss_security_prop() local
5538 pairwise[n++] = "tkip"; in wpas_dbus_get_bss_security_prop()
5541 pairwise[n++] = "ccmp"; in wpas_dbus_get_bss_security_prop()
5543 pairwise[n++] = "gcmp"; in wpas_dbus_get_bss_security_prop()
5545 pairwise[n++] = "ccmp-256"; in wpas_dbus_get_bss_security_prop()
5547 pairwise[n++] = "gcmp-256"; in wpas_dbus_get_bss_security_prop()
5550 pairwise, n)) in wpas_dbus_get_bss_security_prop()
/freebsd/contrib/wpa/hostapd/
H A DREADME324 # Set of accepted cipher suites (encryption algorithms) for pairwise keys
330 # allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise,

123