| /freebsd/contrib/wpa/wpa_supplicant/ |
| H A D | wpa_supplicant.conf | 1788 pairwise=CCMP TKIP 1799 pairwise=TKIP 1811 pairwise=CCMP TKIP 1887 pairwise=CCMP 2019 pairwise=CCMP 2030 pairwise=NONE 2058 pairwise=CCMP TKIP 2077 pairwise=CCMP TKIP
|
| H A D | README | 545 pairwise=CCMP TKIP 622 pairwise=CCMP TKIP 783 get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg> = get capabilities 904 wpa_cli -iwlan0 set_network 0 pairwise TKIP
|
| /freebsd/contrib/wpa/src/ap/ |
| H A D | wpa_auth_ft.c | 1209 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member 1227 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member 1359 const u8 *pmk_r0_name, int pairwise, in wpa_ft_store_pmk_r0() argument 1380 r0->pairwise = pairwise; in wpa_ft_store_pmk_r0() 1446 const u8 *pmk_r1_name, int pairwise, in wpa_ft_store_pmk_r1() argument 1471 r1->pairwise = pairwise; in wpa_ft_store_pmk_r1() 1512 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, in wpa_ft_fetch_pmk_r1() argument 1530 if (pairwise) in wpa_ft_fetch_pmk_r1() 1531 *pairwise = r1->pairwise; in wpa_ft_fetch_pmk_r1() 2109 pmk_r0_name, sm->pairwise, &vlan, expires_in, in wpa_ft_store_pmk_fils() [all …]
|
| H A D | wpa_auth.c | 1272 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) { 1413 if (sm->pairwise != WPA_CIPHER_TKIP && 1977 int version, pairwise; local 1992 else if (sm->pairwise != WPA_CIPHER_TKIP) 1997 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE); 2006 pairwise, kde_len, keyidx, encr); 2042 alg = pairwise ? sm->pairwise : conf->wpa_group; 2043 if (sm->wpa == WPA_VERSION_WPA2 && !pairwise) 2164 if (!pairwise && 2199 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE; local [all …]
|
| H A D | wpa_auth_ie.c | 957 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0); in wpa_validate_wpa_ie() 958 if (sm->pairwise < 0) in wpa_validate_wpa_ie() 972 if (sm->pairwise != assoc_sm->pairwise) in wpa_validate_wpa_ie() 1064 sm->pairwise != WPA_CIPHER_TKIP && in wpa_validate_wpa_ie() 1119 sm->pairwise = WPA_CIPHER_CCMP; in wpa_validate_osen()
|
| H A D | wpa_auth_i.h | 120 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */ member
|
| H A D | wpa_auth.h | 542 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise,
|
| /freebsd/contrib/wpa/wpa_supplicant/examples/ |
| H A D | wpa-psk-tkip.conf | 9 pairwise=TKIP
|
| H A D | wpa2-eap-ccmp.conf | 9 pairwise=CCMP
|
| /freebsd/sys/contrib/dev/iwlwifi/mld/ |
| H A D | key.c | 16 bool pairwise = key->flags & IEEE80211_KEY_FLAG_PAIRWISE; in iwl_mld_get_key_flags() local 20 if (!pairwise) in iwl_mld_get_key_flags() 50 if ((sta && sta->mfp && pairwise) || igtk) in iwl_mld_get_key_flags()
|
| /freebsd/sys/contrib/dev/iwlwifi/mvm/ |
| H A D | mld-key.c | 65 bool pairwise = keyconf->flags & IEEE80211_KEY_FLAG_PAIRWISE; in iwl_mvm_get_sec_flags() local 71 if (!pairwise) in iwl_mvm_get_sec_flags() 108 if ((!IS_ERR_OR_NULL(sta) && sta->mfp && pairwise) || igtk) in iwl_mvm_get_sec_flags()
|
| /freebsd/contrib/wpa/src/drivers/ |
| H A D | driver_ndis.c | 904 const u8 *bssid, int pairwise) in wpa_driver_ndis_remove_key() argument 914 if (pairwise) in wpa_driver_ndis_remove_key() 920 if (!pairwise) { in wpa_driver_ndis_remove_key() 934 int pairwise, int key_idx, int set_tx, in wpa_driver_ndis_add_wep() argument 950 if (pairwise) in wpa_driver_ndis_add_wep() 975 int res, pairwise; in wpa_driver_ndis_set_key() local 980 pairwise = 0; in wpa_driver_ndis_set_key() 985 pairwise = 1; in wpa_driver_ndis_set_key() 991 pairwise); in wpa_driver_ndis_set_key() 995 return wpa_driver_ndis_add_wep(drv, pairwise, key_idx, set_tx, in wpa_driver_ndis_set_key() [all …]
|
| /freebsd/contrib/wpa/wpa_supplicant/doc/docbook/ |
| H A D | wpa_supplicant.conf.sgml | 68 pairwise=CCMP TKIP 160 pairwise=CCMP TKIP
|
| /freebsd/contrib/llvm-project/llvm/lib/Target/AArch64/ |
| H A D | AArch64SchedA57.td | 358 // Advance for absolute diff accum, pairwise add and accumulate, shift accumulate 414 // ASIMD pairwise add and accumulate 450 // ASIMD FP arith, pairwise, D-form 452 // ASIMD FP arith, pairwise, Q-form 486 // ASIMD FP max/min, pairwise, D-form 488 // ASIMD FP max/min, pairwise, Q-form
|
| H A D | AArch64SchedA510.td | 469 // ASIMD pairwise add and accumulate 675 // Arithmetic, pairwise add 678 // Arithmetic, pairwise add and accum long 870 // Max/min, basic and pairwise 1077 // Floating point min/max pairwise
|
| H A D | AArch64SchedThunderX2T99.td | 1244 // ASIMD pairwise add and accumulate 1401 // ASIMD FP arith,pairwise, D-form 1402 // ASIMD FP arith, pairwise, Q-form 1451 // ASIMD FP max/min, pairwise, D-form 1452 // ASIMD FP max/min, pairwise, Q-form
|
| H A D | AArch64SchedThunderX3T110.td | 1352 // ASIMD pairwise add and accumulate 1509 // ASIMD FP arith,pairwise, D-form 1510 // ASIMD FP arith, pairwise, Q-form 1559 // ASIMD FP max/min, pairwise, D-form 1560 // ASIMD FP max/min, pairwise, Q-form
|
| H A D | AArch64SchedNeoverseN2.td | 1019 // ASIMD pairwise add and accumulate long 1057 // ASIMD FP max/min, pairwise 1617 // Arithmetic, pairwise add 1620 // Arithmetic, pairwise add and accum long 1787 // Max/min, basic and pairwise 1998 // Floating point min/max pairwise
|
| /freebsd/contrib/wpa/src/rsn_supp/ |
| H A D | wpa.h | 219 void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise); 390 int pairwise) in wpa_sm_key_request() argument
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | EVP_PKEY-DSA.pod | 61 the rules within SP800-56Ar3 for public, private and pairwise tests respectively.
|
| /freebsd/contrib/wpa/src/common/ |
| H A D | wpa_common.c | 3346 int pairwise = 0; in wpa_select_ap_group_cipher() local 3350 pairwise |= wpa_pairwise; in wpa_select_ap_group_cipher() 3352 pairwise |= rsn_pairwise; in wpa_select_ap_group_cipher() 3354 if (pairwise & WPA_CIPHER_TKIP) in wpa_select_ap_group_cipher() 3356 if ((pairwise & (WPA_CIPHER_CCMP | WPA_CIPHER_GCMP)) == WPA_CIPHER_GCMP) in wpa_select_ap_group_cipher() 3358 if ((pairwise & (WPA_CIPHER_GCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher() 3361 if ((pairwise & (WPA_CIPHER_CCMP_256 | WPA_CIPHER_CCMP | in wpa_select_ap_group_cipher()
|
| /freebsd/contrib/llvm-project/libcxx/modules/std/ |
| H A D | ranges.cppm | |
| H A D | ranges.inc | 303 using std::ranges::views::pairwise;
|
| /freebsd/contrib/wpa/wpa_supplicant/dbus/ |
| H A D | dbus_new_handlers.c | 5426 const char *pairwise[5]; /* max 5 pairwise ciphers is supported */ in wpas_dbus_get_bss_security_prop() local 5538 pairwise[n++] = "tkip"; in wpas_dbus_get_bss_security_prop() 5541 pairwise[n++] = "ccmp"; in wpas_dbus_get_bss_security_prop() 5543 pairwise[n++] = "gcmp"; in wpas_dbus_get_bss_security_prop() 5545 pairwise[n++] = "ccmp-256"; in wpas_dbus_get_bss_security_prop() 5547 pairwise[n++] = "gcmp-256"; in wpas_dbus_get_bss_security_prop() 5550 pairwise, n)) in wpas_dbus_get_bss_security_prop()
|
| /freebsd/contrib/wpa/hostapd/ |
| H A D | README | 324 # Set of accepted cipher suites (encryption algorithms) for pairwise keys 330 # allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise,
|