Home | History | Annotate | Download | only in ap

Lines Matching full:pairwise

736 	} else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
739 "pairwise cipher is not TKIP");
819 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
842 msgtxt = "4/4 Pairwise";
845 msgtxt = "2/4 Pairwise";
852 if (sm->pairwise == WPA_CIPHER_CCMP) {
1234 int version, pairwise;
1243 else if (sm->pairwise == WPA_CIPHER_CCMP)
1248 pairwise = key_info & WPA_KEY_INFO_KEY_TYPE;
1251 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d "
1258 pairwise, (unsigned long) kde_len, keyidx, encr);
1289 alg = pairwise ? sm->pairwise : wpa_auth->conf.wpa_group;
1393 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE;
1402 ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr;
1404 timeout_ms = pairwise ? eapol_key_timeout_first :
1408 if (pairwise && ctr == 1 && !(key_info & WPA_KEY_INFO_MIC))
1763 size_t ptk_len = sm->pairwise == WPA_CIPHER_CCMP ? 48 : 64;
1769 wpa_pmk_to_ptk(pmk, PMK_LEN, "Pairwise key expansion",
2063 if (sm->pairwise == WPA_CIPHER_TKIP) {
2108 "pairwise key handshake completed (%s)",
2725 u32 pairwise = 0;
2735 if (sm->pairwise == WPA_CIPHER_CCMP)
2736 pairwise = WPA_CIPHER_SUITE_CCMP;
2737 else if (sm->pairwise == WPA_CIPHER_TKIP)
2738 pairwise = WPA_CIPHER_SUITE_TKIP;
2739 else if (sm->pairwise == WPA_CIPHER_WEP104)
2740 pairwise = WPA_CIPHER_SUITE_WEP104;
2741 else if (sm->pairwise == WPA_CIPHER_WEP40)
2742 pairwise = WPA_CIPHER_SUITE_WEP40;
2743 else if (sm->pairwise == WPA_CIPHER_NONE)
2744 pairwise = WPA_CIPHER_SUITE_NONE;
2746 if (sm->pairwise == WPA_CIPHER_CCMP)
2747 pairwise = RSN_CIPHER_SUITE_CCMP;
2748 else if (sm->pairwise == WPA_CIPHER_TKIP)
2749 pairwise = RSN_CIPHER_SUITE_TKIP;
2750 else if (sm->pairwise == WPA_CIPHER_WEP104)
2751 pairwise = RSN_CIPHER_SUITE_WEP104;
2752 else if (sm->pairwise == WPA_CIPHER_WEP40)
2753 pairwise = RSN_CIPHER_SUITE_WEP40;
2754 else if (sm->pairwise == WPA_CIPHER_NONE)
2755 pairwise = RSN_CIPHER_SUITE_NONE;
2772 RSN_SUITE_ARG(pairwise),
2808 return sm->pairwise;