Lines Matching refs:pairwise
725 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
728 "pairwise cipher is not TKIP");
810 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
833 msgtxt = "4/4 Pairwise";
836 msgtxt = "2/4 Pairwise";
843 if (sm->pairwise == WPA_CIPHER_CCMP ||
844 sm->pairwise == WPA_CIPHER_GCMP) {
1227 int version, pairwise;
1236 else if (sm->pairwise != WPA_CIPHER_TKIP)
1241 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
1244 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d "
1251 pairwise, (unsigned long) kde_len, keyidx, encr);
1282 alg = pairwise ? sm->pairwise : wpa_auth->conf.wpa_group;
1357 if (!pairwise &&
1383 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE;
1392 ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr;
1394 timeout_ms = pairwise ? eapol_key_timeout_first :
1398 if (pairwise && ctr == 1 && !(key_info & WPA_KEY_INFO_MIC))
1750 pairwise != WPA_CIPHER_TKIP ? 48 : 64;
1756 wpa_pmk_to_ptk(pmk, PMK_LEN, "Pairwise key expansion",
2066 enum wpa_alg alg = wpa_cipher_to_alg(sm->pairwise);
2067 int klen = wpa_cipher_key_len(sm->pairwise);
2106 "pairwise key handshake completed (%s)",
2805 u32 pairwise = 0;
2814 pairwise = wpa_cipher_to_suite(sm->wpa == WPA_VERSION_WPA2 ?
2816 sm->pairwise);
2817 if (pairwise == 0)
2833 RSN_SUITE_ARG(pairwise),
2869 return sm->pairwise;