Lines Matching refs:pairwise
765 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
768 "pairwise cipher is not TKIP");
850 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
883 if (sm->pairwise == WPA_CIPHER_CCMP ||
884 sm->pairwise == WPA_CIPHER_GCMP) {
1291 int version, pairwise;
1302 else if (sm->pairwise != WPA_CIPHER_TKIP)
1307 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
1310 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d "
1317 pairwise, (unsigned long) kde_len, keyidx, encr);
1349 alg = pairwise ? sm->pairwise : wpa_auth->conf.wpa_group;
1425 if (!pairwise &&
1451 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE;
1460 ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr;
1462 timeout_ms = pairwise ? eapol_key_timeout_first :
1466 if (pairwise && ctr == 1 && !(key_info & WPA_KEY_INFO_MIC))
1819 size_t ptk_len = wpa_cipher_key_len(sm->pairwise) + 32;
2156 enum wpa_alg alg = wpa_cipher_to_alg(sm->pairwise);
2157 int klen = wpa_cipher_key_len(sm->pairwise);
2196 "pairwise key handshake completed (%s)",
2932 u32 pairwise = 0;
2941 pairwise = wpa_cipher_to_suite(sm->wpa == WPA_VERSION_WPA2 ?
2943 sm->pairwise);
2944 if (pairwise == 0)
2960 RSN_SUITE_ARG(pairwise),
2996 return sm->pairwise;