Lines Matching defs:pairwise
804 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
807 "pairwise cipher is not TKIP");
945 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
978 if (sm->pairwise == WPA_CIPHER_CCMP ||
979 sm->pairwise == WPA_CIPHER_GCMP) {
1415 int version, pairwise;
1431 else if (sm->pairwise != WPA_CIPHER_TKIP)
1436 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
1439 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d "
1446 pairwise, (unsigned long) kde_len, keyidx, encr);
1481 alg = pairwise ? sm->pairwise : wpa_auth->conf.wpa_group;
1582 if (!pairwise &&
1608 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE;
1617 ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr;
1619 timeout_ms = pairwise ? eapol_key_timeout_first :
1623 if (pairwise && ctr == 1 && !(key_info & WPA_KEY_INFO_MIC))
2004 ptk, sm->wpa_key_mgmt, sm->pairwise);
2336 enum wpa_alg alg = wpa_cipher_to_alg(sm->pairwise);
2337 int klen = wpa_cipher_key_len(sm->pairwise);
2376 "pairwise key handshake completed (%s)",
3114 u32 pairwise = 0;
3123 pairwise = wpa_cipher_to_suite(sm->wpa == WPA_VERSION_WPA2 ?
3125 sm->pairwise);
3126 if (pairwise == 0)
3142 RSN_SUITE_ARG(pairwise),
3178 return sm->pairwise;