Lines Matching refs:pairwise
805 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
808 "pairwise cipher is not TKIP");
950 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
983 if (sm->pairwise == WPA_CIPHER_CCMP ||
984 sm->pairwise == WPA_CIPHER_GCMP) {
1420 int version, pairwise;
1436 else if (sm->pairwise != WPA_CIPHER_TKIP)
1441 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
1444 "ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d "
1451 pairwise, (unsigned long) kde_len, keyidx, encr);
1486 alg = pairwise ? sm->pairwise : wpa_auth->conf.wpa_group;
1589 if (!pairwise &&
1615 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE;
1624 ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr;
1626 timeout_ms = pairwise ? eapol_key_timeout_first :
1630 if (pairwise && ctr == 1 && !(key_info & WPA_KEY_INFO_MIC))
2041 ptk, sm->wpa_key_mgmt, sm->pairwise);
2391 enum wpa_alg alg = wpa_cipher_to_alg(sm->pairwise);
2392 int klen = wpa_cipher_key_len(sm->pairwise);
2431 "pairwise key handshake completed (%s)",
3169 u32 pairwise = 0;
3178 pairwise = wpa_cipher_to_suite(sm->wpa == WPA_VERSION_WPA2 ?
3180 sm->pairwise);
3181 if (pairwise == 0)
3197 RSN_SUITE_ARG(pairwise),
3233 return sm->pairwise;