Lines Matching defs:pairwise

1272 	} else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
1274 "ignore Michael MIC failure report since pairwise cipher is not TKIP");
1413 if (sm->pairwise != WPA_CIPHER_TKIP &&
1613 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
1977 int version, pairwise;
1992 else if (sm->pairwise != WPA_CIPHER_TKIP)
1997 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
2000 "WPA: Send EAPOL(version=%d secure=%d mic=%d ack=%d install=%d pairwise=%d kde_len=%zu keyidx=%d encr=%d)",
2006 pairwise, kde_len, keyidx, encr);
2042 alg = pairwise ? sm->pairwise : conf->wpa_group;
2043 if (sm->wpa == WPA_VERSION_WPA2 && !pairwise)
2164 if (!pairwise &&
2199 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE;
2205 ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr;
2225 if (pairwise)
2235 (!pairwise || (key_info & WPA_KEY_INFO_MIC)))
2237 if (pairwise && ctr == 1 && !(key_info & WPA_KEY_INFO_MIC))
2284 wpa_auth_remove_ptksa(sm->wpa_auth, sm->addr, sm->pairwise);
2888 sm->pairwise, kdk_len);
2904 sm->pairwise);
2928 sm->pairwise, z, z_len, kdk_len);
2938 ret = wpa_ltf_keyseed(ptk, sm->wpa_key_mgmt, sm->pairwise);
2973 sm->wpa_key_mgmt, sm->pairwise,
2981 res = wpa_ltf_keyseed(&sm->PTK, sm->wpa_key_mgmt, sm->pairwise);
3485 alg = wpa_cipher_to_alg(sm->pairwise);
3486 klen = wpa_cipher_key_len(sm->pairwise);
3510 wpa_auth_store_ptksa(sm->wpa_auth, sm->addr, sm->pairwise,
4621 wpa_cipher_to_alg(sm->pairwise),
4624 wpa_cipher_key_len(sm->pairwise),
4931 enum wpa_alg alg = wpa_cipher_to_alg(sm->pairwise);
4932 int klen = wpa_cipher_key_len(sm->pairwise);
4968 wpa_auth_store_ptksa(sm->wpa_auth, sm->addr, sm->pairwise,
4997 "pairwise key handshake completed (%s)",
6058 u32 pairwise = 0;
6067 pairwise = wpa_cipher_to_suite(sm->wpa == WPA_VERSION_WPA2 ?
6069 sm->pairwise);
6070 if (pairwise == 0)
6086 RSN_SUITE_ARG(pairwise),
6128 return sm->pairwise;