Lines Matching defs:pairwise

1209 	int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */
1227 int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */
1359 const u8 *pmk_r0_name, int pairwise,
1380 r0->pairwise = pairwise;
1446 const u8 *pmk_r1_name, int pairwise,
1471 r1->pairwise = pairwise;
1512 u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise,
1530 if (pairwise)
1531 *pairwise = r1->pairwise;
2109 pmk_r0_name, sm->pairwise, &vlan, expires_in,
2163 ptk, ptk_name, sm->wpa_key_mgmt, sm->pairwise,
2196 sm->pairwise, &vlan, expires_in,
2200 sm->pmk_r1_name, sm->pairwise, &vlan,
2920 alg = wpa_cipher_to_alg(sm->pairwise);
2921 klen = wpa_cipher_key_len(sm->pairwise);
2922 if (!wpa_cipher_valid_pairwise(sm->pairwise)) {
2923 wpa_printf(MSG_DEBUG, "FT: Unknown pairwise alg 0x%x - skip "
2924 "PTK configuration", sm->pairwise);
2965 wpa_auth_store_ptksa(sm->wpa_auth, sm->addr, sm->pairwise,
2990 int pairwise;
2992 pairwise = sm->pairwise;
3015 *out_pairwise = pairwise;
3050 * Required to detect FT-PSK and pairwise cipher.
3082 wpa_printf(MSG_DEBUG, "FT: Invalid pairwise cipher (0x%x) from "
3087 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
3138 sm->pairwise, r0->vlan, expires_in, session_timeout,
3142 *out_pairwise = sm->pairwise;
3180 int pairwise, session_timeout = 0;
3246 if (wpa_ft_psk_pmk_r1(sm, pmk_r1_name, pmk_r1, &pairwise,
3275 pmk_r1, &pmk_r1_len, &pairwise, &vlan,
3291 pmk_r1_name, pmk_r1, &pairwise,
3375 pairwise, kdk_len) < 0)
3381 wpa_ltf_keyseed(&sm->PTK, parse.key_mgmt, pairwise)) {
3387 sm->pairwise = pairwise;
3956 WPA_PUT_LE16(f_pairwise, pmk_r0->pairwise);
4169 int pairwise;
4245 RRB_GET(FT_RRB_PAIRWISE, pairwise, msgtype, sizeof(le16));
4246 wpa_hexdump(MSG_DEBUG, "FT: pairwise", f_pairwise, f_pairwise_len);
4262 pairwise = WPA_GET_LE16(f_pairwise);
4303 pairwise, &vlan, expires_in, session_timeout,