Home | History | Annotate | Download | only in rsn_supp

Lines Matching refs:peer

63 					 const u8 *peer,
74 if (peer)
96 if (peer) {
97 /* Peer MAC Address KDE */
98 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN);
106 if (peer) {
107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
109 MAC2STR(peer), mui, error_type);
133 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */
157 /* Peer RSN IE */
287 * @pnonce: Peer Nonce
288 * @mac_p: Peer MAC address
467 wpa_printf(MSG_DEBUG, "RSN: Received SMK M5 (Peer " MACSTR ")",
496 wpa_printf(MSG_INFO, "RSN: SMK Peer STA " MACSTR " selected "
551 "for SMK M4/M5: peer " MACSTR,
600 u8 peer[ETH_ALEN];
623 os_memcpy(peer, kde.mac_addr, ETH_ALEN);
625 os_memset(peer, 0, ETH_ALEN);
629 "RSN: SMK Error KDE received: MUI %d error_type %d peer "
632 MAC2STR(peer));
698 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
747 wpa_printf(MSG_DEBUG, "RSN: Peer used SMK lifetime %u seconds "
753 wpa_printf(MSG_DEBUG, "RSN: Peer used shorter SMK lifetime %u seconds "
781 * from the peer. It may also include Lifetime KDE. */
799 wpa_printf(MSG_INFO, "RSN: Peer RSN IE in SMK and STK "
801 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in SMK handshake",
803 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in STK handshake",
915 * @peerkey: Pointer to the PeerKey data for the peer
931 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
984 * @peer: MAC address of the peer STA
988 * handshake with the peer.
990 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
1028 os_memcpy(peerkey->addr, peer, ETH_ALEN);
1094 /* Peer MAC address KDE */
1095 wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN);
1097 wpa_printf(MSG_INFO, "RSN: Sending EAPOL-Key SMK M1 Request (peer "
1098 MACSTR ")", MAC2STR(peer));