Home | History | Annotate | Download | only in rsn_supp

Lines Matching refs:peer

63 					 const u8 *peer,
74 if (peer)
96 if (peer) {
97 /* Peer MAC Address KDE */
98 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN);
106 if (peer) {
107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
109 MAC2STR(peer), mui, error_type);
133 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */
157 /* Peer RSN IE */
287 * @pnonce: Peer Nonce
288 * @mac_p: Peer MAC address
467 wpa_printf(MSG_DEBUG, "RSN: Received SMK M5 (Peer " MACSTR ")",
496 wpa_printf(MSG_INFO, "RSN: SMK Peer STA " MACSTR " selected "
550 "for SMK M4/M5: peer " MACSTR,
597 u8 peer[ETH_ALEN];
620 os_memcpy(peer, kde.mac_addr, ETH_ALEN);
622 os_memset(peer, 0, ETH_ALEN);
626 "RSN: SMK Error KDE received: MUI %d error_type %d peer "
629 MAC2STR(peer));
694 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
742 wpa_printf(MSG_DEBUG, "RSN: Peer used SMK lifetime %u seconds "
748 wpa_printf(MSG_DEBUG, "RSN: Peer used shorter SMK lifetime %u seconds "
773 * from the peer. It may also include Lifetime KDE. */
789 wpa_printf(MSG_INFO, "RSN: Peer RSN IE in SMK and STK "
791 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in SMK handshake",
793 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in STK handshake",
903 * @peerkey: Pointer to the PeerKey data for the peer
919 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
972 * @peer: MAC address of the peer STA
976 * handshake with the peer.
978 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
1016 os_memcpy(peerkey->addr, peer, ETH_ALEN);
1082 /* Peer MAC address KDE */
1083 wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN);
1085 wpa_printf(MSG_INFO, "RSN: Sending EAPOL-Key SMK M1 Request (peer "
1086 MACSTR ")", MAC2STR(peer));