Lines Matching full:bssid
41 if (is_zero_ether_addr(dest) && is_zero_ether_addr(sm->bssid)) {
44 * BSSID from the driver.
46 if (wpa_sm_get_bssid(sm, sm->bssid) < 0) {
48 "WPA: Failed to read BSSID for "
51 dest = sm->bssid;
53 "WPA: Use BSSID (" MACSTR
90 u8 bssid[ETH_ALEN], *rbuf;
102 if (wpa_sm_get_bssid(sm, bssid) < 0) {
104 "Failed to read BSSID for EAPOL-Key request");
135 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL,
250 wpa_sm_ether_send(sm, sm->bssid, ETH_P_EAPOL,
372 sm->own_addr, sm->bssid, sm->snonce, key->key_nonce,
472 if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce,
580 if (wpa_sm_set_key(sm, alg, sm->bssid, 0, 1, key_rsc, rsclen,
584 "driver (alg=%d keylen=%d bssid=" MACSTR ")",
585 alg, keylen, MAC2STR(sm->bssid));
741 wpa_supplicant_key_neg_complete(sm, sm->bssid,
1080 "Handshake from " MACSTR " (ver=%d)", MAC2STR(sm->bssid), ver);
1110 if (wpa_supplicant_validate_ie(sm, sm->bssid, &ie) < 0)
1117 MACSTR ")", MAC2STR(sm->bssid));
1126 MAC2STR(sm->bssid));
1138 if (wpa_supplicant_send_4_of_4(sm, sm->bssid, key, ver, key_info,
1155 sm, sm->bssid, MLME_SETPROTECTION_PROTECT_TYPE_RX,
1162 wpa_supplicant_key_neg_complete(sm, sm->bssid,
1344 wpa_eapol_key_send(sm, sm->ptk.kck, ver, sm->bssid, ETH_P_EAPOL,
1391 MAC2STR(sm->bssid), wpa_cipher_txt(sm->group_cipher));
1395 wpa_supplicant_key_neg_complete(sm, sm->bssid,
2102 * @bssid: The BSSID of the new association
2107 void wpa_sm_notify_assoc(struct wpa_sm *sm, const u8 *bssid)
2116 os_memcpy(sm->bssid, bssid, ETH_ALEN);
2120 if (os_memcmp(sm->preauth_bssid, bssid, ETH_ALEN) == 0)
2130 wpa_supplicant_key_neg_complete(sm, sm->bssid, 1);