Lines Matching full:bssid
92 u8 addr[ETH_ALEN], *bssid = NULL, *n;
100 * BSSID_SPEC ::= bssid <BSSID_HEX>
107 if (os_strncmp(pos, "bssid ", 6) == 0) {
113 os_free(bssid);
115 "BSSID value '%s'", pos);
119 n = os_realloc_array(bssid, count + 1, ETH_ALEN);
122 os_free(bssid);
125 bssid = n;
126 os_memcpy(bssid + count * ETH_ALEN, addr, ETH_ALEN);
143 os_free(bssid);
152 os_free(bssid);
167 os_free(bssid);
176 wpa_hexdump(MSG_DEBUG, "disallow_aps_bssid", bssid, count * ETH_ALEN);
178 wpa_s->disallow_aps_bssid = bssid;
193 if (!disallowed_bssid(wpa_s, wpa_s->bssid) &&
485 u8 bssid[ETH_ALEN];
488 if (hwaddr_aton(addr, bssid)) {
494 wpa_printf(MSG_DEBUG, "CTRL_IFACE PREAUTH " MACSTR, MAC2STR(bssid));
496 if (rsn_preauth_init(wpa_s->wpa, bssid, ssid ? &ssid->eap : NULL))
667 u8 bssid[ETH_ALEN], *_bssid = bssid;
687 } else if (hwaddr_aton(cmd, bssid)) {
688 wpa_printf(MSG_DEBUG, "CTRL_IFACE WPS_PBC: invalid BSSID '%s'",
706 u8 bssid[ETH_ALEN], *_bssid = bssid;
719 } else if (hwaddr_aton(cmd, bssid)) {
720 wpa_printf(MSG_DEBUG, "CTRL_IFACE WPS_PIN: invalid BSSID '%s'",
817 u8 bssid[ETH_ALEN], *_bssid = bssid;
821 else if (hwaddr_aton(cmd, bssid))
1226 u8 bssid[ETH_ALEN];
1239 if (hwaddr_aton(cmd, bssid)) {
1240 wpa_printf(MSG_DEBUG, "CTRL_IFACE WPS_REG: invalid BSSID '%s'",
1247 return wpas_wps_start_reg(wpa_s, bssid, pin, NULL);
1270 return wpas_wps_start_reg(wpa_s, bssid, pin, &ap);
1537 ret = os_snprintf(pos, end - pos, "bssid=" MACSTR "\n",
1538 MAC2STR(wpa_s->bssid));
1778 "id=%d state=%d BSSID=" MACSTR " SSID=%s",
1781 MAC2STR(wpa_s->bssid),
1790 MAC2STR(wpa_s->bssid), "(auth)",
1807 u8 bssid[ETH_ALEN];
1809 /* cmd: "<network id> <BSSID>" */
1815 wpa_printf(MSG_DEBUG, "CTRL_IFACE: id=%d bssid='%s'", id, pos);
1816 if (hwaddr_aton(pos, bssid)) {
1817 wpa_printf(MSG_DEBUG ,"CTRL_IFACE: invalid BSSID '%s'", pos);
1828 os_memcpy(ssid->bssid, bssid, ETH_ALEN);
1829 ssid->bssid_set = !is_zero_ether_addr(bssid);
1839 u8 bssid[ETH_ALEN];
1844 /* cmd: "BLACKLIST [<BSSID>]" */
1851 MAC2STR(e->bssid));
1867 wpa_printf(MSG_DEBUG, "CTRL_IFACE: BLACKLIST bssid='%s'", cmd);
1868 if (hwaddr_aton(cmd, bssid)) {
1869 wpa_printf(MSG_DEBUG, "CTRL_IFACE: invalid BSSID '%s'", cmd);
1874 * Add the BSSID twice, so its count will be 2, causing it to be
1877 ret = wpa_blacklist_add(wpa_s, bssid);
1880 ret = wpa_blacklist_add(wpa_s, bssid);
1988 "network id / ssid / bssid / flags\n");
2003 MAC2STR(ssid->bssid));
2204 MAC2STR(bss->bssid), bss->freq, bss->level);
2298 ret = os_snprintf(pos, end - pos, "bssid / frequency / signal level / "
2548 if (os_strcmp(name, "bssid") != 0 &&
3476 ret = os_snprintf(pos, end - pos, "bssid=" MACSTR "\n",
3477 MAC2STR(bss->bssid));
3748 u8 bssid[ETH_ALEN];
3825 if (hwaddr_aton(cmd + 13, bssid) == 0)
3826 bss = wpa_bss_get_p2p_dev_addr(wpa_s, bssid);
3830 } else if (hwaddr_aton(cmd, bssid) == 0)
3831 bss = wpa_bss_get_bssid(wpa_s, bssid);
3937 wpa_drv_set_key(wpa_s, WPA_ALG_NONE, wpa_s->bssid, 0, 0, NULL, 0, NULL,
3940 wpa_drv_mlme_setprotection(wpa_s, wpa_s->bssid,
3954 u8 bssid[ETH_ALEN];
3958 if (hwaddr_aton(addr, bssid)) {
3964 wpa_printf(MSG_DEBUG, "CTRL_IFACE ROAM " MACSTR, MAC2STR(bssid));
3972 bss = wpa_bss_get(wpa_s, bssid, ssid->ssid, ssid->ssid_len);
5119 u8 bssid[ETH_ALEN];
5122 if (hwaddr_aton(dst, bssid)) {
5123 wpa_printf(MSG_DEBUG, "Invalid BSSID '%s'", dst);
5127 bss = wpa_bss_get_bssid(wpa_s, bssid);
5130 MAC2STR(bssid));
6118 const u8 *src, const u8 *bssid,
6124 " src=" MACSTR " bssid=" MACSTR " result=%s",
6125 freq, MAC2STR(dst), MAC2STR(src), MAC2STR(bssid),
6136 u8 *buf, da[ETH_ALEN], bssid[ETH_ALEN];
6140 /* <DA> <BSSID> [freq=<MHz>] [wait_time=<ms>] [no_cck=1]
6152 used = hwaddr_aton2(pos, bssid);
6194 res = offchannel_send_action(wpa_s, freq, da, wpa_s->own_addr, bssid,
6831 } else if (os_strncmp(buf, "BSSID ", 6) == 0) {