Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching full:bssid

187 	const u8 *bssid = wpa_s->bssid;
188 if (is_zero_ether_addr(bssid))
189 bssid = wpa_s->pending_bssid;
191 MAC2STR(bssid));
192 wpa_blacklist_add(wpa_s, bssid);
240 wpa_blacklist_del(wpa_s, wpa_s->bssid);
263 * per-BSSID EAPOL authentication.
517 * @addr: Previously used BSSID or %NULL if not available
703 MAC2STR(wpa_s->bssid),
1515 " (SSID='%s' freq=%d MHz)", MAC2STR(bss->bssid),
1517 bssid_changed = !is_zero_ether_addr(wpa_s->bssid);
1518 os_memset(wpa_s->bssid, 0, ETH_ALEN);
1519 os_memcpy(wpa_s->pending_bssid, bss->bssid, ETH_ALEN);
1580 if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid,
1707 wpa_clear_keys(wpa_s, bss ? bss->bssid : NULL);
1749 wpa_printf(MSG_DEBUG, "Limit connection to BSSID "
1752 MAC2STR(bss->bssid), bss->freq,
1754 params.bssid = bss->bssid;
1757 params.bssid_hint = bss->bssid;
1766 params.bssid = ssid->bssid;
1902 * per-BSSID authentication.
1974 wpa_dbg(wpa_s, MSG_DEBUG, "Request to deauthenticate - bssid=" MACSTR
1976 MAC2STR(wpa_s->bssid), MAC2STR(wpa_s->pending_bssid),
1979 if (!is_zero_ether_addr(wpa_s->bssid))
1980 addr = wpa_s->bssid;
1988 * BSSID with which we are currently trying to associate. We
1992 addr = wpa_s->bssid;
2388 u8 bssid[ETH_ALEN];
2399 if (wpa_drv_get_bssid(wpa_s, bssid) < 0) {
2400 wpa_msg(wpa_s, MSG_WARNING, "Could not read BSSID from "
2414 os_memcmp(bssid, entry->bssid, ETH_ALEN) == 0))
2421 os_memcmp(bssid, entry->bssid, ETH_ALEN) == 0))
2427 os_memcmp(bssid, entry->bssid, ETH_ALEN) == 0)
2540 os_memcmp(src_addr, wpa_s->bssid, ETH_ALEN) != 0)) {
2548 * driver-based roaming case, so also use src_addr != BSSID as a
2550 * Authenticator uses BSSID as the src_addr (which is not the
2554 "of received EAPOL frame (state=%s bssid=" MACSTR ")",
2556 MAC2STR(wpa_s->bssid));
2568 os_memcmp(src_addr, wpa_s->bssid, ETH_ALEN) == 0;
2614 * current BSSID. However, it is possible that a centralized
2615 * Authenticator could be using another MAC address than the BSSID of
2617 * still sent to the current BSSID (if available), though. */
4212 wpa_blacklist_get(wpa_s, bss->bssid) == NULL) {
4228 void wpas_connection_failed(struct wpa_supplicant *wpa_s, const u8 *bssid)
4253 * Add the failed BSSID into the blacklist and speed up next scan
4260 count = wpa_blacklist_add(wpa_s, bssid);
4272 wpa_blacklist_add(wpa_s, bssid);
4535 int disallowed_bssid(struct wpa_supplicant *wpa_s, const u8 *bssid)
4544 bssid, ETH_ALEN) == 0)
4618 u8 bssid[ETH_ALEN];
4637 else if (wpa_drv_get_bssid(ifs, bssid) == 0)