Lines Matching refs:peer
63 const u8 *peer,
75 if (peer)
98 if (peer) {
99 /* Peer MAC Address KDE */
100 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN);
108 if (peer) {
109 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
111 MAC2STR(peer), mui, error_type);
136 /* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */
161 /* Peer RSN IE */
287 * @pnonce: Peer Nonce
288 * @mac_p: Peer MAC address
468 wpa_printf(MSG_DEBUG, "RSN: Received SMK M5 (Peer " MACSTR ")",
497 wpa_printf(MSG_INFO, "RSN: SMK Peer STA " MACSTR " selected "
551 "for SMK M4/M5: peer " MACSTR,
598 u8 peer[ETH_ALEN];
621 os_memcpy(peer, kde.mac_addr, ETH_ALEN);
623 os_memset(peer, 0, ETH_ALEN);
627 "RSN: SMK Error KDE received: MUI %d error_type %d peer "
630 MAC2STR(peer));
695 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
742 wpa_printf(MSG_DEBUG, "RSN: Peer used SMK lifetime %u seconds "
748 wpa_printf(MSG_DEBUG, "RSN: Peer used shorter SMK lifetime %u seconds "
773 * from the peer. It may also include Lifetime KDE. */
789 wpa_printf(MSG_INFO, "RSN: Peer RSN IE in SMK and STK "
791 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in SMK handshake",
793 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in STK handshake",
905 * @peerkey: Pointer to the PeerKey data for the peer
922 wpa_pmk_to_ptk(peerkey->smk, PMK_LEN, "Peer key expansion",
975 * @peer: MAC address of the peer STA
979 * handshake with the peer.
981 int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
1019 os_memcpy(peerkey->addr, peer, ETH_ALEN);
1082 /* Peer MAC address KDE */
1083 wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR, peer, ETH_ALEN);
1085 wpa_printf(MSG_INFO, "RSN: Sending EAPOL-Key SMK M1 Request (peer "
1086 MACSTR ")", MAC2STR(peer));