Lines Matching full:bssid
50 if (is_zero_ether_addr(dest) && is_zero_ether_addr(sm->bssid)) {
53 * BSSID from the driver.
55 if (wpa_sm_get_bssid(sm, sm->bssid) < 0) {
57 "WPA: Failed to read BSSID for "
60 dest = sm->bssid;
62 "WPA: Use BSSID (" MACSTR
102 u8 bssid[ETH_ALEN], *rbuf, *key_mic;
115 if (wpa_sm_get_bssid(sm, bssid) < 0) {
117 "Failed to read BSSID for EAPOL-Key request");
158 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
311 wpa_sm_ether_send(sm, sm->bssid, ETH_P_EAPOL,
438 sm->own_addr, sm->bssid, sm->snonce,
538 if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce,
651 if (wpa_sm_set_key(sm, alg, sm->bssid, 0, 1, key_rsc, rsclen,
655 "driver (alg=%d keylen=%d bssid=" MACSTR ")",
656 alg, keylen, MAC2STR(sm->bssid));
851 wpa_supplicant_key_neg_complete(sm, sm->bssid,
1196 "Handshake from " MACSTR " (ver=%d)", MAC2STR(sm->bssid), ver);
1226 if (wpa_supplicant_validate_ie(sm, sm->bssid, &ie) < 0)
1233 MACSTR ")", MAC2STR(sm->bssid));
1242 MAC2STR(sm->bssid));
1254 if (wpa_supplicant_send_4_of_4(sm, sm->bssid, key, ver, key_info,
1271 sm, sm->bssid, MLME_SETPROTECTION_PROTECT_TYPE_RX,
1278 wpa_supplicant_key_neg_complete(sm, sm->bssid,
1302 sm->bssid, sm->own_addr,
1491 sm->bssid, ETH_P_EAPOL, rbuf, rlen, key_mic);
1547 MAC2STR(sm->bssid), wpa_cipher_txt(sm->group_cipher));
1551 wpa_supplicant_key_neg_complete(sm, sm->bssid,
2303 * @bssid: The BSSID of the new association
2308 void wpa_sm_notify_assoc(struct wpa_sm *sm, const u8 *bssid)
2317 os_memcpy(sm->bssid, bssid, ETH_ALEN);
2321 if (os_memcmp(sm->preauth_bssid, bssid, ETH_ALEN) == 0)
2331 wpa_supplicant_key_neg_complete(sm, sm->bssid, 1);
2395 * @bssid: AA to add into PMKSA cache or %NULL to not cache the PMK
2400 const u8 *pmkid, const u8 *bssid)
2414 if (bssid) {
2416 bssid, sm->own_addr,