Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching full:bssid

194 	const u8 *bssid = wpa_s->bssid;
195 if (is_zero_ether_addr(bssid))
196 bssid = wpa_s->pending_bssid;
198 MAC2STR(bssid));
199 wpa_blacklist_add(wpa_s, bssid);
247 wpa_blacklist_del(wpa_s, wpa_s->bssid);
270 * per-BSSID EAPOL authentication.
582 * @addr: Previously used BSSID or %NULL if not available
792 MAC2STR(wpa_s->bssid),
1110 MAC2STR(bss->bssid),
2102 os_memcpy(prev_bssid, wpa_s->bssid, ETH_ALEN);
2112 " (SSID='%s' freq=%d MHz)", MAC2STR(bss->bssid),
2114 bssid_changed = !is_zero_ether_addr(wpa_s->bssid);
2115 os_memset(wpa_s->bssid, 0, ETH_ALEN);
2116 os_memcpy(wpa_s->pending_bssid, bss->bssid, ETH_ALEN);
2180 if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid,
2361 wpa_clear_keys(wpa_s, bss ? bss->bssid : NULL);
2403 wpa_printf(MSG_DEBUG, "Limit connection to BSSID "
2406 MAC2STR(bss->bssid), bss->freq,
2408 params.bssid = bss->bssid;
2411 params.bssid_hint = bss->bssid;
2422 params.bssid = ssid->bssid;
2581 * per-BSSID authentication.
2655 wpa_dbg(wpa_s, MSG_DEBUG, "Request to deauthenticate - bssid=" MACSTR
2657 MAC2STR(wpa_s->bssid), MAC2STR(wpa_s->pending_bssid),
2660 if (!is_zero_ether_addr(wpa_s->bssid))
2661 addr = wpa_s->bssid;
2669 * BSSID with which we are currently trying to associate. We
2673 addr = wpa_s->bssid;
3104 u8 bssid[ETH_ALEN];
3115 if (wpa_drv_get_bssid(wpa_s, bssid) < 0) {
3116 wpa_msg(wpa_s, MSG_WARNING, "Could not read BSSID from "
3130 os_memcmp(bssid, entry->bssid, ETH_ALEN) == 0))
3137 os_memcmp(bssid, entry->bssid, ETH_ALEN) == 0))
3143 os_memcmp(bssid, entry->bssid, ETH_ALEN) == 0)
3256 os_memcmp(src_addr, wpa_s->bssid, ETH_ALEN) != 0)) {
3264 * driver-based roaming case, so also use src_addr != BSSID as a
3266 * Authenticator uses BSSID as the src_addr (which is not the
3270 "of received EAPOL frame (state=%s bssid=" MACSTR ")",
3272 MAC2STR(wpa_s->bssid));
3284 os_memcmp(src_addr, wpa_s->bssid, ETH_ALEN) == 0;
3354 * current BSSID. However, it is possible that a centralized
3355 * Authenticator could be using another MAC address than the BSSID of
3357 * still sent to the current BSSID (if available), though. */
3907 return (is_zero_ether_addr(wpa_s->bssid) ||
3908 wpa_s->wpa_state != WPA_COMPLETED) ? NULL : wpa_s->bssid;
3952 WPA_ASSERT(os_memcmp(wpa_s->bssid, da, ETH_ALEN) == 0);
3953 return wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, wpa_s->bssid,
3954 wpa_s->own_addr, wpa_s->bssid,
3964 WPA_ASSERT(os_memcmp(wpa_s->bssid, addr, ETH_ALEN) == 0);
3975 WPA_ASSERT(os_memcmp(wpa_s->bssid, addr, ETH_ALEN) == 0);
3990 if (!is_zero_ether_addr(wpa_s->bssid))
3992 wpa_s->bssid : NULL;
5537 wpa_blacklist_get(wpa_s, bss->bssid) == NULL) {
5553 void wpas_connection_failed(struct wpa_supplicant *wpa_s, const u8 *bssid)
5584 * Add the failed BSSID into the blacklist and speed up next scan
5591 count = wpa_blacklist_add(wpa_s, bssid);
5603 wpa_blacklist_add(wpa_s, bssid);
5913 int disallowed_bssid(struct wpa_supplicant *wpa_s, const u8 *bssid)
5922 bssid, ETH_ALEN) == 0)
5999 u8 bssid[ETH_ALEN];
6019 else if (wpa_drv_get_bssid(ifs, bssid) == 0)
6236 if (wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, wpa_s->bssid,
6237 wpa_s->own_addr, wpa_s->bssid,
6326 wpa_s->own_addr, wpa_s->bssid,
6434 const u8 *bssid)
6440 if (os_memcmp(bssid, bss->bssid, ETH_ALEN) == 0)
6448 void wpa_bss_tmp_disallow(struct wpa_supplicant *wpa_s, const u8 *bssid,
6457 bss = wpas_get_disallowed_bss(wpa_s, bssid);
6471 os_memcpy(bss->bssid, bssid, ETH_ALEN);
6476 int wpa_is_bss_tmp_disallowed(struct wpa_supplicant *wpa_s, const u8 *bssid)
6491 if (os_memcmp(bssid, tmp->bssid, ETH_ALEN) == 0) {
6502 MAC2STR(bss->bssid), age.sec, age.usec);