Lines Matching refs:peer
383 wpa_printf(MSG_DEBUG, "SAE: State %s -> %s for peer " MACSTR " (%s)",
1031 "SAE: Cancel use of mesh PMKSA caching because peer starts SAE authentication");
1210 "SAE: Silently ignore unexpected Confirm from peer "
1212 " (peer-send-confirm=%u Rc=%u)",
1269 * @sta: the peer to which commit authentication frame is sent
1351 * queue entry with the new one. This avoids issues with a peer that
2218 * be a queued commit message from the same peer. This is needed
2244 wpa_printf(MSG_DEBUG, "Mesh peer " MACSTR
2253 /* if the mesh peer is not available, we don't do auth.
2255 wpa_printf(MSG_DEBUG, "Mesh peer " MACSTR
2260 * if a new peer entry is added shortly after this.
2699 wpa_printf(MSG_DEBUG, "OWE: Invalid peer DH public key");
2800 u16 owe_validate_request(struct hostapd_data *hapd, const u8 *peer,
2809 MAC2STR(peer));
2818 " (res=%d)", MAC2STR(peer), res);
2825 (unsigned int) data.key_mgmt, MAC2STR(peer));
2831 MACSTR, MAC2STR(peer));
2906 wpa_printf(MSG_DEBUG, "OWE: Update status %d, ie len %d for peer "
4636 /* Invitation responses can be sent with the peer MAC as BSSID */