HomeSort by relevance Sort by last modified time
    Searched refs:MACSTR (Results 26 - 50 of 146) sorted by null

12 3 4 5 6

  /external/wpa_supplicant_8/wpa_supplicant/
events.c 186 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR
500 wpa_dbg(wpa_s, MSG_DEBUG, "%d: " MACSTR " ssid='%s' "
648 wpa_dbg(wpa_s, MSG_DEBUG, " selected BSS " MACSTR
759 "reassociate: %d selected: "MACSTR " bssid: " MACSTR
760 " pending: " MACSTR " wpa_state: %s",
861 wpa_dbg(wpa_s, MSG_DEBUG, "Current BSS: " MACSTR " level=%d",
863 wpa_dbg(wpa_s, MSG_DEBUG, "Selected BSS: " MACSTR " level=%d",
    [all...]
mlme.c 277 wpa_printf(MSG_DEBUG, "MLME: authentication with AP " MACSTR
283 wpa_printf(MSG_DEBUG, "MLME: authenticate with AP " MACSTR,
549 wpa_printf(MSG_DEBUG, "MLME: association with AP " MACSTR
555 wpa_printf(MSG_DEBUG, "MLME: associate with AP " MACSTR,
584 wpa_printf(MSG_DEBUG "MLME: No STA entry for own AP " MACSTR,
593 "current AP " MACSTR " - assume "
761 "from " MACSTR ", but not in authenticate state - "
768 "frame received from " MACSTR " - ignored",
775 "from unknown AP (SA=" MACSTR " BSSID=" MACSTR
    [all...]
p2p_supplicant.c 346 "group is persistent - BSS " MACSTR " not found",
354 "group is persistent - BSS " MACSTR
370 wpa_printf(MSG_DEBUG, "P2P: GO Device Address " MACSTR,
376 wpa_printf(MSG_DEBUG, "P2P: BSS " MACSTR " group_capab=0x%x "
377 "go_dev_addr=" MACSTR,
392 "group (GO Dev Addr " MACSTR ")", MAC2STR(go_dev_addr));
545 "%s GO ssid=\"%s\" freq=%d psk=%s go_dev_addr=" MACSTR
555 "go_dev_addr=" MACSTR "%s",
664 MACSTR " using interface %s",
737 wpa_printf(MSG_DEBUG, "P2P: Send action frame: freq=%d dst=" MACSTR
    [all...]
bgscan_learn.c 143 "entry: " MACSTR " freq=%d",
184 fprintf(f, "BSS " MACSTR " %d\n",
191 fprintf(f, "NEIGHBOR " MACSTR " " MACSTR "\n",
520 MACSTR " freq %d -> %d",
524 wpa_printf(MSG_DEBUG, "bgscan learn: Add BSS " MACSTR
  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 204 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u "
227 "retry " MACSTR, MAC2STR(dest));
297 wpa_printf(MSG_INFO, "Clearing SM: Peerkey(" MACSTR ")",
573 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
577 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
586 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR,
639 "Teardown " MACSTR, MAC2STR(addr));
645 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown for " MACSTR,
727 "Teardown " MACSTR, MAC2STR(src_addr));
737 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown Request from " MACSTR
    [all...]
peerkey.c 114 MACSTR " mui %d error_type %d)",
212 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR,
384 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR,
439 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR,
449 wpa_printf(MSG_DEBUG, "RSN: Received SMK M4 (Initiator " MACSTR ")",
479 wpa_printf(MSG_DEBUG, "RSN: Received SMK M5 (Peer " MACSTR ")",
513 wpa_printf(MSG_INFO, "RSN: SMK Peer STA " MACSTR " selected "
565 "for SMK M4/M5: peer " MACSTR,
644 MACSTR,
683 MACSTR " (ver=%d)", MAC2STR(peerkey->addr), ver)
    [all...]
pmksa_cache.c 68 MACSTR, MAC2STR(entry->aa));
199 "entry (for " MACSTR ") to make room for new one",
223 wpa_printf(MSG_DEBUG, "RSN: added PMKSA cache entry for " MACSTR,
338 "for " MACSTR, MAC2STR(aa));
433 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ",
  /external/wpa_supplicant_6/wpa_supplicant/
mlme.c 286 wpa_printf(MSG_DEBUG, "MLME: authentication with AP " MACSTR
292 wpa_printf(MSG_DEBUG, "MLME: authenticate with AP " MACSTR,
562 wpa_printf(MSG_DEBUG, "MLME: association with AP " MACSTR
568 wpa_printf(MSG_DEBUG, "MLME: associate with AP " MACSTR,
597 wpa_printf(MSG_DEBUG "MLME: No STA entry for own AP " MACSTR,
606 "current AP " MACSTR " - assume "
775 "from " MACSTR ", but not in authenticate state - "
782 "frame received from " MACSTR " - ignored",
789 "from unknown AP (SA=" MACSTR " BSSID=" MACSTR
    [all...]
  /external/wpa_supplicant_8/src/ap/
drv_callbacks.c 223 "unknown STA " MACSTR, MAC2STR(addr));
228 wpa_msg(hapd->msg_ctx, MSG_INFO, AP_STA_DISCONNECTED MACSTR,
232 wpa_msg(hapd->msg_ctx_parent, MSG_INFO, AP_STA_DISCONNECTED MACSTR,
411 wpa_printf(MSG_DEBUG, "EVENT_RX_ACTION DA=" MACSTR " SA=" MACSTR
412 " BSSID=" MACSTR " category=%u",
464 wpa_printf(MSG_DEBUG, "Data frame from unknown STA " MACSTR
470 wpa_printf(MSG_DEBUG, "Failed to add STA entry for " MACSTR,
ap_list.c 148 printf("AP: could not remove AP " MACSTR " from hash table\n",
216 MACSTR " from AP table", MAC2STR(ap->prev->addr));
313 wpa_printf(MSG_DEBUG, "OLBC AP detected: " MACSTR " - enable "
322 wpa_printf(MSG_DEBUG, "OLBC HT AP detected: " MACSTR
sta_info.c 85 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from "
116 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR
243 wpa_printf(MSG_DEBUG, "Removing station " MACSTR,
280 MACSTR, MAC2STR(sta->addr));
284 wpa_msg(hapd, MSG_DEBUG, "Station " MACSTR " has been "
291 wpa_msg(hapd, MSG_DEBUG, "Station " MACSTR " has been "
301 wpa_msg(hapd, MSG_DEBUG, "Station " MACSTR " has ACKed data "
354 wpa_printf(MSG_DEBUG, "Sending %s info to STA " MACSTR,
491 wpa_printf(MSG_DEBUG, "Removing STA " MACSTR " from kernel driver",
495 wpa_printf(MSG_DEBUG, "Could not remove station " MACSTR
    [all...]
beacon.c 228 wpa_printf(MSG_DEBUG, "Could not parse ProbeReq from " MACSTR,
237 wpa_printf(MSG_DEBUG, "STA " MACSTR " sent probe request "
259 wpa_printf(MSG_MSGDUMP, "Probe Request from " MACSTR " for "
291 wpa_printf(MSG_MSGDUMP, "Probe Request from " MACSTR
292 " for foreign SSID '%s' (DA " MACSTR ")",
389 wpa_printf(MSG_EXCESSIVE, "STA " MACSTR " sent probe request for %s "
  /external/wpa_supplicant_8/src/p2p/
p2p_parse.c 50 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR,
173 wpa_printf(MSG_DEBUG, "P2P: * Device Info: addr " MACSTR
199 MACSTR, MAC2STR(msg->intended_addr));
208 wpa_printf(MSG_DEBUG, "P2P: * P2P Group BSSID: " MACSTR,
220 MACSTR, MAC2STR(msg->group_id));
554 "dev=" MACSTR " iface=" MACSTR,
650 ret = os_snprintf(pos, end - pos, "p2p_device_addr=" MACSTR
p2p.c 64 "entry " MACSTR, MAC2STR(dev->info.p2p_device_addr));
530 "filter for " MACSTR " due to peer filter",
572 "results (" MACSTR " %d -> %d MHz (DS param %d)",
821 "requested connect with " MACSTR,
1038 "P2P: Request to start group negotiation - peer=" MACSTR
1039 " GO Intent=%d Intended Interface Address=" MACSTR
1050 "P2P: Cannot connect to unknown P2P Device " MACSTR,
1059 "P2P: Cannot connect to P2P Device " MACSTR
1066 "P2P: Cannot connect to P2P Device " MACSTR
1138 "P2P: Request to authorize group negotiation - peer=" MACSTR
    [all...]
  /external/wpa_supplicant/
l2_packet_freebsd.c 122 "not ether src " MACSTR " and "
123 "( ether dst " MACSTR " or ether dst " MACSTR " ) and "
pmksa_cache.c 98 MACSTR, MAC2STR(entry->aa));
227 "entry (for " MACSTR ") to make room for new one",
251 wpa_printf(MSG_DEBUG, "RSN: added PMKSA cache entry for " MACSTR,
365 "for " MACSTR, MAC2STR(aa));
459 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ",
events.c 131 wpa_printf(MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR
372 wpa_printf(MSG_DEBUG, "%d: " MACSTR " ssid='%s' "
412 MACSTR " ssid='%s'",
426 wpa_printf(MSG_DEBUG, "%d: " MACSTR " ssid='%s' "
490 MACSTR " ssid='%s'",
686 MACSTR, MAC2STR(bssid));
699 wpa_msg(wpa_s, MSG_INFO, "Associated with " MACSTR, MAC2STR(bssid));
l2_packet_pcap.c 238 "not ether src " MACSTR " and "
239 "( ether dst " MACSTR " or ether dst " MACSTR " ) and "
l2_packet_winpcap.c 182 "not ether src " MACSTR " and "
183 "( ether dst " MACSTR " or ether dst " MACSTR " ) and "
  /external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/
l2_packet_freebsd.c 125 "not ether src " MACSTR " and "
126 "( ether dst " MACSTR " or ether dst " MACSTR " ) and "
l2_packet_pcap.c 238 "not ether src " MACSTR " and "
239 "( ether dst " MACSTR " or ether dst " MACSTR " ) and "
l2_packet_winpcap.c 182 "not ether src " MACSTR " and "
183 "( ether dst " MACSTR " or ether dst " MACSTR " ) and "
  /external/wpa_supplicant_8/src/drivers/
driver_test.c 245 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dst));
302 wpa_printf(MSG_DEBUG, "%s: Destination " MACSTR " not found",
347 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dest));
460 "%s/AP-" MACSTR, drv->test_dir, MAC2STR(dest));
463 "%s/STA-" MACSTR,
553 wpa_printf(MSG_DEBUG, "test_driver: Scan from " MACSTR,
573 ret = snprintf(pos, end - pos, "SCANRESP " MACSTR " ",
670 snprintf(cmd, sizeof(cmd), "ASSOCRESP " MACSTR " 0",
704 wpa_printf(MSG_DEBUG, "test_driver: dst=" MACSTR " src="
705 MACSTR " proto=%04x"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.c 113 MACSTR " mui %d error_type %d)",
211 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR,
383 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR,
438 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR,
448 wpa_printf(MSG_DEBUG, "RSN: Received SMK M4 (Initiator " MACSTR ")",
478 wpa_printf(MSG_DEBUG, "RSN: Received SMK M5 (Peer " MACSTR ")",
512 wpa_printf(MSG_INFO, "RSN: SMK Peer STA " MACSTR " selected "
564 "for SMK M4/M5: peer " MACSTR,
641 MACSTR,
680 MACSTR " (ver=%d)", MAC2STR(peerkey->addr), ver)
    [all...]
pmksa_cache.c 103 MACSTR, MAC2STR(entry->aa));
234 "entry (for " MACSTR ") to make room for new one",
258 wpa_printf(MSG_DEBUG, "RSN: added PMKSA cache entry for " MACSTR,
373 "for " MACSTR, MAC2STR(aa));
468 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ",

Completed in 492 milliseconds

12 3 4 5 6