/external/wpa_supplicant_8/wpa_supplicant/ |
events.c | 186 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR 500 wpa_dbg(wpa_s, MSG_DEBUG, "%d: " MACSTR " ssid='%s' " 648 wpa_dbg(wpa_s, MSG_DEBUG, " selected BSS " MACSTR 759 "reassociate: %d selected: "MACSTR " bssid: " MACSTR 760 " pending: " MACSTR " wpa_state: %s", 861 wpa_dbg(wpa_s, MSG_DEBUG, "Current BSS: " MACSTR " level=%d", 863 wpa_dbg(wpa_s, MSG_DEBUG, "Selected BSS: " MACSTR " level=%d", [all...] |
mlme.c | 277 wpa_printf(MSG_DEBUG, "MLME: authentication with AP " MACSTR 283 wpa_printf(MSG_DEBUG, "MLME: authenticate with AP " MACSTR, 549 wpa_printf(MSG_DEBUG, "MLME: association with AP " MACSTR 555 wpa_printf(MSG_DEBUG, "MLME: associate with AP " MACSTR, 584 wpa_printf(MSG_DEBUG "MLME: No STA entry for own AP " MACSTR, 593 "current AP " MACSTR " - assume " 761 "from " MACSTR ", but not in authenticate state - " 768 "frame received from " MACSTR " - ignored", 775 "from unknown AP (SA=" MACSTR " BSSID=" MACSTR [all...] |
p2p_supplicant.c | 346 "group is persistent - BSS " MACSTR " not found", 354 "group is persistent - BSS " MACSTR 370 wpa_printf(MSG_DEBUG, "P2P: GO Device Address " MACSTR, 376 wpa_printf(MSG_DEBUG, "P2P: BSS " MACSTR " group_capab=0x%x " 377 "go_dev_addr=" MACSTR, 392 "group (GO Dev Addr " MACSTR ")", MAC2STR(go_dev_addr)); 545 "%s GO ssid=\"%s\" freq=%d psk=%s go_dev_addr=" MACSTR 555 "go_dev_addr=" MACSTR "%s", 664 MACSTR " using interface %s", 737 wpa_printf(MSG_DEBUG, "P2P: Send action frame: freq=%d dst=" MACSTR [all...] |
bgscan_learn.c | 143 "entry: " MACSTR " freq=%d", 184 fprintf(f, "BSS " MACSTR " %d\n", 191 fprintf(f, "NEIGHBOR " MACSTR " " MACSTR "\n", 520 MACSTR " freq %d -> %d", 524 wpa_printf(MSG_DEBUG, "bgscan learn: Add BSS " MACSTR
|
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 204 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " 227 "retry " MACSTR, MAC2STR(dest)); 297 wpa_printf(MSG_INFO, "Clearing SM: Peerkey(" MACSTR ")", 573 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 577 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 586 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR, 639 "Teardown " MACSTR, MAC2STR(addr)); 645 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown for " MACSTR, 727 "Teardown " MACSTR, MAC2STR(src_addr)); 737 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown Request from " MACSTR [all...] |
peerkey.c | 114 MACSTR " mui %d error_type %d)", 212 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, 384 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR, 439 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR, 449 wpa_printf(MSG_DEBUG, "RSN: Received SMK M4 (Initiator " MACSTR ")", 479 wpa_printf(MSG_DEBUG, "RSN: Received SMK M5 (Peer " MACSTR ")", 513 wpa_printf(MSG_INFO, "RSN: SMK Peer STA " MACSTR " selected " 565 "for SMK M4/M5: peer " MACSTR, 644 MACSTR, 683 MACSTR " (ver=%d)", MAC2STR(peerkey->addr), ver) [all...] |
pmksa_cache.c | 68 MACSTR, MAC2STR(entry->aa)); 199 "entry (for " MACSTR ") to make room for new one", 223 wpa_printf(MSG_DEBUG, "RSN: added PMKSA cache entry for " MACSTR, 338 "for " MACSTR, MAC2STR(aa)); 433 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ",
|
/external/wpa_supplicant_6/wpa_supplicant/ |
mlme.c | 286 wpa_printf(MSG_DEBUG, "MLME: authentication with AP " MACSTR 292 wpa_printf(MSG_DEBUG, "MLME: authenticate with AP " MACSTR, 562 wpa_printf(MSG_DEBUG, "MLME: association with AP " MACSTR 568 wpa_printf(MSG_DEBUG, "MLME: associate with AP " MACSTR, 597 wpa_printf(MSG_DEBUG "MLME: No STA entry for own AP " MACSTR, 606 "current AP " MACSTR " - assume " 775 "from " MACSTR ", but not in authenticate state - " 782 "frame received from " MACSTR " - ignored", 789 "from unknown AP (SA=" MACSTR " BSSID=" MACSTR [all...] |
/external/wpa_supplicant_8/src/ap/ |
drv_callbacks.c | 223 "unknown STA " MACSTR, MAC2STR(addr)); 228 wpa_msg(hapd->msg_ctx, MSG_INFO, AP_STA_DISCONNECTED MACSTR, 232 wpa_msg(hapd->msg_ctx_parent, MSG_INFO, AP_STA_DISCONNECTED MACSTR, 411 wpa_printf(MSG_DEBUG, "EVENT_RX_ACTION DA=" MACSTR " SA=" MACSTR 412 " BSSID=" MACSTR " category=%u", 464 wpa_printf(MSG_DEBUG, "Data frame from unknown STA " MACSTR 470 wpa_printf(MSG_DEBUG, "Failed to add STA entry for " MACSTR,
|
ap_list.c | 148 printf("AP: could not remove AP " MACSTR " from hash table\n", 216 MACSTR " from AP table", MAC2STR(ap->prev->addr)); 313 wpa_printf(MSG_DEBUG, "OLBC AP detected: " MACSTR " - enable " 322 wpa_printf(MSG_DEBUG, "OLBC HT AP detected: " MACSTR
|
sta_info.c | 85 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from " 116 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR 243 wpa_printf(MSG_DEBUG, "Removing station " MACSTR, 280 MACSTR, MAC2STR(sta->addr)); 284 wpa_msg(hapd, MSG_DEBUG, "Station " MACSTR " has been " 291 wpa_msg(hapd, MSG_DEBUG, "Station " MACSTR " has been " 301 wpa_msg(hapd, MSG_DEBUG, "Station " MACSTR " has ACKed data " 354 wpa_printf(MSG_DEBUG, "Sending %s info to STA " MACSTR, 491 wpa_printf(MSG_DEBUG, "Removing STA " MACSTR " from kernel driver", 495 wpa_printf(MSG_DEBUG, "Could not remove station " MACSTR [all...] |
beacon.c | 228 wpa_printf(MSG_DEBUG, "Could not parse ProbeReq from " MACSTR, 237 wpa_printf(MSG_DEBUG, "STA " MACSTR " sent probe request " 259 wpa_printf(MSG_MSGDUMP, "Probe Request from " MACSTR " for " 291 wpa_printf(MSG_MSGDUMP, "Probe Request from " MACSTR 292 " for foreign SSID '%s' (DA " MACSTR ")", 389 wpa_printf(MSG_EXCESSIVE, "STA " MACSTR " sent probe request for %s "
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_parse.c | 50 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, 173 wpa_printf(MSG_DEBUG, "P2P: * Device Info: addr " MACSTR 199 MACSTR, MAC2STR(msg->intended_addr)); 208 wpa_printf(MSG_DEBUG, "P2P: * P2P Group BSSID: " MACSTR, 220 MACSTR, MAC2STR(msg->group_id)); 554 "dev=" MACSTR " iface=" MACSTR, 650 ret = os_snprintf(pos, end - pos, "p2p_device_addr=" MACSTR
|
p2p.c | 64 "entry " MACSTR, MAC2STR(dev->info.p2p_device_addr)); 530 "filter for " MACSTR " due to peer filter", 572 "results (" MACSTR " %d -> %d MHz (DS param %d)", 821 "requested connect with " MACSTR, 1038 "P2P: Request to start group negotiation - peer=" MACSTR 1039 " GO Intent=%d Intended Interface Address=" MACSTR 1050 "P2P: Cannot connect to unknown P2P Device " MACSTR, 1059 "P2P: Cannot connect to P2P Device " MACSTR 1066 "P2P: Cannot connect to P2P Device " MACSTR 1138 "P2P: Request to authorize group negotiation - peer=" MACSTR [all...] |
/external/wpa_supplicant/ |
l2_packet_freebsd.c | 122 "not ether src " MACSTR " and " 123 "( ether dst " MACSTR " or ether dst " MACSTR " ) and "
|
pmksa_cache.c | 98 MACSTR, MAC2STR(entry->aa)); 227 "entry (for " MACSTR ") to make room for new one", 251 wpa_printf(MSG_DEBUG, "RSN: added PMKSA cache entry for " MACSTR, 365 "for " MACSTR, MAC2STR(aa)); 459 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ",
|
events.c | 131 wpa_printf(MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR 372 wpa_printf(MSG_DEBUG, "%d: " MACSTR " ssid='%s' " 412 MACSTR " ssid='%s'", 426 wpa_printf(MSG_DEBUG, "%d: " MACSTR " ssid='%s' " 490 MACSTR " ssid='%s'", 686 MACSTR, MAC2STR(bssid)); 699 wpa_msg(wpa_s, MSG_INFO, "Associated with " MACSTR, MAC2STR(bssid));
|
l2_packet_pcap.c | 238 "not ether src " MACSTR " and " 239 "( ether dst " MACSTR " or ether dst " MACSTR " ) and "
|
l2_packet_winpcap.c | 182 "not ether src " MACSTR " and " 183 "( ether dst " MACSTR " or ether dst " MACSTR " ) and "
|
/external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/ |
l2_packet_freebsd.c | 125 "not ether src " MACSTR " and " 126 "( ether dst " MACSTR " or ether dst " MACSTR " ) and "
|
l2_packet_pcap.c | 238 "not ether src " MACSTR " and " 239 "( ether dst " MACSTR " or ether dst " MACSTR " ) and "
|
l2_packet_winpcap.c | 182 "not ether src " MACSTR " and " 183 "( ether dst " MACSTR " or ether dst " MACSTR " ) and "
|
/external/wpa_supplicant_8/src/drivers/ |
driver_test.c | 245 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dst)); 302 wpa_printf(MSG_DEBUG, "%s: Destination " MACSTR " not found", 347 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dest)); 460 "%s/AP-" MACSTR, drv->test_dir, MAC2STR(dest)); 463 "%s/STA-" MACSTR, 553 wpa_printf(MSG_DEBUG, "test_driver: Scan from " MACSTR, 573 ret = snprintf(pos, end - pos, "SCANRESP " MACSTR " ", 670 snprintf(cmd, sizeof(cmd), "ASSOCRESP " MACSTR " 0", 704 wpa_printf(MSG_DEBUG, "test_driver: dst=" MACSTR " src=" 705 MACSTR " proto=%04x" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 113 MACSTR " mui %d error_type %d)", 211 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, 383 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR, 438 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR, 448 wpa_printf(MSG_DEBUG, "RSN: Received SMK M4 (Initiator " MACSTR ")", 478 wpa_printf(MSG_DEBUG, "RSN: Received SMK M5 (Peer " MACSTR ")", 512 wpa_printf(MSG_INFO, "RSN: SMK Peer STA " MACSTR " selected " 564 "for SMK M4/M5: peer " MACSTR, 641 MACSTR, 680 MACSTR " (ver=%d)", MAC2STR(peerkey->addr), ver) [all...] |
pmksa_cache.c | 103 MACSTR, MAC2STR(entry->aa)); 234 "entry (for " MACSTR ") to make room for new one", 258 wpa_printf(MSG_DEBUG, "RSN: added PMKSA cache entry for " MACSTR, 373 "for " MACSTR, MAC2STR(aa)); 468 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ",
|