/external/wpa_supplicant_8/src/ap/ |
ap_mlme.c | 57 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)", 81 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)", 103 "MLME-ASSOCIATE.indication(" MACSTR ")", 129 "MLME-REASSOCIATE.indication(" MACSTR ")", 153 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)", 164 "MLME-MichaelMICFailure.indication(" MACSTR ")", 173 "MLME-DELETEKEYS.request(" MACSTR ")",
|
sta_info.c | 84 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from " 115 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR 198 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR, 258 wpa_printf(MSG_DEBUG, "Removing station " MACSTR, 279 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d", 305 MACSTR, MAC2STR(sta->addr)); 316 "Station " MACSTR " has been active %is ago", 323 "Station " MACSTR " has been " 337 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR 347 "for " MACSTR " (%lu seconds)" [all...] |
wpa_auth_ft.c | 30 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); 314 "address " MACSTR, MAC2STR(r0kh->addr)); 950 wpa_printf(MSG_DEBUG, "FT: Received authentication frame: STA=" MACSTR 951 " BSSID=" MACSTR " transaction=%d", 956 wpa_printf(MSG_DEBUG, "FT: FT authentication response: dst=" MACSTR 1097 wpa_printf(MSG_DEBUG, "FT: addr=" MACSTR " auth_addr=" MACSTR, 1142 wpa_printf(MSG_DEBUG, "FT: Received FT Action frame (STA=" MACSTR 1143 " Target AP=" MACSTR " Action=%d)", 1148 "STA=" MACSTR " STA-Address=" MACSTR [all...] |
ieee802_11.c | 262 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR 334 wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d " 368 printf("Station " MACSTR " not allowed to authenticate.\n", 380 printf("Station " MACSTR " not allowed to authenticate.\n", 386 wpa_printf(MSG_DEBUG, "Authentication frame from " MACSTR 768 wpa_printf(MSG_DEBUG, "FT: " MACSTR " tried " 969 wpa_printf(MSG_DEBUG, "reassociation request: STA=" MACSTR 971 MACSTR, 980 wpa_printf(MSG_DEBUG, "association request: STA=" MACSTR 991 wpa_printf(MSG_DEBUG, "FT: Allow STA " MACSTR " to associate [all...] |
ieee802_11_ht.c | 191 wpa_printf(MSG_DEBUG, "HT: STA " MACSTR " HT Capabilities Info: " 198 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - no greenfield, num " 208 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - 20 MHz HT, num of " 223 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - no HT, num of "
|
preauth_auth.c | 63 MACSTR, MAC2STR(ethhdr->h_dest)); 70 "STA " MACSTR, MAC2STR(sta->addr)); 190 MACSTR, MAC2STR(sta->addr)); 246 "interface for " MACSTR, MAC2STR(sta->addr));
|
tkip_countermeasures.c | 85 "for not associated STA (" MACSTR
|
peerkey_auth.c | 108 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR 283 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR 351 wpa_printf(MSG_DEBUG, "RSN: Peer STA " MACSTR " not " 352 "associated for SMK Error message from " MACSTR, 361 "STA reported SMK Error: Peer " MACSTR
|
/external/wpa_supplicant_6/wpa_supplicant/ |
blacklist.c | 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count " 79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist", 104 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " 129 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
|
/external/wpa_supplicant_8/wpa_supplicant/ |
blacklist.c | 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count " 79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist", 107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " 132 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
|
gas_query.c | 129 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u " 155 MACSTR, MAC2STR(query->addr)); 168 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR, 182 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR 196 MACSTR " (dialog_token=%u comeback_delay=%u)", 228 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u " 238 MACSTR, MAC2STR(query->addr)); 247 "from " MACSTR, MAC2STR(query->addr)); 257 "from " MACSTR, MAC2STR(query->addr)); 298 wpa_printf(MSG_DEBUG, "GAS: No pending query found for " MACSTR [all...] |
hs20_supplicant.c | 87 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for " 129 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR 134 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR 144 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR 153 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR 163 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
|
ibss_rsn.c | 61 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 123 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 158 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 228 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", 238 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)", 252 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " 273 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR 326 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port", 331 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizing port", 336 wpa_printf(MSG_DEBUG, "Could not set station " MACSTR " flags [all...] |
offchannel.c | 110 MACSTR " using interface %s", 179 MACSTR " src=" MACSTR " bssid=" MACSTR " len=%d", 187 "frame TX to " MACSTR,
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_pd.c | 145 "P2P: Received Provision Discovery Request from " MACSTR 153 "unknown peer " MACSTR, MAC2STR(sa)); 158 "failed " MACSTR, MAC2STR(sa)); 192 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR 197 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR 268 "P2P: Received Provision Discovery Response from " MACSTR 276 MACSTR " with no pending request", MAC2STR(sa)); 317 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR 321 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR 339 "workaround with " MACSTR, [all...] |
p2p_invitation.c | 167 "P2P: Received Invitation Request from " MACSTR " (freq=%d)", 177 MACSTR, MAC2STR(sa)); 183 MACSTR, MAC2STR(sa)); 192 "peer " MACSTR, MAC2STR(sa)); 201 "Request from " MACSTR, MAC2STR(sa)); 411 "P2P: Received Invitation Response from " MACSTR, 418 MACSTR, MAC2STR(sa)); 425 MACSTR, MAC2STR(sa)); 435 "Invitation Response from " MACSTR, MAC2STR(sa)); 462 "peer " MACSTR " to send Invitation Request" [all...] |
p2p_dev_disc.c | 88 "P2P: Sending Device Discoverability Request to GO " MACSTR 89 " for client " MACSTR, 151 "P2P: Sending Device Discoverability Response to " MACSTR 174 "P2P: Received Device Discoverability Request from " MACSTR 237 "P2P: Received Device Discoverability Response from " MACSTR,
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_wpa.c | 92 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 159 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 171 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 239 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", 261 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " 281 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 78 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 145 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 157 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 218 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", 240 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " 260 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
preauth.c | 67 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); 74 "unexpected source " MACSTR " - dropped", 117 wpa_msg(sm->ctx->ctx, MSG_INFO, "RSN: pre-authentication with " MACSTR 130 wpa_msg(sm->ctx->ctx, MSG_INFO, "RSN: pre-authentication with " MACSTR 187 "with " MACSTR, MAC2STR(dst)); 322 "candidate " MACSTR 332 MACSTR " does not need pre-authentication anymore", 418 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.c | 63 MACSTR, MAC2STR(entry->aa)); 214 "PMKSA cache entry (for " MACSTR ") to " 239 wpa_printf(MSG_DEBUG, "RSN: Added PMKSA cache entry for " MACSTR 261 "for " MACSTR, MAC2STR(entry->aa)); 366 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa)); 375 "for " MACSTR, MAC2STR(aa)); 430 wpa_printf(MSG_DEBUG, "RSN: Search for BSSID " MACSTR, 482 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ",
|
preauth.c | 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); 64 "unexpected source " MACSTR " - dropped", 108 MACSTR " %s", MAC2STR(sm->preauth_bssid), 121 MACSTR " timed out", MAC2STR(sm->preauth_bssid)); 177 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); 312 "candidate " MACSTR 322 MACSTR " does not need pre-authentication anymore", 401 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio);
|
tdls.c | 205 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " 230 "retry " MACSTR, MAC2STR(dest)); 593 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 597 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 607 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR, 659 "Teardown " MACSTR, MAC2STR(addr)); 665 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown for " MACSTR, 742 wpa_printf(MSG_DEBUG, "TDLS: Could not find peer " MACSTR 748 wpa_printf(MSG_DEBUG, "TDLS: Peer " MACSTR 792 "Teardown " MACSTR, MAC2STR(src_addr)) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
state_machine.h | 92 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
|
/external/wpa_supplicant_8/src/utils/ |
state_machine.h | 86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
|