HomeSort by relevance Sort by last modified time
    Searched refs:MACSTR (Results 1 - 25 of 134) sorted by null

1 2 3 4 5 6

  /external/wpa_supplicant_8/src/ap/
ap_mlme.c 57 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)",
81 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)",
103 "MLME-ASSOCIATE.indication(" MACSTR ")",
129 "MLME-REASSOCIATE.indication(" MACSTR ")",
153 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)",
164 "MLME-MichaelMICFailure.indication(" MACSTR ")",
173 "MLME-DELETEKEYS.request(" MACSTR ")",
sta_info.c 84 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from "
115 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR
198 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR,
258 wpa_printf(MSG_DEBUG, "Removing station " MACSTR,
279 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d",
305 MACSTR, MAC2STR(sta->addr));
316 "Station " MACSTR " has been active %is ago",
323 "Station " MACSTR " has been "
337 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR
347 "for " MACSTR " (%lu seconds)"
    [all...]
wpa_auth_ft.c 30 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst));
314 "address " MACSTR, MAC2STR(r0kh->addr));
950 wpa_printf(MSG_DEBUG, "FT: Received authentication frame: STA=" MACSTR
951 " BSSID=" MACSTR " transaction=%d",
956 wpa_printf(MSG_DEBUG, "FT: FT authentication response: dst=" MACSTR
1097 wpa_printf(MSG_DEBUG, "FT: addr=" MACSTR " auth_addr=" MACSTR,
1142 wpa_printf(MSG_DEBUG, "FT: Received FT Action frame (STA=" MACSTR
1143 " Target AP=" MACSTR " Action=%d)",
1148 "STA=" MACSTR " STA-Address=" MACSTR
    [all...]
ieee802_11.c 262 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR
334 wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d "
368 printf("Station " MACSTR " not allowed to authenticate.\n",
380 printf("Station " MACSTR " not allowed to authenticate.\n",
386 wpa_printf(MSG_DEBUG, "Authentication frame from " MACSTR
768 wpa_printf(MSG_DEBUG, "FT: " MACSTR " tried "
969 wpa_printf(MSG_DEBUG, "reassociation request: STA=" MACSTR
971 MACSTR,
980 wpa_printf(MSG_DEBUG, "association request: STA=" MACSTR
991 wpa_printf(MSG_DEBUG, "FT: Allow STA " MACSTR " to associate
    [all...]
ieee802_11_ht.c 191 wpa_printf(MSG_DEBUG, "HT: STA " MACSTR " HT Capabilities Info: "
198 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - no greenfield, num "
208 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - 20 MHz HT, num of "
223 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - no HT, num of "
preauth_auth.c 63 MACSTR, MAC2STR(ethhdr->h_dest));
70 "STA " MACSTR, MAC2STR(sta->addr));
190 MACSTR, MAC2STR(sta->addr));
246 "interface for " MACSTR, MAC2STR(sta->addr));
tkip_countermeasures.c 85 "for not associated STA (" MACSTR
peerkey_auth.c 108 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR
283 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR
351 wpa_printf(MSG_DEBUG, "RSN: Peer STA " MACSTR " not "
352 "associated for SMK Error message from " MACSTR,
361 "STA reported SMK Error: Peer " MACSTR
  /external/wpa_supplicant_6/wpa_supplicant/
blacklist.c 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count "
79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist",
104 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
129 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
  /external/wpa_supplicant_8/wpa_supplicant/
blacklist.c 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count "
79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist",
107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
132 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
gas_query.c 129 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u "
155 MACSTR, MAC2STR(query->addr));
168 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR,
182 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR
196 MACSTR " (dialog_token=%u comeback_delay=%u)",
228 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u "
238 MACSTR, MAC2STR(query->addr));
247 "from " MACSTR, MAC2STR(query->addr));
257 "from " MACSTR, MAC2STR(query->addr));
298 wpa_printf(MSG_DEBUG, "GAS: No pending query found for " MACSTR
    [all...]
hs20_supplicant.c 87 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for "
129 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
134 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
144 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
153 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
163 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
ibss_rsn.c 61 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
123 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
158 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
228 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
238 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
252 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu "
273 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR
326 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port",
331 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizing port",
336 wpa_printf(MSG_DEBUG, "Could not set station " MACSTR " flags
    [all...]
offchannel.c 110 MACSTR " using interface %s",
179 MACSTR " src=" MACSTR " bssid=" MACSTR " len=%d",
187 "frame TX to " MACSTR,
  /external/wpa_supplicant_8/src/p2p/
p2p_pd.c 145 "P2P: Received Provision Discovery Request from " MACSTR
153 "unknown peer " MACSTR, MAC2STR(sa));
158 "failed " MACSTR, MAC2STR(sa));
192 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
197 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
268 "P2P: Received Provision Discovery Response from " MACSTR
276 MACSTR " with no pending request", MAC2STR(sa));
317 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
321 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
339 "workaround with " MACSTR,
    [all...]
p2p_invitation.c 167 "P2P: Received Invitation Request from " MACSTR " (freq=%d)",
177 MACSTR, MAC2STR(sa));
183 MACSTR, MAC2STR(sa));
192 "peer " MACSTR, MAC2STR(sa));
201 "Request from " MACSTR, MAC2STR(sa));
411 "P2P: Received Invitation Response from " MACSTR,
418 MACSTR, MAC2STR(sa));
425 MACSTR, MAC2STR(sa));
435 "Invitation Response from " MACSTR, MAC2STR(sa));
462 "peer " MACSTR " to send Invitation Request"
    [all...]
p2p_dev_disc.c 88 "P2P: Sending Device Discoverability Request to GO " MACSTR
89 " for client " MACSTR,
151 "P2P: Sending Device Discoverability Response to " MACSTR
174 "P2P: Received Device Discoverability Request from " MACSTR
237 "P2P: Received Device Discoverability Response from " MACSTR,
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_wpa.c 92 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
159 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
171 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
239 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
261 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu "
281 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 78 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
145 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
157 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
218 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
240 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu "
260 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
preauth.c 67 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr));
74 "unexpected source " MACSTR " - dropped",
117 wpa_msg(sm->ctx->ctx, MSG_INFO, "RSN: pre-authentication with " MACSTR
130 wpa_msg(sm->ctx->ctx, MSG_INFO, "RSN: pre-authentication with " MACSTR
187 "with " MACSTR, MAC2STR(dst));
322 "candidate " MACSTR
332 MACSTR " does not need pre-authentication anymore",
418 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio);
  /external/wpa_supplicant_8/src/rsn_supp/
pmksa_cache.c 63 MACSTR, MAC2STR(entry->aa));
214 "PMKSA cache entry (for " MACSTR ") to "
239 wpa_printf(MSG_DEBUG, "RSN: Added PMKSA cache entry for " MACSTR
261 "for " MACSTR, MAC2STR(entry->aa));
366 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa));
375 "for " MACSTR, MAC2STR(aa));
430 wpa_printf(MSG_DEBUG, "RSN: Search for BSSID " MACSTR,
482 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ",
preauth.c 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr));
64 "unexpected source " MACSTR " - dropped",
108 MACSTR " %s", MAC2STR(sm->preauth_bssid),
121 MACSTR " timed out", MAC2STR(sm->preauth_bssid));
177 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst));
312 "candidate " MACSTR
322 MACSTR " does not need pre-authentication anymore",
401 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio);
tdls.c 205 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u "
230 "retry " MACSTR, MAC2STR(dest));
593 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
597 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
607 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR,
659 "Teardown " MACSTR, MAC2STR(addr));
665 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown for " MACSTR,
742 wpa_printf(MSG_DEBUG, "TDLS: Could not find peer " MACSTR
748 wpa_printf(MSG_DEBUG, "TDLS: Peer " MACSTR
792 "Teardown " MACSTR, MAC2STR(src_addr))
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/utils/
state_machine.h 92 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
  /external/wpa_supplicant_8/src/utils/
state_machine.h 86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \

Completed in 350 milliseconds

1 2 3 4 5 6