/external/wpa_supplicant_8/src/ap/ |
ap_mlme.c | 58 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)", 82 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)", 105 "MLME-ASSOCIATE.indication(" MACSTR ")", 129 "MLME-REASSOCIATE.indication(" MACSTR ")", 153 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)", 164 "MLME-MichaelMICFailure.indication(" MACSTR ")", 173 "MLME-DELETEKEYS.request(" MACSTR ")",
|
sta_info.c | 111 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from " 142 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR 230 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR, 301 wpa_printf(MSG_DEBUG, "Removing station " MACSTR, 323 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d", 349 MACSTR, MAC2STR(sta->addr)); 360 "Station " MACSTR " has been active %is ago", 367 "Station " MACSTR " has been " 381 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR 391 "for " MACSTR " (%lu seconds)" [all...] |
wpa_auth_ft.c | 37 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); 325 "address " MACSTR, MAC2STR(r0kh->addr)); 964 wpa_printf(MSG_DEBUG, "FT: Received authentication frame: STA=" MACSTR 965 " BSSID=" MACSTR " transaction=%d", 978 wpa_printf(MSG_DEBUG, "FT: FT authentication response: dst=" MACSTR 1121 wpa_printf(MSG_DEBUG, "FT: addr=" MACSTR " auth_addr=" MACSTR, 1166 wpa_printf(MSG_DEBUG, "FT: Received FT Action frame (STA=" MACSTR 1167 " Target AP=" MACSTR " Action=%d)", 1172 "STA=" MACSTR " STA-Address=" MACSTR [all...] |
ap_list.c | 114 printf("AP: could not remove AP " MACSTR " from hash table\n", 161 MACSTR " from AP table", MAC2STR(ap->prev->addr)); 224 wpa_printf(MSG_DEBUG, "OLBC AP detected: " MACSTR 238 wpa_printf(MSG_DEBUG, "OLBC HT AP detected: " MACSTR
|
preauth_auth.c | 63 MACSTR, MAC2STR(ethhdr->h_dest)); 70 "STA " MACSTR, MAC2STR(sta->addr)); 190 MACSTR, MAC2STR(sta->addr)); 246 "interface for " MACSTR, MAC2STR(sta->addr));
|
tkip_countermeasures.c | 86 "for not associated STA (" MACSTR
|
peerkey_auth.c | 108 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR 283 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR 351 wpa_printf(MSG_DEBUG, "RSN: Peer STA " MACSTR " not " 352 "associated for SMK Error message from " MACSTR, 361 "STA reported SMK Error: Peer " MACSTR
|
ieee802_11.c | 288 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR 472 "incorrect token from " MACSTR, 480 "clogging token from " MACSTR, 570 "TESTING: ignoring auth frame from " MACSTR, 587 wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d " 625 wpa_printf(MSG_INFO, "Station " MACSTR " not allowed to authenticate", 637 wpa_printf(MSG_INFO, "Station " MACSTR " not allowed to authenticate", 643 wpa_printf(MSG_DEBUG, "Authentication frame from " MACSTR 1059 wpa_printf(MSG_DEBUG, "FT: " MACSTR " tried " 1078 wpa_printf(MSG_DEBUG, "SAE: " MACSTR " tried to use [all...] |
wnm_ap.c | 286 MACSTR " dialog_token=%u req_mode=0x%x disassoc_timer=%u " 310 MACSTR, MAC2STR(addr)); 320 MACSTR " dialog_token=%u reason=%u", 339 MACSTR, MAC2STR(addr)); 350 MACSTR " dialog_token=%u status_code=%u " 359 wpa_printf(MSG_DEBUG, "WNM: Target BSSID: " MACSTR, 397 wpa_printf(MSG_DEBUG, "WNM: Unsupported WNM Action %u from " MACSTR, 428 MACSTR, disassoc_timer, MAC2STR(sta->addr)); 496 wpa_printf(MSG_DEBUG, "Disassociation timer for " MACSTR
|
/external/wpa_supplicant_8/wpa_supplicant/ |
blacklist.c | 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count " 79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist", 107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " 135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
|
gas_query.c | 144 wpa_msg(gas->wpa_s, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR 217 MACSTR " result=%d - no query in progress", 225 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR 262 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u " 297 MACSTR, MAC2STR(query->addr)); 310 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR, 324 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR 338 MACSTR " (dialog_token=%u comeback_delay=%u)", 370 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u " 380 MACSTR, MAC2STR(query->addr)) [all...] |
ibss_rsn.c | 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 134 wpa_msg(wpa_s, MSG_INFO, IBSS_RSN_COMPLETED MACSTR, 146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 253 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", 264 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)", 278 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " 299 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR 368 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port", 373 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizing port" [all...] |
offchannel.c | 112 MACSTR " using interface %s", 234 MACSTR " src=" MACSTR " bssid=" MACSTR " len=%d", 242 "frame TX to " MACSTR,
|
hs20_supplicant.c | 199 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for " 228 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR " Icon Binary File", 233 "value from " MACSTR, MAC2STR(sa)); 245 "value from " MACSTR, MAC2STR(sa)); 255 "value from " MACSTR, MAC2STR(sa)); 264 "value from " MACSTR, MAC2STR(sa)); 352 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR 357 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR 370 "Metrics value from " MACSTR, MAC2STR(sa)); 373 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR [all...] |
interworking.c | 125 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR 248 wpa_printf(MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR, 918 wpa_printf(MSG_DEBUG, "Interworking: Connect with " MACSTR " (3GPP)", 922 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR, [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_pd.c | 157 p2p_dbg(p2p, "Received Provision Discovery Request from " MACSTR 164 MACSTR, MAC2STR(sa)); 169 MACSTR, MAC2STR(sa)); 201 p2p_dbg(p2p, "Peer " MACSTR 206 p2p_dbg(p2p, "Peer " MACSTR 273 p2p_dbg(p2p, "Received Provision Discovery Response from " MACSTR 279 p2p_dbg(p2p, "Ignore Provision Discovery Response from " MACSTR 325 p2p_dbg(p2p, "Peer " MACSTR 329 p2p_dbg(p2p, "Peer " MACSTR 346 MACSTR, MAC2STR(dev->info.p2p_device_addr)) [all...] |
p2p_invitation.c | 182 p2p_dbg(p2p, "Received Invitation Request from " MACSTR " (freq=%d)", 190 p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR, 196 MACSTR, MAC2STR(sa)); 204 MACSTR, MAC2STR(sa)); 212 MACSTR, MAC2STR(sa)); 408 p2p_dbg(p2p, "Received Invitation Response from " MACSTR, 414 MACSTR, MAC2STR(sa)); 420 MACSTR, MAC2STR(sa)); 429 MACSTR, MAC2STR(sa)); 436 MACSTR, MAC2STR(sa)) [all...] |
p2p_dev_disc.c | 83 p2p_dbg(p2p, "Sending Device Discoverability Request to GO " MACSTR 84 " for client " MACSTR, 146 p2p_dbg(p2p, "Sending Device Discoverability Response to " MACSTR 167 p2p_dbg(p2p, "Received Device Discoverability Request from " MACSTR 221 p2p_dbg(p2p, "Received Device Discoverability Response from " MACSTR,
|
p2p_parse.c | 44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, 167 wpa_printf(MSG_DEBUG, "P2P: * Device Info: addr " MACSTR 193 MACSTR, MAC2STR(msg->intended_addr)); 202 wpa_printf(MSG_DEBUG, "P2P: * P2P Group BSSID: " MACSTR, 214 MACSTR, MAC2STR(msg->group_id)); 603 "dev=" MACSTR " iface=" MACSTR, 699 ret = os_snprintf(pos, end - pos, "p2p_device_addr=" MACSTR
|
p2p.c | 96 p2p_dbg(p2p, "Expiring old peer entry " MACSTR, 601 p2p_dbg(p2p, "Update peer " MACSTR 699 p2p_dbg(p2p, "Do not add peer filter for " MACSTR 761 MACSTR " %d -> %d MHz (DS param %d)", 829 p2p_dbg(p2p, "Do not report peer " MACSTR 1010 p2p_dbg(p2p, "Start previously requested connect with " MACSTR, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 74 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 141 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 153 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 214 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", 236 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " 256 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
|
/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.c | 63 MACSTR, MAC2STR(entry->aa)); 207 "PMKSA cache entry (for " MACSTR ") to " 232 wpa_printf(MSG_DEBUG, "RSN: Added PMKSA cache entry for " MACSTR 261 "for " MACSTR, MAC2STR(entry->aa)); 366 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa)); 375 "for " MACSTR, MAC2STR(aa)); 430 wpa_printf(MSG_DEBUG, "RSN: Search for BSSID " MACSTR, 482 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ",
|
preauth.c | 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); 64 "unexpected source " MACSTR " - dropped", 109 MACSTR " %s", MAC2STR(sm->preauth_bssid), 123 MACSTR " timed out", MAC2STR(sm->preauth_bssid)); 179 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); 314 "candidate " MACSTR 324 MACSTR " does not need pre-authentication anymore", 403 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio);
|
tdls.c | 234 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " 259 "retry " MACSTR, MAC2STR(dest)); 622 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 626 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 647 wpa_printf(MSG_ERROR, "TDLS: Could not find peer " MACSTR 662 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR, 737 "Teardown " MACSTR, MAC2STR(addr)); 743 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown for " MACSTR, 816 wpa_printf(MSG_DEBUG, "TDLS: Could not find peer " MACSTR 822 wpa_printf(MSG_DEBUG, "TDLS: Peer " MACSTR [all...] |
/external/wpa_supplicant_8/src/utils/ |
state_machine.h | 86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
|