HomeSort by relevance Sort by last modified time
    Searched refs:MACSTR (Results 1 - 25 of 102) sorted by null

1 2 3 4 5

  /external/wpa_supplicant_8/src/ap/
ap_mlme.c 58 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)",
82 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)",
105 "MLME-ASSOCIATE.indication(" MACSTR ")",
129 "MLME-REASSOCIATE.indication(" MACSTR ")",
153 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)",
164 "MLME-MichaelMICFailure.indication(" MACSTR ")",
173 "MLME-DELETEKEYS.request(" MACSTR ")",
sta_info.c 111 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from "
142 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR
230 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR,
301 wpa_printf(MSG_DEBUG, "Removing station " MACSTR,
323 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d",
349 MACSTR, MAC2STR(sta->addr));
360 "Station " MACSTR " has been active %is ago",
367 "Station " MACSTR " has been "
381 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR
391 "for " MACSTR " (%lu seconds)"
    [all...]
wpa_auth_ft.c 37 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst));
325 "address " MACSTR, MAC2STR(r0kh->addr));
964 wpa_printf(MSG_DEBUG, "FT: Received authentication frame: STA=" MACSTR
965 " BSSID=" MACSTR " transaction=%d",
978 wpa_printf(MSG_DEBUG, "FT: FT authentication response: dst=" MACSTR
1121 wpa_printf(MSG_DEBUG, "FT: addr=" MACSTR " auth_addr=" MACSTR,
1166 wpa_printf(MSG_DEBUG, "FT: Received FT Action frame (STA=" MACSTR
1167 " Target AP=" MACSTR " Action=%d)",
1172 "STA=" MACSTR " STA-Address=" MACSTR
    [all...]
ap_list.c 114 printf("AP: could not remove AP " MACSTR " from hash table\n",
161 MACSTR " from AP table", MAC2STR(ap->prev->addr));
224 wpa_printf(MSG_DEBUG, "OLBC AP detected: " MACSTR
238 wpa_printf(MSG_DEBUG, "OLBC HT AP detected: " MACSTR
preauth_auth.c 63 MACSTR, MAC2STR(ethhdr->h_dest));
70 "STA " MACSTR, MAC2STR(sta->addr));
190 MACSTR, MAC2STR(sta->addr));
246 "interface for " MACSTR, MAC2STR(sta->addr));
tkip_countermeasures.c 86 "for not associated STA (" MACSTR
peerkey_auth.c 108 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR
283 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR
351 wpa_printf(MSG_DEBUG, "RSN: Peer STA " MACSTR " not "
352 "associated for SMK Error message from " MACSTR,
361 "STA reported SMK Error: Peer " MACSTR
ieee802_11.c 288 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR
472 "incorrect token from " MACSTR,
480 "clogging token from " MACSTR,
570 "TESTING: ignoring auth frame from " MACSTR,
587 wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d "
625 wpa_printf(MSG_INFO, "Station " MACSTR " not allowed to authenticate",
637 wpa_printf(MSG_INFO, "Station " MACSTR " not allowed to authenticate",
643 wpa_printf(MSG_DEBUG, "Authentication frame from " MACSTR
1059 wpa_printf(MSG_DEBUG, "FT: " MACSTR " tried "
1078 wpa_printf(MSG_DEBUG, "SAE: " MACSTR " tried to use
    [all...]
wnm_ap.c 286 MACSTR " dialog_token=%u req_mode=0x%x disassoc_timer=%u "
310 MACSTR, MAC2STR(addr));
320 MACSTR " dialog_token=%u reason=%u",
339 MACSTR, MAC2STR(addr));
350 MACSTR " dialog_token=%u status_code=%u "
359 wpa_printf(MSG_DEBUG, "WNM: Target BSSID: " MACSTR,
397 wpa_printf(MSG_DEBUG, "WNM: Unsupported WNM Action %u from " MACSTR,
428 MACSTR, disassoc_timer, MAC2STR(sta->addr));
496 wpa_printf(MSG_DEBUG, "Disassociation timer for " MACSTR
  /external/wpa_supplicant_8/wpa_supplicant/
blacklist.c 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count "
79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist",
107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
gas_query.c 144 wpa_msg(gas->wpa_s, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR
217 MACSTR " result=%d - no query in progress",
225 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR
262 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u "
297 MACSTR, MAC2STR(query->addr));
310 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR,
324 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR
338 MACSTR " (dialog_token=%u comeback_delay=%u)",
370 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u "
380 MACSTR, MAC2STR(query->addr))
    [all...]
ibss_rsn.c 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
134 wpa_msg(wpa_s, MSG_INFO, IBSS_RSN_COMPLETED MACSTR,
146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
253 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
264 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
278 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu "
299 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR
368 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port",
373 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizing port"
    [all...]
offchannel.c 112 MACSTR " using interface %s",
234 MACSTR " src=" MACSTR " bssid=" MACSTR " len=%d",
242 "frame TX to " MACSTR,
hs20_supplicant.c 199 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for "
228 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR " Icon Binary File",
233 "value from " MACSTR, MAC2STR(sa));
245 "value from " MACSTR, MAC2STR(sa));
255 "value from " MACSTR, MAC2STR(sa));
264 "value from " MACSTR, MAC2STR(sa));
352 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
357 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
370 "Metrics value from " MACSTR, MAC2STR(sa));
373 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
    [all...]
interworking.c 125 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR
248 wpa_printf(MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR,
918 wpa_printf(MSG_DEBUG, "Interworking: Connect with " MACSTR " (3GPP)",
922 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR,
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_pd.c 157 p2p_dbg(p2p, "Received Provision Discovery Request from " MACSTR
164 MACSTR, MAC2STR(sa));
169 MACSTR, MAC2STR(sa));
201 p2p_dbg(p2p, "Peer " MACSTR
206 p2p_dbg(p2p, "Peer " MACSTR
273 p2p_dbg(p2p, "Received Provision Discovery Response from " MACSTR
279 p2p_dbg(p2p, "Ignore Provision Discovery Response from " MACSTR
325 p2p_dbg(p2p, "Peer " MACSTR
329 p2p_dbg(p2p, "Peer " MACSTR
346 MACSTR, MAC2STR(dev->info.p2p_device_addr))
    [all...]
p2p_invitation.c 182 p2p_dbg(p2p, "Received Invitation Request from " MACSTR " (freq=%d)",
190 p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR,
196 MACSTR, MAC2STR(sa));
204 MACSTR, MAC2STR(sa));
212 MACSTR, MAC2STR(sa));
408 p2p_dbg(p2p, "Received Invitation Response from " MACSTR,
414 MACSTR, MAC2STR(sa));
420 MACSTR, MAC2STR(sa));
429 MACSTR, MAC2STR(sa));
436 MACSTR, MAC2STR(sa))
    [all...]
p2p_dev_disc.c 83 p2p_dbg(p2p, "Sending Device Discoverability Request to GO " MACSTR
84 " for client " MACSTR,
146 p2p_dbg(p2p, "Sending Device Discoverability Response to " MACSTR
167 p2p_dbg(p2p, "Received Device Discoverability Request from " MACSTR
221 p2p_dbg(p2p, "Received Device Discoverability Response from " MACSTR,
p2p_parse.c 44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR,
167 wpa_printf(MSG_DEBUG, "P2P: * Device Info: addr " MACSTR
193 MACSTR, MAC2STR(msg->intended_addr));
202 wpa_printf(MSG_DEBUG, "P2P: * P2P Group BSSID: " MACSTR,
214 MACSTR, MAC2STR(msg->group_id));
603 "dev=" MACSTR " iface=" MACSTR,
699 ret = os_snprintf(pos, end - pos, "p2p_device_addr=" MACSTR
p2p.c 96 p2p_dbg(p2p, "Expiring old peer entry " MACSTR,
601 p2p_dbg(p2p, "Update peer " MACSTR
699 p2p_dbg(p2p, "Do not add peer filter for " MACSTR
761 MACSTR " %d -> %d MHz (DS param %d)",
829 p2p_dbg(p2p, "Do not report peer " MACSTR
1010 p2p_dbg(p2p, "Start previously requested connect with " MACSTR,
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 74 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
141 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
153 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
214 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
236 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu "
256 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
  /external/wpa_supplicant_8/src/rsn_supp/
pmksa_cache.c 63 MACSTR, MAC2STR(entry->aa));
207 "PMKSA cache entry (for " MACSTR ") to "
232 wpa_printf(MSG_DEBUG, "RSN: Added PMKSA cache entry for " MACSTR
261 "for " MACSTR, MAC2STR(entry->aa));
366 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa));
375 "for " MACSTR, MAC2STR(aa));
430 wpa_printf(MSG_DEBUG, "RSN: Search for BSSID " MACSTR,
482 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ",
preauth.c 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr));
64 "unexpected source " MACSTR " - dropped",
109 MACSTR " %s", MAC2STR(sm->preauth_bssid),
123 MACSTR " timed out", MAC2STR(sm->preauth_bssid));
179 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst));
314 "candidate " MACSTR
324 MACSTR " does not need pre-authentication anymore",
403 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio);
tdls.c 234 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u "
259 "retry " MACSTR, MAC2STR(dest));
622 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
626 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
647 wpa_printf(MSG_ERROR, "TDLS: Could not find peer " MACSTR
662 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR,
737 "Teardown " MACSTR, MAC2STR(addr));
743 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown for " MACSTR,
816 wpa_printf(MSG_DEBUG, "TDLS: Could not find peer " MACSTR
822 wpa_printf(MSG_DEBUG, "TDLS: Peer " MACSTR
    [all...]
  /external/wpa_supplicant_8/src/utils/
state_machine.h 86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \

Completed in 3577 milliseconds

1 2 3 4 5