/external/wpa_supplicant_8/src/ap/ |
ap_mlme.c | 58 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)", 87 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)", 110 "MLME-ASSOCIATE.indication(" MACSTR ")", 138 "MLME-REASSOCIATE.indication(" MACSTR ")", 166 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)", 177 "MLME-MichaelMICFailure.indication(" MACSTR ")", 186 "MLME-DELETEKEYS.request(" MACSTR ")",
|
x_snoop.c | 107 MACSTR " -> " MACSTR " (len %u)", 118 MACSTR, MAC2STR(sta->addr));
|
sta_info.c | 117 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from " 148 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR 260 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR, 366 wpa_printf(MSG_DEBUG, "Removing station " MACSTR, 388 wpa_printf(MSG_DEBUG, "%s: %s: " MACSTR " flags=0x%x timeout_next=%d", 414 MACSTR, MAC2STR(sta->addr)); 423 "Station " MACSTR " has lost its driver entry", 432 "Station " MACSTR " has been active %is ago", 439 "Station " MACSTR " has been " 453 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR [all...] |
wnm_ap.c | 277 MACSTR " dialog_token=%u req_mode=0x%x disassoc_timer=%u " 301 MACSTR, MAC2STR(addr)); 311 MACSTR " dialog_token=%u reason=%u", 330 MACSTR, MAC2STR(addr)); 341 MACSTR " dialog_token=%u status_code=%u " 350 wpa_printf(MSG_DEBUG, "WNM: Target BSSID: " MACSTR, 352 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR 354 MACSTR, 359 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR 383 MACSTR " (dialog_token=%u type=%u)" [all...] |
wpa_auth_ft.c | 38 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); 337 "address " MACSTR, MAC2STR(r0kh->addr)); 887 MACSTR, parse->key_mgmt, MAC2STR(sm->addr)); 897 MACSTR, 1074 wpa_printf(MSG_DEBUG, "FT: Received authentication frame: STA=" MACSTR 1075 " BSSID=" MACSTR " transaction=%d", 1088 wpa_printf(MSG_DEBUG, "FT: FT authentication response: dst=" MACSTR [all...] |
rrm.c | 80 wpa_printf(MSG_DEBUG, "Beacon report token %u len %zu from " MACSTR, 90 wpa_msg(hapd->msg_ctx, MSG_INFO, BEACON_RESP_RX MACSTR " %u %02x %s", 235 "NR entry for " MACSTR " exceeds 0xFF bytes", 349 wpa_printf(MSG_DEBUG, "Radio measurement frame, action %u from " MACSTR, 450 wpa_printf(MSG_DEBUG, "Request range: dest addr " MACSTR 525 MACSTR, MAC2STR(responders + ETH_ALEN * i)); 592 "Beacon request: " MACSTR " is not connected", 602 "Beacon request: " MACSTR 612 "Beacon request: " MACSTR 622 "Beacon request: " MACSTR [all...] |
ap_list.c | 114 wpa_printf(MSG_INFO, "AP: could not remove AP " MACSTR 161 MACSTR " from AP table", MAC2STR(ap->prev->addr)); 225 wpa_printf(MSG_DEBUG, "OLBC AP detected: " MACSTR 239 wpa_printf(MSG_DEBUG, "OLBC HT AP detected: " MACSTR
|
preauth_auth.c | 63 MACSTR, MAC2STR(ethhdr->h_dest)); 70 "STA " MACSTR, MAC2STR(sta->addr)); 190 MACSTR, MAC2STR(sta->addr)); 246 "interface for " MACSTR, MAC2STR(sta->addr));
|
tkip_countermeasures.c | 86 "for not associated STA (" MACSTR
|
peerkey_auth.c | 97 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR 271 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR 338 wpa_printf(MSG_DEBUG, "RSN: Peer STA " MACSTR " not " 339 "associated for SMK Error message from " MACSTR, 348 "STA reported SMK Error: Peer " MACSTR
|
/external/wpa_supplicant_8/wpa_supplicant/ |
blacklist.c | 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count " 79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist", 107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " 135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
|
ibss_rsn.c | 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 134 wpa_msg(wpa_s, MSG_INFO, IBSS_RSN_COMPLETED MACSTR, 146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 254 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", 265 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)", 279 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " 300 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR 369 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port", 374 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizing port" [all...] |
gas_query.c | 155 wpa_msg(gas->wpa_s, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR 229 MACSTR " result=%d - no query in progress", 237 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR 284 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u " 285 "freq=%d prot=%d using src addr " MACSTR, 332 MACSTR, MAC2STR(query->addr)); 374 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR, 393 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR 407 MACSTR " (dialog_token=%u comeback_delay=%u)", 440 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u [all...] |
hs20_supplicant.c | 75 "Not configuring frame filtering - BSS " MACSTR 238 MACSTR, MAC2STR(dst)); 245 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for " 308 wpa_printf(MSG_DEBUG, "HS20: Get icon " MACSTR " %s @ %u +%u (%u)", 337 wpa_printf(MSG_DEBUG, "HS20: Free stored icon from " MACSTR 358 MACSTR, MAC2STR(bssid)); 361 MACSTR " file name %s", MAC2STR(bssid), file_name); 440 RX_HS20_ICON MACSTR " %s %u", 451 wpa_msg(wpa_s, MSG_INFO, RX_HS20_ANQP MACSTR " Icon Binary File", 456 "value from " MACSTR, MAC2STR(sa)) [all...] |
offchannel.c | 142 MACSTR " using interface %s (pending_action_tx=%p)", 210 MACSTR " pending_action_tx=%p)", MAC2STR(dst), 271 MACSTR " src=" MACSTR " bssid=" MACSTR " len=%d", 279 "frame TX to " MACSTR " (pending_action_tx=%p)", 301 "Off-channel: Stored pending action frame (dst=" MACSTR
|
interworking.c | 131 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR 254 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR, 974 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR 978 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR, [all...] |
wmm_ac.c | 100 "WMM AC: Add TS: addr=" MACSTR 114 "tsid=%d addr=" MACSTR " admitted_time=%d", 138 "tsid=%d addr=" MACSTR, tsid, MAC2STR(wpa_s->bssid)); 182 wpa_printf(MSG_DEBUG, "Sending ADDTS Request to " MACSTR, 223 wpa_printf(MSG_DEBUG, "Sending DELTS to " MACSTR, MAC2STR(address)); 616 wpa_printf(MSG_DEBUG, "WMM AC: TS setup request (addr=" MACSTR 650 MACSTR, tsid, MAC2STR(sa)); 662 "TS was deleted successfully (tsid=%u address=" MACSTR ")", 721 "WMM AC: adding a new TS with TSID=%u address="MACSTR 767 wpa_printf(MSG_DEBUG, "WMM AC: frame destination addr="MACSTR [all...] |
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/ |
hidl.cpp | 192 "Notifying ANQP query done to hidl control: " MACSTR "result: %s", 210 MSG_DEBUG, "Notifying HS20 icon query done to hidl control: " MACSTR 377 MSG_DEBUG, "Notifying P2P device found to hidl control " MACSTR, 395 MSG_DEBUG, "Notifying P2P device lost to hidl control " MACSTR, 428 "Notifying P2P GO negotiation request to hidl control " MACSTR, 519 "Notifying P2P invitation received to hidl control: %d " MACSTR, id, 538 "Notifying P2P invitation result to hidl control: " MACSTR, 563 "Notifying P2P provision discovery to hidl control " MACSTR, 583 "Notifying P2P service discovery response to hidl control " MACSTR, 602 "Notifying P2P AP STA authorized to hidl control " MACSTR, [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_dev_disc.c | 83 p2p_dbg(p2p, "Sending Device Discoverability Request to GO " MACSTR 84 " for client " MACSTR, 146 p2p_dbg(p2p, "Sending Device Discoverability Response to " MACSTR 167 p2p_dbg(p2p, "Received Device Discoverability Request from " MACSTR 221 p2p_dbg(p2p, "Received Device Discoverability Response from " MACSTR,
|
p2p_invitation.c | 191 p2p_dbg(p2p, "Received Invitation Request from " MACSTR " (freq=%d)", 199 p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR, 205 MACSTR, MAC2STR(sa)); 213 MACSTR, MAC2STR(sa)); 221 MACSTR, MAC2STR(sa)); 438 p2p_dbg(p2p, "Received Invitation Response from " MACSTR, 444 MACSTR, MAC2STR(sa)); 451 MACSTR, MAC2STR(sa)); 463 MACSTR, MAC2STR(sa)); 509 MACSTR, MAC2STR(sa)) [all...] |
/external/wpa_supplicant_8/src/fst/ |
fst.c | 174 MACSTR, MAC2STR(mgmt->sa)); 187 fst_printf_iface(iface, MSG_DEBUG, MACSTR " became connected", 203 fst_printf_iface(iface, MSG_DEBUG, MACSTR " became disconnected",
|
/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.c | 64 MACSTR, MAC2STR(entry->aa)); 233 "PMKSA cache entry (for " MACSTR ") to " 258 wpa_printf(MSG_DEBUG, "RSN: Added PMKSA cache entry for " MACSTR 288 "for " MACSTR, MAC2STR(entry->aa)); 394 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa)); 403 "for " MACSTR, MAC2STR(aa)); 458 wpa_printf(MSG_DEBUG, "RSN: Search for BSSID " MACSTR, 510 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ",
|
preauth.c | 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); 64 "unexpected source " MACSTR " - dropped", 110 MACSTR " %s", MAC2STR(sm->preauth_bssid), 124 MACSTR " timed out", MAC2STR(sm->preauth_bssid)); 181 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); 330 "candidate " MACSTR 340 MACSTR " does not need pre-authentication anymore", 431 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio);
|
tdls.c | 204 wpa_printf(MSG_INFO, "TDLS: TPK-TK for the peer " MACSTR 227 wpa_printf(MSG_DEBUG, "TDLS: Configure pairwise key for peer " MACSTR, 257 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " 284 "retry " MACSTR, MAC2STR(dest)); 650 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 658 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 679 wpa_printf(MSG_ERROR, "TDLS: Could not find peer " MACSTR 694 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR, 770 "Teardown " MACSTR, MAC2STR(addr)); 776 wpa_printf(MSG_DEBUG, "TDLS: First returning link with " MACSTR [all...] |
/external/wpa_supplicant_8/src/utils/ |
state_machine.h | 86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
|