HomeSort by relevance Sort by last modified time
    Searched refs:MACSTR (Results 1 - 25 of 132) sorted by null

1 2 3 4 5 6

  /external/wpa_supplicant_8/src/ap/
ap_mlme.c 58 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)",
87 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)",
110 "MLME-ASSOCIATE.indication(" MACSTR ")",
138 "MLME-REASSOCIATE.indication(" MACSTR ")",
166 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)",
177 "MLME-MichaelMICFailure.indication(" MACSTR ")",
186 "MLME-DELETEKEYS.request(" MACSTR ")",
gas_query_ap.c 146 wpa_msg(gas->msg_ctx, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR
213 wpa_printf(MSG_DEBUG, "GAS: Unexpected TX status: dst=" MACSTR
221 wpa_printf(MSG_DEBUG, "GAS: TX status: dst=" MACSTR
264 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u "
265 "freq=%d prot=%d using src addr " MACSTR,
297 MACSTR, MAC2STR(query->addr));
339 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR,
353 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR
367 MACSTR " (dialog_token=%u comeback_delay=%u)",
400 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u
    [all...]
x_snoop.c 107 MACSTR " -> " MACSTR " (len %u)",
118 MACSTR, MAC2STR(sta->addr));
sta_info.c 118 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from "
149 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR
261 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR,
377 wpa_printf(MSG_DEBUG, "Removing station " MACSTR,
399 wpa_printf(MSG_DEBUG, "%s: %s: " MACSTR " flags=0x%x timeout_next=%d",
425 MACSTR, MAC2STR(sta->addr));
434 "Station " MACSTR " has lost its driver entry",
443 "Station " MACSTR " has been active %is ago",
450 "Station " MACSTR " has been "
464 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR
    [all...]
wnm_ap.c 277 MACSTR " dialog_token=%u req_mode=0x%x disassoc_timer=%u "
301 MACSTR, MAC2STR(addr));
311 MACSTR " dialog_token=%u reason=%u",
330 MACSTR, MAC2STR(addr));
341 MACSTR " dialog_token=%u status_code=%u "
350 wpa_printf(MSG_DEBUG, "WNM: Target BSSID: " MACSTR,
352 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR
354 MACSTR,
359 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR
383 MACSTR " (dialog_token=%u type=%u)"
    [all...]
rrm.c 80 wpa_printf(MSG_DEBUG, "Beacon report token %u len %zu from " MACSTR,
90 wpa_msg(hapd->msg_ctx, MSG_INFO, BEACON_RESP_RX MACSTR " %u %02x %s",
235 "NR entry for " MACSTR " exceeds 0xFF bytes",
349 wpa_printf(MSG_DEBUG, "Radio measurement frame, action %u from " MACSTR,
450 wpa_printf(MSG_DEBUG, "Request range: dest addr " MACSTR
525 MACSTR, MAC2STR(responders + ETH_ALEN * i));
592 "Beacon request: " MACSTR " is not connected",
602 "Beacon request: " MACSTR
612 "Beacon request: " MACSTR
622 "Beacon request: " MACSTR
    [all...]
ap_list.c 114 wpa_printf(MSG_INFO, "AP: could not remove AP " MACSTR
161 MACSTR " from AP table", MAC2STR(ap->prev->addr));
225 wpa_printf(MSG_DEBUG, "OLBC AP detected: " MACSTR
239 wpa_printf(MSG_DEBUG, "OLBC HT AP detected: " MACSTR
preauth_auth.c 63 MACSTR, MAC2STR(ethhdr->h_dest));
70 "STA " MACSTR, MAC2STR(sta->addr));
190 MACSTR, MAC2STR(sta->addr));
246 "interface for " MACSTR, MAC2STR(sta->addr));
tkip_countermeasures.c 86 "for not associated STA (" MACSTR
  /external/wpa_supplicant_8/wpa_supplicant/
blacklist.c 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count "
79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist",
107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
ibss_rsn.c 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
134 wpa_msg(wpa_s, MSG_INFO, IBSS_RSN_COMPLETED MACSTR,
146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
254 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
269 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
283 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu "
304 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR
373 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port",
378 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizing port"
    [all...]
gas_query.c 155 wpa_msg(gas->wpa_s, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR
229 MACSTR " result=%d - no query in progress",
237 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR
291 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u "
292 "freq=%d prot=%d using src addr " MACSTR,
339 MACSTR, MAC2STR(query->addr));
381 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR,
400 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR
414 MACSTR " (dialog_token=%u comeback_delay=%u)",
447 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u
    [all...]
hs20_supplicant.c 75 "Not configuring frame filtering - BSS " MACSTR
238 MACSTR, MAC2STR(dst));
245 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for "
308 wpa_printf(MSG_DEBUG, "HS20: Get icon " MACSTR " %s @ %u +%u (%u)",
337 wpa_printf(MSG_DEBUG, "HS20: Free stored icon from " MACSTR
358 MACSTR, MAC2STR(bssid));
361 MACSTR " file name %s", MAC2STR(bssid), file_name);
439 RX_HS20_ICON MACSTR " %s %u",
450 wpa_msg(wpa_s, MSG_INFO, RX_HS20_ANQP MACSTR " Icon Binary File",
455 "value from " MACSTR, MAC2STR(sa))
    [all...]
offchannel.c 142 MACSTR " using interface %s (pending_action_tx=%p)",
210 MACSTR " pending_action_tx=%p)", MAC2STR(dst),
271 MACSTR " src=" MACSTR " bssid=" MACSTR " len=%d",
279 "frame TX to " MACSTR " (pending_action_tx=%p)",
301 "Off-channel: Stored pending action frame (dst=" MACSTR
interworking.c 133 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR
256 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR,
976 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR
980 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR,
    [all...]
wnm_sta.c 68 "action=%s to " MACSTR,
633 wpa_printf(MSG_DEBUG, "WNM: Current BSS " MACSTR " RSSI %d",
643 wpa_printf(MSG_DEBUG, "Skip excluded BSS " MACSTR,
650 wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR
677 wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR
688 wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR
698 "MBO: Candidate BSS " MACSTR
705 wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR
729 MACSTR " (RSSI %d)",
925 "WNM: Send BSS Transition Management Response to " MACSTR
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/
hidl.cpp 191 "Notifying ANQP query done to hidl control: " MACSTR "result: %s",
209 MSG_DEBUG, "Notifying HS20 icon query done to hidl control: " MACSTR
376 MSG_DEBUG, "Notifying P2P device found to hidl control " MACSTR,
394 MSG_DEBUG, "Notifying P2P device lost to hidl control " MACSTR,
427 "Notifying P2P GO negotiation request to hidl control " MACSTR,
518 "Notifying P2P invitation received to hidl control: %d " MACSTR, id,
537 "Notifying P2P invitation result to hidl control: " MACSTR,
562 "Notifying P2P provision discovery to hidl control " MACSTR,
582 "Notifying P2P service discovery response to hidl control " MACSTR,
601 "Notifying P2P AP STA authorized to hidl control " MACSTR,
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/hidl/1.1/
hidl.cpp 191 "Notifying ANQP query done to hidl control: " MACSTR "result: %s",
209 MSG_DEBUG, "Notifying HS20 icon query done to hidl control: " MACSTR
376 MSG_DEBUG, "Notifying P2P device found to hidl control " MACSTR,
394 MSG_DEBUG, "Notifying P2P device lost to hidl control " MACSTR,
427 "Notifying P2P GO negotiation request to hidl control " MACSTR,
518 "Notifying P2P invitation received to hidl control: %d " MACSTR, id,
537 "Notifying P2P invitation result to hidl control: " MACSTR,
562 "Notifying P2P provision discovery to hidl control " MACSTR,
582 "Notifying P2P service discovery response to hidl control " MACSTR,
601 "Notifying P2P AP STA authorized to hidl control " MACSTR,
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_dev_disc.c 83 p2p_dbg(p2p, "Sending Device Discoverability Request to GO " MACSTR
84 " for client " MACSTR,
146 p2p_dbg(p2p, "Sending Device Discoverability Response to " MACSTR
167 p2p_dbg(p2p, "Received Device Discoverability Request from " MACSTR
221 p2p_dbg(p2p, "Received Device Discoverability Response from " MACSTR,
p2p_invitation.c 191 p2p_dbg(p2p, "Received Invitation Request from " MACSTR " (freq=%d)",
199 p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR,
205 MACSTR, MAC2STR(sa));
213 MACSTR, MAC2STR(sa));
221 MACSTR, MAC2STR(sa));
438 p2p_dbg(p2p, "Received Invitation Response from " MACSTR,
444 MACSTR, MAC2STR(sa));
451 MACSTR, MAC2STR(sa));
463 MACSTR, MAC2STR(sa));
509 MACSTR, MAC2STR(sa))
    [all...]
  /external/wpa_supplicant_8/src/fst/
fst.c 174 MACSTR, MAC2STR(mgmt->sa));
187 fst_printf_iface(iface, MSG_DEBUG, MACSTR " became connected",
203 fst_printf_iface(iface, MSG_DEBUG, MACSTR " became disconnected",
  /external/wpa_supplicant_8/src/rsn_supp/
preauth.c 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr));
64 "unexpected source " MACSTR " - dropped",
110 MACSTR " %s", MAC2STR(sm->preauth_bssid),
124 MACSTR " timed out", MAC2STR(sm->preauth_bssid));
181 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst));
330 "candidate " MACSTR
340 MACSTR " does not need pre-authentication anymore",
432 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio);
tdls.c 204 wpa_printf(MSG_INFO, "TDLS: TPK-TK for the peer " MACSTR
227 wpa_printf(MSG_DEBUG, "TDLS: Configure pairwise key for peer " MACSTR,
257 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u "
284 "retry " MACSTR, MAC2STR(dest));
647 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
655 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
676 wpa_printf(MSG_ERROR, "TDLS: Could not find peer " MACSTR
691 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR,
767 "Teardown " MACSTR, MAC2STR(addr));
773 wpa_printf(MSG_DEBUG, "TDLS: First returning link with " MACSTR
    [all...]
  /device/generic/goldfish/wifi/wpa_supplicant_8_lib/
driver_cmd_nl80211.c 63 buf, buf_len, "Macaddr = " MACSTR "\n", MAC2STR(macaddr));
  /external/wpa_supplicant_8/src/utils/
state_machine.h 86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \

Completed in 2322 milliseconds

1 2 3 4 5 6