/external/wpa_supplicant_8/wpa_supplicant/ |
D | gas_query.c | 144 wpa_msg(gas->wpa_s, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR in gas_query_done() 217 MACSTR " result=%d - no query in progress", in gas_query_tx_status() 225 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR in gas_query_tx_status() 262 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u " in gas_query_tx() 297 MACSTR, MAC2STR(query->addr)); in gas_query_tx_comeback_req() 310 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR, in gas_query_tx_comeback_timeout() 324 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR in gas_query_tx_comeback_req_delay() 338 MACSTR " (dialog_token=%u comeback_delay=%u)", in gas_query_rx_initial() 370 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u " in gas_query_rx_comeback() 380 MACSTR, MAC2STR(query->addr)); in gas_query_rx_comeback() [all …]
|
D | ibss_rsn.c | 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " in supp_ether_send() 134 wpa_msg(wpa_s, MSG_INFO, IBSS_RSN_COMPLETED MACSTR, in ibss_check_rsn_completed() 146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " in supp_set_key() 183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " in supp_mlme_setprotection() 253 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", in auth_logger() 264 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)", in auth_get_psk() 278 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " in auth_send_eapol() 299 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR in auth_set_key() 368 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port", in ibss_set_sta_authorized() 373 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizing port", in ibss_set_sta_authorized() [all …]
|
D | hs20_supplicant.c | 195 MACSTR, MAC2STR(dst)); in hs20_anqp_send_req() 202 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for " in hs20_anqp_send_req() 255 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR " Icon Binary File", in hs20_process_icon_binary_file() 260 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file() 272 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file() 282 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file() 291 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file() 382 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR in hs20_parse_rx_hs20_anqp_resp() 392 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR in hs20_parse_rx_hs20_anqp_resp() 405 "Metrics value from " MACSTR, MAC2STR(sa)); in hs20_parse_rx_hs20_anqp_resp() [all …]
|
D | blacklist.c | 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count " in wpa_blacklist_add() 79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist", in wpa_blacklist_add() 107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " in wpa_blacklist_del() 135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " in wpa_blacklist_clear()
|
D | wmm_ac.c | 100 "WMM AC: Add TS: addr=" MACSTR in wmm_ac_add_ts() 114 "tsid=%d addr=" MACSTR " admitted_time=%d", in wmm_ac_add_ts() 138 "tsid=%d addr=" MACSTR, tsid, MAC2STR(wpa_s->bssid)); in wmm_ac_del_ts_idx() 182 wpa_printf(MSG_DEBUG, "Sending ADDTS Request to " MACSTR, in wmm_ac_send_addts_request() 223 wpa_printf(MSG_DEBUG, "Sending DELTS to " MACSTR, MAC2STR(address)); in wmm_ac_send_delts() 616 wpa_printf(MSG_DEBUG, "WMM AC: TS setup request (addr=" MACSTR in wpas_wmm_ac_addts() 650 MACSTR, tsid, MAC2STR(sa)); in wmm_ac_handle_delts() 662 "TS was deleted successfully (tsid=%u address=" MACSTR ")", in wmm_ac_handle_delts() 721 "WMM AC: adding a new TS with TSID=%u address="MACSTR in wmm_ac_handle_addts_resp() 767 wpa_printf(MSG_DEBUG, "WMM AC: frame destination addr="MACSTR in wmm_ac_rx_action() [all …]
|
D | interworking.c | 131 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR in interworking_anqp_resp_cb() 254 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR, in interworking_anqp_send_req() 971 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR in interworking_connect_3gpp() 975 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR, in interworking_connect_3gpp() 1509 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR in interworking_connect_roaming_consortium() 1513 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR, in interworking_connect_roaming_consortium() 1582 MACSTR, MAC2STR(bss->bssid)); in interworking_connect_helper() 1586 wpa_printf(MSG_DEBUG, "Interworking: Considering BSS " MACSTR in interworking_connect_helper() 1678 MACSTR, MAC2STR(bss->bssid)); in interworking_connect_helper() 1687 MACSTR, MAC2STR(bss->bssid)); in interworking_connect_helper() [all …]
|
D | mesh_mpm.c | 125 wpa_msg(wpa_s, MSG_ERROR, "no supported rates from " MACSTR, in copy_supp_rates() 133 "Invalid supported rates element length " MACSTR in copy_supp_rates() 370 wpa_msg(wpa_s, MSG_DEBUG, "MPM set " MACSTR " into %s", in wpa_mesh_set_plink_state() 374 wpa_msg(wpa_s, MSG_ERROR, "Driver failed to set " MACSTR in wpa_mesh_set_plink_state() 459 wpa_printf(MSG_DEBUG, "MPM closing plink sta=" MACSTR, in mesh_mpm_plink_close() 507 wpa_msg(wpa_s, MSG_DEBUG, "MPM authenticating " MACSTR, in mesh_mpm_auth_peer() 512 "Driver failed to set " MACSTR ": %d", in mesh_mpm_auth_peer() 580 "Driver failed to insert " MACSTR ": %d", in mesh_mpm_add_peer() 604 MACSTR " because of no_auto_peer", MAC2STR(addr)); in wpa_mesh_new_mesh_peer() 657 wpa_msg(wpa_s, MSG_INFO, "mesh plink with " MACSTR " established", in mesh_mpm_plink_estab() [all …]
|
D | p2p_supplicant.c | 244 MACSTR, MAC2STR(bss->bssid)); in wpas_p2p_scan_res_handler() 981 "group is persistent - BSS " MACSTR " not found", in wpas_p2p_persistent_group() 992 "group is persistent - BSS " MACSTR in wpas_p2p_persistent_group() 1008 wpa_printf(MSG_DEBUG, "P2P: GO Device Address " MACSTR, in wpas_p2p_persistent_group() 1014 wpa_printf(MSG_DEBUG, "P2P: BSS " MACSTR " group_capab=0x%x " in wpas_p2p_persistent_group() 1015 "go_dev_addr=" MACSTR, in wpas_p2p_persistent_group() 1030 "group (GO Dev Addr " MACSTR ")", MAC2STR(go_dev_addr)); in wpas_p2p_store_persistent_group() 1219 MACSTR "%s%s", in wpas_p2p_group_started() 1228 "%s %s ssid=\"%s\" freq=%d go_dev_addr=" MACSTR "%s%s", in wpas_p2p_group_started() 1550 wpa_printf(MSG_DEBUG, "P2P: Start WPS Enrollee for peer " MACSTR in wpas_start_wps_enrollee() [all …]
|
D | offchannel.c | 121 MACSTR " using interface %s", in wpas_send_action_cb() 245 MACSTR " src=" MACSTR " bssid=" MACSTR " len=%d", in offchannel_send_action() 253 "frame TX to " MACSTR, in offchannel_send_action()
|
/external/wpa_supplicant_8/src/ap/ |
D | ap_mlme.c | 58 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)", in mlme_authenticate_indication() 82 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)", in mlme_deauthenticate_indication() 105 "MLME-ASSOCIATE.indication(" MACSTR ")", in mlme_associate_indication() 129 "MLME-REASSOCIATE.indication(" MACSTR ")", in mlme_reassociate_indication() 153 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)", in mlme_disassociate_indication() 164 "MLME-MichaelMICFailure.indication(" MACSTR ")", in mlme_michaelmicfailure_indication() 173 "MLME-DELETEKEYS.request(" MACSTR ")", in mlme_deletekeys_request()
|
D | sta_info.c | 112 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from " in ap_sta_list_del() 143 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR in ap_sta_hash_del() 259 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR, in ap_free_sta() 331 wpa_printf(MSG_DEBUG, "Removing station " MACSTR, in hostapd_free_stas() 353 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d", in ap_handle_timer() 379 MACSTR, MAC2STR(sta->addr)); in ap_handle_timer() 388 "Station " MACSTR " has lost its driver entry", in ap_handle_timer() 397 "Station " MACSTR " has been active %is ago", in ap_handle_timer() 404 "Station " MACSTR " has been " in ap_handle_timer() 418 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR in ap_handle_timer() [all …]
|
D | wnm_ap.c | 287 MACSTR " dialog_token=%u req_mode=0x%x disassoc_timer=%u " in ieee802_11_send_bss_trans_mgmt_request() 311 MACSTR, MAC2STR(addr)); in ieee802_11_rx_bss_trans_mgmt_query() 321 MACSTR " dialog_token=%u reason=%u", in ieee802_11_rx_bss_trans_mgmt_query() 340 MACSTR, MAC2STR(addr)); in ieee802_11_rx_bss_trans_mgmt_resp() 351 MACSTR " dialog_token=%u status_code=%u " in ieee802_11_rx_bss_trans_mgmt_resp() 360 wpa_printf(MSG_DEBUG, "WNM: Target BSSID: " MACSTR, in ieee802_11_rx_bss_trans_mgmt_resp() 362 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR in ieee802_11_rx_bss_trans_mgmt_resp() 364 MACSTR, in ieee802_11_rx_bss_trans_mgmt_resp() 369 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR in ieee802_11_rx_bss_trans_mgmt_resp() 407 wpa_printf(MSG_DEBUG, "WNM: Unsupported WNM Action %u from " MACSTR, in ieee802_11_rx_wnm_action_ap() [all …]
|
D | wpa_auth_ft.c | 38 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); in wpa_ft_rrb_send() 326 "address " MACSTR, MAC2STR(r0kh->addr)); in wpa_ft_pull_pmk_r1() 962 wpa_printf(MSG_DEBUG, "FT: Received authentication frame: STA=" MACSTR in wpa_ft_process_auth() 963 " BSSID=" MACSTR " transaction=%d", in wpa_ft_process_auth() 976 wpa_printf(MSG_DEBUG, "FT: FT authentication response: dst=" MACSTR in wpa_ft_process_auth() 1121 wpa_printf(MSG_DEBUG, "FT: addr=" MACSTR " auth_addr=" MACSTR, in wpa_ft_validate_reassoc() 1167 wpa_printf(MSG_DEBUG, "FT: Received FT Action frame (STA=" MACSTR in wpa_ft_action_rx() 1168 " Target AP=" MACSTR " Action=%d)", in wpa_ft_action_rx() 1173 "STA=" MACSTR " STA-Address=" MACSTR, in wpa_ft_action_rx() 1215 wpa_printf(MSG_DEBUG, "FT: Over-the-DS RX request cb for " MACSTR, in wpa_ft_rrb_rx_request_cb() [all …]
|
D | ieee802_11.c | 277 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR in send_auth_reply() 668 wpa_printf(MSG_DEBUG, "SAE: remove the STA (" MACSTR in sae_sm_step() 774 "SAE: Drop commit message from " MACSTR " due to reflection attack", in handle_auth_sae() 781 "incorrect token from " MACSTR, in handle_auth_sae() 792 MACSTR, MAC2STR(sta->addr)); in handle_auth_sae() 902 "TESTING: ignoring auth frame from " MACSTR, in handle_auth() 920 wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d " in handle_auth() 960 wpa_printf(MSG_INFO, "Station " MACSTR " not allowed to authenticate", in handle_auth() 972 wpa_printf(MSG_INFO, "Station " MACSTR " not allowed to authenticate", in handle_auth() 978 wpa_printf(MSG_DEBUG, "Authentication frame from " MACSTR in handle_auth() [all …]
|
D | x_snoop.c | 107 MACSTR " -> " MACSTR " (len %u)", in x_snoop_mcast_to_ucast_convert_send() 118 MACSTR, MAC2STR(sta->addr)); in x_snoop_mcast_to_ucast_convert_send()
|
D | preauth_auth.c | 63 MACSTR, MAC2STR(ethhdr->h_dest)); in rsn_preauth_receive() 70 "STA " MACSTR, MAC2STR(sta->addr)); in rsn_preauth_receive() 190 MACSTR, MAC2STR(sta->addr)); in rsn_preauth_finished_cb() 246 "interface for " MACSTR, MAC2STR(sta->addr)); in rsn_preauth_send()
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p_invitation.c | 188 p2p_dbg(p2p, "Received Invitation Request from " MACSTR " (freq=%d)", in p2p_process_invitation_req() 196 p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR, in p2p_process_invitation_req() 202 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req() 210 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req() 218 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req() 429 p2p_dbg(p2p, "Received Invitation Response from " MACSTR, in p2p_process_invitation_resp() 435 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() 442 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() 454 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() 500 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() [all …]
|
D | p2p_pd.c | 425 p2p_dbg(p2p, "Received Provision Discovery Request from " MACSTR in p2p_process_prov_disc_req() 432 MACSTR, MAC2STR(sa)); in p2p_process_prov_disc_req() 437 MACSTR, MAC2STR(sa)); in p2p_process_prov_disc_req() 480 p2p_dbg(p2p, "Peer " MACSTR in p2p_process_prov_disc_req() 486 p2p_dbg(p2p, "Peer " MACSTR in p2p_process_prov_disc_req() 493 p2p_dbg(p2p, "Peer " MACSTR " requesting P2PS PIN", in p2p_process_prov_disc_req() 838 p2p_dbg(p2p, "Received Provision Discovery Response from " MACSTR in p2p_process_prov_disc_resp() 844 p2p_dbg(p2p, "Ignore Provision Discovery Response from " MACSTR in p2p_process_prov_disc_resp() 893 p2p_dbg(p2p, "Peer " MACSTR in p2p_process_prov_disc_resp() 898 p2p_dbg(p2p, "Peer " MACSTR in p2p_process_prov_disc_resp() [all …]
|
D | p2p_dev_disc.c | 83 p2p_dbg(p2p, "Sending Device Discoverability Request to GO " MACSTR in p2p_send_dev_disc_req() 84 " for client " MACSTR, in p2p_send_dev_disc_req() 146 p2p_dbg(p2p, "Sending Device Discoverability Response to " MACSTR in p2p_send_dev_disc_resp() 167 p2p_dbg(p2p, "Received Device Discoverability Request from " MACSTR in p2p_process_dev_disc_req() 221 p2p_dbg(p2p, "Received Device Discoverability Response from " MACSTR, in p2p_process_dev_disc_resp()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | preauth.c | 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); in rsn_preauth_receive() 64 "unexpected source " MACSTR " - dropped", in rsn_preauth_receive() 110 MACSTR " %s", MAC2STR(sm->preauth_bssid), in rsn_preauth_eapol_cb() 124 MACSTR " timed out", MAC2STR(sm->preauth_bssid)); in rsn_preauth_timeout() 181 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); in rsn_preauth_init() 330 "candidate " MACSTR in rsn_preauth_candidate_process() 340 MACSTR " does not need pre-authentication anymore", in rsn_preauth_candidate_process() 431 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio); in pmksa_candidate_add()
|
D | tdls.c | 238 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " in wpa_tdls_tpk_send() 265 "retry " MACSTR, MAC2STR(dest)); in wpa_tdls_tpk_send() 629 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR in wpa_tdls_tpk_timeout() 633 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR in wpa_tdls_tpk_timeout() 654 wpa_printf(MSG_ERROR, "TDLS: Could not find peer " MACSTR in wpa_tdls_peer_remove_from_list() 669 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR, in wpa_tdls_peer_clear() 745 "Teardown " MACSTR, MAC2STR(addr)); in wpa_tdls_send_teardown() 751 wpa_printf(MSG_DEBUG, "TDLS: First returning link with " MACSTR in wpa_tdls_send_teardown() 758 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown for " MACSTR, in wpa_tdls_send_teardown() 831 wpa_printf(MSG_DEBUG, "TDLS: Could not find peer " MACSTR in wpa_tdls_teardown_link() [all …]
|
D | pmksa_cache.c | 63 MACSTR, MAC2STR(entry->aa)); in pmksa_cache_expire() 218 "PMKSA cache entry (for " MACSTR ") to " in pmksa_cache_add() 243 wpa_printf(MSG_DEBUG, "RSN: Added PMKSA cache entry for " MACSTR in pmksa_cache_add() 272 "for " MACSTR, MAC2STR(entry->aa)); in pmksa_cache_flush() 378 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa)); in pmksa_cache_get_opportunistic() 387 "for " MACSTR, MAC2STR(aa)); in pmksa_cache_get_opportunistic() 442 wpa_printf(MSG_DEBUG, "RSN: Search for BSSID " MACSTR, in pmksa_cache_set_current() 494 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ", in pmksa_cache_list()
|
D | peerkey.c | 110 MACSTR " mui %d error_type %d)", in wpa_supplicant_send_smk_error() 210 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, in wpa_supplicant_process_smk_m2() 372 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR, in wpa_supplicant_send_stk_1_of_4() 427 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR, in wpa_supplicant_send_stk_3_of_4() 438 wpa_printf(MSG_DEBUG, "RSN: Received SMK M4 (Initiator " MACSTR ")", in wpa_supplicant_process_smk_m4() 468 wpa_printf(MSG_DEBUG, "RSN: Received SMK M5 (Peer " MACSTR ")", in wpa_supplicant_process_smk_m5() 497 wpa_printf(MSG_INFO, "RSN: SMK Peer STA " MACSTR " selected " in wpa_supplicant_process_smk_m5() 551 "for SMK M4/M5: peer " MACSTR, in wpa_supplicant_process_smk_m45() 628 MACSTR, in wpa_supplicant_process_smk_error() 667 MACSTR " (ver=%d)", MAC2STR(peerkey->addr), ver); in wpa_supplicant_process_stk_1_of_4() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
D | test_wpa.c | 74 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " in supp_ether_send() 141 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " in supp_set_key() 153 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " in supp_mlme_setprotection() 214 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", in auth_logger() 236 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " in auth_send_eapol() 256 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)", in auth_get_psk()
|
/external/wpa_supplicant_8/src/common/ |
D | hw_features_common.c | 227 "overlap with " MACSTR, in check_40mhz_5g() 250 MACSTR " freq=%d", MAC2STR(bss->bssid), bss->freq); in check_20mhz_bss() 260 MACSTR " freq=%d", MAC2STR(bss->bssid), bss->freq); in check_20mhz_bss() 315 wpa_printf(MSG_DEBUG, "Neighboring BSS: " MACSTR in check_40mhz_2g4() 323 MACSTR in check_40mhz_2g4() 344 MACSTR, pri, MAC2STR(bss->bssid)); in check_40mhz_2g4()
|