Home
last modified time | relevance | path

Searched refs:MACSTR (Results 1 – 25 of 111) sorted by relevance

12345

/external/wpa_supplicant_8/wpa_supplicant/
Dgas_query.c144 wpa_msg(gas->wpa_s, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR in gas_query_done()
217 MACSTR " result=%d - no query in progress", in gas_query_tx_status()
225 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR in gas_query_tx_status()
262 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u " in gas_query_tx()
297 MACSTR, MAC2STR(query->addr)); in gas_query_tx_comeback_req()
310 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR, in gas_query_tx_comeback_timeout()
324 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR in gas_query_tx_comeback_req_delay()
338 MACSTR " (dialog_token=%u comeback_delay=%u)", in gas_query_rx_initial()
370 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u " in gas_query_rx_comeback()
380 MACSTR, MAC2STR(query->addr)); in gas_query_rx_comeback()
[all …]
Dibss_rsn.c68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " in supp_ether_send()
134 wpa_msg(wpa_s, MSG_INFO, IBSS_RSN_COMPLETED MACSTR, in ibss_check_rsn_completed()
146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " in supp_set_key()
183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " in supp_mlme_setprotection()
253 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", in auth_logger()
264 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)", in auth_get_psk()
278 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " in auth_send_eapol()
299 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR in auth_set_key()
368 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port", in ibss_set_sta_authorized()
373 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizing port", in ibss_set_sta_authorized()
[all …]
Dhs20_supplicant.c195 MACSTR, MAC2STR(dst)); in hs20_anqp_send_req()
202 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for " in hs20_anqp_send_req()
255 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR " Icon Binary File", in hs20_process_icon_binary_file()
260 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file()
272 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file()
282 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file()
291 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file()
382 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR in hs20_parse_rx_hs20_anqp_resp()
392 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR in hs20_parse_rx_hs20_anqp_resp()
405 "Metrics value from " MACSTR, MAC2STR(sa)); in hs20_parse_rx_hs20_anqp_resp()
[all …]
Dblacklist.c66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count " in wpa_blacklist_add()
79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist", in wpa_blacklist_add()
107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " in wpa_blacklist_del()
135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " in wpa_blacklist_clear()
Dwmm_ac.c100 "WMM AC: Add TS: addr=" MACSTR in wmm_ac_add_ts()
114 "tsid=%d addr=" MACSTR " admitted_time=%d", in wmm_ac_add_ts()
138 "tsid=%d addr=" MACSTR, tsid, MAC2STR(wpa_s->bssid)); in wmm_ac_del_ts_idx()
182 wpa_printf(MSG_DEBUG, "Sending ADDTS Request to " MACSTR, in wmm_ac_send_addts_request()
223 wpa_printf(MSG_DEBUG, "Sending DELTS to " MACSTR, MAC2STR(address)); in wmm_ac_send_delts()
616 wpa_printf(MSG_DEBUG, "WMM AC: TS setup request (addr=" MACSTR in wpas_wmm_ac_addts()
650 MACSTR, tsid, MAC2STR(sa)); in wmm_ac_handle_delts()
662 "TS was deleted successfully (tsid=%u address=" MACSTR ")", in wmm_ac_handle_delts()
721 "WMM AC: adding a new TS with TSID=%u address="MACSTR in wmm_ac_handle_addts_resp()
767 wpa_printf(MSG_DEBUG, "WMM AC: frame destination addr="MACSTR in wmm_ac_rx_action()
[all …]
Dinterworking.c131 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR in interworking_anqp_resp_cb()
254 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR, in interworking_anqp_send_req()
971 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR in interworking_connect_3gpp()
975 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR, in interworking_connect_3gpp()
1509 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR in interworking_connect_roaming_consortium()
1513 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR, in interworking_connect_roaming_consortium()
1582 MACSTR, MAC2STR(bss->bssid)); in interworking_connect_helper()
1586 wpa_printf(MSG_DEBUG, "Interworking: Considering BSS " MACSTR in interworking_connect_helper()
1678 MACSTR, MAC2STR(bss->bssid)); in interworking_connect_helper()
1687 MACSTR, MAC2STR(bss->bssid)); in interworking_connect_helper()
[all …]
Dmesh_mpm.c125 wpa_msg(wpa_s, MSG_ERROR, "no supported rates from " MACSTR, in copy_supp_rates()
133 "Invalid supported rates element length " MACSTR in copy_supp_rates()
370 wpa_msg(wpa_s, MSG_DEBUG, "MPM set " MACSTR " into %s", in wpa_mesh_set_plink_state()
374 wpa_msg(wpa_s, MSG_ERROR, "Driver failed to set " MACSTR in wpa_mesh_set_plink_state()
459 wpa_printf(MSG_DEBUG, "MPM closing plink sta=" MACSTR, in mesh_mpm_plink_close()
507 wpa_msg(wpa_s, MSG_DEBUG, "MPM authenticating " MACSTR, in mesh_mpm_auth_peer()
512 "Driver failed to set " MACSTR ": %d", in mesh_mpm_auth_peer()
580 "Driver failed to insert " MACSTR ": %d", in mesh_mpm_add_peer()
604 MACSTR " because of no_auto_peer", MAC2STR(addr)); in wpa_mesh_new_mesh_peer()
657 wpa_msg(wpa_s, MSG_INFO, "mesh plink with " MACSTR " established", in mesh_mpm_plink_estab()
[all …]
Dp2p_supplicant.c244 MACSTR, MAC2STR(bss->bssid)); in wpas_p2p_scan_res_handler()
981 "group is persistent - BSS " MACSTR " not found", in wpas_p2p_persistent_group()
992 "group is persistent - BSS " MACSTR in wpas_p2p_persistent_group()
1008 wpa_printf(MSG_DEBUG, "P2P: GO Device Address " MACSTR, in wpas_p2p_persistent_group()
1014 wpa_printf(MSG_DEBUG, "P2P: BSS " MACSTR " group_capab=0x%x " in wpas_p2p_persistent_group()
1015 "go_dev_addr=" MACSTR, in wpas_p2p_persistent_group()
1030 "group (GO Dev Addr " MACSTR ")", MAC2STR(go_dev_addr)); in wpas_p2p_store_persistent_group()
1219 MACSTR "%s%s", in wpas_p2p_group_started()
1228 "%s %s ssid=\"%s\" freq=%d go_dev_addr=" MACSTR "%s%s", in wpas_p2p_group_started()
1550 wpa_printf(MSG_DEBUG, "P2P: Start WPS Enrollee for peer " MACSTR in wpas_start_wps_enrollee()
[all …]
Doffchannel.c121 MACSTR " using interface %s", in wpas_send_action_cb()
245 MACSTR " src=" MACSTR " bssid=" MACSTR " len=%d", in offchannel_send_action()
253 "frame TX to " MACSTR, in offchannel_send_action()
/external/wpa_supplicant_8/src/ap/
Dap_mlme.c58 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)", in mlme_authenticate_indication()
82 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)", in mlme_deauthenticate_indication()
105 "MLME-ASSOCIATE.indication(" MACSTR ")", in mlme_associate_indication()
129 "MLME-REASSOCIATE.indication(" MACSTR ")", in mlme_reassociate_indication()
153 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)", in mlme_disassociate_indication()
164 "MLME-MichaelMICFailure.indication(" MACSTR ")", in mlme_michaelmicfailure_indication()
173 "MLME-DELETEKEYS.request(" MACSTR ")", in mlme_deletekeys_request()
Dsta_info.c112 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from " in ap_sta_list_del()
143 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR in ap_sta_hash_del()
259 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR, in ap_free_sta()
331 wpa_printf(MSG_DEBUG, "Removing station " MACSTR, in hostapd_free_stas()
353 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d", in ap_handle_timer()
379 MACSTR, MAC2STR(sta->addr)); in ap_handle_timer()
388 "Station " MACSTR " has lost its driver entry", in ap_handle_timer()
397 "Station " MACSTR " has been active %is ago", in ap_handle_timer()
404 "Station " MACSTR " has been " in ap_handle_timer()
418 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR in ap_handle_timer()
[all …]
Dwnm_ap.c287 MACSTR " dialog_token=%u req_mode=0x%x disassoc_timer=%u " in ieee802_11_send_bss_trans_mgmt_request()
311 MACSTR, MAC2STR(addr)); in ieee802_11_rx_bss_trans_mgmt_query()
321 MACSTR " dialog_token=%u reason=%u", in ieee802_11_rx_bss_trans_mgmt_query()
340 MACSTR, MAC2STR(addr)); in ieee802_11_rx_bss_trans_mgmt_resp()
351 MACSTR " dialog_token=%u status_code=%u " in ieee802_11_rx_bss_trans_mgmt_resp()
360 wpa_printf(MSG_DEBUG, "WNM: Target BSSID: " MACSTR, in ieee802_11_rx_bss_trans_mgmt_resp()
362 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR in ieee802_11_rx_bss_trans_mgmt_resp()
364 MACSTR, in ieee802_11_rx_bss_trans_mgmt_resp()
369 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR in ieee802_11_rx_bss_trans_mgmt_resp()
407 wpa_printf(MSG_DEBUG, "WNM: Unsupported WNM Action %u from " MACSTR, in ieee802_11_rx_wnm_action_ap()
[all …]
Dwpa_auth_ft.c38 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); in wpa_ft_rrb_send()
326 "address " MACSTR, MAC2STR(r0kh->addr)); in wpa_ft_pull_pmk_r1()
962 wpa_printf(MSG_DEBUG, "FT: Received authentication frame: STA=" MACSTR in wpa_ft_process_auth()
963 " BSSID=" MACSTR " transaction=%d", in wpa_ft_process_auth()
976 wpa_printf(MSG_DEBUG, "FT: FT authentication response: dst=" MACSTR in wpa_ft_process_auth()
1121 wpa_printf(MSG_DEBUG, "FT: addr=" MACSTR " auth_addr=" MACSTR, in wpa_ft_validate_reassoc()
1167 wpa_printf(MSG_DEBUG, "FT: Received FT Action frame (STA=" MACSTR in wpa_ft_action_rx()
1168 " Target AP=" MACSTR " Action=%d)", in wpa_ft_action_rx()
1173 "STA=" MACSTR " STA-Address=" MACSTR, in wpa_ft_action_rx()
1215 wpa_printf(MSG_DEBUG, "FT: Over-the-DS RX request cb for " MACSTR, in wpa_ft_rrb_rx_request_cb()
[all …]
Dieee802_11.c277 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR in send_auth_reply()
668 wpa_printf(MSG_DEBUG, "SAE: remove the STA (" MACSTR in sae_sm_step()
774 "SAE: Drop commit message from " MACSTR " due to reflection attack", in handle_auth_sae()
781 "incorrect token from " MACSTR, in handle_auth_sae()
792 MACSTR, MAC2STR(sta->addr)); in handle_auth_sae()
902 "TESTING: ignoring auth frame from " MACSTR, in handle_auth()
920 wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d " in handle_auth()
960 wpa_printf(MSG_INFO, "Station " MACSTR " not allowed to authenticate", in handle_auth()
972 wpa_printf(MSG_INFO, "Station " MACSTR " not allowed to authenticate", in handle_auth()
978 wpa_printf(MSG_DEBUG, "Authentication frame from " MACSTR in handle_auth()
[all …]
Dx_snoop.c107 MACSTR " -> " MACSTR " (len %u)", in x_snoop_mcast_to_ucast_convert_send()
118 MACSTR, MAC2STR(sta->addr)); in x_snoop_mcast_to_ucast_convert_send()
Dpreauth_auth.c63 MACSTR, MAC2STR(ethhdr->h_dest)); in rsn_preauth_receive()
70 "STA " MACSTR, MAC2STR(sta->addr)); in rsn_preauth_receive()
190 MACSTR, MAC2STR(sta->addr)); in rsn_preauth_finished_cb()
246 "interface for " MACSTR, MAC2STR(sta->addr)); in rsn_preauth_send()
/external/wpa_supplicant_8/src/p2p/
Dp2p_invitation.c188 p2p_dbg(p2p, "Received Invitation Request from " MACSTR " (freq=%d)", in p2p_process_invitation_req()
196 p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR, in p2p_process_invitation_req()
202 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req()
210 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req()
218 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req()
429 p2p_dbg(p2p, "Received Invitation Response from " MACSTR, in p2p_process_invitation_resp()
435 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp()
442 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp()
454 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp()
500 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp()
[all …]
Dp2p_pd.c425 p2p_dbg(p2p, "Received Provision Discovery Request from " MACSTR in p2p_process_prov_disc_req()
432 MACSTR, MAC2STR(sa)); in p2p_process_prov_disc_req()
437 MACSTR, MAC2STR(sa)); in p2p_process_prov_disc_req()
480 p2p_dbg(p2p, "Peer " MACSTR in p2p_process_prov_disc_req()
486 p2p_dbg(p2p, "Peer " MACSTR in p2p_process_prov_disc_req()
493 p2p_dbg(p2p, "Peer " MACSTR " requesting P2PS PIN", in p2p_process_prov_disc_req()
838 p2p_dbg(p2p, "Received Provision Discovery Response from " MACSTR in p2p_process_prov_disc_resp()
844 p2p_dbg(p2p, "Ignore Provision Discovery Response from " MACSTR in p2p_process_prov_disc_resp()
893 p2p_dbg(p2p, "Peer " MACSTR in p2p_process_prov_disc_resp()
898 p2p_dbg(p2p, "Peer " MACSTR in p2p_process_prov_disc_resp()
[all …]
Dp2p_dev_disc.c83 p2p_dbg(p2p, "Sending Device Discoverability Request to GO " MACSTR in p2p_send_dev_disc_req()
84 " for client " MACSTR, in p2p_send_dev_disc_req()
146 p2p_dbg(p2p, "Sending Device Discoverability Response to " MACSTR in p2p_send_dev_disc_resp()
167 p2p_dbg(p2p, "Received Device Discoverability Request from " MACSTR in p2p_process_dev_disc_req()
221 p2p_dbg(p2p, "Received Device Discoverability Response from " MACSTR, in p2p_process_dev_disc_resp()
/external/wpa_supplicant_8/src/rsn_supp/
Dpreauth.c57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); in rsn_preauth_receive()
64 "unexpected source " MACSTR " - dropped", in rsn_preauth_receive()
110 MACSTR " %s", MAC2STR(sm->preauth_bssid), in rsn_preauth_eapol_cb()
124 MACSTR " timed out", MAC2STR(sm->preauth_bssid)); in rsn_preauth_timeout()
181 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); in rsn_preauth_init()
330 "candidate " MACSTR in rsn_preauth_candidate_process()
340 MACSTR " does not need pre-authentication anymore", in rsn_preauth_candidate_process()
431 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio); in pmksa_candidate_add()
Dtdls.c238 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " in wpa_tdls_tpk_send()
265 "retry " MACSTR, MAC2STR(dest)); in wpa_tdls_tpk_send()
629 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR in wpa_tdls_tpk_timeout()
633 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR in wpa_tdls_tpk_timeout()
654 wpa_printf(MSG_ERROR, "TDLS: Could not find peer " MACSTR in wpa_tdls_peer_remove_from_list()
669 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR, in wpa_tdls_peer_clear()
745 "Teardown " MACSTR, MAC2STR(addr)); in wpa_tdls_send_teardown()
751 wpa_printf(MSG_DEBUG, "TDLS: First returning link with " MACSTR in wpa_tdls_send_teardown()
758 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown for " MACSTR, in wpa_tdls_send_teardown()
831 wpa_printf(MSG_DEBUG, "TDLS: Could not find peer " MACSTR in wpa_tdls_teardown_link()
[all …]
Dpmksa_cache.c63 MACSTR, MAC2STR(entry->aa)); in pmksa_cache_expire()
218 "PMKSA cache entry (for " MACSTR ") to " in pmksa_cache_add()
243 wpa_printf(MSG_DEBUG, "RSN: Added PMKSA cache entry for " MACSTR in pmksa_cache_add()
272 "for " MACSTR, MAC2STR(entry->aa)); in pmksa_cache_flush()
378 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa)); in pmksa_cache_get_opportunistic()
387 "for " MACSTR, MAC2STR(aa)); in pmksa_cache_get_opportunistic()
442 wpa_printf(MSG_DEBUG, "RSN: Search for BSSID " MACSTR, in pmksa_cache_set_current()
494 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ", in pmksa_cache_list()
Dpeerkey.c110 MACSTR " mui %d error_type %d)", in wpa_supplicant_send_smk_error()
210 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, in wpa_supplicant_process_smk_m2()
372 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR, in wpa_supplicant_send_stk_1_of_4()
427 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR, in wpa_supplicant_send_stk_3_of_4()
438 wpa_printf(MSG_DEBUG, "RSN: Received SMK M4 (Initiator " MACSTR ")", in wpa_supplicant_process_smk_m4()
468 wpa_printf(MSG_DEBUG, "RSN: Received SMK M5 (Peer " MACSTR ")", in wpa_supplicant_process_smk_m5()
497 wpa_printf(MSG_INFO, "RSN: SMK Peer STA " MACSTR " selected " in wpa_supplicant_process_smk_m5()
551 "for SMK M4/M5: peer " MACSTR, in wpa_supplicant_process_smk_m45()
628 MACSTR, in wpa_supplicant_process_smk_error()
667 MACSTR " (ver=%d)", MAC2STR(peerkey->addr), ver); in wpa_supplicant_process_stk_1_of_4()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/tests/
Dtest_wpa.c74 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " in supp_ether_send()
141 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " in supp_set_key()
153 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " in supp_mlme_setprotection()
214 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", in auth_logger()
236 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " in auth_send_eapol()
256 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)", in auth_get_psk()
/external/wpa_supplicant_8/src/common/
Dhw_features_common.c227 "overlap with " MACSTR, in check_40mhz_5g()
250 MACSTR " freq=%d", MAC2STR(bss->bssid), bss->freq); in check_20mhz_bss()
260 MACSTR " freq=%d", MAC2STR(bss->bssid), bss->freq); in check_20mhz_bss()
315 wpa_printf(MSG_DEBUG, "Neighboring BSS: " MACSTR in check_40mhz_2g4()
323 MACSTR in check_40mhz_2g4()
344 MACSTR, pri, MAC2STR(bss->bssid)); in check_40mhz_2g4()

12345