/external/wpa_supplicant_8/wpa_supplicant/ |
D | gas_query.c | 155 wpa_msg(gas->wpa_s, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR in gas_query_done() 229 MACSTR " result=%d - no query in progress", in gas_query_tx_status() 237 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR in gas_query_tx_status() 284 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u " in gas_query_tx() 285 "freq=%d prot=%d using src addr " MACSTR, in gas_query_tx() 332 MACSTR, MAC2STR(query->addr)); in gas_query_tx_comeback_req() 374 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR, in gas_query_tx_comeback_timeout() 393 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR in gas_query_tx_comeback_req_delay() 407 MACSTR " (dialog_token=%u comeback_delay=%u)", in gas_query_rx_initial() 440 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u " in gas_query_rx_comeback() [all …]
|
D | ibss_rsn.c | 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " in supp_ether_send() 134 wpa_msg(wpa_s, MSG_INFO, IBSS_RSN_COMPLETED MACSTR, in ibss_check_rsn_completed() 146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " in supp_set_key() 183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " in supp_mlme_setprotection() 254 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", in auth_logger() 265 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)", in auth_get_psk() 279 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " in auth_send_eapol() 300 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR in auth_set_key() 369 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port", in ibss_set_sta_authorized() 374 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizing port", in ibss_set_sta_authorized() [all …]
|
D | hs20_supplicant.c | 75 "Not configuring frame filtering - BSS " MACSTR in hs20_configure_frame_filters() 238 MACSTR, MAC2STR(dst)); in hs20_anqp_send_req() 245 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for " in hs20_anqp_send_req() 308 wpa_printf(MSG_DEBUG, "HS20: Get icon " MACSTR " %s @ %u +%u (%u)", in hs20_get_icon() 337 wpa_printf(MSG_DEBUG, "HS20: Free stored icon from " MACSTR in hs20_free_icon_entry() 358 MACSTR, MAC2STR(bssid)); in hs20_del_icon() 361 MACSTR " file name %s", MAC2STR(bssid), file_name); in hs20_del_icon() 440 RX_HS20_ICON MACSTR " %s %u", in hs20_process_icon_binary_file() 451 wpa_msg(wpa_s, MSG_INFO, RX_HS20_ANQP MACSTR " Icon Binary File", in hs20_process_icon_binary_file() 456 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file() [all …]
|
D | blacklist.c | 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count " in wpa_blacklist_add() 79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist", in wpa_blacklist_add() 107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " in wpa_blacklist_del() 135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " in wpa_blacklist_clear()
|
D | wmm_ac.c | 100 "WMM AC: Add TS: addr=" MACSTR in wmm_ac_add_ts() 114 "tsid=%d addr=" MACSTR " admitted_time=%d", in wmm_ac_add_ts() 138 "tsid=%d addr=" MACSTR, tsid, MAC2STR(wpa_s->bssid)); in wmm_ac_del_ts_idx() 182 wpa_printf(MSG_DEBUG, "Sending ADDTS Request to " MACSTR, in wmm_ac_send_addts_request() 223 wpa_printf(MSG_DEBUG, "Sending DELTS to " MACSTR, MAC2STR(address)); in wmm_ac_send_delts() 616 wpa_printf(MSG_DEBUG, "WMM AC: TS setup request (addr=" MACSTR in wpas_wmm_ac_addts() 650 MACSTR, tsid, MAC2STR(sa)); in wmm_ac_handle_delts() 662 "TS was deleted successfully (tsid=%u address=" MACSTR ")", in wmm_ac_handle_delts() 721 "WMM AC: adding a new TS with TSID=%u address="MACSTR in wmm_ac_handle_addts_resp() 767 wpa_printf(MSG_DEBUG, "WMM AC: frame destination addr="MACSTR in wmm_ac_rx_action() [all …]
|
D | offchannel.c | 142 MACSTR " using interface %s (pending_action_tx=%p)", in wpas_send_action_cb() 210 MACSTR " pending_action_tx=%p)", MAC2STR(dst), in offchannel_send_action_tx_status() 271 MACSTR " src=" MACSTR " bssid=" MACSTR " len=%d", in offchannel_send_action() 279 "frame TX to " MACSTR " (pending_action_tx=%p)", in offchannel_send_action() 301 "Off-channel: Stored pending action frame (dst=" MACSTR in offchannel_send_action()
|
D | interworking.c | 131 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR in interworking_anqp_resp_cb() 254 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR, in interworking_anqp_send_req() 974 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR in interworking_connect_3gpp() 978 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR, in interworking_connect_3gpp() 1537 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR in interworking_connect_roaming_consortium() 1541 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR, in interworking_connect_roaming_consortium() 1609 MACSTR, MAC2STR(bss->bssid)); in interworking_connect() 1613 wpa_printf(MSG_DEBUG, "Interworking: Considering BSS " MACSTR in interworking_connect() 1705 MACSTR, MAC2STR(bss->bssid)); in interworking_connect() 1714 MACSTR, MAC2STR(bss->bssid)); in interworking_connect() [all …]
|
D | mesh_mpm.c | 124 wpa_msg(wpa_s, MSG_ERROR, "no supported rates from " MACSTR, in copy_supp_rates() 132 "Invalid supported rates element length " MACSTR in copy_supp_rates() 365 MACSTR " (my_lid=0x%x peer_lid=0x%x)", in mesh_mpm_send_plink_action() 387 wpa_msg(wpa_s, MSG_DEBUG, "MPM set " MACSTR " from %s into %s", in wpa_mesh_set_plink_state() 400 wpa_msg(wpa_s, MSG_ERROR, "Driver failed to set " MACSTR in wpa_mesh_set_plink_state() 455 wpa_printf(MSG_DEBUG, "MPM: Peer " MACSTR in plink_timer() 493 wpa_printf(MSG_DEBUG, "MPM closing plink sta=" MACSTR, in mesh_mpm_plink_close() 621 wpa_msg(wpa_s, MSG_DEBUG, "MPM authenticating " MACSTR, in mesh_mpm_auth_peer() 626 "Driver failed to set " MACSTR ": %d", in mesh_mpm_auth_peer() 658 "mesh: Ignore a crowded peer " MACSTR, in mesh_mpm_add_peer() [all …]
|
D | p2p_supplicant.c | 278 MACSTR, MAC2STR(bss->bssid)); in wpas_p2p_scan_res_handler() 1050 "group is persistent - BSS " MACSTR " not found", in wpas_p2p_persistent_group() 1061 "group is persistent - BSS " MACSTR in wpas_p2p_persistent_group() 1077 wpa_printf(MSG_DEBUG, "P2P: GO Device Address " MACSTR, in wpas_p2p_persistent_group() 1083 wpa_printf(MSG_DEBUG, "P2P: BSS " MACSTR " group_capab=0x%x " in wpas_p2p_persistent_group() 1084 "go_dev_addr=" MACSTR, in wpas_p2p_persistent_group() 1099 "group (GO Dev Addr " MACSTR ")", MAC2STR(go_dev_addr)); in wpas_p2p_store_persistent_group() 1289 MACSTR "%s%s", in wpas_p2p_group_started() 1298 "%s %s ssid=\"%s\" freq=%d go_dev_addr=" MACSTR "%s%s", in wpas_p2p_group_started() 1417 MACSTR " src=" MACSTR " bssid=" MACSTR " wait_time=%u)", in wpas_p2p_free_send_action_work() [all …]
|
D | wnm_sta.c | 67 "action=%s to " MACSTR, in ieee802_11_send_wnmsleep_req() 513 wpa_printf(MSG_DEBUG, "WNM: Current BSS " MACSTR " RSSI %d", in compare_scan_neighbor_results() 521 wpa_printf(MSG_DEBUG, "Skip excluded BSS " MACSTR, in compare_scan_neighbor_results() 528 wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR in compare_scan_neighbor_results() 555 wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR in compare_scan_neighbor_results() 566 wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR in compare_scan_neighbor_results() 576 "MBO: Candidate BSS " MACSTR in compare_scan_neighbor_results() 583 wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR in compare_scan_neighbor_results() 594 MACSTR " (RSSI %d)", in compare_scan_neighbor_results() 792 "to " MACSTR " dialog_token=%u status=%u delay=%d", in wnm_send_bss_transition_mgmt_resp() [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | ap_mlme.c | 58 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)", in mlme_authenticate_indication() 87 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)", in mlme_deauthenticate_indication() 110 "MLME-ASSOCIATE.indication(" MACSTR ")", in mlme_associate_indication() 138 "MLME-REASSOCIATE.indication(" MACSTR ")", in mlme_reassociate_indication() 166 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)", in mlme_disassociate_indication() 177 "MLME-MichaelMICFailure.indication(" MACSTR ")", in mlme_michaelmicfailure_indication() 186 "MLME-DELETEKEYS.request(" MACSTR ")", in mlme_deletekeys_request()
|
D | sta_info.c | 117 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from " in ap_sta_list_del() 148 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR in ap_sta_hash_del() 260 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR, in ap_free_sta() 366 wpa_printf(MSG_DEBUG, "Removing station " MACSTR, in hostapd_free_stas() 388 wpa_printf(MSG_DEBUG, "%s: %s: " MACSTR " flags=0x%x timeout_next=%d", in ap_handle_timer() 414 MACSTR, MAC2STR(sta->addr)); in ap_handle_timer() 423 "Station " MACSTR " has lost its driver entry", in ap_handle_timer() 432 "Station " MACSTR " has been active %is ago", in ap_handle_timer() 439 "Station " MACSTR " has been " in ap_handle_timer() 453 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR in ap_handle_timer() [all …]
|
D | wpa_auth_ft.c | 38 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); in wpa_ft_rrb_send() 337 "address " MACSTR, MAC2STR(r0kh->addr)); in wpa_ft_pull_pmk_r1() 878 MACSTR, parse->key_mgmt, MAC2STR(sm->addr)); in wpa_ft_set_key_mgmt() 888 MACSTR, in wpa_ft_set_key_mgmt() 1064 wpa_printf(MSG_DEBUG, "FT: Received authentication frame: STA=" MACSTR in wpa_ft_process_auth() 1065 " BSSID=" MACSTR " transaction=%d", in wpa_ft_process_auth() 1078 wpa_printf(MSG_DEBUG, "FT: FT authentication response: dst=" MACSTR in wpa_ft_process_auth() 1223 wpa_printf(MSG_DEBUG, "FT: addr=" MACSTR " auth_addr=" MACSTR, in wpa_ft_validate_reassoc() 1269 wpa_printf(MSG_DEBUG, "FT: Received FT Action frame (STA=" MACSTR in wpa_ft_action_rx() 1270 " Target AP=" MACSTR " Action=%d)", in wpa_ft_action_rx() [all …]
|
D | wnm_ap.c | 277 MACSTR " dialog_token=%u req_mode=0x%x disassoc_timer=%u " in ieee802_11_send_bss_trans_mgmt_request() 301 MACSTR, MAC2STR(addr)); in ieee802_11_rx_bss_trans_mgmt_query() 311 MACSTR " dialog_token=%u reason=%u", in ieee802_11_rx_bss_trans_mgmt_query() 330 MACSTR, MAC2STR(addr)); in ieee802_11_rx_bss_trans_mgmt_resp() 341 MACSTR " dialog_token=%u status_code=%u " in ieee802_11_rx_bss_trans_mgmt_resp() 350 wpa_printf(MSG_DEBUG, "WNM: Target BSSID: " MACSTR, in ieee802_11_rx_bss_trans_mgmt_resp() 352 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR in ieee802_11_rx_bss_trans_mgmt_resp() 354 MACSTR, in ieee802_11_rx_bss_trans_mgmt_resp() 359 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR in ieee802_11_rx_bss_trans_mgmt_resp() 383 MACSTR " (dialog_token=%u type=%u)", in ieee802_11_rx_wnm_notification_req() [all …]
|
D | rrm.c | 80 wpa_printf(MSG_DEBUG, "Beacon report token %u len %zu from " MACSTR, in hostapd_handle_beacon_report() 90 wpa_msg(hapd->msg_ctx, MSG_INFO, BEACON_RESP_RX MACSTR " %u %02x %s", in hostapd_handle_beacon_report() 235 "NR entry for " MACSTR " exceeds 0xFF bytes", in hostapd_send_nei_report_resp() 349 wpa_printf(MSG_DEBUG, "Radio measurement frame, action %u from " MACSTR, in hostapd_handle_radio_measurement() 450 wpa_printf(MSG_DEBUG, "Request range: dest addr " MACSTR in hostapd_send_range_req() 525 MACSTR, MAC2STR(responders + ETH_ALEN * i)); in hostapd_send_range_req() 592 "Beacon request: " MACSTR " is not connected", in hostapd_send_beacon_req() 602 "Beacon request: " MACSTR in hostapd_send_beacon_req() 612 "Beacon request: " MACSTR in hostapd_send_beacon_req() 622 "Beacon request: " MACSTR in hostapd_send_beacon_req() [all …]
|
D | ieee802_11.c | 292 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR in send_auth_reply() 523 wpa_printf(MSG_DEBUG, "SAE: Auth SAE retransmit timer for " MACSTR in auth_sae_retransmit_timer() 707 wpa_printf(MSG_DEBUG, "SAE: remove the STA (" MACSTR in sae_sm_step() 876 "SAE: Drop commit message from " MACSTR " due to reflection attack", in handle_auth_sae() 883 "incorrect token from " MACSTR, in handle_auth_sae() 895 MACSTR, MAC2STR(sta->addr)); in handle_auth_sae() 1322 "Station " MACSTR " not allowed to authenticate", in ieee802_11_allowed_address() 1328 wpa_printf(MSG_DEBUG, "Authentication frame from " MACSTR in ieee802_11_allowed_address() 1416 "TESTING: ignoring auth frame from " MACSTR, in handle_auth() 1434 wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d " in handle_auth() [all …]
|
D | x_snoop.c | 107 MACSTR " -> " MACSTR " (len %u)", in x_snoop_mcast_to_ucast_convert_send() 118 MACSTR, MAC2STR(sta->addr)); in x_snoop_mcast_to_ucast_convert_send()
|
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/ |
D | hidl.cpp | 192 "Notifying ANQP query done to hidl control: " MACSTR "result: %s", in wpas_hidl_notify_anqp_query_done() 210 MSG_DEBUG, "Notifying HS20 icon query done to hidl control: " MACSTR in wpas_hidl_notify_hs20_icon_query_done() 377 MSG_DEBUG, "Notifying P2P device found to hidl control " MACSTR, in wpas_hidl_notify_p2p_device_found() 395 MSG_DEBUG, "Notifying P2P device lost to hidl control " MACSTR, in wpas_hidl_notify_p2p_device_lost() 428 "Notifying P2P GO negotiation request to hidl control " MACSTR, in wpas_hidl_notify_p2p_go_neg_req() 519 "Notifying P2P invitation received to hidl control: %d " MACSTR, id, in wpas_hidl_notify_p2p_invitation_received() 538 "Notifying P2P invitation result to hidl control: " MACSTR, in wpas_hidl_notify_p2p_invitation_result() 558 "Notifying P2P provision discovery to hidl control " MACSTR, in wpas_hidl_notify_p2p_provision_discovery() 578 "Notifying P2P service discovery response to hidl control " MACSTR, in wpas_hidl_notify_p2p_sd_response() 597 "Notifying P2P AP STA authorized to hidl control " MACSTR, in wpas_hidl_notify_ap_sta_authorized() [all …]
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p_invitation.c | 191 p2p_dbg(p2p, "Received Invitation Request from " MACSTR " (freq=%d)", in p2p_process_invitation_req() 199 p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR, in p2p_process_invitation_req() 205 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req() 213 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req() 221 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req() 438 p2p_dbg(p2p, "Received Invitation Response from " MACSTR, in p2p_process_invitation_resp() 444 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() 451 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() 463 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() 509 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() [all …]
|
D | p2p_dev_disc.c | 83 p2p_dbg(p2p, "Sending Device Discoverability Request to GO " MACSTR in p2p_send_dev_disc_req() 84 " for client " MACSTR, in p2p_send_dev_disc_req() 146 p2p_dbg(p2p, "Sending Device Discoverability Response to " MACSTR in p2p_send_dev_disc_resp() 167 p2p_dbg(p2p, "Received Device Discoverability Request from " MACSTR in p2p_process_dev_disc_req() 221 p2p_dbg(p2p, "Received Device Discoverability Response from " MACSTR, in p2p_process_dev_disc_resp()
|
D | p2p_parse.c | 62 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, in p2p_parse_attribute() 178 wpa_printf(MSG_DEBUG, "P2P: * Device Info: addr " MACSTR in p2p_parse_attribute() 204 MACSTR, MAC2STR(msg->intended_addr)); in p2p_parse_attribute() 213 wpa_printf(MSG_DEBUG, "P2P: * P2P Group BSSID: " MACSTR, in p2p_parse_attribute() 225 MACSTR, MAC2STR(msg->group_id)); in p2p_parse_attribute() 369 wpa_printf(MSG_DEBUG, "P2P: * Session ID: %x " MACSTR, in p2p_parse_attribute() 395 wpa_printf(MSG_DEBUG, "P2P: * Persistent Group: " MACSTR " %s", in p2p_parse_attribute() 726 "dev=" MACSTR " iface=" MACSTR, in p2p_group_info_text() 822 ret = os_snprintf(pos, end - pos, "p2p_device_addr=" MACSTR in p2p_attr_text()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | tdls.c | 239 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " in wpa_tdls_tpk_send() 266 "retry " MACSTR, MAC2STR(dest)); in wpa_tdls_tpk_send() 632 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR in wpa_tdls_tpk_timeout() 640 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR in wpa_tdls_tpk_timeout() 661 wpa_printf(MSG_ERROR, "TDLS: Could not find peer " MACSTR in wpa_tdls_peer_remove_from_list() 676 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR, in wpa_tdls_peer_clear() 752 "Teardown " MACSTR, MAC2STR(addr)); in wpa_tdls_send_teardown() 758 wpa_printf(MSG_DEBUG, "TDLS: First returning link with " MACSTR in wpa_tdls_send_teardown() 765 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown for " MACSTR, in wpa_tdls_send_teardown() 838 wpa_printf(MSG_DEBUG, "TDLS: Could not find peer " MACSTR in wpa_tdls_teardown_link() [all …]
|
D | preauth.c | 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); in rsn_preauth_receive() 64 "unexpected source " MACSTR " - dropped", in rsn_preauth_receive() 110 MACSTR " %s", MAC2STR(sm->preauth_bssid), in rsn_preauth_eapol_cb() 124 MACSTR " timed out", MAC2STR(sm->preauth_bssid)); in rsn_preauth_timeout() 181 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); in rsn_preauth_init() 330 "candidate " MACSTR in rsn_preauth_candidate_process() 340 MACSTR " does not need pre-authentication anymore", in rsn_preauth_candidate_process() 431 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio); in pmksa_candidate_add()
|
D | pmksa_cache.c | 64 MACSTR, MAC2STR(entry->aa)); in pmksa_cache_expire() 233 "PMKSA cache entry (for " MACSTR ") to " in pmksa_cache_add_entry() 258 wpa_printf(MSG_DEBUG, "RSN: Added PMKSA cache entry for " MACSTR in pmksa_cache_add_entry() 288 "for " MACSTR, MAC2STR(entry->aa)); in pmksa_cache_flush() 394 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa)); in pmksa_cache_get_opportunistic() 403 "for " MACSTR, MAC2STR(aa)); in pmksa_cache_get_opportunistic() 458 wpa_printf(MSG_DEBUG, "RSN: Search for BSSID " MACSTR, in pmksa_cache_set_current() 510 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ", in pmksa_cache_list()
|
D | peerkey.c | 109 MACSTR " mui %d error_type %d)", in wpa_supplicant_send_smk_error() 208 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, in wpa_supplicant_process_smk_m2() 371 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR, in wpa_supplicant_send_stk_1_of_4() 427 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR, in wpa_supplicant_send_stk_3_of_4() 437 wpa_printf(MSG_DEBUG, "RSN: Received SMK M4 (Initiator " MACSTR ")", in wpa_supplicant_process_smk_m4() 467 wpa_printf(MSG_DEBUG, "RSN: Received SMK M5 (Peer " MACSTR ")", in wpa_supplicant_process_smk_m5() 496 wpa_printf(MSG_INFO, "RSN: SMK Peer STA " MACSTR " selected " in wpa_supplicant_process_smk_m5() 550 "for SMK M4/M5: peer " MACSTR, in wpa_supplicant_process_smk_m45() 626 MACSTR, in wpa_supplicant_process_smk_error() 665 MACSTR " (ver=%d)", MAC2STR(peerkey->addr), ver); in wpa_supplicant_process_stk_1_of_4() [all …]
|