Searched refs:MACSTR (Results 1 - 25 of 265) sorted by relevance

1234567891011

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dap_mlme.c58 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)",
82 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)",
105 "MLME-ASSOCIATE.indication(" MACSTR ")",
129 "MLME-REASSOCIATE.indication(" MACSTR ")",
153 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)",
164 "MLME-MichaelMICFailure.indication(" MACSTR ")",
173 "MLME-DELETEKEYS.request(" MACSTR ")",
H A Dx_snoop.c107 MACSTR " -> " MACSTR " (len %u)",
118 MACSTR, MAC2STR(sta->addr));
H A Dsta_info.c112 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from "
143 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR
259 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR,
331 wpa_printf(MSG_DEBUG, "Removing station " MACSTR,
353 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d",
379 MACSTR, MAC2STR(sta->addr));
388 "Station " MACSTR " has lost its driver entry",
397 "Station " MACSTR " has been active %is ago",
404 "Station " MACSTR " has been "
418 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR
[all...]
H A Dwnm_ap.c287 MACSTR " dialog_token=%u req_mode=0x%x disassoc_timer=%u "
311 MACSTR, MAC2STR(addr));
321 MACSTR " dialog_token=%u reason=%u",
340 MACSTR, MAC2STR(addr));
351 MACSTR " dialog_token=%u status_code=%u "
360 wpa_printf(MSG_DEBUG, "WNM: Target BSSID: " MACSTR,
362 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR
364 MACSTR,
369 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR
407 wpa_printf(MSG_DEBUG, "WNM: Unsupported WNM Action %u from " MACSTR,
[all...]
H A Dwpa_auth_ft.c38 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst));
326 "address " MACSTR, MAC2STR(r0kh->addr));
962 wpa_printf(MSG_DEBUG, "FT: Received authentication frame: STA=" MACSTR
963 " BSSID=" MACSTR " transaction=%d",
976 wpa_printf(MSG_DEBUG, "FT: FT authentication response: dst=" MACSTR
1121 wpa_printf(MSG_DEBUG, "FT: addr=" MACSTR " auth_addr=" MACSTR,
1167 wpa_printf(MSG_DEBUG, "FT: Received FT Action frame (STA=" MACSTR
1168 " Target AP=" MACSTR " Action=%d)",
1173 "STA=" MACSTR " ST
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dap_mlme.c58 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)",
82 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)",
105 "MLME-ASSOCIATE.indication(" MACSTR ")",
129 "MLME-REASSOCIATE.indication(" MACSTR ")",
153 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)",
164 "MLME-MichaelMICFailure.indication(" MACSTR ")",
173 "MLME-DELETEKEYS.request(" MACSTR ")",
H A Dx_snoop.c107 MACSTR " -> " MACSTR " (len %u)",
118 MACSTR, MAC2STR(sta->addr));
H A Dsta_info.c112 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from "
143 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR
259 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR,
331 wpa_printf(MSG_DEBUG, "Removing station " MACSTR,
353 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d",
379 MACSTR, MAC2STR(sta->addr));
388 "Station " MACSTR " has lost its driver entry",
397 "Station " MACSTR " has been active %is ago",
404 "Station " MACSTR " has been "
418 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR
[all...]
H A Dwnm_ap.c287 MACSTR " dialog_token=%u req_mode=0x%x disassoc_timer=%u "
311 MACSTR, MAC2STR(addr));
321 MACSTR " dialog_token=%u reason=%u",
340 MACSTR, MAC2STR(addr));
351 MACSTR " dialog_token=%u status_code=%u "
360 wpa_printf(MSG_DEBUG, "WNM: Target BSSID: " MACSTR,
362 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR
364 MACSTR,
369 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR
407 wpa_printf(MSG_DEBUG, "WNM: Unsupported WNM Action %u from " MACSTR,
[all...]
H A Dwpa_auth_ft.c38 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst));
326 "address " MACSTR, MAC2STR(r0kh->addr));
962 wpa_printf(MSG_DEBUG, "FT: Received authentication frame: STA=" MACSTR
963 " BSSID=" MACSTR " transaction=%d",
976 wpa_printf(MSG_DEBUG, "FT: FT authentication response: dst=" MACSTR
1121 wpa_printf(MSG_DEBUG, "FT: addr=" MACSTR " auth_addr=" MACSTR,
1167 wpa_printf(MSG_DEBUG, "FT: Received FT Action frame (STA=" MACSTR
1168 " Target AP=" MACSTR " Action=%d)",
1173 "STA=" MACSTR " ST
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dap_mlme.c58 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)",
82 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)",
105 "MLME-ASSOCIATE.indication(" MACSTR ")",
129 "MLME-REASSOCIATE.indication(" MACSTR ")",
153 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)",
164 "MLME-MichaelMICFailure.indication(" MACSTR ")",
173 "MLME-DELETEKEYS.request(" MACSTR ")",
H A Dx_snoop.c107 MACSTR " -> " MACSTR " (len %u)",
118 MACSTR, MAC2STR(sta->addr));
H A Dsta_info.c112 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from "
143 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR
259 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR,
331 wpa_printf(MSG_DEBUG, "Removing station " MACSTR,
353 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d",
379 MACSTR, MAC2STR(sta->addr));
388 "Station " MACSTR " has lost its driver entry",
397 "Station " MACSTR " has been active %is ago",
404 "Station " MACSTR " has been "
418 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR
[all...]
H A Dwnm_ap.c287 MACSTR " dialog_token=%u req_mode=0x%x disassoc_timer=%u "
311 MACSTR, MAC2STR(addr));
321 MACSTR " dialog_token=%u reason=%u",
340 MACSTR, MAC2STR(addr));
351 MACSTR " dialog_token=%u status_code=%u "
360 wpa_printf(MSG_DEBUG, "WNM: Target BSSID: " MACSTR,
362 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR
364 MACSTR,
369 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR
407 wpa_printf(MSG_DEBUG, "WNM: Unsupported WNM Action %u from " MACSTR,
[all...]
H A Dwpa_auth_ft.c38 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst));
326 "address " MACSTR, MAC2STR(r0kh->addr));
962 wpa_printf(MSG_DEBUG, "FT: Received authentication frame: STA=" MACSTR
963 " BSSID=" MACSTR " transaction=%d",
976 wpa_printf(MSG_DEBUG, "FT: FT authentication response: dst=" MACSTR
1121 wpa_printf(MSG_DEBUG, "FT: addr=" MACSTR " auth_addr=" MACSTR,
1167 wpa_printf(MSG_DEBUG, "FT: Received FT Action frame (STA=" MACSTR
1168 " Target AP=" MACSTR " Action=%d)",
1173 "STA=" MACSTR " ST
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dblacklist.c66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count "
79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist",
107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
H A Dgas_query.c144 wpa_msg(gas->wpa_s, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR
217 MACSTR " result=%d - no query in progress",
225 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR
262 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u "
297 MACSTR, MAC2STR(query->addr));
310 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR,
324 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR
338 MACSTR " (dialog_token=%u comeback_delay=%u)",
370 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u "
380 MACSTR, MAC2ST
[all...]
H A Dibss_rsn.c68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
134 wpa_msg(wpa_s, MSG_INFO, IBSS_RSN_COMPLETED MACSTR,
146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
253 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
264 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
278 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu "
299 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR
368 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port",
373 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizin
[all...]
/external/wpa_supplicant_8/hostapd/src/p2p/
H A Dp2p_dev_disc.c83 p2p_dbg(p2p, "Sending Device Discoverability Request to GO " MACSTR
84 " for client " MACSTR,
146 p2p_dbg(p2p, "Sending Device Discoverability Response to " MACSTR
167 p2p_dbg(p2p, "Received Device Discoverability Request from " MACSTR
221 p2p_dbg(p2p, "Received Device Discoverability Response from " MACSTR,
/external/wpa_supplicant_8/src/p2p/
H A Dp2p_dev_disc.c83 p2p_dbg(p2p, "Sending Device Discoverability Request to GO " MACSTR
84 " for client " MACSTR,
146 p2p_dbg(p2p, "Sending Device Discoverability Response to " MACSTR
167 p2p_dbg(p2p, "Received Device Discoverability Request from " MACSTR
221 p2p_dbg(p2p, "Received Device Discoverability Response from " MACSTR,
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/
H A Dp2p_dev_disc.c83 p2p_dbg(p2p, "Sending Device Discoverability Request to GO " MACSTR
84 " for client " MACSTR,
146 p2p_dbg(p2p, "Sending Device Discoverability Response to " MACSTR
167 p2p_dbg(p2p, "Received Device Discoverability Request from " MACSTR
221 p2p_dbg(p2p, "Received Device Discoverability Response from " MACSTR,
/external/wpa_supplicant_8/hostapd/src/common/
H A Dhw_features_common.c227 "overlap with " MACSTR,
250 MACSTR " freq=%d", MAC2STR(bss->bssid), bss->freq);
260 MACSTR " freq=%d", MAC2STR(bss->bssid), bss->freq);
315 wpa_printf(MSG_DEBUG, "Neighboring BSS: " MACSTR
323 MACSTR
344 MACSTR, pri, MAC2STR(bss->bssid));
/external/wpa_supplicant_8/src/common/
H A Dhw_features_common.c227 "overlap with " MACSTR,
250 MACSTR " freq=%d", MAC2STR(bss->bssid), bss->freq);
260 MACSTR " freq=%d", MAC2STR(bss->bssid), bss->freq);
315 wpa_printf(MSG_DEBUG, "Neighboring BSS: " MACSTR
323 MACSTR
344 MACSTR, pri, MAC2STR(bss->bssid));
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dhw_features_common.c227 "overlap with " MACSTR,
250 MACSTR " freq=%d", MAC2STR(bss->bssid), bss->freq);
260 MACSTR " freq=%d", MAC2STR(bss->bssid), bss->freq);
315 wpa_printf(MSG_DEBUG, "Neighboring BSS: " MACSTR
323 MACSTR
344 MACSTR, pri, MAC2STR(bss->bssid));
/external/wpa_supplicant_8/wpa_supplicant/tests/
H A Dtest_wpa.c74 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
141 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
153 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
214 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
236 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu "
256 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",

Completed in 945 milliseconds

1234567891011