/external/wpa_supplicant_8/src/ap/ |
D | ap_mlme.c | 59 MAC2STR(sta->addr), mlme_auth_alg_str(sta->auth_alg)); in mlme_authenticate_indication() 83 MAC2STR(sta->addr), reason_code); in mlme_deauthenticate_indication() 106 MAC2STR(sta->addr)); in mlme_associate_indication() 130 MAC2STR(sta->addr)); in mlme_reassociate_indication() 154 MAC2STR(sta->addr), reason_code); in mlme_disassociate_indication() 165 MAC2STR(addr)); in mlme_michaelmicfailure_indication() 174 MAC2STR(sta->addr)); in mlme_deletekeys_request()
|
D | sta_info.c | 112 "list.", MAC2STR(sta->addr)); in ap_sta_list_del() 143 " from hash table", MAC2STR(sta->addr)); in ap_sta_hash_del() 231 __func__, MAC2STR(sta->addr)); in ap_free_sta() 302 MAC2STR(prev->addr)); in hostapd_free_stas() 324 __func__, MAC2STR(sta->addr), sta->flags, in ap_handle_timer() 349 MACSTR, MAC2STR(sta->addr)); in ap_handle_timer() 361 MAC2STR(sta->addr), inactive_sec); in ap_handle_timer() 369 MAC2STR(sta->addr), inactive_sec, in ap_handle_timer() 382 " has ACKed data poll", MAC2STR(sta->addr)); in ap_handle_timer() 392 __func__, MAC2STR(sta->addr), next_time); in ap_handle_timer() [all …]
|
D | wpa_auth_ft.c | 37 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); in wpa_ft_rrb_send() 325 "address " MACSTR, MAC2STR(r0kh->addr)); in wpa_ft_pull_pmk_r1() 967 MAC2STR(sm->addr), MAC2STR(bssid), auth_transaction); in wpa_ft_process_auth() 981 MAC2STR(sm->addr), auth_transaction + 1, status); in wpa_ft_process_auth() 1123 MAC2STR(sm->addr), MAC2STR(sm->wpa_auth->addr)); in wpa_ft_validate_reassoc() 1169 MAC2STR(sta_addr), MAC2STR(target_ap), action); in wpa_ft_action_rx() 1174 MAC2STR(sm->addr), MAC2STR(sta_addr)); in wpa_ft_action_rx() 1216 MAC2STR(sm->addr)); in wpa_ft_rrb_rx_request_cb() 1271 MAC2STR(sm->addr), MAC2STR(current_ap), status); in wpa_ft_send_rrb_auth_resp() 1333 MAC2STR(src_addr)); in wpa_ft_rrb_rx_pull() [all …]
|
D | ieee802_11.c | 290 MAC2STR(dst), auth_alg, auth_transaction, in send_auth_reply() 473 MAC2STR(sta->addr)); in handle_auth_sae() 481 MAC2STR(sta->addr)); in handle_auth_sae() 571 MAC2STR(mgmt->sa)); in handle_auth() 589 MAC2STR(mgmt->sa), auth_alg, auth_transaction, in handle_auth() 626 MAC2STR(mgmt->sa)); in handle_auth() 638 MAC2STR(mgmt->sa)); in handle_auth() 645 MAC2STR(mgmt->sa)); in handle_auth() 1062 MAC2STR(sta->addr)); in check_assoc_ies() 1080 MAC2STR(sta->addr), sta->auth_alg); in check_assoc_ies() [all …]
|
D | wnm_ap.c | 288 MAC2STR(addr), dialog_token, in ieee802_11_send_bss_trans_mgmt_request() 310 MACSTR, MAC2STR(addr)); in ieee802_11_rx_bss_trans_mgmt_query() 321 MAC2STR(addr), dialog_token, reason); in ieee802_11_rx_bss_trans_mgmt_query() 339 MACSTR, MAC2STR(addr)); in ieee802_11_rx_bss_trans_mgmt_resp() 351 "bss_termination_delay=%u", MAC2STR(addr), dialog_token, in ieee802_11_rx_bss_trans_mgmt_resp() 360 MAC2STR(pos)); in ieee802_11_rx_bss_trans_mgmt_resp() 398 action, MAC2STR(mgmt->sa)); in ieee802_11_rx_wnm_action_ap() 428 MACSTR, disassoc_timer, MAC2STR(sta->addr)); in wnm_send_disassoc_imminent() 497 " set to %d ms", MAC2STR(sta->addr), timeout); in wnm_send_ess_disassoc_imminent()
|
D | preauth_auth.c | 63 MACSTR, MAC2STR(ethhdr->h_dest)); in rsn_preauth_receive() 70 "STA " MACSTR, MAC2STR(sta->addr)); in rsn_preauth_receive() 190 MACSTR, MAC2STR(sta->addr)); in rsn_preauth_finished_cb() 246 "interface for " MACSTR, MAC2STR(sta->addr)); in rsn_preauth_send()
|
D | ieee802_11_ht.c | 321 " in Association Request", MAC2STR(sta->addr)); in ht40_intolerant_add() 367 "0x%04x", MAC2STR(sta->addr), ht_capab); in update_sta_ht() 375 __func__, MAC2STR(sta->addr), in update_sta_ht() 385 __func__, MAC2STR(sta->addr), in update_sta_ht() 403 __func__, MAC2STR(sta->addr), in update_sta_no_ht()
|
D | peerkey_auth.c | 110 MAC2STR(kde.mac_addr)); in wpa_smk_m1() 285 MAC2STR(kde.mac_addr)); in wpa_smk_m3() 353 MAC2STR(kde.mac_addr), MAC2STR(sm->addr)); in wpa_smk_error() 363 MAC2STR(kde.mac_addr), mui, error_type); in wpa_smk_error()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | gas_query.c | 146 MAC2STR(query->addr), query->dialog_token, query->freq, in gas_query_done() 218 freq, MAC2STR(dst), result); in gas_query_tx_status() 227 freq, MAC2STR(dst), result, query, query->dialog_token, dur); in gas_query_tx_status() 263 "freq=%d prot=%d", MAC2STR(query->addr), in gas_query_tx() 297 MACSTR, MAC2STR(query->addr)); in gas_query_tx_comeback_req() 311 MAC2STR(query->addr)); in gas_query_tx_comeback_timeout() 325 " in %u secs %u usecs", MAC2STR(query->addr), secs, usecs); in gas_query_tx_comeback_req_delay() 339 MAC2STR(query->addr), query->dialog_token, comeback_delay); in gas_query_rx_initial() 372 MAC2STR(query->addr), query->dialog_token, frag_id, in gas_query_rx_comeback() 380 MACSTR, MAC2STR(query->addr)); in gas_query_rx_comeback() [all …]
|
D | ibss_rsn.c | 70 __func__, MAC2STR(dest), proto, (unsigned long) len); in supp_ether_send() 135 MAC2STR(peer->addr)); in ibss_check_rsn_completed() 148 __func__, alg, MAC2STR(addr), key_idx, set_tx); in supp_set_key() 185 __func__, MAC2STR(addr), protection_type, key_type); in supp_mlme_setprotection() 254 MAC2STR(addr), txt); in auth_logger() 265 __func__, MAC2STR(addr), prev_psk); in auth_get_psk() 280 __func__, MAC2STR(addr), (unsigned long) data_len, encrypt); in auth_send_eapol() 301 __func__, alg, MAC2STR(addr), idx); in auth_set_key() 369 MAC2STR(peer->addr)); in ibss_set_sta_authorized() 374 MAC2STR(peer->addr)); in ibss_set_sta_authorized() [all …]
|
D | blacklist.c | 68 MAC2STR(bssid), e->count); in wpa_blacklist_add() 80 MAC2STR(bssid)); in wpa_blacklist_add() 108 "blacklist", MAC2STR(bssid)); in wpa_blacklist_del() 136 "blacklist (clear)", MAC2STR(prev->bssid)); in wpa_blacklist_clear()
|
D | hs20_supplicant.c | 200 "subtypes 0x%x", MAC2STR(dst), stypes); in hs20_anqp_send_req() 229 MAC2STR(sa)); in hs20_process_icon_binary_file() 233 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file() 245 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file() 255 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file() 264 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file() 353 " HS Capability List", MAC2STR(sa)); in hs20_parse_rx_hs20_anqp_resp() 358 " Operator Friendly Name", MAC2STR(sa)); in hs20_parse_rx_hs20_anqp_resp() 370 "Metrics value from " MACSTR, MAC2STR(sa)); in hs20_parse_rx_hs20_anqp_resp() 374 " WAN Metrics %02x:%u:%u:%u:%u:%u", MAC2STR(sa), in hs20_parse_rx_hs20_anqp_resp() [all …]
|
D | interworking.c | 127 MAC2STR(dst), dialog_token, result, status_code); in interworking_anqp_resp_cb() 249 MAC2STR(bss->bssid)); in interworking_anqp_send_req() 919 MAC2STR(bss->bssid)); in interworking_connect_3gpp() 923 MAC2STR(bss->bssid)); in interworking_connect_3gpp() 1456 "roaming consortium match", MAC2STR(bss->bssid)); in interworking_connect_roaming_consortium() 1460 MAC2STR(bss->bssid)); in interworking_connect_roaming_consortium() 1525 MACSTR, MAC2STR(bss->bssid)); in interworking_connect_helper() 1531 MAC2STR(bss->bssid), allow_excluded); in interworking_connect_helper() 1622 "found for " MACSTR, MAC2STR(bss->bssid)); in interworking_connect_helper() 1630 "Realm list from " MACSTR, MAC2STR(bss->bssid)); in interworking_connect_helper() [all …]
|
D | offchannel.c | 113 MAC2STR(wpa_s->pending_action_dst), iface->ifname); in wpas_send_action_cb() 235 freq, MAC2STR(dst), MAC2STR(src), MAC2STR(bssid), in offchannel_send_action() 243 MAC2STR(wpa_s->pending_action_dst)); in offchannel_send_action()
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p_pd.c | 159 MAC2STR(sa), msg.wps_config_methods, rx_freq); in p2p_process_prov_disc_req() 164 MACSTR, MAC2STR(sa)); in p2p_process_prov_disc_req() 169 MACSTR, MAC2STR(sa)); in p2p_process_prov_disc_req() 202 " requested us to show a PIN on display", MAC2STR(sa)); in p2p_process_prov_disc_req() 208 MAC2STR(sa)); in p2p_process_prov_disc_req() 275 MAC2STR(sa), msg.wps_config_methods); in p2p_process_prov_disc_resp() 280 " with no pending request", MAC2STR(sa)); in p2p_process_prov_disc_resp() 326 " accepted to show a PIN on display", MAC2STR(sa)); in p2p_process_prov_disc_resp() 331 MAC2STR(sa)); in p2p_process_prov_disc_resp() 346 MACSTR, MAC2STR(dev->info.p2p_device_addr)); in p2p_process_prov_disc_resp() [all …]
|
D | p2p_invitation.c | 183 MAC2STR(sa), rx_freq); in p2p_process_invitation_req() 191 MAC2STR(sa)); in p2p_process_invitation_req() 196 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req() 204 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req() 212 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req() 409 MAC2STR(sa)); in p2p_process_invitation_resp() 414 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() 420 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() 429 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() 436 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() [all …]
|
D | p2p_dev_disc.c | 85 MAC2STR(go->info.p2p_device_addr), in p2p_send_dev_disc_req() 86 MAC2STR(dev->info.p2p_device_addr)); in p2p_send_dev_disc_req() 148 MAC2STR(addr), status, freq); in p2p_send_dev_disc_resp() 168 " (freq=%d)", MAC2STR(sa), rx_freq); in p2p_process_dev_disc_req() 222 MAC2STR(sa)); in p2p_process_dev_disc_resp()
|
D | p2p_parse.c | 45 MAC2STR(msg->device_id)); in p2p_parse_attribute() 170 MAC2STR(msg->p2p_device_addr), in p2p_parse_attribute() 193 MACSTR, MAC2STR(msg->intended_addr)); in p2p_parse_attribute() 203 MAC2STR(msg->group_bssid)); in p2p_parse_attribute() 214 MACSTR, MAC2STR(msg->group_id)); in p2p_parse_attribute() 604 MAC2STR(cli->p2p_device_addr), in p2p_group_info_text() 605 MAC2STR(cli->p2p_interface_addr)); in p2p_group_info_text() 701 MAC2STR(msg.p2p_device_addr)); in p2p_attr_text()
|
D | p2p.c | 97 MAC2STR(dev->info.p2p_device_addr)); in p2p_expire_peers() 604 MAC2STR(dev->info.p2p_device_addr), in p2p_copy_wps_info() 701 " due to peer filter", MAC2STR(p2p_dev_addr)); in p2p_add_device() 764 MAC2STR(dev->info.p2p_device_addr), dev->listen_freq, in p2p_add_device() 832 " with unknown config methods", MAC2STR(addr)); in p2p_add_device() 1013 MAC2STR(p2p->after_scan_peer)); in p2p_run_after_scan() 1388 MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr), in p2p_connect() 1394 MAC2STR(peer_addr)); in p2p_connect() 1407 MAC2STR(peer_addr)); in p2p_connect() 1413 MAC2STR(peer_addr)); in p2p_connect() [all …]
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | preauth.c | 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); in rsn_preauth_receive() 65 MAC2STR(src_addr)); in rsn_preauth_receive() 109 MACSTR " %s", MAC2STR(sm->preauth_bssid), in rsn_preauth_eapol_cb() 123 MACSTR " timed out", MAC2STR(sm->preauth_bssid)); in rsn_preauth_timeout() 179 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); in rsn_preauth_init() 316 MAC2STR(candidate->bssid)); in rsn_preauth_candidate_process() 325 MAC2STR(candidate->bssid)); in rsn_preauth_candidate_process() 403 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio); in pmksa_candidate_add()
|
D | pmksa_cache.c | 63 MACSTR, MAC2STR(entry->aa)); in pmksa_cache_expire() 209 MAC2STR(pos->aa)); in pmksa_cache_add() 233 " network_ctx=%p", MAC2STR(entry->aa), network_ctx); in pmksa_cache_add() 261 "for " MACSTR, MAC2STR(entry->aa)); in pmksa_cache_flush() 366 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa)); in pmksa_cache_get_opportunistic() 375 "for " MACSTR, MAC2STR(aa)); in pmksa_cache_get_opportunistic() 431 MAC2STR(bssid)); in pmksa_cache_set_current() 483 i, MAC2STR(entry->aa)); in pmksa_cache_list()
|
D | tdls.c | 238 MAC2STR(dest), action_code, dialog_token, status_code, in wpa_tdls_tpk_send() 262 "retry " MACSTR, MAC2STR(dest)); in wpa_tdls_tpk_send() 627 " - try to renew", MAC2STR(peer->addr)); in wpa_tdls_tpk_timeout() 631 " - tear down", MAC2STR(peer->addr)); in wpa_tdls_tpk_timeout() 653 MAC2STR(peer->addr)); in wpa_tdls_peer_remove_from_list() 667 MAC2STR(peer->addr)); in wpa_tdls_peer_clear() 741 "Teardown " MACSTR, MAC2STR(addr)); in wpa_tdls_send_teardown() 748 MAC2STR(addr)); in wpa_tdls_send_teardown() 821 " for link Teardown", MAC2STR(addr)); in wpa_tdls_teardown_link() 827 " not connected - cannot Teardown link", MAC2STR(addr)); in wpa_tdls_teardown_link() [all …]
|
D | peerkey.c | 109 MAC2STR(peer), mui, error_type); in wpa_supplicant_send_smk_error() 207 MAC2STR(kde.mac_addr)); in wpa_supplicant_process_smk_m2() 373 MAC2STR(peerkey->addr)); in wpa_supplicant_send_stk_1_of_4() 428 MAC2STR(peerkey->addr)); in wpa_supplicant_send_stk_3_of_4() 438 MAC2STR(kde->mac_addr)); in wpa_supplicant_process_smk_m4() 468 MAC2STR(kde->mac_addr)); in wpa_supplicant_process_smk_m5() 497 "unacceptable cipher", MAC2STR(kde->mac_addr)); in wpa_supplicant_process_smk_m5() 551 MAC2STR(kde.mac_addr)); in wpa_supplicant_process_smk_m45() 629 MAC2STR(peer)); in wpa_supplicant_process_smk_error() 666 MACSTR " (ver=%d)", MAC2STR(peerkey->addr), ver); in wpa_supplicant_process_stk_1_of_4() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
D | test_wpa.c | 76 __func__, MAC2STR(dest), proto, (unsigned long) len); in supp_ether_send() 143 __func__, alg, MAC2STR(addr), key_idx, set_tx); in supp_set_key() 155 __func__, MAC2STR(addr), protection_type, key_type); in supp_mlme_setprotection() 215 MAC2STR(addr), txt); in auth_logger() 238 __func__, MAC2STR(addr), (unsigned long) data_len, encrypt); in auth_send_eapol() 257 __func__, MAC2STR(addr), prev_psk); in auth_get_psk()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_test.c | 223 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dst)); in test_driver_send_ether() 281 __func__, MAC2STR(dst)); in test_driver_send_ether() 325 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dest)); in wpa_driver_test_send_mlme() 438 "%s/AP-" MACSTR, drv->test_dir, MAC2STR(dest)); in wpa_driver_test_send_mlme() 442 drv->test_dir, MAC2STR(dest)); in wpa_driver_test_send_mlme() 504 MAC2STR(sa)); in test_driver_scan() 520 MAC2STR(bss->bssid)); in test_driver_scan() 617 MAC2STR(bss->bssid)); in test_driver_assoc() 652 MAC2STR(data), MAC2STR(src), in test_driver_eapol() 686 MAC2STR(eth->h_dest), MAC2STR(eth->h_source), in test_driver_ether() [all …]
|