Home
last modified time | relevance | path

Searched refs:MAC2STR (Results 1 – 25 of 103) sorted by relevance

12345

/external/wpa_supplicant_8/src/ap/
Dap_mlme.c59 MAC2STR(sta->addr), mlme_auth_alg_str(sta->auth_alg)); in mlme_authenticate_indication()
83 MAC2STR(sta->addr), reason_code); in mlme_deauthenticate_indication()
106 MAC2STR(sta->addr)); in mlme_associate_indication()
130 MAC2STR(sta->addr)); in mlme_reassociate_indication()
154 MAC2STR(sta->addr), reason_code); in mlme_disassociate_indication()
165 MAC2STR(addr)); in mlme_michaelmicfailure_indication()
174 MAC2STR(sta->addr)); in mlme_deletekeys_request()
Dsta_info.c112 "list.", MAC2STR(sta->addr)); in ap_sta_list_del()
143 " from hash table", MAC2STR(sta->addr)); in ap_sta_hash_del()
231 __func__, MAC2STR(sta->addr)); in ap_free_sta()
302 MAC2STR(prev->addr)); in hostapd_free_stas()
324 __func__, MAC2STR(sta->addr), sta->flags, in ap_handle_timer()
349 MACSTR, MAC2STR(sta->addr)); in ap_handle_timer()
361 MAC2STR(sta->addr), inactive_sec); in ap_handle_timer()
369 MAC2STR(sta->addr), inactive_sec, in ap_handle_timer()
382 " has ACKed data poll", MAC2STR(sta->addr)); in ap_handle_timer()
392 __func__, MAC2STR(sta->addr), next_time); in ap_handle_timer()
[all …]
Dwpa_auth_ft.c37 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); in wpa_ft_rrb_send()
325 "address " MACSTR, MAC2STR(r0kh->addr)); in wpa_ft_pull_pmk_r1()
967 MAC2STR(sm->addr), MAC2STR(bssid), auth_transaction); in wpa_ft_process_auth()
981 MAC2STR(sm->addr), auth_transaction + 1, status); in wpa_ft_process_auth()
1123 MAC2STR(sm->addr), MAC2STR(sm->wpa_auth->addr)); in wpa_ft_validate_reassoc()
1169 MAC2STR(sta_addr), MAC2STR(target_ap), action); in wpa_ft_action_rx()
1174 MAC2STR(sm->addr), MAC2STR(sta_addr)); in wpa_ft_action_rx()
1216 MAC2STR(sm->addr)); in wpa_ft_rrb_rx_request_cb()
1271 MAC2STR(sm->addr), MAC2STR(current_ap), status); in wpa_ft_send_rrb_auth_resp()
1333 MAC2STR(src_addr)); in wpa_ft_rrb_rx_pull()
[all …]
Dieee802_11.c290 MAC2STR(dst), auth_alg, auth_transaction, in send_auth_reply()
473 MAC2STR(sta->addr)); in handle_auth_sae()
481 MAC2STR(sta->addr)); in handle_auth_sae()
571 MAC2STR(mgmt->sa)); in handle_auth()
589 MAC2STR(mgmt->sa), auth_alg, auth_transaction, in handle_auth()
626 MAC2STR(mgmt->sa)); in handle_auth()
638 MAC2STR(mgmt->sa)); in handle_auth()
645 MAC2STR(mgmt->sa)); in handle_auth()
1062 MAC2STR(sta->addr)); in check_assoc_ies()
1080 MAC2STR(sta->addr), sta->auth_alg); in check_assoc_ies()
[all …]
Dwnm_ap.c288 MAC2STR(addr), dialog_token, in ieee802_11_send_bss_trans_mgmt_request()
310 MACSTR, MAC2STR(addr)); in ieee802_11_rx_bss_trans_mgmt_query()
321 MAC2STR(addr), dialog_token, reason); in ieee802_11_rx_bss_trans_mgmt_query()
339 MACSTR, MAC2STR(addr)); in ieee802_11_rx_bss_trans_mgmt_resp()
351 "bss_termination_delay=%u", MAC2STR(addr), dialog_token, in ieee802_11_rx_bss_trans_mgmt_resp()
360 MAC2STR(pos)); in ieee802_11_rx_bss_trans_mgmt_resp()
398 action, MAC2STR(mgmt->sa)); in ieee802_11_rx_wnm_action_ap()
428 MACSTR, disassoc_timer, MAC2STR(sta->addr)); in wnm_send_disassoc_imminent()
497 " set to %d ms", MAC2STR(sta->addr), timeout); in wnm_send_ess_disassoc_imminent()
Dpreauth_auth.c63 MACSTR, MAC2STR(ethhdr->h_dest)); in rsn_preauth_receive()
70 "STA " MACSTR, MAC2STR(sta->addr)); in rsn_preauth_receive()
190 MACSTR, MAC2STR(sta->addr)); in rsn_preauth_finished_cb()
246 "interface for " MACSTR, MAC2STR(sta->addr)); in rsn_preauth_send()
Dieee802_11_ht.c321 " in Association Request", MAC2STR(sta->addr)); in ht40_intolerant_add()
367 "0x%04x", MAC2STR(sta->addr), ht_capab); in update_sta_ht()
375 __func__, MAC2STR(sta->addr), in update_sta_ht()
385 __func__, MAC2STR(sta->addr), in update_sta_ht()
403 __func__, MAC2STR(sta->addr), in update_sta_no_ht()
Dpeerkey_auth.c110 MAC2STR(kde.mac_addr)); in wpa_smk_m1()
285 MAC2STR(kde.mac_addr)); in wpa_smk_m3()
353 MAC2STR(kde.mac_addr), MAC2STR(sm->addr)); in wpa_smk_error()
363 MAC2STR(kde.mac_addr), mui, error_type); in wpa_smk_error()
/external/wpa_supplicant_8/wpa_supplicant/
Dgas_query.c146 MAC2STR(query->addr), query->dialog_token, query->freq, in gas_query_done()
218 freq, MAC2STR(dst), result); in gas_query_tx_status()
227 freq, MAC2STR(dst), result, query, query->dialog_token, dur); in gas_query_tx_status()
263 "freq=%d prot=%d", MAC2STR(query->addr), in gas_query_tx()
297 MACSTR, MAC2STR(query->addr)); in gas_query_tx_comeback_req()
311 MAC2STR(query->addr)); in gas_query_tx_comeback_timeout()
325 " in %u secs %u usecs", MAC2STR(query->addr), secs, usecs); in gas_query_tx_comeback_req_delay()
339 MAC2STR(query->addr), query->dialog_token, comeback_delay); in gas_query_rx_initial()
372 MAC2STR(query->addr), query->dialog_token, frag_id, in gas_query_rx_comeback()
380 MACSTR, MAC2STR(query->addr)); in gas_query_rx_comeback()
[all …]
Dibss_rsn.c70 __func__, MAC2STR(dest), proto, (unsigned long) len); in supp_ether_send()
135 MAC2STR(peer->addr)); in ibss_check_rsn_completed()
148 __func__, alg, MAC2STR(addr), key_idx, set_tx); in supp_set_key()
185 __func__, MAC2STR(addr), protection_type, key_type); in supp_mlme_setprotection()
254 MAC2STR(addr), txt); in auth_logger()
265 __func__, MAC2STR(addr), prev_psk); in auth_get_psk()
280 __func__, MAC2STR(addr), (unsigned long) data_len, encrypt); in auth_send_eapol()
301 __func__, alg, MAC2STR(addr), idx); in auth_set_key()
369 MAC2STR(peer->addr)); in ibss_set_sta_authorized()
374 MAC2STR(peer->addr)); in ibss_set_sta_authorized()
[all …]
Dblacklist.c68 MAC2STR(bssid), e->count); in wpa_blacklist_add()
80 MAC2STR(bssid)); in wpa_blacklist_add()
108 "blacklist", MAC2STR(bssid)); in wpa_blacklist_del()
136 "blacklist (clear)", MAC2STR(prev->bssid)); in wpa_blacklist_clear()
Dhs20_supplicant.c200 "subtypes 0x%x", MAC2STR(dst), stypes); in hs20_anqp_send_req()
229 MAC2STR(sa)); in hs20_process_icon_binary_file()
233 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file()
245 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file()
255 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file()
264 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file()
353 " HS Capability List", MAC2STR(sa)); in hs20_parse_rx_hs20_anqp_resp()
358 " Operator Friendly Name", MAC2STR(sa)); in hs20_parse_rx_hs20_anqp_resp()
370 "Metrics value from " MACSTR, MAC2STR(sa)); in hs20_parse_rx_hs20_anqp_resp()
374 " WAN Metrics %02x:%u:%u:%u:%u:%u", MAC2STR(sa), in hs20_parse_rx_hs20_anqp_resp()
[all …]
Dinterworking.c127 MAC2STR(dst), dialog_token, result, status_code); in interworking_anqp_resp_cb()
249 MAC2STR(bss->bssid)); in interworking_anqp_send_req()
919 MAC2STR(bss->bssid)); in interworking_connect_3gpp()
923 MAC2STR(bss->bssid)); in interworking_connect_3gpp()
1456 "roaming consortium match", MAC2STR(bss->bssid)); in interworking_connect_roaming_consortium()
1460 MAC2STR(bss->bssid)); in interworking_connect_roaming_consortium()
1525 MACSTR, MAC2STR(bss->bssid)); in interworking_connect_helper()
1531 MAC2STR(bss->bssid), allow_excluded); in interworking_connect_helper()
1622 "found for " MACSTR, MAC2STR(bss->bssid)); in interworking_connect_helper()
1630 "Realm list from " MACSTR, MAC2STR(bss->bssid)); in interworking_connect_helper()
[all …]
Doffchannel.c113 MAC2STR(wpa_s->pending_action_dst), iface->ifname); in wpas_send_action_cb()
235 freq, MAC2STR(dst), MAC2STR(src), MAC2STR(bssid), in offchannel_send_action()
243 MAC2STR(wpa_s->pending_action_dst)); in offchannel_send_action()
/external/wpa_supplicant_8/src/p2p/
Dp2p_pd.c159 MAC2STR(sa), msg.wps_config_methods, rx_freq); in p2p_process_prov_disc_req()
164 MACSTR, MAC2STR(sa)); in p2p_process_prov_disc_req()
169 MACSTR, MAC2STR(sa)); in p2p_process_prov_disc_req()
202 " requested us to show a PIN on display", MAC2STR(sa)); in p2p_process_prov_disc_req()
208 MAC2STR(sa)); in p2p_process_prov_disc_req()
275 MAC2STR(sa), msg.wps_config_methods); in p2p_process_prov_disc_resp()
280 " with no pending request", MAC2STR(sa)); in p2p_process_prov_disc_resp()
326 " accepted to show a PIN on display", MAC2STR(sa)); in p2p_process_prov_disc_resp()
331 MAC2STR(sa)); in p2p_process_prov_disc_resp()
346 MACSTR, MAC2STR(dev->info.p2p_device_addr)); in p2p_process_prov_disc_resp()
[all …]
Dp2p_invitation.c183 MAC2STR(sa), rx_freq); in p2p_process_invitation_req()
191 MAC2STR(sa)); in p2p_process_invitation_req()
196 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req()
204 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req()
212 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req()
409 MAC2STR(sa)); in p2p_process_invitation_resp()
414 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp()
420 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp()
429 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp()
436 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp()
[all …]
Dp2p_dev_disc.c85 MAC2STR(go->info.p2p_device_addr), in p2p_send_dev_disc_req()
86 MAC2STR(dev->info.p2p_device_addr)); in p2p_send_dev_disc_req()
148 MAC2STR(addr), status, freq); in p2p_send_dev_disc_resp()
168 " (freq=%d)", MAC2STR(sa), rx_freq); in p2p_process_dev_disc_req()
222 MAC2STR(sa)); in p2p_process_dev_disc_resp()
Dp2p_parse.c45 MAC2STR(msg->device_id)); in p2p_parse_attribute()
170 MAC2STR(msg->p2p_device_addr), in p2p_parse_attribute()
193 MACSTR, MAC2STR(msg->intended_addr)); in p2p_parse_attribute()
203 MAC2STR(msg->group_bssid)); in p2p_parse_attribute()
214 MACSTR, MAC2STR(msg->group_id)); in p2p_parse_attribute()
604 MAC2STR(cli->p2p_device_addr), in p2p_group_info_text()
605 MAC2STR(cli->p2p_interface_addr)); in p2p_group_info_text()
701 MAC2STR(msg.p2p_device_addr)); in p2p_attr_text()
Dp2p.c97 MAC2STR(dev->info.p2p_device_addr)); in p2p_expire_peers()
604 MAC2STR(dev->info.p2p_device_addr), in p2p_copy_wps_info()
701 " due to peer filter", MAC2STR(p2p_dev_addr)); in p2p_add_device()
764 MAC2STR(dev->info.p2p_device_addr), dev->listen_freq, in p2p_add_device()
832 " with unknown config methods", MAC2STR(addr)); in p2p_add_device()
1013 MAC2STR(p2p->after_scan_peer)); in p2p_run_after_scan()
1388 MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr), in p2p_connect()
1394 MAC2STR(peer_addr)); in p2p_connect()
1407 MAC2STR(peer_addr)); in p2p_connect()
1413 MAC2STR(peer_addr)); in p2p_connect()
[all …]
/external/wpa_supplicant_8/src/rsn_supp/
Dpreauth.c57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); in rsn_preauth_receive()
65 MAC2STR(src_addr)); in rsn_preauth_receive()
109 MACSTR " %s", MAC2STR(sm->preauth_bssid), in rsn_preauth_eapol_cb()
123 MACSTR " timed out", MAC2STR(sm->preauth_bssid)); in rsn_preauth_timeout()
179 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); in rsn_preauth_init()
316 MAC2STR(candidate->bssid)); in rsn_preauth_candidate_process()
325 MAC2STR(candidate->bssid)); in rsn_preauth_candidate_process()
403 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio); in pmksa_candidate_add()
Dpmksa_cache.c63 MACSTR, MAC2STR(entry->aa)); in pmksa_cache_expire()
209 MAC2STR(pos->aa)); in pmksa_cache_add()
233 " network_ctx=%p", MAC2STR(entry->aa), network_ctx); in pmksa_cache_add()
261 "for " MACSTR, MAC2STR(entry->aa)); in pmksa_cache_flush()
366 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa)); in pmksa_cache_get_opportunistic()
375 "for " MACSTR, MAC2STR(aa)); in pmksa_cache_get_opportunistic()
431 MAC2STR(bssid)); in pmksa_cache_set_current()
483 i, MAC2STR(entry->aa)); in pmksa_cache_list()
Dtdls.c238 MAC2STR(dest), action_code, dialog_token, status_code, in wpa_tdls_tpk_send()
262 "retry " MACSTR, MAC2STR(dest)); in wpa_tdls_tpk_send()
627 " - try to renew", MAC2STR(peer->addr)); in wpa_tdls_tpk_timeout()
631 " - tear down", MAC2STR(peer->addr)); in wpa_tdls_tpk_timeout()
653 MAC2STR(peer->addr)); in wpa_tdls_peer_remove_from_list()
667 MAC2STR(peer->addr)); in wpa_tdls_peer_clear()
741 "Teardown " MACSTR, MAC2STR(addr)); in wpa_tdls_send_teardown()
748 MAC2STR(addr)); in wpa_tdls_send_teardown()
821 " for link Teardown", MAC2STR(addr)); in wpa_tdls_teardown_link()
827 " not connected - cannot Teardown link", MAC2STR(addr)); in wpa_tdls_teardown_link()
[all …]
Dpeerkey.c109 MAC2STR(peer), mui, error_type); in wpa_supplicant_send_smk_error()
207 MAC2STR(kde.mac_addr)); in wpa_supplicant_process_smk_m2()
373 MAC2STR(peerkey->addr)); in wpa_supplicant_send_stk_1_of_4()
428 MAC2STR(peerkey->addr)); in wpa_supplicant_send_stk_3_of_4()
438 MAC2STR(kde->mac_addr)); in wpa_supplicant_process_smk_m4()
468 MAC2STR(kde->mac_addr)); in wpa_supplicant_process_smk_m5()
497 "unacceptable cipher", MAC2STR(kde->mac_addr)); in wpa_supplicant_process_smk_m5()
551 MAC2STR(kde.mac_addr)); in wpa_supplicant_process_smk_m45()
629 MAC2STR(peer)); in wpa_supplicant_process_smk_error()
666 MACSTR " (ver=%d)", MAC2STR(peerkey->addr), ver); in wpa_supplicant_process_stk_1_of_4()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/tests/
Dtest_wpa.c76 __func__, MAC2STR(dest), proto, (unsigned long) len); in supp_ether_send()
143 __func__, alg, MAC2STR(addr), key_idx, set_tx); in supp_set_key()
155 __func__, MAC2STR(addr), protection_type, key_type); in supp_mlme_setprotection()
215 MAC2STR(addr), txt); in auth_logger()
238 __func__, MAC2STR(addr), (unsigned long) data_len, encrypt); in auth_send_eapol()
257 __func__, MAC2STR(addr), prev_psk); in auth_get_psk()
/external/wpa_supplicant_8/src/drivers/
Ddriver_test.c223 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dst)); in test_driver_send_ether()
281 __func__, MAC2STR(dst)); in test_driver_send_ether()
325 snprintf(desttxt, sizeof(desttxt), MACSTR, MAC2STR(dest)); in wpa_driver_test_send_mlme()
438 "%s/AP-" MACSTR, drv->test_dir, MAC2STR(dest)); in wpa_driver_test_send_mlme()
442 drv->test_dir, MAC2STR(dest)); in wpa_driver_test_send_mlme()
504 MAC2STR(sa)); in test_driver_scan()
520 MAC2STR(bss->bssid)); in test_driver_scan()
617 MAC2STR(bss->bssid)); in test_driver_assoc()
652 MAC2STR(data), MAC2STR(src), in test_driver_eapol()
686 MAC2STR(eth->h_dest), MAC2STR(eth->h_source), in test_driver_ether()
[all …]

12345