Home
last modified time | relevance | path

Searched refs:MACSTR (Results 1 – 25 of 123) sorted by relevance

12345

/external/wpa_supplicant_8/wpa_supplicant/
Dgas_query.c155 wpa_msg(gas->wpa_s, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR in gas_query_done()
229 MACSTR " result=%d - no query in progress", in gas_query_tx_status()
237 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR in gas_query_tx_status()
284 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u " in gas_query_tx()
285 "freq=%d prot=%d using src addr " MACSTR, in gas_query_tx()
332 MACSTR, MAC2STR(query->addr)); in gas_query_tx_comeback_req()
374 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR, in gas_query_tx_comeback_timeout()
393 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR in gas_query_tx_comeback_req_delay()
407 MACSTR " (dialog_token=%u comeback_delay=%u)", in gas_query_rx_initial()
440 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u " in gas_query_rx_comeback()
[all …]
Dibss_rsn.c68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " in supp_ether_send()
134 wpa_msg(wpa_s, MSG_INFO, IBSS_RSN_COMPLETED MACSTR, in ibss_check_rsn_completed()
146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " in supp_set_key()
183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " in supp_mlme_setprotection()
254 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", in auth_logger()
265 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)", in auth_get_psk()
279 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " in auth_send_eapol()
300 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR in auth_set_key()
369 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port", in ibss_set_sta_authorized()
374 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizing port", in ibss_set_sta_authorized()
[all …]
Dhs20_supplicant.c75 "Not configuring frame filtering - BSS " MACSTR in hs20_configure_frame_filters()
238 MACSTR, MAC2STR(dst)); in hs20_anqp_send_req()
245 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for " in hs20_anqp_send_req()
308 wpa_printf(MSG_DEBUG, "HS20: Get icon " MACSTR " %s @ %u +%u (%u)", in hs20_get_icon()
337 wpa_printf(MSG_DEBUG, "HS20: Free stored icon from " MACSTR in hs20_free_icon_entry()
358 MACSTR, MAC2STR(bssid)); in hs20_del_icon()
361 MACSTR " file name %s", MAC2STR(bssid), file_name); in hs20_del_icon()
440 RX_HS20_ICON MACSTR " %s %u", in hs20_process_icon_binary_file()
451 wpa_msg(wpa_s, MSG_INFO, RX_HS20_ANQP MACSTR " Icon Binary File", in hs20_process_icon_binary_file()
456 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file()
[all …]
Dblacklist.c66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count " in wpa_blacklist_add()
79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist", in wpa_blacklist_add()
107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " in wpa_blacklist_del()
135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " in wpa_blacklist_clear()
Dwmm_ac.c100 "WMM AC: Add TS: addr=" MACSTR in wmm_ac_add_ts()
114 "tsid=%d addr=" MACSTR " admitted_time=%d", in wmm_ac_add_ts()
138 "tsid=%d addr=" MACSTR, tsid, MAC2STR(wpa_s->bssid)); in wmm_ac_del_ts_idx()
182 wpa_printf(MSG_DEBUG, "Sending ADDTS Request to " MACSTR, in wmm_ac_send_addts_request()
223 wpa_printf(MSG_DEBUG, "Sending DELTS to " MACSTR, MAC2STR(address)); in wmm_ac_send_delts()
616 wpa_printf(MSG_DEBUG, "WMM AC: TS setup request (addr=" MACSTR in wpas_wmm_ac_addts()
650 MACSTR, tsid, MAC2STR(sa)); in wmm_ac_handle_delts()
662 "TS was deleted successfully (tsid=%u address=" MACSTR ")", in wmm_ac_handle_delts()
721 "WMM AC: adding a new TS with TSID=%u address="MACSTR in wmm_ac_handle_addts_resp()
767 wpa_printf(MSG_DEBUG, "WMM AC: frame destination addr="MACSTR in wmm_ac_rx_action()
[all …]
Doffchannel.c142 MACSTR " using interface %s (pending_action_tx=%p)", in wpas_send_action_cb()
210 MACSTR " pending_action_tx=%p)", MAC2STR(dst), in offchannel_send_action_tx_status()
271 MACSTR " src=" MACSTR " bssid=" MACSTR " len=%d", in offchannel_send_action()
279 "frame TX to " MACSTR " (pending_action_tx=%p)", in offchannel_send_action()
301 "Off-channel: Stored pending action frame (dst=" MACSTR in offchannel_send_action()
Dinterworking.c131 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR in interworking_anqp_resp_cb()
254 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR, in interworking_anqp_send_req()
974 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR in interworking_connect_3gpp()
978 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR, in interworking_connect_3gpp()
1537 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR in interworking_connect_roaming_consortium()
1541 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR, in interworking_connect_roaming_consortium()
1609 MACSTR, MAC2STR(bss->bssid)); in interworking_connect()
1613 wpa_printf(MSG_DEBUG, "Interworking: Considering BSS " MACSTR in interworking_connect()
1705 MACSTR, MAC2STR(bss->bssid)); in interworking_connect()
1714 MACSTR, MAC2STR(bss->bssid)); in interworking_connect()
[all …]
Dmesh_mpm.c124 wpa_msg(wpa_s, MSG_ERROR, "no supported rates from " MACSTR, in copy_supp_rates()
132 "Invalid supported rates element length " MACSTR in copy_supp_rates()
365 MACSTR " (my_lid=0x%x peer_lid=0x%x)", in mesh_mpm_send_plink_action()
387 wpa_msg(wpa_s, MSG_DEBUG, "MPM set " MACSTR " from %s into %s", in wpa_mesh_set_plink_state()
400 wpa_msg(wpa_s, MSG_ERROR, "Driver failed to set " MACSTR in wpa_mesh_set_plink_state()
455 wpa_printf(MSG_DEBUG, "MPM: Peer " MACSTR in plink_timer()
493 wpa_printf(MSG_DEBUG, "MPM closing plink sta=" MACSTR, in mesh_mpm_plink_close()
621 wpa_msg(wpa_s, MSG_DEBUG, "MPM authenticating " MACSTR, in mesh_mpm_auth_peer()
626 "Driver failed to set " MACSTR ": %d", in mesh_mpm_auth_peer()
658 "mesh: Ignore a crowded peer " MACSTR, in mesh_mpm_add_peer()
[all …]
Dp2p_supplicant.c278 MACSTR, MAC2STR(bss->bssid)); in wpas_p2p_scan_res_handler()
1050 "group is persistent - BSS " MACSTR " not found", in wpas_p2p_persistent_group()
1061 "group is persistent - BSS " MACSTR in wpas_p2p_persistent_group()
1077 wpa_printf(MSG_DEBUG, "P2P: GO Device Address " MACSTR, in wpas_p2p_persistent_group()
1083 wpa_printf(MSG_DEBUG, "P2P: BSS " MACSTR " group_capab=0x%x " in wpas_p2p_persistent_group()
1084 "go_dev_addr=" MACSTR, in wpas_p2p_persistent_group()
1099 "group (GO Dev Addr " MACSTR ")", MAC2STR(go_dev_addr)); in wpas_p2p_store_persistent_group()
1289 MACSTR "%s%s", in wpas_p2p_group_started()
1298 "%s %s ssid=\"%s\" freq=%d go_dev_addr=" MACSTR "%s%s", in wpas_p2p_group_started()
1417 MACSTR " src=" MACSTR " bssid=" MACSTR " wait_time=%u)", in wpas_p2p_free_send_action_work()
[all …]
Dwnm_sta.c67 "action=%s to " MACSTR, in ieee802_11_send_wnmsleep_req()
519 wpa_printf(MSG_DEBUG, "WNM: Current BSS " MACSTR " RSSI %d", in compare_scan_neighbor_results()
527 wpa_printf(MSG_DEBUG, "Skip excluded BSS " MACSTR, in compare_scan_neighbor_results()
534 wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR in compare_scan_neighbor_results()
561 wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR in compare_scan_neighbor_results()
572 wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR in compare_scan_neighbor_results()
582 "MBO: Candidate BSS " MACSTR in compare_scan_neighbor_results()
589 wpa_printf(MSG_DEBUG, "Candidate BSS " MACSTR in compare_scan_neighbor_results()
600 MACSTR " (RSSI %d)", in compare_scan_neighbor_results()
798 "to " MACSTR " dialog_token=%u status=%u delay=%d", in wnm_send_bss_transition_mgmt_resp()
[all …]
/external/wpa_supplicant_8/src/ap/
Dap_mlme.c58 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)", in mlme_authenticate_indication()
87 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)", in mlme_deauthenticate_indication()
110 "MLME-ASSOCIATE.indication(" MACSTR ")", in mlme_associate_indication()
138 "MLME-REASSOCIATE.indication(" MACSTR ")", in mlme_reassociate_indication()
166 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)", in mlme_disassociate_indication()
177 "MLME-MichaelMICFailure.indication(" MACSTR ")", in mlme_michaelmicfailure_indication()
186 "MLME-DELETEKEYS.request(" MACSTR ")", in mlme_deletekeys_request()
Dsta_info.c117 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from " in ap_sta_list_del()
148 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR in ap_sta_hash_del()
260 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR, in ap_free_sta()
366 wpa_printf(MSG_DEBUG, "Removing station " MACSTR, in hostapd_free_stas()
388 wpa_printf(MSG_DEBUG, "%s: %s: " MACSTR " flags=0x%x timeout_next=%d", in ap_handle_timer()
414 MACSTR, MAC2STR(sta->addr)); in ap_handle_timer()
423 "Station " MACSTR " has lost its driver entry", in ap_handle_timer()
432 "Station " MACSTR " has been active %is ago", in ap_handle_timer()
439 "Station " MACSTR " has been " in ap_handle_timer()
453 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR in ap_handle_timer()
[all …]
Dwnm_ap.c206 MACSTR, MAC2STR(addr)); in ieee802_11_rx_wnmsleep_req()
284 MACSTR " dialog_token=%u req_mode=0x%x disassoc_timer=%u " in ieee802_11_send_bss_trans_mgmt_request()
308 MACSTR, MAC2STR(addr)); in ieee802_11_rx_bss_trans_mgmt_query()
318 MACSTR " dialog_token=%u reason=%u", in ieee802_11_rx_bss_trans_mgmt_query()
337 MACSTR, MAC2STR(addr)); in ieee802_11_rx_bss_trans_mgmt_resp()
348 MACSTR " dialog_token=%u status_code=%u " in ieee802_11_rx_bss_trans_mgmt_resp()
357 wpa_printf(MSG_DEBUG, "WNM: Target BSSID: " MACSTR, in ieee802_11_rx_bss_trans_mgmt_resp()
359 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR in ieee802_11_rx_bss_trans_mgmt_resp()
361 MACSTR, in ieee802_11_rx_bss_trans_mgmt_resp()
366 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR in ieee802_11_rx_bss_trans_mgmt_resp()
[all …]
Dwpa_auth_ft.c38 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); in wpa_ft_rrb_send()
337 "address " MACSTR, MAC2STR(r0kh->addr)); in wpa_ft_pull_pmk_r1()
887 MACSTR, parse->key_mgmt, MAC2STR(sm->addr)); in wpa_ft_set_key_mgmt()
897 MACSTR, in wpa_ft_set_key_mgmt()
1074 wpa_printf(MSG_DEBUG, "FT: Received authentication frame: STA=" MACSTR in wpa_ft_process_auth()
1075 " BSSID=" MACSTR " transaction=%d", in wpa_ft_process_auth()
1088 wpa_printf(MSG_DEBUG, "FT: FT authentication response: dst=" MACSTR in wpa_ft_process_auth()
1233 wpa_printf(MSG_DEBUG, "FT: addr=" MACSTR " auth_addr=" MACSTR, in wpa_ft_validate_reassoc()
1279 wpa_printf(MSG_DEBUG, "FT: Received FT Action frame (STA=" MACSTR in wpa_ft_action_rx()
1280 " Target AP=" MACSTR " Action=%d)", in wpa_ft_action_rx()
[all …]
Drrm.c80 wpa_printf(MSG_DEBUG, "Beacon report token %u len %zu from " MACSTR, in hostapd_handle_beacon_report()
90 wpa_msg(hapd->msg_ctx, MSG_INFO, BEACON_RESP_RX MACSTR " %u %02x %s", in hostapd_handle_beacon_report()
235 "NR entry for " MACSTR " exceeds 0xFF bytes", in hostapd_send_nei_report_resp()
349 wpa_printf(MSG_DEBUG, "Radio measurement frame, action %u from " MACSTR, in hostapd_handle_radio_measurement()
450 wpa_printf(MSG_DEBUG, "Request range: dest addr " MACSTR in hostapd_send_range_req()
525 MACSTR, MAC2STR(responders + ETH_ALEN * i)); in hostapd_send_range_req()
592 "Beacon request: " MACSTR " is not connected", in hostapd_send_beacon_req()
602 "Beacon request: " MACSTR in hostapd_send_beacon_req()
612 "Beacon request: " MACSTR in hostapd_send_beacon_req()
622 "Beacon request: " MACSTR in hostapd_send_beacon_req()
[all …]
Dieee802_11.c292 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR in send_auth_reply()
523 wpa_printf(MSG_DEBUG, "SAE: Auth SAE retransmit timer for " MACSTR in auth_sae_retransmit_timer()
707 wpa_printf(MSG_DEBUG, "SAE: remove the STA (" MACSTR in sae_sm_step()
876 "SAE: Drop commit message from " MACSTR " due to reflection attack", in handle_auth_sae()
883 "incorrect token from " MACSTR, in handle_auth_sae()
895 MACSTR, MAC2STR(sta->addr)); in handle_auth_sae()
1322 "Station " MACSTR " not allowed to authenticate", in ieee802_11_allowed_address()
1328 wpa_printf(MSG_DEBUG, "Authentication frame from " MACSTR in ieee802_11_allowed_address()
1416 "TESTING: ignoring auth frame from " MACSTR, in handle_auth()
1434 wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d " in handle_auth()
[all …]
Dx_snoop.c107 MACSTR " -> " MACSTR " (len %u)", in x_snoop_mcast_to_ucast_convert_send()
118 MACSTR, MAC2STR(sta->addr)); in x_snoop_mcast_to_ucast_convert_send()
Dpreauth_auth.c63 MACSTR, MAC2STR(ethhdr->h_dest)); in rsn_preauth_receive()
70 "STA " MACSTR, MAC2STR(sta->addr)); in rsn_preauth_receive()
190 MACSTR, MAC2STR(sta->addr)); in rsn_preauth_finished_cb()
246 "interface for " MACSTR, MAC2STR(sta->addr)); in rsn_preauth_send()
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/
Dhidl.cpp192 "Notifying ANQP query done to hidl control: " MACSTR "result: %s", in wpas_hidl_notify_anqp_query_done()
210 MSG_DEBUG, "Notifying HS20 icon query done to hidl control: " MACSTR in wpas_hidl_notify_hs20_icon_query_done()
377 MSG_DEBUG, "Notifying P2P device found to hidl control " MACSTR, in wpas_hidl_notify_p2p_device_found()
395 MSG_DEBUG, "Notifying P2P device lost to hidl control " MACSTR, in wpas_hidl_notify_p2p_device_lost()
428 "Notifying P2P GO negotiation request to hidl control " MACSTR, in wpas_hidl_notify_p2p_go_neg_req()
519 "Notifying P2P invitation received to hidl control: %d " MACSTR, id, in wpas_hidl_notify_p2p_invitation_received()
538 "Notifying P2P invitation result to hidl control: " MACSTR, in wpas_hidl_notify_p2p_invitation_result()
563 "Notifying P2P provision discovery to hidl control " MACSTR, in wpas_hidl_notify_p2p_provision_discovery()
583 "Notifying P2P service discovery response to hidl control " MACSTR, in wpas_hidl_notify_p2p_sd_response()
602 "Notifying P2P AP STA authorized to hidl control " MACSTR, in wpas_hidl_notify_ap_sta_authorized()
[all …]
/external/wpa_supplicant_8/src/p2p/
Dp2p_invitation.c191 p2p_dbg(p2p, "Received Invitation Request from " MACSTR " (freq=%d)", in p2p_process_invitation_req()
199 p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR, in p2p_process_invitation_req()
205 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req()
213 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req()
221 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req()
438 p2p_dbg(p2p, "Received Invitation Response from " MACSTR, in p2p_process_invitation_resp()
444 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp()
451 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp()
463 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp()
509 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp()
[all …]
Dp2p_dev_disc.c83 p2p_dbg(p2p, "Sending Device Discoverability Request to GO " MACSTR in p2p_send_dev_disc_req()
84 " for client " MACSTR, in p2p_send_dev_disc_req()
146 p2p_dbg(p2p, "Sending Device Discoverability Response to " MACSTR in p2p_send_dev_disc_resp()
167 p2p_dbg(p2p, "Received Device Discoverability Request from " MACSTR in p2p_process_dev_disc_req()
221 p2p_dbg(p2p, "Received Device Discoverability Response from " MACSTR, in p2p_process_dev_disc_resp()
/external/wpa_supplicant_8/src/rsn_supp/
Dtdls.c204 wpa_printf(MSG_INFO, "TDLS: TPK-TK for the peer " MACSTR in wpa_tdls_set_key()
227 wpa_printf(MSG_DEBUG, "TDLS: Configure pairwise key for peer " MACSTR, in wpa_tdls_set_key()
257 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " in wpa_tdls_tpk_send()
284 "retry " MACSTR, MAC2STR(dest)); in wpa_tdls_tpk_send()
650 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR in wpa_tdls_tpk_timeout()
658 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR in wpa_tdls_tpk_timeout()
679 wpa_printf(MSG_ERROR, "TDLS: Could not find peer " MACSTR in wpa_tdls_peer_remove_from_list()
694 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR, in wpa_tdls_peer_clear()
770 "Teardown " MACSTR, MAC2STR(addr)); in wpa_tdls_send_teardown()
776 wpa_printf(MSG_DEBUG, "TDLS: First returning link with " MACSTR in wpa_tdls_send_teardown()
[all …]
Dpreauth.c57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); in rsn_preauth_receive()
64 "unexpected source " MACSTR " - dropped", in rsn_preauth_receive()
110 MACSTR " %s", MAC2STR(sm->preauth_bssid), in rsn_preauth_eapol_cb()
124 MACSTR " timed out", MAC2STR(sm->preauth_bssid)); in rsn_preauth_timeout()
181 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); in rsn_preauth_init()
330 "candidate " MACSTR in rsn_preauth_candidate_process()
340 MACSTR " does not need pre-authentication anymore", in rsn_preauth_candidate_process()
431 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio); in pmksa_candidate_add()
Dpmksa_cache.c64 MACSTR, MAC2STR(entry->aa)); in pmksa_cache_expire()
233 "PMKSA cache entry (for " MACSTR ") to " in pmksa_cache_add_entry()
258 wpa_printf(MSG_DEBUG, "RSN: Added PMKSA cache entry for " MACSTR in pmksa_cache_add_entry()
288 "for " MACSTR, MAC2STR(entry->aa)); in pmksa_cache_flush()
394 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa)); in pmksa_cache_get_opportunistic()
403 "for " MACSTR, MAC2STR(aa)); in pmksa_cache_get_opportunistic()
458 wpa_printf(MSG_DEBUG, "RSN: Search for BSSID " MACSTR, in pmksa_cache_set_current()
510 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ", in pmksa_cache_list()
Dpeerkey.c109 MACSTR " mui %d error_type %d)", in wpa_supplicant_send_smk_error()
208 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, in wpa_supplicant_process_smk_m2()
371 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR, in wpa_supplicant_send_stk_1_of_4()
427 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR, in wpa_supplicant_send_stk_3_of_4()
437 wpa_printf(MSG_DEBUG, "RSN: Received SMK M4 (Initiator " MACSTR ")", in wpa_supplicant_process_smk_m4()
467 wpa_printf(MSG_DEBUG, "RSN: Received SMK M5 (Peer " MACSTR ")", in wpa_supplicant_process_smk_m5()
496 wpa_printf(MSG_INFO, "RSN: SMK Peer STA " MACSTR " selected " in wpa_supplicant_process_smk_m5()
550 "for SMK M4/M5: peer " MACSTR, in wpa_supplicant_process_smk_m45()
626 MACSTR, in wpa_supplicant_process_smk_error()
665 MACSTR " (ver=%d)", MAC2STR(peerkey->addr), ver); in wpa_supplicant_process_stk_1_of_4()
[all …]

12345