/freebsd-10.2-release/contrib/wpa/src/ap/ |
H A D | ap_mlme.c | 58 MAC2STR(sta->addr), mlme_auth_alg_str(sta->auth_alg)); 82 MAC2STR(sta->addr), reason_code); 104 MAC2STR(sta->addr)); 130 MAC2STR(sta->addr)); 154 MAC2STR(sta->addr), reason_code); 165 MAC2STR(addr)); 174 MAC2STR(sta->addr));
|
H A D | sta_info.c | 86 "list.", MAC2STR(sta->addr)); 117 " from hash table", MAC2STR(sta->addr)); 200 __func__, MAC2STR(sta->addr)); 261 MAC2STR(prev->addr)); 282 __func__, MAC2STR(sta->addr), sta->flags, 307 MACSTR, MAC2STR(sta->addr)); 319 MAC2STR(sta->addr), inactive_sec); 327 MAC2STR(sta->addr), inactive_sec, 340 " has ACKed data poll", MAC2STR(sta->addr)); 350 __func__, MAC2STR(st [all...] |
H A D | wpa_auth_ft.c | 30 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); 314 "address " MACSTR, MAC2STR(r0kh->addr)); 952 MAC2STR(sm->addr), MAC2STR(bssid), auth_transaction); 958 MAC2STR(sm->addr), auth_transaction + 1, status); 1098 MAC2STR(sm->addr), MAC2STR(sm->wpa_auth->addr)); 1144 MAC2STR(sta_addr), MAC2STR(target_ap), action); 1149 MAC2STR(s [all...] |
H A D | ieee802_11_ht.c | 192 "0x%04x", MAC2STR(sta->addr), ht_capab); 200 __func__, MAC2STR(sta->addr), 210 __func__, MAC2STR(sta->addr), 225 __func__, MAC2STR(sta->addr),
|
H A D | preauth_auth.c | 63 MACSTR, MAC2STR(ethhdr->h_dest)); 70 "STA " MACSTR, MAC2STR(sta->addr)); 190 MACSTR, MAC2STR(sta->addr)); 246 "interface for " MACSTR, MAC2STR(sta->addr));
|
H A D | tkip_countermeasures.c | 87 ") ignored", MAC2STR(addr));
|
H A D | peerkey_auth.c | 110 MAC2STR(kde.mac_addr)); 285 MAC2STR(kde.mac_addr)); 353 MAC2STR(kde.mac_addr), MAC2STR(sm->addr)); 363 MAC2STR(kde.mac_addr), mui, error_type);
|
H A D | ieee802_11.c | 283 MAC2STR(dst), auth_alg, auth_transaction, 490 MAC2STR(mgmt->sa), auth_alg, auth_transaction, 527 MAC2STR(mgmt->sa)); 539 MAC2STR(mgmt->sa)); 546 MAC2STR(mgmt->sa)); 933 MAC2STR(sta->addr)); 949 MAC2STR(sta->addr), sta->auth_alg); 1153 MAC2STR(mgmt->sa), capab_info, listen_interval, 1154 MAC2STR(mgmt->u.reassoc_req.current_ap)); 1163 MAC2STR(mgm [all...] |
H A D | ap_list.c | 143 MAC2STR(ap->addr)); 210 MACSTR " from AP table", MAC2STR(ap->prev->addr)); 292 "protection", MAC2STR(ap->addr)); 301 " - enable protection", MAC2STR(ap->addr));
|
/freebsd-10.2-release/contrib/wpa/wpa_supplicant/ |
H A D | blacklist.c | 68 MAC2STR(bssid), e->count); 80 MAC2STR(bssid)); 108 "blacklist", MAC2STR(bssid)); 136 "blacklist (clear)", MAC2STR(prev->bssid));
|
H A D | gas_query.c | 146 "freq=%d", MAC2STR(query->addr), 171 MACSTR, MAC2STR(query->addr)); 185 MAC2STR(query->addr)); 199 " in %u secs %u usecs", MAC2STR(query->addr), secs, usecs); 213 MAC2STR(query->addr), query->dialog_token, comeback_delay); 246 MAC2STR(query->addr), query->dialog_token, frag_id, 254 MACSTR, MAC2STR(query->addr)); 263 "from " MACSTR, MAC2STR(query->addr)); 273 "from " MACSTR, MAC2STR(query->addr)); 326 " dialog token %u", MAC2STR(s [all...] |
H A D | hs20_supplicant.c | 90 "subtypes 0x%x", MAC2STR(dst), stypes); 132 " HS Capability List", MAC2STR(sa)); 137 " Operator Friendly Name", MAC2STR(sa)); 149 "Metrics value from " MACSTR, MAC2STR(sa)); 153 " WAN Metrics %02x:%u:%u:%u:%u:%u", MAC2STR(sa), 163 " Connection Capability", MAC2STR(sa)); 173 " Operating Class", MAC2STR(sa));
|
H A D | ibss_rsn.c | 63 __func__, MAC2STR(dest), proto, (unsigned long) len); 125 __func__, alg, MAC2STR(addr), key_idx, set_tx); 160 __func__, MAC2STR(addr), protection_type, key_type); 229 MAC2STR(addr), txt); 239 __func__, MAC2STR(addr), prev_psk); 254 __func__, MAC2STR(addr), (unsigned long) data_len, encrypt); 275 __func__, alg, MAC2STR(addr), idx); 327 MAC2STR(peer->addr)); 332 MAC2STR(peer->addr)); 338 MAC2STR(pee [all...] |
H A D | offchannel.c | 111 MAC2STR(wpa_s->pending_action_dst), iface->ifname); 212 freq, MAC2STR(dst), MAC2STR(src), MAC2STR(bssid), 220 MAC2STR(wpa_s->pending_action_dst));
|
H A D | interworking.c | 193 MAC2STR(bss->bssid)); 802 MAC2STR(bss->bssid)); 1133 "roaming consortium match", MAC2STR(bss->bssid)); 1191 MACSTR, MAC2STR(bss->bssid)); 1215 "Realm list from " MACSTR, MAC2STR(bss->bssid)); 1240 MAC2STR(bss->bssid)); 1246 MAC2STR(bss->bssid)); 1381 MACSTR, MAC2STR(bss->bssid)); 1411 MACSTR, MAC2STR(bss->bssid)); 1415 "Realm list from " MACSTR, MAC2STR(bs [all...] |
/freebsd-10.2-release/contrib/wpa/src/p2p/ |
H A D | p2p_pd.c | 147 MAC2STR(sa), msg.wps_config_methods, rx_freq); 153 "unknown peer " MACSTR, MAC2STR(sa)); 159 "failed " MACSTR, MAC2STR(sa)); 194 " requested us to show a PIN on display", MAC2STR(sa)); 200 MAC2STR(sa)); 271 MAC2STR(sa), msg.wps_config_methods); 277 MACSTR " with no pending request", MAC2STR(sa)); 319 " accepted to show a PIN on display", MAC2STR(sa)); 324 MAC2STR(sa)); 341 MAC2STR(de [all...] |
H A D | p2p_invitation.c | 168 MAC2STR(sa), rx_freq); 177 MACSTR, MAC2STR(sa)); 183 MACSTR, MAC2STR(sa)); 192 "peer " MACSTR, MAC2STR(sa)); 201 "Request from " MACSTR, MAC2STR(sa)); 412 MAC2STR(sa)); 418 MACSTR, MAC2STR(sa)); 425 MACSTR, MAC2STR(sa)); 435 "Invitation Response from " MACSTR, MAC2STR(sa)); 463 MAC2STR(de [all...] |
H A D | p2p_dev_disc.c | 90 MAC2STR(go->info.p2p_device_addr), 91 MAC2STR(dev->info.p2p_device_addr)); 153 MAC2STR(addr), status, freq); 175 " (freq=%d)", MAC2STR(sa), rx_freq); 238 MAC2STR(sa));
|
H A D | p2p_parse.c | 45 MAC2STR(msg->device_id)); 170 MAC2STR(msg->p2p_device_addr), 193 MACSTR, MAC2STR(msg->intended_addr)); 203 MAC2STR(msg->group_bssid)); 214 MACSTR, MAC2STR(msg->group_id)); 560 MAC2STR(cli->p2p_device_addr), 561 MAC2STR(cli->p2p_interface_addr)); 657 MAC2STR(msg.p2p_device_addr));
|
/freebsd-10.2-release/contrib/wpa/wpa_supplicant/tests/ |
H A D | test_wpa.c | 80 __func__, MAC2STR(dest), proto, (unsigned long) len); 147 __func__, alg, MAC2STR(addr), key_idx, set_tx); 159 __func__, MAC2STR(addr), protection_type, key_type); 219 MAC2STR(addr), txt); 242 __func__, MAC2STR(addr), (unsigned long) data_len, encrypt); 261 __func__, MAC2STR(addr), prev_psk);
|
/freebsd-10.2-release/contrib/wpa/src/rsn_supp/ |
H A D | pmksa_cache.c | 63 MACSTR, MAC2STR(entry->aa)); 203 MAC2STR(pos->aa)); 227 " network_ctx=%p", MAC2STR(entry->aa), network_ctx); 248 "for " MACSTR, MAC2STR(entry->aa)); 353 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa)); 362 "for " MACSTR, MAC2STR(aa)); 418 MAC2STR(bssid)); 470 i, MAC2STR(entry->aa));
|
H A D | preauth.c | 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); 65 MAC2STR(src_addr)); 108 MACSTR " %s", MAC2STR(sm->preauth_bssid), 121 MACSTR " timed out", MAC2STR(sm->preauth_bssid)); 177 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); 314 MAC2STR(candidate->bssid)); 323 MAC2STR(candidate->bssid)); 401 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio);
|
H A D | tdls.c | 207 MAC2STR(dest), action_code, dialog_token, status_code, 230 "retry " MACSTR, MAC2STR(dest)); 594 " - try to renew", MAC2STR(peer->addr)); 598 " - tear down", MAC2STR(peer->addr)); 608 MAC2STR(peer->addr)); 659 "Teardown " MACSTR, MAC2STR(addr)); 666 MAC2STR(addr)); 743 " for link Teardown", MAC2STR(addr)); 749 " not connected - cannot Teardown link", MAC2STR(addr)); 792 "Teardown " MACSTR, MAC2STR(src_add [all...] |
H A D | peerkey.c | 109 MAC2STR(peer), mui, error_type); 207 MAC2STR(kde.mac_addr)); 379 MAC2STR(peerkey->addr)); 434 MAC2STR(peerkey->addr)); 444 MAC2STR(kde->mac_addr)); 474 MAC2STR(kde->mac_addr)); 511 "unacceptable cipher", MAC2STR(kde->mac_addr)); 563 MAC2STR(kde.mac_addr)); 643 MAC2STR(peer)); 680 MACSTR " (ver=%d)", MAC2STR(peerke [all...] |
/freebsd-10.2-release/contrib/wpa/src/utils/ |
H A D | state_machine.h | 88 MAC2STR(STATE_MACHINE_ADDR)); \
|