Searched refs:MACSTR (Results 1 - 25 of 108) sorted by relevance

12345

/freebsd-11.0-release/contrib/wpa/src/ap/
H A Dap_mlme.c58 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)",
82 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)",
105 "MLME-ASSOCIATE.indication(" MACSTR ")",
129 "MLME-REASSOCIATE.indication(" MACSTR ")",
153 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)",
164 "MLME-MichaelMICFailure.indication(" MACSTR ")",
173 "MLME-DELETEKEYS.request(" MACSTR ")",
H A Dx_snoop.c107 MACSTR " -> " MACSTR " (len %u)",
118 MACSTR, MAC2STR(sta->addr));
H A Dsta_info.c113 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from "
144 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR
260 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR,
335 wpa_printf(MSG_DEBUG, "Removing station " MACSTR,
357 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d",
383 MACSTR, MAC2STR(sta->addr));
392 "Station " MACSTR " has lost its driver entry",
401 "Station " MACSTR " has been active %is ago",
408 "Station " MACSTR " has been "
422 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR
[all...]
H A Dwnm_ap.c287 MACSTR " dialog_token=%u req_mode=0x%x disassoc_timer=%u "
311 MACSTR, MAC2STR(addr));
321 MACSTR " dialog_token=%u reason=%u",
340 MACSTR, MAC2STR(addr));
351 MACSTR " dialog_token=%u status_code=%u "
360 wpa_printf(MSG_DEBUG, "WNM: Target BSSID: " MACSTR,
362 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR
364 MACSTR,
369 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR
407 wpa_printf(MSG_DEBUG, "WNM: Unsupported WNM Action %u from " MACSTR,
[all...]
H A Dwpa_auth_ft.c38 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst));
326 "address " MACSTR, MAC2STR(r0kh->addr));
972 wpa_printf(MSG_DEBUG, "FT: Received authentication frame: STA=" MACSTR
973 " BSSID=" MACSTR " transaction=%d",
986 wpa_printf(MSG_DEBUG, "FT: FT authentication response: dst=" MACSTR
1131 wpa_printf(MSG_DEBUG, "FT: addr=" MACSTR " auth_addr=" MACSTR,
1177 wpa_printf(MSG_DEBUG, "FT: Received FT Action frame (STA=" MACSTR
1178 " Target AP=" MACSTR " Action=%d)",
1183 "STA=" MACSTR " ST
[all...]
H A Dieee802_11.c281 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR
673 wpa_printf(MSG_DEBUG, "SAE: remove the STA (" MACSTR
779 "SAE: Drop commit message from " MACSTR " due to reflection attack",
786 "incorrect token from " MACSTR,
797 MACSTR, MAC2STR(sta->addr));
907 "TESTING: ignoring auth frame from " MACSTR,
925 wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d "
975 wpa_printf(MSG_INFO, "Station " MACSTR " not allowed to authenticate",
992 MACSTR " since STA has been seen on %s",
1042 wpa_printf(MSG_INFO, "Station " MACSTR " no
[all...]
H A Dap_list.c114 wpa_printf(MSG_INFO, "AP: could not remove AP " MACSTR
161 MACSTR " from AP table", MAC2STR(ap->prev->addr));
225 wpa_printf(MSG_DEBUG, "OLBC AP detected: " MACSTR
239 wpa_printf(MSG_DEBUG, "OLBC HT AP detected: " MACSTR
H A Dpreauth_auth.c63 MACSTR, MAC2STR(ethhdr->h_dest));
70 "STA " MACSTR, MAC2STR(sta->addr));
190 MACSTR, MAC2STR(sta->addr));
246 "interface for " MACSTR, MAC2STR(sta->addr));
H A Dtkip_countermeasures.c86 "for not associated STA (" MACSTR
H A Dpeerkey_auth.c108 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR
283 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR
351 wpa_printf(MSG_DEBUG, "RSN: Peer STA " MACSTR " not "
352 "associated for SMK Error message from " MACSTR,
361 "STA reported SMK Error: Peer " MACSTR
/freebsd-11.0-release/contrib/wpa/wpa_supplicant/
H A Dblacklist.c66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count "
79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist",
107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
H A Dgas_query.c144 wpa_msg(gas->wpa_s, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR
217 MACSTR " result=%d - no query in progress",
225 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR
262 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u "
297 MACSTR, MAC2STR(query->addr));
310 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR,
324 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR
338 MACSTR " (dialog_token=%u comeback_delay=%u)",
370 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u "
380 MACSTR, MAC2ST
[all...]
H A Dibss_rsn.c68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
134 wpa_msg(wpa_s, MSG_INFO, IBSS_RSN_COMPLETED MACSTR,
146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
253 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
264 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
278 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu "
299 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR
368 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port",
373 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizin
[all...]
H A Dhs20_supplicant.c195 MACSTR, MAC2STR(dst));
202 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for "
255 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR " Icon Binary File",
260 "value from " MACSTR, MAC2STR(sa));
272 "value from " MACSTR, MAC2STR(sa));
282 "value from " MACSTR, MAC2STR(sa));
291 "value from " MACSTR, MAC2STR(sa));
382 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
392 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
405 "Metrics value from " MACSTR, MAC2ST
[all...]
H A Dinterworking.c131 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR
254 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR,
971 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR
975 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR,
1509 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR
1513 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR,
1582 MACSTR, MAC2STR(bss->bssid));
1586 wpa_printf(MSG_DEBUG, "Interworking: Considering BSS " MACSTR
1678 MACSTR, MAC2STR(bss->bssid));
1687 MACSTR, MAC2ST
[all...]
H A Doffchannel.c121 MACSTR " using interface %s",
245 MACSTR " src=" MACSTR " bssid=" MACSTR " len=%d",
253 "frame TX to " MACSTR,
/freebsd-11.0-release/contrib/wpa/src/p2p/
H A Dp2p_dev_disc.c83 p2p_dbg(p2p, "Sending Device Discoverability Request to GO " MACSTR
84 " for client " MACSTR,
146 p2p_dbg(p2p, "Sending Device Discoverability Response to " MACSTR
167 p2p_dbg(p2p, "Received Device Discoverability Request from " MACSTR
221 p2p_dbg(p2p, "Received Device Discoverability Response from " MACSTR,
H A Dp2p_invitation.c191 p2p_dbg(p2p, "Received Invitation Request from " MACSTR " (freq=%d)",
199 p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR,
205 MACSTR, MAC2STR(sa));
213 MACSTR, MAC2STR(sa));
221 MACSTR, MAC2STR(sa));
438 p2p_dbg(p2p, "Received Invitation Response from " MACSTR,
444 MACSTR, MAC2STR(sa));
451 MACSTR, MAC2STR(sa));
463 MACSTR, MAC2STR(sa));
509 MACSTR, MAC2ST
[all...]
/freebsd-11.0-release/contrib/wpa/src/fst/
H A Dfst.c168 MACSTR, MAC2STR(mgmt->sa));
181 fst_printf_iface(iface, MSG_DEBUG, MACSTR " became connected",
197 fst_printf_iface(iface, MSG_DEBUG, MACSTR " became disconnected",
/freebsd-11.0-release/contrib/wpa/src/common/
H A Dhw_features_common.c227 "overlap with " MACSTR,
250 MACSTR " freq=%d", MAC2STR(bss->bssid), bss->freq);
260 MACSTR " freq=%d", MAC2STR(bss->bssid), bss->freq);
313 wpa_printf(MSG_DEBUG, "Neighboring BSS: " MACSTR
321 MACSTR
342 MACSTR, pri, MAC2STR(bss->bssid));
/freebsd-11.0-release/contrib/wpa/wpa_supplicant/tests/
H A Dtest_wpa.c74 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
141 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
153 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
214 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
236 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu "
256 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
/freebsd-11.0-release/contrib/wpa/src/rsn_supp/
H A Dpmksa_cache.c63 MACSTR, MAC2STR(entry->aa));
218 "PMKSA cache entry (for " MACSTR ") to "
243 wpa_printf(MSG_DEBUG, "RSN: Added PMKSA cache entry for " MACSTR
272 "for " MACSTR, MAC2STR(entry->aa));
378 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa));
387 "for " MACSTR, MAC2STR(aa));
442 wpa_printf(MSG_DEBUG, "RSN: Search for BSSID " MACSTR,
494 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ",
H A Dpreauth.c57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr));
64 "unexpected source " MACSTR " - dropped",
110 MACSTR " %s", MAC2STR(sm->preauth_bssid),
124 MACSTR " timed out", MAC2STR(sm->preauth_bssid));
181 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst));
330 "candidate " MACSTR
340 MACSTR " does not need pre-authentication anymore",
431 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio);
H A Dtdls.c204 wpa_printf(MSG_INFO, "TDLS: TPK-TK for the peer " MACSTR
227 wpa_printf(MSG_DEBUG, "TDLS: Configure pairwise key for peer " MACSTR,
257 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u "
284 "retry " MACSTR, MAC2STR(dest));
648 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
652 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
673 wpa_printf(MSG_ERROR, "TDLS: Could not find peer " MACSTR
688 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR,
764 "Teardown " MACSTR, MAC2STR(addr));
770 wpa_printf(MSG_DEBUG, "TDLS: First returning link with " MACSTR
[all...]
/freebsd-11.0-release/contrib/wpa/src/utils/
H A Dstate_machine.h86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \

Completed in 283 milliseconds

12345