/freebsd-11.0-release/contrib/wpa/src/ap/ |
H A D | ap_mlme.c | 58 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)", 82 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)", 105 "MLME-ASSOCIATE.indication(" MACSTR ")", 129 "MLME-REASSOCIATE.indication(" MACSTR ")", 153 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)", 164 "MLME-MichaelMICFailure.indication(" MACSTR ")", 173 "MLME-DELETEKEYS.request(" MACSTR ")",
|
H A D | x_snoop.c | 107 MACSTR " -> " MACSTR " (len %u)", 118 MACSTR, MAC2STR(sta->addr));
|
H A D | sta_info.c | 113 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from " 144 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR 260 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR, 335 wpa_printf(MSG_DEBUG, "Removing station " MACSTR, 357 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d", 383 MACSTR, MAC2STR(sta->addr)); 392 "Station " MACSTR " has lost its driver entry", 401 "Station " MACSTR " has been active %is ago", 408 "Station " MACSTR " has been " 422 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR [all...] |
H A D | wnm_ap.c | 287 MACSTR " dialog_token=%u req_mode=0x%x disassoc_timer=%u " 311 MACSTR, MAC2STR(addr)); 321 MACSTR " dialog_token=%u reason=%u", 340 MACSTR, MAC2STR(addr)); 351 MACSTR " dialog_token=%u status_code=%u " 360 wpa_printf(MSG_DEBUG, "WNM: Target BSSID: " MACSTR, 362 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR 364 MACSTR, 369 wpa_msg(hapd->msg_ctx, MSG_INFO, BSS_TM_RESP MACSTR 407 wpa_printf(MSG_DEBUG, "WNM: Unsupported WNM Action %u from " MACSTR, [all...] |
H A D | wpa_auth_ft.c | 38 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); 326 "address " MACSTR, MAC2STR(r0kh->addr)); 972 wpa_printf(MSG_DEBUG, "FT: Received authentication frame: STA=" MACSTR 973 " BSSID=" MACSTR " transaction=%d", 986 wpa_printf(MSG_DEBUG, "FT: FT authentication response: dst=" MACSTR 1131 wpa_printf(MSG_DEBUG, "FT: addr=" MACSTR " auth_addr=" MACSTR, 1177 wpa_printf(MSG_DEBUG, "FT: Received FT Action frame (STA=" MACSTR 1178 " Target AP=" MACSTR " Action=%d)", 1183 "STA=" MACSTR " ST [all...] |
H A D | ieee802_11.c | 281 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR 673 wpa_printf(MSG_DEBUG, "SAE: remove the STA (" MACSTR 779 "SAE: Drop commit message from " MACSTR " due to reflection attack", 786 "incorrect token from " MACSTR, 797 MACSTR, MAC2STR(sta->addr)); 907 "TESTING: ignoring auth frame from " MACSTR, 925 wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d " 975 wpa_printf(MSG_INFO, "Station " MACSTR " not allowed to authenticate", 992 MACSTR " since STA has been seen on %s", 1042 wpa_printf(MSG_INFO, "Station " MACSTR " no [all...] |
H A D | ap_list.c | 114 wpa_printf(MSG_INFO, "AP: could not remove AP " MACSTR 161 MACSTR " from AP table", MAC2STR(ap->prev->addr)); 225 wpa_printf(MSG_DEBUG, "OLBC AP detected: " MACSTR 239 wpa_printf(MSG_DEBUG, "OLBC HT AP detected: " MACSTR
|
H A D | preauth_auth.c | 63 MACSTR, MAC2STR(ethhdr->h_dest)); 70 "STA " MACSTR, MAC2STR(sta->addr)); 190 MACSTR, MAC2STR(sta->addr)); 246 "interface for " MACSTR, MAC2STR(sta->addr));
|
H A D | tkip_countermeasures.c | 86 "for not associated STA (" MACSTR
|
H A D | peerkey_auth.c | 108 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR 283 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR 351 wpa_printf(MSG_DEBUG, "RSN: Peer STA " MACSTR " not " 352 "associated for SMK Error message from " MACSTR, 361 "STA reported SMK Error: Peer " MACSTR
|
/freebsd-11.0-release/contrib/wpa/wpa_supplicant/ |
H A D | blacklist.c | 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count " 79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist", 107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " 135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
|
H A D | gas_query.c | 144 wpa_msg(gas->wpa_s, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR 217 MACSTR " result=%d - no query in progress", 225 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR 262 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u " 297 MACSTR, MAC2STR(query->addr)); 310 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR, 324 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR 338 MACSTR " (dialog_token=%u comeback_delay=%u)", 370 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u " 380 MACSTR, MAC2ST [all...] |
H A D | ibss_rsn.c | 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 134 wpa_msg(wpa_s, MSG_INFO, IBSS_RSN_COMPLETED MACSTR, 146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 253 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", 264 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)", 278 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " 299 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR 368 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port", 373 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizin [all...] |
H A D | hs20_supplicant.c | 195 MACSTR, MAC2STR(dst)); 202 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for " 255 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR " Icon Binary File", 260 "value from " MACSTR, MAC2STR(sa)); 272 "value from " MACSTR, MAC2STR(sa)); 282 "value from " MACSTR, MAC2STR(sa)); 291 "value from " MACSTR, MAC2STR(sa)); 382 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR 392 wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR 405 "Metrics value from " MACSTR, MAC2ST [all...] |
H A D | interworking.c | 131 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR 254 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR, 971 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR 975 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR, 1509 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR 1513 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR, 1582 MACSTR, MAC2STR(bss->bssid)); 1586 wpa_printf(MSG_DEBUG, "Interworking: Considering BSS " MACSTR 1678 MACSTR, MAC2STR(bss->bssid)); 1687 MACSTR, MAC2ST [all...] |
H A D | offchannel.c | 121 MACSTR " using interface %s", 245 MACSTR " src=" MACSTR " bssid=" MACSTR " len=%d", 253 "frame TX to " MACSTR,
|
/freebsd-11.0-release/contrib/wpa/src/p2p/ |
H A D | p2p_dev_disc.c | 83 p2p_dbg(p2p, "Sending Device Discoverability Request to GO " MACSTR 84 " for client " MACSTR, 146 p2p_dbg(p2p, "Sending Device Discoverability Response to " MACSTR 167 p2p_dbg(p2p, "Received Device Discoverability Request from " MACSTR 221 p2p_dbg(p2p, "Received Device Discoverability Response from " MACSTR,
|
H A D | p2p_invitation.c | 191 p2p_dbg(p2p, "Received Invitation Request from " MACSTR " (freq=%d)", 199 p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR, 205 MACSTR, MAC2STR(sa)); 213 MACSTR, MAC2STR(sa)); 221 MACSTR, MAC2STR(sa)); 438 p2p_dbg(p2p, "Received Invitation Response from " MACSTR, 444 MACSTR, MAC2STR(sa)); 451 MACSTR, MAC2STR(sa)); 463 MACSTR, MAC2STR(sa)); 509 MACSTR, MAC2ST [all...] |
/freebsd-11.0-release/contrib/wpa/src/fst/ |
H A D | fst.c | 168 MACSTR, MAC2STR(mgmt->sa)); 181 fst_printf_iface(iface, MSG_DEBUG, MACSTR " became connected", 197 fst_printf_iface(iface, MSG_DEBUG, MACSTR " became disconnected",
|
/freebsd-11.0-release/contrib/wpa/src/common/ |
H A D | hw_features_common.c | 227 "overlap with " MACSTR, 250 MACSTR " freq=%d", MAC2STR(bss->bssid), bss->freq); 260 MACSTR " freq=%d", MAC2STR(bss->bssid), bss->freq); 313 wpa_printf(MSG_DEBUG, "Neighboring BSS: " MACSTR 321 MACSTR 342 MACSTR, pri, MAC2STR(bss->bssid));
|
/freebsd-11.0-release/contrib/wpa/wpa_supplicant/tests/ |
H A D | test_wpa.c | 74 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 141 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 153 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 214 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", 236 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " 256 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
|
/freebsd-11.0-release/contrib/wpa/src/rsn_supp/ |
H A D | pmksa_cache.c | 63 MACSTR, MAC2STR(entry->aa)); 218 "PMKSA cache entry (for " MACSTR ") to " 243 wpa_printf(MSG_DEBUG, "RSN: Added PMKSA cache entry for " MACSTR 272 "for " MACSTR, MAC2STR(entry->aa)); 378 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa)); 387 "for " MACSTR, MAC2STR(aa)); 442 wpa_printf(MSG_DEBUG, "RSN: Search for BSSID " MACSTR, 494 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ",
|
H A D | preauth.c | 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); 64 "unexpected source " MACSTR " - dropped", 110 MACSTR " %s", MAC2STR(sm->preauth_bssid), 124 MACSTR " timed out", MAC2STR(sm->preauth_bssid)); 181 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); 330 "candidate " MACSTR 340 MACSTR " does not need pre-authentication anymore", 431 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio);
|
H A D | tdls.c | 204 wpa_printf(MSG_INFO, "TDLS: TPK-TK for the peer " MACSTR 227 wpa_printf(MSG_DEBUG, "TDLS: Configure pairwise key for peer " MACSTR, 257 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " 284 "retry " MACSTR, MAC2STR(dest)); 648 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 652 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR 673 wpa_printf(MSG_ERROR, "TDLS: Could not find peer " MACSTR 688 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR, 764 "Teardown " MACSTR, MAC2STR(addr)); 770 wpa_printf(MSG_DEBUG, "TDLS: First returning link with " MACSTR [all...] |
/freebsd-11.0-release/contrib/wpa/src/utils/ |
H A D | state_machine.h | 86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
|