Searched refs:MACSTR (Results 1 - 25 of 124) sorted by relevance

12345

/freebsd-13-stable/contrib/wpa/src/ap/
H A Dap_mlme.c58 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)",
87 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)",
110 "MLME-ASSOCIATE.indication(" MACSTR ")",
138 "MLME-REASSOCIATE.indication(" MACSTR ")",
166 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)",
177 "MLME-MichaelMICFailure.indication(" MACSTR ")",
186 "MLME-DELETEKEYS.request(" MACSTR ")",
H A Dgas_query_ap.c146 wpa_msg(gas->msg_ctx, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR
213 wpa_printf(MSG_DEBUG, "GAS: Unexpected TX status: dst=" MACSTR
221 wpa_printf(MSG_DEBUG, "GAS: TX status: dst=" MACSTR
264 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u "
265 "freq=%d prot=%d using src addr " MACSTR,
297 MACSTR, MAC2STR(query->addr));
339 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR,
353 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR
367 MACSTR " (dialog_token=%u comeback_delay=%u)",
400 MACSTR " (dialog_toke
[all...]
H A Dx_snoop.c107 MACSTR " -> " MACSTR " (len %u)",
118 MACSTR, MAC2STR(sta->addr));
H A Dsta_info.c119 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from "
150 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR
264 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR,
397 wpa_printf(MSG_DEBUG, "Removing station " MACSTR,
419 wpa_printf(MSG_DEBUG, "%s: %s: " MACSTR " flags=0x%x timeout_next=%d",
445 MACSTR, MAC2STR(sta->addr));
454 "Station " MACSTR " has lost its driver entry",
463 "Station " MACSTR " has been active %is ago",
470 "Station " MACSTR " has been "
484 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR
[all...]
H A Dwnm_ap.c253 MACSTR " since WNM-Sleep Mode is disabled",
261 MACSTR, MAC2STR(addr));
366 MACSTR " dialog_token=%u req_mode=0x%x disassoc_timer=%u "
396 MACSTR
404 MACSTR, MAC2STR(addr));
414 MACSTR " dialog_token=%u reason=%u",
430 wpa_printf(MSG_DEBUG, "%s: Reset steering flag for STA " MACSTR,
453 MACSTR
461 MACSTR, MAC2STR(addr));
472 MACSTR " dialog_toke
[all...]
H A Ddpp_hostapd.c51 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR
76 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR
127 wpa_printf(MSG_DEBUG, "DPP: TX status: dst=" MACSTR " ok=%d",
129 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX_STATUS "dst=" MACSTR
385 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR
534 wpa_printf(MSG_DEBUG, "DPP: Authentication Request from " MACSTR,
599 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR
745 DPP_EVENT_TX "dst=" MACSTR " freq=%u type=%d",
786 wpa_printf(MSG_DEBUG, "DPP: GAS request to " MACSTR " (freq %u MHz)",
831 wpa_printf(MSG_DEBUG, "DPP: Authentication Response from " MACSTR,
[all...]
H A Drrm.c80 wpa_printf(MSG_DEBUG, "Beacon report token %u len %zu from " MACSTR,
90 wpa_msg(hapd->msg_ctx, MSG_INFO, BEACON_RESP_RX MACSTR " %u %02x %s",
235 "NR entry for " MACSTR " exceeds 0xFF bytes",
349 wpa_printf(MSG_DEBUG, "Radio measurement frame, action %u from " MACSTR,
450 wpa_printf(MSG_DEBUG, "Request range: dest addr " MACSTR
525 MACSTR, MAC2STR(responders + ETH_ALEN * i));
592 "Beacon request: " MACSTR " is not connected",
602 "Beacon request: " MACSTR
612 "Beacon request: " MACSTR
622 "Beacon request: " MACSTR
[all...]
H A Dap_list.c114 wpa_printf(MSG_INFO, "AP: could not remove AP " MACSTR
161 MACSTR " from AP table", MAC2STR(ap->prev->addr));
225 wpa_printf(MSG_DEBUG, "OLBC AP detected: " MACSTR
239 wpa_printf(MSG_DEBUG, "OLBC HT AP detected: " MACSTR
H A Dhs20.c241 MACSTR, MAC2STR(sta->addr));
244 wpa_msg(hapd->msg_ctx, MSG_INFO, HS20_T_C_FILTERING_ADD MACSTR,
249 MACSTR, MAC2STR(sta->addr));
253 HS20_T_C_FILTERING_REMOVE MACSTR, MAC2STR(sta->addr));
H A Dpreauth_auth.c63 MACSTR, MAC2STR(ethhdr->h_dest));
70 "STA " MACSTR, MAC2STR(sta->addr));
190 MACSTR, MAC2STR(sta->addr));
246 "interface for " MACSTR, MAC2STR(sta->addr));
H A Dieee802_11.c328 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR
383 wpa_printf(MSG_DEBUG, "SAE: State %s -> %s for peer " MACSTR " (%s)",
562 MACSTR " - token_idx 0x%04x, expected 0x%04x",
659 wpa_printf(MSG_DEBUG, "SAE: Auth SAE retransmit timer for " MACSTR
727 wpa_printf(MSG_DEBUG, "SAE: Assign STA " MACSTR
745 MACSTR, sta->sae->tmp->vlan_id,
774 wpa_printf(MSG_DEBUG, "SAE: Peer " MACSTR " state=%s auth_trans=%u",
901 wpa_printf(MSG_DEBUG, "SAE: remove the STA (" MACSTR
1142 "SAE: Drop commit message from " MACSTR " due to reflection attack",
1150 MACSTR, MAC2ST
[all...]
/freebsd-13-stable/contrib/wpa/wpa_supplicant/
H A Dblacklist.c66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count "
79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist",
107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
H A Dibss_rsn.c68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
134 wpa_msg(wpa_s, MSG_INFO, IBSS_RSN_COMPLETED MACSTR,
146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
254 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
271 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
285 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu "
306 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR
375 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port",
380 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizin
[all...]
H A Dgas_query.c158 wpa_msg(gas->wpa_s, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR
232 MACSTR " result=%d - no query in progress",
240 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR
294 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u "
295 "freq=%d prot=%d using src addr " MACSTR,
343 MACSTR, MAC2STR(query->addr));
385 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR,
404 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR
418 MACSTR " (dialog_token=%u comeback_delay=%u)",
451 MACSTR " (dialog_toke
[all...]
H A Doffchannel.c142 MACSTR " using interface %s (pending_action_tx=%p)",
210 MACSTR " pending_action_tx=%p)", MAC2STR(dst),
271 MACSTR " src=" MACSTR " bssid=" MACSTR " len=%d",
279 "frame TX to " MACSTR " (pending_action_tx=%p)",
301 "Off-channel: Stored pending action frame (dst=" MACSTR
H A Dhs20_supplicant.c77 "Not configuring frame filtering - BSS " MACSTR
277 MACSTR, MAC2STR(dst));
284 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for "
347 wpa_printf(MSG_DEBUG, "HS20: Get icon " MACSTR " %s @ %u +%u (%u)",
376 wpa_printf(MSG_DEBUG, "HS20: Free stored icon from " MACSTR
397 MACSTR, MAC2STR(bssid));
400 MACSTR " file name %s", MAC2STR(bssid), file_name);
478 RX_HS20_ICON MACSTR " %s %u",
485 wpa_msg(wpa_s, MSG_INFO, RX_HS20_ANQP MACSTR " Icon Binary File",
490 "value from " MACSTR, MAC2ST
[all...]
H A Ddpp_supplicant.c75 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR
101 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR
172 wpa_printf(MSG_DEBUG, "DPP: TX status: freq=%u dst=" MACSTR
174 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX_STATUS "dst=" MACSTR
421 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR " freq=%u type=%d",
729 wpa_printf(MSG_DEBUG, "DPP: Authentication Request from " MACSTR,
794 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR " freq=%u type=%d",
1078 DPP_EVENT_TX "dst=" MACSTR " freq=%u type=%d",
1129 wpa_printf(MSG_DEBUG, "DPP: GAS request to " MACSTR " (freq %u MHz)",
1175 wpa_printf(MSG_DEBUG, "DPP: Authentication Response from " MACSTR
[all...]
H A Dwmm_ac.c97 "WMM AC: Add TS: addr=" MACSTR
111 "tsid=%d addr=" MACSTR " admitted_time=%d",
135 "tsid=%d addr=" MACSTR, tsid, MAC2STR(wpa_s->bssid));
179 wpa_printf(MSG_DEBUG, "Sending ADDTS Request to " MACSTR,
220 wpa_printf(MSG_DEBUG, "Sending DELTS to " MACSTR, MAC2STR(address));
608 wpa_printf(MSG_DEBUG, "WMM AC: TS setup request (addr=" MACSTR
642 MACSTR, tsid, MAC2STR(sa));
654 "TS was deleted successfully (tsid=%u address=" MACSTR ")",
713 "WMM AC: adding a new TS with TSID=%u address="MACSTR
759 wpa_printf(MSG_DEBUG, "WMM AC: frame destination addr="MACSTR
[all...]
H A Dmesh_mpm.c126 wpa_msg(wpa_s, MSG_ERROR, "no supported rates from " MACSTR,
134 "Invalid supported rates element length " MACSTR
414 MACSTR " (my_lid=0x%x peer_lid=0x%x)",
436 wpa_msg(wpa_s, MSG_DEBUG, "MPM set " MACSTR " from %s into %s",
449 wpa_msg(wpa_s, MSG_ERROR, "Driver failed to set " MACSTR
504 wpa_printf(MSG_DEBUG, "MPM: Peer " MACSTR
542 wpa_printf(MSG_DEBUG, "MPM closing plink sta=" MACSTR,
670 wpa_msg(wpa_s, MSG_DEBUG, "MPM authenticating " MACSTR,
675 "Driver failed to set " MACSTR ": %d",
707 "mesh: Ignore a crowded peer " MACSTR,
[all...]
/freebsd-13-stable/contrib/wpa/src/p2p/
H A Dp2p_dev_disc.c83 p2p_dbg(p2p, "Sending Device Discoverability Request to GO " MACSTR
84 " for client " MACSTR,
146 p2p_dbg(p2p, "Sending Device Discoverability Response to " MACSTR
167 p2p_dbg(p2p, "Received Device Discoverability Request from " MACSTR
221 p2p_dbg(p2p, "Received Device Discoverability Response from " MACSTR,
H A Dp2p_invitation.c191 p2p_dbg(p2p, "Received Invitation Request from " MACSTR " (freq=%d)",
199 p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR,
205 MACSTR, MAC2STR(sa));
213 MACSTR, MAC2STR(sa));
221 MACSTR, MAC2STR(sa));
438 p2p_dbg(p2p, "Received Invitation Response from " MACSTR,
444 MACSTR, MAC2STR(sa));
451 MACSTR, MAC2STR(sa));
463 MACSTR, MAC2STR(sa));
509 MACSTR, MAC2ST
[all...]
/freebsd-13-stable/contrib/wpa/src/fst/
H A Dfst.c174 MACSTR, MAC2STR(mgmt->sa));
187 fst_printf_iface(iface, MSG_DEBUG, MACSTR " became connected",
203 fst_printf_iface(iface, MSG_DEBUG, MACSTR " became disconnected",
/freebsd-13-stable/contrib/wpa/src/rsn_supp/
H A Dpreauth.c57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr));
64 "unexpected source " MACSTR " - dropped",
110 MACSTR " %s", MAC2STR(sm->preauth_bssid),
124 MACSTR " timed out", MAC2STR(sm->preauth_bssid));
181 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst));
330 "candidate " MACSTR
340 MACSTR " does not need pre-authentication anymore",
432 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio);
H A Dtdls.c205 wpa_printf(MSG_INFO, "TDLS: TPK-TK for the peer " MACSTR
228 wpa_printf(MSG_DEBUG, "TDLS: Configure pairwise key for peer " MACSTR,
258 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u "
285 "retry " MACSTR, MAC2STR(dest));
648 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
656 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
677 wpa_printf(MSG_ERROR, "TDLS: Could not find peer " MACSTR
692 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR,
768 "Teardown " MACSTR, MAC2STR(addr));
774 wpa_printf(MSG_DEBUG, "TDLS: First returning link with " MACSTR
[all...]
/freebsd-13-stable/contrib/wpa/src/utils/
H A Dstate_machine.h86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \

Completed in 222 milliseconds

12345