/hostap-3.6.0/wlantest/ |
D | rx_tdls.c | 31 add_note(wt, MSG_INFO, "TDLS: Incorrect BSSID " MACSTR in get_tdls() 32 " in LinkId?! (init=" MACSTR " resp=" in get_tdls() 33 MACSTR ")", in get_tdls() 56 add_note(wt, MSG_DEBUG, "Add new TDLS link context: initiator " MACSTR in get_tdls() 57 " responder " MACSTR " BSSID " MACSTR, in get_tdls() 209 add_note(wt, MSG_INFO, "Too short TDLS Setup Request " MACSTR in rx_data_tdls_setup_request() 210 " -> " MACSTR, MAC2STR(src), MAC2STR(dst)); in rx_data_tdls_setup_request() 213 wpa_printf(MSG_DEBUG, "TDLS Setup Request " MACSTR " -> " in rx_data_tdls_setup_request() 214 MACSTR, MAC2STR(src), MAC2STR(dst)); in rx_data_tdls_setup_request() 219 wpa_printf(MSG_DEBUG, "TDLS Link Identifier: BSSID " MACSTR in rx_data_tdls_setup_request() [all …]
|
D | sta.c | 50 wpa_printf(MSG_DEBUG, "Discovered new STA " MACSTR " in BSS " MACSTR, in sta_get() 72 "frame from " MACSTR " even though BSS does not " in sta_update_assoc() 81 "frame from " MACSTR " even though BSS does not " in sta_update_assoc() 90 "frame from " MACSTR " even though BSS does not " in sta_update_assoc() 98 "Association Request frame from " MACSTR, in sta_update_assoc() 110 MACSTR, MAC2STR(sta->addr)); in sta_update_assoc() 120 MACSTR, MAC2STR(sta->addr)); in sta_update_assoc() 148 MACSTR " 0x%x BSS " MACSTR " 0x%x", in sta_update_assoc() 155 MACSTR " 0x%x BSS " MACSTR " 0x%x", in sta_update_assoc() 162 MACSTR " 0x%x != BSS " MACSTR " 0x%x", in sta_update_assoc() [all …]
|
D | rx_mgmt.c | 86 MACSTR, MAC2STR(mgmt->sa)); in rx_mgmt_beacon() 98 MACSTR, MAC2STR(mgmt->sa)); in rx_mgmt_beacon() 109 MACSTR, MAC2STR(mgmt->sa)); in rx_mgmt_beacon() 116 add_note(wt, MSG_INFO, "Unexpected MME KeyID %u from " MACSTR, in rx_mgmt_beacon() 132 add_note(wt, MSG_INFO, "BIP replay detected: SA=" MACSTR, in rx_mgmt_beacon() 141 MACSTR, MAC2STR(mgmt->sa)); in rx_mgmt_beacon() 173 "from " MACSTR, MAC2STR(mgmt->sa)); in rx_mgmt_probe_resp() 326 MACSTR, MAC2STR(mgmt->sa)); in rx_mgmt_auth() 335 wpa_printf(MSG_DEBUG, "AUTH " MACSTR " -> " MACSTR in rx_mgmt_auth() 341 add_note(wt, MSG_DEBUG, "STA " MACSTR in rx_mgmt_auth() [all …]
|
D | rx_ip.c | 40 MACSTR, MAC2STR(sta->addr)); in ping_update() 80 add_note(wt, MSG_INFO, "No BSS " MACSTR in rx_data_icmp() 90 add_note(wt, MSG_INFO, "No STA " MACSTR in rx_data_icmp() 138 "IPv4 packet (bssid=" MACSTR " str=" MACSTR in rx_data_ip() 139 " dst=" MACSTR ")", ip.ip_v, MAC2STR(bssid), in rx_data_ip() 145 "IPv4 packet (bssid=" MACSTR " str=" MACSTR in rx_data_ip() 146 " dst=" MACSTR ")", ip.ip_hl, MAC2STR(bssid), in rx_data_ip() 152 "in IPv4 packet (bssid=" MACSTR " str=" MACSTR in rx_data_ip() 153 " dst=" MACSTR ")", ip.ip_hl, (unsigned) len, in rx_data_ip()
|
D | rx_data.c | 230 MACSTR " seq=%u", in check_plaintext_prot() 260 MACSTR " did not have ExtIV bit set to 1", in rx_data_bss_prot_group() 267 add_note(wt, MSG_INFO, "TKIP frame from " MACSTR in rx_data_bss_prot_group() 272 add_note(wt, MSG_INFO, "TKIP frame from " MACSTR in rx_data_bss_prot_group() 280 add_note(wt, MSG_INFO, "CCMP frame from " MACSTR in rx_data_bss_prot_group() 296 "No GTK known to decrypt the frame (A2=" MACSTR in rx_data_bss_prot_group() 314 add_note(wt, MSG_INFO, "replay detected: A1=" MACSTR in rx_data_bss_prot_group() 315 " A2=" MACSTR " A3=" MACSTR in rx_data_bss_prot_group() 366 MACSTR " seq=%u", in rx_data_bss_prot_group() 513 MACSTR " did not have ExtIV bit set to 1", in rx_data_bss_prot() [all …]
|
D | rx_eapol.c | 72 wpa_printf(MSG_DEBUG, "EAPOL-Key 1/4 " MACSTR " -> " MACSTR, in rx_data_eapol_key_1_of_4() 84 add_note(wt, MSG_INFO, "EAPOL-Key 1/4 from " MACSTR in rx_data_eapol_key_1_of_4() 88 add_note(wt, MSG_INFO, "EAPOL-Key 1/4 from " MACSTR in rx_data_eapol_key_1_of_4() 137 wpa_printf(MSG_INFO, "Derived PTK for STA " MACSTR " BSSID " MACSTR, in try_pmk() 174 wpa_printf(MSG_DEBUG, "Trying to derive PTK for " MACSTR " (ver %u)", in derive_ptk() 198 MACSTR " BSSID " MACSTR, in derive_ptk() 252 wpa_printf(MSG_DEBUG, "EAPOL-Key 2/4 " MACSTR " -> " MACSTR, in rx_data_eapol_key_2_of_4() 266 add_note(wt, MSG_INFO, "EAPOL-Key 2/4 from " MACSTR in rx_data_eapol_key_2_of_4() 270 add_note(wt, MSG_INFO, "EAPOL-Key 2/4 from " MACSTR in rx_data_eapol_key_2_of_4() 321 "and (Re)Association Request from " MACSTR, in rx_data_eapol_key_2_of_4() [all …]
|
D | bss.c | 51 wpa_printf(MSG_DEBUG, "Discovered new BSS - " MACSTR, in bss_get() 101 wpa_printf(MSG_INFO, "Add possible PMK for BSSID " MACSTR in bss_add_pmk_from_passphrase() 143 "Invalid or missing SSID in a %s frame for " MACSTR, in bss_update() 153 wpa_printf(MSG_DEBUG, "Store SSID '%s' for BSSID " MACSTR, in bss_update() 163 add_note(wt, MSG_INFO, "BSS " MACSTR in bss_update() 172 wpa_printf(MSG_INFO, "BSS " MACSTR " - OSEN IE " in bss_update() 188 add_note(wt, MSG_INFO, "BSS " MACSTR in bss_update() 197 wpa_printf(MSG_INFO, "BSS " MACSTR " - RSN IE " in bss_update() 209 add_note(wt, MSG_INFO, "BSS " MACSTR in bss_update() 218 wpa_printf(MSG_INFO, "BSS " MACSTR " - WPA IE " in bss_update() [all …]
|
D | ctrl.c | 497 wpa_printf(MSG_INFO, "INJECT: Auth " MACSTR " -> " MACSTR, in ctrl_inject_auth() 500 wpa_printf(MSG_INFO, "INJECT: Auth " MACSTR " -> " MACSTR, in ctrl_inject_auth() 530 "Request available for " MACSTR, in ctrl_inject_assocreq() 535 wpa_printf(MSG_INFO, "INJECT: AssocReq " MACSTR " -> " MACSTR, in ctrl_inject_assocreq() 576 "Request available for " MACSTR, in ctrl_inject_reassocreq() 581 wpa_printf(MSG_INFO, "INJECT: ReassocReq " MACSTR " -> " MACSTR, in ctrl_inject_reassocreq() 614 wpa_printf(MSG_INFO, "INJECT: Deauth " MACSTR " -> " in ctrl_inject_deauth() 615 MACSTR, in ctrl_inject_deauth() 618 wpa_printf(MSG_INFO, "INJECT: Deauth " MACSTR in ctrl_inject_deauth() 621 wpa_printf(MSG_INFO, "INJECT: Deauth " MACSTR " -> " MACSTR, in ctrl_inject_deauth() [all …]
|
/hostap-3.6.0/src/ap/ |
D | gas_query_ap.c | 146 wpa_msg(gas->msg_ctx, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR in gas_query_done() 213 wpa_printf(MSG_DEBUG, "GAS: Unexpected TX status: dst=" MACSTR in gas_query_ap_tx_status() 221 wpa_printf(MSG_DEBUG, "GAS: TX status: dst=" MACSTR in gas_query_ap_tx_status() 264 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u " in gas_query_tx() 265 "freq=%d prot=%d using src addr " MACSTR, in gas_query_tx() 297 MACSTR, MAC2STR(query->addr)); in gas_query_tx_comeback_req() 339 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR, in gas_query_tx_comeback_timeout() 353 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR in gas_query_tx_comeback_req_delay() 367 MACSTR " (dialog_token=%u comeback_delay=%u)", in gas_query_rx_initial() 400 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u " in gas_query_rx_comeback() [all …]
|
D | sta_info.c | 117 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from " in ap_sta_list_del() 148 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR in ap_sta_hash_del() 164 wpa_printf(MSG_DEBUG, "PASN: Free PASN context: " MACSTR, in ap_free_sta_pasn() 292 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR, in ap_free_sta() 433 wpa_printf(MSG_DEBUG, "Removing station " MACSTR, in hostapd_free_stas() 455 wpa_printf(MSG_DEBUG, "%s: %s: " MACSTR " flags=0x%x timeout_next=%d", in ap_handle_timer() 481 MACSTR, MAC2STR(sta->addr)); in ap_handle_timer() 490 "Station " MACSTR " has lost its driver entry", in ap_handle_timer() 499 "Station " MACSTR " has been active %is ago", in ap_handle_timer() 506 "Station " MACSTR " has been " in ap_handle_timer() [all …]
|
D | ap_mlme.c | 58 "MLME-AUTHENTICATE.indication(" MACSTR ", %s)", in mlme_authenticate_indication() 87 "MLME-DEAUTHENTICATE.indication(" MACSTR ", %d)", in mlme_deauthenticate_indication() 110 "MLME-ASSOCIATE.indication(" MACSTR ")", in mlme_associate_indication() 138 "MLME-REASSOCIATE.indication(" MACSTR ")", in mlme_reassociate_indication() 166 "MLME-DISASSOCIATE.indication(" MACSTR ", %d)", in mlme_disassociate_indication() 177 "MLME-MichaelMICFailure.indication(" MACSTR ")", in mlme_michaelmicfailure_indication() 186 "MLME-DELETEKEYS.request(" MACSTR ")", in mlme_deletekeys_request()
|
D | wnm_ap.c | 276 MACSTR " since WNM-Sleep Mode is disabled", in ieee802_11_rx_wnmsleep_req() 284 MACSTR, MAC2STR(addr)); in ieee802_11_rx_wnmsleep_req() 390 MACSTR " dialog_token=%u req_mode=0x%x disassoc_timer=%u " in ieee802_11_send_bss_trans_mgmt_request() 420 MACSTR in ieee802_11_rx_bss_trans_mgmt_query() 428 MACSTR, MAC2STR(addr)); in ieee802_11_rx_bss_trans_mgmt_query() 438 MACSTR " dialog_token=%u reason=%u", in ieee802_11_rx_bss_trans_mgmt_query() 454 wpa_printf(MSG_DEBUG, "%s: Reset steering flag for STA " MACSTR, in ap_sta_reset_steer_flag_timer() 477 MACSTR in ieee802_11_rx_bss_trans_mgmt_resp() 485 MACSTR, MAC2STR(addr)); in ieee802_11_rx_bss_trans_mgmt_resp() 496 MACSTR " dialog_token=%u status_code=%u " in ieee802_11_rx_bss_trans_mgmt_resp() [all …]
|
D | dpp_hostapd.c | 67 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in hostapd_dpp_qr_code() 179 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in hostapd_dpp_auth_resp_retry_timeout() 385 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in hostapd_dpp_pkex_init() 428 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in hostapd_dpp_pkex_retry_timeout() 473 wpa_printf(MSG_DEBUG, "DPP: TX status: dst=" MACSTR " ok=%d", in hostapd_dpp_tx_status() 475 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX_STATUS "dst=" MACSTR in hostapd_dpp_tx_status() 774 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in hostapd_dpp_auth_init_next() 979 wpa_printf(MSG_DEBUG, "DPP: Authentication Request from " MACSTR, in hostapd_dpp_rx_auth_req() 1048 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in hostapd_dpp_rx_auth_req() 1252 DPP_EVENT_TX "dst=" MACSTR " freq=%u type=%d", in hostapd_dpp_gas_resp_cb() [all …]
|
D | rrm.c | 80 wpa_printf(MSG_DEBUG, "Beacon report token %u len %zu from " MACSTR, in hostapd_handle_beacon_report() 90 wpa_msg(hapd->msg_ctx, MSG_INFO, BEACON_RESP_RX MACSTR " %u %02x %s", in hostapd_handle_beacon_report() 235 "NR entry for " MACSTR " exceeds 0xFF bytes", in hostapd_send_nei_report_resp() 349 wpa_printf(MSG_DEBUG, "Radio measurement frame, action %u from " MACSTR, in hostapd_handle_radio_measurement() 450 wpa_printf(MSG_DEBUG, "Request range: dest addr " MACSTR in hostapd_send_range_req() 525 MACSTR, MAC2STR(responders + ETH_ALEN * i)); in hostapd_send_range_req() 592 "Beacon request: " MACSTR " is not connected", in hostapd_send_beacon_req() 602 "Beacon request: " MACSTR in hostapd_send_beacon_req() 612 "Beacon request: " MACSTR in hostapd_send_beacon_req() 622 "Beacon request: " MACSTR in hostapd_send_beacon_req() [all …]
|
/hostap-3.6.0/wpa_supplicant/ |
D | ibss_rsn.c | 69 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR in supp_ether_send() 141 wpa_msg(wpa_s, MSG_INFO, IBSS_RSN_COMPLETED MACSTR, in ibss_check_rsn_completed() 153 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " in supp_set_key() 190 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " in supp_mlme_setprotection() 268 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", in auth_logger() 285 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)", in auth_get_psk() 299 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " in auth_send_eapol() 325 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR in auth_set_key() 394 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port", in ibss_set_sta_authorized() 399 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizing port", in ibss_set_sta_authorized() [all …]
|
D | gas_query.c | 159 wpa_msg(gas->wpa_s, MSG_INFO, GAS_QUERY_DONE "addr=" MACSTR in gas_query_done() 233 MACSTR " result=%d - no query in progress", in gas_query_tx_status() 241 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR in gas_query_tx_status() 285 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u " in gas_query_tx() 286 "freq=%d prot=%d using src addr " MACSTR, in gas_query_tx() 334 MACSTR, MAC2STR(query->addr)); in gas_query_tx_comeback_req() 376 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR, in gas_query_tx_comeback_timeout() 395 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR in gas_query_tx_comeback_req_delay() 409 MACSTR " (dialog_token=%u comeback_delay=%u)", in gas_query_rx_initial() 442 MACSTR " (dialog_token=%u frag_id=%u more_frags=%u " in gas_query_rx_comeback() [all …]
|
D | hs20_supplicant.c | 77 "Not configuring frame filtering - BSS " MACSTR in hs20_configure_frame_filters() 277 MACSTR, MAC2STR(dst)); in hs20_anqp_send_req() 284 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for " in hs20_anqp_send_req() 348 wpa_printf(MSG_DEBUG, "HS20: Get icon " MACSTR " %s @ %u +%u (%u)", in hs20_get_icon() 377 wpa_printf(MSG_DEBUG, "HS20: Free stored icon from " MACSTR in hs20_free_icon_entry() 398 MACSTR, MAC2STR(bssid)); in hs20_del_icon() 401 MACSTR " file name %s", MAC2STR(bssid), file_name); in hs20_del_icon() 479 RX_HS20_ICON MACSTR " %s %u", in hs20_process_icon_binary_file() 486 wpa_msg(wpa_s, MSG_INFO, RX_HS20_ANQP MACSTR " Icon Binary File", in hs20_process_icon_binary_file() 491 "value from " MACSTR, MAC2STR(sa)); in hs20_process_icon_binary_file() [all …]
|
D | bssid_ignore.c | 88 wpa_printf(MSG_INFO, "BSSID " MACSTR in wpa_bssid_ignore_add() 103 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR in wpa_bssid_ignore_add() 132 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR in wpa_bssid_ignore_del() 178 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR in wpa_bssid_ignore_clear() 212 wpa_printf(MSG_INFO, "Removed BSSID " MACSTR in wpa_bssid_ignore_update()
|
D | wmm_ac.c | 97 "WMM AC: Add TS: addr=" MACSTR in wmm_ac_add_ts() 111 "tsid=%d addr=" MACSTR " admitted_time=%d", in wmm_ac_add_ts() 135 "tsid=%d addr=" MACSTR, tsid, MAC2STR(wpa_s->bssid)); in wmm_ac_del_ts_idx() 181 wpa_printf(MSG_DEBUG, "Sending ADDTS Request to " MACSTR, in wmm_ac_send_addts_request() 222 wpa_printf(MSG_DEBUG, "Sending DELTS to " MACSTR, MAC2STR(address)); in wmm_ac_send_delts() 610 wpa_printf(MSG_DEBUG, "WMM AC: TS setup request (addr=" MACSTR in wpas_wmm_ac_addts() 644 MACSTR, tsid, MAC2STR(sa)); in wmm_ac_handle_delts() 656 "TS was deleted successfully (tsid=%u address=" MACSTR ")", in wmm_ac_handle_delts() 715 "WMM AC: adding a new TS with TSID=%u address="MACSTR in wmm_ac_handle_addts_resp() 761 wpa_printf(MSG_DEBUG, "WMM AC: frame destination addr="MACSTR in wmm_ac_rx_action() [all …]
|
D | dpp_supplicant.c | 87 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in wpas_dpp_qr_code() 202 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in wpas_dpp_auth_resp_retry_timeout() 417 DPP_EVENT_TX "dst=" MACSTR " freq=%u type=%d", in wpas_dpp_send_conn_status_result() 457 wpa_printf(MSG_DEBUG, "DPP: TX status: freq=%u dst=" MACSTR in wpas_dpp_tx_status() 459 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX_STATUS "dst=" MACSTR in wpas_dpp_tx_status() 754 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR " freq=%u type=%d", in wpas_dpp_auth_init_next() 1105 wpa_printf(MSG_DEBUG, "DPP: Authentication Request from " MACSTR, in wpas_dpp_rx_auth_req() 1177 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR " freq=%u type=%d", in wpas_dpp_rx_auth_req() 1773 DPP_EVENT_TX "dst=" MACSTR " freq=%u type=%d", in wpas_dpp_gas_resp_cb() 1835 wpa_printf(MSG_DEBUG, "DPP: GAS request to " MACSTR " (freq %u MHz)", in wpas_dpp_start_gas_client() [all …]
|
D | interworking.c | 133 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR in interworking_anqp_resp_cb() 258 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR, in interworking_anqp_send_req() 987 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR in interworking_connect_3gpp() 991 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR, in interworking_connect_3gpp() 1596 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: Connect with " MACSTR in interworking_connect_roaming_consortium() 1600 wpa_msg(wpa_s, MSG_INFO, INTERWORKING_ALREADY_CONNECTED MACSTR, in interworking_connect_roaming_consortium() 1688 MACSTR, MAC2STR(bss->bssid)); in interworking_connect() 1692 wpa_printf(MSG_DEBUG, "Interworking: Considering BSS " MACSTR in interworking_connect() 1784 MACSTR, MAC2STR(bss->bssid)); in interworking_connect() 1793 MACSTR, MAC2STR(bss->bssid)); in interworking_connect() [all …]
|
D | offchannel.c | 142 MACSTR " using interface %s (pending_action_tx=%p)", in wpas_send_action_cb() 210 MACSTR " pending_action_tx=%p)", MAC2STR(dst), in offchannel_send_action_tx_status() 271 MACSTR " src=" MACSTR " bssid=" MACSTR " len=%d", in offchannel_send_action() 279 "frame TX to " MACSTR " (pending_action_tx=%p)", in offchannel_send_action() 301 "Off-channel: Stored pending action frame (dst=" MACSTR in offchannel_send_action()
|
/hostap-3.6.0/src/p2p/ |
D | p2p_invitation.c | 191 p2p_dbg(p2p, "Received Invitation Request from " MACSTR " (freq=%d)", in p2p_process_invitation_req() 199 p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR, in p2p_process_invitation_req() 205 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req() 213 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req() 221 MACSTR, MAC2STR(sa)); in p2p_process_invitation_req() 438 p2p_dbg(p2p, "Received Invitation Response from " MACSTR, in p2p_process_invitation_resp() 444 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() 451 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() 463 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() 509 MACSTR, MAC2STR(sa)); in p2p_process_invitation_resp() [all …]
|
/hostap-3.6.0/src/rsn_supp/ |
D | preauth.c | 66 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); in rsn_preauth_receive() 73 "unexpected source " MACSTR " - dropped", in rsn_preauth_receive() 119 MACSTR " %s", MAC2STR(sm->preauth_bssid), in rsn_preauth_eapol_cb() 133 MACSTR " timed out", MAC2STR(sm->preauth_bssid)); in rsn_preauth_timeout() 190 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); in rsn_preauth_init() 336 "candidate " MACSTR in rsn_preauth_candidate_process() 346 MACSTR " does not need pre-authentication anymore", in rsn_preauth_candidate_process() 439 "candidate " MACSTR " prio %d", MAC2STR(bssid), prio); in pmksa_candidate_add()
|
D | tdls.c | 208 wpa_printf(MSG_INFO, "TDLS: TPK-TK for the peer " MACSTR in wpa_tdls_set_key() 231 wpa_printf(MSG_DEBUG, "TDLS: Configure pairwise key for peer " MACSTR, in wpa_tdls_set_key() 262 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " in wpa_tdls_tpk_send() 289 "retry " MACSTR, MAC2STR(dest)); in wpa_tdls_tpk_send() 652 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR in wpa_tdls_tpk_timeout() 660 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR in wpa_tdls_tpk_timeout() 681 wpa_printf(MSG_ERROR, "TDLS: Could not find peer " MACSTR in wpa_tdls_peer_remove_from_list() 696 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR, in wpa_tdls_peer_clear() 776 "Teardown " MACSTR, MAC2STR(addr)); in wpa_tdls_send_teardown() 782 wpa_printf(MSG_DEBUG, "TDLS: First returning link with " MACSTR in wpa_tdls_send_teardown() [all …]
|