/external/wpa_supplicant_8/src/ap/ |
vlan_util.c | 40 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d, " 44 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'", 50 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'", 57 wpa_printf(MSG_ERROR, "VLAN: failed to open netlink socket"); 62 wpa_printf(MSG_ERROR, "VLAN: failed to connect to netlink"); 68 wpa_printf(MSG_ERROR, "VLAN: failed to alloc cache"); 74 wpa_printf(MSG_ERROR, "VLAN: interface %s does not exist", 83 wpa_printf(MSG_ERROR, "VLAN: interface %s already exists", 91 wpa_printf(MSG_ERROR, "VLAN: failed to allocate new link"); 96 wpa_printf(MSG_ERROR, "VLAN: failed to set link type") [all...] |
p2p_hostapd.c | 36 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d " 46 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set " 56 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update " 61 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable " 70 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected"); 73 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA"); 81 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected"); 84 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
|
acs.h | 22 wpa_printf(MSG_ERROR, "ACS was disabled on your build, rebuild hostapd with CONFIG_ACS=y or set channel");
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_parse.c | 23 wpa_printf(MSG_EXCESSIVE, "WPS: WFA subelement id=%u len=%u", 28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " 40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " 48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " 56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " 63 wpa_printf(MSG_MSGDUMP, "WPS: Skipped unknown WFA Vendor " 98 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); 110 wpa_printf(MSG_MSGDUMP, "WPS: Unknown Vendor Extension (Vendor ID %u)", 114 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", 120 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension [all...] |
wps_validate.c | 25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " 32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " 44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " 51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " 63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " 70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " 82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " 89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " 101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " 107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag [all...] |
wps_attr_process.c | 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " 30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " 45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); 61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); 68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " 75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); 87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " 92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); 102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); 125 wpa_printf(MSG_DEBUG, "WPS: Credential did not include [all...] |
wps_attr_build.c | 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); 30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); 32 wpa_printf(MSG_DEBUG, 43 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); 45 wpa_printf(MSG_DEBUG, 50 wpa_printf(MSG_DEBUG, 59 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); 65 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " 91 wpa_printf(MSG_DEBUG, "WPS: * Request Type"); 101 wpa_printf(MSG_DEBUG, "WPS: * Response Type (%d)", type) [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_wsc_common.c | 23 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for " 28 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/FRAG_ACK");
|
eap_sake_common.c | 25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); 27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " 34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); 36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " 43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); 45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " 52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " 61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); 66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID") [all...] |
eap_sim_common.c | 82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); 119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " 134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); 147 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); 459 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)"); 462 wpa_printf(MSG_DEBUG, "EAP-AKA': FC = 0x%x", fc); 512 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); 515 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d", 518 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " 524 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow") [all...] |
eap_ikev2_common.c | 58 wpa_printf(MSG_ERROR, "EAP-IKEV2: Failed to allocate memory " 66 wpa_printf(MSG_ERROR, "EAP-IKEV2: Failed to allocate memory " 72 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack"); 89 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 96 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the " 102 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation"); 109 wpa_printf(MSG_INFO, "EAP-IKEV2: Could not calculate ICV"); 114 wpa_printf(MSG_INFO, "EAP-IKEV2: Invalid ICV"); 122 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
|
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.c | 192 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " 219 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " 271 wpa_printf(MSG_DEBUG, "SCARD: file header did not " 285 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV 0x%02x len=%d", 320 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", 333 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", 406 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); 415 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " 421 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record"); 426 wpa_printf(MSG_DEBUG, "SCARD: Failed to read [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_parse.c | 28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " 33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " 39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " 44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, 49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " 54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " 59 wpa_printf(MSG_DEBUG, "P2P: Too short Status " 64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); 68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " 73 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls_common.c | 41 wpa_printf(MSG_INFO, "SSL: Failed to initialize new TLS " 47 wpa_printf(MSG_INFO, "SSL: Failed to configure verification " 125 wpa_printf(MSG_DEBUG, "SSL: Generating Request"); 127 wpa_printf(MSG_ERROR, "SSL: tls_out NULL in %s", __func__); 159 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 167 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 185 wpa_printf(MSG_DEBUG, "SSL: Building ACK"); 196 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow"); 201 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu " 215 wpa_printf(MSG_DEBUG, "SSL: No Message Length field in a [all...] |
ikev2.c | 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); 137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", 145 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); 146 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " 151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); 167 wpa_printf(MSG_DEBUG, "IKEV2: No " 172 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 178 wpa_printf(MSG_DEBUG, "IKEV2: " 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal") [all...] |
/external/wpa_supplicant_8/src/drivers/ |
rfkill.c | 62 wpa_printf(MSG_ERROR, "rfkill: Event read failed: %s", 67 wpa_printf(MSG_DEBUG, "rfkill: Unexpected event size " 72 wpa_printf(MSG_DEBUG, "rfkill: event: idx=%u type=%d " 80 wpa_printf(MSG_INFO, "rfkill: WLAN hard blocked"); 83 wpa_printf(MSG_INFO, "rfkill: WLAN soft blocked"); 86 wpa_printf(MSG_INFO, "rfkill: WLAN unblocked"); 113 wpa_printf(MSG_INFO, "rfkill: Cannot open RFKILL control " 119 wpa_printf(MSG_ERROR, "rfkill: Cannot set non-blocking mode: " 129 wpa_printf(MSG_ERROR, "rfkill: Event read failed: %s", 134 wpa_printf(MSG_DEBUG, "rfkill: Unexpected event size [all...] |
/external/wpa_supplicant_8/src/tls/ |
pkcs8.c | 33 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 " 43 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found " 54 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER"); 61 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the " 74 wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE " 82 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID " 88 wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf); 98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key " 109 wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING " 114 wpa_printf(MSG_DEBUG, "PKCS #8: Try to parse RSAPrivateKey") [all...] |
tlsv1_server_read.c | 41 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " 56 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 62 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); 81 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d", 84 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " 104 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", 152 wpa_printf(MSG_INFO, "TLSv1: No supported cipher suite " 160 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " 183 wpa_printf(MSG_INFO, "TLSv1: Client does not accept NULL " 191 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the [all...] |
tlsv1_record.c | 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " 125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " 227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 241 wpa_printf(MSG_DEBUG, "TLSv1: No room for " 290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - [all...] |
x509v3.c | 50 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p " 197 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 239 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 258 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING " 267 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits", 279 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for " 315 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 333 wpa_printf(MSG_DEBUG, "X509: Expected SET " 346 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 363 wpa_printf(MSG_DEBUG, "X509: Failed to parse [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 142 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); 149 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", 157 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); 158 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " 163 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); 178 wpa_printf(MSG_DEBUG, "IKEV2: No " 184 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 191 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 198 wpa_printf(MSG_DEBUG, "IKEV2: [all...] |
eap_sim.c | 75 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", 92 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data " 104 wpa_printf(MSG_WARNING, "EAP-SIM: Invalid " 111 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of " 152 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm"); 165 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM SIM " 177 wpa_printf(MSG_DEBUG, "EAP-SIM: Use internal GSM-Milenage " 180 wpa_printf(MSG_DEBUG, "EAP-SIM: invalid GSM-Milenage " 198 wpa_printf(MSG_DEBUG, "EAP-SIM: " 222 wpa_printf(MSG_DEBUG, "EAP-SIM: Use hardcoded Kc and SRES [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
offchannel.c | 39 wpa_printf(MSG_DEBUG, "P2P: Use group interface %s " 58 wpa_printf(MSG_DEBUG, "Off-channel: Send Action callback " 79 wpa_printf(MSG_DEBUG, "Off-channel: Pending Action frame TX " 91 wpa_printf(MSG_DEBUG, "Off-channel: Schedule " 96 wpa_printf(MSG_DEBUG, "Off-channel: Failed to " 109 wpa_printf(MSG_DEBUG, "Off-channel: Sending pending Action frame to " 120 wpa_printf(MSG_DEBUG, "Off-channel: Failed to send the " 151 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - " 157 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - " 165 wpa_printf(MSG_DEBUG, "Off-channel: TX status result=%d cb=%p" [all...] |
ctrl_iface_named_pipe.c | 123 wpa_printf(MSG_DEBUG, "CTRL: closing broken pipe %p", 141 wpa_printf(MSG_DEBUG, "CTRL: Open pipe %p", dst); 149 wpa_printf(MSG_ERROR, "CTRL: CreateEvent failed: %d", 176 wpa_printf(MSG_ERROR, "CTRL: CreateNamedPipe failed: %d", 182 wpa_printf(MSG_ERROR, "CTRL: ConnectNamedPipe failed: %d", 192 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: connection in " 196 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: already " 202 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe error: %d", 224 wpa_printf(MSG_DEBUG, "CTRL: close pipe %p", dst); 258 wpa_printf(MSG_DEBUG, "CTRL: Overlapped write completed: dst=%p [all...] |
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 51 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 59 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state); 67 wpa_printf(MSG_DEBUG, "AUTH: RX EAPOL frame"); 78 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 99 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 129 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 145 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 157 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 166 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 188 wpa_printf(MSG_DEBUG, "SUPP: wpa_sm_init() failed") [all...] |