HomeSort by relevance Sort by last modified time
    Searched refs:wpa_printf (Results 51 - 75 of 259) sorted by null

1 23 4 5 6 7 8 91011

  /external/wpa_supplicant_8/src/crypto/
tls_nss.c 45 wpa_printf(MSG_DEBUG, "NSS: I/O close");
52 wpa_printf(MSG_DEBUG, "NSS: I/O read(%d)", amount);
59 wpa_printf(MSG_DEBUG, "NSS: I/O write(%d)", amount);
67 wpa_printf(MSG_DEBUG, "NSS: I/O writev(%d)", iov_size);
78 wpa_printf(MSG_DEBUG, "NSS: I/O recv(%d)", amount);
81 wpa_printf(MSG_DEBUG, "NSS: No data available to be read yet");
91 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__);
96 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf",
110 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__);
115 wpa_printf(MSG_ERROR, "NSS: Failed to allocate memory for the
    [all...]
tls_gnutls.c 122 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG,
162 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver);
168 wpa_printf(MSG_INFO, "Untested gnutls version %s - this needs "
220 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__);
225 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf",
262 wpa_printf(MSG_INFO, "TLS: Failed to initialize new TLS "
275 wpa_printf(MSG_ERROR, "GnuTLS: Priority string failure at "
296 wpa_printf(MSG_INFO, "TLS: Failed to setup new TLS connection: %s",
323 wpa_printf(MSG_INFO, "Failed to configure "
379 wpa_printf(MSG_INFO, "GnuTLS: Failed to preparare new session
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ikev2.c 37 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default "
45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found");
75 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
140 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request");
158 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
194 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
201 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
221 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unexpected state %d in
    [all...]
eap_server_md5.c 51 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to get random data");
59 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to allocate memory for "
84 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame");
88 wpa_printf(MSG_INFO, "EAP-MD5: Invalid response "
108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not "
124 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed");
130 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success");
133 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Failure");
  /external/wpa_supplicant_8/src/tls/
asn1.c 31 wpa_printf(MSG_DEBUG, "ASN.1: Identifier "
36 wpa_printf(MSG_MSGDUMP, "ASN.1: Extended tag data: "
46 wpa_printf(MSG_DEBUG, "ASN.1: Reserved length "
53 wpa_printf(MSG_DEBUG, "ASN.1: Too long length field");
58 wpa_printf(MSG_DEBUG, "ASN.1: Length "
70 wpa_printf(MSG_DEBUG, "ASN.1: Contents underflow");
101 wpa_printf(MSG_DEBUG, "ASN.1: Too long OID value");
132 wpa_printf(MSG_DEBUG, "ASN.1: Expected OID - found class %d "
201 wpa_printf(MSG_DEBUG, "X509: %s - some bits ignored "
tlsv1_server_write.c 51 wpa_printf(MSG_DEBUG, "TLSv1: Send ServerHello");
58 wpa_printf(MSG_ERROR, "TLSv1: Could not generate "
67 wpa_printf(MSG_ERROR, "TLSv1: Could not generate "
107 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback "
117 wpa_printf(MSG_DEBUG, "TLSv1: Failed to "
143 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
166 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when "
173 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate");
193 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space "
218 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain
    [all...]
pkcs5.c 60 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to parse OID "
66 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf);
69 wpa_printf(MSG_INFO, "PKCS #5: unsupported encryption "
84 wpa_printf(MSG_DEBUG, "PKCS #5: Expected SEQUENCE "
97 wpa_printf(MSG_DEBUG, "PKCS #5: Expected OCTETSTRING SIZE(8) "
111 wpa_printf(MSG_DEBUG, "PKCS #5: Expected INTEGER - found "
127 wpa_printf(MSG_DEBUG, "PKCS #5: iterationCount=0x%x",
130 wpa_printf(MSG_INFO, "PKCS #5: Unsupported "
180 wpa_printf(MSG_DEBUG, "PKCS #5: Unsupported parameters");
186 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to initialize crypto")
    [all...]
pkcs1.c 34 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer "
57 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get "
68 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type "
149 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB "
158 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature "
167 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature "
177 wpa_printf(MSG_INFO, "LibTomCrypt: Too short signature "
183 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB "
  /hardware/qcom/wlan/qcwcn/wpa_supplicant_8_lib/
driver_cmd_nl80211.c 73 wpa_printf(MSG_ERROR, "%s: failed to issue private commands\n", __func__);
85 wpa_printf(MSG_DEBUG, "%s: %s ", __func__, cmd);
87 wpa_printf(MSG_DEBUG, "%s: P2P: Device address ("MACSTR")",
90 wpa_printf(MSG_DEBUG, "%s: P2P: %s ", __func__, buf);
92 wpa_printf(MSG_DEBUG, "%s: P2P: %s ", __func__, buf);
94 wpa_printf(MSG_DEBUG, "%s %s len = %d, %d", __func__, buf, ret, strlen(buf));
105 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
121 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
146 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new_handlers_wps.c 44 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Role type, "
56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Uknown role %s", val);
75 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Type type, "
87 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown type %s",
108 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Bssid type, "
117 wpa_printf(MSG_DEBUG, "dbus: WPS.Stsrt - Wrong Bssid length "
137 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Pin type, "
161 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong "
171 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong "
206 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - unknown key %s", key)
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 164 wpa_printf(MSG_WARNING, "TDLS: Failed to delete TPK-TK from "
187 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: "
191 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
198 wpa_printf(MSG_WARNING, "TDLS: Failed to set TPK to the "
221 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u "
228 wpa_printf(MSG_INFO, "TDLS: Failed to send message "
245 wpa_printf(MSG_INFO, "TDLS: No matching entry found for "
272 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered "
303 wpa_printf(MSG_INFO, "TDLS: Retrying sending of message "
308 wpa_printf(MSG_INFO, "TDLS: No retry buffer available
    [all...]
wpa_ft.c 29 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key "
82 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x",
177 wpa_printf(MSG_WARNING, "FT: Invalid group cipher (%d)",
192 wpa_printf(MSG_WARNING, "FT: Invalid pairwise cipher (%d)",
211 wpa_printf(MSG_WARNING, "FT: Invalid key management type (%d)",
304 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC");
322 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver.");
325 wpa_printf(MSG_WARNING, "FT: Unsupported pairwise cipher %d",
335 wpa_printf(MSG_WARNING, "FT: Failed to set PTK to the driver");
356 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce")
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_wsc.c 55 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s",
81 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_ssid");
88 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_auth");
98 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_auth");
104 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_encr");
116 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_encr");
131 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_key");
156 wpa_printf(MSG_ERROR, "EAP-WSC: WPS context not available");
187 wpa_printf(MSG_INFO, "EAP-WSC: phase1 configuration data not "
213 wpa_printf(MSG_INFO, "EAP-WSC: PIN or PBC not set in phase1
    [all...]
eap_ttls.c 100 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
116 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL.");
221 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key");
236 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive Session-Id");
263 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected "
313 wpa_printf(MSG_DEBUG, "EAP-TTLS: Start TNC after completed "
321 wpa_printf(MSG_DEBUG, "EAP-TTLS: Unexpected EAP "
328 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected "
361 wpa_printf(MSG_INFO, "EAP-TTLS: failed to initialize "
381 wpa_printf(MSG_INFO, "EAP-TTLS: too short
    [all...]
tncc.c 162 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_ReportMessageTypes(imcID=%lu "
167 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu",
199 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage(imcID=%lu "
238 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_RequestHandshakeRetry");
256 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_LogMessage(imcID=%lu "
266 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_UserMessage(imcID=%lu "
278 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_BindFunction(imcID=%lu, "
330 wpa_printf(MSG_ERROR, "TNC: IMC does not export "
337 wpa_printf(MSG_ERROR, "TNC: IMC does not export "
345 wpa_printf(MSG_ERROR, "TNC: IMC does not export
    [all...]
eap_ikev2.c 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
66 wpa_printf(MSG_INFO, "EAP-IKEV2: No identity available");
122 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
139 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response");
164 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
169 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
203 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
220 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
227 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
236 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes
    [all...]
  /external/wpa_supplicant_8/src/ap/
hw_features.c 92 wpa_printf(MSG_MSGDUMP, "Allowed channel: mode=%d "
148 wpa_printf(MSG_ERROR, "Failed to allocate memory for rate "
167 wpa_printf(MSG_DEBUG, "RATE[%d] rate=%d flags=0x%x",
174 wpa_printf(MSG_ERROR, "No rates remaining in supported/basic "
196 wpa_printf(MSG_DEBUG, "HT40: control channel: %d "
213 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed",
240 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
316 wpa_printf(MSG_INFO, "Switch own primary and secondary "
344 wpa_printf(MSG_INFO, "Switch own primary and "
372 wpa_printf(MSG_DEBUG, "40 MHz affected channel range: [%d,%d] MHz"
    [all...]
wmm.c 113 wpa_printf(MSG_DEBUG, "Too short WMM IE (len=%lu)",
119 wpa_printf(MSG_DEBUG, "Validating WMM IE: OUI %02x:%02x:%02x "
125 wpa_printf(MSG_DEBUG, "Unsupported WMM IE Subtype/Version");
174 wpa_printf(MSG_DEBUG, "WMM: TS Info: UP=%d PSB=%d Direction=%d TID=%d",
177 wpa_printf(MSG_DEBUG, "WMM: Nominal MSDU Size: %d%s",
179 wpa_printf(MSG_DEBUG, "WMM: Mean Data Rate: %u bps",
181 wpa_printf(MSG_DEBUG, "WMM: Minimum PHY Rate: %u bps",
184 wpa_printf(MSG_DEBUG, "WMM: Surplus Bandwidth Allowance: %u.%04u",
189 wpa_printf(MSG_DEBUG, "WMM: Invalid Nominal MSDU Size (0)");
194 wpa_printf(MSG_DEBUG, "WMM: Packets-per-second estimate for TSPEC: %d"
    [all...]
  /external/wpa_supplicant_8/src/radius/
radius_das.c 64 wpa_printf(MSG_INFO, "DAS: Unsupported attribute %u in "
80 wpa_printf(MSG_INFO, "DAS: Invalid Calling-Station-Id "
109 wpa_printf(MSG_INFO, "DAS: NAS mismatch from %s:%d",
114 wpa_printf(MSG_INFO, "DAS: Session not found for request from "
167 wpa_printf(MSG_ERROR, "DAS: recvfrom: %s", strerror(errno));
174 wpa_printf(MSG_DEBUG, "DAS: Received %d bytes from %s:%d",
177 wpa_printf(MSG_DEBUG, "DAS: Drop message from unknown client");
183 wpa_printf(MSG_DEBUG, "DAS: Parsing incoming RADIUS packet "
193 wpa_printf(MSG_DEBUG, "DAS: Invalid authenticator in packet "
204 wpa_printf(MSG_DEBUG, "DAS: Unacceptable
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
bgscan_simple.c 51 wpa_printf(MSG_DEBUG, "bgscan simple: Request a background scan");
53 wpa_printf(MSG_DEBUG, "bgscan simple: Failed to trigger scan");
66 wpa_printf(MSG_DEBUG, "bgscan simple: Backing "
100 wpa_printf(MSG_ERROR, "bgscan simple: Missing scan interval "
131 wpa_printf(MSG_DEBUG, "bgscan simple: Signal strength threshold %d "
138 wpa_printf(MSG_ERROR, "bgscan simple: Failed to enable "
151 wpa_printf(MSG_DEBUG, "bgscan simple: Init scan interval: %d",
183 wpa_printf(MSG_DEBUG, "bgscan simple: scan result notification");
202 wpa_printf(MSG_DEBUG, "bgscan simple: beacon loss");
220 wpa_printf(MSG_DEBUG, "bgscan simple: signal level changed
    [all...]
gas_query.c 133 wpa_printf(MSG_DEBUG, "GAS: No memory to store the response");
145 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u "
170 wpa_printf(MSG_DEBUG, "GAS: Failed to send Action frame to "
184 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR,
198 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR
211 wpa_printf(MSG_DEBUG, "GAS: Received initial response from "
243 wpa_printf(MSG_DEBUG, "GAS: Received comeback response from "
252 wpa_printf(MSG_DEBUG, "GAS: Advertisement Protocol changed "
261 wpa_printf(MSG_DEBUG, "GAS: Invalid comeback response "
272 wpa_printf(MSG_DEBUG, "GAS: Unexpected frag_id in response
    [all...]
autoscan_periodic.c 54 wpa_printf(MSG_DEBUG, "autoscan periodic: interval is %d",
74 wpa_printf(MSG_DEBUG, "autoscan periodic: scan result notification");
ctrl_iface_unix.c 117 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
153 wpa_printf(MSG_ERROR, "recvfrom(ctrl_iface): %s",
328 wpa_printf(MSG_DEBUG, "Using existing control "
331 wpa_printf(MSG_ERROR, "mkdir[ctrl_interface=%s]: %s",
347 wpa_printf(MSG_ERROR, "CTRL: Could not chmod directory: %s",
358 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d"
365 wpa_printf(MSG_ERROR, "CTRL: Invalid group "
370 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d",
376 wpa_printf(MSG_ERROR, "chown[ctrl_interface=%s,gid=%d]: %s",
384 wpa_printf(MSG_ERROR, "CTRL: chmod[ctrl_interface]: %s"
    [all...]
ibss_rsn.c 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
84 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
112 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
161 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK");
183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
192 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
198 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__);
223 wpa_printf(MSG_DEBUG, "SUPP: wpa_sm_init() failed");
238 wpa_printf(MSG_DEBUG, "SUPP: wpa_sm_set_assoc_wpa_ie_default()
    [all...]
  /external/wpa_supplicant_8/src/l2_packet/
l2_packet_ndis.c 134 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Wait for pending "
140 wpa_printf(MSG_DEBUG, "L2(NDISUIO): "
148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d",
164 wpa_printf(MSG_MSGDUMP, "l2_packet_rx_thread: -> ReadFile");
168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: "
181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet",
203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started");
228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received "
237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: "
245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped")
    [all...]

Completed in 295 milliseconds

1 23 4 5 6 7 8 91011