/external/wpa_supplicant_8/src/wps/ |
wps_upnp_ssdp.c | 256 wpa_printf(MSG_INFO, "WPS UPnP: Advertisement sendto " 289 wpa_printf(MSG_MSGDUMP, "WPS UPnP: Advertisement state=%d", a->state); 301 wpa_printf(MSG_ERROR, "WPS UPnP: Advertisement sendto failed:" 308 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_DOWN->UP"); 322 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_UP (#%u); " 379 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH stop"); 404 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply state=%d (%s:%d)", 417 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply sendto " 426 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply done"); 432 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply in %d.%03d sec" [all...] |
http_server.c | 48 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d received", 54 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d could not be received " 67 wpa_printf(MSG_DEBUG, "HTTP: Too many concurrent requests"); 136 wpa_printf(MSG_DEBUG, "HTTP: Send %lu byte response to %s:%d", 143 wpa_printf(MSG_DEBUG, "HTTP: Send failed: %s", 146 wpa_printf(MSG_DEBUG, "HTTP: Sent only %d of %lu bytes", 209 wpa_printf(MSG_DEBUG, "HTTP: Failed to accept new connection: " 213 wpa_printf(MSG_DEBUG, "HTTP: Connection from %s:%d", 266 wpa_printf(MSG_DEBUG, "HTTP: Failed to bind server port %d: " 278 wpa_printf(MSG_DEBUG, "HTTP: Started server on %s:%d" [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_pax.c | 56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " 62 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length"); 125 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (received)"); 128 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in " 135 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - " 144 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short " 152 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A " 173 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to get random data"); 187 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-2 (sending)"); 241 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (received)") [all...] |
eap_sake.c | 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 76 wpa_printf(MSG_INFO, "EAP-SAKE: No key of correct length " 127 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory " 156 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); 162 wpa_printf(MSG_INFO, "EAP-SAKE: No AT_PERM_ID_REQ or " 167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity"); 175 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID"); 198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received " 206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge"); 212 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not [all...] |
eap_vendor_test.c | 57 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending " 80 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 87 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 94 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 104 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing " 116 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
|
eap_eke.c | 55 wpa_printf(MSG_DEBUG, "EAP-EKE: %s -> %s", 72 wpa_printf(MSG_INFO, "EAP-EKE: No password configured"); 118 wpa_printf(MSG_ERROR, "EAP-EKE: Failed to allocate memory"); 165 wpa_printf(MSG_DEBUG, "EAP-EKE: Sending EAP-EKE-Failure/Response - code=0x%x", 201 wpa_printf(MSG_DEBUG, "EAP-EKE: Received EAP-EKE-ID/Request"); 204 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data"); 216 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data (num_prop=%u)", 225 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u", 248 wpa_printf(MSG_DEBUG, "EAP-EKE: Selected proposal"); 253 wpa_printf(MSG_DEBUG, "EAP-EKE: No acceptable proposal found") [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pwd.c | 74 wpa_printf(MSG_DEBUG, "EAP-pwd: %s -> %s", 86 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " 96 wpa_printf(MSG_DEBUG, "EAP-pwd: Selected group number %d", 106 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " 117 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail"); 160 wpa_printf(MSG_DEBUG, "EAP-pwd: ID/Request"); 192 wpa_printf(MSG_DEBUG, "EAP-pwd: Commit/Request"); 204 wpa_printf(MSG_INFO, "EAP-PWD (server): scalar allocation " 217 wpa_printf(MSG_INFO, "EAP-PWD (server): element allocation " 225 wpa_printf(MSG_INFO, "EAP-PWD (server): element inversion [all...] |
eap_server_tls.c | 47 wpa_printf(MSG_DEBUG, "EAP-TLS: %s -> %s", 64 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 86 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 114 wpa_printf(MSG_ERROR, "EAP-TLS: Failed to allocate memory for " 151 wpa_printf(MSG_DEBUG, "EAP-TLS: %s - unexpected state %d", 162 wpa_printf(MSG_DEBUG, "EAP-TLS: Done"); 185 wpa_printf(MSG_INFO, "EAP-TLS: Invalid frame"); 198 wpa_printf(MSG_DEBUG, "EAP-TLS: Client acknowledged final TLS " 241 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive key"); 273 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive EMSK") [all...] |
eap_server_psk.c | 60 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 63 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data"); 74 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to allocate memory " 97 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)"); 102 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to allocate memory " 166 wpa_printf(MSG_DEBUG, "EAP-PSK: Unknown state %d in buildReq", 184 wpa_printf(MSG_INFO, "EAP-PSK: Invalid frame"); 189 wpa_printf(MSG_DEBUG, "EAP-PSK: received frame: T=%d", t); 192 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-2 - " 198 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-4 - [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 111 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error " 166 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3"); 185 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2"); 188 wpa_printf(MSG_INFO, "RSN: SMK handshake not allowed for " 195 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M2"); 201 wpa_printf(MSG_INFO, "RSN: No RSN IE or MAC address KDE in " 206 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, 210 wpa_printf(MSG_INFO, "RSN: Too long Initiator RSN IE in SMK " 216 wpa_printf(MSG_INFO, "RSN: Failed to parse RSN IE in SMK M2") [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_build.c | 25 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token); 39 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token); 52 wpa_printf(MSG_DEBUG, "P2P: * P2P IE header"); 71 wpa_printf(MSG_DEBUG, "P2P: * Capability dev=%02x group=%02x", 82 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u Tie breaker %u", 96 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Regulatory Class %u " 110 wpa_printf(MSG_DEBUG, "P2P: * Operating Channel: Regulatory Class %u " 146 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", status); 202 wpa_printf(MSG_DEBUG, "P2P: * Device Info"); 212 wpa_printf(MSG_DEBUG, "P2P: * Device ID: " MACSTR, MAC2STR(dev_addr)) [all...] |
/external/wpa_supplicant_8/hostapd/ |
config_file.c | 39 wpa_printf(MSG_ERROR, "VLAN file '%s' not readable.", fname); 66 wpa_printf(MSG_ERROR, "Invalid VLAN ID at " 80 wpa_printf(MSG_ERROR, "Invalid VLAN ifname at line %d " 88 wpa_printf(MSG_ERROR, "Out of memory while reading " 130 wpa_printf(MSG_ERROR, "MAC list file '%s' not found.", fname); 151 wpa_printf(MSG_ERROR, "Invalid MAC address '%s' at " 168 wpa_printf(MSG_ERROR, "MAC list reallocation failed"); 207 wpa_printf(MSG_ERROR, "EAP user file '%s' not found.", fname); 231 wpa_printf(MSG_ERROR, "Invalid EAP identity (no \" in " 238 wpa_printf(MSG_ERROR, "EAP user allocation failed") [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 203 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length"); 224 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 230 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 235 wpa_printf(MSG_INFO, "IKEV2: Encryption failed"); 261 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length"); 267 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted " 287 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 293 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 298 wpa_printf(MSG_INFO, "IKEV2: Decryption failed"); 321 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u" [all...] |
eap_pwd_common.c | 116 wpa_printf(MSG_INFO, "EAP-pwd: unsupported group %d", num); 125 wpa_printf(MSG_INFO, "EAP-pwd: unable to create EC_GROUP"); 135 wpa_printf(MSG_INFO, "EAP-pwd: unable to create bignums"); 141 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp " 146 wpa_printf(MSG_INFO, "EAP-pwd: unable to get order for curve"); 150 wpa_printf(MSG_INFO, "EAP-pwd: unable to get cofactor for " 157 wpa_printf(MSG_INFO, "EAP-pwd: unable to malloc space for prf " 165 wpa_printf(MSG_INFO, "EAP-pwd: unable to find random " 239 wpa_printf(MSG_INFO, "EAP-pwd: point is not on curve"); 247 wpa_printf(MSG_INFO, "EAP-pwd: cannot [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wnm_sta.c | 30 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper); 41 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper); 61 wpa_printf(MSG_DEBUG, "WNM: Request to send WNM-Sleep Mode Request " 106 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for " 136 wpa_printf(MSG_DEBUG, "Failed to send WNM-Sleep Request " 161 wpa_printf(MSG_DEBUG, "TFS Resp IE(s) found"); 167 wpa_printf(MSG_DEBUG, "WNM: Fail to set TFS Resp IE"); 190 wpa_printf(MSG_DEBUG, "WNM: Invalid Key Data element " 200 wpa_printf(MSG_DEBUG, "WNM: Too short GTK " 207 wpa_printf(MSG_DEBUG, "WNM: Invalid GTK [all...] |
ctrl_iface_udp.c | 67 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d", 83 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached " 107 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 113 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor " 175 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected " 196 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - " 202 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the " 208 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie in the request - " 338 wpa_printf(MSG_DEBUG, "CTRL_IFACE wait for attached " 384 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor send %s:%d" [all...] |
autoscan.c | 77 wpa_printf(MSG_ERROR, "autoscan: Could not find module " 89 wpa_printf(MSG_DEBUG, "autoscan: Initialized module '%s' with " 112 wpa_printf(MSG_DEBUG, "autoscan: Deinitializing module '%s'",
|
bgscan.c | 63 wpa_printf(MSG_ERROR, "bgscan: Could not find module " 72 wpa_printf(MSG_DEBUG, "bgscan: Initialized module '%s' with " 82 wpa_printf(MSG_DEBUG, "bgscan: Deinitializing module '%s'",
|
interworking.c | 188 wpa_printf(MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR, 244 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request"); 249 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token " 294 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields"); 300 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield"); 306 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u", 313 wpa_printf(MSG_DEBUG, "No room for Authentication " 330 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP"); 333 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP"); 336 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP") [all...] |
/hardware/ti/wlan/mac80211/wpa_supplicant_lib/ |
driver_mac80211.c | 104 wpa_printf(MSG_DEBUG, "WEXT: Operstate: linkmode=%d, operstate=%d", 109 wpa_printf(MSG_DEBUG, "WEXT: Sending operstate IFLA failed: " 123 wpa_printf(MSG_MSGDUMP, "WEXT: Custom wireless event: '%s'", 183 wpa_printf(MSG_DEBUG, "WEXT: unrecognized " 213 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: " 239 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: " 337 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d", 362 wpa_printf(MSG_DEBUG, "Wireless event: new AP: " 395 wpa_printf(MSG_DEBUG, "WEXT: Invalid " 404 wpa_printf(MSG_DEBUG, "WEXT: Invalid [all...] |
driver_mac80211_nl.c | 57 wpa_printf(MSG_DEBUG, "%s: set btcoex state to '%c' result = %d", __func__, 85 wpa_printf(MSG_DEBUG, "invalid btcoex mode: %d", mode); 96 wpa_printf(MSG_INFO, "%s: Unsupported command %s", __func__, cmd);
|
/external/wpa_supplicant_8/src/drivers/ |
driver_bsd.c | 109 wpa_printf(MSG_ERROR, "ioctl[SIOCS80211, op=%u, val=%u, " 130 wpa_printf(MSG_ERROR, "ioctl[SIOCS80211, op=%u, " 209 wpa_printf(MSG_ERROR, "%s: SIOCGIFMEDIA %s", __func__, 228 wpa_printf(MSG_ERROR, "%s: SIOCSIFMEDIA %s", __func__, 257 wpa_printf(MSG_DEBUG, "%s: key_idx=%d", __func__, key_idx); 260 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, 329 wpa_printf(MSG_DEBUG, "%s: alg=%d addr=%p key_idx=%d set_tx=%d " 354 wpa_printf(MSG_ERROR, "%s: unknown alg=%d", __func__, alg); 439 wpa_printf(MSG_DEBUG, "%s: group key cipher=%s (%u)", 462 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v) [all...] |
netlink.c | 52 wpa_printf(MSG_INFO, "netlink: recvfrom failed: %s", 74 wpa_printf(MSG_DEBUG, "netlink: %d extra bytes in the end of " 102 wpa_printf(MSG_ERROR, "netlink: Failed to open netlink " 113 wpa_printf(MSG_ERROR, "netlink: Failed to bind netlink " 187 wpa_printf(MSG_DEBUG, "netlink: Operstate: linkmode=%d, operstate=%d", 192 wpa_printf(MSG_DEBUG, "netlink: Sending operstate IFLA "
|
/hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/ |
driver_cmd_wext.c | 62 wpa_printf(MSG_DEBUG, "Scan requested - scan timeout %d seconds", 84 wpa_printf(MSG_DEBUG, "%s: Driver stopped", __func__); 88 wpa_printf(MSG_DEBUG, "%s: Start", __func__); 96 wpa_printf(MSG_DEBUG, "For Scan: %s", params->ssids[i].ssid); 124 wpa_printf(MSG_ERROR, "ioctl[SIOCSIWPRIV] (cscan): %d", ret); 138 wpa_printf(MSG_DEBUG, "%s: %s", __func__, cmd); 212 wpa_printf(MSG_ERROR, "%s: drv is NULL. Exiting", __func__); 216 wpa_printf(MSG_ERROR, "%s: drv->ctx is NULL. Exiting", __func__); 221 wpa_printf(MSG_ERROR, "%s: wpa_s->conf is NULL. Exiting", __func__); 238 wpa_printf(MSG_DEBUG, "For PNO Scan: %s", ssid_conf->ssid) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_helpers.c | 86 wpa_printf(MSG_ERROR, "%s: out of memory creating dbus reply", 93 wpa_printf(MSG_ERROR, "%s: out of memory creating reply", 262 wpa_printf(MSG_DEBUG, "no property handler for %s.%s on %s", 340 wpa_printf(MSG_DEBUG, "no method handler for %s.%s on %s", 388 wpa_printf(MSG_MSGDUMP, "dbus: %s.%s (%s)", 485 wpa_printf(MSG_ERROR, "dbus: Could not set up message " 500 wpa_printf(MSG_ERROR, "dbus: Could not request service name: " 504 wpa_printf(MSG_ERROR, "dbus: Could not request service name: " 513 wpa_printf(MSG_DEBUG, "Providing DBus service '%s'.", dbus_service); 555 wpa_printf(MSG_DEBUG, "dbus: %s", error.message) [all...] |