HomeSort by relevance Sort by last modified time
    Searched refs:wpa_printf (Results 101 - 125 of 259) sorted by null

1 2 3 45 6 7 8 91011

  /external/wpa_supplicant_8/src/wps/
wps_upnp_ssdp.c 256 wpa_printf(MSG_INFO, "WPS UPnP: Advertisement sendto "
289 wpa_printf(MSG_MSGDUMP, "WPS UPnP: Advertisement state=%d", a->state);
301 wpa_printf(MSG_ERROR, "WPS UPnP: Advertisement sendto failed:"
308 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_DOWN->UP");
322 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_UP (#%u); "
379 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH stop");
404 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply state=%d (%s:%d)",
417 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply sendto "
426 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply done");
432 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply in %d.%03d sec"
    [all...]
http_server.c 48 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d received",
54 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d could not be received "
67 wpa_printf(MSG_DEBUG, "HTTP: Too many concurrent requests");
136 wpa_printf(MSG_DEBUG, "HTTP: Send %lu byte response to %s:%d",
143 wpa_printf(MSG_DEBUG, "HTTP: Send failed: %s",
146 wpa_printf(MSG_DEBUG, "HTTP: Sent only %d of %lu bytes",
209 wpa_printf(MSG_DEBUG, "HTTP: Failed to accept new connection: "
213 wpa_printf(MSG_DEBUG, "HTTP: Connection from %s:%d",
266 wpa_printf(MSG_DEBUG, "HTTP: Failed to bind server port %d: "
278 wpa_printf(MSG_DEBUG, "HTTP: Started server on %s:%d"
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_pax.c 56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) "
62 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length");
125 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (received)");
128 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in "
135 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - "
144 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short "
152 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A "
173 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to get random data");
187 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-2 (sending)");
241 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (received)")
    [all...]
eap_sake.c 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
76 wpa_printf(MSG_INFO, "EAP-SAKE: No key of correct length "
127 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory "
156 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity");
162 wpa_printf(MSG_INFO, "EAP-SAKE: No AT_PERM_ID_REQ or "
167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity");
175 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID");
198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received "
206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge");
212 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not
    [all...]
eap_vendor_test.c 57 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending "
80 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
87 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
94 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
104 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing "
116 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
eap_eke.c 55 wpa_printf(MSG_DEBUG, "EAP-EKE: %s -> %s",
72 wpa_printf(MSG_INFO, "EAP-EKE: No password configured");
118 wpa_printf(MSG_ERROR, "EAP-EKE: Failed to allocate memory");
165 wpa_printf(MSG_DEBUG, "EAP-EKE: Sending EAP-EKE-Failure/Response - code=0x%x",
201 wpa_printf(MSG_DEBUG, "EAP-EKE: Received EAP-EKE-ID/Request");
204 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data");
216 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data (num_prop=%u)",
225 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u",
248 wpa_printf(MSG_DEBUG, "EAP-EKE: Selected proposal");
253 wpa_printf(MSG_DEBUG, "EAP-EKE: No acceptable proposal found")
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pwd.c 74 wpa_printf(MSG_DEBUG, "EAP-pwd: %s -> %s",
86 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not "
96 wpa_printf(MSG_DEBUG, "EAP-pwd: Selected group number %d",
106 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password "
117 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail");
160 wpa_printf(MSG_DEBUG, "EAP-pwd: ID/Request");
192 wpa_printf(MSG_DEBUG, "EAP-pwd: Commit/Request");
204 wpa_printf(MSG_INFO, "EAP-PWD (server): scalar allocation "
217 wpa_printf(MSG_INFO, "EAP-PWD (server): element allocation "
225 wpa_printf(MSG_INFO, "EAP-PWD (server): element inversion
    [all...]
eap_server_tls.c 47 wpa_printf(MSG_DEBUG, "EAP-TLS: %s -> %s",
64 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
86 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
114 wpa_printf(MSG_ERROR, "EAP-TLS: Failed to allocate memory for "
151 wpa_printf(MSG_DEBUG, "EAP-TLS: %s - unexpected state %d",
162 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
185 wpa_printf(MSG_INFO, "EAP-TLS: Invalid frame");
198 wpa_printf(MSG_DEBUG, "EAP-TLS: Client acknowledged final TLS "
241 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive key");
273 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive EMSK")
    [all...]
eap_server_psk.c 60 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
63 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
74 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to allocate memory "
97 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)");
102 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to allocate memory "
166 wpa_printf(MSG_DEBUG, "EAP-PSK: Unknown state %d in buildReq",
184 wpa_printf(MSG_INFO, "EAP-PSK: Invalid frame");
189 wpa_printf(MSG_DEBUG, "EAP-PSK: received frame: T=%d", t);
192 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-2 - "
198 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-4 -
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
111 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error "
166 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3");
185 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2");
188 wpa_printf(MSG_INFO, "RSN: SMK handshake not allowed for "
195 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M2");
201 wpa_printf(MSG_INFO, "RSN: No RSN IE or MAC address KDE in "
206 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR,
210 wpa_printf(MSG_INFO, "RSN: Too long Initiator RSN IE in SMK "
216 wpa_printf(MSG_INFO, "RSN: Failed to parse RSN IE in SMK M2")
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_build.c 25 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token);
39 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token);
52 wpa_printf(MSG_DEBUG, "P2P: * P2P IE header");
71 wpa_printf(MSG_DEBUG, "P2P: * Capability dev=%02x group=%02x",
82 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u Tie breaker %u",
96 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Regulatory Class %u "
110 wpa_printf(MSG_DEBUG, "P2P: * Operating Channel: Regulatory Class %u "
146 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", status);
202 wpa_printf(MSG_DEBUG, "P2P: * Device Info");
212 wpa_printf(MSG_DEBUG, "P2P: * Device ID: " MACSTR, MAC2STR(dev_addr))
    [all...]
  /external/wpa_supplicant_8/hostapd/
config_file.c 39 wpa_printf(MSG_ERROR, "VLAN file '%s' not readable.", fname);
66 wpa_printf(MSG_ERROR, "Invalid VLAN ID at "
80 wpa_printf(MSG_ERROR, "Invalid VLAN ifname at line %d "
88 wpa_printf(MSG_ERROR, "Out of memory while reading "
130 wpa_printf(MSG_ERROR, "MAC list file '%s' not found.", fname);
151 wpa_printf(MSG_ERROR, "Invalid MAC address '%s' at "
168 wpa_printf(MSG_ERROR, "MAC list reallocation failed");
207 wpa_printf(MSG_ERROR, "EAP user file '%s' not found.", fname);
231 wpa_printf(MSG_ERROR, "Invalid EAP identity (no \" in "
238 wpa_printf(MSG_ERROR, "EAP user allocation failed")
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.c 203 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length");
224 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
230 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
235 wpa_printf(MSG_INFO, "IKEV2: Encryption failed");
261 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length");
267 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted "
287 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
293 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
298 wpa_printf(MSG_INFO, "IKEV2: Decryption failed");
321 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u"
    [all...]
eap_pwd_common.c 116 wpa_printf(MSG_INFO, "EAP-pwd: unsupported group %d", num);
125 wpa_printf(MSG_INFO, "EAP-pwd: unable to create EC_GROUP");
135 wpa_printf(MSG_INFO, "EAP-pwd: unable to create bignums");
141 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp "
146 wpa_printf(MSG_INFO, "EAP-pwd: unable to get order for curve");
150 wpa_printf(MSG_INFO, "EAP-pwd: unable to get cofactor for "
157 wpa_printf(MSG_INFO, "EAP-pwd: unable to malloc space for prf "
165 wpa_printf(MSG_INFO, "EAP-pwd: unable to find random "
239 wpa_printf(MSG_INFO, "EAP-pwd: point is not on curve");
247 wpa_printf(MSG_INFO, "EAP-pwd: cannot
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wnm_sta.c 30 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper);
41 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper);
61 wpa_printf(MSG_DEBUG, "WNM: Request to send WNM-Sleep Mode Request "
106 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for "
136 wpa_printf(MSG_DEBUG, "Failed to send WNM-Sleep Request "
161 wpa_printf(MSG_DEBUG, "TFS Resp IE(s) found");
167 wpa_printf(MSG_DEBUG, "WNM: Fail to set TFS Resp IE");
190 wpa_printf(MSG_DEBUG, "WNM: Invalid Key Data element "
200 wpa_printf(MSG_DEBUG, "WNM: Too short GTK "
207 wpa_printf(MSG_DEBUG, "WNM: Invalid GTK
    [all...]
ctrl_iface_udp.c 67 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d",
83 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached "
107 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
113 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor "
175 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected "
196 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - "
202 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the "
208 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie in the request - "
338 wpa_printf(MSG_DEBUG, "CTRL_IFACE wait for attached "
384 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor send %s:%d"
    [all...]
autoscan.c 77 wpa_printf(MSG_ERROR, "autoscan: Could not find module "
89 wpa_printf(MSG_DEBUG, "autoscan: Initialized module '%s' with "
112 wpa_printf(MSG_DEBUG, "autoscan: Deinitializing module '%s'",
bgscan.c 63 wpa_printf(MSG_ERROR, "bgscan: Could not find module "
72 wpa_printf(MSG_DEBUG, "bgscan: Initialized module '%s' with "
82 wpa_printf(MSG_DEBUG, "bgscan: Deinitializing module '%s'",
interworking.c 188 wpa_printf(MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR,
244 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request");
249 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token "
294 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields");
300 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield");
306 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u",
313 wpa_printf(MSG_DEBUG, "No room for Authentication "
330 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP");
333 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP");
336 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP")
    [all...]
  /hardware/ti/wlan/mac80211/wpa_supplicant_lib/
driver_mac80211.c 104 wpa_printf(MSG_DEBUG, "WEXT: Operstate: linkmode=%d, operstate=%d",
109 wpa_printf(MSG_DEBUG, "WEXT: Sending operstate IFLA failed: "
123 wpa_printf(MSG_MSGDUMP, "WEXT: Custom wireless event: '%s'",
183 wpa_printf(MSG_DEBUG, "WEXT: unrecognized "
213 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: "
239 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: "
337 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d",
362 wpa_printf(MSG_DEBUG, "Wireless event: new AP: "
395 wpa_printf(MSG_DEBUG, "WEXT: Invalid "
404 wpa_printf(MSG_DEBUG, "WEXT: Invalid
    [all...]
driver_mac80211_nl.c 57 wpa_printf(MSG_DEBUG, "%s: set btcoex state to '%c' result = %d", __func__,
85 wpa_printf(MSG_DEBUG, "invalid btcoex mode: %d", mode);
96 wpa_printf(MSG_INFO, "%s: Unsupported command %s", __func__, cmd);
  /external/wpa_supplicant_8/src/drivers/
driver_bsd.c 109 wpa_printf(MSG_ERROR, "ioctl[SIOCS80211, op=%u, val=%u, "
130 wpa_printf(MSG_ERROR, "ioctl[SIOCS80211, op=%u, "
209 wpa_printf(MSG_ERROR, "%s: SIOCGIFMEDIA %s", __func__,
228 wpa_printf(MSG_ERROR, "%s: SIOCSIFMEDIA %s", __func__,
257 wpa_printf(MSG_DEBUG, "%s: key_idx=%d", __func__, key_idx);
260 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__,
329 wpa_printf(MSG_DEBUG, "%s: alg=%d addr=%p key_idx=%d set_tx=%d "
354 wpa_printf(MSG_ERROR, "%s: unknown alg=%d", __func__, alg);
439 wpa_printf(MSG_DEBUG, "%s: group key cipher=%s (%u)",
462 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v)
    [all...]
netlink.c 52 wpa_printf(MSG_INFO, "netlink: recvfrom failed: %s",
74 wpa_printf(MSG_DEBUG, "netlink: %d extra bytes in the end of "
102 wpa_printf(MSG_ERROR, "netlink: Failed to open netlink "
113 wpa_printf(MSG_ERROR, "netlink: Failed to bind netlink "
187 wpa_printf(MSG_DEBUG, "netlink: Operstate: linkmode=%d, operstate=%d",
192 wpa_printf(MSG_DEBUG, "netlink: Sending operstate IFLA "
  /hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/
driver_cmd_wext.c 62 wpa_printf(MSG_DEBUG, "Scan requested - scan timeout %d seconds",
84 wpa_printf(MSG_DEBUG, "%s: Driver stopped", __func__);
88 wpa_printf(MSG_DEBUG, "%s: Start", __func__);
96 wpa_printf(MSG_DEBUG, "For Scan: %s", params->ssids[i].ssid);
124 wpa_printf(MSG_ERROR, "ioctl[SIOCSIWPRIV] (cscan): %d", ret);
138 wpa_printf(MSG_DEBUG, "%s: %s", __func__, cmd);
212 wpa_printf(MSG_ERROR, "%s: drv is NULL. Exiting", __func__);
216 wpa_printf(MSG_ERROR, "%s: drv->ctx is NULL. Exiting", __func__);
221 wpa_printf(MSG_ERROR, "%s: wpa_s->conf is NULL. Exiting", __func__);
238 wpa_printf(MSG_DEBUG, "For PNO Scan: %s", ssid_conf->ssid)
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new_helpers.c 86 wpa_printf(MSG_ERROR, "%s: out of memory creating dbus reply",
93 wpa_printf(MSG_ERROR, "%s: out of memory creating reply",
262 wpa_printf(MSG_DEBUG, "no property handler for %s.%s on %s",
340 wpa_printf(MSG_DEBUG, "no method handler for %s.%s on %s",
388 wpa_printf(MSG_MSGDUMP, "dbus: %s.%s (%s)",
485 wpa_printf(MSG_ERROR, "dbus: Could not set up message "
500 wpa_printf(MSG_ERROR, "dbus: Could not request service name: "
504 wpa_printf(MSG_ERROR, "dbus: Could not request service name: "
513 wpa_printf(MSG_DEBUG, "Providing DBus service '%s'.", dbus_service);
555 wpa_printf(MSG_DEBUG, "dbus: %s", error.message)
    [all...]

Completed in 170 milliseconds

1 2 3 45 6 7 8 91011