HomeSort by relevance Sort by last modified time
    Searched refs:wpa_printf (Results 201 - 225 of 259) sorted by null

1 2 3 4 5 6 7 891011

  /external/wpa_supplicant_8/src/wps/
wps_common.c 68 wpa_printf(MSG_DEBUG, "WPS: Own DH private key not available");
74 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available");
85 wpa_printf(MSG_DEBUG, "WPS: Failed to derive DH shared key");
161 wpa_printf(MSG_DEBUG, "WPS: No Encrypted Settings received");
183 wpa_printf(MSG_DEBUG, "WPS: Invalid PKCS#5 v2.0 pad value");
189 wpa_printf(MSG_DEBUG, "WPS: Invalid PKCS#5 v2.0 pad "
359 wpa_printf(MSG_ERROR, "WPS: Failed to allocate memory for OOB "
380 wpa_printf(MSG_DEBUG, "WPS: Moving to Configured state based "
419 wpa_printf(MSG_ERROR, "WPS: Failed to build NFC password "
442 wpa_printf(MSG_ERROR, "WPS: Failed to parse OOB
    [all...]
wps.c 103 wpa_printf(MSG_DEBUG, "WPS: Failed to parse WPS IE "
106 wpa_printf(MSG_DEBUG, "WPS: No Request Type attribute "
109 wpa_printf(MSG_DEBUG, "WPS: Request Type (from WPS IE "
153 wpa_printf(MSG_DEBUG, "WPS: Full PIN information revealed and "
410 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for (Re)Association "
444 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for (Re)Association "
489 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for Probe Request");
ndef.c 85 wpa_printf(MSG_ERROR, "NDEF : Failed to parse");
94 wpa_printf(MSG_ERROR, "NDEF : Record not found");
120 wpa_printf(MSG_ERROR, "NDEF : Failed to allocate "
  /external/wpa_supplicant_8/src/ap/
ieee802_11_shared.c 55 wpa_printf(MSG_DEBUG, "IEEE 802.11: Sending SA Query Request to "
83 wpa_printf(MSG_DEBUG, "IEEE 802.11: Received SA Query Request from "
90 wpa_printf(MSG_DEBUG, "IEEE 802.11: Ignore SA Query Request "
95 wpa_printf(MSG_DEBUG, "IEEE 802.11: Sending SA Query Response to "
126 wpa_printf(MSG_DEBUG, "IEEE 802.11: Unexpected SA Query "
131 wpa_printf(MSG_DEBUG, "IEEE 802.11: Received SA Query Response from "
140 wpa_printf(MSG_DEBUG, "IEEE 802.11: No matching STA with "
153 wpa_printf(MSG_DEBUG, "IEEE 802.11: No matching SA Query "
ap_config.c 127 wpa_printf(MSG_ERROR, "Failed to allocate memory for "
209 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname);
230 wpa_printf(MSG_ERROR, "Invalid MAC address '%s' on "
238 wpa_printf(MSG_ERROR, "WPA PSK allocation failed");
249 wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'",
267 wpa_printf(MSG_ERROR, "Invalid PSK '%s' on line %d in "
288 wpa_printf(MSG_ERROR, "Unable to alloc space for PSK");
311 wpa_printf(MSG_DEBUG, "Using pre-configured WPA PSK "
314 wpa_printf(MSG_DEBUG, "Deriving WPA PSK based on "
635 wpa_printf(MSG_DEBUG, "Searching a PSK for " MACST
    [all...]
beacon.c 381 wpa_printf(MSG_DEBUG, "Could not parse ProbeReq from " MACSTR,
387 wpa_printf(MSG_DEBUG, "STA " MACSTR " sent probe request "
398 wpa_printf(MSG_MSGDUMP, "P2P: Ignore Probe Request "
411 wpa_printf(MSG_MSGDUMP, "P2P: Ignore Probe Request "
422 wpa_printf(MSG_MSGDUMP, "Probe Request from " MACSTR " for "
449 wpa_printf(MSG_MSGDUMP, "Probe Request from " MACSTR
463 wpa_printf(MSG_MSGDUMP, "Probe Request from " MACSTR
479 wpa_printf(MSG_MSGDUMP, "Probe Request from " MACSTR
492 wpa_printf(MSG_EXCESSIVE, "P2P: Ignore Probe Request from "
505 wpa_printf(MSG_INFO
    [all...]
tkip_countermeasures.c 84 wpa_printf(MSG_DEBUG,
wpa_auth_glue.c 114 wpa_printf(MSG_DEBUG, "%s: WPA authenticator requests disconnect: "
362 wpa_printf(MSG_DEBUG, "FT: Send RRB data directly to "
494 wpa_printf(MSG_DEBUG, "FT: RRB received packet " MACSTR " -> "
545 wpa_printf(MSG_ERROR, "WPA initialization failed.");
550 wpa_printf(MSG_ERROR, "Could not set PrivacyInvoked "
557 wpa_printf(MSG_ERROR, "Failed to configure WPA IE for "
563 wpa_printf(MSG_ERROR, "Initialization of RSN "
577 wpa_printf(MSG_ERROR, "Failed to open l2_packet "
606 wpa_printf(MSG_DEBUG, "Could not disable "
612 wpa_printf(MSG_DEBUG, "Could not remove generic
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_internal.c 172 wpa_printf(MSG_INFO, "TLS: Failed to configure trusted CA "
181 wpa_printf(MSG_INFO, "TLS: Failed to configure client "
191 wpa_printf(MSG_INFO, "TLS: Failed to load private key");
198 wpa_printf(MSG_INFO, "TLS: Failed to load DH parameters");
235 wpa_printf(MSG_INFO, "TLS: Failed to configure trusted CA "
242 wpa_printf(MSG_INFO, "TLS: Failed to configure server "
251 wpa_printf(MSG_INFO, "TLS: Failed to load private key");
257 wpa_printf(MSG_INFO, "TLS: Failed to load DH parameters");
crypto_internal-rsa.c 48 wpa_printf(MSG_DEBUG, "Trying to parse PKCS #1 encoded RSA private "
  /external/wpa_supplicant_8/src/eap_common/
eap_gpsk_common.c 290 wpa_printf(MSG_DEBUG, "EAP-GPSK: Deriving keys (%d:%d)",
302 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to allocate memory "
331 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown cipher %d:%d used in "
364 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown cipher %d used in "
429 wpa_printf(MSG_DEBUG, "EAP-GPSK: Deriving Session ID(%d:%d)",
447 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to allocate memory "
506 wpa_printf(MSG_DEBUG, "EAP-GPSK: Invalid SK length %lu for "
545 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown cipher %d:%d used in "
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ie.c 58 wpa_printf(MSG_WARNING, "Invalid group cipher (%d).",
71 wpa_printf(MSG_WARNING, "Invalid pairwise cipher (%d).",
89 wpa_printf(MSG_WARNING, "Invalid key management type (%d).",
118 wpa_printf(MSG_DEBUG, "RSN: Too short IE buffer (%lu bytes)",
130 wpa_printf(MSG_WARNING, "Invalid group cipher (%d).",
143 wpa_printf(MSG_WARNING, "Invalid pairwise cipher (%d).",
177 wpa_printf(MSG_WARNING, "Invalid key management type (%d).",
373 wpa_printf(MSG_DEBUG, "WPA: EAPOL-Key Key Data "
preauth.c 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr));
63 wpa_printf(MSG_WARNING, "RSN pre-auth frame received from "
183 wpa_printf(MSG_WARNING, "RSN: Failed to initialize L2 packet "
194 wpa_printf(MSG_WARNING, "RSN: Failed to initialize L2 "
203 wpa_printf(MSG_WARNING, "Failed to allocate EAPOL context.");
220 wpa_printf(MSG_WARNING, "RSN: Failed to initialize EAPOL "
359 wpa_printf(MSG_DEBUG, "RSN: Ignored PMKID candidate without "
  /external/wpa_supplicant_8/src/eap_peer/
eap_methods.c 190 wpa_printf(MSG_ERROR, "EAP: Failed to open dynamic EAP method "
198 wpa_printf(MSG_ERROR, "EAP: Invalid EAP method '%s' - no "
206 wpa_printf(MSG_ERROR, "EAP: Failed to add EAP method '%s' - "
215 wpa_printf(MSG_DEBUG, "EAP: Loaded dynamic EAP method: '%s'", so);
eap_fast_pac.c 268 wpa_printf(MSG_INFO, "EAP-FAST: No PAC blob '%s' - "
279 wpa_printf(MSG_INFO, "EAP-FAST: No PAC file '%s' - "
463 wpa_printf(MSG_INFO, "EAP-FAST: %s in '%s:%d'",
468 wpa_printf(MSG_DEBUG, "EAP-FAST: Read %d PAC entries from '%s'",
554 wpa_printf(MSG_INFO, "EAP-FAST: Failed to open PAC "
559 wpa_printf(MSG_INFO, "EAP-FAST: Failed to write all "
596 wpa_printf(MSG_DEBUG, "EAP-FAST: No memory for PAC "
654 wpa_printf(MSG_DEBUG, "EAP-FAST: Wrote %d PAC entries into '%s'",
764 wpa_printf(MSG_INFO, "EAP-FAST: No PAC blob '%s' - "
774 wpa_printf(MSG_INFO, "EAP-FAST: No PAC file '%s' -
    [all...]
  /external/wpa_supplicant_8/src/utils/
wpabuf.c 35 wpa_printf(MSG_ERROR, "wpabuf: invalid magic %x",
39 wpa_printf(MSG_ERROR, "wpabuf %p (size=%lu used=%lu) overflow len=%lu",
62 wpa_printf(MSG_ERROR, "wpabuf: invalid magic %x",
190 wpa_printf(MSG_ERROR, "wpabuf_free: invalid magic %x",
os_unix.c 301 wpa_printf(MSG_INFO, "MEMLEAK[%p]: invalid magic 0x%x "
306 wpa_printf(MSG_INFO, "MEMLEAK[%p]: len %lu",
311 wpa_printf(MSG_INFO, "MEMLEAK: total %lu bytes",
433 wpa_printf(MSG_INFO, "REALLOC[%p]: invalid magic 0x%x%s",
459 wpa_printf(MSG_INFO, "FREE[%p]: invalid magic 0x%x%s",
wpa_debug.h 24 #define wpa_printf(args...) do { } while (0) macro
56 * wpa_printf - conditional printf
66 void wpa_printf(int level, const char *fmt, ...)
172 * configuration. This function is like wpa_printf(), but it also sends the
  /external/wpa_supplicant_8/wpa_supplicant/
ap.c 58 wpa_printf(MSG_ERROR, "Unsupported AP mode frequency: %d MHz",
155 wpa_printf(MSG_ERROR, "No SSID configured for AP mode");
448 wpa_printf(MSG_ERROR, "No SSID configured for AP mode");
454 wpa_printf(MSG_DEBUG, "Setting up AP (SSID='%s')",
487 wpa_printf(MSG_WARNING, "WPA: Failed to select pairwise "
537 wpa_printf(MSG_ERROR, "Failed to create AP configuration");
602 wpa_printf(MSG_ERROR, "Failed to initialize AP interface");
730 wpa_printf(MSG_DEBUG, "No WPS operation in progress at this "
773 wpa_printf(MSG_DEBUG, "WPS: AP PIN timed out");
785 wpa_printf(MSG_DEBUG, "WPS: Enabling AP PIN (timeout=%d)", timeout)
    [all...]
main.c 284 wpa_printf(MSG_ERROR, "Failed to initialize wpa_supplicant");
288 wpa_printf(MSG_INFO, "Successfully initialized "
preauth_test.c 259 wpa_printf(MSG_WARNING, "Failed to get own L2 address\n");
302 wpa_printf(MSG_ERROR, "Failed to register EAP methods");
307 wpa_printf(MSG_ERROR, "Failed to initialize event loop");
wpa_supplicant.c     [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new_handlers.c 59 wpa_printf(MSG_INFO, "dbus: wpas_dbus_error_unknown_error "
968 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: "
991 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ssids "
1004 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ssids "
1015 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: "
1029 wpa_printf(MSG_DEBUG,
1041 wpa_printf(MSG_DEBUG,
1078 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ies must "
1091 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ies must "
1110 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]:
    [all...]
dbus_common.c 247 wpa_printf(MSG_ERROR, "dbus: Failed to set callback "
268 wpa_printf(MSG_DEBUG, "dbus: bus disconnected, terminating");
289 wpa_printf(MSG_ERROR, "dbus: Could not acquire the system "
  /external/wpa_supplicant_8/src/drivers/
driver_hostap.c 151 wpa_printf(MSG_MSGDUMP, "handle_frame: too short (%lu)",
196 wpa_printf(MSG_DEBUG, "CTRL");
199 wpa_printf(MSG_DEBUG, "DATA");
203 wpa_printf(MSG_DEBUG, "unknown frame type %d", type);
255 wpa_printf(MSG_DEBUG, "Opening raw packet socket for ifindex %d",
318 wpa_printf(MSG_ERROR, "hostap_send_eapol - packet len: %lu - "
789 wpa_printf(MSG_DEBUG, "Custom wireless event: '%s'", custom);
796 wpa_printf(MSG_DEBUG,
810 wpa_printf(MSG_DEBUG,
831 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d"
    [all...]

Completed in 1298 milliseconds

1 2 3 4 5 6 7 891011