HomeSort by relevance Sort by last modified time
    Searched refs:wpa_printf (Results 1 - 25 of 279) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/hostapd/
hapd_module_tests.c 15 wpa_printf(MSG_INFO, "hostapd module tests");
  /external/wpa_supplicant_8/src/ap/
vlan_util.c 40 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d, "
44 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'",
50 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'",
57 wpa_printf(MSG_ERROR, "VLAN: failed to open netlink socket");
62 wpa_printf(MSG_ERROR, "VLAN: failed to connect to netlink");
68 wpa_printf(MSG_ERROR, "VLAN: failed to alloc cache");
74 wpa_printf(MSG_ERROR, "VLAN: interface %s does not exist",
83 wpa_printf(MSG_ERROR, "VLAN: interface %s already exists",
91 wpa_printf(MSG_ERROR, "VLAN: failed to allocate new link");
96 wpa_printf(MSG_ERROR, "VLAN: failed to set link type")
    [all...]
acs.h 21 wpa_printf(MSG_ERROR, "ACS was disabled on your build, rebuild hostapd with CONFIG_ACS=y or set channel");
p2p_hostapd.c 36 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d "
46 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set "
56 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update "
61 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable "
70 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected");
73 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA");
81 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected");
84 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
  /external/wpa_supplicant_8/src/wps/
wps_attr_parse.c 23 wpa_printf(MSG_EXCESSIVE, "WPS: WFA subelement id=%u len=%u",
28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length "
40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key "
48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll "
56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay "
64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u",
71 wpa_printf(MSG_MSGDUMP, "WPS: Skipped unknown WFA Vendor "
106 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension");
118 wpa_printf(MSG_MSGDUMP, "WPS: Unknown Vendor Extension (Vendor ID %u)",
122 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)"
    [all...]
wps_validate.c 25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute "
32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute "
44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute "
51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute "
63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type "
70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type "
82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type "
89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type "
101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual "
107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag
    [all...]
wps_attr_process.c 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute "
30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for "
45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator");
61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute");
68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the "
75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA");
87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include "
92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx);
102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID");
125 wpa_printf(MSG_DEBUG, "WPS: Credential did not include
    [all...]
wps_attr_build.c 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key");
30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys");
32 wpa_printf(MSG_DEBUG,
50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys");
52 wpa_printf(MSG_DEBUG,
57 wpa_printf(MSG_DEBUG,
66 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys");
72 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize "
98 wpa_printf(MSG_DEBUG, "WPS: * Request Type");
108 wpa_printf(MSG_DEBUG, "WPS: * Response Type (%d)", type)
    [all...]
wps_enrollee.c 26 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)",
48 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for "
53 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1");
69 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2");
85 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1");
95 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2");
114 wpa_printf(MSG_DEBUG, "WPS: Building Message M1");
170 wpa_printf(MSG_DEBUG, "WPS: Building Message M3");
173 wpa_printf(MSG_DEBUG, "WPS: No Device Password available");
179 wpa_printf(MSG_INFO
    [all...]
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_secy_ops.c 33 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
39 wpa_printf(MSG_ERROR,
53 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
59 wpa_printf(MSG_ERROR,
74 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
80 wpa_printf(MSG_ERROR,
102 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
108 wpa_printf(MSG_ERROR,
123 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__);
129 wpa_printf(MSG_ERROR
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_wsc_common.c 23 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for "
28 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/FRAG_ACK");
eap_ikev2_common.c 57 wpa_printf(MSG_ERROR, "EAP-IKEV2: Failed to allocate memory "
62 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack");
79 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
86 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the "
92 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation");
99 wpa_printf(MSG_INFO, "EAP-IKEV2: Could not calculate ICV");
104 wpa_printf(MSG_INFO, "EAP-IKEV2: Invalid ICV");
112 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
eap_sake_common.c 25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S");
27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with "
34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P");
36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with "
43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S");
45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with "
52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P");
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with "
61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID");
66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID")
    [all...]
eap_sim_common.c 82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys");
119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null "
134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth");
147 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys");
459 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)");
462 wpa_printf(MSG_DEBUG, "EAP-AKA': FC = 0x%x", fc);
512 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)");
515 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d",
518 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow "
524 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow")
    [all...]
  /external/wpa_supplicant_8/src/utils/
browser-system.c 24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to "
38 wpa_printf(MSG_INFO, "Browser response received: %s", url);
73 wpa_printf(MSG_INFO, "Launching Android browser to %s", url);
79 wpa_printf(MSG_ERROR, "Too long URL");
84 wpa_printf(MSG_ERROR, "eloop_init failed");
90 wpa_printf(MSG_ERROR, "http_server_init failed");
96 wpa_printf(MSG_INFO, "Failed to launch browser");
browser-android.c 24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to "
38 wpa_printf(MSG_INFO, "Browser response received: %s", url);
73 wpa_printf(MSG_INFO, "Launching Android browser to %s", url);
81 wpa_printf(MSG_ERROR, "Too long URL");
86 wpa_printf(MSG_ERROR, "eloop_init failed");
92 wpa_printf(MSG_ERROR, "http_server_init failed");
98 wpa_printf(MSG_INFO, "Failed to launch Android browser");
111 wpa_printf(MSG_INFO, "Closing Android browser");
113 wpa_printf(MSG_INFO, "Failed to inject keyevent");
browser-wpadebug.c 24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to "
38 wpa_printf(MSG_INFO, "Browser response received: %s", url);
74 wpa_printf(MSG_INFO, "Launching wpadebug browser to %s", url);
84 wpa_printf(MSG_ERROR, "Too long URL");
89 wpa_printf(MSG_ERROR, "eloop_init failed");
95 wpa_printf(MSG_ERROR, "http_server_init failed");
101 wpa_printf(MSG_INFO, "Failed to launch wpadebug browser");
114 wpa_printf(MSG_INFO, "Closing Android browser");
120 wpa_printf(MSG_INFO, "Failed to close wpadebug browser");
pcsc_funcs.c 192 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll "
219 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from "
271 wpa_printf(MSG_DEBUG, "SCARD: file header did not "
285 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV 0x%02x len=%d",
320 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d",
333 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x",
406 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR");
415 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR "
421 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record");
426 wpa_printf(MSG_DEBUG, "SCARD: Failed to read
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
offchannel.c 40 wpa_printf(MSG_DEBUG, "P2P: Use group interface %s "
59 wpa_printf(MSG_DEBUG,
81 wpa_printf(MSG_DEBUG, "Off-channel: Pending Action frame TX "
93 wpa_printf(MSG_DEBUG, "Off-channel: Schedule "
98 wpa_printf(MSG_DEBUG, "Off-channel: Failed to "
111 wpa_printf(MSG_DEBUG, "Off-channel: Sending pending Action frame to "
122 wpa_printf(MSG_DEBUG, "Off-channel: Failed to send the "
153 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - "
159 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - "
168 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status -
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_parse.c 28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability "
33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x "
39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID "
44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR,
49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent "
54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u "
59 wpa_printf(MSG_DEBUG, "P2P: Too short Status "
64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]);
68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore "
73 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel
    [all...]
  /external/wpa_supplicant_8/hs20/client/
spp_client.c 55 wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')",
64 wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err);
150 wpa_printf(MSG_INFO, "Processing updateNode");
155 wpa_printf(MSG_INFO, "No managementTreeURI present");
158 wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri);
162 wpa_printf(MSG_INFO, "Unexpected URI");
167 wpa_printf(MSG_INFO, "Update interior node: '%s'", name);
171 wpa_printf(MSG_INFO, "Could not extract MO text");
175 wpa_printf(MSG_DEBUG, "[hs20] nodeContainer text: '%s'", str);
182 wpa_printf(MSG_DEBUG, "[hs20] Removing extra CDATA container")
    [all...]
  /external/wpa_supplicant_8/src/drivers/
rfkill.c 62 wpa_printf(MSG_ERROR, "rfkill: Event read failed: %s",
67 wpa_printf(MSG_DEBUG, "rfkill: Unexpected event size "
72 wpa_printf(MSG_DEBUG, "rfkill: event: idx=%u type=%d "
80 wpa_printf(MSG_INFO, "rfkill: WLAN hard blocked");
83 wpa_printf(MSG_INFO, "rfkill: WLAN soft blocked");
86 wpa_printf(MSG_INFO, "rfkill: WLAN unblocked");
113 wpa_printf(MSG_INFO, "rfkill: Cannot open RFKILL control "
119 wpa_printf(MSG_ERROR, "rfkill: Cannot set non-blocking mode: "
129 wpa_printf(MSG_ERROR, "rfkill: Event read failed: %s",
134 wpa_printf(MSG_DEBUG, "rfkill: Unexpected event size
    [all...]
  /external/wpa_supplicant_8/src/tls/
pkcs8.c 33 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 "
43 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found "
54 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER");
61 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the "
74 wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE "
82 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID "
88 wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf);
98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key "
109 wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING "
114 wpa_printf(MSG_DEBUG, "PKCS #8: Try to parse RSAPrivateKey")
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
130 wpa_printf(MSG_INFO, "IKEV2: Too short transform");
137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d",
145 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
146 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type");
167 wpa_printf(MSG_DEBUG, "IKEV2: No "
172 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
178 wpa_printf(MSG_DEBUG, "IKEV2: "
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal")
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.c 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
125 wpa_printf(MSG_INFO, "IKEV2: Too short transform");
132 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d",
140 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
141 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
146 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type");
161 wpa_printf(MSG_DEBUG, "IKEV2: No "
166 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
172 wpa_printf(MSG_DEBUG, "IKEV2: "
208 wpa_printf(MSG_INFO, "IKEV2: Too short proposal")
    [all...]

Completed in 238 milliseconds

1 2 3 4 5 6 7 8 91011>>