/external/wpa_supplicant_8/wpa_supplicant/ |
gas_query.c | 197 wpa_printf(MSG_DEBUG, "GAS: No memory to store the response"); 216 wpa_printf(MSG_DEBUG, "GAS: Unexpected TX status: freq=%u dst=" 225 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR 229 wpa_printf(MSG_DEBUG, "GAS: TX status for unexpected destination"); 262 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u " 296 wpa_printf(MSG_DEBUG, "GAS: Failed to send Action frame to " 310 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR, 324 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR 337 wpa_printf(MSG_DEBUG, "GAS: Received initial response from " 369 wpa_printf(MSG_DEBUG, "GAS: Received comeback response from [all...] |
hs20_supplicant.c | 199 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for " 208 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request"); 212 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token " 237 wpa_printf(MSG_DEBUG, "HS 2.0: Download Status Code %u", *pos); 268 wpa_printf(MSG_DEBUG, "Icon Binary Data: %u bytes", data_len); 310 wpa_printf(MSG_DEBUG, "HS 2.0: Icon fetch dur=%d ms res=%d", 423 wpa_printf(MSG_DEBUG, "HS20: Unsupported subtype %u", subtype); 528 wpa_printf(MSG_DEBUG, "HS 2.0: Ready to fetch next icon"); 537 wpa_printf(MSG_DEBUG, "HS 2.0: Try to fetch icon '%s' " 552 wpa_printf(MSG_DEBUG, "HS 2.0: No more icons to fetch") [all...] |
interworking.c | 125 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR 248 wpa_printf(MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR, 310 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request"); 316 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token " 360 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields"); 366 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield"); 372 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u", 379 wpa_printf(MSG_DEBUG, "No room for Authentication " 396 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP"); 399 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP") [all...] |
/external/wpa_supplicant_8/src/ap/ |
hw_features.c | 130 wpa_printf(MSG_MSGDUMP, "Allowed channel: mode=%d " 187 wpa_printf(MSG_ERROR, "Failed to allocate memory for rate " 206 wpa_printf(MSG_DEBUG, "RATE[%d] rate=%d flags=0x%x", 213 wpa_printf(MSG_ERROR, "No rates remaining in supported/basic " 235 wpa_printf(MSG_DEBUG, "HT40: control channel: %d " 252 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 279 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed", 355 wpa_printf(MSG_INFO, "Switch own primary and secondary " 384 wpa_printf(MSG_INFO, "Switch own primary and " 409 wpa_printf(MSG_DEBUG, "Found overlapping legacy BSS: [all...] |
hostapd.c | 83 wpa_printf(MSG_ERROR, "Failed to re-configure WPA PSK " 102 wpa_printf(MSG_ERROR, "Failed to configure WPA IE for " 118 wpa_printf(MSG_ERROR, "Could not set SSID for kernel driver"); 121 wpa_printf(MSG_DEBUG, "Reconfigured interface %s", hapd->conf->iface); 206 wpa_printf(MSG_DEBUG, "Failed to clear default " 217 wpa_printf(MSG_DEBUG, "Failed to clear " 245 wpa_printf(MSG_WARNING, "Could not set WEP encryption."); 256 wpa_printf(MSG_ERROR, "%s: Interface %s wasn't started", 262 wpa_printf(MSG_DEBUG, "%s(%s)", __func__, hapd->conf->iface); 283 wpa_printf(MSG_WARNING [all...] |
wnm_ap.c | 28 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper); 38 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper); 65 wpa_printf(MSG_DEBUG, "%s: station not found", __func__); 94 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for " 114 wpa_printf(MSG_DEBUG, "Pass 4, gtk_len = %d", 125 wpa_printf(MSG_DEBUG, "Pass 4 igtk_len = %d", 148 wpa_printf(MSG_DEBUG, "Successfully send WNM-Sleep Response " 180 wpa_printf(MSG_DEBUG, "Fail to send WNM-Sleep Response frame"); 214 wpa_printf(MSG_DEBUG, "WNM: EID %d not recognized", 220 wpa_printf(MSG_DEBUG, "No WNM-Sleep IE found") [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 160 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response"); 193 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated " 203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated " 211 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to derive " 222 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d " 251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); 253 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data " 262 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length " 269 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge" 277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the [all...] |
eap_fast.c | 80 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); 84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall " 88 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a " 99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for " 123 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning " 132 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu", 139 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC " 177 wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL."); 185 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set SessionTicket " 197 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS [all...] |
eap_eke.c | 59 wpa_printf(MSG_DEBUG, "EAP-EKE: %s -> %s", 77 wpa_printf(MSG_INFO, "EAP-EKE: No password configured"); 104 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced dhgroup %u", 111 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced encr %u", 118 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u", 125 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced mac %u", 156 wpa_printf(MSG_ERROR, "EAP-EKE: Failed to allocate memory"); 203 wpa_printf(MSG_DEBUG, "EAP-EKE: Sending EAP-EKE-Failure/Response - code=0x%x", 239 wpa_printf(MSG_DEBUG, "EAP-EKE: Received EAP-EKE-ID/Request"); 242 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data") [all...] |
eap_pax.c | 56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " 62 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length"); 125 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (received)"); 128 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in " 135 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - " 144 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short " 152 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A " 173 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to get random data"); 187 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-2 (sending)"); 241 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (received)") [all...] |
eap_sake.c | 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 76 wpa_printf(MSG_INFO, "EAP-SAKE: No key of correct length " 127 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory " 156 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); 162 wpa_printf(MSG_INFO, "EAP-SAKE: No AT_PERM_ID_REQ or " 167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity"); 175 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID"); 198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received " 206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge"); 212 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_common.c | 36 wpa_printf(MSG_INFO, "EAP: Too short EAP frame"); 42 wpa_printf(MSG_INFO, "EAP: Invalid EAP length"); 84 wpa_printf(MSG_INFO, "EAP: Invalid expanded EAP " 94 wpa_printf(MSG_INFO, "EAP: Invalid expanded frame " 103 wpa_printf(MSG_INFO, "EAP: Invalid frame type");
|
/external/wpa_supplicant_8/src/wps/ |
http_server.c | 48 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d received", 54 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d could not be received " 67 wpa_printf(MSG_DEBUG, "HTTP: Too many concurrent requests"); 136 wpa_printf(MSG_DEBUG, "HTTP: Send %lu byte response to %s:%d", 143 wpa_printf(MSG_DEBUG, "HTTP: Send failed: %s", 146 wpa_printf(MSG_DEBUG, "HTTP: Sent only %d of %lu bytes", 209 wpa_printf(MSG_DEBUG, "HTTP: Failed to accept new connection: " 213 wpa_printf(MSG_DEBUG, "HTTP: Connection from %s:%d", 249 wpa_printf(MSG_DEBUG, 276 wpa_printf(MSG_DEBUG, "HTTP: Failed to bind server port %d: [all...] |
wps_er_ssdp.c | 42 wpa_printf(MSG_DEBUG, "WPS ER: Received SSDP from %s", 97 wpa_printf(MSG_DEBUG, "WPS ER: " 121 wpa_printf(MSG_DEBUG, "WPS ER: AP discovered: %s " 154 wpa_printf(MSG_DEBUG, "WPS ER: M-SEARCH sendto failed: " 164 wpa_printf(MSG_INFO, "WPS ER: Failed to add routing entry for " 173 wpa_printf(MSG_INFO, "WPS ER: Failed to open multicast socket " 180 wpa_printf(MSG_INFO, "WPS ER: Failed to open SSDP listener "
|
wps_upnp_ssdp.c | 258 wpa_printf(MSG_INFO, "WPS UPnP: Advertisement sendto " 291 wpa_printf(MSG_MSGDUMP, "WPS UPnP: Advertisement state=%d", a->state); 303 wpa_printf(MSG_ERROR, "WPS UPnP: Advertisement sendto failed:" 310 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_DOWN->UP"); 324 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_UP (#%u); " 381 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH stop"); 406 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply state=%d (%s:%d)", 419 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply sendto " 428 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply done"); 434 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply in %d.%03d sec" [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_eke.c | 61 wpa_printf(MSG_DEBUG, "EAP-EKE: %s -> %s", 70 wpa_printf(MSG_DEBUG, "EAP-EKE: Failure - code 0x%x", code); 122 wpa_printf(MSG_ERROR, "EAP-EKE: Failed to allocate memory"); 166 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Failure: Failure-Code=0x%x", 187 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Identity"); 245 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Commit"); 248 wpa_printf(MSG_INFO, "EAP-EKE: Password with not configured"); 257 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive key"); 278 wpa_printf(MSG_INFO, "EAP-EKE: Failed to initialize DH"); 286 wpa_printf(MSG_INFO, "EAP-EKE: Failed to build DHComponent_S") [all...] |
eap_server_pwd.c | 75 wpa_printf(MSG_DEBUG, "EAP-pwd: %s -> %s", 87 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " 97 wpa_printf(MSG_DEBUG, "EAP-pwd: Selected group number %d", 107 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " 118 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail"); 164 wpa_printf(MSG_DEBUG, "EAP-pwd: ID/Request"); 196 wpa_printf(MSG_DEBUG, "EAP-pwd: Commit/Request"); 208 wpa_printf(MSG_INFO, "EAP-PWD (server): scalar allocation " 218 wpa_printf(MSG_INFO, 225 wpa_printf(MSG_INFO, "EAP-PWD (server): element allocation [all...] |
eap_sim_db.c | 98 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for " 101 wpa_printf(MSG_ERROR, "EAP-SIM DB: SQLite error: %s", err); 124 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for " 127 wpa_printf(MSG_ERROR, "EAP-SIM DB: SQLite error: %s", err); 141 wpa_printf(MSG_ERROR, "EAP-SIM DB: Failed to open database " 193 wpa_printf(MSG_ERROR, "EAP-SIM DB: SQLite error: %s", err); 293 wpa_printf(MSG_ERROR, "EAP-SIM DB: SQLite error: %s", err); 415 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the " 422 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported " 467 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers_wps.c | 44 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Role type, " 56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Uknown role %s", val); 75 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Type type, " 87 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown type %s", 108 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Bssid type, " 117 wpa_printf(MSG_DEBUG, "dbus: WPS.Stsrt - Wrong Bssid length " 137 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Pin type, " 161 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong " 171 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong " 206 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - unknown key %s", key) [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_build.c | 24 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token); 37 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token); 49 wpa_printf(MSG_DEBUG, "P2P: * P2P IE header"); 68 wpa_printf(MSG_DEBUG, "P2P: * Capability dev=%02x group=%02x", 79 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u Tie breaker %u", 93 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Regulatory Class %u " 107 wpa_printf(MSG_DEBUG, "P2P: * Operating Channel: Regulatory Class %u " 143 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", status); 199 wpa_printf(MSG_DEBUG, "P2P: * Device Info"); 209 wpa_printf(MSG_DEBUG, "P2P: * Device ID: " MACSTR, MAC2STR(dev_addr)) [all...] |
/external/wpa_supplicant_8/hostapd/ |
config_file.c | 44 wpa_printf(MSG_ERROR, "VLAN file '%s' not readable.", fname); 71 wpa_printf(MSG_ERROR, "Invalid VLAN ID at " 85 wpa_printf(MSG_ERROR, "Invalid VLAN ifname at line %d " 93 wpa_printf(MSG_ERROR, "Out of memory while reading " 135 wpa_printf(MSG_ERROR, "MAC list file '%s' not found.", fname); 163 wpa_printf(MSG_ERROR, "Invalid MAC address '%s' at " 193 wpa_printf(MSG_ERROR, "MAC list reallocation failed"); 232 wpa_printf(MSG_ERROR, "EAP user file '%s' not found.", fname); 258 wpa_printf(MSG_ERROR, "Invalid radius_auth_req_attr: %s", 278 wpa_printf(MSG_ERROR, "Invalid EAP identity (no \" in [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_write.c | 58 wpa_printf(MSG_ERROR, "TLSv1: Could not generate " 67 wpa_printf(MSG_ERROR, "TLSv1: Could not generate " 116 wpa_printf(MSG_DEBUG, "TLSv1: Failed to " 142 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 165 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when " 192 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " 217 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain " 227 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); 261 wpa_printf(MSG_DEBUG, "TLSv1: No ServerKeyExchange needed"); 266 wpa_printf(MSG_DEBUG, "TLSv1: ServerKeyExchange not yet [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 111 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error " 166 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3"); 185 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2"); 188 wpa_printf(MSG_INFO, "RSN: SMK handshake not allowed for " 195 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M2"); 201 wpa_printf(MSG_INFO, "RSN: No RSN IE or MAC address KDE in " 206 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, 210 wpa_printf(MSG_INFO, "RSN: Too long Initiator RSN IE in SMK " 216 wpa_printf(MSG_INFO, "RSN: Failed to parse RSN IE in SMK M2") [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_macsec_qca.c | 263 wpa_printf(MSG_INFO, "%s: secy_id=%d", __func__, drv->secy_id); 268 wpa_printf(MSG_ERROR, "nss_macsec_secy_en_set: FAIL"); 273 wpa_printf(MSG_ERROR, 283 wpa_printf(MSG_ERROR, "nss_macsec_secy_rx_ctl_filt_set: FAIL"); 292 wpa_printf(MSG_ERROR, "nss_macsec_secy_tx_ctl_filt_set: FAIL"); 340 wpa_printf(MSG_DEBUG, 345 wpa_printf(MSG_DEBUG, 350 wpa_printf(MSG_INFO, "%s: Could not get interface flags", 355 wpa_printf(MSG_DEBUG, 359 wpa_printf(MSG_INFO, "%s: Failed to enable allmulti" [all...] |
/hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/ |
driver_cmd_wext.c | 62 wpa_printf(MSG_DEBUG, "Scan requested - scan timeout %d seconds", 84 wpa_printf(MSG_DEBUG, "%s: Driver stopped", __func__); 88 wpa_printf(MSG_DEBUG, "%s: Start", __func__); 96 wpa_printf(MSG_DEBUG, "For Scan: %s", params->ssids[i].ssid); 124 wpa_printf(MSG_ERROR, "ioctl[SIOCSIWPRIV] (cscan): %d", ret); 138 wpa_printf(MSG_DEBUG, "%s: %s", __func__, cmd); 212 wpa_printf(MSG_ERROR, "%s: drv is NULL. Exiting", __func__); 216 wpa_printf(MSG_ERROR, "%s: drv->ctx is NULL. Exiting", __func__); 221 wpa_printf(MSG_ERROR, "%s: wpa_s->conf is NULL. Exiting", __func__); 238 wpa_printf(MSG_DEBUG, "For PNO Scan: %s", ssid_conf->ssid) [all...] |