HomeSort by relevance Sort by last modified time
    Searched refs:wpa_printf (Results 101 - 125 of 279) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/wpa_supplicant_8/wpa_supplicant/
gas_query.c 197 wpa_printf(MSG_DEBUG, "GAS: No memory to store the response");
216 wpa_printf(MSG_DEBUG, "GAS: Unexpected TX status: freq=%u dst="
225 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR
229 wpa_printf(MSG_DEBUG, "GAS: TX status for unexpected destination");
262 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u "
296 wpa_printf(MSG_DEBUG, "GAS: Failed to send Action frame to "
310 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR,
324 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR
337 wpa_printf(MSG_DEBUG, "GAS: Received initial response from "
369 wpa_printf(MSG_DEBUG, "GAS: Received comeback response from
    [all...]
hs20_supplicant.c 199 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for "
208 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request");
212 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token "
237 wpa_printf(MSG_DEBUG, "HS 2.0: Download Status Code %u", *pos);
268 wpa_printf(MSG_DEBUG, "Icon Binary Data: %u bytes", data_len);
310 wpa_printf(MSG_DEBUG, "HS 2.0: Icon fetch dur=%d ms res=%d",
423 wpa_printf(MSG_DEBUG, "HS20: Unsupported subtype %u", subtype);
528 wpa_printf(MSG_DEBUG, "HS 2.0: Ready to fetch next icon");
537 wpa_printf(MSG_DEBUG, "HS 2.0: Try to fetch icon '%s' "
552 wpa_printf(MSG_DEBUG, "HS 2.0: No more icons to fetch")
    [all...]
interworking.c 125 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR
248 wpa_printf(MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR,
310 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request");
316 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token "
360 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields");
366 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield");
372 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u",
379 wpa_printf(MSG_DEBUG, "No room for Authentication "
396 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP");
399 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP")
    [all...]
  /external/wpa_supplicant_8/src/ap/
hw_features.c 130 wpa_printf(MSG_MSGDUMP, "Allowed channel: mode=%d "
187 wpa_printf(MSG_ERROR, "Failed to allocate memory for rate "
206 wpa_printf(MSG_DEBUG, "RATE[%d] rate=%d flags=0x%x",
213 wpa_printf(MSG_ERROR, "No rates remaining in supported/basic "
235 wpa_printf(MSG_DEBUG, "HT40: control channel: %d "
252 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed",
279 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
355 wpa_printf(MSG_INFO, "Switch own primary and secondary "
384 wpa_printf(MSG_INFO, "Switch own primary and "
409 wpa_printf(MSG_DEBUG, "Found overlapping legacy BSS:
    [all...]
hostapd.c 83 wpa_printf(MSG_ERROR, "Failed to re-configure WPA PSK "
102 wpa_printf(MSG_ERROR, "Failed to configure WPA IE for "
118 wpa_printf(MSG_ERROR, "Could not set SSID for kernel driver");
121 wpa_printf(MSG_DEBUG, "Reconfigured interface %s", hapd->conf->iface);
206 wpa_printf(MSG_DEBUG, "Failed to clear default "
217 wpa_printf(MSG_DEBUG, "Failed to clear "
245 wpa_printf(MSG_WARNING, "Could not set WEP encryption.");
256 wpa_printf(MSG_ERROR, "%s: Interface %s wasn't started",
262 wpa_printf(MSG_DEBUG, "%s(%s)", __func__, hapd->conf->iface);
283 wpa_printf(MSG_WARNING
    [all...]
wnm_ap.c 28 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper);
38 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper);
65 wpa_printf(MSG_DEBUG, "%s: station not found", __func__);
94 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for "
114 wpa_printf(MSG_DEBUG, "Pass 4, gtk_len = %d",
125 wpa_printf(MSG_DEBUG, "Pass 4 igtk_len = %d",
148 wpa_printf(MSG_DEBUG, "Successfully send WNM-Sleep Response "
180 wpa_printf(MSG_DEBUG, "Fail to send WNM-Sleep Response frame");
214 wpa_printf(MSG_DEBUG, "WNM: EID %d not recognized",
220 wpa_printf(MSG_DEBUG, "No WNM-Sleep IE found")
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_mschapv2.c 160 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response");
193 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated "
203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated "
211 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to derive "
222 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d "
251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge");
253 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data "
262 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length "
269 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge"
277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the
    [all...]
eap_fast.c 80 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall "
88 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a "
99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for "
123 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning "
132 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu",
139 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC "
177 wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL.");
185 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set SessionTicket "
197 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS
    [all...]
eap_eke.c 59 wpa_printf(MSG_DEBUG, "EAP-EKE: %s -> %s",
77 wpa_printf(MSG_INFO, "EAP-EKE: No password configured");
104 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced dhgroup %u",
111 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced encr %u",
118 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u",
125 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced mac %u",
156 wpa_printf(MSG_ERROR, "EAP-EKE: Failed to allocate memory");
203 wpa_printf(MSG_DEBUG, "EAP-EKE: Sending EAP-EKE-Failure/Response - code=0x%x",
239 wpa_printf(MSG_DEBUG, "EAP-EKE: Received EAP-EKE-ID/Request");
242 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data")
    [all...]
eap_pax.c 56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) "
62 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length");
125 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (received)");
128 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in "
135 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - "
144 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short "
152 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A "
173 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to get random data");
187 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-2 (sending)");
241 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (received)")
    [all...]
eap_sake.c 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
76 wpa_printf(MSG_INFO, "EAP-SAKE: No key of correct length "
127 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory "
156 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity");
162 wpa_printf(MSG_INFO, "EAP-SAKE: No AT_PERM_ID_REQ or "
167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity");
175 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID");
198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received "
206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge");
212 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_common.c 36 wpa_printf(MSG_INFO, "EAP: Too short EAP frame");
42 wpa_printf(MSG_INFO, "EAP: Invalid EAP length");
84 wpa_printf(MSG_INFO, "EAP: Invalid expanded EAP "
94 wpa_printf(MSG_INFO, "EAP: Invalid expanded frame "
103 wpa_printf(MSG_INFO, "EAP: Invalid frame type");
  /external/wpa_supplicant_8/src/wps/
http_server.c 48 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d received",
54 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d could not be received "
67 wpa_printf(MSG_DEBUG, "HTTP: Too many concurrent requests");
136 wpa_printf(MSG_DEBUG, "HTTP: Send %lu byte response to %s:%d",
143 wpa_printf(MSG_DEBUG, "HTTP: Send failed: %s",
146 wpa_printf(MSG_DEBUG, "HTTP: Sent only %d of %lu bytes",
209 wpa_printf(MSG_DEBUG, "HTTP: Failed to accept new connection: "
213 wpa_printf(MSG_DEBUG, "HTTP: Connection from %s:%d",
249 wpa_printf(MSG_DEBUG,
276 wpa_printf(MSG_DEBUG, "HTTP: Failed to bind server port %d:
    [all...]
wps_er_ssdp.c 42 wpa_printf(MSG_DEBUG, "WPS ER: Received SSDP from %s",
97 wpa_printf(MSG_DEBUG, "WPS ER: "
121 wpa_printf(MSG_DEBUG, "WPS ER: AP discovered: %s "
154 wpa_printf(MSG_DEBUG, "WPS ER: M-SEARCH sendto failed: "
164 wpa_printf(MSG_INFO, "WPS ER: Failed to add routing entry for "
173 wpa_printf(MSG_INFO, "WPS ER: Failed to open multicast socket "
180 wpa_printf(MSG_INFO, "WPS ER: Failed to open SSDP listener "
wps_upnp_ssdp.c 258 wpa_printf(MSG_INFO, "WPS UPnP: Advertisement sendto "
291 wpa_printf(MSG_MSGDUMP, "WPS UPnP: Advertisement state=%d", a->state);
303 wpa_printf(MSG_ERROR, "WPS UPnP: Advertisement sendto failed:"
310 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_DOWN->UP");
324 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_UP (#%u); "
381 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH stop");
406 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply state=%d (%s:%d)",
419 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply sendto "
428 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply done");
434 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply in %d.%03d sec"
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_eke.c 61 wpa_printf(MSG_DEBUG, "EAP-EKE: %s -> %s",
70 wpa_printf(MSG_DEBUG, "EAP-EKE: Failure - code 0x%x", code);
122 wpa_printf(MSG_ERROR, "EAP-EKE: Failed to allocate memory");
166 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Failure: Failure-Code=0x%x",
187 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Identity");
245 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Commit");
248 wpa_printf(MSG_INFO, "EAP-EKE: Password with not configured");
257 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive key");
278 wpa_printf(MSG_INFO, "EAP-EKE: Failed to initialize DH");
286 wpa_printf(MSG_INFO, "EAP-EKE: Failed to build DHComponent_S")
    [all...]
eap_server_pwd.c 75 wpa_printf(MSG_DEBUG, "EAP-pwd: %s -> %s",
87 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not "
97 wpa_printf(MSG_DEBUG, "EAP-pwd: Selected group number %d",
107 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password "
118 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail");
164 wpa_printf(MSG_DEBUG, "EAP-pwd: ID/Request");
196 wpa_printf(MSG_DEBUG, "EAP-pwd: Commit/Request");
208 wpa_printf(MSG_INFO, "EAP-PWD (server): scalar allocation "
218 wpa_printf(MSG_INFO,
225 wpa_printf(MSG_INFO, "EAP-PWD (server): element allocation
    [all...]
eap_sim_db.c 98 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for "
101 wpa_printf(MSG_ERROR, "EAP-SIM DB: SQLite error: %s", err);
124 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for "
127 wpa_printf(MSG_ERROR, "EAP-SIM DB: SQLite error: %s", err);
141 wpa_printf(MSG_ERROR, "EAP-SIM DB: Failed to open database "
193 wpa_printf(MSG_ERROR, "EAP-SIM DB: SQLite error: %s", err);
293 wpa_printf(MSG_ERROR, "EAP-SIM DB: SQLite error: %s", err);
415 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the "
422 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported "
467 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new_handlers_wps.c 44 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Role type, "
56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Uknown role %s", val);
75 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Type type, "
87 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown type %s",
108 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Bssid type, "
117 wpa_printf(MSG_DEBUG, "dbus: WPS.Stsrt - Wrong Bssid length "
137 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Pin type, "
161 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong "
171 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong "
206 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - unknown key %s", key)
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_build.c 24 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token);
37 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token);
49 wpa_printf(MSG_DEBUG, "P2P: * P2P IE header");
68 wpa_printf(MSG_DEBUG, "P2P: * Capability dev=%02x group=%02x",
79 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u Tie breaker %u",
93 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Regulatory Class %u "
107 wpa_printf(MSG_DEBUG, "P2P: * Operating Channel: Regulatory Class %u "
143 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", status);
199 wpa_printf(MSG_DEBUG, "P2P: * Device Info");
209 wpa_printf(MSG_DEBUG, "P2P: * Device ID: " MACSTR, MAC2STR(dev_addr))
    [all...]
  /external/wpa_supplicant_8/hostapd/
config_file.c 44 wpa_printf(MSG_ERROR, "VLAN file '%s' not readable.", fname);
71 wpa_printf(MSG_ERROR, "Invalid VLAN ID at "
85 wpa_printf(MSG_ERROR, "Invalid VLAN ifname at line %d "
93 wpa_printf(MSG_ERROR, "Out of memory while reading "
135 wpa_printf(MSG_ERROR, "MAC list file '%s' not found.", fname);
163 wpa_printf(MSG_ERROR, "Invalid MAC address '%s' at "
193 wpa_printf(MSG_ERROR, "MAC list reallocation failed");
232 wpa_printf(MSG_ERROR, "EAP user file '%s' not found.", fname);
258 wpa_printf(MSG_ERROR, "Invalid radius_auth_req_attr: %s",
278 wpa_printf(MSG_ERROR, "Invalid EAP identity (no \" in
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_server_write.c 58 wpa_printf(MSG_ERROR, "TLSv1: Could not generate "
67 wpa_printf(MSG_ERROR, "TLSv1: Could not generate "
116 wpa_printf(MSG_DEBUG, "TLSv1: Failed to "
142 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
165 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when "
192 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space "
217 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain "
227 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record");
261 wpa_printf(MSG_DEBUG, "TLSv1: No ServerKeyExchange needed");
266 wpa_printf(MSG_DEBUG, "TLSv1: ServerKeyExchange not yet
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
111 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error "
166 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3");
185 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2");
188 wpa_printf(MSG_INFO, "RSN: SMK handshake not allowed for "
195 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M2");
201 wpa_printf(MSG_INFO, "RSN: No RSN IE or MAC address KDE in "
206 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR,
210 wpa_printf(MSG_INFO, "RSN: Too long Initiator RSN IE in SMK "
216 wpa_printf(MSG_INFO, "RSN: Failed to parse RSN IE in SMK M2")
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_macsec_qca.c 263 wpa_printf(MSG_INFO, "%s: secy_id=%d", __func__, drv->secy_id);
268 wpa_printf(MSG_ERROR, "nss_macsec_secy_en_set: FAIL");
273 wpa_printf(MSG_ERROR,
283 wpa_printf(MSG_ERROR, "nss_macsec_secy_rx_ctl_filt_set: FAIL");
292 wpa_printf(MSG_ERROR, "nss_macsec_secy_tx_ctl_filt_set: FAIL");
340 wpa_printf(MSG_DEBUG,
345 wpa_printf(MSG_DEBUG,
350 wpa_printf(MSG_INFO, "%s: Could not get interface flags",
355 wpa_printf(MSG_DEBUG,
359 wpa_printf(MSG_INFO, "%s: Failed to enable allmulti"
    [all...]
  /hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/
driver_cmd_wext.c 62 wpa_printf(MSG_DEBUG, "Scan requested - scan timeout %d seconds",
84 wpa_printf(MSG_DEBUG, "%s: Driver stopped", __func__);
88 wpa_printf(MSG_DEBUG, "%s: Start", __func__);
96 wpa_printf(MSG_DEBUG, "For Scan: %s", params->ssids[i].ssid);
124 wpa_printf(MSG_ERROR, "ioctl[SIOCSIWPRIV] (cscan): %d", ret);
138 wpa_printf(MSG_DEBUG, "%s: %s", __func__, cmd);
212 wpa_printf(MSG_ERROR, "%s: drv is NULL. Exiting", __func__);
216 wpa_printf(MSG_ERROR, "%s: drv->ctx is NULL. Exiting", __func__);
221 wpa_printf(MSG_ERROR, "%s: wpa_s->conf is NULL. Exiting", __func__);
238 wpa_printf(MSG_DEBUG, "For PNO Scan: %s", ssid_conf->ssid)
    [all...]

Completed in 315 milliseconds

1 2 3 45 6 7 8 91011>>