HomeSort by relevance Sort by last modified time
    Searched refs:wpa_printf (Results 151 - 175 of 279) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_old.c 384 wpa_printf(MSG_ERROR, "dbus: Not enough memory to send scan "
428 wpa_printf(MSG_ERROR,
438 wpa_printf(MSG_ERROR,
448 wpa_printf(MSG_ERROR,
483 wpa_printf(MSG_ERROR, "dbus: Not enough memory to send scan "
493 wpa_printf(MSG_ERROR, "dbus: Not enough memory to construct "
518 wpa_printf(MSG_ERROR,
529 wpa_printf(MSG_ERROR,
569 wpa_printf(MSG_ERROR,
587 wpa_printf(MSG_ERROR
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls.c 47 wpa_printf(MSG_DEBUG, "EAP-TLS: %s -> %s",
64 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
86 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
108 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
136 wpa_printf(MSG_ERROR, "EAP-TLS: Failed to allocate memory for "
173 wpa_printf(MSG_DEBUG, "EAP-TLS: %s - unexpected state %d",
184 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
211 wpa_printf(MSG_INFO, "EAP-TLS: Invalid frame");
224 wpa_printf(MSG_DEBUG, "EAP-TLS: Client acknowledged final TLS "
267 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive key")
    [all...]
eap_server_mschapv2.c 107 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to get random "
117 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to allocate memory"
155 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to allocate memory"
198 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to allocate memory"
231 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Unknown state %d in "
250 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid frame");
257 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Response - "
265 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Success or "
272 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Failure "
323 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using pre-configured
    [all...]
  /external/wpa_supplicant_8/src/wps/
http_client.c 39 wpa_printf(MSG_DEBUG, "HTTP: Timeout (c=%p)", c);
49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p "
59 wpa_printf(MSG_DEBUG, "HTTP: Response OK from "
65 wpa_printf(MSG_DEBUG, "HTTP: Error %d from "
89 wpa_printf(MSG_DEBUG, "HTTP: Send client request to %s:%d (%lu of %lu "
98 wpa_printf(MSG_DEBUG, "HTTP: Failed to send buffer: %s",
106 wpa_printf(MSG_DEBUG, "HTTP: Sent %d of %lu bytes; %lu bytes "
115 wpa_printf(MSG_DEBUG, "HTTP: Full client request sent to %s:%d",
155 wpa_printf(MSG_DEBUG, "HTTP: fnctl(O_NONBLOCK) failed: %s",
163 wpa_printf(MSG_DEBUG, "HTTP: Failed to connect: %s"
    [all...]
wps_upnp_web.c 329 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET for device XML");
343 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET for SCPD XML");
348 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET file not found: %s",
424 wpa_printf(MSG_DEBUG, "WPS UPnP: GetDeviceInfo");
457 wpa_printf(MSG_INFO, "WPS UPnP: Failed to get DeviceInfo");
486 wpa_printf(MSG_DEBUG, "WPS UPnP: PutMessage");
521 wpa_printf(MSG_DEBUG, "WPS UPnP: PutWLANResponse");
524 wpa_printf(MSG_DEBUG, "WPS UPnP: Could not extract NewMessage "
530 wpa_printf(MSG_DEBUG, "WPS UPnP: No NewWLANEventType in "
539 wpa_printf(MSG_DEBUG, "WPS UPnP: No NewWLANEventMAC in
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
bgscan_learn.c 114 wpa_printf(MSG_DEBUG, "bgscan learn: Loading data from %s",
119 wpa_printf(MSG_INFO, "bgscan learn: Invalid data file %s",
136 wpa_printf(MSG_DEBUG, "bgscan learn: Loaded BSS "
169 wpa_printf(MSG_DEBUG, "bgscan learn: Saving data to %s",
246 wpa_printf(MSG_DEBUG, "bgscan learn: Probe new freq "
287 wpa_printf(MSG_DEBUG, "bgscan learn: BSSes in this ESS have "
302 wpa_printf(MSG_DEBUG, "bgscan learn: Scanning frequencies:%s",
307 wpa_printf(MSG_DEBUG, "bgscan learn: Request a background scan");
309 wpa_printf(MSG_DEBUG, "bgscan learn: Failed to trigger scan");
335 wpa_printf(MSG_ERROR, "bgscan learn: Missing scan interval
    [all...]
autoscan_exponential.c 59 wpa_printf(MSG_DEBUG, "autoscan exponential: base exponential is %d "
81 wpa_printf(MSG_DEBUG, "autoscan exponential: scan result "
config_winreg.c 60 wpa_printf(MSG_DEBUG, "Could not open wpa_supplicant config "
80 wpa_printf(MSG_DEBUG, "RegEnumValue failed: 0x%x",
93 wpa_printf(MSG_MSGDUMP, "blob %d: field='%s' len %d",
128 wpa_printf(MSG_DEBUG, TSTR "=%d", name, (int) val);
158 wpa_printf(MSG_DEBUG, TSTR "=%s", name, (char *) val);
225 wpa_printf(MSG_ERROR, "Invalid EAPOL version (%d)",
294 wpa_printf(MSG_DEBUG, "Could not open wpa_supplicant config "
299 wpa_printf(MSG_MSGDUMP, "Start of a new network '" TSTR "'", netw);
323 wpa_printf(MSG_ERROR, "RegEnumValue failed: 0x%x",
346 wpa_printf(MSG_ERROR, "Both PSK and passphrase
    [all...]
  /external/wpa_supplicant_8/hostapd/
ctrl_iface.c 113 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
140 wpa_printf(MSG_DEBUG, "CTRL_IFACE NEW_STA %s", txtaddr);
149 wpa_printf(MSG_DEBUG, "Add new STA " MACSTR " based on ctrl_iface "
168 wpa_printf(MSG_DEBUG, "CTRL_IFACE SA_QUERY %s", txtaddr);
227 wpa_printf(MSG_DEBUG, "WPS: Too long PIN");
232 wpa_printf(MSG_DEBUG, "WPS: Invalid PIN length %d", (int) len);
241 wpa_printf(MSG_DEBUG, "WPS: Invalid checksum digit");
459 wpa_printf(MSG_DEBUG, "NFC: Unsupported connection handover "
687 wpa_printf(MSG_DEBUG, "HS 2.0: Send WNM-Notification to " MACSTR
709 wpa_printf(MSG_ERROR, "Too many qos_map_set parameters")
    [all...]
  /external/wpa_supplicant_8/src/utils/
http_curl.c 108 wpa_printf(MSG_MSGDUMP, "%s[%s]", title, txt);
134 wpa_printf(MSG_DEBUG, "debug - CURLINFO_SSL_DATA_IN - %d",
138 wpa_printf(MSG_DEBUG, "debug - CURLINFO_SSL_DATA_OUT - %d",
142 wpa_printf(MSG_DEBUG, "debug - CURLINFO_END - %d",
185 wpa_printf(MSG_MSGDUMP, "%s:\n%s", title, txt);
527 wpa_printf(MSG_DEBUG, "OpenSSL: No SHA256 hash found for the logo");
549 wpa_printf(MSG_INFO, "Unexpected LogotypeReference array size difference %d != %d",
762 wpa_printf(MSG_INFO, "No logotype extension included");
766 wpa_printf(MSG_INFO, "Parsing logotype extension");
769 wpa_printf(MSG_INFO, "Could not get logotype extension")
    [all...]
browser.c 26 wpa_printf(MSG_DEBUG, "BROWSER:%s", __func__);
57 wpa_printf(MSG_DEBUG, "BROWSER:%s progress=%d", __func__,
67 wpa_printf(MSG_DEBUG, "BROWSER:%s load-status=%d uri=%s",
80 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri);
103 wpa_printf(MSG_DEBUG, "BROWSER:%s mime=%s", __func__, mime);
120 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri);
128 wpa_printf(MSG_DEBUG, "BROWSER:%s title=%s uri=%s", __func__, title,
144 wpa_printf(MSG_DEBUG, "BROWSER:%s title=%s", __func__, title);
ext_password_test.c 50 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s)", name);
79 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s) - not found", name);
  /external/wpa_supplicant_8/src/drivers/
driver_atheros.c 206 wpa_printf(MSG_DEBUG, "atheros: %s: %s: ioctl op=0x%x "
228 wpa_printf(MSG_DEBUG, "%s: %s: Failed to set parameter (op %d "
287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u",
291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
320 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v);
326 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x",
346 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", __func__, v);
352 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa);
365 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled);
376 wpa_printf(MSG_WARNING, "No 802.1X or WPA enabled!")
    [all...]
driver_none.c 28 wpa_printf(MSG_ERROR, "Could not allocate memory for none "
59 wpa_printf(MSG_ERROR, "Could not allocate memory for none "
driver_bsd.c 85 wpa_printf(MSG_ERROR, "ioctl[SIOCS80211, op=%u, val=%u, "
106 wpa_printf(MSG_ERROR, "ioctl[SIOCS80211, op=%u, "
185 wpa_printf(MSG_ERROR, "%s: SIOCGIFMEDIA %s", __func__,
204 wpa_printf(MSG_ERROR, "%s: SIOCSIFMEDIA %s", __func__,
233 wpa_printf(MSG_DEBUG, "%s: key_idx=%d", __func__, key_idx);
236 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__,
299 wpa_printf(MSG_DEBUG, "%s: alg=%d addr=%p key_idx=%d set_tx=%d "
324 wpa_printf(MSG_ERROR, "%s: unknown alg=%d", __func__, alg);
411 wpa_printf(MSG_DEBUG, "%s: group key cipher=%s (%u)",
434 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v)
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_otp.c 54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
eap_tls_common.c 45 wpa_printf(MSG_ERROR, "%s: Named configuration blob '%s' not "
145 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options");
148 wpa_printf(MSG_DEBUG, "TLS: using phase1 config options");
166 wpa_printf(MSG_INFO, "SSL: Failed to get configuration blobs");
187 wpa_printf(MSG_INFO, "SSL: Failed to initialize new TLS "
202 wpa_printf(MSG_INFO, "TLS: Failed to load private key");
215 wpa_printf(MSG_INFO, "TLS: Failed to set TLS connection "
268 wpa_printf(MSG_DEBUG, "TLS: Include TLS Message Length in "
423 wpa_printf(MSG_WARNING, "SSL: Invalid reassembly state: "
437 wpa_printf(MSG_INFO, "SSL: Too long TLS fragment (size over
    [all...]
  /hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/
driver_cmd_nl80211.c 80 wpa_printf(MSG_DEBUG, "Re-routing DRIVER cmd to parent iface");
85 wpa_printf(MSG_DEBUG, "Re-routing command to iface: %s"
119 wpa_printf(MSG_ERROR, "%s: failed to issue private command: %s", __func__, cmd);
130 wpa_printf(MSG_DEBUG, "%s %s len = %d, %zu", __func__, buf, ret, strlen(buf));
141 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
157 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
183 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
190 wpa_printf(MSG_ERROR, "%s: Out of memory",
  /hardware/qcom/wlan/qcwcn/wpa_supplicant_8_lib/
driver_cmd_nl80211.c 94 wpa_printf(MSG_ERROR, "%s: failed to issue private commands\n", __func__);
103 wpa_printf(MSG_DEBUG, "%s: P2P: Device address ("MACSTR")",
106 wpa_printf(MSG_DEBUG, "%s: P2P: %s ", __func__, buf);
108 wpa_printf(MSG_DEBUG, "%s: P2P: %s ", __func__, buf);
110 wpa_printf(MSG_DEBUG, "%s %s len = %d, %d", __func__, buf, ret, strlen(buf));
122 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
138 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
163 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
  /external/wpa_supplicant_8/src/ap/
ieee802_1x.c 53 wpa_printf(MSG_ERROR, "malloc() failed for "
102 wpa_printf(MSG_DEBUG, "Could not set station " MACSTR
140 wpa_printf(MSG_ERROR, "Could not get random numbers");
157 wpa_printf(MSG_ERROR, "No eapKeyData available for encrypting "
166 wpa_printf(MSG_ERROR, "Could not encrypt key");
183 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR
201 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR,
206 wpa_printf(MSG_ERROR, "Using WEP with vlans is not supported.");
223 wpa_printf(MSG_ERROR, "Could not generate random "
240 wpa_printf(MSG_ERROR, "Could not set individual WEP
    [all...]
dfs.c 111 wpa_printf(MSG_DEBUG, "Unknown width for %d channels", n_chans);
184 wpa_printf(MSG_DEBUG, "DFS new chan checking %d channels", n_chans);
202 wpa_printf(MSG_DEBUG, "Selected ch. #%d", chan->chan);
206 wpa_printf(MSG_DEBUG, "Adding channel: %d", chan->chan);
243 wpa_printf(MSG_INFO, "DFS only VHT20/40/80/160 is supported now");
248 wpa_printf(MSG_DEBUG, "DFS adjusting VHT center frequency: %d, %d",
289 wpa_printf(MSG_INFO,
324 wpa_printf(MSG_DEBUG,
332 wpa_printf(MSG_DEBUG, "Available channel: %d",
426 wpa_printf(MSG_DEBUG, "DFS: Selecting random channel")
    [all...]
peerkey_auth.c 91 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M1");
97 wpa_printf(MSG_INFO, "RSN: No RSN IE or MAC address KDE in "
108 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR
264 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M3");
271 wpa_printf(MSG_INFO, "RSN: No RSN IE, MAC address KDE, or "
283 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR
293 wpa_printf(MSG_DEBUG, "RSN: Failed to generate SMK");
336 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK Error");
342 wpa_printf(MSG_INFO, "RSN: No MAC address or Error KDE in "
351 wpa_printf(MSG_DEBUG, "RSN: Peer STA " MACSTR " not
    [all...]
ieee802_11.c 144 wpa_printf(MSG_WARNING, "Failed to check if DFS is required; ret=%d",
288 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR
293 wpa_printf(MSG_INFO, "send_auth_reply: send");
333 wpa_printf(MSG_DEBUG, "SAE: No password available");
341 wpa_printf(MSG_DEBUG, "SAE: Could not pick PWE");
346 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer commit");
471 wpa_printf(MSG_DEBUG, "SAE: Drop commit message with "
479 wpa_printf(MSG_DEBUG, "SAE: Request anti-"
561 wpa_printf(MSG_INFO, "handle_auth - too short payload (len=%lu)",
569 wpa_printf(MSG_INFO
    [all...]
wps_hostapd.c 104 wpa_printf(MSG_DEBUG,
108 wpa_printf(MSG_DEBUG,
116 wpa_printf(MSG_DEBUG, "Unexpected PSK length %lu",
143 wpa_printf(MSG_DEBUG, "Failed to add the PSK to "
180 wpa_printf(MSG_DEBUG, "WPS: PIN needed for E-UUID %s", uuid);
282 wpa_printf(MSG_DEBUG, "WPS: Reload configuration data");
285 wpa_printf(MSG_WARNING, "WPS: Failed to reload the updated "
301 wpa_printf(MSG_DEBUG, "WPS: Reschedule immediate configuration reload");
324 wpa_printf(MSG_DEBUG, "WPS: Updating in-memory configuration");
414 wpa_printf(MSG_DEBUG, "WPS: Received new AP Settings")
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_nss.c 68 wpa_printf(MSG_ERROR, "NSS: PK11_GetBestSlot failed");
78 wpa_printf(MSG_ERROR, "NSS: PK11_ImportSymKey failed");
84 wpa_printf(MSG_ERROR, "NSS: PK11_GenerateNewParam failed");
91 wpa_printf(MSG_ERROR, "NSS: PK11_CreateContextBySymKey("
98 wpa_printf(MSG_ERROR, "NSS: PK11_CipherOp failed");

Completed in 623 milliseconds

1 2 3 4 5 67 8 91011>>