/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_old.c | 384 wpa_printf(MSG_ERROR, "dbus: Not enough memory to send scan " 428 wpa_printf(MSG_ERROR, 438 wpa_printf(MSG_ERROR, 448 wpa_printf(MSG_ERROR, 483 wpa_printf(MSG_ERROR, "dbus: Not enough memory to send scan " 493 wpa_printf(MSG_ERROR, "dbus: Not enough memory to construct " 518 wpa_printf(MSG_ERROR, 529 wpa_printf(MSG_ERROR, 569 wpa_printf(MSG_ERROR, 587 wpa_printf(MSG_ERROR [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls.c | 47 wpa_printf(MSG_DEBUG, "EAP-TLS: %s -> %s", 64 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 86 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 108 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 136 wpa_printf(MSG_ERROR, "EAP-TLS: Failed to allocate memory for " 173 wpa_printf(MSG_DEBUG, "EAP-TLS: %s - unexpected state %d", 184 wpa_printf(MSG_DEBUG, "EAP-TLS: Done"); 211 wpa_printf(MSG_INFO, "EAP-TLS: Invalid frame"); 224 wpa_printf(MSG_DEBUG, "EAP-TLS: Client acknowledged final TLS " 267 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive key") [all...] |
eap_server_mschapv2.c | 107 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to get random " 117 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to allocate memory" 155 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to allocate memory" 198 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to allocate memory" 231 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Unknown state %d in " 250 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid frame"); 257 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Response - " 265 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Success or " 272 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Failure " 323 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using pre-configured [all...] |
/external/wpa_supplicant_8/src/wps/ |
http_client.c | 39 wpa_printf(MSG_DEBUG, "HTTP: Timeout (c=%p)", c); 49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p " 59 wpa_printf(MSG_DEBUG, "HTTP: Response OK from " 65 wpa_printf(MSG_DEBUG, "HTTP: Error %d from " 89 wpa_printf(MSG_DEBUG, "HTTP: Send client request to %s:%d (%lu of %lu " 98 wpa_printf(MSG_DEBUG, "HTTP: Failed to send buffer: %s", 106 wpa_printf(MSG_DEBUG, "HTTP: Sent %d of %lu bytes; %lu bytes " 115 wpa_printf(MSG_DEBUG, "HTTP: Full client request sent to %s:%d", 155 wpa_printf(MSG_DEBUG, "HTTP: fnctl(O_NONBLOCK) failed: %s", 163 wpa_printf(MSG_DEBUG, "HTTP: Failed to connect: %s" [all...] |
wps_upnp_web.c | 329 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET for device XML"); 343 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET for SCPD XML"); 348 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET file not found: %s", 424 wpa_printf(MSG_DEBUG, "WPS UPnP: GetDeviceInfo"); 457 wpa_printf(MSG_INFO, "WPS UPnP: Failed to get DeviceInfo"); 486 wpa_printf(MSG_DEBUG, "WPS UPnP: PutMessage"); 521 wpa_printf(MSG_DEBUG, "WPS UPnP: PutWLANResponse"); 524 wpa_printf(MSG_DEBUG, "WPS UPnP: Could not extract NewMessage " 530 wpa_printf(MSG_DEBUG, "WPS UPnP: No NewWLANEventType in " 539 wpa_printf(MSG_DEBUG, "WPS UPnP: No NewWLANEventMAC in [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
bgscan_learn.c | 114 wpa_printf(MSG_DEBUG, "bgscan learn: Loading data from %s", 119 wpa_printf(MSG_INFO, "bgscan learn: Invalid data file %s", 136 wpa_printf(MSG_DEBUG, "bgscan learn: Loaded BSS " 169 wpa_printf(MSG_DEBUG, "bgscan learn: Saving data to %s", 246 wpa_printf(MSG_DEBUG, "bgscan learn: Probe new freq " 287 wpa_printf(MSG_DEBUG, "bgscan learn: BSSes in this ESS have " 302 wpa_printf(MSG_DEBUG, "bgscan learn: Scanning frequencies:%s", 307 wpa_printf(MSG_DEBUG, "bgscan learn: Request a background scan"); 309 wpa_printf(MSG_DEBUG, "bgscan learn: Failed to trigger scan"); 335 wpa_printf(MSG_ERROR, "bgscan learn: Missing scan interval [all...] |
autoscan_exponential.c | 59 wpa_printf(MSG_DEBUG, "autoscan exponential: base exponential is %d " 81 wpa_printf(MSG_DEBUG, "autoscan exponential: scan result "
|
config_winreg.c | 60 wpa_printf(MSG_DEBUG, "Could not open wpa_supplicant config " 80 wpa_printf(MSG_DEBUG, "RegEnumValue failed: 0x%x", 93 wpa_printf(MSG_MSGDUMP, "blob %d: field='%s' len %d", 128 wpa_printf(MSG_DEBUG, TSTR "=%d", name, (int) val); 158 wpa_printf(MSG_DEBUG, TSTR "=%s", name, (char *) val); 225 wpa_printf(MSG_ERROR, "Invalid EAPOL version (%d)", 294 wpa_printf(MSG_DEBUG, "Could not open wpa_supplicant config " 299 wpa_printf(MSG_MSGDUMP, "Start of a new network '" TSTR "'", netw); 323 wpa_printf(MSG_ERROR, "RegEnumValue failed: 0x%x", 346 wpa_printf(MSG_ERROR, "Both PSK and passphrase [all...] |
/external/wpa_supplicant_8/hostapd/ |
ctrl_iface.c | 113 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 140 wpa_printf(MSG_DEBUG, "CTRL_IFACE NEW_STA %s", txtaddr); 149 wpa_printf(MSG_DEBUG, "Add new STA " MACSTR " based on ctrl_iface " 168 wpa_printf(MSG_DEBUG, "CTRL_IFACE SA_QUERY %s", txtaddr); 227 wpa_printf(MSG_DEBUG, "WPS: Too long PIN"); 232 wpa_printf(MSG_DEBUG, "WPS: Invalid PIN length %d", (int) len); 241 wpa_printf(MSG_DEBUG, "WPS: Invalid checksum digit"); 459 wpa_printf(MSG_DEBUG, "NFC: Unsupported connection handover " 687 wpa_printf(MSG_DEBUG, "HS 2.0: Send WNM-Notification to " MACSTR 709 wpa_printf(MSG_ERROR, "Too many qos_map_set parameters") [all...] |
/external/wpa_supplicant_8/src/utils/ |
http_curl.c | 108 wpa_printf(MSG_MSGDUMP, "%s[%s]", title, txt); 134 wpa_printf(MSG_DEBUG, "debug - CURLINFO_SSL_DATA_IN - %d", 138 wpa_printf(MSG_DEBUG, "debug - CURLINFO_SSL_DATA_OUT - %d", 142 wpa_printf(MSG_DEBUG, "debug - CURLINFO_END - %d", 185 wpa_printf(MSG_MSGDUMP, "%s:\n%s", title, txt); 527 wpa_printf(MSG_DEBUG, "OpenSSL: No SHA256 hash found for the logo"); 549 wpa_printf(MSG_INFO, "Unexpected LogotypeReference array size difference %d != %d", 762 wpa_printf(MSG_INFO, "No logotype extension included"); 766 wpa_printf(MSG_INFO, "Parsing logotype extension"); 769 wpa_printf(MSG_INFO, "Could not get logotype extension") [all...] |
browser.c | 26 wpa_printf(MSG_DEBUG, "BROWSER:%s", __func__); 57 wpa_printf(MSG_DEBUG, "BROWSER:%s progress=%d", __func__, 67 wpa_printf(MSG_DEBUG, "BROWSER:%s load-status=%d uri=%s", 80 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri); 103 wpa_printf(MSG_DEBUG, "BROWSER:%s mime=%s", __func__, mime); 120 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri); 128 wpa_printf(MSG_DEBUG, "BROWSER:%s title=%s uri=%s", __func__, title, 144 wpa_printf(MSG_DEBUG, "BROWSER:%s title=%s", __func__, title);
|
ext_password_test.c | 50 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s)", name); 79 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s) - not found", name);
|
/external/wpa_supplicant_8/src/drivers/ |
driver_atheros.c | 206 wpa_printf(MSG_DEBUG, "atheros: %s: %s: ioctl op=0x%x " 228 wpa_printf(MSG_DEBUG, "%s: %s: Failed to set parameter (op %d " 287 wpa_printf(MSG_ERROR, "Unknown group key cipher %u", 291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 320 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v); 326 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x", 346 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", __func__, v); 352 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa); 365 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); 376 wpa_printf(MSG_WARNING, "No 802.1X or WPA enabled!") [all...] |
driver_none.c | 28 wpa_printf(MSG_ERROR, "Could not allocate memory for none " 59 wpa_printf(MSG_ERROR, "Could not allocate memory for none "
|
driver_bsd.c | 85 wpa_printf(MSG_ERROR, "ioctl[SIOCS80211, op=%u, val=%u, " 106 wpa_printf(MSG_ERROR, "ioctl[SIOCS80211, op=%u, " 185 wpa_printf(MSG_ERROR, "%s: SIOCGIFMEDIA %s", __func__, 204 wpa_printf(MSG_ERROR, "%s: SIOCSIFMEDIA %s", __func__, 233 wpa_printf(MSG_DEBUG, "%s: key_idx=%d", __func__, key_idx); 236 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, 299 wpa_printf(MSG_DEBUG, "%s: alg=%d addr=%p key_idx=%d set_tx=%d " 324 wpa_printf(MSG_ERROR, "%s: unknown alg=%d", __func__, alg); 411 wpa_printf(MSG_DEBUG, "%s: group key cipher=%s (%u)", 434 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_otp.c | 54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
eap_tls_common.c | 45 wpa_printf(MSG_ERROR, "%s: Named configuration blob '%s' not " 145 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options"); 148 wpa_printf(MSG_DEBUG, "TLS: using phase1 config options"); 166 wpa_printf(MSG_INFO, "SSL: Failed to get configuration blobs"); 187 wpa_printf(MSG_INFO, "SSL: Failed to initialize new TLS " 202 wpa_printf(MSG_INFO, "TLS: Failed to load private key"); 215 wpa_printf(MSG_INFO, "TLS: Failed to set TLS connection " 268 wpa_printf(MSG_DEBUG, "TLS: Include TLS Message Length in " 423 wpa_printf(MSG_WARNING, "SSL: Invalid reassembly state: " 437 wpa_printf(MSG_INFO, "SSL: Too long TLS fragment (size over [all...] |
/hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/ |
driver_cmd_nl80211.c | 80 wpa_printf(MSG_DEBUG, "Re-routing DRIVER cmd to parent iface"); 85 wpa_printf(MSG_DEBUG, "Re-routing command to iface: %s" 119 wpa_printf(MSG_ERROR, "%s: failed to issue private command: %s", __func__, cmd); 130 wpa_printf(MSG_DEBUG, "%s %s len = %d, %zu", __func__, buf, ret, strlen(buf)); 141 wpa_printf(MSG_DEBUG, "%s: Entry", __func__); 157 wpa_printf(MSG_DEBUG, "%s: Entry", __func__); 183 wpa_printf(MSG_DEBUG, "%s: Entry", __func__); 190 wpa_printf(MSG_ERROR, "%s: Out of memory",
|
/hardware/qcom/wlan/qcwcn/wpa_supplicant_8_lib/ |
driver_cmd_nl80211.c | 94 wpa_printf(MSG_ERROR, "%s: failed to issue private commands\n", __func__); 103 wpa_printf(MSG_DEBUG, "%s: P2P: Device address ("MACSTR")", 106 wpa_printf(MSG_DEBUG, "%s: P2P: %s ", __func__, buf); 108 wpa_printf(MSG_DEBUG, "%s: P2P: %s ", __func__, buf); 110 wpa_printf(MSG_DEBUG, "%s %s len = %d, %d", __func__, buf, ret, strlen(buf)); 122 wpa_printf(MSG_DEBUG, "%s: Entry", __func__); 138 wpa_printf(MSG_DEBUG, "%s: Entry", __func__); 163 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.c | 53 wpa_printf(MSG_ERROR, "malloc() failed for " 102 wpa_printf(MSG_DEBUG, "Could not set station " MACSTR 140 wpa_printf(MSG_ERROR, "Could not get random numbers"); 157 wpa_printf(MSG_ERROR, "No eapKeyData available for encrypting " 166 wpa_printf(MSG_ERROR, "Could not encrypt key"); 183 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR 201 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR, 206 wpa_printf(MSG_ERROR, "Using WEP with vlans is not supported."); 223 wpa_printf(MSG_ERROR, "Could not generate random " 240 wpa_printf(MSG_ERROR, "Could not set individual WEP [all...] |
dfs.c | 111 wpa_printf(MSG_DEBUG, "Unknown width for %d channels", n_chans); 184 wpa_printf(MSG_DEBUG, "DFS new chan checking %d channels", n_chans); 202 wpa_printf(MSG_DEBUG, "Selected ch. #%d", chan->chan); 206 wpa_printf(MSG_DEBUG, "Adding channel: %d", chan->chan); 243 wpa_printf(MSG_INFO, "DFS only VHT20/40/80/160 is supported now"); 248 wpa_printf(MSG_DEBUG, "DFS adjusting VHT center frequency: %d, %d", 289 wpa_printf(MSG_INFO, 324 wpa_printf(MSG_DEBUG, 332 wpa_printf(MSG_DEBUG, "Available channel: %d", 426 wpa_printf(MSG_DEBUG, "DFS: Selecting random channel") [all...] |
peerkey_auth.c | 91 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M1"); 97 wpa_printf(MSG_INFO, "RSN: No RSN IE or MAC address KDE in " 108 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR 264 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M3"); 271 wpa_printf(MSG_INFO, "RSN: No RSN IE, MAC address KDE, or " 283 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR 293 wpa_printf(MSG_DEBUG, "RSN: Failed to generate SMK"); 336 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK Error"); 342 wpa_printf(MSG_INFO, "RSN: No MAC address or Error KDE in " 351 wpa_printf(MSG_DEBUG, "RSN: Peer STA " MACSTR " not [all...] |
ieee802_11.c | 144 wpa_printf(MSG_WARNING, "Failed to check if DFS is required; ret=%d", 288 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR 293 wpa_printf(MSG_INFO, "send_auth_reply: send"); 333 wpa_printf(MSG_DEBUG, "SAE: No password available"); 341 wpa_printf(MSG_DEBUG, "SAE: Could not pick PWE"); 346 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer commit"); 471 wpa_printf(MSG_DEBUG, "SAE: Drop commit message with " 479 wpa_printf(MSG_DEBUG, "SAE: Request anti-" 561 wpa_printf(MSG_INFO, "handle_auth - too short payload (len=%lu)", 569 wpa_printf(MSG_INFO [all...] |
wps_hostapd.c | 104 wpa_printf(MSG_DEBUG, 108 wpa_printf(MSG_DEBUG, 116 wpa_printf(MSG_DEBUG, "Unexpected PSK length %lu", 143 wpa_printf(MSG_DEBUG, "Failed to add the PSK to " 180 wpa_printf(MSG_DEBUG, "WPS: PIN needed for E-UUID %s", uuid); 282 wpa_printf(MSG_DEBUG, "WPS: Reload configuration data"); 285 wpa_printf(MSG_WARNING, "WPS: Failed to reload the updated " 301 wpa_printf(MSG_DEBUG, "WPS: Reschedule immediate configuration reload"); 324 wpa_printf(MSG_DEBUG, "WPS: Updating in-memory configuration"); 414 wpa_printf(MSG_DEBUG, "WPS: Received new AP Settings") [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_nss.c | 68 wpa_printf(MSG_ERROR, "NSS: PK11_GetBestSlot failed"); 78 wpa_printf(MSG_ERROR, "NSS: PK11_ImportSymKey failed"); 84 wpa_printf(MSG_ERROR, "NSS: PK11_GenerateNewParam failed"); 91 wpa_printf(MSG_ERROR, "NSS: PK11_CreateContextBySymKey(" 98 wpa_printf(MSG_ERROR, "NSS: PK11_CipherOp failed");
|