/external/wpa_supplicant_8/src/ap/ |
tkip_countermeasures.c | 84 wpa_printf(MSG_DEBUG,
|
wpa_auth_glue.c | 133 wpa_printf(MSG_DEBUG, "%s: WPA authenticator requests disconnect: " 381 wpa_printf(MSG_DEBUG, "FT: Send RRB data directly to " 513 wpa_printf(MSG_DEBUG, "FT: RRB received packet " MACSTR " -> " 564 wpa_printf(MSG_ERROR, "WPA initialization failed."); 569 wpa_printf(MSG_ERROR, "Could not set PrivacyInvoked " 576 wpa_printf(MSG_ERROR, "Failed to configure WPA IE for " 582 wpa_printf(MSG_ERROR, "Initialization of RSN " 596 wpa_printf(MSG_ERROR, "Failed to open l2_packet " 625 wpa_printf(MSG_DEBUG, "Could not disable " 631 wpa_printf(MSG_DEBUG, "Could not remove generic [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_methods.c | 190 wpa_printf(MSG_ERROR, "EAP: Failed to open dynamic EAP method " 198 wpa_printf(MSG_ERROR, "EAP: Invalid EAP method '%s' - no " 206 wpa_printf(MSG_ERROR, "EAP: Failed to add EAP method '%s' - " 215 wpa_printf(MSG_DEBUG, "EAP: Loaded dynamic EAP method: '%s'", so);
|
eap_fast_pac.c | 268 wpa_printf(MSG_INFO, "EAP-FAST: No PAC blob '%s' - " 279 wpa_printf(MSG_INFO, "EAP-FAST: No PAC file '%s' - " 465 wpa_printf(MSG_INFO, "EAP-FAST: %s in '%s:%d'", 470 wpa_printf(MSG_DEBUG, "EAP-FAST: Read %d PAC entries from '%s'", 556 wpa_printf(MSG_INFO, "EAP-FAST: Failed to open PAC " 561 wpa_printf(MSG_INFO, "EAP-FAST: Failed to write all " 598 wpa_printf(MSG_DEBUG, "EAP-FAST: No memory for PAC " 656 wpa_printf(MSG_DEBUG, "EAP-FAST: Wrote %d PAC entries into '%s'", 766 wpa_printf(MSG_INFO, "EAP-FAST: No PAC blob '%s' - " 776 wpa_printf(MSG_INFO, "EAP-FAST: No PAC file '%s' - [all...] |
/external/wpa_supplicant_8/src/utils/ |
wpabuf.c | 35 wpa_printf(MSG_ERROR, "wpabuf: invalid magic %x", 39 wpa_printf(MSG_ERROR, "wpabuf %p (size=%lu used=%lu) overflow len=%lu", 62 wpa_printf(MSG_ERROR, "wpabuf: invalid magic %x", 190 wpa_printf(MSG_ERROR, "wpabuf_free: invalid magic %x",
|
wpa_debug.h | 28 #define wpa_printf(args...) do { } while (0) macro 60 * wpa_printf - conditional printf 70 void wpa_printf(int level, const char *fmt, ...) 177 * configuration. This function is like wpa_printf(), but it also sends the
|
os_unix.c | 339 wpa_printf(MSG_INFO, "MEMLEAK[%p]: invalid magic 0x%x " 344 wpa_printf(MSG_INFO, "MEMLEAK[%p]: len %lu", 349 wpa_printf(MSG_INFO, "MEMLEAK: total %lu bytes", 495 wpa_printf(MSG_INFO, "REALLOC[%p]: invalid magic 0x%x%s", 521 wpa_printf(MSG_INFO, "FREE[%p]: invalid magic 0x%x%s",
|
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.c | 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); 63 wpa_printf(MSG_WARNING, "RSN pre-auth frame received from " 185 wpa_printf(MSG_WARNING, "RSN: Failed to initialize L2 packet " 196 wpa_printf(MSG_WARNING, "RSN: Failed to initialize L2 " 205 wpa_printf(MSG_WARNING, "Failed to allocate EAPOL context."); 222 wpa_printf(MSG_WARNING, "RSN: Failed to initialize EAPOL " 361 wpa_printf(MSG_DEBUG, "RSN: Ignored PMKID candidate without "
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.c | 176 wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse X.509 " 197 wpa_printf(MSG_ERROR, "TLSv1: Failed to import " 429 wpa_printf(MSG_DEBUG, "TLSv1: No public key to verify signature"); 442 wpa_printf(MSG_DEBUG, "TLSv1: Failed to decrypt signature"); 472 wpa_printf(MSG_DEBUG, "TLSv1.2: DigestAlgorithn = SHA-256"); 476 wpa_printf(MSG_DEBUG, "TLSv1.2: Unrecognized DigestInfo"); 486 wpa_printf(MSG_DEBUG, "TLSv1: Invalid Signature in CertificateVerify - did not match calculated hash");
|
rsa.c | 41 wpa_printf(MSG_DEBUG, "RSA: Expected INTEGER - found class %d " 47 wpa_printf(MSG_DEBUG, "RSA: Failed to parse INTEGER"); 90 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE " 197 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE " 210 wpa_printf(MSG_DEBUG, "RSA: Expected zero INTEGER in the "
|
tlsv1_server.c | 41 wpa_printf(MSG_DEBUG, "TLSv1: %s", buf); 75 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive " 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 142 wpa_printf(MSG_DEBUG, "TLSv1: No input data to server"); 158 wpa_printf(MSG_DEBUG, "TLSv1: Processing received " 165 wpa_printf(MSG_DEBUG, "TLSv1: Partial processing not " 198 wpa_printf(MSG_DEBUG, "TLSv1: Drop alert loop"); 236 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record"); 284 wpa_printf(MSG_DEBUG, "TLSv1: Partial processing not " 330 wpa_printf(MSG_DEBUG, "TLSv1: Buffer not large enough [all...] |
tlsv1_server_read.c | 180 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " 539 wpa_printf(MSG_DEBUG, "TLSv1: Failed to decrypt " 557 wpa_printf(MSG_DEBUG, "TLSv1: Using random premaster secret " 561 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random " 577 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive keys"); 612 wpa_printf(MSG_DEBUG, "TLSv1: Implicit public value encoding " 642 wpa_printf(MSG_DEBUG, "TLSv1: No DH parameters available"); 653 wpa_printf(MSG_DEBUG, "TLSv1: Could not allocate memory for " 683 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive keys"); 864 wpa_printf(MSG_DEBUG, "TLSv1.2: Unsupported hash(%u)/ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers.c | 56 wpa_printf(MSG_INFO, "dbus: wpas_dbus_error_unknown_error " 996 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: " 1019 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ssids " 1032 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ssids " 1043 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: " 1057 wpa_printf(MSG_DEBUG, 1069 wpa_printf(MSG_DEBUG, 1106 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ies must " 1119 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ies must " 1138 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: [all...] |
dbus_common.c | 247 wpa_printf(MSG_ERROR, "dbus: Failed to set callback " 268 wpa_printf(MSG_DEBUG, "dbus: bus disconnected, terminating"); 289 wpa_printf(MSG_ERROR, "dbus: Could not acquire the system "
|
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_key.c | 109 wpa_printf(MSG_ERROR, "MKA-%s: out of memory", __func__); 172 wpa_printf(MSG_ERROR, "MKA: omac1_aes_128 failed");
|
/external/wpa_supplicant_8/wpa_supplicant/ |
main.c | 304 wpa_printf(MSG_ERROR, "Failed to initialize wpa_supplicant"); 308 wpa_printf(MSG_INFO, "Successfully initialized "
|
ap.c | 91 wpa_printf(MSG_ERROR, "Unsupported AP mode frequency: %d MHz", 203 wpa_printf(MSG_ERROR, "No SSID configured for AP mode"); 493 wpa_printf(MSG_ERROR, "No SSID configured for AP mode"); 499 wpa_printf(MSG_DEBUG, "Setting up AP (SSID='%s')", 528 wpa_printf(MSG_WARNING, "WPA: Failed to select pairwise " 579 wpa_printf(MSG_ERROR, "Failed to create AP configuration"); 644 wpa_printf(MSG_ERROR, "Failed to initialize AP interface"); 773 wpa_printf(MSG_DEBUG, "No WPS operation in progress at this " 816 wpa_printf(MSG_DEBUG, "WPS: AP PIN timed out"); 828 wpa_printf(MSG_DEBUG, "WPS: Enabling AP PIN (timeout=%d)", timeout) [all...] |
preauth_test.c | 256 wpa_printf(MSG_WARNING, "Failed to get own L2 address\n"); 299 wpa_printf(MSG_ERROR, "Failed to register EAP methods"); 304 wpa_printf(MSG_ERROR, "Failed to initialize event loop");
|
wpa_supplicant.c | [all...] |
sme.c | 92 wpa_printf(MSG_DEBUG, "SAE: No password available"); 97 wpa_printf(MSG_DEBUG, "SAE: Failed to select group"); 105 wpa_printf(MSG_DEBUG, "SAE: Could not pick PWE"); 436 wpa_printf(MSG_DEBUG, 597 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer " 669 wpa_printf(MSG_DEBUG, "SME: SAE completed - setting PMK for " 1013 wpa_printf(MSG_DEBUG, "SME: Send 20/40 BSS Coexistence to " MACSTR 1099 wpa_printf(MSG_DEBUG, "SME OBSS scan BSS " MACSTR [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-rsa.c | 57 wpa_printf(MSG_DEBUG, "Trying to parse PKCS #1 encoded RSA private "
|
/external/wpa_supplicant_8/src/drivers/ |
driver_hostap.c | 151 wpa_printf(MSG_MSGDUMP, "handle_frame: too short (%lu)", 196 wpa_printf(MSG_DEBUG, "CTRL"); 199 wpa_printf(MSG_DEBUG, "DATA"); 203 wpa_printf(MSG_DEBUG, "unknown frame type %d", type); 255 wpa_printf(MSG_DEBUG, "Opening raw packet socket for ifindex %d", 318 wpa_printf(MSG_ERROR, "hostap_send_eapol - packet len: %lu - " 789 wpa_printf(MSG_DEBUG, "Custom wireless event: '%s'", custom); 796 wpa_printf(MSG_DEBUG, 810 wpa_printf(MSG_DEBUG, 831 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d" [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps.c | 108 wpa_printf(MSG_DEBUG, "WPS: Failed to parse WPS IE " 111 wpa_printf(MSG_DEBUG, "WPS: No Request Type attribute " 114 wpa_printf(MSG_DEBUG, "WPS: Request Type (from WPS IE " 165 wpa_printf(MSG_DEBUG, "WPS: Full PIN information revealed and " 421 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for (Re)Association " 455 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for (Re)Association " 500 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for Probe Request");
|
/external/wpa_supplicant_8/src/radius/ |
radius_server.c | 333 wpa_printf(MSG_DEBUG, "RADIUS SRV: " args) 335 wpa_printf(MSG_ERROR, "RADIUS SRV: " args) 811 wpa_printf(MSG_ERROR, "Could not add RADIUS attribute"); 892 wpa_printf(MSG_ERROR, "Could not add RADIUS attribute"); 960 wpa_printf(MSG_INFO, "sendto[RADIUS SRV]: %s", strerror(errno)); 1032 wpa_printf(MSG_INFO, "sendto[RADIUS SRV]: %s", 1138 wpa_printf(MSG_INFO, "sendto[RADIUS SRV]: %s", 1194 wpa_printf(MSG_INFO, "recvfrom[radius_server]: %s", [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.c | 424 wpa_printf(MSG_INFO, "EAP-EKE: Failed to decrypt DHComponent"); 637 wpa_printf(MSG_INFO, "EAP-EKE: Not enough room for Prot() data"); 696 wpa_printf(MSG_INFO, "EAP-EKE: ICV mismatch in Prot() data"); 701 wpa_printf(MSG_INFO, "EAP-EKE: Not enough room for decrypted Prot() data"); 708 wpa_printf(MSG_INFO, "EAP-EKE: Failed to decrypt Prot() data"); 721 wpa_printf(MSG_DEBUG, "EAP-EKE: Auth(%s)", label);
|