HomeSort by relevance Sort by last modified time
    Searched refs:wpa_printf (Results 76 - 100 of 279) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/wpa_supplicant_8/wpa_supplicant/
bgscan_simple.c 51 wpa_printf(MSG_DEBUG, "bgscan simple: Request a background scan");
53 wpa_printf(MSG_DEBUG, "bgscan simple: Failed to trigger scan");
66 wpa_printf(MSG_DEBUG, "bgscan simple: Backing "
100 wpa_printf(MSG_ERROR, "bgscan simple: Missing scan interval "
131 wpa_printf(MSG_DEBUG, "bgscan simple: Signal strength threshold %d "
138 wpa_printf(MSG_ERROR, "bgscan simple: Failed to enable "
151 wpa_printf(MSG_DEBUG, "bgscan simple: Init scan interval: %d",
183 wpa_printf(MSG_DEBUG, "bgscan simple: scan result notification");
202 wpa_printf(MSG_DEBUG, "bgscan simple: beacon loss");
220 wpa_printf(MSG_DEBUG, "bgscan simple: signal level changed
    [all...]
wnm_sta.c 31 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper);
42 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper);
62 wpa_printf(MSG_DEBUG, "WNM: Request to send WNM-Sleep Mode Request "
107 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for "
137 wpa_printf(MSG_DEBUG, "Failed to send WNM-Sleep Request "
162 wpa_printf(MSG_DEBUG, "TFS Resp IE(s) found");
168 wpa_printf(MSG_DEBUG, "WNM: Fail to set TFS Resp IE");
191 wpa_printf(MSG_DEBUG, "WNM: Invalid Key Data element "
201 wpa_printf(MSG_DEBUG, "WNM: Too short GTK "
208 wpa_printf(MSG_DEBUG, "WNM: Invalid GTK
    [all...]
autoscan_periodic.c 54 wpa_printf(MSG_DEBUG, "autoscan periodic: interval is %d",
74 wpa_printf(MSG_DEBUG, "autoscan periodic: scan result notification");
ibss_rsn.c 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
84 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
112 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
161 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK");
183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
192 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
198 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__);
223 wpa_printf(MSG_DEBUG, "SUPP: wpa_sm_init() failed");
238 wpa_printf(MSG_DEBUG, "SUPP: wpa_sm_set_assoc_wpa_ie_default()
    [all...]
blacklist.c 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count "
79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist",
107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
  /external/wpa_supplicant_8/src/eap_peer/
tncc.c 115 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_ReportMessageTypes(imcID=%lu "
120 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu",
152 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage(imcID=%lu "
191 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_RequestHandshakeRetry");
209 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_LogMessage(imcID=%lu "
219 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_UserMessage(imcID=%lu "
231 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_BindFunction(imcID=%lu, "
283 wpa_printf(MSG_ERROR, "TNC: IMC does not export "
290 wpa_printf(MSG_ERROR, "TNC: IMC does not export "
298 wpa_printf(MSG_ERROR, "TNC: IMC does not export
    [all...]
eap_ikev2.c 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
67 wpa_printf(MSG_INFO, "EAP-IKEV2: No identity available");
127 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
144 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response");
163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
168 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
202 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
219 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
226 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
235 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes
    [all...]
eap_pwd.c 77 wpa_printf(MSG_DEBUG, "EAP-PWD: %s -> %s",
92 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!");
98 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!");
103 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail");
108 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail");
114 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail");
124 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation psk fail");
241 wpa_printf(MSG_DEBUG, "EAP-PWD (peer): using group %d",
246 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail");
257 wpa_printf(MSG_INFO, "EAP-PWD: failed to allocate memory for
    [all...]
eap_tnc.c 71 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory "
77 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack");
91 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Response");
125 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
132 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
148 wpa_printf(MSG_DEBUG, "EAP-TNC: Fragment overflow");
154 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes, waiting for "
170 wpa_printf(MSG_DEBUG, "EAP-TNC: No Message Length field in a "
180 wpa_printf(MSG_DEBUG, "EAP-TNC: No memory for "
186 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes in first
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_md5.c 51 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to get random data");
59 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to allocate memory for "
84 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame");
88 wpa_printf(MSG_INFO, "EAP-MD5: Invalid response "
108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not "
124 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed");
130 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success");
133 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Failure");
tncs.c 135 wpa_printf(MSG_DEBUG, "TNC: Connection ID %lu not found",
151 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ReportMessageTypes(imvID=%lu "
156 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu",
187 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage(imvID=%lu "
230 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_RequestHandshakeRetry");
244 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ProvideRecommendation(imvID=%lu "
271 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_GetAttribute");
284 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SetAttribute");
295 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_BindFunction(imcID=%lu, "
342 wpa_printf(MSG_ERROR, "TNC: IMV does not export
    [all...]
eap_server_pax.c 78 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (sending)");
81 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to get random data");
90 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to allocate memory "
125 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (sending)");
131 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to allocate memory "
175 wpa_printf(MSG_DEBUG, "EAP-PAX: Unknown state %d in buildReq",
194 wpa_printf(MSG_INFO, "EAP-PAX: Invalid frame");
201 wpa_printf(MSG_DEBUG, "EAP-PAX: received frame: op_code 0x%x "
211 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX_STD-2 - "
218 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX-ACK -
    [all...]
  /external/wpa_supplicant_8/src/l2_packet/
l2_packet_ndis.c 134 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Wait for pending "
140 wpa_printf(MSG_DEBUG, "L2(NDISUIO): "
148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d",
164 wpa_printf(MSG_MSGDUMP, "l2_packet_rx_thread: -> ReadFile");
168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: "
181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet",
203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started");
228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received "
237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: "
245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped")
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_client_write.c 51 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello");
57 wpa_printf(MSG_ERROR, "TLSv1: Could not generate "
116 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
138 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate");
158 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space "
183 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain "
193 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record");
217 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate "
224 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random "
247 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate
    [all...]
tlsv1_cred.c 48 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate",
69 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name);
111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - "
116 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into "
123 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM "
130 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM "
136 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM "
166 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'",
199 wpa_printf(MSG_INFO, "TLSv1: Use of CA certificate directory "
248 wpa_printf(MSG_DEBUG, "TLSv1: Unsupported private key
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_ndis_.c 53 wpa_printf(MSG_DEBUG, "NDIS: event - type %d", type);
59 wpa_printf(MSG_DEBUG, "NDIS: event data overflow");
96 wpa_printf(MSG_DEBUG, "%s: ReadFile() failed: %d", __func__,
  /external/wpa_supplicant_8/src/utils/
state_machine.h 49 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " #machine \
68 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " \
86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
utils_module_tests.c 46 wpa_printf(MSG_INFO, "printf encode/decode tests");
51 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf);
73 wpa_printf(MSG_ERROR, "Error in bounds checking#1");
81 wpa_printf(MSG_ERROR, "Error in bounds checking#2(%d)",
88 wpa_printf(MSG_ERROR, "%d printf test(s) failed", errors);
102 wpa_printf(MSG_INFO, "bitfield tests");
171 wpa_printf(MSG_ERROR, "%d bitfield test(s) failed", errors);
188 wpa_printf(MSG_INFO, "int_array tests");
202 wpa_printf(MSG_ERROR, "%d int_array test(s) failed", errors);
216 wpa_printf(MSG_INFO, "ext_password tests")
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_module_tests.c 269 wpa_printf(MSG_INFO, "WPS attribute parsing tests");
286 wpa_printf(MSG_ERROR, "WPS attribute parsing test %u failed: %s",
331 wpa_printf(MSG_INFO, "WPS module tests");
wps_upnp_ap.c 23 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar from ER timed out");
48 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar: Disable "
64 wpa_printf(MSG_DEBUG, "WPS: Add broadcast "
wps_registrar.c 206 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR,
210 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was "
227 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR,
234 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the "
384 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for "
407 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap");
410 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID");
417 wpa_printf(MSG_DEBUG, "WPS: Consider PBC session with " MACSTR,
423 wpa_printf(MSG_DEBUG, "WPS: PBC walk time has expired");
428 wpa_printf(MSG_DEBUG, "WPS: Same Enrollee")
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 37 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst));
67 wpa_printf(MSG_DEBUG, "FT: add_tspec is not initialized");
324 wpa_printf(MSG_DEBUG, "FT: Send PMK-R1 pull request to remote R0KH "
336 wpa_printf(MSG_DEBUG, "FT: Failed to get random data for "
378 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key "
514 wpa_printf(MSG_DEBUG, "FT: Resource Request: id=%d descr_count=%d",
520 wpa_printf(MSG_ERROR, "FT: Not enough room for response RDIE");
534 wpa_printf(MSG_DEBUG, "FT: Failed to parse request IEs");
546 wpa_printf(MSG_DEBUG, "FT: Too short WMM TSPEC IE "
553 wpa_printf(MSG_ERROR, "FT: Not enough room for
    [all...]
iapp.c 207 wpa_printf(MSG_INFO, "sendto[IAPP-ADD]: %s", strerror(errno));
234 wpa_printf(MSG_INFO, "send[L2 Update]: %s", strerror(errno));
272 wpa_printf(MSG_INFO, "Invalid IAPP-ADD packet length %d (expected %lu)",
322 wpa_printf(MSG_INFO, "iapp_receive_udp - recvfrom: %s",
347 wpa_printf(MSG_INFO, "Dropping IAPP frame with unknown version %d",
352 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)",
357 wpa_printf(MSG_INFO, "Ignoring %d extra bytes from IAPP frame",
374 wpa_printf(MSG_INFO, "Unknown IAPP command %d", hdr->command);
401 wpa_printf(MSG_INFO, "iapp_init - socket[PF_INET,SOCK_DGRAM]: %s",
410 wpa_printf(MSG_INFO, "iapp_init - ioctl(SIOCGIFINDEX): %s"
    [all...]
vlan_init.c 44 wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) "
53 wpa_printf(MSG_ERROR, "VLAN: %s: ioctl(SIOCGIFFLAGS) failed "
66 wpa_printf(MSG_ERROR, "VLAN: %s: ioctl(SIOCSIFFLAGS) failed "
80 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s up", if_name);
87 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s down", if_name);
112 wpa_printf(MSG_DEBUG, "VLAN: br_delif(%s, %s)", br_name, if_name);
114 wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) "
122 wpa_printf(MSG_ERROR, "VLAN: %s: Failure determining "
137 wpa_printf(MSG_ERROR, "VLAN: %s: ioctl[SIOCDEVPRIVATE,"
163 wpa_printf(MSG_DEBUG, "VLAN: br_addif(%s, %s)", br_name, if_name)
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_schannel.c 54 wpa_printf(MSG_ERROR, "%s: Could not load Secur32.dll - 0x%x",
62 wpa_printf(MSG_ERROR, "%s: Could not find "
72 wpa_printf(MSG_ERROR, "%s: Could not read security "
227 wpa_printf(MSG_DEBUG, "%s: Generating ClientHello", __func__);
249 wpa_printf(MSG_ERROR, "%s: InitializeSecurityContextA "
268 wpa_printf(MSG_ERROR, "SChannel: Failed to generate ClientHello");
294 wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes("
330 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process",
374 wpa_printf(MSG_MSGDUMP, "Schannel: InitializeSecurityContext -> "
397 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE")
    [all...]

Completed in 616 milliseconds

1 2 34 5 6 7 8 91011>>