/external/wpa_supplicant_8/wpa_supplicant/ |
bgscan_simple.c | 51 wpa_printf(MSG_DEBUG, "bgscan simple: Request a background scan"); 53 wpa_printf(MSG_DEBUG, "bgscan simple: Failed to trigger scan"); 66 wpa_printf(MSG_DEBUG, "bgscan simple: Backing " 100 wpa_printf(MSG_ERROR, "bgscan simple: Missing scan interval " 131 wpa_printf(MSG_DEBUG, "bgscan simple: Signal strength threshold %d " 138 wpa_printf(MSG_ERROR, "bgscan simple: Failed to enable " 151 wpa_printf(MSG_DEBUG, "bgscan simple: Init scan interval: %d", 183 wpa_printf(MSG_DEBUG, "bgscan simple: scan result notification"); 202 wpa_printf(MSG_DEBUG, "bgscan simple: beacon loss"); 220 wpa_printf(MSG_DEBUG, "bgscan simple: signal level changed [all...] |
wnm_sta.c | 31 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper); 42 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper); 62 wpa_printf(MSG_DEBUG, "WNM: Request to send WNM-Sleep Mode Request " 107 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for " 137 wpa_printf(MSG_DEBUG, "Failed to send WNM-Sleep Request " 162 wpa_printf(MSG_DEBUG, "TFS Resp IE(s) found"); 168 wpa_printf(MSG_DEBUG, "WNM: Fail to set TFS Resp IE"); 191 wpa_printf(MSG_DEBUG, "WNM: Invalid Key Data element " 201 wpa_printf(MSG_DEBUG, "WNM: Too short GTK " 208 wpa_printf(MSG_DEBUG, "WNM: Invalid GTK [all...] |
autoscan_periodic.c | 54 wpa_printf(MSG_DEBUG, "autoscan periodic: interval is %d", 74 wpa_printf(MSG_DEBUG, "autoscan periodic: scan result notification");
|
ibss_rsn.c | 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 84 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 112 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 161 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK"); 183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 192 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 198 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__); 223 wpa_printf(MSG_DEBUG, "SUPP: wpa_sm_init() failed"); 238 wpa_printf(MSG_DEBUG, "SUPP: wpa_sm_set_assoc_wpa_ie_default() [all...] |
blacklist.c | 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count " 79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist", 107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " 135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
|
/external/wpa_supplicant_8/src/eap_peer/ |
tncc.c | 115 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_ReportMessageTypes(imcID=%lu " 120 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu", 152 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage(imcID=%lu " 191 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_RequestHandshakeRetry"); 209 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_LogMessage(imcID=%lu " 219 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_UserMessage(imcID=%lu " 231 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_BindFunction(imcID=%lu, " 283 wpa_printf(MSG_ERROR, "TNC: IMC does not export " 290 wpa_printf(MSG_ERROR, "TNC: IMC does not export " 298 wpa_printf(MSG_ERROR, "TNC: IMC does not export [all...] |
eap_ikev2.c | 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 67 wpa_printf(MSG_INFO, "EAP-IKEV2: No identity available"); 127 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 144 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response"); 163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 168 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 202 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 219 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 226 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 235 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes [all...] |
eap_pwd.c | 77 wpa_printf(MSG_DEBUG, "EAP-PWD: %s -> %s", 92 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); 98 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); 103 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); 108 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail"); 114 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); 124 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation psk fail"); 241 wpa_printf(MSG_DEBUG, "EAP-PWD (peer): using group %d", 246 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); 257 wpa_printf(MSG_INFO, "EAP-PWD: failed to allocate memory for [all...] |
eap_tnc.c | 71 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory " 77 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack"); 91 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Response"); 125 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 132 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 148 wpa_printf(MSG_DEBUG, "EAP-TNC: Fragment overflow"); 154 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes, waiting for " 170 wpa_printf(MSG_DEBUG, "EAP-TNC: No Message Length field in a " 180 wpa_printf(MSG_DEBUG, "EAP-TNC: No memory for " 186 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes in first [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_md5.c | 51 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to get random data"); 59 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to allocate memory for " 84 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame"); 88 wpa_printf(MSG_INFO, "EAP-MD5: Invalid response " 108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not " 124 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed"); 130 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success"); 133 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Failure");
|
tncs.c | 135 wpa_printf(MSG_DEBUG, "TNC: Connection ID %lu not found", 151 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ReportMessageTypes(imvID=%lu " 156 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu", 187 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage(imvID=%lu " 230 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_RequestHandshakeRetry"); 244 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ProvideRecommendation(imvID=%lu " 271 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_GetAttribute"); 284 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SetAttribute"); 295 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_BindFunction(imcID=%lu, " 342 wpa_printf(MSG_ERROR, "TNC: IMV does not export [all...] |
eap_server_pax.c | 78 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (sending)"); 81 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to get random data"); 90 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to allocate memory " 125 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (sending)"); 131 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to allocate memory " 175 wpa_printf(MSG_DEBUG, "EAP-PAX: Unknown state %d in buildReq", 194 wpa_printf(MSG_INFO, "EAP-PAX: Invalid frame"); 201 wpa_printf(MSG_DEBUG, "EAP-PAX: received frame: op_code 0x%x " 211 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX_STD-2 - " 218 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX-ACK - [all...] |
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet_ndis.c | 134 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Wait for pending " 140 wpa_printf(MSG_DEBUG, "L2(NDISUIO): " 148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d", 164 wpa_printf(MSG_MSGDUMP, "l2_packet_rx_thread: -> ReadFile"); 168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: " 181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet", 203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started"); 228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received " 237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: " 245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped") [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_write.c | 51 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello"); 57 wpa_printf(MSG_ERROR, "TLSv1: Could not generate " 116 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 138 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); 158 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " 183 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain " 193 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); 217 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " 224 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random " 247 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate [all...] |
tlsv1_cred.c | 48 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate", 69 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name); 111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " 116 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into " 123 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM " 130 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM " 136 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM " 166 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", 199 wpa_printf(MSG_INFO, "TLSv1: Use of CA certificate directory " 248 wpa_printf(MSG_DEBUG, "TLSv1: Unsupported private key [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis_.c | 53 wpa_printf(MSG_DEBUG, "NDIS: event - type %d", type); 59 wpa_printf(MSG_DEBUG, "NDIS: event data overflow"); 96 wpa_printf(MSG_DEBUG, "%s: ReadFile() failed: %d", __func__,
|
/external/wpa_supplicant_8/src/utils/ |
state_machine.h | 49 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " #machine \ 68 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " \ 86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
|
utils_module_tests.c | 46 wpa_printf(MSG_INFO, "printf encode/decode tests"); 51 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf); 73 wpa_printf(MSG_ERROR, "Error in bounds checking#1"); 81 wpa_printf(MSG_ERROR, "Error in bounds checking#2(%d)", 88 wpa_printf(MSG_ERROR, "%d printf test(s) failed", errors); 102 wpa_printf(MSG_INFO, "bitfield tests"); 171 wpa_printf(MSG_ERROR, "%d bitfield test(s) failed", errors); 188 wpa_printf(MSG_INFO, "int_array tests"); 202 wpa_printf(MSG_ERROR, "%d int_array test(s) failed", errors); 216 wpa_printf(MSG_INFO, "ext_password tests") [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_module_tests.c | 269 wpa_printf(MSG_INFO, "WPS attribute parsing tests"); 286 wpa_printf(MSG_ERROR, "WPS attribute parsing test %u failed: %s", 331 wpa_printf(MSG_INFO, "WPS module tests");
|
wps_upnp_ap.c | 23 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar from ER timed out"); 48 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar: Disable " 64 wpa_printf(MSG_DEBUG, "WPS: Add broadcast "
|
wps_registrar.c | 206 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR, 210 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was " 227 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR, 234 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the " 384 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for " 407 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap"); 410 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID"); 417 wpa_printf(MSG_DEBUG, "WPS: Consider PBC session with " MACSTR, 423 wpa_printf(MSG_DEBUG, "WPS: PBC walk time has expired"); 428 wpa_printf(MSG_DEBUG, "WPS: Same Enrollee") [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 37 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); 67 wpa_printf(MSG_DEBUG, "FT: add_tspec is not initialized"); 324 wpa_printf(MSG_DEBUG, "FT: Send PMK-R1 pull request to remote R0KH " 336 wpa_printf(MSG_DEBUG, "FT: Failed to get random data for " 378 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " 514 wpa_printf(MSG_DEBUG, "FT: Resource Request: id=%d descr_count=%d", 520 wpa_printf(MSG_ERROR, "FT: Not enough room for response RDIE"); 534 wpa_printf(MSG_DEBUG, "FT: Failed to parse request IEs"); 546 wpa_printf(MSG_DEBUG, "FT: Too short WMM TSPEC IE " 553 wpa_printf(MSG_ERROR, "FT: Not enough room for [all...] |
iapp.c | 207 wpa_printf(MSG_INFO, "sendto[IAPP-ADD]: %s", strerror(errno)); 234 wpa_printf(MSG_INFO, "send[L2 Update]: %s", strerror(errno)); 272 wpa_printf(MSG_INFO, "Invalid IAPP-ADD packet length %d (expected %lu)", 322 wpa_printf(MSG_INFO, "iapp_receive_udp - recvfrom: %s", 347 wpa_printf(MSG_INFO, "Dropping IAPP frame with unknown version %d", 352 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)", 357 wpa_printf(MSG_INFO, "Ignoring %d extra bytes from IAPP frame", 374 wpa_printf(MSG_INFO, "Unknown IAPP command %d", hdr->command); 401 wpa_printf(MSG_INFO, "iapp_init - socket[PF_INET,SOCK_DGRAM]: %s", 410 wpa_printf(MSG_INFO, "iapp_init - ioctl(SIOCGIFINDEX): %s" [all...] |
vlan_init.c | 44 wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) " 53 wpa_printf(MSG_ERROR, "VLAN: %s: ioctl(SIOCGIFFLAGS) failed " 66 wpa_printf(MSG_ERROR, "VLAN: %s: ioctl(SIOCSIFFLAGS) failed " 80 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s up", if_name); 87 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s down", if_name); 112 wpa_printf(MSG_DEBUG, "VLAN: br_delif(%s, %s)", br_name, if_name); 114 wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) " 122 wpa_printf(MSG_ERROR, "VLAN: %s: Failure determining " 137 wpa_printf(MSG_ERROR, "VLAN: %s: ioctl[SIOCDEVPRIVATE," 163 wpa_printf(MSG_DEBUG, "VLAN: br_addif(%s, %s)", br_name, if_name) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_schannel.c | 54 wpa_printf(MSG_ERROR, "%s: Could not load Secur32.dll - 0x%x", 62 wpa_printf(MSG_ERROR, "%s: Could not find " 72 wpa_printf(MSG_ERROR, "%s: Could not read security " 227 wpa_printf(MSG_DEBUG, "%s: Generating ClientHello", __func__); 249 wpa_printf(MSG_ERROR, "%s: InitializeSecurityContextA " 268 wpa_printf(MSG_ERROR, "SChannel: Failed to generate ClientHello"); 294 wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes(" 330 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process", 374 wpa_printf(MSG_MSGDUMP, "Schannel: InitializeSecurityContext -> " 397 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE") [all...] |