/external/wpa_supplicant_8/hostapd/ |
hapd_module_tests.c | 16 wpa_printf(MSG_INFO, "hostapd module tests");
|
/external/wpa_supplicant_8/src/ap/ |
acs.h | 21 wpa_printf(MSG_ERROR, "ACS was disabled on your build, rebuild hostapd with CONFIG_ACS=y or set channel");
|
vlan_util.c | 31 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d, " 35 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'", 41 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'", 48 wpa_printf(MSG_ERROR, "VLAN: failed to open netlink socket"); 54 wpa_printf(MSG_ERROR, "VLAN: failed to connect to netlink: %s", 62 wpa_printf(MSG_ERROR, "VLAN: interface %s does not exist", 75 wpa_printf(MSG_ERROR, "VLAN: interface %s already exists", 83 wpa_printf(MSG_ERROR, "VLAN: failed to allocate new link"); 89 wpa_printf(MSG_ERROR, "VLAN: failed to set link type: %s", 99 wpa_printf(MSG_ERROR, "VLAN: failed to set link vlan id: %s" [all...] |
p2p_hostapd.c | 36 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d " 46 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set " 56 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update " 61 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable " 70 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected"); 73 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA"); 81 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected"); 84 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
|
x_snoop.c | 23 wpa_printf(MSG_DEBUG, 29 wpa_printf(MSG_DEBUG, 36 wpa_printf(MSG_DEBUG, 42 wpa_printf(MSG_DEBUG, 49 wpa_printf(MSG_DEBUG, 56 wpa_printf(MSG_DEBUG, 77 wpa_printf(MSG_DEBUG, 84 wpa_printf(MSG_DEBUG, 106 wpa_printf(MSG_EXCESSIVE, "x_snoop: Multicast-to-unicast conversion " 116 wpa_printf(MSG_DEBUG [all...] |
vlan_ioctl.c | 24 wpa_printf(MSG_DEBUG, "VLAN: vlan_rem(%s)", if_name); 26 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'", 32 wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) " 43 wpa_printf(MSG_ERROR, "VLAN: %s: DEL_VLAN_CMD failed for %s: " 67 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d)", 72 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'", 78 wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) " 100 wpa_printf(MSG_DEBUG, 115 wpa_printf(MSG_ERROR, 132 wpa_printf(MSG_DEBUG, "VLAN: vlan_set_name_type(name_type=%u)" [all...] |
vlan_ifconfig.c | 25 wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) " 34 wpa_printf(MSG_ERROR, "VLAN: %s: ioctl(SIOCGIFFLAGS) failed " 47 wpa_printf(MSG_ERROR, "VLAN: %s: ioctl(SIOCSIFFLAGS) failed " 61 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s up", if_name);
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_parse.c | 23 wpa_printf(MSG_EXCESSIVE, "WPS: WFA subelement id=%u len=%u", 28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " 40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " 48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " 56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " 64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u", 71 wpa_printf(MSG_MSGDUMP, "WPS: Skipped unknown WFA Vendor " 106 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); 118 wpa_printf(MSG_MSGDUMP, "WPS: Unknown Vendor Extension (Vendor ID %u)", 122 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)" [all...] |
wps_validate.c | 25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " 32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " 44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " 51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " 63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " 70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " 82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " 89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " 101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " 107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag [all...] |
wps_attr_process.c | 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " 30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " 45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); 61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); 68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " 75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); 87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " 92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); 102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); 125 wpa_printf(MSG_DEBUG, "WPS: Credential did not include [all...] |
wps_attr_build.c | 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); 30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); 32 wpa_printf(MSG_DEBUG, 50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); 52 wpa_printf(MSG_DEBUG, 57 wpa_printf(MSG_DEBUG, 66 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); 72 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " 98 wpa_printf(MSG_DEBUG, "WPS: * Request Type"); 108 wpa_printf(MSG_DEBUG, "WPS: * Response Type (%d)", type) [all...] |
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_secy_ops.c | 33 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); 39 wpa_printf(MSG_ERROR, 53 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); 59 wpa_printf(MSG_ERROR, 73 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); 79 wpa_printf(MSG_ERROR, 93 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); 99 wpa_printf(MSG_ERROR, 121 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); 127 wpa_printf(MSG_ERROR [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_wsc_common.c | 23 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for " 28 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/FRAG_ACK");
|
eap_ikev2_common.c | 57 wpa_printf(MSG_ERROR, "EAP-IKEV2: Failed to allocate memory " 62 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack"); 79 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 86 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the " 92 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation"); 99 wpa_printf(MSG_INFO, "EAP-IKEV2: Could not calculate ICV"); 104 wpa_printf(MSG_INFO, "EAP-IKEV2: Invalid ICV"); 112 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
|
eap_sake_common.c | 25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); 27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " 34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); 36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " 43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); 45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " 52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " 61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); 66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID") [all...] |
eap_sim_common.c | 82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); 119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " 134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); 147 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); 459 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)"); 462 wpa_printf(MSG_DEBUG, "EAP-AKA': FC = 0x%x", fc); 512 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); 515 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d", 518 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " 524 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow") [all...] |
/external/wpa_supplicant_8/src/utils/ |
browser-system.c | 24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to " 38 wpa_printf(MSG_INFO, "Browser response received: %s", url); 72 wpa_printf(MSG_INFO, "Launching system browser to %s", url); 77 wpa_printf(MSG_ERROR, "eloop_init failed"); 83 wpa_printf(MSG_ERROR, "http_server_init failed"); 90 wpa_printf(MSG_ERROR, "fork: %s", strerror(errno)); 105 wpa_printf(MSG_ERROR, "execv: %s", strerror(errno));
|
browser-android.c | 24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to " 38 wpa_printf(MSG_INFO, "Browser response received: %s", url); 72 wpa_printf(MSG_INFO, "Launching Android browser to %s", url); 77 wpa_printf(MSG_ERROR, "eloop_init failed"); 83 wpa_printf(MSG_ERROR, "http_server_init failed"); 90 wpa_printf(MSG_ERROR, "fork: %s", strerror(errno)); 109 wpa_printf(MSG_ERROR, "execv: %s", strerror(errno)); 120 wpa_printf(MSG_INFO, "Closing Android browser"); 122 wpa_printf(MSG_INFO, "Failed to inject keyevent");
|
browser-wpadebug.c | 24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to " 38 wpa_printf(MSG_INFO, "Browser response received: %s", url); 73 wpa_printf(MSG_INFO, "Launching wpadebug browser to %s", url); 78 wpa_printf(MSG_ERROR, "eloop_init failed"); 84 wpa_printf(MSG_ERROR, "http_server_init failed"); 91 wpa_printf(MSG_ERROR, "fork: %s", strerror(errno)); 117 wpa_printf(MSG_ERROR, "execv: %s", strerror(errno)); 128 wpa_printf(MSG_INFO, "Closing Android browser"); 134 wpa_printf(MSG_INFO, "Failed to close wpadebug browser");
|
pcsc_funcs.c | 200 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " 227 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " 279 wpa_printf(MSG_DEBUG, "SCARD: file header did not " 297 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV 0x%02x len=%d", 333 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", 346 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", 421 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); 430 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " 436 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record"); 441 wpa_printf(MSG_DEBUG, "SCARD: Failed to read [all...] |
utils_module_tests.c | 52 wpa_printf(MSG_INFO, "printf encode/decode tests"); 57 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf); 79 wpa_printf(MSG_ERROR, "Error in bounds checking#1"); 87 wpa_printf(MSG_ERROR, "Error in bounds checking#2(%d)", 118 wpa_printf(MSG_ERROR, "%d printf test(s) failed", errors); 132 wpa_printf(MSG_INFO, "bitfield tests"); 212 wpa_printf(MSG_ERROR, "%d bitfield test(s) failed", errors); 229 wpa_printf(MSG_INFO, "int_array tests"); 243 wpa_printf(MSG_ERROR, "%d int_array test(s) failed", errors); 257 wpa_printf(MSG_INFO, "ext_password tests") [all...] |
/external/wpa_supplicant_8/src/drivers/ |
rfkill.c | 64 wpa_printf(MSG_ERROR, "rfkill: Event read failed: %s", 69 wpa_printf(MSG_DEBUG, "rfkill: Unexpected event size " 77 wpa_printf(MSG_DEBUG, "rfkill: event: idx=%u type=%d " 83 wpa_printf(MSG_INFO, "rfkill: WLAN hard blocked"); 86 wpa_printf(MSG_INFO, "rfkill: WLAN soft blocked"); 89 wpa_printf(MSG_INFO, "rfkill: WLAN unblocked"); 121 wpa_printf(MSG_INFO, "rfkill: Cannot get wiphy information"); 128 wpa_printf(MSG_INFO, "rfkill: Cannot open RFKILL control " 134 wpa_printf(MSG_ERROR, "rfkill: Cannot set non-blocking mode: " 144 wpa_printf(MSG_ERROR, "rfkill: Event read failed: %s" [all...] |
driver_wired_common.c | 40 wpa_printf(MSG_ERROR, "socket: %s", strerror(errno)); 47 wpa_printf(MSG_ERROR, "ioctl[SIOCGIFFLAGS]: %s", 65 wpa_printf(MSG_ERROR, "socket: %s", strerror(errno)); 73 wpa_printf(MSG_ERROR, "ioctl[SIOCSIFFLAGS]: %s", 94 wpa_printf(MSG_ERROR, "socket: %s", strerror(errno)); 130 wpa_printf(MSG_ERROR, "ioctl[SIOC{ADD/DEL}MULTI]: %s", 157 wpa_printf(MSG_ERROR, "setsockopt: %s", strerror(errno)); 198 wpa_printf(MSG_ERROR, "socket: %s", strerror(errno)); 205 wpa_printf(MSG_ERROR, "ioctl[SIOCGIFMEDIA]: %s", 230 wpa_printf(MSG_ERROR, "socket(PF_PACKET): %s", strerror(errno)) [all...] |
/external/wpa_supplicant_8/hs20/client/ |
spp_client.c | 57 wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')", 66 wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err); 85 wpa_printf(MSG_ERROR, 157 wpa_printf(MSG_INFO, "Processing updateNode"); 162 wpa_printf(MSG_INFO, "No managementTreeURI present"); 165 wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri); 169 wpa_printf(MSG_INFO, "Unexpected URI"); 174 wpa_printf(MSG_INFO, "Update interior node: '%s'", name); 178 wpa_printf(MSG_INFO, "Could not extract MO text"); 182 wpa_printf(MSG_DEBUG, "[hs20] nodeContainer text: '%s'", str) [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_ocsp.c | 104 wpa_printf(MSG_DEBUG, "OCSP: Could not calculate hash with alg %s", 144 wpa_printf(MSG_DEBUG, 168 wpa_printf(MSG_DEBUG, 185 wpa_printf(MSG_DEBUG, "OCSP: issuerNameHash mismatch"); 195 wpa_printf(MSG_DEBUG, 209 wpa_printf(MSG_DEBUG, "OCSP: issuerKeyHash mismatch"); 220 wpa_printf(MSG_DEBUG, "OCSP: No INTEGER tag found for serialNumber; class=%d tag=0x%x length=%u", 236 wpa_printf(MSG_DEBUG, "OCSP: serialNumber mismatch"); 246 wpa_printf(MSG_DEBUG, 252 wpa_printf(MSG_DEBUG, "OCSP: certStatus=%u", cert_status) [all...] |