Home
last modified time | relevance | path

Searched refs:MSG_INFO (Results 1 – 25 of 467) sorted by relevance

12345678910>>...19

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/
Dwps_validate.c25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version()
32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version()
44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2()
51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2()
63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type()
70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type()
82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type()
89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type()
101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods()
107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/
Dwps_validate.c25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version()
32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version()
44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2()
51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2()
63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type()
70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type()
82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type()
89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type()
101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods()
107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/
Dspp_client.c57 wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')", in hs20_spp_validate()
66 wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err); in hs20_spp_validate()
157 wpa_printf(MSG_INFO, "Processing updateNode"); in process_update_node()
162 wpa_printf(MSG_INFO, "No managementTreeURI present"); in process_update_node()
165 wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri); in process_update_node()
169 wpa_printf(MSG_INFO, "Unexpected URI"); in process_update_node()
174 wpa_printf(MSG_INFO, "Update interior node: '%s'", name); in process_update_node()
178 wpa_printf(MSG_INFO, "Could not extract MO text"); in process_update_node()
205 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer text"); in process_update_node()
213 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer TNDS text"); in process_update_node()
[all …]
Dosu_client.c121 wpa_printf(MSG_INFO, "CTRL: Could not lchown directory: %s", in android_update_permission()
127 wpa_printf(MSG_INFO, "CTRL: Could not chmod directory: %s", in android_update_permission()
148 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto); in osu_get_certificate()
151 wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol"); in osu_get_certificate()
159 wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node"); in osu_get_certificate()
165 wpa_printf(MSG_INFO, "Could not get URL text"); in osu_get_certificate()
168 wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url); in osu_get_certificate()
173 wpa_printf(MSG_INFO, "Could not find estUserID node"); in osu_get_certificate()
179 wpa_printf(MSG_INFO, "Could not get estUserID text"); in osu_get_certificate()
182 wpa_printf(MSG_INFO, "estUserID: %s", user); in osu_get_certificate()
[all …]
Doma_dm_client.c220 wpa_printf(MSG_INFO, "MgmtTree: %s", str); in mo_str()
251 wpa_printf(MSG_INFO, "Could not read devinfo.xml"); in add_replace_devinfo()
398 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_browser()
404 wpa_printf(MSG_INFO, "Invalid data"); in oma_dm_exec_browser()
407 wpa_printf(MSG_INFO, "Data: %s", data); in oma_dm_exec_browser()
408 wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data); in oma_dm_exec_browser()
413 wpa_printf(MSG_INFO, "User response in browser completed successfully"); in oma_dm_exec_browser()
417 wpa_printf(MSG_INFO, "Failed to receive user response"); in oma_dm_exec_browser()
431 wpa_printf(MSG_INFO, "Client certificate enrollment"); in oma_dm_exec_get_cert()
436 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_get_cert()
[all …]
Dest.c50 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert()
58 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert()
78 wpa_printf(MSG_INFO, "No certificates found in PKCS#7 object"); in pkcs7_to_cert()
135 wpa_printf(MSG_INFO, "Download EST cacerts from %s", buf); in est_load_cacerts()
145 wpa_printf(MSG_INFO, "Failed to download EST cacerts from %s", in est_load_cacerts()
156 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt"); in est_load_cacerts()
163 …wpa_printf(MSG_INFO, "Too short base64 decode (%u bytes; downloaded %u bytes) - assume this was bi… in est_load_cacerts()
169 …wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7"); in est_load_cacerts()
179 wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts"); in est_load_cacerts()
188 wpa_printf(MSG_INFO, "Could not parse CA certs from PKCS#7 cacerts response"); in est_load_cacerts()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/
Dspp_client.c57 wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')", in hs20_spp_validate()
66 wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err); in hs20_spp_validate()
157 wpa_printf(MSG_INFO, "Processing updateNode"); in process_update_node()
162 wpa_printf(MSG_INFO, "No managementTreeURI present"); in process_update_node()
165 wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri); in process_update_node()
169 wpa_printf(MSG_INFO, "Unexpected URI"); in process_update_node()
174 wpa_printf(MSG_INFO, "Update interior node: '%s'", name); in process_update_node()
178 wpa_printf(MSG_INFO, "Could not extract MO text"); in process_update_node()
205 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer text"); in process_update_node()
213 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer TNDS text"); in process_update_node()
[all …]
Dosu_client.c121 wpa_printf(MSG_INFO, "CTRL: Could not lchown directory: %s", in android_update_permission()
127 wpa_printf(MSG_INFO, "CTRL: Could not chmod directory: %s", in android_update_permission()
148 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto); in osu_get_certificate()
151 wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol"); in osu_get_certificate()
159 wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node"); in osu_get_certificate()
165 wpa_printf(MSG_INFO, "Could not get URL text"); in osu_get_certificate()
168 wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url); in osu_get_certificate()
173 wpa_printf(MSG_INFO, "Could not find estUserID node"); in osu_get_certificate()
179 wpa_printf(MSG_INFO, "Could not get estUserID text"); in osu_get_certificate()
182 wpa_printf(MSG_INFO, "estUserID: %s", user); in osu_get_certificate()
[all …]
Doma_dm_client.c220 wpa_printf(MSG_INFO, "MgmtTree: %s", str); in mo_str()
251 wpa_printf(MSG_INFO, "Could not read devinfo.xml"); in add_replace_devinfo()
398 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_browser()
404 wpa_printf(MSG_INFO, "Invalid data"); in oma_dm_exec_browser()
407 wpa_printf(MSG_INFO, "Data: %s", data); in oma_dm_exec_browser()
408 wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data); in oma_dm_exec_browser()
413 wpa_printf(MSG_INFO, "User response in browser completed successfully"); in oma_dm_exec_browser()
417 wpa_printf(MSG_INFO, "Failed to receive user response"); in oma_dm_exec_browser()
431 wpa_printf(MSG_INFO, "Client certificate enrollment"); in oma_dm_exec_get_cert()
436 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_get_cert()
[all …]
Dest.c50 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert()
58 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert()
78 wpa_printf(MSG_INFO, "No certificates found in PKCS#7 object"); in pkcs7_to_cert()
135 wpa_printf(MSG_INFO, "Download EST cacerts from %s", buf); in est_load_cacerts()
145 wpa_printf(MSG_INFO, "Failed to download EST cacerts from %s", in est_load_cacerts()
156 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt"); in est_load_cacerts()
163 …wpa_printf(MSG_INFO, "Too short base64 decode (%u bytes; downloaded %u bytes) - assume this was bi… in est_load_cacerts()
169 …wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7"); in est_load_cacerts()
179 wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts"); in est_load_cacerts()
188 wpa_printf(MSG_INFO, "Could not parse CA certs from PKCS#7 cacerts response"); in est_load_cacerts()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dcrypto_module_tests.c149 wpa_printf(MSG_INFO, "AES-SIV test cases passed"); in test_siv()
293 wpa_printf(MSG_INFO, "OMAC1-AES-128 test cases passed"); in test_omac1()
341 wpa_printf(MSG_INFO, "AES-128 EAX mode test cases passed"); in test_eax()
497 wpa_printf(MSG_INFO, "AES ECB mode test cases passed"); in test_ecb()
616 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.1"); in test_key_wrap()
637 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.2"); in test_key_wrap()
658 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.3"); in test_key_wrap()
679 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.4"); in test_key_wrap()
700 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.5"); in test_key_wrap()
720 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.6"); in test_key_wrap()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dcrypto_module_tests.c149 wpa_printf(MSG_INFO, "AES-SIV test cases passed"); in test_siv()
293 wpa_printf(MSG_INFO, "OMAC1-AES-128 test cases passed"); in test_omac1()
341 wpa_printf(MSG_INFO, "AES-128 EAX mode test cases passed"); in test_eax()
497 wpa_printf(MSG_INFO, "AES ECB mode test cases passed"); in test_ecb()
616 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.1"); in test_key_wrap()
637 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.2"); in test_key_wrap()
658 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.3"); in test_key_wrap()
679 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.4"); in test_key_wrap()
700 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.5"); in test_key_wrap()
720 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.6"); in test_key_wrap()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/
Dutils_module_tests.c54 wpa_printf(MSG_INFO, "printf encode/decode tests"); in printf_encode_decode_tests()
59 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf); in printf_encode_decode_tests()
134 wpa_printf(MSG_INFO, "bitfield tests"); in bitfield_tests()
231 wpa_printf(MSG_INFO, "int_array tests"); in int_array_tests()
259 wpa_printf(MSG_INFO, "ext_password tests"); in ext_password_tests()
286 wpa_printf(MSG_INFO, "trace tests"); in trace_tests()
301 wpa_printf(MSG_INFO, "base64 tests"); in base64_tests()
369 wpa_printf(MSG_INFO, "common tests"); in common_tests()
453 wpa_printf(MSG_INFO, "os tests"); in os_tests()
518 wpa_printf(MSG_INFO, "wpabuf tests"); in wpabuf_tests()
[all …]
Dtrace.c77 wpa_printf(MSG_INFO, "bfd_openr failed"); in open_bfd()
82 wpa_printf(MSG_INFO, "bfd_check_format failed"); in open_bfd()
88 wpa_printf(MSG_INFO, "bfd_check_format_matches failed"); in open_bfd()
107 wpa_printf(MSG_INFO, "No symbols"); in read_syms()
117 wpa_printf(MSG_INFO, "Unknown symtab upper bound"); in read_syms()
123 wpa_printf(MSG_INFO, "Failed to allocate memory for symtab " in read_syms()
132 wpa_printf(MSG_INFO, "Failed to canonicalize %ssymtab", in read_syms()
211 wpa_printf(MSG_INFO, " %s() %s:%u", in wpa_trace_bfd_addr()
252 wpa_printf(MSG_INFO, "Failed to open bfd"); in wpa_trace_bfd_init()
259 wpa_printf(MSG_INFO, "Failed to read symbols"); in wpa_trace_bfd_init()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/
Dutils_module_tests.c54 wpa_printf(MSG_INFO, "printf encode/decode tests"); in printf_encode_decode_tests()
59 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf); in printf_encode_decode_tests()
134 wpa_printf(MSG_INFO, "bitfield tests"); in bitfield_tests()
231 wpa_printf(MSG_INFO, "int_array tests"); in int_array_tests()
259 wpa_printf(MSG_INFO, "ext_password tests"); in ext_password_tests()
286 wpa_printf(MSG_INFO, "trace tests"); in trace_tests()
302 wpa_printf(MSG_INFO, "base64 tests"); in base64_tests()
370 wpa_printf(MSG_INFO, "common tests"); in common_tests()
454 wpa_printf(MSG_INFO, "os tests"); in os_tests()
519 wpa_printf(MSG_INFO, "wpabuf tests"); in wpabuf_tests()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Dikev2.c53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal()
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal()
238 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal()
252 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal()
260 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal()
276 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Dikev2.c53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal()
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal()
238 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal()
252 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal()
260 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal()
276 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Dikev2.c49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
125 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
132 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
146 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
208 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal()
217 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal()
230 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal()
244 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal()
252 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal()
268 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal()
[all …]
Deap_pwd.c103 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); in eap_pwd_init()
109 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); in eap_pwd_init()
114 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); in eap_pwd_init()
119 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_init()
128 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation psk fail"); in eap_pwd_init()
279 wpa_printf(MSG_INFO, in eap_pwd_perform_id_exchange()
311 wpa_printf(MSG_INFO, "EAP-pwd: data was already allocated"); in eap_pwd_perform_id_exchange()
318 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_perform_id_exchange()
324 wpa_hexdump_ascii(MSG_INFO, "EAP-PWD (peer): server sent id of", in eap_pwd_perform_id_exchange()
329 wpa_printf(MSG_INFO, "EAP-PWD: failed to allocate memory for " in eap_pwd_perform_id_exchange()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Dikev2.c49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
125 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
132 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
146 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
209 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal()
218 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal()
231 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal()
245 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal()
253 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal()
269 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal()
[all …]
Deap_pwd.c103 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); in eap_pwd_init()
109 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); in eap_pwd_init()
114 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); in eap_pwd_init()
119 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_init()
128 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation psk fail"); in eap_pwd_init()
279 wpa_printf(MSG_INFO, in eap_pwd_perform_id_exchange()
311 wpa_printf(MSG_INFO, "EAP-pwd: data was already allocated"); in eap_pwd_perform_id_exchange()
318 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_perform_id_exchange()
324 wpa_hexdump_ascii(MSG_INFO, "EAP-PWD (peer): server sent id of", in eap_pwd_perform_id_exchange()
329 wpa_printf(MSG_INFO, "EAP-PWD: failed to allocate memory for " in eap_pwd_perform_id_exchange()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Diapp.c203 wpa_printf(MSG_INFO, "sendto[IAPP-ADD]: %s", strerror(errno)); in iapp_send_add()
230 wpa_printf(MSG_INFO, "send[L2 Update]: %s", strerror(errno)); in iapp_send_layer2_update()
268 wpa_printf(MSG_INFO, "Invalid IAPP-ADD packet length %d (expected %lu)", in iapp_process_add_notify()
318 wpa_printf(MSG_INFO, "iapp_receive_udp - recvfrom: %s", in iapp_receive_udp()
343 wpa_printf(MSG_INFO, "Dropping IAPP frame with unknown version %d", in iapp_receive_udp()
348 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)", in iapp_receive_udp()
353 wpa_printf(MSG_INFO, "Ignoring %d extra bytes from IAPP frame", in iapp_receive_udp()
370 wpa_printf(MSG_INFO, "Unknown IAPP command %d", hdr->command); in iapp_receive_udp()
398 wpa_printf(MSG_INFO, "iapp_init - socket[PF_INET,SOCK_DGRAM]: %s", in iapp_init()
407 wpa_printf(MSG_INFO, "iapp_init - ioctl(SIOCGIFINDEX): %s", in iapp_init()
[all …]
Ddpp_hostapd.c51 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in hostapd_dpp_qr_code()
76 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in hostapd_dpp_auth_resp_retry_timeout()
100 wpa_printf(MSG_INFO, in hostapd_dpp_auth_resp_retry()
129 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX_STATUS "dst=" MACSTR in hostapd_dpp_tx_status()
198 wpa_printf(MSG_INFO, in hostapd_dpp_tx_status()
232 wpa_printf(MSG_INFO, in hostapd_dpp_reply_wait_timeout()
234 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_AUTH_INIT_FAILED); in hostapd_dpp_reply_wait_timeout()
271 wpa_printf(MSG_INFO, in hostapd_dpp_reply_wait_timeout()
330 wpa_printf(MSG_INFO, in hostapd_dpp_auth_init_next()
332 wpa_msg(hapd->msg_ctx, MSG_INFO, in hostapd_dpp_auth_init_next()
[all …]
Daccounting.c49 wpa_printf(MSG_INFO, "Could not create new RADIUS packet"); in accounting_msg()
55 wpa_printf(MSG_INFO, "Could not add Acct-Status-Type"); in accounting_msg()
67 wpa_printf(MSG_INFO, "Could not add Acct-Authentic"); in accounting_msg()
91 wpa_printf(MSG_INFO, "Could not add User-Name"); in accounting_msg()
112 wpa_printf(MSG_INFO, "Could not add Class"); in accounting_msg()
149 wpa_printf(MSG_INFO, "Could not add Event-Timestamp"); in accounting_msg()
158 wpa_printf(MSG_INFO, "Could not add Acct-Delay-Time"); in accounting_msg()
281 wpa_printf(MSG_INFO, "Could not create RADIUS Accounting message"); in accounting_sta_report()
289 wpa_printf(MSG_INFO, "Could not add Acct-Session-Time"); in accounting_sta_report()
297 wpa_printf(MSG_INFO, "Could not add Acct-Input-Packets"); in accounting_sta_report()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Daccounting.c49 wpa_printf(MSG_INFO, "Could not create new RADIUS packet"); in accounting_msg()
55 wpa_printf(MSG_INFO, "Could not add Acct-Status-Type"); in accounting_msg()
67 wpa_printf(MSG_INFO, "Could not add Acct-Authentic"); in accounting_msg()
91 wpa_printf(MSG_INFO, "Could not add User-Name"); in accounting_msg()
112 wpa_printf(MSG_INFO, "Could not add Class"); in accounting_msg()
149 wpa_printf(MSG_INFO, "Could not add Event-Timestamp"); in accounting_msg()
158 wpa_printf(MSG_INFO, "Could not add Acct-Delay-Time"); in accounting_msg()
281 wpa_printf(MSG_INFO, "Could not create RADIUS Accounting message"); in accounting_sta_report()
289 wpa_printf(MSG_INFO, "Could not add Acct-Session-Time"); in accounting_sta_report()
297 wpa_printf(MSG_INFO, "Could not add Acct-Input-Packets"); in accounting_sta_report()
[all …]

12345678910>>...19