/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
D | wps_validate.c | 25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version() 32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version() 44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2() 51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2() 63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type() 70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type() 82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type() 89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type() 101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods() 107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
D | wps_validate.c | 25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version() 32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version() 44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2() 51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2() 63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type() 70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type() 82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type() 89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type() 101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods() 107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/ |
D | spp_client.c | 57 wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')", in hs20_spp_validate() 66 wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err); in hs20_spp_validate() 157 wpa_printf(MSG_INFO, "Processing updateNode"); in process_update_node() 162 wpa_printf(MSG_INFO, "No managementTreeURI present"); in process_update_node() 165 wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri); in process_update_node() 169 wpa_printf(MSG_INFO, "Unexpected URI"); in process_update_node() 174 wpa_printf(MSG_INFO, "Update interior node: '%s'", name); in process_update_node() 178 wpa_printf(MSG_INFO, "Could not extract MO text"); in process_update_node() 205 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer text"); in process_update_node() 213 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer TNDS text"); in process_update_node() [all …]
|
D | osu_client.c | 121 wpa_printf(MSG_INFO, "CTRL: Could not lchown directory: %s", in android_update_permission() 127 wpa_printf(MSG_INFO, "CTRL: Could not chmod directory: %s", in android_update_permission() 148 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto); in osu_get_certificate() 151 wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol"); in osu_get_certificate() 159 wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node"); in osu_get_certificate() 165 wpa_printf(MSG_INFO, "Could not get URL text"); in osu_get_certificate() 168 wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url); in osu_get_certificate() 173 wpa_printf(MSG_INFO, "Could not find estUserID node"); in osu_get_certificate() 179 wpa_printf(MSG_INFO, "Could not get estUserID text"); in osu_get_certificate() 182 wpa_printf(MSG_INFO, "estUserID: %s", user); in osu_get_certificate() [all …]
|
D | oma_dm_client.c | 220 wpa_printf(MSG_INFO, "MgmtTree: %s", str); in mo_str() 251 wpa_printf(MSG_INFO, "Could not read devinfo.xml"); in add_replace_devinfo() 398 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_browser() 404 wpa_printf(MSG_INFO, "Invalid data"); in oma_dm_exec_browser() 407 wpa_printf(MSG_INFO, "Data: %s", data); in oma_dm_exec_browser() 408 wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data); in oma_dm_exec_browser() 413 wpa_printf(MSG_INFO, "User response in browser completed successfully"); in oma_dm_exec_browser() 417 wpa_printf(MSG_INFO, "Failed to receive user response"); in oma_dm_exec_browser() 431 wpa_printf(MSG_INFO, "Client certificate enrollment"); in oma_dm_exec_get_cert() 436 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_get_cert() [all …]
|
D | est.c | 50 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert() 58 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert() 78 wpa_printf(MSG_INFO, "No certificates found in PKCS#7 object"); in pkcs7_to_cert() 135 wpa_printf(MSG_INFO, "Download EST cacerts from %s", buf); in est_load_cacerts() 145 wpa_printf(MSG_INFO, "Failed to download EST cacerts from %s", in est_load_cacerts() 156 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt"); in est_load_cacerts() 163 …wpa_printf(MSG_INFO, "Too short base64 decode (%u bytes; downloaded %u bytes) - assume this was bi… in est_load_cacerts() 169 …wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7"); in est_load_cacerts() 179 wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts"); in est_load_cacerts() 188 wpa_printf(MSG_INFO, "Could not parse CA certs from PKCS#7 cacerts response"); in est_load_cacerts() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/ |
D | spp_client.c | 57 wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')", in hs20_spp_validate() 66 wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err); in hs20_spp_validate() 157 wpa_printf(MSG_INFO, "Processing updateNode"); in process_update_node() 162 wpa_printf(MSG_INFO, "No managementTreeURI present"); in process_update_node() 165 wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri); in process_update_node() 169 wpa_printf(MSG_INFO, "Unexpected URI"); in process_update_node() 174 wpa_printf(MSG_INFO, "Update interior node: '%s'", name); in process_update_node() 178 wpa_printf(MSG_INFO, "Could not extract MO text"); in process_update_node() 205 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer text"); in process_update_node() 213 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer TNDS text"); in process_update_node() [all …]
|
D | osu_client.c | 121 wpa_printf(MSG_INFO, "CTRL: Could not lchown directory: %s", in android_update_permission() 127 wpa_printf(MSG_INFO, "CTRL: Could not chmod directory: %s", in android_update_permission() 148 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto); in osu_get_certificate() 151 wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol"); in osu_get_certificate() 159 wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node"); in osu_get_certificate() 165 wpa_printf(MSG_INFO, "Could not get URL text"); in osu_get_certificate() 168 wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url); in osu_get_certificate() 173 wpa_printf(MSG_INFO, "Could not find estUserID node"); in osu_get_certificate() 179 wpa_printf(MSG_INFO, "Could not get estUserID text"); in osu_get_certificate() 182 wpa_printf(MSG_INFO, "estUserID: %s", user); in osu_get_certificate() [all …]
|
D | oma_dm_client.c | 220 wpa_printf(MSG_INFO, "MgmtTree: %s", str); in mo_str() 251 wpa_printf(MSG_INFO, "Could not read devinfo.xml"); in add_replace_devinfo() 398 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_browser() 404 wpa_printf(MSG_INFO, "Invalid data"); in oma_dm_exec_browser() 407 wpa_printf(MSG_INFO, "Data: %s", data); in oma_dm_exec_browser() 408 wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data); in oma_dm_exec_browser() 413 wpa_printf(MSG_INFO, "User response in browser completed successfully"); in oma_dm_exec_browser() 417 wpa_printf(MSG_INFO, "Failed to receive user response"); in oma_dm_exec_browser() 431 wpa_printf(MSG_INFO, "Client certificate enrollment"); in oma_dm_exec_get_cert() 436 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_get_cert() [all …]
|
D | est.c | 50 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert() 58 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert() 78 wpa_printf(MSG_INFO, "No certificates found in PKCS#7 object"); in pkcs7_to_cert() 135 wpa_printf(MSG_INFO, "Download EST cacerts from %s", buf); in est_load_cacerts() 145 wpa_printf(MSG_INFO, "Failed to download EST cacerts from %s", in est_load_cacerts() 156 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt"); in est_load_cacerts() 163 …wpa_printf(MSG_INFO, "Too short base64 decode (%u bytes; downloaded %u bytes) - assume this was bi… in est_load_cacerts() 169 …wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7"); in est_load_cacerts() 179 wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts"); in est_load_cacerts() 188 wpa_printf(MSG_INFO, "Could not parse CA certs from PKCS#7 cacerts response"); in est_load_cacerts() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | crypto_module_tests.c | 149 wpa_printf(MSG_INFO, "AES-SIV test cases passed"); in test_siv() 293 wpa_printf(MSG_INFO, "OMAC1-AES-128 test cases passed"); in test_omac1() 341 wpa_printf(MSG_INFO, "AES-128 EAX mode test cases passed"); in test_eax() 497 wpa_printf(MSG_INFO, "AES ECB mode test cases passed"); in test_ecb() 616 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.1"); in test_key_wrap() 637 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.2"); in test_key_wrap() 658 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.3"); in test_key_wrap() 679 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.4"); in test_key_wrap() 700 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.5"); in test_key_wrap() 720 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.6"); in test_key_wrap() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | crypto_module_tests.c | 149 wpa_printf(MSG_INFO, "AES-SIV test cases passed"); in test_siv() 293 wpa_printf(MSG_INFO, "OMAC1-AES-128 test cases passed"); in test_omac1() 341 wpa_printf(MSG_INFO, "AES-128 EAX mode test cases passed"); in test_eax() 497 wpa_printf(MSG_INFO, "AES ECB mode test cases passed"); in test_ecb() 616 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.1"); in test_key_wrap() 637 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.2"); in test_key_wrap() 658 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.3"); in test_key_wrap() 679 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.4"); in test_key_wrap() 700 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.5"); in test_key_wrap() 720 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.6"); in test_key_wrap() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
D | utils_module_tests.c | 54 wpa_printf(MSG_INFO, "printf encode/decode tests"); in printf_encode_decode_tests() 59 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf); in printf_encode_decode_tests() 134 wpa_printf(MSG_INFO, "bitfield tests"); in bitfield_tests() 231 wpa_printf(MSG_INFO, "int_array tests"); in int_array_tests() 259 wpa_printf(MSG_INFO, "ext_password tests"); in ext_password_tests() 286 wpa_printf(MSG_INFO, "trace tests"); in trace_tests() 301 wpa_printf(MSG_INFO, "base64 tests"); in base64_tests() 369 wpa_printf(MSG_INFO, "common tests"); in common_tests() 453 wpa_printf(MSG_INFO, "os tests"); in os_tests() 518 wpa_printf(MSG_INFO, "wpabuf tests"); in wpabuf_tests() [all …]
|
D | trace.c | 77 wpa_printf(MSG_INFO, "bfd_openr failed"); in open_bfd() 82 wpa_printf(MSG_INFO, "bfd_check_format failed"); in open_bfd() 88 wpa_printf(MSG_INFO, "bfd_check_format_matches failed"); in open_bfd() 107 wpa_printf(MSG_INFO, "No symbols"); in read_syms() 117 wpa_printf(MSG_INFO, "Unknown symtab upper bound"); in read_syms() 123 wpa_printf(MSG_INFO, "Failed to allocate memory for symtab " in read_syms() 132 wpa_printf(MSG_INFO, "Failed to canonicalize %ssymtab", in read_syms() 211 wpa_printf(MSG_INFO, " %s() %s:%u", in wpa_trace_bfd_addr() 252 wpa_printf(MSG_INFO, "Failed to open bfd"); in wpa_trace_bfd_init() 259 wpa_printf(MSG_INFO, "Failed to read symbols"); in wpa_trace_bfd_init() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
D | utils_module_tests.c | 54 wpa_printf(MSG_INFO, "printf encode/decode tests"); in printf_encode_decode_tests() 59 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf); in printf_encode_decode_tests() 134 wpa_printf(MSG_INFO, "bitfield tests"); in bitfield_tests() 231 wpa_printf(MSG_INFO, "int_array tests"); in int_array_tests() 259 wpa_printf(MSG_INFO, "ext_password tests"); in ext_password_tests() 286 wpa_printf(MSG_INFO, "trace tests"); in trace_tests() 302 wpa_printf(MSG_INFO, "base64 tests"); in base64_tests() 370 wpa_printf(MSG_INFO, "common tests"); in common_tests() 454 wpa_printf(MSG_INFO, "os tests"); in os_tests() 519 wpa_printf(MSG_INFO, "wpabuf tests"); in wpabuf_tests() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | ikev2.c | 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 238 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 252 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 260 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 276 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | ikev2.c | 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 238 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 252 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 260 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 276 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | ikev2.c | 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 125 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 132 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 146 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 208 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 217 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 230 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 244 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 252 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 268 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal() [all …]
|
D | eap_pwd.c | 103 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); in eap_pwd_init() 109 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); in eap_pwd_init() 114 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); in eap_pwd_init() 119 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_init() 128 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation psk fail"); in eap_pwd_init() 279 wpa_printf(MSG_INFO, in eap_pwd_perform_id_exchange() 311 wpa_printf(MSG_INFO, "EAP-pwd: data was already allocated"); in eap_pwd_perform_id_exchange() 318 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_perform_id_exchange() 324 wpa_hexdump_ascii(MSG_INFO, "EAP-PWD (peer): server sent id of", in eap_pwd_perform_id_exchange() 329 wpa_printf(MSG_INFO, "EAP-PWD: failed to allocate memory for " in eap_pwd_perform_id_exchange() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | ikev2.c | 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 125 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 132 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 146 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 209 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 218 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 231 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 245 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 253 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 269 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal() [all …]
|
D | eap_pwd.c | 103 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); in eap_pwd_init() 109 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); in eap_pwd_init() 114 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); in eap_pwd_init() 119 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_init() 128 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation psk fail"); in eap_pwd_init() 279 wpa_printf(MSG_INFO, in eap_pwd_perform_id_exchange() 311 wpa_printf(MSG_INFO, "EAP-pwd: data was already allocated"); in eap_pwd_perform_id_exchange() 318 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_perform_id_exchange() 324 wpa_hexdump_ascii(MSG_INFO, "EAP-PWD (peer): server sent id of", in eap_pwd_perform_id_exchange() 329 wpa_printf(MSG_INFO, "EAP-PWD: failed to allocate memory for " in eap_pwd_perform_id_exchange() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | iapp.c | 203 wpa_printf(MSG_INFO, "sendto[IAPP-ADD]: %s", strerror(errno)); in iapp_send_add() 230 wpa_printf(MSG_INFO, "send[L2 Update]: %s", strerror(errno)); in iapp_send_layer2_update() 268 wpa_printf(MSG_INFO, "Invalid IAPP-ADD packet length %d (expected %lu)", in iapp_process_add_notify() 318 wpa_printf(MSG_INFO, "iapp_receive_udp - recvfrom: %s", in iapp_receive_udp() 343 wpa_printf(MSG_INFO, "Dropping IAPP frame with unknown version %d", in iapp_receive_udp() 348 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)", in iapp_receive_udp() 353 wpa_printf(MSG_INFO, "Ignoring %d extra bytes from IAPP frame", in iapp_receive_udp() 370 wpa_printf(MSG_INFO, "Unknown IAPP command %d", hdr->command); in iapp_receive_udp() 398 wpa_printf(MSG_INFO, "iapp_init - socket[PF_INET,SOCK_DGRAM]: %s", in iapp_init() 407 wpa_printf(MSG_INFO, "iapp_init - ioctl(SIOCGIFINDEX): %s", in iapp_init() [all …]
|
D | dpp_hostapd.c | 51 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in hostapd_dpp_qr_code() 76 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in hostapd_dpp_auth_resp_retry_timeout() 100 wpa_printf(MSG_INFO, in hostapd_dpp_auth_resp_retry() 129 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX_STATUS "dst=" MACSTR in hostapd_dpp_tx_status() 198 wpa_printf(MSG_INFO, in hostapd_dpp_tx_status() 232 wpa_printf(MSG_INFO, in hostapd_dpp_reply_wait_timeout() 234 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_AUTH_INIT_FAILED); in hostapd_dpp_reply_wait_timeout() 271 wpa_printf(MSG_INFO, in hostapd_dpp_reply_wait_timeout() 330 wpa_printf(MSG_INFO, in hostapd_dpp_auth_init_next() 332 wpa_msg(hapd->msg_ctx, MSG_INFO, in hostapd_dpp_auth_init_next() [all …]
|
D | accounting.c | 49 wpa_printf(MSG_INFO, "Could not create new RADIUS packet"); in accounting_msg() 55 wpa_printf(MSG_INFO, "Could not add Acct-Status-Type"); in accounting_msg() 67 wpa_printf(MSG_INFO, "Could not add Acct-Authentic"); in accounting_msg() 91 wpa_printf(MSG_INFO, "Could not add User-Name"); in accounting_msg() 112 wpa_printf(MSG_INFO, "Could not add Class"); in accounting_msg() 149 wpa_printf(MSG_INFO, "Could not add Event-Timestamp"); in accounting_msg() 158 wpa_printf(MSG_INFO, "Could not add Acct-Delay-Time"); in accounting_msg() 281 wpa_printf(MSG_INFO, "Could not create RADIUS Accounting message"); in accounting_sta_report() 289 wpa_printf(MSG_INFO, "Could not add Acct-Session-Time"); in accounting_sta_report() 297 wpa_printf(MSG_INFO, "Could not add Acct-Input-Packets"); in accounting_sta_report() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | accounting.c | 49 wpa_printf(MSG_INFO, "Could not create new RADIUS packet"); in accounting_msg() 55 wpa_printf(MSG_INFO, "Could not add Acct-Status-Type"); in accounting_msg() 67 wpa_printf(MSG_INFO, "Could not add Acct-Authentic"); in accounting_msg() 91 wpa_printf(MSG_INFO, "Could not add User-Name"); in accounting_msg() 112 wpa_printf(MSG_INFO, "Could not add Class"); in accounting_msg() 149 wpa_printf(MSG_INFO, "Could not add Event-Timestamp"); in accounting_msg() 158 wpa_printf(MSG_INFO, "Could not add Acct-Delay-Time"); in accounting_msg() 281 wpa_printf(MSG_INFO, "Could not create RADIUS Accounting message"); in accounting_sta_report() 289 wpa_printf(MSG_INFO, "Could not add Acct-Session-Time"); in accounting_sta_report() 297 wpa_printf(MSG_INFO, "Could not add Acct-Input-Packets"); in accounting_sta_report() [all …]
|