/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
H A D | wps_validate.c | 25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version() 32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version() 44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2() 51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2() 63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type() 70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type() 82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type() 89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type() 101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods() 107 wpa_printf(MSG_INFO, "WP in valid_config_methods() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
H A D | wps_validate.c | 25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version() 32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version() 44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2() 51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2() 63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type() 70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type() 82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type() 89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type() 101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods() 107 wpa_printf(MSG_INFO, "WP in valid_config_methods() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/ |
H A D | spp_client.c | 57 wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')", in hs20_spp_validate() 66 wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err); in hs20_spp_validate() 157 wpa_printf(MSG_INFO, "Processing updateNode"); in process_update_node() 162 wpa_printf(MSG_INFO, "No managementTreeURI present"); in process_update_node() 165 wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri); in process_update_node() 169 wpa_printf(MSG_INFO, "Unexpected URI"); in process_update_node() 174 wpa_printf(MSG_INFO, "Update interior node: '%s'", name); in process_update_node() 178 wpa_printf(MSG_INFO, "Could not extract MO text"); in process_update_node() 205 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer text"); in process_update_node() 213 wpa_printf(MSG_INFO, "[hs2 in process_update_node() [all...] |
H A D | osu_client.c | 121 wpa_printf(MSG_INFO, "CTRL: Could not lchown directory: %s", in android_update_permission() 127 wpa_printf(MSG_INFO, "CTRL: Could not chmod directory: %s", in android_update_permission() 148 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto); in osu_get_certificate() 151 wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol"); in osu_get_certificate() 159 wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node"); in osu_get_certificate() 165 wpa_printf(MSG_INFO, "Could not get URL text"); in osu_get_certificate() 168 wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url); in osu_get_certificate() 173 wpa_printf(MSG_INFO, "Could not find estUserID node"); in osu_get_certificate() 179 wpa_printf(MSG_INFO, "Could not get estUserID text"); in osu_get_certificate() 182 wpa_printf(MSG_INFO, "estUserI in osu_get_certificate() [all...] |
H A D | oma_dm_client.c | 220 wpa_printf(MSG_INFO, "MgmtTree: %s", str); in mo_str() 251 wpa_printf(MSG_INFO, "Could not read devinfo.xml"); in add_replace_devinfo() 398 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_browser() 404 wpa_printf(MSG_INFO, "Invalid data"); in oma_dm_exec_browser() 407 wpa_printf(MSG_INFO, "Data: %s", data); in oma_dm_exec_browser() 408 wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data); in oma_dm_exec_browser() 413 wpa_printf(MSG_INFO, "User response in browser completed successfully"); in oma_dm_exec_browser() 417 wpa_printf(MSG_INFO, "Failed to receive user response"); in oma_dm_exec_browser() 431 wpa_printf(MSG_INFO, "Client certificate enrollment"); in oma_dm_exec_get_cert() 436 wpa_printf(MSG_INFO, "N in oma_dm_exec_get_cert() [all...] |
H A D | est.c | 50 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert() 58 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert() 78 wpa_printf(MSG_INFO, "No certificates found in PKCS#7 object"); in pkcs7_to_cert() 135 wpa_printf(MSG_INFO, "Download EST cacerts from %s", buf); in est_load_cacerts() 145 wpa_printf(MSG_INFO, "Failed to download EST cacerts from %s", in est_load_cacerts() 156 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt"); in est_load_cacerts() 163 wpa_printf(MSG_INFO, "Too short base64 decode (%u bytes; downloaded %u bytes) - assume this was binary", in est_load_cacerts() 169 wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7"); in est_load_cacerts() 179 wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts"); in est_load_cacerts() 188 wpa_printf(MSG_INFO, "Coul in est_load_cacerts() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/ |
H A D | spp_client.c | 57 wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')", in hs20_spp_validate() 66 wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err); in hs20_spp_validate() 157 wpa_printf(MSG_INFO, "Processing updateNode"); in process_update_node() 162 wpa_printf(MSG_INFO, "No managementTreeURI present"); in process_update_node() 165 wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri); in process_update_node() 169 wpa_printf(MSG_INFO, "Unexpected URI"); in process_update_node() 174 wpa_printf(MSG_INFO, "Update interior node: '%s'", name); in process_update_node() 178 wpa_printf(MSG_INFO, "Could not extract MO text"); in process_update_node() 205 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer text"); in process_update_node() 213 wpa_printf(MSG_INFO, "[hs2 in process_update_node() [all...] |
H A D | osu_client.c | 121 wpa_printf(MSG_INFO, "CTRL: Could not lchown directory: %s", in android_update_permission() 127 wpa_printf(MSG_INFO, "CTRL: Could not chmod directory: %s", in android_update_permission() 148 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto); in osu_get_certificate() 151 wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol"); in osu_get_certificate() 159 wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node"); in osu_get_certificate() 165 wpa_printf(MSG_INFO, "Could not get URL text"); in osu_get_certificate() 168 wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url); in osu_get_certificate() 173 wpa_printf(MSG_INFO, "Could not find estUserID node"); in osu_get_certificate() 179 wpa_printf(MSG_INFO, "Could not get estUserID text"); in osu_get_certificate() 182 wpa_printf(MSG_INFO, "estUserI in osu_get_certificate() [all...] |
H A D | oma_dm_client.c | 220 wpa_printf(MSG_INFO, "MgmtTree: %s", str); in mo_str() 251 wpa_printf(MSG_INFO, "Could not read devinfo.xml"); in add_replace_devinfo() 398 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_browser() 404 wpa_printf(MSG_INFO, "Invalid data"); in oma_dm_exec_browser() 407 wpa_printf(MSG_INFO, "Data: %s", data); in oma_dm_exec_browser() 408 wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data); in oma_dm_exec_browser() 413 wpa_printf(MSG_INFO, "User response in browser completed successfully"); in oma_dm_exec_browser() 417 wpa_printf(MSG_INFO, "Failed to receive user response"); in oma_dm_exec_browser() 431 wpa_printf(MSG_INFO, "Client certificate enrollment"); in oma_dm_exec_get_cert() 436 wpa_printf(MSG_INFO, "N in oma_dm_exec_get_cert() [all...] |
H A D | est.c | 50 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert() 58 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert() 78 wpa_printf(MSG_INFO, "No certificates found in PKCS#7 object"); in pkcs7_to_cert() 135 wpa_printf(MSG_INFO, "Download EST cacerts from %s", buf); in est_load_cacerts() 145 wpa_printf(MSG_INFO, "Failed to download EST cacerts from %s", in est_load_cacerts() 156 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt"); in est_load_cacerts() 163 wpa_printf(MSG_INFO, "Too short base64 decode (%u bytes; downloaded %u bytes) - assume this was binary", in est_load_cacerts() 169 wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7"); in est_load_cacerts() 179 wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts"); in est_load_cacerts() 188 wpa_printf(MSG_INFO, "Coul in est_load_cacerts() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | utils_module_tests.c | 54 wpa_printf(MSG_INFO, "printf encode/decode tests"); in printf_encode_decode_tests() 59 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf); in printf_encode_decode_tests() 134 wpa_printf(MSG_INFO, "bitfield tests"); in bitfield_tests() 231 wpa_printf(MSG_INFO, "int_array tests"); in int_array_tests() 259 wpa_printf(MSG_INFO, "ext_password tests"); in ext_password_tests() 286 wpa_printf(MSG_INFO, "trace tests"); in trace_tests() 301 wpa_printf(MSG_INFO, "base64 tests"); in base64_tests() 369 wpa_printf(MSG_INFO, "common tests"); in common_tests() 453 wpa_printf(MSG_INFO, "os tests"); in os_tests() 518 wpa_printf(MSG_INFO, "wpabu in wpabuf_tests() [all...] |
H A D | trace.c | 77 wpa_printf(MSG_INFO, "bfd_openr failed"); in open_bfd() 82 wpa_printf(MSG_INFO, "bfd_check_format failed"); in open_bfd() 88 wpa_printf(MSG_INFO, "bfd_check_format_matches failed"); in open_bfd() 107 wpa_printf(MSG_INFO, "No symbols"); in read_syms() 117 wpa_printf(MSG_INFO, "Unknown symtab upper bound"); in read_syms() 123 wpa_printf(MSG_INFO, "Failed to allocate memory for symtab " in read_syms() 132 wpa_printf(MSG_INFO, "Failed to canonicalize %ssymtab", in read_syms() 211 wpa_printf(MSG_INFO, " %s() %s:%u", in wpa_trace_bfd_addr() 252 wpa_printf(MSG_INFO, "Failed to open bfd"); in wpa_trace_bfd_init() 259 wpa_printf(MSG_INFO, "Faile in wpa_trace_bfd_init() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | utils_module_tests.c | 54 wpa_printf(MSG_INFO, "printf encode/decode tests"); in printf_encode_decode_tests() 59 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf); in printf_encode_decode_tests() 134 wpa_printf(MSG_INFO, "bitfield tests"); in bitfield_tests() 231 wpa_printf(MSG_INFO, "int_array tests"); in int_array_tests() 259 wpa_printf(MSG_INFO, "ext_password tests"); in ext_password_tests() 286 wpa_printf(MSG_INFO, "trace tests"); in trace_tests() 302 wpa_printf(MSG_INFO, "base64 tests"); in base64_tests() 370 wpa_printf(MSG_INFO, "common tests"); in common_tests() 454 wpa_printf(MSG_INFO, "os tests"); in os_tests() 519 wpa_printf(MSG_INFO, "wpabu in wpabuf_tests() [all...] |
H A D | trace.c | 77 wpa_printf(MSG_INFO, "bfd_openr failed"); in open_bfd() 82 wpa_printf(MSG_INFO, "bfd_check_format failed"); in open_bfd() 88 wpa_printf(MSG_INFO, "bfd_check_format_matches failed"); in open_bfd() 107 wpa_printf(MSG_INFO, "No symbols"); in read_syms() 117 wpa_printf(MSG_INFO, "Unknown symtab upper bound"); in read_syms() 123 wpa_printf(MSG_INFO, "Failed to allocate memory for symtab " in read_syms() 132 wpa_printf(MSG_INFO, "Failed to canonicalize %ssymtab", in read_syms() 222 wpa_printf(MSG_INFO, " %s() %s:%u", in wpa_trace_bfd_addr() 263 wpa_printf(MSG_INFO, "Failed to open bfd"); in wpa_trace_bfd_init() 270 wpa_printf(MSG_INFO, "Faile in wpa_trace_bfd_init() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | ikev2.c | 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 238 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 252 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 260 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 276 wpa_printf(MSG_INFO, "IKEV in ikev2_parse_proposal() [all...] |
H A D | eap_server_pwd.c | 91 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " in eap_pwd_init() 111 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " in eap_pwd_init() 125 wpa_printf(MSG_INFO, in eap_pwd_init() 214 wpa_printf(MSG_INFO, in eap_pwd_build_id_req() 259 wpa_printf(MSG_INFO, "EAP-PWD (server): scalar allocation " in eap_pwd_build_commit_req() 270 wpa_printf(MSG_INFO, "EAP-PWD (server): element allocation " in eap_pwd_build_commit_req() 277 wpa_printf(MSG_INFO, "EAP-PWD (server): element inversion " in eap_pwd_build_commit_req() 299 wpa_printf(MSG_INFO, "EAP-PWD (server): point assignment " in eap_pwd_build_commit_req() 333 wpa_printf(MSG_INFO, "EAP-PWD (server): debug allocation " in eap_pwd_build_confirm_req() 358 wpa_printf(MSG_INFO, "EA in eap_pwd_build_confirm_req() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | ikev2.c | 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 238 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 252 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 260 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 276 wpa_printf(MSG_INFO, "IKEV in ikev2_parse_proposal() [all...] |
H A D | eap_server_pwd.c | 91 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " in eap_pwd_init() 111 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " in eap_pwd_init() 125 wpa_printf(MSG_INFO, in eap_pwd_init() 214 wpa_printf(MSG_INFO, in eap_pwd_build_id_req() 259 wpa_printf(MSG_INFO, "EAP-PWD (server): scalar allocation " in eap_pwd_build_commit_req() 270 wpa_printf(MSG_INFO, "EAP-PWD (server): element allocation " in eap_pwd_build_commit_req() 277 wpa_printf(MSG_INFO, "EAP-PWD (server): element inversion " in eap_pwd_build_commit_req() 299 wpa_printf(MSG_INFO, "EAP-PWD (server): point assignment " in eap_pwd_build_commit_req() 333 wpa_printf(MSG_INFO, "EAP-PWD (server): debug allocation " in eap_pwd_build_confirm_req() 358 wpa_printf(MSG_INFO, "EA in eap_pwd_build_confirm_req() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | ikev2.c | 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 125 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 132 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 146 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 208 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 217 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 230 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 244 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 252 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 268 wpa_printf(MSG_INFO, "IKEV in ikev2_parse_proposal() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | ikev2.c | 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 125 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 132 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 146 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 209 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 218 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 231 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 245 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 253 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 269 wpa_printf(MSG_INFO, "IKEV in ikev2_parse_proposal() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | iapp.c | 203 wpa_printf(MSG_INFO, "sendto[IAPP-ADD]: %s", strerror(errno)); in iapp_send_add() 230 wpa_printf(MSG_INFO, "send[L2 Update]: %s", strerror(errno)); in iapp_send_layer2_update() 268 wpa_printf(MSG_INFO, "Invalid IAPP-ADD packet length %d (expected %lu)", in iapp_process_add_notify() 318 wpa_printf(MSG_INFO, "iapp_receive_udp - recvfrom: %s", in iapp_receive_udp() 343 wpa_printf(MSG_INFO, "Dropping IAPP frame with unknown version %d", in iapp_receive_udp() 348 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)", in iapp_receive_udp() 353 wpa_printf(MSG_INFO, "Ignoring %d extra bytes from IAPP frame", in iapp_receive_udp() 370 wpa_printf(MSG_INFO, "Unknown IAPP command %d", hdr->command); in iapp_receive_udp() 398 wpa_printf(MSG_INFO, "iapp_init - socket[PF_INET,SOCK_DGRAM]: %s", in iapp_init() 407 wpa_printf(MSG_INFO, "iapp_ini in iapp_init() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | dpp_supplicant.c | 75 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in wpas_dpp_qr_code() 101 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in wpas_dpp_auth_resp_retry_timeout() 127 wpa_printf(MSG_INFO, "DPP: No confirm received from initiator - stopping exchange"); in wpas_dpp_auth_resp_retry() 174 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX_STATUS "dst=" MACSTR in wpas_dpp_tx_status() 272 wpa_printf(MSG_INFO, in wpas_dpp_reply_wait_timeout() 274 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_AUTH_INIT_FAILED); in wpas_dpp_reply_wait_timeout() 366 wpa_printf(MSG_INFO, in wpas_dpp_auth_init_next() 368 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_AUTH_INIT_FAILED); in wpas_dpp_auth_init_next() 421 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR " freq=%u type=%d", in wpas_dpp_auth_init_next() 455 wpa_printf(MSG_INFO, in wpas_dpp_auth_init() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
H A D | radius_das.c | 69 wpa_printf(MSG_INFO, "DAS: Unsupported attribute %u in " in radius_das_disconnect() 81 wpa_printf(MSG_INFO, "DAS: Invalid NAS-IP-Address from %s:%d", in radius_das_disconnect() 93 wpa_printf(MSG_INFO, "DAS: Invalid NAS-IPv6-Address from %s:%d", in radius_das_disconnect() 115 wpa_printf(MSG_INFO, "DAS: Invalid Calling-Station-Id " in radius_das_disconnect() 150 wpa_printf(MSG_INFO, "DAS: NAS mismatch from %s:%d", in radius_das_disconnect() 155 wpa_printf(MSG_INFO, "DAS: Session not found for request from " in radius_das_disconnect() 160 wpa_printf(MSG_INFO, in radius_das_disconnect() 228 wpa_printf(MSG_INFO, "DAS: CoA not supported"); in radius_das_coa() 234 wpa_printf(MSG_INFO, in radius_das_coa() 246 wpa_printf(MSG_INFO, "DA in radius_das_coa() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
H A D | radius_das.c | 69 wpa_printf(MSG_INFO, "DAS: Unsupported attribute %u in " in radius_das_disconnect() 81 wpa_printf(MSG_INFO, "DAS: Invalid NAS-IP-Address from %s:%d", in radius_das_disconnect() 93 wpa_printf(MSG_INFO, "DAS: Invalid NAS-IPv6-Address from %s:%d", in radius_das_disconnect() 115 wpa_printf(MSG_INFO, "DAS: Invalid Calling-Station-Id " in radius_das_disconnect() 150 wpa_printf(MSG_INFO, "DAS: NAS mismatch from %s:%d", in radius_das_disconnect() 155 wpa_printf(MSG_INFO, "DAS: Session not found for request from " in radius_das_disconnect() 160 wpa_printf(MSG_INFO, in radius_das_disconnect() 228 wpa_printf(MSG_INFO, "DAS: CoA not supported"); in radius_das_coa() 234 wpa_printf(MSG_INFO, in radius_das_coa() 246 wpa_printf(MSG_INFO, "DA in radius_das_coa() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | dpp_hostapd.c | 61 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in hostapd_dpp_qr_code() 116 wpa_printf(MSG_INFO, in hostapd_dpp_nfc_handover_req() 147 wpa_printf(MSG_INFO, in hostapd_dpp_nfc_handover_sel() 153 wpa_printf(MSG_INFO, in hostapd_dpp_nfc_handover_sel() 173 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in hostapd_dpp_auth_resp_retry_timeout() 197 wpa_printf(MSG_INFO, in hostapd_dpp_auth_resp_retry() 226 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX_STATUS "dst=" MACSTR in hostapd_dpp_tx_status() 312 wpa_printf(MSG_INFO, in hostapd_dpp_tx_status() 346 wpa_printf(MSG_INFO, in hostapd_dpp_reply_wait_timeout() 348 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_AUTH_INIT_FAILE in hostapd_dpp_reply_wait_timeout() [all...] |